Prosim o kontrolu HJT, vysoke zatizeni cpu pri minimalnim poctu bezicich aplikaci. Dekuji Vyřešeno

Místo pro vaše HiJackThis logy a logy z dalších programů…

Moderátoři: Mods_senior, Security team

Tavare
Level 1
Level 1
Příspěvky: 64
Registrován: květen 10
Pohlaví: Muž
Stav:
Offline

Prosim o kontrolu HJT, vysoke zatizeni cpu pri minimalnim poctu bezicich aplikaci. Dekuji  Vyřešeno

Příspěvekod Tavare » 13 led 2018 20:41

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 19:35:05, on 13.01.2018
Platform: Unknown Windows (WinNT 6.02.1008)
MSIE: Internet Explorer v11.0 (11.00.16299.0015)
Boot mode: Normal

Running processes:
C:\Program Files (x86)\Common Files\Microsoft Shared\Ink\TabTip32.exe
C:\Program Files (x86)\Glary Utilities 5\Integrator.exe
C:\Users\Tom\Downloads\hijackthis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://services.eshield.com/general/new ... 3769&guid={4A1DD49F-3C01-4172-AA1E-CA6ED7A40DF9}&i=
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/p/?LinkI ... id=UE13DHP
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/p/?LinkId=255141
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/p/?LinkId=255141
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 192.168.*.*
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
F2 - REG:system.ini: UserInit=
O2 - BHO: Skype for Business Click to Call BHO - {31D09BA0-12F5-4CCE-BE8A-2923E76605DA} - C:\Program Files (x86)\Microsoft Office\Office16\OCHelper.dll
O2 - BHO: Microsoft OneDrive for Business Browser Helper - {D0498E0A-45B7-42AE-A9AA-ABA463DBD3BF} - C:\Program Files (x86)\MICROS~1\Office16\GROOVEEX.DLL
O4 - HKCU\..\Run: [GUDelayStartup] "C:\Program Files (x86)\Glary Utilities 5\StartupManager.exe" -delayrun
O4 - HKUS\S-1-5-19\..\Run: [OneDriveSetup] C:\Windows\SysWOW64\OneDriveSetup.exe /thfirstsetup (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [OneDriveSetup] C:\Windows\SysWOW64\OneDriveSetup.exe /thfirstsetup (User 'NETWORK SERVICE')
O4 - Global Startup: rvlkl.lnk = C:\Windows\System32\rvlkl.exe
O8 - Extra context menu item: E&xportovat do aplikace Microsoft Excel - res://C:\PROGRA~1\MICROS~1\Office14\EXCEL.EXE/3000
O8 - Extra context menu item: E&xportovat do Microsoft Excelu - res://C:\PROGRA~1\MICROS~1\Office16\EXCEL.EXE/3000
O8 - Extra context menu item: Od&eslat do aplikace OneNote - res://C:\PROGRA~1\MICROS~1\Office14\ONBttnIE.dll/105
O8 - Extra context menu item: Poslat do On&eNotu - res://C:\PROGRA~1\MICROS~1\Office16\ONBttnIE.dll/105
O9 - Extra button: Poslat do OneNotu - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\Program Files (x86)\Microsoft Office\Office16\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: Poslat do On&eNotu - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\Program Files (x86)\Microsoft Office\Office16\ONBttnIE.dll
O9 - Extra button: @%CommonProgramFiles%\Microsoft Shared\Office16\oregres.dll,-430 - {31D09BA0-12F5-4CCE-BE8A-2923E76605DA} - C:\Program Files (x86)\Microsoft Office\Office16\OCHelper.dll
O9 - Extra 'Tools' menuitem: @%CommonProgramFiles%\Microsoft Shared\Office16\oregres.dll,-430 - {31D09BA0-12F5-4CCE-BE8A-2923E76605DA} - C:\Program Files (x86)\Microsoft Office\Office16\OCHelper.dll
O9 - Extra button: P&ropojené poznámky aplikace OneNote - {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} - C:\Program Files (x86)\Microsoft Office\Office16\ONBttnIELinkedNotes.dll
O9 - Extra 'Tools' menuitem: P&ropojené poznámky aplikace OneNote - {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} - C:\Program Files (x86)\Microsoft Office\Office16\ONBttnIELinkedNotes.dll
O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics
O15 - Trusted Zone: http://*.webcompanion.com
O18 - Protocol: mso-minsb.16 - {3459B272-CC19-4448-86C9-DDC3B4B2FAD3} - C:\Program Files (x86)\Microsoft Office\Office16\MSOSB.DLL
O18 - Protocol: osf.16 - {5504BE45-A83B-4808-900A-3A5C36E7F77A} - C:\Program Files (x86)\Microsoft Office\Office16\MSOSB.DLL
O18 - Protocol: tbauth - {14654CA6-5711-491D-B89A-58E571679951} - C:\Windows\SysWOW64\tbauth.dll
O18 - Protocol: windows.tbauth - {14654CA6-5711-491D-B89A-58E571679951} - C:\Windows\SysWOW64\tbauth.dll
O18 - Filter hijack: text/xml - {807583E5-5146-11D5-A672-00B0D022E945} - C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE16\MSOXMLMF.DLL
O23 - Service: Adobe Acrobat Update Service (AdobeARMservice) - Adobe Systems Incorporated - C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\WINDOWS\System32\alg.exe (file missing)
O23 - Service: AMD External Events Utility - AMD - C:\WINDOWS\System32\DriverStore\FileRepository\c0321058.inf_amd64_c0aa1a2b512afe19\atiesrxx.exe
O23 - Service: AMD FUEL Service - Advanced Micro Devices, Inc. - C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe
O23 - Service: @oem129.inf,%HidMonitor.SvcDisp%;Alps HID Monitor Service (ApHidMonitorService) - Alps Electric Co., Ltd. - C:\Program Files\Apoint2K\HidMonitorSvc.exe
O23 - Service: @%SystemRoot%\system32\DiagSvcs\DiagnosticsHub.StandardCollector.ServiceRes.dll,-1000 (diagnosticshub.standardcollector.service) - Unknown owner - C:\WINDOWS\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe (file missing)
O23 - Service: @%SystemRoot%\system32\efssvc.dll,-100 (EFS) - Unknown owner - C:\WINDOWS\System32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\fxsresm.dll,-118 (Fax) - Unknown owner - C:\WINDOWS\system32\fxssvc.exe (file missing)
O23 - Service: FLEXnet Licensing Service - Acresso Software Inc. - C:\Program Files (x86)\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: Služba Google Update (gupdate) (gupdate) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Služba Google Update (gupdatem) (gupdatem) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\WINDOWS\System32\msdtc.exe (file missing)
O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\WINDOWS\system32\locator.exe (file missing)
O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\SecurityHealthAgent.dll,-1002 (SecurityHealthService) - Unknown owner - C:\WINDOWS\system32\SecurityHealthService.exe (file missing)
O23 - Service: @%SystemRoot%\system32\SensorDataService.exe,-101 (SensorDataService) - Unknown owner - C:\WINDOWS\System32\SensorDataService.exe (file missing)
O23 - Service: Skype Updater (SkypeUpdate) - Skype Technologies - C:\Program Files (x86)\Skype\Updater\Updater.exe
O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\WINDOWS\System32\snmptrap.exe (file missing)
O23 - Service: Soda PDF 8 Manager - LULU Software Limited - C:\ProgramData\LULU Software\Soda PDF 8 Manager\Soda PDF 8\Soda Manager.exe
O23 - Service: @%systemroot%\system32\spectrum.exe,-101 (spectrum) - Unknown owner - C:\WINDOWS\system32\spectrum.exe (file missing)
O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\WINDOWS\System32\spoolsv.exe (file missing)
O23 - Service: @%SystemRoot%\system32\sppsvc.exe,-101 (sppsvc) - Unknown owner - C:\WINDOWS\system32\sppsvc.exe (file missing)
O23 - Service: SAMSUNG Mobile Connectivity Service (ss_conn_service) - DEVGURU Co., LTD. - C:\Program Files\SAMSUNG\USB Drivers\25_escape\conn\ss_conn_service.exe
O23 - Service: @%SystemRoot%\system32\TieringEngineService.exe,-702 (TieringEngineService) - Unknown owner - C:\WINDOWS\system32\TieringEngineService.exe (file missing)
O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\WINDOWS\system32\UI0Detect.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vaultsvc.dll,-1003 (VaultSvc) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\WINDOWS\System32\vds.exe (file missing)
O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\WINDOWS\system32\vssvc.exe (file missing)
O23 - Service: @%systemroot%\system32\wbengine.exe,-104 (wbengine) - Unknown owner - C:\WINDOWS\system32\wbengine.exe (file missing)
O23 - Service: @%ProgramFiles%\Windows Defender\MpAsDesc.dll,-320 (WdNisSvc) - Unknown owner - C:\Program Files (x86)\Windows Defender\NisSrv.exe (file missing)
O23 - Service: @%ProgramFiles%\Windows Defender\MpAsDesc.dll,-310 (WinDefend) - Unknown owner - C:\Program Files (x86)\Windows Defender\MsMpEng.exe (file missing)
O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\WINDOWS\system32\wbem\WmiApSrv.exe (file missing)
O23 - Service: @%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing)
O23 - Service: @%systemroot%\system32\xbgmsvc.exe,-100 (xbgm) - Unknown owner - C:\WINDOWS\system32\xbgmsvc.exe (file missing)
O23 - Service: ZAtheros Bt and Wlan Coex Agent - Atheros - C:\Program Files (x86)\Bluetooth Suite\Ath_CoexAgent.exe

--
End of file - 9943 bytes

Reklama
Uživatelský avatar
jaro3
člen Security týmu
Guru Level 15
Guru Level 15
Příspěvky: 43054
Registrován: červen 07
Bydliště: Jižní Čechy
Pohlaví: Muž
Stav:
Offline

Re: Prosim o kontrolu HJT, vysoke zatizeni cpu pri minimalnim poctu bezicich aplikaci. Dekuji

Příspěvekod jaro3 » 13 led 2018 21:50

Stáhni si ATF Cleaner
Poklepej na ATF Cleaner.exe, klikni na select all found, poté:
-Když používáš Firefox (Mozzila), klikni na Firefox nahoře a vyber: Select All, poté klikni na Empty Selected.
-Když používáš Operu, klikni nahoře na Operu a vyber: Select All, poté klikni na Empty Selected. Poté klikni na Main (hlavní stránku ) a klikni na Empty Selected.
Po vyčištění klikni na Exit k zavření programu.
ATF-Cleaner je jednoduchý nástroj na odstranění historie z webového prohlížeče. Program dokáže odstranit cache, cookies, historii a další stopy po surfování na Internetu. Mezi podporované prohlížeče patří Internet Explorer, Firefox a Opera. Aplikace navíc umí odstranit dočasné soubory Windows, vysypat koš atd.
- Pokud používáš jen Google Chrome , tak ATF nemusíš použít.


Stáhni si TFC
http://www.geekstogo.com/forum/files/fi ... -oldtimer/
Otevři soubor a zavři všechny ostatní okna, Klikni na Start k zahájení procesu. Program by neměl trvat dlouho.
Poté by se měl PC restartovat, pokud ne , proveď sám.

Stáhni AdwCleaner (by Xplode
http://www.bleepingcomputer.com/download/adwcleaner/
http://www.adlice.com/downloadprogress/

Ulož si ho na svojí plochu
Ukonči všechny programy , okna a prohlížeče
Spusť program poklepáním a klikni na „Scan“
Po skenu klikni na „Logfile“ ,objeví se okno „Log Manager“ a pak poklepej na odpovídající log , který se otevře. ( jinak je uložen systémovem disku jako C:\AdwCleaner [C?].txt ), jeho obsah sem celý vlož.

Stáhni si Malwarebytes' Anti-Malware
- Při instalaci odeber zatržítko u „Povolit bezplatnou zkušební verzi Malwarebytes' Anti-Malware Premium“
Nainstaluj a spusť ho
- na konci instalace se ujisti že máš zvoleny/zatrhnuty obě možnosti:
Aktualizace Malwarebytes' Anti-Malware a Spustit aplikaci Malwarebytes' Anti-Malware, pokud jo tak klikni na tlačítko konec
-Pokud není program aktuální , klikni na možnost „Aktualizovat nyní“ či „Opravit nyní“.
- bude nalezena aktualizace a nainstaluje se.
- poté klikni na Skenovat nyní
- po proběhnutí programu se ti objeví hláška vpravo dole, tak klikni na Uložit výsledky a vyber zkopírovat do schránky a vlož sem celý log. Nebo klikni na „Textový soubor ( .txt)“ a log si ulož.
-jinak se log nachází zde: C:\ProgramData\Malwarebytes\Malwarebytes Anti-Malware\Logs

- po té klikni na tlačítko Dokončit, a program zavři křížkem vpravo nahoře.
(zatím nic nemaž!).
Pokud budou problémy , spusť v nouz. režimu.
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra

Tavare
Level 1
Level 1
Příspěvky: 64
Registrován: květen 10
Pohlaví: Muž
Stav:
Offline

Re: Prosim o kontrolu HJT, vysoke zatizeni cpu pri minimalnim poctu bezicich aplikaci. Dekuji

Příspěvekod Tavare » 14 led 2018 23:04

# AdwCleaner 7.0.6.0 - Logfile created on Sun Jan 14 21:53:56 2018
# Updated on 2017/21/12 by Malwarebytes
# Database: 01-11-2018.1
# Running on Windows 10 Home (X64)
# Mode: scan
# Support: https://www.malwarebytes.com/support

***** [ Services ] *****

No malicious services found.

***** [ Folders ] *****

PUP.Optional.Legacy, C:\ProgramData\rvlkl
PUP.Optional.Legacy, C:\ProgramData\Application Data\rvlkl
PUP.Optional.Legacy, C:\Users\All Users\rvlkl
PUP.Optional.Legacy, C:\Program Files (x86)\lavasoft\web companion
PUP.Adware.Heuristic, C:\ProgramData\76cedde5-35c7-0
PUP.Adware.Heuristic, C:\ProgramData\76cedde5-71a1-1


***** [ Files ] *****

PUP.Optional.Legacy, C:\Windows\System32\lavasofttcpservice.dll
PUP.Optional.Legacy, C:\Windows\SysWOW64\lavasofttcpservice.dll
PUP.Optional.Legacy, C:\Windows\System32\LavasoftTcpServiceOff.ini
PUP.Optional.Legacy, C:\Windows\SysNative\LavasoftTcpServiceOff.ini
PUP.Optional.Legacy, C:\Windows\SysWOW64\LavasoftTcpServiceOff.ini
PUP.Optional.Legacy, C:\Windows\SysNative\LavasoftTcpService64.dll


***** [ DLL ] *****

No malicious DLLs found.

***** [ WMI ] *****

No malicious WMI found.

***** [ Shortcuts ] *****

No malicious shortcuts found.

***** [ Tasks ] *****

PUP.Optional.TidyNetwork, TidyNetwork Update


***** [ Registry ] *****

PUP.Optional.Legacy, [Data] - HKCU\Software\Microsoft\Internet Explorer\Main | Default_Page_URL [http:\\services.eshield.com\general\newhometab.php?hometab=home&partner=13769&guid={4A1DD49F-3C01-4172-AA1E-CA6ED7A40DF9}&i=]
PUP.Optional.Legacy, [Data] - HKCU\Software\Microsoft\Internet Explorer\Main | Start Page_TIMESTAMP [橞잜��ǒ:\\services.eshield.com\general\newhometab.php?hometab=home&partner=13769&guid={4A1DD49F-3C01-4172-AA1E-CA6ED7A40DF9}&i=]
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\WebDiscoverBrowser
PUP.Optional.Legacy, [Key] - HKU\.DEFAULT\Software\WebDiscoverBrowser
PUP.Optional.Legacy, [Key] - HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\Software\WebDiscoverBrowser
PUP.Optional.Legacy, [Key] - HKU\S-1-5-18\Software\WebDiscoverBrowser
PUP.Optional.Legacy, [Key] - HKCU\Software\WebDiscoverBrowser
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\SecureWebChannel
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{72A6AB0F-2FA8-4C73-9FCB-1E62A608F001}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{0FEB2313-F89B-4AC6-8153-84025604A06A}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{02F878DF-E2BE-4B85-8CB4-A0D2D4E2ED7F}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{2AF343DD-3102-4F9D-AC95-DCA4C95382C7}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{3137BC14-D8D7-4B67-8FFA-2E0B2E9D541B}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{4CA2AC92-971B-47B1-ACB6-357B552155AC}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{52C5395B-1FCD-47FA-A834-FD830701C2D5}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{5D3DCC39-9233-4330-94E9-DA92BE49CA1A}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{615FACDF-DADB-440D-AC91-8AAB0AE9E3AD}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{762D463B-C45A-456D-A80D-8689C297C91E}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{7A6BE473-7960-44D0-BD54-D23DA76353DF}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{803F550E-BAAE-42BB-8917-64BA0006AB17}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{8D5BC51D-C9D3-43B9-B728-B30677B7C7E8}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{991C9D8D-A789-4DB9-BDFC-5F33398B04BF}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{A5ACC874-D943-483F-A2D1-14598D51F872}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{B0474212-0D9D-4361-90B3-B89D1A44275D}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{BFDE183A-C6FE-41D2-80F9-586C29210AC2}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{D83C83BF-3EDD-4410-ADAB-5295116DD8C7}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{DD260902-9420-4055-A956-9152EB4F3E6A}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{EB1F9F3C-5526-4DAE-BD4B-3EAA7715DA9F}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{F1912128-469A-4138-AA26-9699C15BB13E}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{F68DC16C-9C2B-455B-8853-7E4D34BAA3F4}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{FBA8498F-B3A0-4942-A2BF-E0CB7BC7E000}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\CLSID\{0015CAC9-FC30-4CD0-BFAA-7412CC2C4DD9}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\CLSID\{26C7AFDB-3690-449E-B979-B0AF5CC56DD4}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\CLSID\{3A5A5381-DAAF-4C0D-B032-2C66B3EE4A8D}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\CLSID\{472EF1D2-4AAE-470D-AE85-6AF8177916FD}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\CLSID\{8F010D54-C023-457F-AF03-497EACB6D519}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\CLSID\{9A754403-27B1-4ED7-96D7-588F07888EBF}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\CLSID\{CB31FF8F-BF80-4D2B-ADBE-12C6F5347890}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\CLSID\{FCAA532B-E807-4027-940C-BA16B9D50105}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\TypeLib\{ED62BC6E-64F1-46BE-866F-4C8DC0DF7057}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{655847A1-FA36-46ED-923B-A5CD523696EA}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Classes\Interface\{EBBC143E-44AC-4B9C-BCCE-9A0E42921F2A}
PUP.Optional.Legacy, [Key] - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\webcompanion.com
PUP.Optional.ByteFence, [Key] - HKU\.DEFAULT\Software\ByteFence
PUP.Optional.ByteFence, [Key] - HKU\S-1-5-18\Software\ByteFence
PUP.Optional.TidyNetwork, [Key] - HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\Software\AppDataLow\Software\TidyNetwork
PUP.Optional.TidyNetwork, [Key] - HKCU\Software\AppDataLow\Software\TidyNetwork
Adware.DNSUnlocker, [Key] - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\11598763487076930564
PUP.Optional.InstallCore, [Key] - HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\Software\csastats
PUP.Optional.InstallCore, [Key] - HKCU\Software\csastats
PUP.Optional.ProductSetup.A, [Key] - HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\Software\PRODUCTSETUP
PUP.Optional.ProductSetup.A, [Key] - HKCU\Software\PRODUCTSETUP


***** [ Firefox (and derivatives) ] *****

No malicious Firefox entries.

***** [ Chromium (and derivatives) ] *****

PUP.Optional.MovieSearch, Plugin found: Movie Search -

/!\ Please Reset the Chrome Synchronization before cleaning the Chrome Preferences: https://support.google.com/chrome/answer/3097271


*************************



########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt ##########

Tavare
Level 1
Level 1
Příspěvky: 64
Registrován: květen 10
Pohlaví: Muž
Stav:
Offline

Re: Prosim o kontrolu HJT, vysoke zatizeni cpu pri minimalnim poctu bezicich aplikaci. Dekuji

Příspěvekod Tavare » 14 led 2018 23:05

# AdwCleaner 7.0.6.0 - Logfile created on Sun Jan 14 21:55:44 2018
# Updated on 2017/21/12 by Malwarebytes
# Running on Windows 10 Home (X64)
# Mode: clean
# Support: https://www.malwarebytes.com/support

***** [ Services ] *****

No malicious services deleted.

***** [ Folders ] *****

Deleted: C:\ProgramData\rvlkl
Deleted: C:\ProgramData\Application Data\rvlkl
Deleted: C:\Users\All Users\rvlkl
Deleted: C:\Program Files (x86)\lavasoft\web companion
Deleted: C:\ProgramData\76cedde5-35c7-0
Deleted: C:\ProgramData\76cedde5-71a1-1


***** [ Files ] *****

Deleted: C:\Windows\System32\lavasofttcpservice.dll
Deleted: C:\Windows\SysWOW64\lavasofttcpservice.dll
Deleted: C:\Windows\System32\LavasoftTcpServiceOff.ini
Deleted: C:\Windows\SysNative\LavasoftTcpServiceOff.ini
Deleted: C:\Windows\SysWOW64\LavasoftTcpServiceOff.ini
Deleted: C:\Windows\SysNative\LavasoftTcpService64.dll


***** [ DLL ] *****

No malicious DLLs cleaned.

***** [ WMI ] *****

No malicious WMI cleaned.

***** [ Shortcuts ] *****

No malicious shortcuts cleaned.

***** [ Tasks ] *****

Deleted: TidyNetwork Update


***** [ Registry ] *****

Deleted: [Data] - HKCU\Software\Microsoft\Internet Explorer\Main|Default_Page_URL [http:\\services.eshield.com\general\newhometab.php?hometab=home&partner=13769&guid={4A1DD49F-3C01-4172-AA1E-CA6ED7A40DF9}&i=]
Deleted: [Data] - HKCU\Software\Microsoft\Internet Explorer\Main|Start Page_TIMESTAMP [橞잜��ǒ:\\services.eshield.com\general\newhometab.php?hometab=home&partner=13769&guid={4A1DD49F-3C01-4172-AA1E-CA6ED7A40DF9}&i=]
Deleted: [Key] - HKLM\SOFTWARE\WebDiscoverBrowser
Deleted: [Key] - HKU\.DEFAULT\Software\WebDiscoverBrowser
Deleted: [Key] - HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\Software\WebDiscoverBrowser
Deleted: [Key] - HKU\S-1-5-18\Software\WebDiscoverBrowser
Deleted: [Key] - HKCU\Software\WebDiscoverBrowser
Deleted: [Key] - HKLM\SOFTWARE\SecureWebChannel
Deleted: [Key] - HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{72A6AB0F-2FA8-4C73-9FCB-1E62A608F001}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{0FEB2313-F89B-4AC6-8153-84025604A06A}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{02F878DF-E2BE-4B85-8CB4-A0D2D4E2ED7F}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{2AF343DD-3102-4F9D-AC95-DCA4C95382C7}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{3137BC14-D8D7-4B67-8FFA-2E0B2E9D541B}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{4CA2AC92-971B-47B1-ACB6-357B552155AC}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{52C5395B-1FCD-47FA-A834-FD830701C2D5}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{5D3DCC39-9233-4330-94E9-DA92BE49CA1A}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{615FACDF-DADB-440D-AC91-8AAB0AE9E3AD}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{762D463B-C45A-456D-A80D-8689C297C91E}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{7A6BE473-7960-44D0-BD54-D23DA76353DF}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{803F550E-BAAE-42BB-8917-64BA0006AB17}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{8D5BC51D-C9D3-43B9-B728-B30677B7C7E8}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{991C9D8D-A789-4DB9-BDFC-5F33398B04BF}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{A5ACC874-D943-483F-A2D1-14598D51F872}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{B0474212-0D9D-4361-90B3-B89D1A44275D}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{BFDE183A-C6FE-41D2-80F9-586C29210AC2}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{D83C83BF-3EDD-4410-ADAB-5295116DD8C7}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{DD260902-9420-4055-A956-9152EB4F3E6A}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{EB1F9F3C-5526-4DAE-BD4B-3EAA7715DA9F}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{F1912128-469A-4138-AA26-9699C15BB13E}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{F68DC16C-9C2B-455B-8853-7E4D34BAA3F4}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{FBA8498F-B3A0-4942-A2BF-E0CB7BC7E000}
Deleted: [Key] - HKLM\SOFTWARE\Classes\CLSID\{0015CAC9-FC30-4CD0-BFAA-7412CC2C4DD9}
Deleted: [Key] - HKLM\SOFTWARE\Classes\CLSID\{26C7AFDB-3690-449E-B979-B0AF5CC56DD4}
Deleted: [Key] - HKLM\SOFTWARE\Classes\CLSID\{3A5A5381-DAAF-4C0D-B032-2C66B3EE4A8D}
Deleted: [Key] - HKLM\SOFTWARE\Classes\CLSID\{472EF1D2-4AAE-470D-AE85-6AF8177916FD}
Deleted: [Key] - HKLM\SOFTWARE\Classes\CLSID\{8F010D54-C023-457F-AF03-497EACB6D519}
Deleted: [Key] - HKLM\SOFTWARE\Classes\CLSID\{9A754403-27B1-4ED7-96D7-588F07888EBF}
Deleted: [Key] - HKLM\SOFTWARE\Classes\CLSID\{CB31FF8F-BF80-4D2B-ADBE-12C6F5347890}
Deleted: [Key] - HKLM\SOFTWARE\Classes\CLSID\{FCAA532B-E807-4027-940C-BA16B9D50105}
Deleted: [Key] - HKLM\SOFTWARE\Classes\TypeLib\{ED62BC6E-64F1-46BE-866F-4C8DC0DF7057}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{655847A1-FA36-46ED-923B-A5CD523696EA}
Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{EBBC143E-44AC-4B9C-BCCE-9A0E42921F2A}
Deleted: [Key] - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\webcompanion.com
Deleted: [Key] - HKU\.DEFAULT\Software\ByteFence
Deleted: [Key] - HKU\S-1-5-18\Software\ByteFence
Deleted: [Key] - HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\Software\AppDataLow\Software\TidyNetwork
Deleted: [Key] - HKCU\Software\AppDataLow\Software\TidyNetwork
Deleted: [Key] - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\11598763487076930564
Deleted: [Key] - HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\Software\csastats
Deleted: [Key] - HKCU\Software\csastats
Deleted: [Key] - HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\Software\PRODUCTSETUP
Deleted: [Key] - HKCU\Software\PRODUCTSETUP


***** [ Firefox (and derivatives) ] *****

No malicious Firefox entries deleted.

***** [ Chromium (and derivatives) ] *****

Plugin deleted: Movie Search -


*************************

::Tracing keys deleted
::Winsock settings cleared
::Additional Actions: 0



*************************

C:/AdwCleaner/AdwCleaner[S0].txt - [7016 B] - [2018/1/14 21:53:57]


########## EOF - C:\AdwCleaner\AdwCleaner[C0].txt ##########

Tavare
Level 1
Level 1
Příspěvky: 64
Registrován: květen 10
Pohlaví: Muž
Stav:
Offline

Re: Prosim o kontrolu HJT, vysoke zatizeni cpu pri minimalnim poctu bezicich aplikaci. Dekuji

Příspěvekod Tavare » 14 led 2018 23:22

Malwarebytes
www.malwarebytes.com

-Log Details-
Scan Date: 1/14/18
Scan Time: 10:07 PM
Log File: 5f6757e6-f977-11e7-9ec5-c454443059e7.json
Administrator: Yes

-Software Information-
Version: 3.3.1.2183
Components Version: 1.0.262
Update Package Version: 1.0.3694
License: Trial

-System Information-
OS: Windows 10 (Build 16299.192)
CPU: x64
File System: NTFS
User: ANDYTOM\Tom

-Scan Summary-
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 301356
Threats Detected: 77
Threats Quarantined: 0
(No malicious items detected)
Time Elapsed: 6 min, 42 sec

-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Detect
PUM: Detect

-Scan Details-
Process: 0
(No malicious items detected)

Module: 0
(No malicious items detected)

Registry Key: 9
PUP.Optional.SearchManager.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\BAHKLJHHDECIIAODLKPPOONAPPFNHEOI, No Action By User, [924], [396191],1.0.3694
PUP.Optional.SearchManager.ShrtCln, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\GOOGLE\CHROME\EXTENSIONS\BAHKLJHHDECIIAODLKPPOONAPPFNHEOI, No Action By User, [924], [396191],1.0.3694
PUP.Optional.SearchManager.ShrtCln, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\bahkljhhdeciiaodlkppoonappfnheoi, No Action By User, [924], [396191],1.0.3694
PUP.Optional.TNT, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{585387ED-E199-4FA0-B7BA-D9B6B5FF224E}, No Action By User, [12955], [244085],1.0.3694
PUP.Optional.TNT, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{95B1933E-F050-442C-B716-724BB4DDECFE}, No Action By User, [12955], [244085],1.0.3694
PUP.Optional.WinYahoo, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{3F7614C1-3B8F-403C-9DCF-90A5579AD125}, No Action By User, [56], [182757],1.0.3694
PUP.Optional.WinYahoo, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{3F7614C1-3B8F-403C-9DCF-90A5579AD125}, No Action By User, [56], [182757],1.0.3694
PUP.Optional.WinYahoo, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{3F7614C1-3B8F-403C-9DCF-90A5579AD125}, No Action By User, [56], [182757],1.0.3694
PUP.Optional.SweetIM, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{DEDAF650-12B8-48F5-A843-BBA100716106}, No Action By User, [1091], [168883],1.0.3694

Registry Value: 9
PUP.Optional.TNT, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{585387ED-E199-4FA0-B7BA-D9B6B5FF224E}|OSDFILEURL, No Action By User, [12955], [244085],1.0.3694
PUP.Optional.TNT, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{585387ED-E199-4FA0-B7BA-D9B6B5FF224E}|FAVICONURL, No Action By User, [12955], [244085],1.0.3694
PUP.Optional.TNT, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{95B1933E-F050-442C-B716-724BB4DDECFE}|OSDFILEURL, No Action By User, [12955], [244085],1.0.3694
PUP.Optional.TNT, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{95B1933E-F050-442C-B716-724BB4DDECFE}|FAVICONURL, No Action By User, [12955], [244085],1.0.3694
PUP.Optional.eShield, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{95B1933E-F050-442C-B716-724BB4DDECFE}|URL, No Action By User, [171], [316519],1.0.3694
PUP.Optional.WinYahoo, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{3F7614C1-3B8F-403C-9DCF-90A5579AD125}|URL, No Action By User, [56], [182757],1.0.3694
PUP.Optional.WinYahoo, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{3F7614C1-3B8F-403C-9DCF-90A5579AD125}|TOPRESULTURLFALLBACK, No Action By User, [56], [182757],1.0.3694
PUP.Optional.WinYahoo, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{3F7614C1-3B8F-403C-9DCF-90A5579AD125}|URL, No Action By User, [56], [182758],1.0.3694
PUP.Optional.WinYahoo, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{3F7614C1-3B8F-403C-9DCF-90A5579AD125}|TOPRESULTURLFALLBACK, No Action By User, [56], [182758],1.0.3694

Registry Data: 0
(No malicious items detected)

Data Stream: 0
(No malicious items detected)

Folder: 9
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs\offers, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\_metadata, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\js, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\EXTENSIONS\EDLNOJCCLFHFNJEGBDKCDIGJNLMJKFNN, No Action By User, [11169], [180746],1.0.3694
Trojan.PasswordStealer, C:\directory\CyberGate\install, No Action By User, [46], [181405],1.0.3694
Trojan.PasswordStealer, C:\DIRECTORY\CYBERGATE, No Action By User, [46], [181405],1.0.3694

File: 50
PUP.Optional.MovieSearch, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\LOCAL STORAGE\chrome-extension_jmfdniemoeflbhlmcnammemhdahpcjni_0.localstorage, No Action By User, [2447], [185702],1.0.3694
PUP.Optional.GoaMuze, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\LOCAL STORAGE\chrome-extension_edlnojcclfhfnjegbdkcdigjnlmjkfnn_0.localstorage, No Action By User, [11169], [186618],1.0.3694
PUP.Optional.MindSpark.Generic, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\LOCAL STORAGE\http_flightsearchapp.dl.tb.ask.com_0.localstorage, No Action By User, [1363], [443123],1.0.3694
PUP.Optional.MindSpark.Generic, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\LOCAL STORAGE\http_flightsearchapp.dl.tb.ask.com_0.localstorage-journal, No Action By User, [1363], [443123],1.0.3694
PUP.Optional.MindSpark.Generic, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\LOCAL STORAGE\http_fromdoctopdf.dl.tb.ask.com_0.localstorage, No Action By User, [1363], [443123],1.0.3694
PUP.Optional.MindSpark.Generic, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\LOCAL STORAGE\http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal, No Action By User, [1363], [443123],1.0.3694
PUP.Optional.MindSpark.Generic, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\LOCAL STORAGE\http_flightsearchapp.dl.myway.com_0.localstorage, No Action By User, [1363], [443124],1.0.3694
PUP.Optional.MindSpark.Generic, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\LOCAL STORAGE\http_flightsearchapp.dl.myway.com_0.localstorage-journal, No Action By User, [1363], [443124],1.0.3694
PUP.Optional.MindSpark.Generic, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\LOCAL STORAGE\http_fromdoctopdf.dl.myway.com_0.localstorage, No Action By User, [1363], [443124],1.0.3694
PUP.Optional.MindSpark.Generic, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\LOCAL STORAGE\http_fromdoctopdf.dl.myway.com_0.localstorage-journal, No Action By User, [1363], [443124],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_fb.png, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_gmail.png, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_googleplus.png, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_inst.png, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_linked.png, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_movixHub.png, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_pin.png, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_twi.png, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_wiki.png, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_yah.png, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_yt.png, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs\offers\action.png, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs\offers\adventure.png, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs\offers\animation.png, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs\offers\comedy.png, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs\offers\drama.png, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs\offers\kids.png, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs\offers\romance.png, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs\icon_logo.png, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs\logo.png, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\js\auto_complete.js, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\js\background.js, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\js\bootstrap.min.js, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\js\content.js, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\js\jquery-1.9.1.js, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\js\jquery.min.js, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\js\jqueryui.min.js, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\_metadata\computed_hashes.json, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\_metadata\verified_contents.json, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\index.html, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\manifest.json, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Preferences, No Action By User, [11169], [180746],1.0.3694
PUP.Optional.SearchManager.ShrtCln, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, No Action By User, [924], [396191],1.0.3694
PUP.Optional.DownloadAssistant, C:\USERS\TOM\APPDATA\ROAMING\ADOBE_FLASH_PLAYER-40703855.EXE, No Action By User, [633], [122132],1.0.3694
PUP.Optional.DownloadHelper, C:\USERS\TOM\DOWNLOADS\ADOBE_FLASH_PLAYER (2).EXE, No Action By User, [1374], [117912],1.0.3694
Spyware.KeyLogger, C:\WINDOWS\SYSWOW64\MSDUNMERN.DLL.14116.GZQUAR, No Action By User, [283], [112189],1.0.3694
Trojan.LogixoftKeyLogger, C:\WINDOWS\SYSTEM32\RVLKL.EXE, No Action By User, [13271], [299332],1.0.3694
Adware.InstallMonster, C:\USERS\TOM\DOWNLOADS\ROSETTA.COURSE.V.2.2.2_MOD.RAR, No Action By User, [379], [384360],1.0.3694
PUP.Optional.DownloadHelper, C:\USERS\TOM\DOWNLOADS\ADOBE_FLASH_PLAYER.EXE, No Action By User, [1374], [117912],1.0.3694

Physical Sector: 0
(No malicious items detected)


(end)

Tavare
Level 1
Level 1
Příspěvky: 64
Registrován: květen 10
Pohlaví: Muž
Stav:
Offline

Re: Prosim o kontrolu HJT, vysoke zatizeni cpu pri minimalnim poctu bezicich aplikaci. Dekuji

Příspěvekod Tavare » 14 led 2018 23:23

Malwarebytes
www.malwarebytes.com

-Log Details-
Scan Date: 1/14/18
Scan Time: 10:07 PM
Log File: 5f6757e6-f977-11e7-9ec5-c454443059e7.json
Administrator: Yes

-Software Information-
Version: 3.3.1.2183
Components Version: 1.0.262
Update Package Version: 1.0.3694
License: Trial

-System Information-
OS: Windows 10 (Build 16299.192)
CPU: x64
File System: NTFS
User: ANDYTOM\Tom

-Scan Summary-
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 301356
Threats Detected: 77
Threats Quarantined: 77
Time Elapsed: 6 min, 42 sec

-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Detect
PUM: Detect

-Scan Details-
Process: 0
(No malicious items detected)

Module: 0
(No malicious items detected)

Registry Key: 9
PUP.Optional.SearchManager.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\BAHKLJHHDECIIAODLKPPOONAPPFNHEOI, Quarantined, [924], [396191],1.0.3694
PUP.Optional.SearchManager.ShrtCln, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\GOOGLE\CHROME\EXTENSIONS\BAHKLJHHDECIIAODLKPPOONAPPFNHEOI, Quarantined, [924], [396191],1.0.3694
PUP.Optional.SearchManager.ShrtCln, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\bahkljhhdeciiaodlkppoonappfnheoi, Quarantined, [924], [396191],1.0.3694
PUP.Optional.TNT, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{585387ED-E199-4FA0-B7BA-D9B6B5FF224E}, Quarantined, [12955], [244085],1.0.3694
PUP.Optional.TNT, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{95B1933E-F050-442C-B716-724BB4DDECFE}, Quarantined, [12955], [244085],1.0.3694
PUP.Optional.WinYahoo, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{3F7614C1-3B8F-403C-9DCF-90A5579AD125}, Quarantined, [56], [182757],1.0.3694
PUP.Optional.WinYahoo, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{3F7614C1-3B8F-403C-9DCF-90A5579AD125}, Quarantined, [56], [182757],1.0.3694
PUP.Optional.WinYahoo, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{3F7614C1-3B8F-403C-9DCF-90A5579AD125}, Quarantined, [56], [182757],1.0.3694
PUP.Optional.SweetIM, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{DEDAF650-12B8-48F5-A843-BBA100716106}, Quarantined, [1091], [168883],1.0.3694

Registry Value: 9
PUP.Optional.TNT, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{585387ED-E199-4FA0-B7BA-D9B6B5FF224E}|OSDFILEURL, Quarantined, [12955], [244085],1.0.3694
PUP.Optional.TNT, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{585387ED-E199-4FA0-B7BA-D9B6B5FF224E}|FAVICONURL, Quarantined, [12955], [244085],1.0.3694
PUP.Optional.TNT, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{95B1933E-F050-442C-B716-724BB4DDECFE}|OSDFILEURL, Quarantined, [12955], [244085],1.0.3694
PUP.Optional.TNT, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{95B1933E-F050-442C-B716-724BB4DDECFE}|FAVICONURL, Quarantined, [12955], [244085],1.0.3694
PUP.Optional.eShield, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{95B1933E-F050-442C-B716-724BB4DDECFE}|URL, Quarantined, [171], [316519],1.0.3694
PUP.Optional.WinYahoo, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{3F7614C1-3B8F-403C-9DCF-90A5579AD125}|URL, Quarantined, [56], [182757],1.0.3694
PUP.Optional.WinYahoo, HKU\S-1-5-21-1222831513-2614252986-3622727355-1002\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{3F7614C1-3B8F-403C-9DCF-90A5579AD125}|TOPRESULTURLFALLBACK, Quarantined, [56], [182757],1.0.3694
PUP.Optional.WinYahoo, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{3F7614C1-3B8F-403C-9DCF-90A5579AD125}|URL, Quarantined, [56], [182758],1.0.3694
PUP.Optional.WinYahoo, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{3F7614C1-3B8F-403C-9DCF-90A5579AD125}|TOPRESULTURLFALLBACK, Quarantined, [56], [182758],1.0.3694

Registry Data: 0
(No malicious items detected)

Data Stream: 0
(No malicious items detected)

Folder: 9
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs\offers, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\_metadata, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\js, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\EXTENSIONS\EDLNOJCCLFHFNJEGBDKCDIGJNLMJKFNN, Quarantined, [11169], [180746],1.0.3694
Trojan.PasswordStealer, C:\directory\CyberGate\install, Quarantined, [46], [181405],1.0.3694
Trojan.PasswordStealer, C:\DIRECTORY\CYBERGATE, Quarantined, [46], [181405],1.0.3694

File: 50
PUP.Optional.MovieSearch, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\LOCAL STORAGE\chrome-extension_jmfdniemoeflbhlmcnammemhdahpcjni_0.localstorage, Quarantined, [2447], [185702],1.0.3694
PUP.Optional.GoaMuze, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\LOCAL STORAGE\chrome-extension_edlnojcclfhfnjegbdkcdigjnlmjkfnn_0.localstorage, Quarantined, [11169], [186618],1.0.3694
PUP.Optional.MindSpark.Generic, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\LOCAL STORAGE\http_flightsearchapp.dl.tb.ask.com_0.localstorage, Quarantined, [1363], [443123],1.0.3694
PUP.Optional.MindSpark.Generic, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\LOCAL STORAGE\http_flightsearchapp.dl.tb.ask.com_0.localstorage-journal, Quarantined, [1363], [443123],1.0.3694
PUP.Optional.MindSpark.Generic, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\LOCAL STORAGE\http_fromdoctopdf.dl.tb.ask.com_0.localstorage, Quarantined, [1363], [443123],1.0.3694
PUP.Optional.MindSpark.Generic, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\LOCAL STORAGE\http_fromdoctopdf.dl.tb.ask.com_0.localstorage-journal, Quarantined, [1363], [443123],1.0.3694
PUP.Optional.MindSpark.Generic, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\LOCAL STORAGE\http_flightsearchapp.dl.myway.com_0.localstorage, Quarantined, [1363], [443124],1.0.3694
PUP.Optional.MindSpark.Generic, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\LOCAL STORAGE\http_flightsearchapp.dl.myway.com_0.localstorage-journal, Quarantined, [1363], [443124],1.0.3694
PUP.Optional.MindSpark.Generic, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\LOCAL STORAGE\http_fromdoctopdf.dl.myway.com_0.localstorage, Quarantined, [1363], [443124],1.0.3694
PUP.Optional.MindSpark.Generic, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\LOCAL STORAGE\http_fromdoctopdf.dl.myway.com_0.localstorage-journal, Quarantined, [1363], [443124],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_fb.png, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_gmail.png, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_googleplus.png, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_inst.png, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_linked.png, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_movixHub.png, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_pin.png, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_twi.png, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_wiki.png, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_yah.png, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\icons\icons_yt.png, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs\offers\action.png, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs\offers\adventure.png, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs\offers\animation.png, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs\offers\comedy.png, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs\offers\drama.png, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs\offers\kids.png, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs\offers\romance.png, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs\icon_logo.png, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\imgs\logo.png, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\js\auto_complete.js, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\js\background.js, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\js\bootstrap.min.js, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\js\content.js, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\js\jquery-1.9.1.js, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\js\jquery.min.js, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\js\jqueryui.min.js, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\_metadata\computed_hashes.json, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\_metadata\verified_contents.json, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\index.html, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\edlnojcclfhfnjegbdkcdigjnlmjkfnn\1.0.1_0\manifest.json, Quarantined, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Replaced, [11169], [180746],1.0.3694
PUP.Optional.GoaMuze, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Preferences, Replaced, [11169], [180746],1.0.3694
PUP.Optional.SearchManager.ShrtCln, C:\USERS\TOM\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Replaced, [924], [396191],1.0.3694
PUP.Optional.DownloadAssistant, C:\USERS\TOM\APPDATA\ROAMING\ADOBE_FLASH_PLAYER-40703855.EXE, Quarantined, [633], [122132],1.0.3694
PUP.Optional.DownloadHelper, C:\USERS\TOM\DOWNLOADS\ADOBE_FLASH_PLAYER (2).EXE, Quarantined, [1374], [117912],1.0.3694
Spyware.KeyLogger, C:\WINDOWS\SYSWOW64\MSDUNMERN.DLL.14116.GZQUAR, Quarantined, [283], [112189],1.0.3694
Trojan.LogixoftKeyLogger, C:\WINDOWS\SYSTEM32\RVLKL.EXE, Quarantined, [13271], [299332],1.0.3694
Adware.InstallMonster, C:\USERS\TOM\DOWNLOADS\ROSETTA.COURSE.V.2.2.2_MOD.RAR, Quarantined, [379], [384360],1.0.3694
PUP.Optional.DownloadHelper, C:\USERS\TOM\DOWNLOADS\ADOBE_FLASH_PLAYER.EXE, Quarantined, [1374], [117912],1.0.3694

Physical Sector: 0
(No malicious items detected)


(end)

Uživatelský avatar
Orcus
člen Security týmu
Elite Level 10.5
Elite Level 10.5
Příspěvky: 10645
Registrován: duben 10
Bydliště: Okolo rostou 3 růže =o)
Pohlaví: Muž
Stav:
Offline

Re: Prosim o kontrolu HJT, vysoke zatizeni cpu pri minimalnim poctu bezicich aplikaci. Dekuji

Příspěvekod Orcus » 15 led 2018 07:43

Stáhni si Junkware Removal Tool by Thisisu
http://www.bleepingcomputer.com/downloa ... oval-tool/
na svojí plochu.

Deaktivuj si svůj antivirový program. Pravým tl. myši klikni na JRT.exe a vyber „spustit jako správce“. Pro pokračování budeš vyzván ke stisknutí jakékoliv klávesy. Na nějakou klikni.
Začne skenování programu. Skenování může trvat dloho , podle množství nákaz. Po ukončení skenu se objeví log (JRT.txt) , který se uloží na ploše.
Zkopíruj sem prosím celý jeho obsah.

====================================================

Sophos Virus Removal Tool je praktický softwarový nástroj, který by mohl odstranit infekce, které antivirový program nedetekuje .
Stáhněte si ho zde z některého odkazu:
http://www.majorgeeks.com/mg/get/sophos ... ool,1.html
http://www.majorgeeks.com/mg/getmirror/ ... ool,1.html
http://www.majorgeeks.com/mg/getmirror/ ... ool,2.html

Viry mohou zpomalit počítač, nebo se snaží ukrást vaše data, a ani nevíte , že je máte. Co potřebujete, je rychlý a snadný způsob, jak je najít a zbavit se jich, pokud již máte antivirový program v počítači nainstalován , můžete nainstalovat i nástroj Sophos Virus Removal , který identifikuje a vyčistí zbylé infekce, které mohl Váš antivirový program přehlédnout.
K použití Sophos Virus Removal Tool na něj poklepejte a stiskněte tlačítko „Start scanning“ . Pak bude Sophos Virus Removal Tool vyhledávat a odstraňovat viry, které najde. Může být vyžadován restart.

====================================================

Stáhni si RogueKiller by Adlice Software
32bit.:
http://www.sur-la-toile.com/RogueKiller/RogueKiller.exe
nebo:
http://www.adlice.com/download/roguekil ... HlwZT14ODY

64bit.:
http://www.sur-la-toile.com/RogueKiller ... lerX64.exe
nebo:
http://www.adlice.com/download/roguekil ... HlwZT14NjQ
na svojí plochu.
- Zavři všechny ostatní programy a prohlížeče.
- Pro OS Vista a win7,8,10 spusť program RogueKiller.exe jako správce , u XP poklepáním.
- klikni na „Start Scan“. V novém okně nic neměň a klikni dole na „Start Scan“
- Program skenuje procesy PC. Po proskenování klikni na „Open Report “ , v okně pak na „Open TXT“ a celý obsah logu sem zkopíruj.
Pokud je program blokován , zkus ho spustit několikrát. Pokud dále program nepůjde spustit a pracovat, přejmenuj ho na winlogon.exe.
-pokud bude mít log více než 60.000 znaků , rozděl ho a vlož do více příspěvků.
Láska hřeje, ale uhlí je uhlí. :fire:



Log z HJT vkládejte do HJT sekce. Je-li moc dlouhý, rozděl jej do více zpráv.

Pár rad k bezpečnosti PC.

Po dobu mé nepřítomnosti mě zastupuje memphisto, jaro3 a Diallix

Pokud budete spokojeni , můžete podpořit naše fórum.

Tavare
Level 1
Level 1
Příspěvky: 64
Registrován: květen 10
Pohlaví: Muž
Stav:
Offline

Re: Prosim o kontrolu HJT, vysoke zatizeni cpu pri minimalnim poctu bezicich aplikaci. Dekuji

Příspěvekod Tavare » 16 led 2018 13:34

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 8.1.4 (07.09.2017)
Operating System: Windows 10 Home x64
Ran by Tom (Administrator) on 16.01.2018 at 12:26:07,94
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




File System: 9

Successfully deleted: C:\ProgramData\1454817677.bdinstall.bin (File)
Successfully deleted: C:\ProgramData\1461176009.bdinstall.bin (File)
Successfully deleted: C:\ProgramData\1461176014.bdinstall.bin (File)
Successfully deleted: C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\bgjpfhpjcgdppjbgnpnjllokbmcdllig (Folder)
Successfully deleted: C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\blmojkbhnkkphngknkmgccmlenfaelkd (Folder)
Successfully deleted: C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Extensions\olfeabkoenfaoljndfecamgilllcpiak (Folder)
Successfully deleted: C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_bgjpfhpjcgdppjbgnpnjllokbmcdllig_0.localstorage (File)
Successfully deleted: C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_blmojkbhnkkphngknkmgccmlenfaelkd_0.localstorage (File)
Successfully deleted: C:\Users\Tom\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_olfeabkoenfaoljndfecamgilllcpiak_0.localstorage (File)



Registry: 0





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 16.01.2018 at 12:31:30,99
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Tavare
Level 1
Level 1
Příspěvky: 64
Registrován: květen 10
Pohlaví: Muž
Stav:
Offline

Re: Prosim o kontrolu HJT, vysoke zatizeni cpu pri minimalnim poctu bezicich aplikaci. Dekuji

Příspěvekod Tavare » 16 led 2018 21:09

RogueKiller V12.12.0.0 (x64) [Jan 15 2018] (Free) by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : https://forum.adlice.com
Webová stránka : http://www.adlice.com/download/roguekiller/
Blog : http://www.adlice.com

Operační systém : Windows 10 (10.0.16299) 64 bits version
Spuštěno : Normální režim
Uživatel : Tom [Práva správce]
Started from : C:\Users\Tom\Desktop\RogueKiller_portable64.exe
Mód : Prohledat -- Datum : 01/16/2018 17:08:22 (Duration : 01:54:08)

¤¤¤ Procesy : 0 ¤¤¤

¤¤¤ Registry : 1 ¤¤¤
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{de5ca56f-53d5-4ffe-9c9a-ae2f3c862846} | DhcpNameServer : 61.15.0.66 ([Hong Kong]) -> Nalezeno

¤¤¤ Úlohy : 1 ¤¤¤
[Suspicious.Path] \Better Checker -- C:\Users\Tom\AppData\Roaming\Better Checker\Better Checker.exe -> Nalezeno

¤¤¤ Soubory : 6 ¤¤¤
[Keylog.Gen0][Soubor] C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\rvlkl.lnk [LNK@] C:\Windows\System32\rvlkl.exe /b -> Nalezeno
[Keylog.Gen0][Složka] C:\ProgramData\rvlkl -> Nalezeno
[PUP.Gen0][Soubor] C:\Windows\SECOH-QAD.exe -> Nalezeno
[Keylog.Gen0][Soubor] C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\rvlkl.lnk [LNK@] C:\Windows\System32\rvlkl.exe /b -> Nalezeno
[Keylog.Gen0][Složka] C:\ProgramData\rvlkl -> Nalezeno
[PUP.HackTool][Složka] C:\Program Files\KMSpico -> Nalezeno

¤¤¤ WMI : 0 ¤¤¤

¤¤¤ Soubor HOSTS : 0 ¤¤¤

¤¤¤ Antirootkit : 0 (Driver: Nahrán) ¤¤¤

¤¤¤ Webové prohlížeče : 0 ¤¤¤

¤¤¤ Kontrola MBR : ¤¤¤
+++++ PhysicalDrive0: ST500LM000-SSHD-8GB +++++
--- User ---
[MBR] e0281dac31f34ffe0bef7417417cf381
[BSP] e0ab7ceb892fb350f7d86b54e002d44e : Empty|VT.Unknown MBR Code
Partition table:
0 - [SYSTEM][MAN-MOUNT] Basic data partition | Offset (sectors): 2048 | Size: 1000 MB
1 - [SYSTEM][MAN-MOUNT] EFI system partition | Offset (sectors): 2050048 | Size: 260 MB
2 - [SYSTEM][MAN-MOUNT] Basic data partition | Offset (sectors): 2582528 | Size: 1000 MB
3 - [MAN-MOUNT] Microsoft reserved partition | Offset (sectors): 4630528 | Size: 128 MB
4 - Basic data partition | Offset (sectors): 4892672 | Size: 437180 MB
5 - [SYSTEM][MAN-MOUNT] | Offset (sectors): 900237312 | Size: 450 MB
6 - Basic data partition | Offset (sectors): 901158912 | Size: 25600 MB
7 - [SYSTEM][MAN-MOUNT] Basic data partition | Offset (sectors): 953587712 | Size: 11321 MB
User = LL1 ... OK
User = LL2 ... OK

Uživatelský avatar
Orcus
člen Security týmu
Elite Level 10.5
Elite Level 10.5
Příspěvky: 10645
Registrován: duben 10
Bydliště: Okolo rostou 3 růže =o)
Pohlaví: Muž
Stav:
Offline

Re: Prosim o kontrolu HJT, vysoke zatizeni cpu pri minimalnim poctu bezicich aplikaci. Dekuji

Příspěvekod Orcus » 17 led 2018 08:31

Zavři všechny programy a prohlížeče. Deaktivuj antivir a firewall.
Prosím, odpoj všechny USB nebo externí disky z počítače před spuštěním tohoto programu.
Spusť RogueKiller ( Pro Windows Vista nebo Windows 7, klepni pravým a vyber "Spustit jako správce", ve Windows XP poklepej ke spuštění).
- Počkej, až Prescan dokončí práci...
- Počkej, dokud status okno zobrazuje "Prohledat "
- V záložkách (Registry , Tasks , Web Browser apod.) vše zatrhni (dej zatržítka).
- Klikni na "Smazat"
- Počkej, dokud Status box zobrazuje " Mazání dokončeno "
- Klikni na "Zpráva" a zkopíruj a vlož obsah té zprávy prosím sem. Log je možno nalézt v RKreport [číslo]. txt na ploše.
- Zavři RogueKiller

====================================================

Stáhni
Zoek.exe

a ulož si ho na plochu.
Zavři všechny ostatní programy, okna i prohlížeče.
Spusť Zoek.exe ( u win vista , win7, 8 klikni na něj pravým a vyber : „Spustit jako správce“
- pozor, náběh programu může trvat déle.

Do okna programu vlož skript níže:

Kód: Vybrat vše

autoclean;
emptyclsid;
iedefaults;
FFdefaults;
CHRdefaults;
emptyalltemp;
resethosts;


Klikni na Run Script
Program provede sken, opravu, sken i oprava může trvat i více minut, je třeba posečkat do konce. Do okna neklikej!
Program nabídne restart , potvrď .

Po restartu se může nějaký čas ukázat pouze černá plocha , to je normální. Je třeba počkat až se vytvoří log. Ten si můžeš uložit třeba do dokumentů, jinak se sám ukládá do:
C:\zoek-results.log
Zkopíruj sem celý obsah toho logu.

====================================================

Stáhni si Zemana AntiMalware Free z tohoto odkazu:
https://www.zemana.com/Download/AntiMal ... .Setup.exe
a ulož si ho na plochu.
Poklepej na tento soubor na ploše a postupuj podle pokynů k instalaci programu.
Přijmi licenci k používání programu EULA , pokud se nabídne.
Pokud je k dispozici aktualizace programu , klepni na tlačítko „Update now“ ( aktualizovat nyní).
Na konci klepni na tlačítko Nastavení (ozubené kolo v rohu)> Advanced> ""
- "Přečetl jsem si upozornění a chci pokračovat stejně .....
Zaškrtnutí Auto Launch
Nezaškrtnutí Auto upload
Zaškrtnutí All Browser Extensions (Všechna rozšíření prohlížeče)
Inteligentní nastavení skenování jako náhrada za hloubkové prověření
Zavři všechny otevřené soubory, složky a prohlížeče
Klepni na tlačítko Scan now (Skenovat) a začne sken hrozeb.
Když je skenování dokončeno, objeví se tisková zpráva , zkopíruj sem celý obsah té zprávy.
Láska hřeje, ale uhlí je uhlí. :fire:



Log z HJT vkládejte do HJT sekce. Je-li moc dlouhý, rozděl jej do více zpráv.

Pár rad k bezpečnosti PC.

Po dobu mé nepřítomnosti mě zastupuje memphisto, jaro3 a Diallix

Pokud budete spokojeni , můžete podpořit naše fórum.


Zpět na “HiJackThis”

Kdo je online

Uživatelé prohlížející si toto fórum: Žádní registrovaní uživatelé a 15 hostů