Pomalý notebook + zatrhávání systému/HJT Vyřešeno

Místo pro vaše HiJackThis logy a logy z dalších programů…

Moderátoři: Mods_senior, Security team

Uživatelský avatar
lukasgereg
Level 2
Level 2
Příspěvky: 184
Registrován: říjen 11
Bydliště: Brno
Pohlaví: Muž
Stav:
Offline
Kontakt:

Pomalý notebook + zatrhávání systému/HJT  Vyřešeno

Příspěvekod lukasgereg » 30 dub 2014 12:31

Zdravím,

chtěl poprosit o kontrolu. Notebook se zatrhává po chvilkách a je pomalý.

NTB:

SONY VAIO
Intel Core i3
Windows 7

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 12:00:57, on 30.4.2014
Platform: Windows 7 SP1 (WinNT 6.00.3505)
MSIE: Internet Explorer v11.0 (11.00.9600.17041)
Boot mode: Normal

Running processes:
C:\Program Files (x86)\IObit\Advanced SystemCare 7\Monitor.exe
C:\Program Files (x86)\IObit\Advanced SystemCare 7\ASCTray.exe
C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe
C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe
C:\Program Files (x86)\Sony\ISB Utility\ISBMgr.exe
C:\Windows\SysWOW64\DllHost.exe
C:\Program Files\Sony\VAIO Care\listener.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
C:\Users\Terezka\Downloads\hijackthis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.seznam.cz/?clid=16194
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
R3 - URLSearchHook: (no name) - {D8278076-BC68-4484-9233-6E7F1628B56C} - (no file)
R3 - URLSearchHook: (no name) - {687578b9-7132-4a7a-80e4-30ee31099e03} - (no file)
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Java\jre7\bin\ssv.dll
O2 - BHO: (no name) - {9030D464-4C02-4ABF-8ECC-5164760863C6} - (no file)
O2 - BHO: Logitech SetPoint - {AF949550-9094-4807-95EC-D1C317803333} - C:\Program Files\Logitech\SetPointP\32-bit\SetPointSmooth.dll
O2 - BHO: Advanced SystemCare Browser Protection - {BA0C978D-D909-49B6-AFE2-8BDE245DC7E6} - C:\PROGRA~2\IObit\SURFIN~1\BROWER~1\ASCPLU~1.DLL
O2 - BHO: Bing Bar Helper - {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - "C:\Program Files (x86)\Microsoft\BingBar\BingExt.dll" (file missing)
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre7\bin\jp2ssv.dll
O3 - Toolbar: Bing Bar - {8dcb7100-df86-4384-8842-8fa844297b3f} - "C:\Program Files (x86)\Microsoft\BingBar\BingExt.dll" (file missing)
O4 - HKLM\..\Run: [IAStorIcon] C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe
O4 - HKLM\..\Run: [USB3MON] "C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe"
O4 - HKLM\..\Run: [StartCCC] "c:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
O4 - HKLM\..\Run: [ISBMgr.exe] "C:\Program Files (x86)\Sony\ISB Utility\ISBMgr.exe"
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Windows\system32\NeroCheck.exe
O4 - HKLM\..\Run: [seznam-listicka-distribuce] "C:\Program Files (x86)\Seznam.cz\distribution\szninstall.exe" -s -d listicka 1 szn-software-listicka cz.seznam.software.autoupdate
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKCU\..\Run: [EPSON Stylus DX4400 Series] C:\Windows\system32\spool\DRIVERS\x64\3\E_IATICAE.EXE /FU "C:\Users\Terezka\AppData\Local\Temp\E_S27AB.tmp" /EF "HKCU"
O4 - HKCU\..\Run: [DAEMON Tools Lite] "C:\Program Files (x86)\DAEMON Tools Lite\DTLite.exe" -autorun
O4 - HKCU\..\Run: [Advanced SystemCare 7] "C:\Program Files (x86)\IObit\Advanced SystemCare 7\ASCTray.exe" /Auto
O4 - Global Startup: Aggiorna ESET license.lnk = C:\Program Files (x86)\ESET\MiNODLogin\launcher.exe
O8 - Extra context menu item: Add to Evernote 4.0 - res://C:\Program Files (x86)\Evernote\Evernote\EvernoteIE.dll/204
O8 - Extra context menu item: E&xportovat do aplikace Microsoft Excel - res://C:\PROGRA~2\MICROS~2\Office12\EXCEL.EXE/3000
O10 - Unknown file in Winsock LSP: c:\program files (x86)\common files\microsoft shared\windows live\wlidnsp.dll
O10 - Unknown file in Winsock LSP: c:\program files (x86)\common files\microsoft shared\windows live\wlidnsp.dll
O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics
O18 - Protocol: wlpg - (no CLSID) - (no file)
O23 - Service: ArcSoft Connect Daemon (ACDaemon) - ArcSoft Inc. - C:\Program Files (x86)\Common Files\ArcSoft\Connection Service\Bin\ACService.exe
O23 - Service: Adobe Active File Monitor V10 (AdobeActiveFileMonitor10.0) - Adobe Systems Incorporated - c:\Program Files (x86)\Adobe\Elements 10 Organizer\PhotoshopElementsFileAgent.exe
O23 - Service: Adobe Acrobat Update Service (AdobeARMservice) - Adobe Systems Incorporated - C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
O23 - Service: Adobe Flash Player Update Service (AdobeFlashPlayerUpdateSvc) - Adobe Systems Incorporated - C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe
O23 - Service: Advanced SystemCare Service 7 (AdvancedSystemCareService7) - IObit - C:\Program Files (x86)\IObit\Advanced SystemCare 7\ASCService.exe
O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\Windows\System32\alg.exe (file missing)
O23 - Service: Intel® Centrino® Wireless Bluetooth® + High Speed Service (AMPPALR3) - Intel Corporation - C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe
O23 - Service: Alcohol Virtual Drive Auto-mount Service (AxAutoMntSrv) - Alcohol Soft Development Team - C:\Program Files (x86)\Alcohol Soft\Alcohol 52\AxAutoMntSrv.exe
O23 - Service: Bluetooth Device Monitor - Intel Corporation - C:\Program Files (x86)\Intel\Bluetooth\devmonsrv.exe
O23 - Service: Bluetooth Media Service - Intel Corporation - C:\Program Files (x86)\Intel\Bluetooth\mediasrv.exe
O23 - Service: Bluetooth OBEX Service - Intel Corporation - C:\Program Files (x86)\Intel\Bluetooth\obexsrv.exe
O23 - Service: Intel(R) Centrino(R) Wireless Bluetooth(R) + High Speed Security Service (BTHSSecurityMgr) - Intel(R) Corporation - C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe
O23 - Service: Intel(R) Content Protection HECI Service (cphs) - Intel Corporation - C:\Windows\SysWow64\IntelCpHeciSvc.exe
O23 - Service: @%SystemRoot%\system32\efssvc.dll,-100 (EFS) - Unknown owner - C:\Windows\System32\lsass.exe (file missing)
O23 - Service: ESET Service (ekrn) - ESET - C:\Program Files\ESET\ESET NOD32 Antivirus\x86\ekrn.exe
O23 - Service: EPSON V3 Service4(01) (EPSON_PM_RPCV4_01) - SEIKO EPSON CORPORATION - C:\ProgramData\EPSON\EPW!3 SSRP\E_S40RPB.EXE
O23 - Service: @%systemroot%\system32\fxsresm.dll,-118 (Fax) - Unknown owner - C:\Windows\system32\fxssvc.exe (file missing)
O23 - Service: Služba Google Update (gupdate) (gupdate) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Služba Google Update (gupdatem) (gupdatem) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Intel(R) Rapid Storage Technology (IAStorDataMgrSvc) - Intel Corporation - C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe
O23 - Service: Intel(R) Integrated Clock Controller Service - Intel(R) ICCS (ICCS) - Intel Corporation - C:\Program Files (x86)\Intel\Intel(R) Integrated Clock Controller Service\ICCProxy.exe
O23 - Service: @%SystemRoot%\system32\ieetwcollectorres.dll,-1000 (IEEtwCollectorService) - Unknown owner - C:\Windows\system32\IEEtwCollector.exe (file missing)
O23 - Service: Intel(R) Capability Licensing Service Interface - Intel(R) Corporation - C:\Program Files\Intel\iCLS Client\HeciServer.exe
O23 - Service: Intel(R) ME Service - Unknown owner - C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\FWService\IntelMeFWService.exe
O23 - Service: Intel(R) Dynamic Application Loader Host Interface Service (jhi_service) - Intel Corporation - C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe
O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: Logitech Bluetooth Service (LBTServ) - Logitech, Inc. - C:\Program Files\Common Files\LogiShrd\Bluetooth\lbtserv.exe
O23 - Service: Intel(R) Management and Security Application Local Management Service (LMS) - Intel Corporation - C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe
O23 - Service: Mozilla Maintenance Service (MozillaMaintenance) - Mozilla Foundation - C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\Windows\System32\msdtc.exe (file missing)
O23 - Service: Wireless PAN DHCP Server (MyWiFiDHCPDNS) - Unknown owner - C:\Program Files\Intel\WiFi\bin\PanDhcpDns.exe
O23 - Service: PMBDeviceInfoProvider - Sony Corporation - c:\Program Files (x86)\Sony\PlayMemories Home\PMBDeviceInfoProvider.exe
O23 - Service: @%systemroot%\system32\psbase.dll,-300 (ProtectedStorage) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\Windows\system32\locator.exe (file missing)
O23 - Service: VAIO Care Performance Service (SampleCollector) - Sony Corporation - C:\Program Files\Sony\VAIO Care\VCPerfService.exe
O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\Windows\System32\spoolsv.exe (file missing)
O23 - Service: @%SystemRoot%\system32\sppsvc.exe,-101 (sppsvc) - Unknown owner - C:\Windows\system32\sppsvc.exe (file missing)
O23 - Service: StarWind AE Service (StarWindServiceAE) - StarWind Software - C:\Program Files (x86)\Alcohol Soft\Alcohol 52\StarWind\StarWindServiceAE.exe
O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files (x86)\Common Files\Steam\SteamService.exe
O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\Windows\system32\UI0Detect.exe (file missing)
O23 - Service: Intel(R) Management and Security Application User Notification Service (UNS) - Intel Corporation - C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe
O23 - Service: VAIO Event Service - Sony Corporation - C:\Program Files (x86)\Sony\VAIO Control Center\VESMgr.exe
O23 - Service: VAIO Power Management - Sony Corporation - C:\Program Files\Sony\VAIO Power Management\SPMService.exe
O23 - Service: @%SystemRoot%\system32\vaultsvc.dll,-1003 (VaultSvc) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: VCService - Sony Corporation - C:\Program Files\Sony\VAIO Care\VCService.exe
O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\Windows\System32\vds.exe (file missing)
O23 - Service: VSNService - Sony Corporation - C:\Program Files\Sony\VAIO Smart Network\VSNService.exe
O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\Windows\system32\vssvc.exe (file missing)
O23 - Service: VUAgent - Sony Corporation - C:\Program Files\Sony\VAIO Update Common\VUAgent.exe
O23 - Service: @%SystemRoot%\system32\Wat\WatUX.exe,-601 (WatAdminSvc) - Unknown owner - C:\Windows\system32\Wat\WatAdminSvc.exe (file missing)
O23 - Service: @%systemroot%\system32\wbengine.exe,-104 (wbengine) - Unknown owner - C:\Windows\system32\wbengine.exe (file missing)
O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\Windows\system32\wbem\WmiApSrv.exe (file missing)
O23 - Service: @%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing)

--
End of file - 12491 bytes
"Počítač vám ušetří spoustu práce, kterou byste bez něj vůbec neměli."

Reklama
Uživatelský avatar
jaro3
člen Security týmu
Guru Level 15
Guru Level 15
Příspěvky: 43298
Registrován: červen 07
Bydliště: Jižní Čechy
Pohlaví: Muž
Stav:
Offline

Re: Pomalý notebook + zatrhávání systému/HJT

Příspěvekod jaro3 » 30 dub 2014 18:57

Stáhni si ATF Cleaner
Poklepej na ATF Cleaner.exe, klikni na select all found, poté:
-Když používáš Firefox (Mozzila), klikni na Firefox nahoře a vyber: Select All, poté klikni na Empty Selected.
-Když používáš Operu, klikni nahoře na Operu a vyber: Select All, poté klikni na Empty Selected. Poté klikni na Main (hlavní stránku ) a klikni na Empty Selected.
Po vyčištění klikni na Exit k zavření programu.
ATF-Cleaner je jednoduchý nástroj na odstranění historie z webového prohlížeče. Program dokáže odstranit cache, cookies, historii a další stopy po surfování na Internetu. Mezi podporované prohlížeče patří Internet Explorer, Firefox a Opera. Aplikace navíc umí odstranit dočasné soubory Windows, vysypat koš atd.

- Pokud používáš jen Google Chrome , tak ATF nemusíš použít.


Stáhni si TFC
Otevři soubor a zavři všechny ostatní okna, Klikni na Start k zahájení procesu. Program by neměl trvat dlouho.
Poté by se měl PC restartovat, pokud ne , proveď sám.

Stáhni AdwCleaner (by Xplode)
http://www.bleepingcomputer.com/download/adwcleaner/

Ulož si ho na svojí plochu
Ukonči všechny programy , okna a prohlížeče
Spusť program poklepáním a klikni na „Prohledat-Scan“
Po skenu se objeví log ( jinak je uložen systémovem disku jako AdwCleaner[R?].txt), jeho obsah sem celý vlož.

Stáhni si Malwarebytes' Anti-Malware
- Při instalaci odeber zatržítko u „Povolit bezplatnou zkušební verzi Malwarebytes' Anti-Malware Premium“
Nainstaluj a spusť ho
- na konci instalace se ujisti že máš zvoleny/zatrhnuty obě možnosti:
Aktualizace Malwarebytes' Anti-Malware a Spustit aplikaci Malwarebytes' Anti-Malware, pokud jo tak klikni na tlačítko konec
- pokud bude nalezena aktualizace, tak se stáhne a nainstaluje
- program se po té spustí a klikni na Skenovat nyní a
- po proběhnutí programu se ti objeví hláška vpravo dole tak klikni na b] Kopírovat do schránky [/b]a a vlož sem celý log.

- po té klikni na tlačítko Exit, objeví se ti hláška tak zvol Ano
(zatím nic nemaž!).

Pokud budou problémy , spusť v nouz. režimu.
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra

Uživatelský avatar
lukasgereg
Level 2
Level 2
Příspěvky: 184
Registrován: říjen 11
Bydliště: Brno
Pohlaví: Muž
Stav:
Offline
Kontakt:

Re: Pomalý notebook + zatrhávání systému/HJT

Příspěvekod lukasgereg » 05 kvě 2014 12:03

# AdwCleaner v3.207 - Report created 05/05/2014 at 11:00:04
# Updated 05/05/2014 by Xplode
# Operating System : Windows 7 Home Premium Service Pack 1 (64 bits)
# Username : Terezka - SCHLOJMO
# Running from : C:\Users\Terezka\Downloads\AdwCleaner.exe
# Option : Scan

***** [ Services ] *****

Service Found : WsysSvc

***** [ Files / Folders ] *****

File Found : C:\Users\Terezka\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_www.qvo6.com_0.localstorage
File Found : C:\Windows\System32\roboot64.exe
File Found : C:\Windows\System32\Tasks\Desk 365 RunAsStdUser
File Found : C:\Windows\System32\Tasks\Driver Booster Update
Folder Found : C:\Program Files (x86)\driver-soft
Folder Found : C:\ProgramData\AlawarWrapper
Folder Found : C:\ProgramData\apn
Folder Found : C:\Users\Public\Documents\AlawarWrapper
Folder Found : C:\Users\Terezka\AppData\Local\PackageAware

***** [ Shortcuts ] *****

Shortcut Found : C:\Users\Public\Desktop\Google Chrome.lnk ( hxxp://www.qvo6.com/?utm_source=b&utm_m ... 1377538960 )
Shortcut Found : C:\Users\Terezka\Desktop\Internet Explorer.lnk ( hxxp://www.qvo6.com/?utm_source=b&utm_m ... 1377538960 )
Shortcut Found : C:\Users\Terezka\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Internet Explorer (No Add-ons).lnk ( hxxp://www.qvo6.com/?utm_source=b&utm_m ... 1377538960 )
Shortcut Found : C:\Users\Terezka\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk ( hxxp://www.qvo6.com/?utm_source=b&utm_m ... 1377538960 )
Shortcut Found : C:\Users\Terezka\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Google Chrome.lnk ( hxxp://www.qvo6.com/?utm_source=b&utm_m ... 1377538960 )

***** [ Registry ] *****

Key Found : HKCU\Software\AppDataLow\Software\Search Settings
Key Found : HKCU\Software\Classes\pokki
Key Found : HKCU\Software\Microsoft\Internet Explorer\DOMStorage\qvo6.com
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{687578B9-7132-4A7A-80E4-30EE31099E03}
Key Found : HKCU\Software\Softonic
Key Found : [x64] HKCU\Software\Softonic
Key Found : HKLM\SOFTWARE\Classes\CLSID\{059EACC2-1ABE-49E8-928D-DC8BD355B7A9}
Key Found : HKLM\Software\Driver-Soft
Key Found : HKLM\SOFTWARE\Google\Chrome\Extensions\hbcennhacfaagdopikcegfcobcadeocj
Key Found : HKLM\SOFTWARE\Google\Chrome\Extensions\icdlfehblmklkikfigmjhbmmpmkmpooj
Key Found : HKLM\SOFTWARE\Google\Chrome\Extensions\ifohbjbgfchkkfhphahclmkpgejiplfo
Key Found : HKLM\SOFTWARE\Google\Chrome\Extensions\mhkaekfpcppmmioggniknbnbdbcigpkk
Key Found : HKLM\SOFTWARE\Google\Chrome\Extensions\pfndaklgolladniicklehhancnlgocpp
Key Found : HKLM\Software\hdcode
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\ApnSetup_RASAPI32
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\ApnSetup_RASMANCS
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\apnstub_RASAPI32
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\apnstub_RASMANCS
Key Found : HKLM\SOFTWARE\Microsoft\Tracing\BingBar_RASMANCS
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Driver Genius_is1
Key Found : HKLM\Software\Trymedia Systems
Key Found : HKLM\SYSTEM\CurrentControlSet\Services\Eventlog\Application\WsysSvc
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}
Value Found : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{687578B9-7132-4A7A-80E4-30EE31099E03}]
Value Found : HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks [{687578B9-7132-4A7A-80E4-30EE31099E03}]
Value Found : HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks [{D8278076-BC68-4484-9233-6E7F1628B56C}]

***** [ Browsers ] *****

-\\ Internet Explorer v11.0.9600.17041


-\\ Mozilla Firefox v28.0 (cs)

[ File : C:\Users\Terezka\AppData\Roaming\Mozilla\Firefox\Profiles\aq09jmvd.default\prefs.js ]


-\\ Google Chrome v34.0.1847.131

[ File : C:\Users\Terezka\AppData\Local\Google\Chrome\User Data\Default\preferences ]


*************************

AdwCleaner[R0].txt - [4492 octets] - [05/05/2014 11:00:04]

########## EOF - C:\AdwCleaner\AdwCleaner[R0].txt - [4552 octets] ##########
"Počítač vám ušetří spoustu práce, kterou byste bez něj vůbec neměli."

Uživatelský avatar
jaro3
člen Security týmu
Guru Level 15
Guru Level 15
Příspěvky: 43298
Registrován: červen 07
Bydliště: Jižní Čechy
Pohlaví: Muž
Stav:
Offline

Re: Pomalý notebook + zatrhávání systému/HJT

Příspěvekod jaro3 » 05 kvě 2014 18:57

A Malwarebytes' Anti-Malware??

Spusť znovu AdwCleaner (u Windows Vista či Windows7, klikni na AdwCleaner pravým a vyber „Spustit jako správce
klikni na „Prohledat-Scan“, po prohledání klikni na „ Vymazat-Clean

Program provede opravu, po automatickém restartu neukáže log (C:\AdwCleaner [S?].txt) , jeho obsah sem celý vlož.

Stáhni si Junkware Removal Tool by Thisisu

na svojí plochu.

Deaktivuj si svůj antivirový program. Pravým tl. myši klikni na JRT.exe a vyber „spustit jako správce“. Pro pokračování budeš vyzván ke stisknutí jakékoliv klávesy. Na nějakou klikni.
Začne skenování programu. Skenování může trvat dloho , podle množství nákaz. Po ukončení skenu se objeví log (JRT.txt) , který se uloží na ploše.
Zkopíruj sem prosím celý jeho obsah.
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra

Uživatelský avatar
lukasgereg
Level 2
Level 2
Příspěvky: 184
Registrován: říjen 11
Bydliště: Brno
Pohlaví: Muž
Stav:
Offline
Kontakt:

Re: Pomalý notebook + zatrhávání systému/HJT

Příspěvekod lukasgereg » 12 kvě 2014 11:43

MBAM

2014/05/12 11:40:21 +0200 mbam-log-2014-05-12 (11-22-17).xml yes 2.00.1.1004 v2014.05.12.01 v2014.03.27.01 free disabled disabled disabled Windows 7 Service Pack 1 x64 Terezka NTFS threat completed 278412 1082 0 0 9 4 2 0 1 0 enabled enabled enabled enabled disabled disabled enabled enabled enabled HKU\S-1-5-21-753734031-1727712665-3293650531-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{687578b9-7132-4a7a-80e4-30ee31099e03}PUP.Optional.uTorrentTB.Aea97da76df9cfc3a09d79d85d32fc13f HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{33BB0A4E-99AF-4226-BDF6-49120163DE86}PUP.Optional.Qone85f22351b9ddedd5967f3eacd16ed2cd4 HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\hbcennhacfaagdopikcegfcobcadeocjPUP.Optional.Spigot.A018081cfcbb0f34375de2c51936fd729 HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\icdlfehblmklkikfigmjhbmmpmkmpoojPUP.Optional.Spigot.Ad7aa3719e497cc6aff55f08d91719a66 HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\ifohbjbgfchkkfhphahclmkpgejiplfoPUP.Optional.Elex.Ae1a0bf9190eb35017bf1ebc4c043e61a HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\mhkaekfpcppmmioggniknbnbdbcigpkkPUP.Optional.Spigot.Aceb396bacab10333292c730a1fe3ab55 HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\pfndaklgolladniicklehhancnlgocppPUP.Optional.Spigot.A4041e66ab0cb67cf7ed8f28bd82a38c8 HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{33BB0A4E-99AF-4226-BDF6-49120163DE86}PUP.Optional.Qone8146db49cde9d1a1c3723fcbb59aa56aa HKU\S-1-5-21-753734031-1727712665-3293650531-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\SOFTONIC\Universal DownloaderPUP.Optional.Softonic.Ad4ad430d473452e4c5f0a5de14eed030 HKU\S-1-5-21-753734031-1727712665-3293650531-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TOOLBAR\WEBBROWSER{687578B9-7132-4A7A-80E4-30EE31099E03}PUP.Optional.uTorrentTB.A
"Počítač vám ušetří spoustu práce, kterou byste bez něj vůbec neměli."

Uživatelský avatar
lukasgereg
Level 2
Level 2
Příspěvky: 184
Registrován: říjen 11
Bydliště: Brno
Pohlaví: Muž
Stav:
Offline
Kontakt:

Re: Pomalý notebook + zatrhávání systému/HJT

Příspěvekod lukasgereg » 12 kvě 2014 11:55

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.4 (04.06.2014:1)
OS: Windows 7 Home Premium x64
Ran by Terezka on po 12.05.2014 at 11:44:51,79
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values



~~~ Registry Keys

Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\softonic
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\AppDataLow\software\search settings
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S-1-5-21-753734031-1727712665-3293650531-1000\Software\sweetim
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\apnstub_rasapi32
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Tracing\apnstub_rasmancs
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Tracing\APNSetup_RASAPI32
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Tracing\APNSetup_RASMANCS
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Tracing\APN_ATU3__RASAPI32
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Tracing\APN_ATU3__RASMANCS
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{52D701F3-CF12-4129-8C82-7068A7898782}
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}



~~~ Files

Successfully disinfected: [Shortcut] C:\Users\Terezka\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk
Successfully disinfected: [Shortcut] C:\Users\Terezka\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Google Chrome.lnk
Successfully disinfected: [Shortcut] C:\Users\Terezka\AppData\Roaming\microsoft\windows\start menu\Programs\Accessories\System Tools\Internet Explorer (No Add-ons).lnk
Successfully disinfected: [Shortcut] C:\Users\Public\Desktop\Google Chrome.lnk
Successfully repaired: [Shortcut] C:\Users\Terezka\desktop\Internet Explorer.lnk



~~~ Folders

Successfully deleted: [Folder] "C:\ProgramData\apn"
Successfully deleted: [Folder] "C:\ProgramData\big fish games"
Successfully deleted: [Folder] "C:\ProgramData\drivergenius"
Successfully deleted: [Folder] "C:\Program Files (x86)\driver-soft"
Successfully deleted: [Folder] "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\driver genius"
Successfully deleted: [Empty Folder] C:\Users\Terezka\appdata\local\{046AFA68-1CCE-4248-B4A9-52EBF592C544}
Successfully deleted: [Empty Folder] C:\Users\Terezka\appdata\local\{13F2AD7D-18F7-48C7-A0AC-2ABD32AA4648}
Successfully deleted: [Empty Folder] C:\Users\Terezka\appdata\local\{1BC941C8-4DD2-481C-A45C-27381E07ADC2}
Successfully deleted: [Empty Folder] C:\Users\Terezka\appdata\local\{26E68E86-7C37-4A6A-B026-5683A340B38B}
Successfully deleted: [Empty Folder] C:\Users\Terezka\appdata\local\{2BAA76E3-62B0-4D24-BEAD-F86DA52774CA}
Successfully deleted: [Empty Folder] C:\Users\Terezka\appdata\local\{35C2E7CB-7FED-4E61-8D1F-5B8F349A7389}
Successfully deleted: [Empty Folder] C:\Users\Terezka\appdata\local\{414D6061-4713-4399-85AB-C6370CF39548}
Successfully deleted: [Empty Folder] C:\Users\Terezka\appdata\local\{498C4D3A-AF15-4CD1-A696-EDCE92D26F1D}
Successfully deleted: [Empty Folder] C:\Users\Terezka\appdata\local\{52E5C962-667D-4F91-8B8C-6D272BC83FD4}
Successfully deleted: [Empty Folder] C:\Users\Terezka\appdata\local\{57AB9030-C444-474C-91DE-34852394CBFC}
Successfully deleted: [Empty Folder] C:\Users\Terezka\appdata\local\{760E4718-13DE-4598-A191-0BC46F6553C9}
Successfully deleted: [Empty Folder] C:\Users\Terezka\appdata\local\{8818B601-20A4-4EE4-824F-D8E0472A11CB}
Successfully deleted: [Empty Folder] C:\Users\Terezka\appdata\local\{944DF89B-21DC-493F-A7B3-692464402FBE}
Successfully deleted: [Empty Folder] C:\Users\Terezka\appdata\local\{9481A65F-0578-4D3B-9B9A-A4670AA220EE}
Successfully deleted: [Empty Folder] C:\Users\Terezka\appdata\local\{9AF501BB-65F0-4765-A3D0-6707A6C2518A}
Successfully deleted: [Empty Folder] C:\Users\Terezka\appdata\local\{B605CD68-D2B0-4ACA-9026-91D58380F2CA}
Successfully deleted: [Empty Folder] C:\Users\Terezka\appdata\local\{D621CD7D-9F2B-44AA-945A-DD05287B9B45}
Successfully deleted: [Empty Folder] C:\Users\Terezka\appdata\local\{E6BDE12F-E3F1-4AE6-84F0-77C112398C0F}
Successfully deleted: [Empty Folder] C:\Users\Terezka\appdata\local\{F85604F6-6091-4BA7-BC97-8E74AC789C56}



~~~ FireFox

Emptied folder: C:\Users\Terezka\AppData\Roaming\mozilla\firefox\profiles\aq09jmvd.default\minidumps [7 files]



~~~ Chrome

Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Google\Chrome\Extensions\hbcennhacfaagdopikcegfcobcadeocj
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Google\Chrome\Extensions\icdlfehblmklkikfigmjhbmmpmkmpooj
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Google\Chrome\Extensions\ifohbjbgfchkkfhphahclmkpgejiplfo
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Google\Chrome\Extensions\mhkaekfpcppmmioggniknbnbdbcigpkk
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Google\Chrome\Extensions\pfndaklgolladniicklehhancnlgocpp



~~~ Event Viewer Logs were cleared





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on po 12.05.2014 at 11:54:19,52
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"Počítač vám ušetří spoustu práce, kterou byste bez něj vůbec neměli."

Uživatelský avatar
lukasgereg
Level 2
Level 2
Příspěvky: 184
Registrován: říjen 11
Bydliště: Brno
Pohlaví: Muž
Stav:
Offline
Kontakt:

Re: Pomalý notebook + zatrhávání systému/HJT

Příspěvekod lukasgereg » 12 kvě 2014 12:56

# AdwCleaner v3.208 - Report created 12/05/2014 at 12:06:34
# Updated 11/05/2014 by Xplode
# Operating System : Windows 7 Home Premium Service Pack 1 (64 bits)
# Username : Terezka - SCHLOJMO
# Running from : C:\Users\Terezka\Downloads\adwcleaner (1).exe
# Option : Clean

***** [ Services ] *****

[#] Service Deleted : WsysSvc

***** [ Files / Folders ] *****

Folder Deleted : C:\ProgramData\AlawarWrapper
Folder Deleted : C:\Users\Public\Documents\AlawarWrapper
Folder Deleted : C:\Users\Terezka\AppData\Local\PackageAware
File Deleted : C:\Windows\System32\roboot64.exe
File Deleted : C:\Users\Terezka\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_www.qvo6.com_0.localstorage
File Deleted : C:\Windows\System32\Tasks\Desk 365 RunAsStdUser
File Deleted : C:\Windows\System32\Tasks\Driver Booster Update

***** [ Shortcuts ] *****

Shortcut Disinfected : C:\Users\Public\Desktop\Google Chrome.lnk
Shortcut Disinfected : C:\Users\Terezka\Desktop\Internet Explorer.lnk
Shortcut Disinfected : C:\Users\Terezka\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Internet Explorer (No Add-ons).lnk
Shortcut Disinfected : C:\Users\Terezka\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk
Shortcut Disinfected : C:\Users\Terezka\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Google Chrome.lnk

***** [ Registry ] *****

Key Deleted : HKCU\Software\Classes\pokki
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\DOMStorage\qvo6.com
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\bi_client_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\bi_client_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\BingBar_RASMANCS
Key Deleted : HKLM\SYSTEM\CurrentControlSet\Services\Eventlog\Application\WsysSvc
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{059EACC2-1ABE-49E8-928D-DC8BD355B7A9}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{687578B9-7132-4A7A-80E4-30EE31099E03}
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{687578B9-7132-4A7A-80E4-30EE31099E03}]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks [{687578B9-7132-4A7A-80E4-30EE31099E03}]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks [{D8278076-BC68-4484-9233-6E7F1628B56C}]
Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}
Key Deleted : HKLM\Software\Driver-Soft
Key Deleted : HKLM\Software\hdcode
Key Deleted : HKLM\Software\Trymedia Systems
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Driver Genius_is1

***** [ Browsers ] *****

-\\ Internet Explorer v11.0.9600.17041


-\\ Mozilla Firefox v28.0 (cs)

[ File : C:\Users\Terezka\AppData\Roaming\Mozilla\Firefox\Profiles\aq09jmvd.default\prefs.js ]


-\\ Google Chrome v34.0.1847.131

[ File : C:\Users\Terezka\AppData\Local\Google\Chrome\User Data\Default\preferences ]


*************************

AdwCleaner[R0].txt - [4640 octets] - [05/05/2014 11:00:04]
AdwCleaner[R1].txt - [4832 octets] - [12/05/2014 11:24:44]
AdwCleaner[S0].txt - [3222 octets] - [12/05/2014 12:06:34]

########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [3282 octets] ##########
"Počítač vám ušetří spoustu práce, kterou byste bez něj vůbec neměli."

Uživatelský avatar
jaro3
člen Security týmu
Guru Level 15
Guru Level 15
Příspěvky: 43298
Registrován: červen 07
Bydliště: Jižní Čechy
Pohlaví: Muž
Stav:
Offline

Re: Pomalý notebook + zatrhávání systému/HJT

Příspěvekod jaro3 » 12 kvě 2014 18:45

. spusť znovu MbAM a dej Skenovat nyní
- po proběhnutí programu se ti objeví hláška tak klikni na „Vše do karantény“ a na „Exportovat záznam“ a vyber „textový soubor“ , soubor nějak pojmenuj a někam ho ulož. Zkopíruj se celý obsah toho logu.

Stáhni si RogueKiller by Adlice Software
32bit.:
http://www.sur-la-toile.com/RogueKiller/RogueKiller.exe
64bit.:
http://www.sur-la-toile.com/RogueKiller ... lerX64.exe
na svojí plochu.
- Zavři všechny ostatní programy a prohlížeče.
- Pro OS Vista a win7 spusť program RogueKiller.exe jako správce , u XP poklepáním.
- počkej až skončí Prescan -vyhledávání škodlivých procesů.
- Zkontroluj , zda máš zaškrtnuto:
Kontrola MBR
Kontrola Faked
Antirootkit

-Potom klikni na „Prohledat“.
- Program skenuje procesy PC. Po proskenování klikni na „Zpráva“celý obsah logu sem zkopíruj.
Pokud je program blokován , zkus ho spustit několikrát. Pokud dále program nepůjde spustit a pracovat, přejmenuj ho na winlogon.exe.
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra

Uživatelský avatar
lukasgereg
Level 2
Level 2
Příspěvky: 184
Registrován: říjen 11
Bydliště: Brno
Pohlaví: Muž
Stav:
Offline
Kontakt:

Re: Pomalý notebook + zatrhávání systému/HJT

Příspěvekod lukasgereg » 13 kvě 2014 13:55

RogueKiller V8.8.15 _x64_ [Mar 27 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Podpora : http://forum.adlice.com
Webové stránky : http://www.adlice.com/softwares/roguekiller/
: http://www.adlice.com

Operační systém : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Spuštěno v : Normální režim
Uživatel : Terezka [Práva správce]
Mód : Kontrola -- Datum : 05/13/2014 13:54:41
| ARK || FAK || MBR |

¤¤¤ Škodlivé procesy: : 0 ¤¤¤

¤¤¤ ¤¤¤ Záznamy Registrů: : 2 ¤¤¤
[HJ POL][PUM] HKCU\[...]\System : DisableTaskMgr (0) -> NALEZENO
[HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> NALEZENO

¤¤¤ naplánované úlohy : 0 ¤¤¤

¤¤¤ spuštění položky : 0 ¤¤¤

¤¤¤ Webové prohlížeče : 0 ¤¤¤

¤¤¤ Browser Addons : 0 ¤¤¤

¤¤¤ Zvláštní soubory / Složky: ¤¤¤

¤¤¤ Ovladač : [NENAHRÁNO 0x0] ¤¤¤
[Address] EAT @explorer.exe (AsyncGetClassBits) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0370B0)
[Address] EAT @explorer.exe (AsyncInstallDistributionUnit) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF037210)
[Address] EAT @explorer.exe (BindAsyncMoniker) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021F90)
[Address] EAT @explorer.exe (CDLGetLongPathNameA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0378D0)
[Address] EAT @explorer.exe (CDLGetLongPathNameW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0378E8)
[Address] EAT @explorer.exe (CORPolicyProvider) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021674)
[Address] EAT @explorer.exe (CoGetClassObjectFromURL) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0373FC)
[Address] EAT @explorer.exe (CoInstall) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF037460)
[Address] EAT @explorer.exe (CoInternetCanonicalizeIUri) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE5660)
[Address] EAT @explorer.exe (CoInternetCombineIUri) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE80A0)
[Address] EAT @explorer.exe (CoInternetCombineUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFD46A4)
[Address] EAT @explorer.exe (CoInternetCombineUrlEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFD43C0)
[Address] EAT @explorer.exe (CoInternetCompareUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF025280)
[Address] EAT @explorer.exe (CoInternetCreateSecurityManager) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFA1EE0)
[Address] EAT @explorer.exe (CoInternetCreateZoneManager) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFB0810)
[Address] EAT @explorer.exe (CoInternetFeatureSettingsChanged) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF060284)
[Address] EAT @explorer.exe (CoInternetGetProtocolFlags) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF02537C)
[Address] EAT @explorer.exe (CoInternetGetSecurityUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0253D0)
[Address] EAT @explorer.exe (CoInternetGetSecurityUrlEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE9CD0)
[Address] EAT @explorer.exe (CoInternetGetSession) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFA2460)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabled) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE8DC0)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabledForIUri) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE51B8)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabledForUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE1820)
[Address] EAT @explorer.exe (CoInternetIsFeatureZoneElevationEnabled) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF02586C)
[Address] EAT @explorer.exe (CoInternetParseIUri) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFD56A8)
[Address] EAT @explorer.exe (CoInternetParseUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFB1490)
[Address] EAT @explorer.exe (CoInternetQueryInfo) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE7C50)
[Address] EAT @explorer.exe (CoInternetSetFeatureEnabled) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF025AF4)
[Address] EAT @explorer.exe (CompareSecurityIds) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFBD1A4)
[Address] EAT @explorer.exe (CompatFlagsFromClsid) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE4044)
[Address] EAT @explorer.exe (CopyBindInfo) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF033020)
[Address] EAT @explorer.exe (CopyStgMedium) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFABA0C)
[Address] EAT @explorer.exe (CreateAsyncBindCtx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFF86C0)
[Address] EAT @explorer.exe (CreateAsyncBindCtxEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE3D14)
[Address] EAT @explorer.exe (CreateFormatEnumerator) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFC68E0)
[Address] EAT @explorer.exe (CreateIUriBuilder) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFA3660)
[Address] EAT @explorer.exe (CreateURLMoniker) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFFCCF4)
[Address] EAT @explorer.exe (CreateURLMonikerEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFA78D0)
[Address] EAT @explorer.exe (CreateURLMonikerEx2) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE40F0)
[Address] EAT @explorer.exe (CreateUri) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFA16F0)
[Address] EAT @explorer.exe (CreateUriFromMultiByteString) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021EE4)
[Address] EAT @explorer.exe (CreateUriPriv) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021EF8)
[Address] EAT @explorer.exe (CreateUriWithFragment) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021F40)
[Address] EAT @explorer.exe (DllCanUnloadNow) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFA1600)
[Address] EAT @explorer.exe (DllGetClassObject) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFEAB3C)
[Address] EAT @explorer.exe (DllInstall) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF022458)
[Address] EAT @explorer.exe (DllRegisterServer) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF022464)
[Address] EAT @explorer.exe (DllRegisterServerEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFFE070)
[Address] EAT @explorer.exe (DllUnregisterServer) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF022470)
[Address] EAT @explorer.exe (Extract) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF037F74)
[Address] EAT @explorer.exe (FaultInIEFeature) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF038FE8)
[Address] EAT @explorer.exe (FileBearsMarkOfTheWeb) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFD6B60)
[Address] EAT @explorer.exe (FindMediaType) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF022E9C)
[Address] EAT @explorer.exe (FindMediaTypeClass) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFC6080)
[Address] EAT @explorer.exe (FindMimeFromData) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE50BC)
[Address] EAT @explorer.exe (GetAddSitesFileUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0602B0)
[Address] EAT @explorer.exe (GetClassFileOrMime) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFFB8EC)
[Address] EAT @explorer.exe (GetClassURL) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF022074)
[Address] EAT @explorer.exe (GetComponentIDFromCLSSPEC) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0392E8)
[Address] EAT @explorer.exe (GetIDNFlagsForUri) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFBC7F0)
[Address] EAT @explorer.exe (GetIUriPriv) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021F60)
[Address] EAT @explorer.exe (GetIUriPriv2) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021F50)
[Address] EAT @explorer.exe (GetLabelsFromNamedHost) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF068B54)
[Address] EAT @explorer.exe (GetMarkOfTheWeb) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF059390)
[Address] EAT @explorer.exe (GetPortFromUrlScheme) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021E94)
[Address] EAT @explorer.exe (GetPropertyFromName) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021EA4)
[Address] EAT @explorer.exe (GetPropertyName) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021EB4)
[Address] EAT @explorer.exe (GetSoftwareUpdateInfo) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFFE070)
[Address] EAT @explorer.exe (GetUrlmonThreadNotificationHwnd) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFFDEB4)
[Address] EAT @explorer.exe (GetZoneFromAlternateDataStreamEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFA6D90)
[Address] EAT @explorer.exe (HlinkGoBack) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF056E78)
[Address] EAT @explorer.exe (HlinkGoForward) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF056F24)
[Address] EAT @explorer.exe (HlinkNavigateMoniker) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF056FD0)
[Address] EAT @explorer.exe (HlinkNavigateString) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF057004)
[Address] EAT @explorer.exe (HlinkSimpleNavigateToMoniker) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF057038)
[Address] EAT @explorer.exe (HlinkSimpleNavigateToString) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0575E8)
[Address] EAT @explorer.exe (IECompatLogCSSFix) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0312FC)
[Address] EAT @explorer.exe (IEDllLoader) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0226F0)
[Address] EAT @explorer.exe (IEGetUserPrivateNamespaceName) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF033244)
[Address] EAT @explorer.exe (IEInstallScope) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF037554)
[Address] EAT @explorer.exe (IntlPercentEncodeNormalize) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021F70)
[Address] EAT @explorer.exe (IsAsyncMoniker) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE21FC)
[Address] EAT @explorer.exe (IsDWORDProperty) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021EC4)
[Address] EAT @explorer.exe (IsIntranetAvailable) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF060668)
[Address] EAT @explorer.exe (IsJITInProgress) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFBB328)
[Address] EAT @explorer.exe (IsLoggingEnabledA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF05855C)
[Address] EAT @explorer.exe (IsLoggingEnabledW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF058688)
[Address] EAT @explorer.exe (IsStringProperty) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021ED4)
[Address] EAT @explorer.exe (IsValidURL) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFD7610)
[Address] EAT @explorer.exe (MkParseDisplayNameEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFF92F0)
[Address] EAT @explorer.exe (ObtainUserAgentString) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF02DCE0)
[Address] EAT @explorer.exe (PrivateCoInstall) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF037560)
[Address] EAT @explorer.exe (QueryAssociations) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFBE9C0)
[Address] EAT @explorer.exe (QueryClsidAssociation) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF030A8C)
[Address] EAT @explorer.exe (RegisterBindStatusCallback) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFDF600)
[Address] EAT @explorer.exe (RegisterFormatEnumerator) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE1C6C)
[Address] EAT @explorer.exe (RegisterMediaTypeClass) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0220C0)
[Address] EAT @explorer.exe (RegisterMediaTypes) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF022210)
[Address] EAT @explorer.exe (RegisterWebPlatformPermanentSecurityManager) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFD8C54)
[Address] EAT @explorer.exe (ReleaseBindInfo) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFA7D40)
[Address] EAT @explorer.exe (RevokeBindStatusCallback) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFDFBF0)
[Address] EAT @explorer.exe (RevokeFormatEnumerator) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0222CC)
[Address] EAT @explorer.exe (SetAccessForIEAppContainer) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF033258)
[Address] EAT @explorer.exe (SetSoftwareUpdateAdvertisementState) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFFE070)
[Address] EAT @explorer.exe (ShouldDisplayPunycodeForUri) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF02DE50)
[Address] EAT @explorer.exe (ShouldShowIntranetWarningSecband) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE3A3C)
[Address] EAT @explorer.exe (ShowTrustAlertDialog) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF060820)
[Address] EAT @explorer.exe (URLDownloadA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF025CC4)
[Address] EAT @explorer.exe (URLDownloadToCacheFileA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF057D9C)
[Address] EAT @explorer.exe (URLDownloadToCacheFileW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFCA0C4)
[Address] EAT @explorer.exe (URLDownloadToFileA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF057F10)
[Address] EAT @explorer.exe (URLDownloadToFileW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFCEFD0)
[Address] EAT @explorer.exe (URLDownloadW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF025D78)
[Address] EAT @explorer.exe (URLOpenBlockingStreamA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF058058)
[Address] EAT @explorer.exe (URLOpenBlockingStreamW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF058138)
[Address] EAT @explorer.exe (URLOpenPullStreamA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF05821C)
[Address] EAT @explorer.exe (URLOpenPullStreamW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0582E0)
[Address] EAT @explorer.exe (URLOpenStreamA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF058408)
[Address] EAT @explorer.exe (URLOpenStreamW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0584D0)
[Address] EAT @explorer.exe (UnregisterWebPlatformPermanentSecurityManager) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFFC9B4)
[Address] EAT @explorer.exe (UrlMkBuildVersion) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF022804)
[Address] EAT @explorer.exe (UrlMkGetSessionOption) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFB3E60)
[Address] EAT @explorer.exe (UrlMkSetSessionOption) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFDD0E4)
[Address] EAT @explorer.exe (UrlmonCleanupCurrentThread) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFCA27C)
[Address] EAT @explorer.exe (WriteHitLogging) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0585D0)
[Address] EAT @explorer.exe (ZonesReInit) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF059C30)

¤¤¤ Externí včelstvo: ¤¤¤

¤¤¤ Nákaza : ¤¤¤

¤¤¤ Soubor HOSTS: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts


127.0.0.1 localhost
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com
127.0.0.1 www.0scan.com
127.0.0.1 0scan.com
127.0.0.1 1000gratisproben.com
127.0.0.1 www.1000gratisproben.com
127.0.0.1 1001namen.com
127.0.0.1 www.1001namen.com
127.0.0.1 100888290cs.com
127.0.0.1 www.100888290cs.com
127.0.0.1 www.100sexlinks.com
[...]


¤¤¤ Kontrola MBR: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) TOSHIBA MQ01ABD050 +++++
--- User ---
[MBR] f5da4c801b1ac536e79a73b5b1a3e750
[BSP] fbac00e45c4b6882f409e21ccff7513d : Empty MBR Code
Partition table:
0 - [XXXXXX] UNKNOWN (0x00) [VISIBLE] Offset (sectors): 1 | Size: 2097152 MB
User = LL1 ... OK!
User = LL2 ... OK!

Dokončeno : << RKreport[0]_S_05132014_135441.txt >>
"Počítač vám ušetří spoustu práce, kterou byste bez něj vůbec neměli."

Uživatelský avatar
lukasgereg
Level 2
Level 2
Příspěvky: 184
Registrován: říjen 11
Bydliště: Brno
Pohlaví: Muž
Stav:
Offline
Kontakt:

Re: Pomalý notebook + zatrhávání systému/HJT

Příspěvekod lukasgereg » 13 kvě 2014 13:57

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 13.5.2014
Scan Time: 13:43:05
Logfile: mbam.txt
Administrator: Yes

Version: 2.00.1.1004
Malware Database: v2014.05.13.06
Rootkit Database: v2014.03.27.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Chameleon: Disabled

OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Terezka

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 279246
Time Elapsed: 19 min, 50 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Shuriken: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 0
(No malicious items detected)

Registry Values: 0
(No malicious items detected)

Registry Data: 1
PUP.Optional.Qone8, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES|DefaultScope, {33BB0A4E-99AF-4226-BDF6-49120163DE86}, Good: ({0633EE93-D776-472f-A0FF-E1416B8B2E3A}), Bad: ({33BB0A4E-99AF-4226-BDF6-49120163DE86}),Replaced,[20ca53fd5c1fdc5ad0d5c77e54b0768a]

Folders: 0
(No malicious items detected)

Files: 1
PUP.Optional.Somoto.A, C:\Users\Terezka\Downloads\FLVPlayerSetup-N65uymhDi.exe, Quarantined, [c426b9973e3d44f242a86c6947bc11ef],

Physical Sectors: 0
(No malicious items detected)


(end)
"Počítač vám ušetří spoustu práce, kterou byste bez něj vůbec neměli."

Uživatelský avatar
Orcus
člen Security týmu
Elite Level 10.5
Elite Level 10.5
Příspěvky: 10645
Registrován: duben 10
Bydliště: Okolo rostou 3 růže =o)
Pohlaví: Muž
Stav:
Offline

Re: Pomalý notebook + zatrhávání systému/HJT

Příspěvekod Orcus » 13 kvě 2014 18:05

Spusť RogueKiller ( Pro Windows Vista nebo Windows 7, klepni pravým a vyber "Spustit jako správce", ve Windows XP poklepej ke spuštění).
- Počkej, až Prescan dokončí práci...
- Počkej, dokud status okno zobrazuje "Prohledat "

- Klikni na "Smazat"
- Počkej, dokud Status box zobrazuje "Smazání- Finished "
- Klikni na "Zprávy " a zkopíruj a vlož obsah té zprávy prosím sem. Log je možno nalézt v RKreport [číslo]. txt na ploše.
- Zavři RogueKiller

====================================================

Stáhni si TDSSKiller

Na svojí plochu. Ujisti se , že máš zavřeny všechny ostatní aplikace a prohlížeče. Rozbal soubor a spusť TDSSKiller.exe. Restartuj PC . Log z TDSSKilleru najdeš zde:
C:\TDSSKiller.2.2.7.1._(datum)_log.txt , vlož sem prosím celý obsah logu.

Pokud se log nevejde do jedné zprávy, rozděl jej na více částí.
Láska hřeje, ale uhlí je uhlí. :fire:



Log z HJT vkládejte do HJT sekce. Je-li moc dlouhý, rozděl jej do více zpráv.

Pár rad k bezpečnosti PC.

Po dobu mé nepřítomnosti mě zastupuje memphisto, jaro3 a Diallix

Pokud budete spokojeni , můžete podpořit naše fórum.

Uživatelský avatar
lukasgereg
Level 2
Level 2
Příspěvky: 184
Registrován: říjen 11
Bydliště: Brno
Pohlaví: Muž
Stav:
Offline
Kontakt:

Re: Pomalý notebook + zatrhávání systému/HJT

Příspěvekod lukasgereg » 14 kvě 2014 13:12

RogueKiller V8.8.15 _x64_ [Mar 27 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Podpora : http://forum.adlice.com
Webové stránky : http://www.adlice.com/softwares/roguekiller/
: http://www.adlice.com

Operační systém : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Spuštěno v : Normální režim
Uživatel : Terezka [Práva správce]
Mód : Odebrat -- Datum : 05/14/2014 13:11:02
| ARK || FAK || MBR |

¤¤¤ Škodlivé procesy: : 0 ¤¤¤

¤¤¤ ¤¤¤ Záznamy Registrů: : 2 ¤¤¤
[HJ POL][PUM] HKCU\[...]\System : DisableTaskMgr (0) -> VYMAZÁNO
[HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> VYMAZÁNO

¤¤¤ naplánované úlohy : 0 ¤¤¤

¤¤¤ spuštění položky : 0 ¤¤¤

¤¤¤ Webové prohlížeče : 0 ¤¤¤

¤¤¤ Browser Addons : 0 ¤¤¤

¤¤¤ Zvláštní soubory / Složky: ¤¤¤

¤¤¤ Ovladač : [NENAHRÁNO 0x0] ¤¤¤
[Address] EAT @explorer.exe (AsyncGetClassBits) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0370B0)
[Address] EAT @explorer.exe (AsyncInstallDistributionUnit) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF037210)
[Address] EAT @explorer.exe (BindAsyncMoniker) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021F90)
[Address] EAT @explorer.exe (CDLGetLongPathNameA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0378D0)
[Address] EAT @explorer.exe (CDLGetLongPathNameW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0378E8)
[Address] EAT @explorer.exe (CORPolicyProvider) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021674)
[Address] EAT @explorer.exe (CoGetClassObjectFromURL) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0373FC)
[Address] EAT @explorer.exe (CoInstall) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF037460)
[Address] EAT @explorer.exe (CoInternetCanonicalizeIUri) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE5660)
[Address] EAT @explorer.exe (CoInternetCombineIUri) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE80A0)
[Address] EAT @explorer.exe (CoInternetCombineUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFD46A4)
[Address] EAT @explorer.exe (CoInternetCombineUrlEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFD43C0)
[Address] EAT @explorer.exe (CoInternetCompareUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF025280)
[Address] EAT @explorer.exe (CoInternetCreateSecurityManager) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFA1EE0)
[Address] EAT @explorer.exe (CoInternetCreateZoneManager) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFB0810)
[Address] EAT @explorer.exe (CoInternetFeatureSettingsChanged) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF060284)
[Address] EAT @explorer.exe (CoInternetGetProtocolFlags) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF02537C)
[Address] EAT @explorer.exe (CoInternetGetSecurityUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0253D0)
[Address] EAT @explorer.exe (CoInternetGetSecurityUrlEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE9CD0)
[Address] EAT @explorer.exe (CoInternetGetSession) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFA2460)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabled) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE8DC0)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabledForIUri) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE51B8)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabledForUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE1820)
[Address] EAT @explorer.exe (CoInternetIsFeatureZoneElevationEnabled) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF02586C)
[Address] EAT @explorer.exe (CoInternetParseIUri) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFD56A8)
[Address] EAT @explorer.exe (CoInternetParseUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFB1490)
[Address] EAT @explorer.exe (CoInternetQueryInfo) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE7C50)
[Address] EAT @explorer.exe (CoInternetSetFeatureEnabled) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF025AF4)
[Address] EAT @explorer.exe (CompareSecurityIds) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFBD1A4)
[Address] EAT @explorer.exe (CompatFlagsFromClsid) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE4044)
[Address] EAT @explorer.exe (CopyBindInfo) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF033020)
[Address] EAT @explorer.exe (CopyStgMedium) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFABA0C)
[Address] EAT @explorer.exe (CreateAsyncBindCtx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFF86C0)
[Address] EAT @explorer.exe (CreateAsyncBindCtxEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE3D14)
[Address] EAT @explorer.exe (CreateFormatEnumerator) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFC68E0)
[Address] EAT @explorer.exe (CreateIUriBuilder) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFA3660)
[Address] EAT @explorer.exe (CreateURLMoniker) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFFCCF4)
[Address] EAT @explorer.exe (CreateURLMonikerEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFA78D0)
[Address] EAT @explorer.exe (CreateURLMonikerEx2) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE40F0)
[Address] EAT @explorer.exe (CreateUri) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFA16F0)
[Address] EAT @explorer.exe (CreateUriFromMultiByteString) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021EE4)
[Address] EAT @explorer.exe (CreateUriPriv) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021EF8)
[Address] EAT @explorer.exe (CreateUriWithFragment) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021F40)
[Address] EAT @explorer.exe (DllCanUnloadNow) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFA1600)
[Address] EAT @explorer.exe (DllGetClassObject) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFEAB3C)
[Address] EAT @explorer.exe (DllInstall) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF022458)
[Address] EAT @explorer.exe (DllRegisterServer) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF022464)
[Address] EAT @explorer.exe (DllRegisterServerEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFFE070)
[Address] EAT @explorer.exe (DllUnregisterServer) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF022470)
[Address] EAT @explorer.exe (Extract) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF037F74)
[Address] EAT @explorer.exe (FaultInIEFeature) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF038FE8)
[Address] EAT @explorer.exe (FileBearsMarkOfTheWeb) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFD6B60)
[Address] EAT @explorer.exe (FindMediaType) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF022E9C)
[Address] EAT @explorer.exe (FindMediaTypeClass) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFC6080)
[Address] EAT @explorer.exe (FindMimeFromData) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE50BC)
[Address] EAT @explorer.exe (GetAddSitesFileUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0602B0)
[Address] EAT @explorer.exe (GetClassFileOrMime) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFFB8EC)
[Address] EAT @explorer.exe (GetClassURL) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF022074)
[Address] EAT @explorer.exe (GetComponentIDFromCLSSPEC) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0392E8)
[Address] EAT @explorer.exe (GetIDNFlagsForUri) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFBC7F0)
[Address] EAT @explorer.exe (GetIUriPriv) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021F60)
[Address] EAT @explorer.exe (GetIUriPriv2) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021F50)
[Address] EAT @explorer.exe (GetLabelsFromNamedHost) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF068B54)
[Address] EAT @explorer.exe (GetMarkOfTheWeb) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF059390)
[Address] EAT @explorer.exe (GetPortFromUrlScheme) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021E94)
[Address] EAT @explorer.exe (GetPropertyFromName) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021EA4)
[Address] EAT @explorer.exe (GetPropertyName) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021EB4)
[Address] EAT @explorer.exe (GetSoftwareUpdateInfo) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFFE070)
[Address] EAT @explorer.exe (GetUrlmonThreadNotificationHwnd) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFFDEB4)
[Address] EAT @explorer.exe (GetZoneFromAlternateDataStreamEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFA6D90)
[Address] EAT @explorer.exe (HlinkGoBack) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF056E78)
[Address] EAT @explorer.exe (HlinkGoForward) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF056F24)
[Address] EAT @explorer.exe (HlinkNavigateMoniker) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF056FD0)
[Address] EAT @explorer.exe (HlinkNavigateString) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF057004)
[Address] EAT @explorer.exe (HlinkSimpleNavigateToMoniker) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF057038)
[Address] EAT @explorer.exe (HlinkSimpleNavigateToString) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0575E8)
[Address] EAT @explorer.exe (IECompatLogCSSFix) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0312FC)
[Address] EAT @explorer.exe (IEDllLoader) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0226F0)
[Address] EAT @explorer.exe (IEGetUserPrivateNamespaceName) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF033244)
[Address] EAT @explorer.exe (IEInstallScope) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF037554)
[Address] EAT @explorer.exe (IntlPercentEncodeNormalize) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021F70)
[Address] EAT @explorer.exe (IsAsyncMoniker) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE21FC)
[Address] EAT @explorer.exe (IsDWORDProperty) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021EC4)
[Address] EAT @explorer.exe (IsIntranetAvailable) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF060668)
[Address] EAT @explorer.exe (IsJITInProgress) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFBB328)
[Address] EAT @explorer.exe (IsLoggingEnabledA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF05855C)
[Address] EAT @explorer.exe (IsLoggingEnabledW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF058688)
[Address] EAT @explorer.exe (IsStringProperty) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF021ED4)
[Address] EAT @explorer.exe (IsValidURL) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFD7610)
[Address] EAT @explorer.exe (MkParseDisplayNameEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFF92F0)
[Address] EAT @explorer.exe (ObtainUserAgentString) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF02DCE0)
[Address] EAT @explorer.exe (PrivateCoInstall) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF037560)
[Address] EAT @explorer.exe (QueryAssociations) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFBE9C0)
[Address] EAT @explorer.exe (QueryClsidAssociation) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF030A8C)
[Address] EAT @explorer.exe (RegisterBindStatusCallback) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFDF600)
[Address] EAT @explorer.exe (RegisterFormatEnumerator) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE1C6C)
[Address] EAT @explorer.exe (RegisterMediaTypeClass) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0220C0)
[Address] EAT @explorer.exe (RegisterMediaTypes) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF022210)
[Address] EAT @explorer.exe (RegisterWebPlatformPermanentSecurityManager) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFD8C54)
[Address] EAT @explorer.exe (ReleaseBindInfo) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFA7D40)
[Address] EAT @explorer.exe (RevokeBindStatusCallback) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFDFBF0)
[Address] EAT @explorer.exe (RevokeFormatEnumerator) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0222CC)
[Address] EAT @explorer.exe (SetAccessForIEAppContainer) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF033258)
[Address] EAT @explorer.exe (SetSoftwareUpdateAdvertisementState) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFFE070)
[Address] EAT @explorer.exe (ShouldDisplayPunycodeForUri) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF02DE50)
[Address] EAT @explorer.exe (ShouldShowIntranetWarningSecband) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFE3A3C)
[Address] EAT @explorer.exe (ShowTrustAlertDialog) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF060820)
[Address] EAT @explorer.exe (URLDownloadA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF025CC4)
[Address] EAT @explorer.exe (URLDownloadToCacheFileA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF057D9C)
[Address] EAT @explorer.exe (URLDownloadToCacheFileW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFCA0C4)
[Address] EAT @explorer.exe (URLDownloadToFileA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF057F10)
[Address] EAT @explorer.exe (URLDownloadToFileW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFCEFD0)
[Address] EAT @explorer.exe (URLDownloadW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF025D78)
[Address] EAT @explorer.exe (URLOpenBlockingStreamA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF058058)
[Address] EAT @explorer.exe (URLOpenBlockingStreamW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF058138)
[Address] EAT @explorer.exe (URLOpenPullStreamA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF05821C)
[Address] EAT @explorer.exe (URLOpenPullStreamW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0582E0)
[Address] EAT @explorer.exe (URLOpenStreamA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF058408)
[Address] EAT @explorer.exe (URLOpenStreamW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0584D0)
[Address] EAT @explorer.exe (UnregisterWebPlatformPermanentSecurityManager) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFFC9B4)
[Address] EAT @explorer.exe (UrlMkBuildVersion) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF022804)
[Address] EAT @explorer.exe (UrlMkGetSessionOption) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFB3E60)
[Address] EAT @explorer.exe (UrlMkSetSessionOption) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFDD0E4)
[Address] EAT @explorer.exe (UrlmonCleanupCurrentThread) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFEFCA27C)
[Address] EAT @explorer.exe (WriteHitLogging) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF0585D0)
[Address] EAT @explorer.exe (ZonesReInit) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFF059C30)
[Address] EAT @explorer.exe (DllCanUnloadNow) : MFPlat.DLL -> HOOKED (C:\Windows\system32\wpdshserviceobj.dll @ 0xF4693D60)
[Address] EAT @explorer.exe (DllGetClassObject) : MFPlat.DLL -> HOOKED (C:\Windows\system32\wpdshserviceobj.dll @ 0xF4691A74)
[Address] EAT @explorer.exe (DllRegisterServer) : MFPlat.DLL -> HOOKED (C:\Windows\system32\wpdshserviceobj.dll @ 0xF4696070)
[Address] EAT @explorer.exe (DllUnregisterServer) : MFPlat.DLL -> HOOKED (C:\Windows\system32\wpdshserviceobj.dll @ 0xF4696278)

¤¤¤ Externí včelstvo: ¤¤¤

¤¤¤ Nákaza : ¤¤¤

¤¤¤ Soubor HOSTS: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts


127.0.0.1 localhost
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com
127.0.0.1 www.0scan.com
127.0.0.1 0scan.com
127.0.0.1 1000gratisproben.com
127.0.0.1 www.1000gratisproben.com
127.0.0.1 1001namen.com
127.0.0.1 www.1001namen.com
127.0.0.1 100888290cs.com
127.0.0.1 www.100888290cs.com
127.0.0.1 www.100sexlinks.com
[...]


¤¤¤ Kontrola MBR: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) TOSHIBA MQ01ABD050 +++++
--- User ---
[MBR] f5da4c801b1ac536e79a73b5b1a3e750
[BSP] fbac00e45c4b6882f409e21ccff7513d : Empty MBR Code
Partition table:
0 - [XXXXXX] UNKNOWN (0x00) [VISIBLE] Offset (sectors): 1 | Size: 2097152 MB
User = LL1 ... OK!
User = LL2 ... OK!

Dokončeno : << RKreport[0]_D_05142014_131102.txt >>
RKreport[0]_S_05142014_131025.txt
"Počítač vám ušetří spoustu práce, kterou byste bez něj vůbec neměli."


Zpět na “HiJackThis”

Kdo je online

Uživatelé prohlížející si toto fórum: Žádní registrovaní uživatelé a 120 hostů