Prosím o preventivní kontrolu Vyřešeno

Místo pro vaše HiJackThis logy a logy z dalších programů…

Moderátoři: Mods_senior, Security team

Uživatelský avatar
lukas polak
Level 4
Level 4
Příspěvky: 1027
Registrován: leden 12
Pohlaví: Muž
Stav:
Offline

Re: Prosím o preventivní kontrolu

Příspěvekod lukas polak » 19 kvě 2014 21:25

ogueKiller V8.8.15 _x64_ [Mar 27 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Podpora : http://forum.adlice.com
Webové stránky : http://www.adlice.com/softwares/roguekiller/
: http://www.adlice.com

Operační systém : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Spuštěno v : Normální režim
Uživatel : LUKÁŠ [Práva správce]
Mód : Kontrola -- Datum : 05/19/2014 21:24:00
| ARK || FAK || MBR |

¤¤¤ Škodlivé procesy: : 0 ¤¤¤

¤¤¤ ¤¤¤ Záznamy Registrů: : 4 ¤¤¤
[HJ POL][PUM] HKCU\[...]\System : DisableTaskMgr (0) -> NALEZENO
[HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> NALEZENO
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> NALEZENO
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> NALEZENO

¤¤¤ naplánované úlohy : 0 ¤¤¤

¤¤¤ spuštění položky : 0 ¤¤¤

¤¤¤ Webové prohlížeče : 0 ¤¤¤

¤¤¤ Browser Addons : 0 ¤¤¤

¤¤¤ Zvláštní soubory / Složky: ¤¤¤

¤¤¤ Ovladač : [NENAHRÁNO 0x0] ¤¤¤

¤¤¤ Externí včelstvo: ¤¤¤

¤¤¤ Nákaza : ¤¤¤

¤¤¤ Soubor HOSTS: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts




¤¤¤ Kontrola MBR: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) ST350041 1SV SCSI Disk Device +++++
--- User ---
[MBR] 7c7c7f98428a0d0abb3f564c31f399f7
[BSP] 8e51039db11256dce4b538081a1ec1ab : Windows 7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 476838 MB
User = LL1 ... OK!
Error reading LL2 MBR! ([0x1] Nesprávná funkce. )

Dokončeno : << RKreport[0]_S_05192014_212400.txt >>

Reklama
Uživatelský avatar
lukas polak
Level 4
Level 4
Příspěvky: 1027
Registrován: leden 12
Pohlaví: Muž
Stav:
Offline

Re: Prosím o preventivní kontrolu

Příspěvekod lukas polak » 19 kvě 2014 21:28

# DelFix v10.7 - Logfile created 19/05/2014 at 21:27:44
# Updated 27/04/2014 by Xplode
# Username : LUKÁŠ - LUKÁŠ-PC
# Operating System : Windows 7 Ultimate Service Pack 1 (64 bits)

~ Removing disinfection tools ...

Deleted : C:\AdwCleaner
Deleted : C:\Users\LUKÁŠ\Desktop\RK_Quarantine
Deleted : C:\TDSSKiller.3.0.0.34_19.05.2014_19.59.50_log.txt
Deleted : C:\Users\LUKÁŠ\Desktop\JRT.txt
Deleted : C:\Users\LUKÁŠ\Desktop\RKreport[0]_S_05192014_212400.txt
Deleted : C:\Users\LUKÁŠ\Downloads\JRT.exe
Deleted : C:\Users\LUKÁŠ\Downloads\RogueKillerX64.exe
Deleted : C:\Users\LUKÁŠ\Downloads\tdsskiller.exe
Deleted : C:\Users\LUKÁŠ\Downloads\TFC.exe
Deleted : HKLM\SOFTWARE\AdwCleaner

~ Cleaning system restore ...

Deleted : RP #18 [Installed LibreOffice 4.2.4.2 | 05/12/2014 17:53:43]
Deleted : RP #19 [Installed Google Earth. | 05/12/2014 17:59:37]
Deleted : RP #20 [Nainstalováno rozhraní DirectX | 05/12/2014 22:57:23]
Deleted : RP #21 [Windows Update | 05/13/2014 10:06:19]
Deleted : RP #22 [Windows Update | 05/14/2014 12:30:18]
Deleted : RP #23 [Removed Microsoft Silverlight | 05/19/2014 09:38:49]

New restore point created !

########## - EOF - ##########

Uživatelský avatar
jaro3
člen Security týmu
Guru Level 15
Guru Level 15
Příspěvky: 43298
Registrován: červen 07
Bydliště: Jižní Čechy
Pohlaví: Muž
Stav:
Offline

Re: Prosím o preventivní kontrolu

Příspěvekod jaro3 » 20 kvě 2014 09:23

Zavři všechny programy a prohlížeče. Deaktivuj antivir a firewall.
Prosím, odpoj všechny USB nebo externí disky z počítače před spuštěním tohoto programu.
Spusť RogueKiller ( Pro Windows Vista nebo Windows 7, klepni pravým a vyber "Spustit jako správce", ve Windows XP poklepej ke spuštění).
- Počkej, až Prescan dokončí práci...
- Počkej, dokud status okno zobrazuje "Prohledat "
- Klikni na "Smazat"
- Počkej, dokud Status box zobrazuje " Mazání dokončeno "
- Klikni na "Zpráva " a zkopíruj a vlož obsah té zprávy prosím sem. Log je možno nalézt v RKreport [číslo]. txt na ploše.
- Zavři RogueKiller

Vlož nový log z HJT
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra

Uživatelský avatar
lukas polak
Level 4
Level 4
Příspěvky: 1027
Registrován: leden 12
Pohlaví: Muž
Stav:
Offline

Re: Prosím o preventivní kontrolu

Příspěvekod lukas polak » 20 kvě 2014 11:39

RogueKiller V8.8.15 _x64_ [Mar 27 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Podpora : http://forum.adlice.com
Webové stránky : http://www.adlice.com/softwares/roguekiller/
: http://www.adlice.com

Operační systém : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Spuštěno v : Normální režim
Uživatel : LUKÁŠ [Práva správce]
Mód : Odebrat -- Datum : 05/20/2014 11:38:05
| ARK || FAK || MBR |

¤¤¤ Škodlivé procesy: : 0 ¤¤¤

¤¤¤ ¤¤¤ Záznamy Registrů: : 4 ¤¤¤
[HJ POL][PUM] HKCU\[...]\System : DisableTaskMgr (0) -> VYMAZÁNO
[HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> VYMAZÁNO
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> NAHRAZENO (0)
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> NAHRAZENO (0)

¤¤¤ naplánované úlohy : 0 ¤¤¤

¤¤¤ spuštění položky : 0 ¤¤¤

¤¤¤ Webové prohlížeče : 0 ¤¤¤

¤¤¤ Browser Addons : 0 ¤¤¤

¤¤¤ Zvláštní soubory / Složky: ¤¤¤

¤¤¤ Ovladač : [NENAHRÁNO 0x0] ¤¤¤
[Address] EAT @explorer.exe (AsyncGetClassBits) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6C70B0)
[Address] EAT @explorer.exe (AsyncInstallDistributionUnit) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6C7210)
[Address] EAT @explorer.exe (BindAsyncMoniker) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B1F90)
[Address] EAT @explorer.exe (CDLGetLongPathNameA) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6C78D0)
[Address] EAT @explorer.exe (CDLGetLongPathNameW) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6C78E8)
[Address] EAT @explorer.exe (CORPolicyProvider) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B1674)
[Address] EAT @explorer.exe (CoGetClassObjectFromURL) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6C73FC)
[Address] EAT @explorer.exe (CoInstall) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6C7460)
[Address] EAT @explorer.exe (CoInternetCanonicalizeIUri) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE675660)
[Address] EAT @explorer.exe (CoInternetCombineIUri) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6780A0)
[Address] EAT @explorer.exe (CoInternetCombineUrl) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6646A4)
[Address] EAT @explorer.exe (CoInternetCombineUrlEx) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6643C0)
[Address] EAT @explorer.exe (CoInternetCompareUrl) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B5280)
[Address] EAT @explorer.exe (CoInternetCreateSecurityManager) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE631EE0)
[Address] EAT @explorer.exe (CoInternetCreateZoneManager) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE640810)
[Address] EAT @explorer.exe (CoInternetFeatureSettingsChanged) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6F0284)
[Address] EAT @explorer.exe (CoInternetGetProtocolFlags) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B537C)
[Address] EAT @explorer.exe (CoInternetGetSecurityUrl) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B53D0)
[Address] EAT @explorer.exe (CoInternetGetSecurityUrlEx) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE679CD0)
[Address] EAT @explorer.exe (CoInternetGetSession) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE632460)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabled) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE678DC0)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabledForIUri) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6751B8)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabledForUrl) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE671820)
[Address] EAT @explorer.exe (CoInternetIsFeatureZoneElevationEnabled) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B586C)
[Address] EAT @explorer.exe (CoInternetParseIUri) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6656A8)
[Address] EAT @explorer.exe (CoInternetParseUrl) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE641490)
[Address] EAT @explorer.exe (CoInternetQueryInfo) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE677C50)
[Address] EAT @explorer.exe (CoInternetSetFeatureEnabled) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B5AF4)
[Address] EAT @explorer.exe (CompareSecurityIds) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE64D1A4)
[Address] EAT @explorer.exe (CompatFlagsFromClsid) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE674044)
[Address] EAT @explorer.exe (CopyBindInfo) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6C3020)
[Address] EAT @explorer.exe (CopyStgMedium) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE63BA0C)
[Address] EAT @explorer.exe (CreateAsyncBindCtx) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6886C0)
[Address] EAT @explorer.exe (CreateAsyncBindCtxEx) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE673D14)
[Address] EAT @explorer.exe (CreateFormatEnumerator) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6568E0)
[Address] EAT @explorer.exe (CreateIUriBuilder) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE633660)
[Address] EAT @explorer.exe (CreateURLMoniker) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE68CCF4)
[Address] EAT @explorer.exe (CreateURLMonikerEx) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6378D0)
[Address] EAT @explorer.exe (CreateURLMonikerEx2) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6740F0)
[Address] EAT @explorer.exe (CreateUri) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6316F0)
[Address] EAT @explorer.exe (CreateUriFromMultiByteString) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B1EE4)
[Address] EAT @explorer.exe (CreateUriPriv) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B1EF8)
[Address] EAT @explorer.exe (CreateUriWithFragment) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B1F40)
[Address] EAT @explorer.exe (DllCanUnloadNow) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE631600)
[Address] EAT @explorer.exe (DllGetClassObject) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE67AB3C)
[Address] EAT @explorer.exe (DllInstall) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B2458)
[Address] EAT @explorer.exe (DllRegisterServer) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B2464)
[Address] EAT @explorer.exe (DllRegisterServerEx) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE68E070)
[Address] EAT @explorer.exe (DllUnregisterServer) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B2470)
[Address] EAT @explorer.exe (Extract) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6C7F74)
[Address] EAT @explorer.exe (FaultInIEFeature) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6C8FE8)
[Address] EAT @explorer.exe (FileBearsMarkOfTheWeb) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE666B60)
[Address] EAT @explorer.exe (FindMediaType) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B2E9C)
[Address] EAT @explorer.exe (FindMediaTypeClass) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE656080)
[Address] EAT @explorer.exe (FindMimeFromData) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6750BC)
[Address] EAT @explorer.exe (GetAddSitesFileUrl) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6F02B0)
[Address] EAT @explorer.exe (GetClassFileOrMime) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE68B8EC)
[Address] EAT @explorer.exe (GetClassURL) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B2074)
[Address] EAT @explorer.exe (GetComponentIDFromCLSSPEC) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6C92E8)
[Address] EAT @explorer.exe (GetIDNFlagsForUri) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE64C7F0)
[Address] EAT @explorer.exe (GetIUriPriv) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B1F60)
[Address] EAT @explorer.exe (GetIUriPriv2) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B1F50)
[Address] EAT @explorer.exe (GetLabelsFromNamedHost) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6F8B54)
[Address] EAT @explorer.exe (GetMarkOfTheWeb) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6E9390)
[Address] EAT @explorer.exe (GetPortFromUrlScheme) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B1E94)
[Address] EAT @explorer.exe (GetPropertyFromName) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B1EA4)
[Address] EAT @explorer.exe (GetPropertyName) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B1EB4)
[Address] EAT @explorer.exe (GetSoftwareUpdateInfo) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE68E070)
[Address] EAT @explorer.exe (GetUrlmonThreadNotificationHwnd) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE68DEB4)
[Address] EAT @explorer.exe (GetZoneFromAlternateDataStreamEx) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE636D90)
[Address] EAT @explorer.exe (HlinkGoBack) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6E6E78)
[Address] EAT @explorer.exe (HlinkGoForward) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6E6F24)
[Address] EAT @explorer.exe (HlinkNavigateMoniker) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6E6FD0)
[Address] EAT @explorer.exe (HlinkNavigateString) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6E7004)
[Address] EAT @explorer.exe (HlinkSimpleNavigateToMoniker) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6E7038)
[Address] EAT @explorer.exe (HlinkSimpleNavigateToString) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6E75E8)
[Address] EAT @explorer.exe (IECompatLogCSSFix) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6C12FC)
[Address] EAT @explorer.exe (IEDllLoader) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B26F0)
[Address] EAT @explorer.exe (IEGetUserPrivateNamespaceName) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6C3244)
[Address] EAT @explorer.exe (IEInstallScope) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6C7554)
[Address] EAT @explorer.exe (IntlPercentEncodeNormalize) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B1F70)
[Address] EAT @explorer.exe (IsAsyncMoniker) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6721FC)
[Address] EAT @explorer.exe (IsDWORDProperty) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B1EC4)
[Address] EAT @explorer.exe (IsIntranetAvailable) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6F0668)
[Address] EAT @explorer.exe (IsJITInProgress) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE64B328)
[Address] EAT @explorer.exe (IsLoggingEnabledA) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6E855C)
[Address] EAT @explorer.exe (IsLoggingEnabledW) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6E8688)
[Address] EAT @explorer.exe (IsStringProperty) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B1ED4)
[Address] EAT @explorer.exe (IsValidURL) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE667610)
[Address] EAT @explorer.exe (MkParseDisplayNameEx) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6892F0)
[Address] EAT @explorer.exe (ObtainUserAgentString) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6BDCE0)
[Address] EAT @explorer.exe (PrivateCoInstall) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6C7560)
[Address] EAT @explorer.exe (QueryAssociations) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE64E9C0)
[Address] EAT @explorer.exe (QueryClsidAssociation) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6C0A8C)
[Address] EAT @explorer.exe (RegisterBindStatusCallback) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE66F600)
[Address] EAT @explorer.exe (RegisterFormatEnumerator) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE671C6C)
[Address] EAT @explorer.exe (RegisterMediaTypeClass) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B20C0)
[Address] EAT @explorer.exe (RegisterMediaTypes) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B2210)
[Address] EAT @explorer.exe (RegisterWebPlatformPermanentSecurityManager) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE668C54)
[Address] EAT @explorer.exe (ReleaseBindInfo) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE637D40)
[Address] EAT @explorer.exe (RevokeBindStatusCallback) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE66FBF0)
[Address] EAT @explorer.exe (RevokeFormatEnumerator) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B22CC)
[Address] EAT @explorer.exe (SetAccessForIEAppContainer) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6C3258)
[Address] EAT @explorer.exe (SetSoftwareUpdateAdvertisementState) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE68E070)
[Address] EAT @explorer.exe (ShouldDisplayPunycodeForUri) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6BDE50)
[Address] EAT @explorer.exe (ShouldShowIntranetWarningSecband) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE673A3C)
[Address] EAT @explorer.exe (ShowTrustAlertDialog) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6F0820)
[Address] EAT @explorer.exe (URLDownloadA) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B5CC4)
[Address] EAT @explorer.exe (URLDownloadToCacheFileA) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6E7D9C)
[Address] EAT @explorer.exe (URLDownloadToCacheFileW) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE65A0C4)
[Address] EAT @explorer.exe (URLDownloadToFileA) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6E7F10)
[Address] EAT @explorer.exe (URLDownloadToFileW) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE65EFD0)
[Address] EAT @explorer.exe (URLDownloadW) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B5D78)
[Address] EAT @explorer.exe (URLOpenBlockingStreamA) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6E8058)
[Address] EAT @explorer.exe (URLOpenBlockingStreamW) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6E8138)
[Address] EAT @explorer.exe (URLOpenPullStreamA) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6E821C)
[Address] EAT @explorer.exe (URLOpenPullStreamW) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6E82E0)
[Address] EAT @explorer.exe (URLOpenStreamA) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6E8408)
[Address] EAT @explorer.exe (URLOpenStreamW) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6E84D0)
[Address] EAT @explorer.exe (UnregisterWebPlatformPermanentSecurityManager) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE68C9B4)
[Address] EAT @explorer.exe (UrlMkBuildVersion) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6B2804)
[Address] EAT @explorer.exe (UrlMkGetSessionOption) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE643E60)
[Address] EAT @explorer.exe (UrlMkSetSessionOption) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE66D0E4)
[Address] EAT @explorer.exe (UrlmonCleanupCurrentThread) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE65A27C)
[Address] EAT @explorer.exe (WriteHitLogging) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6E85D0)
[Address] EAT @explorer.exe (ZonesReInit) : WS2_32.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFE6E9C30)
[Address] EAT @explorer.exe (WlanAllocateMemory) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF08AC8)
[Address] EAT @explorer.exe (WlanCloseHandle) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF038A0)
[Address] EAT @explorer.exe (WlanConnect) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF05558)
[Address] EAT @explorer.exe (WlanDeleteProfile) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF06D10)
[Address] EAT @explorer.exe (WlanDisconnect) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF057E8)
[Address] EAT @explorer.exe (WlanEnumInterfaces) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF03A80)
[Address] EAT @explorer.exe (WlanExtractPsdIEDataList) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF08394)
[Address] EAT @explorer.exe (WlanFreeMemory) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF0A5A0)
[Address] EAT @explorer.exe (WlanGetAvailableNetworkList) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF04F88)
[Address] EAT @explorer.exe (WlanGetFilterList) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF07F9C)
[Address] EAT @explorer.exe (WlanGetInterfaceCapability) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF04188)
[Address] EAT @explorer.exe (WlanGetNetworkBssList) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF05268)
[Address] EAT @explorer.exe (WlanGetProfile) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF06A20)
[Address] EAT @explorer.exe (WlanGetProfileCustomUserData) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF07B1C)
[Address] EAT @explorer.exe (WlanGetProfileList) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF07404)
[Address] EAT @explorer.exe (WlanGetSecuritySettings) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF08D88)
[Address] EAT @explorer.exe (WlanHostedNetworkForceStart) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF0935C)
[Address] EAT @explorer.exe (WlanHostedNetworkForceStop) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF09418)
[Address] EAT @explorer.exe (WlanHostedNetworkInitSettings) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF099D8)
[Address] EAT @explorer.exe (WlanHostedNetworkQueryProperty) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF094D4)
[Address] EAT @explorer.exe (WlanHostedNetworkQuerySecondaryKey) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF0A020)
[Address] EAT @explorer.exe (WlanHostedNetworkQueryStatus) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF09B50)
[Address] EAT @explorer.exe (WlanHostedNetworkRefreshSecuritySettings) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF09A94)
[Address] EAT @explorer.exe (WlanHostedNetworkSetProperty) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF09744)
[Address] EAT @explorer.exe (WlanHostedNetworkSetSecondaryKey) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF09D78)
[Address] EAT @explorer.exe (WlanHostedNetworkStartUsing) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF091EC)
[Address] EAT @explorer.exe (WlanHostedNetworkStopUsing) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF092A4)
[Address] EAT @explorer.exe (WlanIhvControl) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF04A00)
[Address] EAT @explorer.exe (WlanOpenHandle) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF01960)
[Address] EAT @explorer.exe (WlanQueryAutoConfigParameter) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF03EE8)
[Address] EAT @explorer.exe (WlanQueryInterface) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF04668)
[Address] EAT @explorer.exe (WlanReasonCodeToString) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF08A54)
[Address] EAT @explorer.exe (WlanRegisterNotification) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF05A08)
[Address] EAT @explorer.exe (WlanRegisterVirtualStationNotification) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF0A358)
[Address] EAT @explorer.exe (WlanRenameProfile) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF06F4C)
[Address] EAT @explorer.exe (WlanSaveTemporaryProfile) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF087D0)
[Address] EAT @explorer.exe (WlanScan) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF04D40)
[Address] EAT @explorer.exe (WlanSetAutoConfigParameter) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF03D10)
[Address] EAT @explorer.exe (WlanSetFilterList) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF07DCC)
[Address] EAT @explorer.exe (WlanSetInterface) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF04470)
[Address] EAT @explorer.exe (WlanSetProfile) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF06760)
[Address] EAT @explorer.exe (WlanSetProfileCustomUserData) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF078A4)
[Address] EAT @explorer.exe (WlanSetProfileEapUserData) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF05CC4)
[Address] EAT @explorer.exe (WlanSetProfileEapXmlUserData) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF05F9C)
[Address] EAT @explorer.exe (WlanSetProfileList) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF071A8)
[Address] EAT @explorer.exe (WlanSetProfilePosition) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF07644)
[Address] EAT @explorer.exe (WlanSetPsdIEDataList) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF081B0)
[Address] EAT @explorer.exe (WlanSetSecuritySettings) : wwapi.dll -> HOOKED (C:\Windows\system32\Wlanapi.dll @ 0xEFF08B58)

¤¤¤ Externí včelstvo: ¤¤¤

¤¤¤ Nákaza : ¤¤¤

¤¤¤ Soubor HOSTS: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts




¤¤¤ Kontrola MBR: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) ST350041 1SV SCSI Disk Device +++++
--- User ---
[MBR] 7c7c7f98428a0d0abb3f564c31f399f7
[BSP] 8e51039db11256dce4b538081a1ec1ab : Windows 7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 476838 MB
User = LL1 ... OK!
Error reading LL2 MBR! ([0x1] Nesprávná funkce. )

Dokončeno : << RKreport[0]_D_05202014_113805.txt >>
RKreport[0]_S_05202014_112259.txt;RKreport[0]_S_05202014_112618.txt

Uživatelský avatar
Orcus
člen Security týmu
Elite Level 10.5
Elite Level 10.5
Příspěvky: 10645
Registrován: duben 10
Bydliště: Okolo rostou 3 růže =o)
Pohlaví: Muž
Stav:
Offline

Re: Prosím o preventivní kontrolu

Příspěvekod Orcus » 20 kvě 2014 16:43

jaro3 píše:Vlož nový log z HJT


+ info o problémech.
Láska hřeje, ale uhlí je uhlí. :fire:



Log z HJT vkládejte do HJT sekce. Je-li moc dlouhý, rozděl jej do více zpráv.

Pár rad k bezpečnosti PC.

Po dobu mé nepřítomnosti mě zastupuje memphisto, jaro3 a Diallix

Pokud budete spokojeni , můžete podpořit naše fórum.

Uživatelský avatar
lukas polak
Level 4
Level 4
Příspěvky: 1027
Registrován: leden 12
Pohlaví: Muž
Stav:
Offline

Re: Prosím o preventivní kontrolu

Příspěvekod lukas polak » 21 kvě 2014 08:54

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 8:53:49, on 21.5.2014
Platform: Windows 7 SP1 (WinNT 6.00.3505)
MSIE: Internet Explorer v11.0 (11.00.9600.17041)
Boot mode: Normal

Running processes:
C:\Program Files\AVAST Software\Avast\AvastUI.exe
C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
C:\Program Files (x86)\DAEMON Tools Lite\DTShellHlp.exe
C:\Program Files (x86)\Skype\Phone\Skype.exe
C:\Program Files (x86)\Trend Micro\HiJackThis\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://search.yahoo.com/?fr=avantsearch6
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/p/?LinkId=255141
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/p/?LinkId=255141
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
F2 - REG:system.ini: UserInit=userinit.exe,
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Java\jre7\bin\ssv.dll
O2 - BHO: avast! Online Security - {8E5E2654-AD2D-48bf-AC2D-D17F00898D06} - C:\Program Files\AVAST Software\Avast\aswWebRepIE.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre7\bin\jp2ssv.dll
O4 - HKLM\..\Run: [AvastUI.exe] "C:\Program Files\AVAST Software\Avast\AvastUI.exe" /nogui
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"
O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
O4 - HKCU\..\Run: [DAEMON Tools Lite] "C:\Program Files (x86)\DAEMON Tools Lite\DTLite.exe" -autorun
O4 - HKUS\S-1-5-18\..\RunOnce: [SPReview] "C:\Windows\System32\SPReview\SPReview.exe" /sp:1 /errorfwlink:"http://go.microsoft.com/fwlink/?LinkID=122915" /build:7601 (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\RunOnce: [SPReview] "C:\Windows\System32\SPReview\SPReview.exe" /sp:1 /errorfwlink:"http://go.microsoft.com/fwlink/?LinkID=122915" /build:7601 (User 'Default user')
O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/s ... wflash.cab
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~2\COMMON~1\Skype\SKYPE4~1.DLL
O23 - Service: Adobe Acrobat Update Service (AdobeARMservice) - Adobe Systems Incorporated - C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
O23 - Service: Adobe Flash Player Update Service (AdobeFlashPlayerUpdateSvc) - Adobe Systems Incorporated - C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe
O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\Windows\System32\alg.exe (file missing)
O23 - Service: AppleChargerSrv - Unknown owner - C:\Windows\system32\AppleChargerSrv.exe (file missing)
O23 - Service: avast! Antivirus - AVAST Software - C:\Program Files\AVAST Software\Avast\AvastSvc.exe
O23 - Service: @%SystemRoot%\system32\efssvc.dll,-100 (EFS) - Unknown owner - C:\Windows\System32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\fxsresm.dll,-118 (Fax) - Unknown owner - C:\Windows\system32\fxssvc.exe (file missing)
O23 - Service: @%SystemRoot%\system32\ieetwcollectorres.dll,-1000 (IEEtwCollectorService) - Unknown owner - C:\Windows\system32\IEEtwCollector.exe (file missing)
O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\Windows\System32\msdtc.exe (file missing)
O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: NVIDIA Display Driver Service (nvsvc) - Unknown owner - C:\Windows\system32\nvvsvc.exe (file missing)
O23 - Service: @%systemroot%\system32\psbase.dll,-300 (ProtectedStorage) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\Windows\system32\locator.exe (file missing)
O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: Skype Updater (SkypeUpdate) - Skype Technologies - C:\Program Files (x86)\Skype\Updater\Updater.exe
O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\Windows\System32\snmptrap.exe (file missing)
O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\Windows\System32\spoolsv.exe (file missing)
O23 - Service: @%SystemRoot%\system32\sppsvc.exe,-101 (sppsvc) - Unknown owner - C:\Windows\system32\sppsvc.exe (file missing)
O23 - Service: NVIDIA Stereoscopic 3D Driver Service (Stereo Service) - NVIDIA Corporation - C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe
O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\Windows\system32\UI0Detect.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vaultsvc.dll,-1003 (VaultSvc) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\Windows\System32\vds.exe (file missing)
O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\Windows\system32\vssvc.exe (file missing)
O23 - Service: @%SystemRoot%\system32\Wat\WatUX.exe,-601 (WatAdminSvc) - Unknown owner - C:\Windows\system32\Wat\WatAdminSvc.exe (file missing)
O23 - Service: @%systemroot%\system32\wbengine.exe,-104 (wbengine) - Unknown owner - C:\Windows\system32\wbengine.exe (file missing)
O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\Windows\system32\wbem\WmiApSrv.exe (file missing)
O23 - Service: @%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing)

--
End of file - 6839 bytes

Uživatelský avatar
jaro3
člen Security týmu
Guru Level 15
Guru Level 15
Příspěvky: 43298
Registrován: červen 07
Bydliště: Jižní Čechy
Pohlaví: Muž
Stav:
Offline

Re: Prosím o preventivní kontrolu

Příspěvekod jaro3 » 21 kvě 2014 10:29

Zavři ostatní aplikace a prohlížeče, odpoj se od netu a fixni v HJT:
Návod

Kód: Vybrat vše

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
F2 - REG:system.ini: UserInit=userinit.exe,
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"
O4 - HKUS\S-1-5-18\..\RunOnce: [SPReview] "C:\Windows\System32\SPReview\SPReview.exe" /sp:1 /errorfwlink:"http://go.microsoft.com/fwlink/?LinkID=122915" /build:7601 (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\RunOnce: [SPReview] "C:\Windows\System32\SPReview\SPReview.exe" /sp:1 /errorfwlink:"http://go.microsoft.com/fwlink/?LinkID=122915" /build:7601 (User 'Default user')


Pokud nejsou problémy , je to vše a můžeš dát vyřešeno , zelenou fajfku.
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra

Uživatelský avatar
lukas polak
Level 4
Level 4
Příspěvky: 1027
Registrován: leden 12
Pohlaví: Muž
Stav:
Offline

Re: Prosím o preventivní kontrolu  Vyřešeno

Příspěvekod lukas polak » 21 kvě 2014 11:55

Díky.


Zpět na “HiJackThis”

Kdo je online

Uživatelé prohlížející si toto fórum: Žádní registrovaní uživatelé a 114 hostů