Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 21:57:28, on 15.1.2015
Platform: Windows 7 SP1 (WinNT 6.00.3505)
MSIE: Internet Explorer v11.0 (11.00.9600.17496)
Boot mode: Normal
Running processes:
C:\Program Files (x86)\NVIDIA Corporation\Update Core\NvBackend.exe
C:\Program Files (x86)\Steam\Steam.exe
C:\Program Files (x86)\Razer\Synapse\RzSynapse.exe
C:\Program Files (x86)\Steam\bin\steamwebhelper.exe
C:\Program Files (x86)\Xfire\Xfire.exe
C:\Program Files (x86)\Steam\bin\steamwebhelper.exe
E:\Downloads\programy\HijackThis.exe
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/p/?LinkId=255141
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/p/?LinkId=255141
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
F2 - REG:system.ini: UserInit=userinit.exe
O2 - BHO: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O4 - HKLM\..\Run: [Razer Synapse] "C:\Program Files (x86)\Razer\Synapse\RzSynapse.exe"
O4 - HKLM\..\Run: [StartCCC] "C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\amd64\CLIStart.exe" MSRun
O4 - HKCU\..\Run: [DAEMON Tools Lite] "C:\Program Files (x86)\DAEMON Tools Lite\DTLite.exe" -autorun
O4 - HKCU\..\Run: [Steam] "C:\Program Files (x86)\Steam\steam.exe" -silent
O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-19\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-20\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'NETWORK SERVICE')
O4 - Global Startup: GamePark klient 2.lnk = C:\Program Files\GamePark2\gpcl.exe
O8 - Extra context menu item: E&xportovat do Microsoft Excelu - res://C:\PROGRA~1\MICROS~2\Office15\EXCEL.EXE/3000
O8 - Extra context menu item: Od&eslat do OneNotu - res://C:\PROGRA~1\MICROS~2\Office15\ONBttnIE.dll/105
O9 - Extra button: HP Smart Print - {22CC3EBD-C286-43aa-B8E6-06B115F74162} - C:\Program Files (x86)\Hewlett-Packard\Smart Print 2.0\smartprintsetup.exe
O9 - Extra 'Tools' menuitem: HP Smart Print - {22CC3EBD-C286-43aa-B8E6-06B115F74162} - C:\Program Files (x86)\Hewlett-Packard\Smart Print 2.0\smartprintsetup.exe
O9 - Extra button: Odeslat do OneNotu - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\Program Files (x86)\Microsoft Office\Office15\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: Od&eslat do OneNotu - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\Program Files (x86)\Microsoft Office\Office15\ONBttnIE.dll
O9 - Extra button: Volání kliknutím v Lyncu - {31D09BA0-12F5-4CCE-BE8A-2923E76605DA} - C:\Program Files (x86)\Microsoft Office\Office15\OCHelper.dll
O9 - Extra 'Tools' menuitem: Volání kliknutím v Lyncu - {31D09BA0-12F5-4CCE-BE8A-2923E76605DA} - C:\Program Files (x86)\Microsoft Office\Office15\OCHelper.dll
O9 - Extra button: P&ropojené poznámky aplikace OneNote - {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} - C:\Program Files (x86)\Microsoft Office\Office15\ONBttnIELinkedNotes.dll
O9 - Extra 'Tools' menuitem: P&ropojené poznámky aplikace OneNote - {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} - C:\Program Files (x86)\Microsoft Office\Office15\ONBttnIELinkedNotes.dll
O10 - Unknown file in Winsock LSP: c:\program files (x86)\common files\microsoft shared\windows live\wlidnsp.dll
O10 - Unknown file in Winsock LSP: c:\program files (x86)\common files\microsoft shared\windows live\wlidnsp.dll
O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics
O18 - Protocol: osf - {D924BDC6-C83A-4BD5-90D0-095128A113D1} - C:\Program Files (x86)\Microsoft Office\Office15\MSOSB.DLL
O18 - Filter hijack: text/xml - {807583E5-5146-11D5-A672-00B0D022E945} - C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE15\MSOXMLMF.DLL
O20 - AppInit_DLLs:
O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\Windows\System32\alg.exe (file missing)
O23 - Service: AMD External Events Utility - Unknown owner - C:\Windows\system32\atiesrxx.exe (file missing)
O23 - Service: AMD FUEL Service - Advanced Micro Devices, Inc. - C:\Program Files\AMD\ATI.ACE\Fuel\Fuel.Service.exe
O23 - Service: @%SystemRoot%\system32\efssvc.dll,-100 (EFS) - Unknown owner - C:\Windows\System32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\fxsresm.dll,-118 (Fax) - Unknown owner - C:\Windows\system32\fxssvc.exe (file missing)
O23 - Service: Služba Google Update (gupdate) (gupdate) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Služba Google Update (gupdatem) (gupdatem) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: @%SystemRoot%\system32\ieetwcollectorres.dll,-1000 (IEEtwCollectorService) - Unknown owner - C:\Windows\system32\IEEtwCollector.exe (file missing)
O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\Windows\System32\msdtc.exe (file missing)
O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: NVIDIA Display Driver Service (nvsvc) - Unknown owner - C:\Windows\system32\nvvsvc.exe (file missing)
O23 - Service: PnkBstrA - Unknown owner - C:\Windows\system32\PnkBstrA.exe
O23 - Service: PnkBstrB - Unknown owner - C:\Windows\system32\PnkBstrB.exe
O23 - Service: @%systemroot%\system32\psbase.dll,-300 (ProtectedStorage) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: Razer Game Scanner (Razer Game Scanner Service) - Unknown owner - C:\Program Files (x86)\Razer\Razer Services\GSS\GameScannerService.exe
O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\Windows\system32\locator.exe (file missing)
O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\Windows\System32\snmptrap.exe (file missing)
O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\Windows\System32\spoolsv.exe (file missing)
O23 - Service: @%SystemRoot%\system32\sppsvc.exe,-101 (sppsvc) - Unknown owner - C:\Windows\system32\sppsvc.exe (file missing)
O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files (x86)\Common Files\Steam\SteamService.exe
O23 - Service: NVIDIA Stereoscopic 3D Driver Service (Stereo Service) - NVIDIA Corporation - C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe
O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\Windows\system32\UI0Detect.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vaultsvc.dll,-1003 (VaultSvc) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\Windows\System32\vds.exe (file missing)
O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\Windows\system32\vssvc.exe (file missing)
O23 - Service: @%SystemRoot%\system32\Wat\WatUX.exe,-601 (WatAdminSvc) - Unknown owner - C:\Windows\system32\Wat\WatAdminSvc.exe (file missing)
O23 - Service: @%systemroot%\system32\wbengine.exe,-104 (wbengine) - Unknown owner - C:\Windows\system32\wbengine.exe (file missing)
O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\Windows\system32\wbem\WmiApSrv.exe (file missing)
O23 - Service: @%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing)
--
End of file - 8632 bytes
Prosím o kontrolu Vyřešeno
- Orcus
- člen Security týmu
-
Elite Level 10.5
- Příspěvky: 10645
- Registrován: duben 10
- Bydliště: Okolo rostou 3 růže =o)
- Pohlaví:
- Stav:
Offline
Re: Prosím o kontrolu
Stáhni si ATF Cleaner
Poklepej na ATF Cleaner.exe, klikni na select all found, poté:
-Když používáš Firefox (Mozzila), klikni na Firefox nahoře a vyber: Select All, poté klikni na Empty Selected.
-Když používáš Operu, klikni nahoře na Operu a vyber: Select All, poté klikni na Empty Selected. Poté klikni na Main (hlavní stránku ) a klikni na Empty Selected.
Po vyčištění klikni na Exit k zavření programu.
ATF-Cleaner je jednoduchý nástroj na odstranění historie z webového prohlížeče. Program dokáže odstranit cache, cookies, historii a další stopy po surfování na Internetu. Mezi podporované prohlížeče patří Internet Explorer, Firefox a Opera. Aplikace navíc umí odstranit dočasné soubory Windows, vysypat koš atd.
- Pokud používáš jen Google Chrome , tak ATF nemusíš použít.
===================================================
Stáhni si TFC
Otevři soubor a zavři všechny ostatní okna, Klikni na Start k zahájení procesu. Program by neměl trvat dlouho.
Poté by se měl PC restartovat, pokud ne , proveď sám.
===================================================
Stáhni AdwCleaner (by Xplode)
Ulož si ho na svojí plochu
Ukonči všechny programy , okna a prohlížeče
Spusť program poklepáním a klikni na „Prohledat-Scan“
Po skenu se objeví log ( jinak je uložen systémovem disku jako AdwCleaner[R?].txt), jeho obsah sem celý vlož.
===================================================
Stáhni si Malwarebytes' Anti-Malware
- Při instalaci odeber zatržítko u „Povolit bezplatnou zkušební verzi Malwarebytes' Anti-Malware Premium“
Nainstaluj a spusť ho
- na konci instalace se ujisti že máš zvoleny/zatrhnuty obě možnosti:
Aktualizace Malwarebytes' Anti-Malware a Spustit aplikaci Malwarebytes' Anti-Malware, pokud jo tak klikni na tlačítko konec
- pokud bude nalezena aktualizace, tak se stáhne a nainstaluje
- program se po té spustí a klikni na Skenovat nyní a
- po proběhnutí programu se ti objeví hláška vpravo dole tak klikni na b] Kopírovat do schránky [/b]a a vlož sem celý log.
- po té klikni na tlačítko Exit, objeví se ti hláška tak zvol Ano
(zatím nic nemaž!).
Pokud budou problémy , spusť v nouz. režimu.
Poklepej na ATF Cleaner.exe, klikni na select all found, poté:
-Když používáš Firefox (Mozzila), klikni na Firefox nahoře a vyber: Select All, poté klikni na Empty Selected.
-Když používáš Operu, klikni nahoře na Operu a vyber: Select All, poté klikni na Empty Selected. Poté klikni na Main (hlavní stránku ) a klikni na Empty Selected.
Po vyčištění klikni na Exit k zavření programu.
ATF-Cleaner je jednoduchý nástroj na odstranění historie z webového prohlížeče. Program dokáže odstranit cache, cookies, historii a další stopy po surfování na Internetu. Mezi podporované prohlížeče patří Internet Explorer, Firefox a Opera. Aplikace navíc umí odstranit dočasné soubory Windows, vysypat koš atd.
- Pokud používáš jen Google Chrome , tak ATF nemusíš použít.
===================================================
Stáhni si TFC
Otevři soubor a zavři všechny ostatní okna, Klikni na Start k zahájení procesu. Program by neměl trvat dlouho.
Poté by se měl PC restartovat, pokud ne , proveď sám.
===================================================
Stáhni AdwCleaner (by Xplode)
Ulož si ho na svojí plochu
Ukonči všechny programy , okna a prohlížeče
Spusť program poklepáním a klikni na „Prohledat-Scan“
Po skenu se objeví log ( jinak je uložen systémovem disku jako AdwCleaner[R?].txt), jeho obsah sem celý vlož.
===================================================
Stáhni si Malwarebytes' Anti-Malware
- Při instalaci odeber zatržítko u „Povolit bezplatnou zkušební verzi Malwarebytes' Anti-Malware Premium“
Nainstaluj a spusť ho
- na konci instalace se ujisti že máš zvoleny/zatrhnuty obě možnosti:
Aktualizace Malwarebytes' Anti-Malware a Spustit aplikaci Malwarebytes' Anti-Malware, pokud jo tak klikni na tlačítko konec
- pokud bude nalezena aktualizace, tak se stáhne a nainstaluje
- program se po té spustí a klikni na Skenovat nyní a
- po proběhnutí programu se ti objeví hláška vpravo dole tak klikni na b] Kopírovat do schránky [/b]a a vlož sem celý log.
- po té klikni na tlačítko Exit, objeví se ti hláška tak zvol Ano
(zatím nic nemaž!).
Pokud budou problémy , spusť v nouz. režimu.
Láska hřeje, ale uhlí je uhlí.
Log z HJT vkládejte do HJT sekce. Je-li moc dlouhý, rozděl jej do více zpráv.
Pár rad k bezpečnosti PC.
Po dobu mé nepřítomnosti mě zastupuje memphisto, jaro3 a Diallix
Pokud budete spokojeni , můžete podpořit naše fórum.

Log z HJT vkládejte do HJT sekce. Je-li moc dlouhý, rozděl jej do více zpráv.
Pár rad k bezpečnosti PC.
Po dobu mé nepřítomnosti mě zastupuje memphisto, jaro3 a Diallix
Pokud budete spokojeni , můžete podpořit naše fórum.
Re: Prosím o kontrolu
# AdwCleaner v4.108 - Report created 21/01/2015 at 18:12:06
# Updated 17/01/2015 by Xplode
# Database : 2015-01-18.1 [Live]
# Operating System : Windows 7 Ultimate Service Pack 1 (64 bits)
# Username : jarda - JARDA-PC
# Running from : C:\Users\jarda\Desktop\AdwCleaner.exe
# Option : Scan
***** [ Services ] *****
Service Found : globalUpdate
Service Found : globalUpdatem
Service Found : SPBIUpd
Service Found : SPBIUpdd
Service Found : {3ccdf8a3-c4bd-43a9-8881-19acc521372a}Gw64
Service Found : {670b17cf-f53d-46d2-a0f0-771be0b4f802}Gw64
Service Found : {6a42a827-4aa4-4407-9673-d01c0f4ec37d}Gw64
Service Found : {7594955a-29b6-4548-9263-89299555d649}Gw64
Service Found : {e3c33c98-5fdc-480c-9fe0-e550c4468a4b}Gw64
Service Found : {fb6e2902-a029-4535-854a-1a69a22df5f7}Gw64
Service Found : {fee70205-e9b9-40aa-9da7-7766876eede2}Gw64
***** [ Files / Folders ] *****
File Found : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_www.superfish.com_0.localstorage
File Found : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_www.superfish.com_0.localstorage-journal
File Found : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxps_www.superfish.com_0.localstorage
File Found : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxps_www.superfish.com_0.localstorage-journal
File Found : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_ljefoakgfhcoeobgicjgejglnpfpemgb_0.localstorage
File Found : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_ljefoakgfhcoeobgicjgejglnpfpemgb_0.localstorage-journal
File Found : C:\Windows\System32\drivers\{3ccdf8a3-c4bd-43a9-8881-19acc521372a}Gw64.sys
File Found : C:\Windows\System32\drivers\{670b17cf-f53d-46d2-a0f0-771be0b4f802}Gw64.sys
File Found : C:\Windows\System32\drivers\{6a42a827-4aa4-4407-9673-d01c0f4ec37d}Gw64.sys
File Found : C:\Windows\System32\drivers\{7594955a-29b6-4548-9263-89299555d649}Gw64.sys
File Found : C:\Windows\System32\drivers\{e3c33c98-5fdc-480c-9fe0-e550c4468a4b}Gw64.sys
File Found : C:\Windows\System32\drivers\{fb6e2902-a029-4535-854a-1a69a22df5f7}Gw64.sys
File Found : C:\Windows\System32\drivers\{fee70205-e9b9-40aa-9da7-7766876eede2}Gw64.sys
Folder Found : C:\Program Files (x86)\1clickmoviedownloader.com
Folder Found : C:\Program Files (x86)\driver-soft
Folder Found : C:\Program Files (x86)\globalUpdate
Folder Found : C:\Program Files (x86)\GreenTree Applications
Folder Found : C:\Program Files (x86)\TotalPlusHD-3.1V21.01
Folder Found : C:\ProgramData\11323777193025868231
Folder Found : C:\ProgramData\9d26235c71fa11c7
Folder Found : C:\ProgramData\aa7a59ba00004584
Folder Found : C:\ProgramData\DealExpress
Folder Found : C:\ProgramData\drivergenius
Folder Found : C:\ProgramData\EnjoyCoupon
Folder Found : C:\ProgramData\GreatSave4U
Folder Found : C:\ProgramData\IHProtectUpDate
Folder Found : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ytd video downloader
Folder Found : C:\ProgramData\MinimumPrice
Folder Found : C:\ProgramData\RegClean
Folder Found : C:\ProgramData\SaveLots
Folder Found : C:\ProgramData\ShopperPro
Folder Found : C:\ProgramData\smdmf
Folder Found : C:\ProgramData\takeorleave
Folder Found : C:\ProgramData\takeshop
Folder Found : C:\ProgramData\The AdBlocker
Folder Found : C:\ProgramData\Trusted Publisher
Folder Found : C:\ProgramData\WindowsMangerProtect
Folder Found : C:\ProgramData\ytd video downloader
Folder Found : C:\Users\jarda\AppData\Local\BoBrowser
Folder Found : C:\Users\jarda\AppData\Local\cool_mirage
Folder Found : C:\Users\jarda\AppData\Local\CrashRpt
Folder Found : C:\Users\jarda\AppData\Local\Doctor_PC
Folder Found : C:\Users\jarda\AppData\Local\globalUpdate
Folder Found : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Extensions\ljefoakgfhcoeobgicjgejglnpfpemgb
Folder Found : C:\Users\jarda\AppData\Roaming\DownloadManager
Folder Found : C:\Users\jarda\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\1clickmoviedownloader.com
Folder Found : C:\Users\jarda\AppData\Roaming\mystartsearch
Folder Found : C:\Users\Public\Documents\drivergenius
Folder Found : C:\Users\Public\Documents\Goobzo
Folder Found : C:\Users\Public\Documents\ShopperPro
Folder Found : C:\Users\Public\Documents\YTAHelper
***** [ Scheduled Tasks ] *****
Task Found : globalUpdateUpdateTaskMachineCore
Task Found : globalUpdateUpdateTaskMachineUA
Task Found : Run_Bobby_Browser
Task Found : DoctorPC_Popup
Task Found : DoctorPC_Start
Task Found : 3e329dd9-cb68-4927-a70d-9e6ccc3a6551-1
Task Found : 3e329dd9-cb68-4927-a70d-9e6ccc3a6551-10_user
Task Found : 3e329dd9-cb68-4927-a70d-9e6ccc3a6551-2
Task Found : 3e329dd9-cb68-4927-a70d-9e6ccc3a6551-3
Task Found : 3e329dd9-cb68-4927-a70d-9e6ccc3a6551-5
Task Found : 3e329dd9-cb68-4927-a70d-9e6ccc3a6551-5_user
Task Found : 3e329dd9-cb68-4927-a70d-9e6ccc3a6551-6
Task Found : 3e329dd9-cb68-4927-a70d-9e6ccc3a6551-7
***** [ Shortcuts ] *****
***** [ Registry ] *****
Data Found : HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\Google Chrome\shell\open\command [(Default)] - "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" hxxp://www.mystartsearch.com/?type=sc&t ... 7747018B69
Key Found : HKCU\Software\1ClickDownload
Key Found : HKCU\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}
Key Found : HKCU\Software\AppDataLow\Software\Crossrider
Key Found : HKCU\Software\AppDataLow\Software\TotalPlusHD-3.1V21.01
Key Found : HKCU\Software\CToolbar
Key Found : HKCU\Software\GlobalUpdate
Key Found : HKCU\Software\Goobzo
Key Found : HKCU\Software\InstalledBrowserExtensions
Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}
Key Found : HKCU\Software\SmdmF
Key Found : [x64] HKCU\Software\1ClickDownload
Key Found : [x64] HKCU\Software\CToolbar
Key Found : [x64] HKCU\Software\GlobalUpdate
Key Found : [x64] HKCU\Software\Goobzo
Key Found : [x64] HKCU\Software\InstalledBrowserExtensions
Key Found : [x64] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}
Key Found : [x64] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}
Key Found : [x64] HKCU\Software\SmdmF
Key Found : HKLM\SOFTWARE\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}
Key Found : HKLM\SOFTWARE\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0}
Key Found : HKLM\SOFTWARE\Clara
Key Found : HKLM\SOFTWARE\Classes\AppID\{3278F5CF-48F3-4253-A6BB-004CE84AF492}
Key Found : HKLM\SOFTWARE\Classes\AppID\{577975B8-C40E-43E6-B0DE-4C6B44088B52}
Key Found : HKLM\SOFTWARE\Classes\AppID\{C007DADD-132A-624C-088E-59EE6CF0711F}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{02A96331-0CA6-40E2-A87D-C224601985EB}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{059EACC2-1ABE-49E8-928D-DC8BD355B7A9}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{0da81a3f-0bd4-4a08-8f5c-5ba6e78a35dd}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{11111111-1111-1111-1111-110611321185}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{22222222-2222-2222-2222-220622322285}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{3278F5CF-48F3-4253-A6BB-004CE84AF492}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{3B5702BA-7F4C-4D1A-B026-1E9A01D43978}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{5645E0E7-FC12-43BF-A6E4-F9751942B298}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{577975B8-C40E-43E6-B0DE-4C6B44088B52}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{5A4E3A41-FA55-4BDA-AED7-CEBE6E7BCB52}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{5E89ACE9-E16B-499A-87B4-0DBF742404C1}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{69F256DF-BA98-45E9-86EA-FC3CFECF9D30}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{6E87FC94-9866-49B9-8E93-5736D6DE3DD7}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{7E49F793-B3CD-4BF7-8419-B34B8BD30E61}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{834469E3-CA2B-4F21-A5CA-4F6F4DBCDE87}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{8529FAA3-5BFD-43C1-AB35-B53C4B96C6E5}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{ADBC39BE-3D20-4333-8D99-E91EB1B62474}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{C7BF8F4B-7BC7-4F42-B944-3D28A3A86D8A}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{ca8b3504-08fe-4411-9b6c-a08e26de2ded}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{CFC47BB5-5FB5-4AD0-8427-6AA04334A3FC}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{E06CA7F5-BA34-4FF6-8D24-B1BDC594D91F}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{E0ADB535-D7B5-4D8B-B15D-578BDD20D76A}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{F6421EE5-A5BE-4D31-81D5-C16B7BF48E4C}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{FD8E81D0-F5FE-4CB1-9AEA-1E163D2BAB78}
Key Found : HKLM\SOFTWARE\Classes\globalUpdate.OneClickCtrl.10
Key Found : HKLM\SOFTWARE\Classes\globalUpdate.OneClickProcessLauncherMachine
Key Found : HKLM\SOFTWARE\Classes\globalUpdate.OneClickProcessLauncherMachine.1.0
Key Found : HKLM\SOFTWARE\Classes\globalUpdate.Update3WebControl.4
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.CoCreateAsync
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.CoCreateAsync.1.0
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.CoreClass
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.CoreClass.1
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.CoreMachineClass
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.CoreMachineClass.1
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.CredentialDialogMachine
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.CredentialDialogMachine.1.0
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.OnDemandCOMClassMachine
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.OnDemandCOMClassMachine.1.0
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.OnDemandCOMClassMachineFallback
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.OnDemandCOMClassMachineFallback.1.0
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.OnDemandCOMClassSvc
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.OnDemandCOMClassSvc.1.0
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.ProcessLauncher
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.ProcessLauncher.1.0
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.Update3COMClassService
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.Update3COMClassService.1.0
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.Update3WebMachine
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.Update3WebMachine.1.0
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.Update3WebMachineFallback
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.Update3WebMachineFallback.1.0
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.Update3WebSvc
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.Update3WebSvc.1.0
Key Found : HKLM\SOFTWARE\Classes\Interface\{4613B1C1-FBC0-43C3-A4B9-B1D6CD360BB3}
Key Found : HKLM\SOFTWARE\Classes\Interface\{4E6354DE-9115-4AEE-BD21-C46C3E8A49DB}
Key Found : HKLM\SOFTWARE\Classes\Interface\{55555555-5555-5555-5555-550655325585}
Key Found : HKLM\SOFTWARE\Classes\Interface\{66666666-6666-6666-6666-660666326685}
Key Found : HKLM\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}
Key Found : HKLM\SOFTWARE\Classes\Interface\{FC073BDA-C115-4A1D-9DF9-9B5C461482E5}
Key Found : HKLM\SOFTWARE\Classes\P0da81a3f_0bd4_4a08_8f5c_5ba6e78a35dd_.P0da81a3f_0bd4_4a08_8f5c_5ba6e78a35dd_
Key Found : HKLM\SOFTWARE\Classes\P0da81a3f_0bd4_4a08_8f5c_5ba6e78a35dd_.P0da81a3f_0bd4_4a08_8f5c_5ba6e78a35dd_.9
Key Found : HKLM\SOFTWARE\Classes\Pca8b3504_08fe_4411_9b6c_a08e26de2ded_.Pca8b3504_08fe_4411_9b6c_a08e26de2ded_
Key Found : HKLM\SOFTWARE\Classes\Pca8b3504_08fe_4411_9b6c_a08e26de2ded_.Pca8b3504_08fe_4411_9b6c_a08e26de2ded_.9
Key Found : HKLM\SOFTWARE\Classes\speedupmypc
Key Found : HKLM\SOFTWARE\Classes\TypeLib\{44444444-4444-4444-4444-440644324485}
Key Found : HKLM\SOFTWARE\Classes\TypeLib\{44444444-4444-4444-4444-440644324485}
Key Found : HKLM\SOFTWARE\Classes\TypeLib\{726E90BE-DC22-4965-B215-E0784DC26F47}
Key Found : HKLM\SOFTWARE\Classes\TypeLib\{A2D733A7-73B0-4C6B-B0C7-06A432950B66}
Key Found : HKLM\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}
Key Found : HKLM\SOFTWARE\CToolbar
Key Found : HKLM\SOFTWARE\Driver-Soft
Key Found : HKLM\SOFTWARE\GlobalUpdate
Key Found : HKLM\SOFTWARE\IHProtect
Key Found : HKLM\SOFTWARE\InstalledBrowserExtensions
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5645E0E7-FC12-43BF-A6E4-F9751942B298}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5E89ACE9-E16B-499A-87B4-0DBF742404C1}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{968c07bf-bb22-4a66-899b-d5ba72a6e3a0}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C7BF8F4B-7BC7-4F42-B944-3D28A3A86D8A}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{e2cdcae0-6c26-485c-becb-6ce2248057a9}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2503}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{11111111-1111-1111-1111-110611321185}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{0da81a3f-0bd4-4a08-8f5c-5ba6e78a35dd}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{5645E0E7-FC12-43BF-A6E4-F9751942B298}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{A5A51D2A-505A-4D84-AFC6-E0FA87E47B8C}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{C7BF8F4B-7BC7-4F42-B944-3D28A3A86D8A}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{ca8b3504-08fe-4411-9b6c-a08e26de2ded}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{FCE3FA8B-BA81-467C-81D8-E43C00D1BC71}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1a413f37-ed88-4fec-9666-5c48dc4b7bb7}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{37476589-E48E-439E-A706-56189E2ED4C4}_is1
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{37476589-E48E-439E-A706-56189E2ED4C4}_is1
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\1ClickDownload
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Driver Genius Professional Edition_is1
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\S-4158465188
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\TotalPlusHD-3.1V21.01
Key Found : HKLM\SOFTWARE\MozillaPlugins\@staging.google.com/globalUpdate Update;version=10
Key Found : HKLM\SOFTWARE\MozillaPlugins\@staging.google.com/globalUpdate Update;version=4
Key Found : HKLM\SOFTWARE\mystartsearchSoftware
Key Found : HKLM\SOFTWARE\omiga-plusSoftware
Key Found : HKLM\SOFTWARE\PIP
Key Found : HKLM\SOFTWARE\SmdmF
Key Found : HKLM\SOFTWARE\Solvusoft
Key Found : HKLM\SOFTWARE\SupDp
Key Found : HKLM\SOFTWARE\SupTab
Key Found : HKLM\SOFTWARE\TotalPlusHD-3.1V21.01
Key Found : HKLM\SYSTEM\CurrentControlSet\Services\Eventlog\Application\WindowsMangerProtect
Key Found : [x64] HKLM\SOFTWARE\Classes\CLSID\{0da81a3f-0bd4-4a08-8f5c-5ba6e78a35dd}
Key Found : [x64] HKLM\SOFTWARE\Classes\CLSID\{11111111-1111-1111-1111-110611321185}
Key Found : [x64] HKLM\SOFTWARE\Classes\CLSID\{22222222-2222-2222-2222-220622322285}
Key Found : [x64] HKLM\SOFTWARE\Classes\CLSID\{5A4E3A41-FA55-4BDA-AED7-CEBE6E7BCB52}
Key Found : [x64] HKLM\SOFTWARE\Classes\CLSID\{ca8b3504-08fe-4411-9b6c-a08e26de2ded}
Key Found : [x64] HKLM\SOFTWARE\Classes\Interface\{4613B1C1-FBC0-43C3-A4B9-B1D6CD360BB3}
Key Found : [x64] HKLM\SOFTWARE\Classes\Interface\{4E6354DE-9115-4AEE-BD21-C46C3E8A49DB}
Key Found : [x64] HKLM\SOFTWARE\Classes\Interface\{55555555-5555-5555-5555-550655325585}
Key Found : [x64] HKLM\SOFTWARE\Classes\Interface\{66666666-6666-6666-6666-660666326685}
Key Found : [x64] HKLM\SOFTWARE\Classes\Interface\{917CAAE9-DD47-4025-936E-1414F07DF5B8}
Key Found : [x64] HKLM\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}
Key Found : [x64] HKLM\SOFTWARE\Classes\Interface\{FC073BDA-C115-4A1D-9DF9-9B5C461482E5}
Key Found : [x64] HKLM\SOFTWARE\InstalledBrowserExtensions
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{968c07bf-bb22-4a66-899b-d5ba72a6e3a0}
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{e2cdcae0-6c26-485c-becb-6ce2248057a9}
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2503}
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2503}
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{11111111-1111-1111-1111-110611321185}
Key Found : [x64] HKLM\SOFTWARE\ShopperPro
***** [ Browsers ] *****
-\\ Internet Explorer v11.0.9600.17496
Setting Found : HKCU\Software\Microsoft\Internet Explorer\Main [Search Page] - hxxp://isearch.omiga-plus.com/web/?type ... QJ6Y5N4&q={searchTerms}
Setting Found : HKCU\Software\Microsoft\Internet Explorer\Main [Default_Page_URL] - hxxp://www.mystartsearch.com/?type=hp&t ... 7747018B69
Setting Found : HKCU\Software\Microsoft\Internet Explorer\Main [Default_Search_URL] - hxxp://isearch.omiga-plus.com/web/?type ... QJ6Y5N4&q={searchTerms}
Setting Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Default_Search_URL] - hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
Setting Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Default_Page_URL] - hxxp://www.mystartsearch.com/?type=hp&t ... 7747018B69
Setting Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Start Page] - hxxp://www.mystartsearch.com/?type=hp&t ... 7747018B69
Setting Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Search Page] - hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
Setting Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Default_Search_URL] - hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
Setting Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Default_Page_URL] - hxxp://www.mystartsearch.com/?type=hp&t ... 7747018B69
Setting Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Start Page] - hxxp://www.mystartsearch.com/?type=hp&t ... 7747018B69
Setting Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Search Page] - hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
-\\ Google Chrome v39.0.2171.95
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web data] - Found [Search Provider] : hxxp://www.default-search.net/search?si ... &src=ds&p={searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web data] - Found [Search Provider] : hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web data] - Found [Search Provider] : hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web data] - Found [Search Provider] : hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web data] - Found [Search Provider] : hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web data] - Found [Search Provider] : hxxp://en.softonic.com/s/{searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Found [Extension] : ljefoakgfhcoeobgicjgejglnpfpemgb
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Found [Startup_URLs] : hxxp://search.gboxapp.com/
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Found [Startup_URLs] : hxxp://isearch.omiga-plus.com/?type=hpp ... XX9QJ6Y5N4
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Found [Startup_URLs] : hxxp://www.mystartsearch.com/?type=hp&t ... 7747018B69
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Found [Startup_URLs] : hxxp://isearch.omiga-plus.com/?type=hpp ... XX9QJ6Y5N4
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Found [Startup_URLs] : hxxp://www.mystartsearch.com/?type=hp&t ... 7747018B69
*************************
AdwCleaner[R0].txt - [22186 octets] - [21/01/2015 18:12:06]
########## EOF - C:\AdwCleaner\AdwCleaner[R0].txt - [22247 octets] ##########
# Updated 17/01/2015 by Xplode
# Database : 2015-01-18.1 [Live]
# Operating System : Windows 7 Ultimate Service Pack 1 (64 bits)
# Username : jarda - JARDA-PC
# Running from : C:\Users\jarda\Desktop\AdwCleaner.exe
# Option : Scan
***** [ Services ] *****
Service Found : globalUpdate
Service Found : globalUpdatem
Service Found : SPBIUpd
Service Found : SPBIUpdd
Service Found : {3ccdf8a3-c4bd-43a9-8881-19acc521372a}Gw64
Service Found : {670b17cf-f53d-46d2-a0f0-771be0b4f802}Gw64
Service Found : {6a42a827-4aa4-4407-9673-d01c0f4ec37d}Gw64
Service Found : {7594955a-29b6-4548-9263-89299555d649}Gw64
Service Found : {e3c33c98-5fdc-480c-9fe0-e550c4468a4b}Gw64
Service Found : {fb6e2902-a029-4535-854a-1a69a22df5f7}Gw64
Service Found : {fee70205-e9b9-40aa-9da7-7766876eede2}Gw64
***** [ Files / Folders ] *****
File Found : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_www.superfish.com_0.localstorage
File Found : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_www.superfish.com_0.localstorage-journal
File Found : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxps_www.superfish.com_0.localstorage
File Found : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxps_www.superfish.com_0.localstorage-journal
File Found : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_ljefoakgfhcoeobgicjgejglnpfpemgb_0.localstorage
File Found : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_ljefoakgfhcoeobgicjgejglnpfpemgb_0.localstorage-journal
File Found : C:\Windows\System32\drivers\{3ccdf8a3-c4bd-43a9-8881-19acc521372a}Gw64.sys
File Found : C:\Windows\System32\drivers\{670b17cf-f53d-46d2-a0f0-771be0b4f802}Gw64.sys
File Found : C:\Windows\System32\drivers\{6a42a827-4aa4-4407-9673-d01c0f4ec37d}Gw64.sys
File Found : C:\Windows\System32\drivers\{7594955a-29b6-4548-9263-89299555d649}Gw64.sys
File Found : C:\Windows\System32\drivers\{e3c33c98-5fdc-480c-9fe0-e550c4468a4b}Gw64.sys
File Found : C:\Windows\System32\drivers\{fb6e2902-a029-4535-854a-1a69a22df5f7}Gw64.sys
File Found : C:\Windows\System32\drivers\{fee70205-e9b9-40aa-9da7-7766876eede2}Gw64.sys
Folder Found : C:\Program Files (x86)\1clickmoviedownloader.com
Folder Found : C:\Program Files (x86)\driver-soft
Folder Found : C:\Program Files (x86)\globalUpdate
Folder Found : C:\Program Files (x86)\GreenTree Applications
Folder Found : C:\Program Files (x86)\TotalPlusHD-3.1V21.01
Folder Found : C:\ProgramData\11323777193025868231
Folder Found : C:\ProgramData\9d26235c71fa11c7
Folder Found : C:\ProgramData\aa7a59ba00004584
Folder Found : C:\ProgramData\DealExpress
Folder Found : C:\ProgramData\drivergenius
Folder Found : C:\ProgramData\EnjoyCoupon
Folder Found : C:\ProgramData\GreatSave4U
Folder Found : C:\ProgramData\IHProtectUpDate
Folder Found : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ytd video downloader
Folder Found : C:\ProgramData\MinimumPrice
Folder Found : C:\ProgramData\RegClean
Folder Found : C:\ProgramData\SaveLots
Folder Found : C:\ProgramData\ShopperPro
Folder Found : C:\ProgramData\smdmf
Folder Found : C:\ProgramData\takeorleave
Folder Found : C:\ProgramData\takeshop
Folder Found : C:\ProgramData\The AdBlocker
Folder Found : C:\ProgramData\Trusted Publisher
Folder Found : C:\ProgramData\WindowsMangerProtect
Folder Found : C:\ProgramData\ytd video downloader
Folder Found : C:\Users\jarda\AppData\Local\BoBrowser
Folder Found : C:\Users\jarda\AppData\Local\cool_mirage
Folder Found : C:\Users\jarda\AppData\Local\CrashRpt
Folder Found : C:\Users\jarda\AppData\Local\Doctor_PC
Folder Found : C:\Users\jarda\AppData\Local\globalUpdate
Folder Found : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Extensions\ljefoakgfhcoeobgicjgejglnpfpemgb
Folder Found : C:\Users\jarda\AppData\Roaming\DownloadManager
Folder Found : C:\Users\jarda\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\1clickmoviedownloader.com
Folder Found : C:\Users\jarda\AppData\Roaming\mystartsearch
Folder Found : C:\Users\Public\Documents\drivergenius
Folder Found : C:\Users\Public\Documents\Goobzo
Folder Found : C:\Users\Public\Documents\ShopperPro
Folder Found : C:\Users\Public\Documents\YTAHelper
***** [ Scheduled Tasks ] *****
Task Found : globalUpdateUpdateTaskMachineCore
Task Found : globalUpdateUpdateTaskMachineUA
Task Found : Run_Bobby_Browser
Task Found : DoctorPC_Popup
Task Found : DoctorPC_Start
Task Found : 3e329dd9-cb68-4927-a70d-9e6ccc3a6551-1
Task Found : 3e329dd9-cb68-4927-a70d-9e6ccc3a6551-10_user
Task Found : 3e329dd9-cb68-4927-a70d-9e6ccc3a6551-2
Task Found : 3e329dd9-cb68-4927-a70d-9e6ccc3a6551-3
Task Found : 3e329dd9-cb68-4927-a70d-9e6ccc3a6551-5
Task Found : 3e329dd9-cb68-4927-a70d-9e6ccc3a6551-5_user
Task Found : 3e329dd9-cb68-4927-a70d-9e6ccc3a6551-6
Task Found : 3e329dd9-cb68-4927-a70d-9e6ccc3a6551-7
***** [ Shortcuts ] *****
***** [ Registry ] *****
Data Found : HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\Google Chrome\shell\open\command [(Default)] - "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" hxxp://www.mystartsearch.com/?type=sc&t ... 7747018B69
Key Found : HKCU\Software\1ClickDownload
Key Found : HKCU\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}
Key Found : HKCU\Software\AppDataLow\Software\Crossrider
Key Found : HKCU\Software\AppDataLow\Software\TotalPlusHD-3.1V21.01
Key Found : HKCU\Software\CToolbar
Key Found : HKCU\Software\GlobalUpdate
Key Found : HKCU\Software\Goobzo
Key Found : HKCU\Software\InstalledBrowserExtensions
Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}
Key Found : HKCU\Software\SmdmF
Key Found : [x64] HKCU\Software\1ClickDownload
Key Found : [x64] HKCU\Software\CToolbar
Key Found : [x64] HKCU\Software\GlobalUpdate
Key Found : [x64] HKCU\Software\Goobzo
Key Found : [x64] HKCU\Software\InstalledBrowserExtensions
Key Found : [x64] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}
Key Found : [x64] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}
Key Found : [x64] HKCU\Software\SmdmF
Key Found : HKLM\SOFTWARE\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}
Key Found : HKLM\SOFTWARE\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0}
Key Found : HKLM\SOFTWARE\Clara
Key Found : HKLM\SOFTWARE\Classes\AppID\{3278F5CF-48F3-4253-A6BB-004CE84AF492}
Key Found : HKLM\SOFTWARE\Classes\AppID\{577975B8-C40E-43E6-B0DE-4C6B44088B52}
Key Found : HKLM\SOFTWARE\Classes\AppID\{C007DADD-132A-624C-088E-59EE6CF0711F}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{02A96331-0CA6-40E2-A87D-C224601985EB}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{059EACC2-1ABE-49E8-928D-DC8BD355B7A9}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{0da81a3f-0bd4-4a08-8f5c-5ba6e78a35dd}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{11111111-1111-1111-1111-110611321185}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{22222222-2222-2222-2222-220622322285}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{3278F5CF-48F3-4253-A6BB-004CE84AF492}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{3B5702BA-7F4C-4D1A-B026-1E9A01D43978}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{5645E0E7-FC12-43BF-A6E4-F9751942B298}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{577975B8-C40E-43E6-B0DE-4C6B44088B52}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{5A4E3A41-FA55-4BDA-AED7-CEBE6E7BCB52}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{5E89ACE9-E16B-499A-87B4-0DBF742404C1}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{69F256DF-BA98-45E9-86EA-FC3CFECF9D30}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{6E87FC94-9866-49B9-8E93-5736D6DE3DD7}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{7E49F793-B3CD-4BF7-8419-B34B8BD30E61}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{834469E3-CA2B-4F21-A5CA-4F6F4DBCDE87}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{8529FAA3-5BFD-43C1-AB35-B53C4B96C6E5}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{ADBC39BE-3D20-4333-8D99-E91EB1B62474}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{C7BF8F4B-7BC7-4F42-B944-3D28A3A86D8A}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{ca8b3504-08fe-4411-9b6c-a08e26de2ded}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{CFC47BB5-5FB5-4AD0-8427-6AA04334A3FC}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{E06CA7F5-BA34-4FF6-8D24-B1BDC594D91F}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{E0ADB535-D7B5-4D8B-B15D-578BDD20D76A}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{F6421EE5-A5BE-4D31-81D5-C16B7BF48E4C}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{FD8E81D0-F5FE-4CB1-9AEA-1E163D2BAB78}
Key Found : HKLM\SOFTWARE\Classes\globalUpdate.OneClickCtrl.10
Key Found : HKLM\SOFTWARE\Classes\globalUpdate.OneClickProcessLauncherMachine
Key Found : HKLM\SOFTWARE\Classes\globalUpdate.OneClickProcessLauncherMachine.1.0
Key Found : HKLM\SOFTWARE\Classes\globalUpdate.Update3WebControl.4
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.CoCreateAsync
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.CoCreateAsync.1.0
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.CoreClass
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.CoreClass.1
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.CoreMachineClass
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.CoreMachineClass.1
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.CredentialDialogMachine
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.CredentialDialogMachine.1.0
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.OnDemandCOMClassMachine
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.OnDemandCOMClassMachine.1.0
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.OnDemandCOMClassMachineFallback
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.OnDemandCOMClassMachineFallback.1.0
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.OnDemandCOMClassSvc
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.OnDemandCOMClassSvc.1.0
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.ProcessLauncher
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.ProcessLauncher.1.0
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.Update3COMClassService
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.Update3COMClassService.1.0
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.Update3WebMachine
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.Update3WebMachine.1.0
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.Update3WebMachineFallback
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.Update3WebMachineFallback.1.0
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.Update3WebSvc
Key Found : HKLM\SOFTWARE\Classes\globalUpdateUpdate.Update3WebSvc.1.0
Key Found : HKLM\SOFTWARE\Classes\Interface\{4613B1C1-FBC0-43C3-A4B9-B1D6CD360BB3}
Key Found : HKLM\SOFTWARE\Classes\Interface\{4E6354DE-9115-4AEE-BD21-C46C3E8A49DB}
Key Found : HKLM\SOFTWARE\Classes\Interface\{55555555-5555-5555-5555-550655325585}
Key Found : HKLM\SOFTWARE\Classes\Interface\{66666666-6666-6666-6666-660666326685}
Key Found : HKLM\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}
Key Found : HKLM\SOFTWARE\Classes\Interface\{FC073BDA-C115-4A1D-9DF9-9B5C461482E5}
Key Found : HKLM\SOFTWARE\Classes\P0da81a3f_0bd4_4a08_8f5c_5ba6e78a35dd_.P0da81a3f_0bd4_4a08_8f5c_5ba6e78a35dd_
Key Found : HKLM\SOFTWARE\Classes\P0da81a3f_0bd4_4a08_8f5c_5ba6e78a35dd_.P0da81a3f_0bd4_4a08_8f5c_5ba6e78a35dd_.9
Key Found : HKLM\SOFTWARE\Classes\Pca8b3504_08fe_4411_9b6c_a08e26de2ded_.Pca8b3504_08fe_4411_9b6c_a08e26de2ded_
Key Found : HKLM\SOFTWARE\Classes\Pca8b3504_08fe_4411_9b6c_a08e26de2ded_.Pca8b3504_08fe_4411_9b6c_a08e26de2ded_.9
Key Found : HKLM\SOFTWARE\Classes\speedupmypc
Key Found : HKLM\SOFTWARE\Classes\TypeLib\{44444444-4444-4444-4444-440644324485}
Key Found : HKLM\SOFTWARE\Classes\TypeLib\{44444444-4444-4444-4444-440644324485}
Key Found : HKLM\SOFTWARE\Classes\TypeLib\{726E90BE-DC22-4965-B215-E0784DC26F47}
Key Found : HKLM\SOFTWARE\Classes\TypeLib\{A2D733A7-73B0-4C6B-B0C7-06A432950B66}
Key Found : HKLM\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}
Key Found : HKLM\SOFTWARE\CToolbar
Key Found : HKLM\SOFTWARE\Driver-Soft
Key Found : HKLM\SOFTWARE\GlobalUpdate
Key Found : HKLM\SOFTWARE\IHProtect
Key Found : HKLM\SOFTWARE\InstalledBrowserExtensions
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5645E0E7-FC12-43BF-A6E4-F9751942B298}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5E89ACE9-E16B-499A-87B4-0DBF742404C1}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{968c07bf-bb22-4a66-899b-d5ba72a6e3a0}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C7BF8F4B-7BC7-4F42-B944-3D28A3A86D8A}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{e2cdcae0-6c26-485c-becb-6ce2248057a9}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2503}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{11111111-1111-1111-1111-110611321185}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{0da81a3f-0bd4-4a08-8f5c-5ba6e78a35dd}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{5645E0E7-FC12-43BF-A6E4-F9751942B298}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{A5A51D2A-505A-4D84-AFC6-E0FA87E47B8C}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{C7BF8F4B-7BC7-4F42-B944-3D28A3A86D8A}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{ca8b3504-08fe-4411-9b6c-a08e26de2ded}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{FCE3FA8B-BA81-467C-81D8-E43C00D1BC71}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1a413f37-ed88-4fec-9666-5c48dc4b7bb7}
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{37476589-E48E-439E-A706-56189E2ED4C4}_is1
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{37476589-E48E-439E-A706-56189E2ED4C4}_is1
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\1ClickDownload
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Driver Genius Professional Edition_is1
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\S-4158465188
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter
Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\TotalPlusHD-3.1V21.01
Key Found : HKLM\SOFTWARE\MozillaPlugins\@staging.google.com/globalUpdate Update;version=10
Key Found : HKLM\SOFTWARE\MozillaPlugins\@staging.google.com/globalUpdate Update;version=4
Key Found : HKLM\SOFTWARE\mystartsearchSoftware
Key Found : HKLM\SOFTWARE\omiga-plusSoftware
Key Found : HKLM\SOFTWARE\PIP
Key Found : HKLM\SOFTWARE\SmdmF
Key Found : HKLM\SOFTWARE\Solvusoft
Key Found : HKLM\SOFTWARE\SupDp
Key Found : HKLM\SOFTWARE\SupTab
Key Found : HKLM\SOFTWARE\TotalPlusHD-3.1V21.01
Key Found : HKLM\SYSTEM\CurrentControlSet\Services\Eventlog\Application\WindowsMangerProtect
Key Found : [x64] HKLM\SOFTWARE\Classes\CLSID\{0da81a3f-0bd4-4a08-8f5c-5ba6e78a35dd}
Key Found : [x64] HKLM\SOFTWARE\Classes\CLSID\{11111111-1111-1111-1111-110611321185}
Key Found : [x64] HKLM\SOFTWARE\Classes\CLSID\{22222222-2222-2222-2222-220622322285}
Key Found : [x64] HKLM\SOFTWARE\Classes\CLSID\{5A4E3A41-FA55-4BDA-AED7-CEBE6E7BCB52}
Key Found : [x64] HKLM\SOFTWARE\Classes\CLSID\{ca8b3504-08fe-4411-9b6c-a08e26de2ded}
Key Found : [x64] HKLM\SOFTWARE\Classes\Interface\{4613B1C1-FBC0-43C3-A4B9-B1D6CD360BB3}
Key Found : [x64] HKLM\SOFTWARE\Classes\Interface\{4E6354DE-9115-4AEE-BD21-C46C3E8A49DB}
Key Found : [x64] HKLM\SOFTWARE\Classes\Interface\{55555555-5555-5555-5555-550655325585}
Key Found : [x64] HKLM\SOFTWARE\Classes\Interface\{66666666-6666-6666-6666-660666326685}
Key Found : [x64] HKLM\SOFTWARE\Classes\Interface\{917CAAE9-DD47-4025-936E-1414F07DF5B8}
Key Found : [x64] HKLM\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}
Key Found : [x64] HKLM\SOFTWARE\Classes\Interface\{FC073BDA-C115-4A1D-9DF9-9B5C461482E5}
Key Found : [x64] HKLM\SOFTWARE\InstalledBrowserExtensions
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{968c07bf-bb22-4a66-899b-d5ba72a6e3a0}
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{e2cdcae0-6c26-485c-becb-6ce2248057a9}
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86}
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2503}
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2503}
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{11111111-1111-1111-1111-110611321185}
Key Found : [x64] HKLM\SOFTWARE\ShopperPro
***** [ Browsers ] *****
-\\ Internet Explorer v11.0.9600.17496
Setting Found : HKCU\Software\Microsoft\Internet Explorer\Main [Search Page] - hxxp://isearch.omiga-plus.com/web/?type ... QJ6Y5N4&q={searchTerms}
Setting Found : HKCU\Software\Microsoft\Internet Explorer\Main [Default_Page_URL] - hxxp://www.mystartsearch.com/?type=hp&t ... 7747018B69
Setting Found : HKCU\Software\Microsoft\Internet Explorer\Main [Default_Search_URL] - hxxp://isearch.omiga-plus.com/web/?type ... QJ6Y5N4&q={searchTerms}
Setting Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Default_Search_URL] - hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
Setting Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Default_Page_URL] - hxxp://www.mystartsearch.com/?type=hp&t ... 7747018B69
Setting Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Start Page] - hxxp://www.mystartsearch.com/?type=hp&t ... 7747018B69
Setting Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Search Page] - hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
Setting Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Default_Search_URL] - hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
Setting Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Default_Page_URL] - hxxp://www.mystartsearch.com/?type=hp&t ... 7747018B69
Setting Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Start Page] - hxxp://www.mystartsearch.com/?type=hp&t ... 7747018B69
Setting Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Search Page] - hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
-\\ Google Chrome v39.0.2171.95
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web data] - Found [Search Provider] : hxxp://www.default-search.net/search?si ... &src=ds&p={searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web data] - Found [Search Provider] : hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web data] - Found [Search Provider] : hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web data] - Found [Search Provider] : hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web data] - Found [Search Provider] : hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web data] - Found [Search Provider] : hxxp://en.softonic.com/s/{searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Found [Extension] : ljefoakgfhcoeobgicjgejglnpfpemgb
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Found [Startup_URLs] : hxxp://search.gboxapp.com/
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Found [Startup_URLs] : hxxp://isearch.omiga-plus.com/?type=hpp ... XX9QJ6Y5N4
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Found [Startup_URLs] : hxxp://www.mystartsearch.com/?type=hp&t ... 7747018B69
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Found [Startup_URLs] : hxxp://isearch.omiga-plus.com/?type=hpp ... XX9QJ6Y5N4
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Found [Startup_URLs] : hxxp://www.mystartsearch.com/?type=hp&t ... 7747018B69
*************************
AdwCleaner[R0].txt - [22186 octets] - [21/01/2015 18:12:06]
########## EOF - C:\AdwCleaner\AdwCleaner[R0].txt - [22247 octets] ##########
Re: Prosím o kontrolu
Malwarebytes Anti-Malware
www.malwarebytes.org
Datum skenování: 21.1.2015
Čas skenování: 18:31:21
Protokol: s.txt
Správce: Ano
Verze: 2.00.4.1028
Databáze malwaru: v2015.01.21.08
Databáze rootkitů: v2015.01.14.01
Licence: Bezplatná verze
Ochrana proti malwaru: Vypnuto
Ochrana proti škodlivým webovým stránkám: Vypnuto
Sebeobrany: Vypnuto
OS: Windows 7 Service Pack 1
CPU: x64
Souborový systém: NTFS
Uživatel: jarda
Typ skenu: Sken hrozeb
Výsledek: Dokončeno
Prohledaných objektů: 336785
Uplynulý čas: 5 min, 38 sek
Paměť: Zapnuto
Po spuštění: Zapnuto
Souborový systém: Zapnuto
Archivy: Zapnuto
Rootkity: Vypnuto
Heuristika: Zapnuto
PUP: Zapnuto
PUM: Zapnuto
Procesy: 3
PUP.Optional.Goobzo, C:\Program Files\Common Files\ShopperPro\spbiu.exe, 2420, , [f418c535cfbafe389dc2ef87e520b64a]
PUP.Optional.CrossRider.A, C:\Program Files (x86)\TotalPlusHD-3.1V21.01\3e329dd9-cb68-4927-a70d-9e6ccc3a6551-64.exe, 5028, , [b8548f6b3f4a989e8e53438ec441847c]
PUP.Optional.GlobalUpdate.T, C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe, 2152, , [3bd196646b1e55e1bc068fc7ce35a65a]
Moduly: 1
PUP.Optional.GlobalUpdate.T, C:\Program Files (x86)\globalUpdate\Update\1.3.25.0\goopdate.dll, , [3bd196646b1e55e1bc068fc7ce35a65a],
Klíče registru: 1
PUP.Optional.CrossRider.A, HKLM\SOFTWARE\WOW6432NODE\TotalPlusHD-3.1V21.01-nv, , [69a39b5fbacf55e113efb9cb4eb5fd03],
Hodnoty registru: 0
(Žádné zákerné zjištěny položek)
Data registru: 0
(Žádné zákerné zjištěny položek)
Složky: 6
PUP.Optional.GlobalUpdate.T, C:\Program Files (x86)\globalUpdate\Update, , [3bd196646b1e55e1bc068fc7ce35a65a],
PUP.Optional.GlobalUpdate.T, C:\Program Files (x86)\globalUpdate\Update\1.3.25.0, , [3bd196646b1e55e1bc068fc7ce35a65a],
PUP.Optional.ShopperPro, C:\Program Files\Common Files\ShopperPro, , [5ab28971ff8a1c1a1fc1aeb17a8920e0],
PUP.Optional.CrossRider.A, C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ljefoakgfhcoeobgicjgejglnpfpemgb, , [31db0ded6c1daf87136bee77aa59b749],
PUP.Optional.CrossRider.A, C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\databases\chrome-extension_ljefoakgfhcoeobgicjgejglnpfpemgb_0, , [729aa85242471d1949369dc8ef1436ca],
PUP.Optional.CrossRider.A, C:\Program Files (x86)\TotalPlusHD-3.1V21.01, , [0309f604ed9cda5c1cc32d3853b0d030],
Soubory: 14
PUP.Optional.Goobzo, C:\Program Files\Common Files\ShopperPro\spbiu.exe, , [f418c535cfbafe389dc2ef87e520b64a],
PUP.Optional.CrossRider.A, C:\Program Files (x86)\TotalPlusHD-3.1V21.01\3e329dd9-cb68-4927-a70d-9e6ccc3a6551-64.exe, , [b8548f6b3f4a989e8e53438ec441847c],
PUP.Optional.CrossRider.A, C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_ljefoakgfhcoeobgicjgejglnpfpemgb_0.localstorage, , [907ca753c0c9b58123ab599dfc0839c7],
PUP.Optional.GlobalUpdate.T, C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe, , [3bd196646b1e55e1bc068fc7ce35a65a],
PUP.Optional.GlobalUpdate.T, C:\Program Files (x86)\globalUpdate\Update\1.3.25.0\goopdate.dll, , [3bd196646b1e55e1bc068fc7ce35a65a],
PUP.Optional.ShopperPro, C:\Program Files\Common Files\ShopperPro\spbici64.dll, , [5ab28971ff8a1c1a1fc1aeb17a8920e0],
PUP.Optional.CrossRider.A, C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ljefoakgfhcoeobgicjgejglnpfpemgb\000005.ldb, , [31db0ded6c1daf87136bee77aa59b749],
PUP.Optional.CrossRider.A, C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ljefoakgfhcoeobgicjgejglnpfpemgb\000018.log, , [31db0ded6c1daf87136bee77aa59b749],
PUP.Optional.CrossRider.A, C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ljefoakgfhcoeobgicjgejglnpfpemgb\LOCK, , [31db0ded6c1daf87136bee77aa59b749],
PUP.Optional.CrossRider.A, C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ljefoakgfhcoeobgicjgejglnpfpemgb\LOG, , [31db0ded6c1daf87136bee77aa59b749],
PUP.Optional.CrossRider.A, C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ljefoakgfhcoeobgicjgejglnpfpemgb\MANIFEST-000016, , [31db0ded6c1daf87136bee77aa59b749],
PUP.Optional.CrossRider.A, c:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\databases\chrome-extension_ljefoakgfhcoeobgicjgejglnpfpemgb_0\9, , [729aa85242471d1949369dc8ef1436ca],
PUP.Optional.CrossRider.A, C:\Program Files (x86)\TotalPlusHD-3.1V21.01\6a0bb24e-e013-4925-bf30-8360f219e3ee.dll, , [0309f604ed9cda5c1cc32d3853b0d030],
PUP.Optional.GboxApp.A, C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Preferences, Dobré: (), Špatné: ( "startup_urls": [ "http://search.gboxapp.com/", "http://isearch.omiga-plus.com/?type=hp&ts=1421365687&from=ild&uid=ST31000340NS_9QJ6Y5N4XXXX9QJ6Y5N4", "http://isearch.omiga-plus.com/?type=hppp&ts=1421365722&from=ild&uid=ST31000340NS_9QJ6Y5N4XXXX9QJ6Y5N4", "http://www.google.com/", "http://www.mystartsearch.com/?type=hp&ts=1421706009&from=mp3&uid=KINGSTONXSV300S37A120G_50026B7747018B69", "http://www.mystartsearch.com/?type=hp&ts=1421785948&from=mp3&uid=KINGSTONXSV300S37A120G_50026B7747018B69" ],), ,[45c7ac4e1b6e1b1bb0da6870b94c9d63]
Fyzické sektory: 0
(Žádné zákerné zjištěny položek)
(end)
Bohužel mi bratr smazal vše co bylo v prvním scanu.. bylo tam zhruba přes 400 položek po druhém zbylo jen toto.. Jak koukám tak je PC řádně zavirovaný.. :(
www.malwarebytes.org
Datum skenování: 21.1.2015
Čas skenování: 18:31:21
Protokol: s.txt
Správce: Ano
Verze: 2.00.4.1028
Databáze malwaru: v2015.01.21.08
Databáze rootkitů: v2015.01.14.01
Licence: Bezplatná verze
Ochrana proti malwaru: Vypnuto
Ochrana proti škodlivým webovým stránkám: Vypnuto
Sebeobrany: Vypnuto
OS: Windows 7 Service Pack 1
CPU: x64
Souborový systém: NTFS
Uživatel: jarda
Typ skenu: Sken hrozeb
Výsledek: Dokončeno
Prohledaných objektů: 336785
Uplynulý čas: 5 min, 38 sek
Paměť: Zapnuto
Po spuštění: Zapnuto
Souborový systém: Zapnuto
Archivy: Zapnuto
Rootkity: Vypnuto
Heuristika: Zapnuto
PUP: Zapnuto
PUM: Zapnuto
Procesy: 3
PUP.Optional.Goobzo, C:\Program Files\Common Files\ShopperPro\spbiu.exe, 2420, , [f418c535cfbafe389dc2ef87e520b64a]
PUP.Optional.CrossRider.A, C:\Program Files (x86)\TotalPlusHD-3.1V21.01\3e329dd9-cb68-4927-a70d-9e6ccc3a6551-64.exe, 5028, , [b8548f6b3f4a989e8e53438ec441847c]
PUP.Optional.GlobalUpdate.T, C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe, 2152, , [3bd196646b1e55e1bc068fc7ce35a65a]
Moduly: 1
PUP.Optional.GlobalUpdate.T, C:\Program Files (x86)\globalUpdate\Update\1.3.25.0\goopdate.dll, , [3bd196646b1e55e1bc068fc7ce35a65a],
Klíče registru: 1
PUP.Optional.CrossRider.A, HKLM\SOFTWARE\WOW6432NODE\TotalPlusHD-3.1V21.01-nv, , [69a39b5fbacf55e113efb9cb4eb5fd03],
Hodnoty registru: 0
(Žádné zákerné zjištěny položek)
Data registru: 0
(Žádné zákerné zjištěny položek)
Složky: 6
PUP.Optional.GlobalUpdate.T, C:\Program Files (x86)\globalUpdate\Update, , [3bd196646b1e55e1bc068fc7ce35a65a],
PUP.Optional.GlobalUpdate.T, C:\Program Files (x86)\globalUpdate\Update\1.3.25.0, , [3bd196646b1e55e1bc068fc7ce35a65a],
PUP.Optional.ShopperPro, C:\Program Files\Common Files\ShopperPro, , [5ab28971ff8a1c1a1fc1aeb17a8920e0],
PUP.Optional.CrossRider.A, C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ljefoakgfhcoeobgicjgejglnpfpemgb, , [31db0ded6c1daf87136bee77aa59b749],
PUP.Optional.CrossRider.A, C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\databases\chrome-extension_ljefoakgfhcoeobgicjgejglnpfpemgb_0, , [729aa85242471d1949369dc8ef1436ca],
PUP.Optional.CrossRider.A, C:\Program Files (x86)\TotalPlusHD-3.1V21.01, , [0309f604ed9cda5c1cc32d3853b0d030],
Soubory: 14
PUP.Optional.Goobzo, C:\Program Files\Common Files\ShopperPro\spbiu.exe, , [f418c535cfbafe389dc2ef87e520b64a],
PUP.Optional.CrossRider.A, C:\Program Files (x86)\TotalPlusHD-3.1V21.01\3e329dd9-cb68-4927-a70d-9e6ccc3a6551-64.exe, , [b8548f6b3f4a989e8e53438ec441847c],
PUP.Optional.CrossRider.A, C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_ljefoakgfhcoeobgicjgejglnpfpemgb_0.localstorage, , [907ca753c0c9b58123ab599dfc0839c7],
PUP.Optional.GlobalUpdate.T, C:\Program Files (x86)\globalUpdate\Update\GoogleUpdate.exe, , [3bd196646b1e55e1bc068fc7ce35a65a],
PUP.Optional.GlobalUpdate.T, C:\Program Files (x86)\globalUpdate\Update\1.3.25.0\goopdate.dll, , [3bd196646b1e55e1bc068fc7ce35a65a],
PUP.Optional.ShopperPro, C:\Program Files\Common Files\ShopperPro\spbici64.dll, , [5ab28971ff8a1c1a1fc1aeb17a8920e0],
PUP.Optional.CrossRider.A, C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ljefoakgfhcoeobgicjgejglnpfpemgb\000005.ldb, , [31db0ded6c1daf87136bee77aa59b749],
PUP.Optional.CrossRider.A, C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ljefoakgfhcoeobgicjgejglnpfpemgb\000018.log, , [31db0ded6c1daf87136bee77aa59b749],
PUP.Optional.CrossRider.A, C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ljefoakgfhcoeobgicjgejglnpfpemgb\LOCK, , [31db0ded6c1daf87136bee77aa59b749],
PUP.Optional.CrossRider.A, C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ljefoakgfhcoeobgicjgejglnpfpemgb\LOG, , [31db0ded6c1daf87136bee77aa59b749],
PUP.Optional.CrossRider.A, C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ljefoakgfhcoeobgicjgejglnpfpemgb\MANIFEST-000016, , [31db0ded6c1daf87136bee77aa59b749],
PUP.Optional.CrossRider.A, c:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\databases\chrome-extension_ljefoakgfhcoeobgicjgejglnpfpemgb_0\9, , [729aa85242471d1949369dc8ef1436ca],
PUP.Optional.CrossRider.A, C:\Program Files (x86)\TotalPlusHD-3.1V21.01\6a0bb24e-e013-4925-bf30-8360f219e3ee.dll, , [0309f604ed9cda5c1cc32d3853b0d030],
PUP.Optional.GboxApp.A, C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Preferences, Dobré: (), Špatné: ( "startup_urls": [ "http://search.gboxapp.com/", "http://isearch.omiga-plus.com/?type=hp&ts=1421365687&from=ild&uid=ST31000340NS_9QJ6Y5N4XXXX9QJ6Y5N4", "http://isearch.omiga-plus.com/?type=hppp&ts=1421365722&from=ild&uid=ST31000340NS_9QJ6Y5N4XXXX9QJ6Y5N4", "http://www.google.com/", "http://www.mystartsearch.com/?type=hp&ts=1421706009&from=mp3&uid=KINGSTONXSV300S37A120G_50026B7747018B69", "http://www.mystartsearch.com/?type=hp&ts=1421785948&from=mp3&uid=KINGSTONXSV300S37A120G_50026B7747018B69" ],), ,[45c7ac4e1b6e1b1bb0da6870b94c9d63]
Fyzické sektory: 0
(Žádné zákerné zjištěny položek)
(end)
Bohužel mi bratr smazal vše co bylo v prvním scanu.. bylo tam zhruba přes 400 položek po druhém zbylo jen toto.. Jak koukám tak je PC řádně zavirovaný.. :(
Re: Prosím o kontrolu
Doufám že s tím půjde něco udělat.. abych nemusel přeinstalovávat system. Momentálně mi pc padl výkonem tak o 40% dolů .. jinak děkuji za rady a rychlé odpovědi.
- Orcus
- člen Security týmu
-
Elite Level 10.5
- Příspěvky: 10645
- Registrován: duben 10
- Bydliště: Okolo rostou 3 růže =o)
- Pohlaví:
- Stav:
Offline
Re: Prosím o kontrolu
Znovu spusť MbAM a dej Skenovat nyní
Po proběhnutí programu se ti objeví hláška, tak klikni na „Vše do karantény“ -> „Exportovat záznam“ a vyber „textový soubor“ , soubor nějak pojmenuj a ulož na Plochu.
Zkopíruj sem celý obsah toho logu.
====================================================
Spusť znovu AdwCleaner (u Windows Vista či Windows7, klikni na AdwCleaner pravým a vyber „Spustit jako správce“
Klikni na „ Smazat“
Program provede opravu, po automatickém restartu neukáže log (C:\AdwCleaner [S?].txt) , jeho obsah sem celý vlož.
====================================================
Stáhni si Junkware Removal Tool
na svojí plochu.
Deaktivuj si svůj antivirový program.
Pravým tl. myši klikni na JRT.exe a vyber „spustit jako správce“. Pro pokračování budeš vyzván ke stisknutí jakékoliv klávesy. Na nějakou klikni.
Začne skenování programu. Skenování může trvat dloho , podle množství nákaz. Po ukončení skenu se objeví log (JRT.txt) , který se uloží na ploše.
Zkopíruj sem prosím celý jeho obsah.
====================================================
Stáhni si RogueKiller
32bit.:
http://www.sur-la-toile.com/RogueKiller/RogueKiller.exe
64bit.:
http://www.sur-la-toile.com/RogueKiller ... lerX64.exe
na svojí plochu.
- Zavři všechny ostatní programy a prohlížeče.
- Pro OS Vista a win7 spusť program RogueKiller.exe jako správce , u XP poklepáním.
- počkej až skončí Prescan -vyhledávání škodlivých procesů.
- Zkontroluj , zda máš zaškrtnuto:
Kontrola MBR
Kontrola Faked
Antirootkit
-Potom klikni na „Prohledat“.
- Program skenuje procesy PC. Po proskenování klikni na „Zpráva“celý obsah logu sem zkopíruj.
Pokud je program blokován , zkus ho spustit několikrát. Pokud dále program nepůjde spustit a pracovat, přejmenuj ho na winlogon.exe.
Po proběhnutí programu se ti objeví hláška, tak klikni na „Vše do karantény“ -> „Exportovat záznam“ a vyber „textový soubor“ , soubor nějak pojmenuj a ulož na Plochu.
Zkopíruj sem celý obsah toho logu.
====================================================
Spusť znovu AdwCleaner (u Windows Vista či Windows7, klikni na AdwCleaner pravým a vyber „Spustit jako správce“
Klikni na „ Smazat“
Program provede opravu, po automatickém restartu neukáže log (C:\AdwCleaner [S?].txt) , jeho obsah sem celý vlož.
====================================================
Stáhni si Junkware Removal Tool
na svojí plochu.
Deaktivuj si svůj antivirový program.
Pravým tl. myši klikni na JRT.exe a vyber „spustit jako správce“. Pro pokračování budeš vyzván ke stisknutí jakékoliv klávesy. Na nějakou klikni.
Začne skenování programu. Skenování může trvat dloho , podle množství nákaz. Po ukončení skenu se objeví log (JRT.txt) , který se uloží na ploše.
Zkopíruj sem prosím celý jeho obsah.
====================================================
Stáhni si RogueKiller
32bit.:
http://www.sur-la-toile.com/RogueKiller/RogueKiller.exe
64bit.:
http://www.sur-la-toile.com/RogueKiller ... lerX64.exe
na svojí plochu.
- Zavři všechny ostatní programy a prohlížeče.
- Pro OS Vista a win7 spusť program RogueKiller.exe jako správce , u XP poklepáním.
- počkej až skončí Prescan -vyhledávání škodlivých procesů.
- Zkontroluj , zda máš zaškrtnuto:
Kontrola MBR
Kontrola Faked
Antirootkit
-Potom klikni na „Prohledat“.
- Program skenuje procesy PC. Po proskenování klikni na „Zpráva“celý obsah logu sem zkopíruj.
Pokud je program blokován , zkus ho spustit několikrát. Pokud dále program nepůjde spustit a pracovat, přejmenuj ho na winlogon.exe.
Láska hřeje, ale uhlí je uhlí.
Log z HJT vkládejte do HJT sekce. Je-li moc dlouhý, rozděl jej do více zpráv.
Pár rad k bezpečnosti PC.
Po dobu mé nepřítomnosti mě zastupuje memphisto, jaro3 a Diallix
Pokud budete spokojeni , můžete podpořit naše fórum.

Log z HJT vkládejte do HJT sekce. Je-li moc dlouhý, rozděl jej do více zpráv.
Pár rad k bezpečnosti PC.
Po dobu mé nepřítomnosti mě zastupuje memphisto, jaro3 a Diallix
Pokud budete spokojeni , můžete podpořit naše fórum.
Re: Prosím o kontrolu
Malwarebytes Anti-Malware
http://www.malwarebytes.org
Datum skenování: 26.1.2015
Čas skenování: 15:02:03
Protokol: mbam.txt
Správce: Ano
Verze: 2.00.4.1028
Databáze malwaru: v2015.01.26.05
Databáze rootkitů: v2015.01.14.01
Licence: Bezplatná verze
Ochrana proti malwaru: Vypnuto
Ochrana proti škodlivým webovým stránkám: Vypnuto
Sebeobrany: Vypnuto
OS: Windows 7 Service Pack 1
CPU: x64
Souborový systém: NTFS
Uživatel: jarda
Typ skenu: Sken hrozeb
Výsledek: Dokončeno
Prohledaných objektů: 337802
Uplynulý čas: 5 min, 56 sek
Paměť: Zapnuto
Po spuštění: Zapnuto
Souborový systém: Zapnuto
Archivy: Zapnuto
Rootkity: Vypnuto
Heuristika: Zapnuto
PUP: Zapnuto
PUM: Zapnuto
Procesy: 0
(Žádné zákerné zjištěny položek)
Moduly: 0
(Žádné zákerné zjištěny položek)
Klíče registru: 0
(Žádné zákerné zjištěny položek)
Hodnoty registru: 0
(Žádné zákerné zjištěny položek)
Data registru: 0
(Žádné zákerné zjištěny položek)
Složky: 0
(Žádné zákerné zjištěny položek)
Soubory: 1
PUP.Optional.GboxApp.A, C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Preferences, Dobré: (), Špatné: ( "startup_urls": [ "http://search.gboxapp.com/", "http://isearch.omiga-plus.com/?type=hp&ts=1421365687&from=ild&uid=ST31000340NS_9QJ6Y5N4XXXX9QJ6Y5N4", "http://isearch.omiga-plus.com/?type=hppp&ts=1421365722&from=ild&uid=ST31000340NS_9QJ6Y5N4XXXX9QJ6Y5N4", "http://www.google.com/", "http://www.mystartsearch.com/?type=hp&ts=1421706009&from=mp3&uid=KINGSTONXSV300S37A120G_50026B7747018B69", "http://www.mystartsearch.com/?type=hp&ts=1421785948&from=mp3&uid=KINGSTONXSV300S37A120G_50026B7747018B69" ],), Nahrazeno,[e21b5f9c642571c52ee55e810104fc04]
Fyzické sektory: 0
(Žádné zákerné zjištěny položek)
(end)
# AdwCleaner v4.109 - Report created 26/01/2015 at 15:11:24
# Updated 24/01/2015 by Xplode
# Database : 2015-01-25.1 [Live]
# Operating System : Windows 7 Ultimate Service Pack 1 (64 bits)
# Username : jarda - JARDA-PC
# Running from : C:\Users\jarda\Desktop\adwcleaner_4.109.exe
# Option : Clean
***** [ Services ] *****
***** [ Files / Folders ] *****
Folder Deleted : C:\ProgramData\dekeeieoemebdhhcockfglgepfcomjpc
Folder Deleted : C:\ProgramData\lbanajmfofghofkcddmglambagafkgnn
File Deleted : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_www.superfish.com_0.localstorage
File Deleted : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_www.superfish.com_0.localstorage-journal
File Deleted : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxps_www.superfish.com_0.localstorage
File Deleted : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxps_www.superfish.com_0.localstorage-journal
***** [ Scheduled Tasks ] *****
***** [ Shortcuts ] *****
***** [ Registry ] *****
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{E0D6077D-7186-48B2-A6C6-2F7C533E8CFF}
Key Deleted : HKLM\SOFTWARE\{12A61307-94CD-4F8E-94BC-918E511FAA81}
***** [ Browsers ] *****
-\\ Internet Explorer v11.0.9600.17496
-\\ Google Chrome v39.0.2171.95
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://en.softonic.com/s/{searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://www.default-search.net/search?si ... &src=ds&p={searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Startup_URLs] : hxxp://search.gboxapp.com/
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Startup_URLs] : hxxp://isearch.omiga-plus.com/?type=hpp ... XX9QJ6Y5N4
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Startup_URLs] : hxxp://www.mystartsearch.com/?type=hp&t ... 7747018B69
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Startup_URLs] : hxxp://isearch.omiga-plus.com/?type=hpp ... XX9QJ6Y5N4
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Startup_URLs] : hxxp://www.mystartsearch.com/?type=hp&t ... 7747018B69
*************************
AdwCleaner[R1].txt - [11419 octets] - [21/01/2015 21:34:10]
AdwCleaner[R2].txt - [3096 octets] - [22/01/2015 22:46:17]
AdwCleaner[R3].txt - [3984 octets] - [26/01/2015 15:09:28]
AdwCleaner[S0].txt - [11464 octets] - [21/01/2015 21:35:21]
AdwCleaner[S1].txt - [3181 octets] - [22/01/2015 22:49:50]
AdwCleaner[S2].txt - [3943 octets] - [26/01/2015 15:11:24]
########## EOF - C:\AdwCleaner\AdwCleaner[S2].txt - [4003 octets] ##########
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.4.1 (12.28.2014:1)
OS: Windows 7 Ultimate x64
Ran by jarda on po 26.01.2015 at 15:17:26,62
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~ Services
~~~ Registry Values
~~~ Registry Keys
~~~ Files
Successfully deleted: [File] "C:\Users\jarda\appdata\local\google\chrome\user data\default\local storage\http_www.superfish.com_0.localstorage"
Successfully deleted: [File] "C:\Users\jarda\appdata\local\google\chrome\user data\default\local storage\http_www.superfish.com_0.localstorage-journal"
~~~ Folders
~~~ Event Viewer Logs were cleared
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on po 26.01.2015 at 15:19:53,29
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
http://www.malwarebytes.org
Datum skenování: 26.1.2015
Čas skenování: 15:02:03
Protokol: mbam.txt
Správce: Ano
Verze: 2.00.4.1028
Databáze malwaru: v2015.01.26.05
Databáze rootkitů: v2015.01.14.01
Licence: Bezplatná verze
Ochrana proti malwaru: Vypnuto
Ochrana proti škodlivým webovým stránkám: Vypnuto
Sebeobrany: Vypnuto
OS: Windows 7 Service Pack 1
CPU: x64
Souborový systém: NTFS
Uživatel: jarda
Typ skenu: Sken hrozeb
Výsledek: Dokončeno
Prohledaných objektů: 337802
Uplynulý čas: 5 min, 56 sek
Paměť: Zapnuto
Po spuštění: Zapnuto
Souborový systém: Zapnuto
Archivy: Zapnuto
Rootkity: Vypnuto
Heuristika: Zapnuto
PUP: Zapnuto
PUM: Zapnuto
Procesy: 0
(Žádné zákerné zjištěny položek)
Moduly: 0
(Žádné zákerné zjištěny položek)
Klíče registru: 0
(Žádné zákerné zjištěny položek)
Hodnoty registru: 0
(Žádné zákerné zjištěny položek)
Data registru: 0
(Žádné zákerné zjištěny položek)
Složky: 0
(Žádné zákerné zjištěny položek)
Soubory: 1
PUP.Optional.GboxApp.A, C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Preferences, Dobré: (), Špatné: ( "startup_urls": [ "http://search.gboxapp.com/", "http://isearch.omiga-plus.com/?type=hp&ts=1421365687&from=ild&uid=ST31000340NS_9QJ6Y5N4XXXX9QJ6Y5N4", "http://isearch.omiga-plus.com/?type=hppp&ts=1421365722&from=ild&uid=ST31000340NS_9QJ6Y5N4XXXX9QJ6Y5N4", "http://www.google.com/", "http://www.mystartsearch.com/?type=hp&ts=1421706009&from=mp3&uid=KINGSTONXSV300S37A120G_50026B7747018B69", "http://www.mystartsearch.com/?type=hp&ts=1421785948&from=mp3&uid=KINGSTONXSV300S37A120G_50026B7747018B69" ],), Nahrazeno,[e21b5f9c642571c52ee55e810104fc04]
Fyzické sektory: 0
(Žádné zákerné zjištěny položek)
(end)
# AdwCleaner v4.109 - Report created 26/01/2015 at 15:11:24
# Updated 24/01/2015 by Xplode
# Database : 2015-01-25.1 [Live]
# Operating System : Windows 7 Ultimate Service Pack 1 (64 bits)
# Username : jarda - JARDA-PC
# Running from : C:\Users\jarda\Desktop\adwcleaner_4.109.exe
# Option : Clean
***** [ Services ] *****
***** [ Files / Folders ] *****
Folder Deleted : C:\ProgramData\dekeeieoemebdhhcockfglgepfcomjpc
Folder Deleted : C:\ProgramData\lbanajmfofghofkcddmglambagafkgnn
File Deleted : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_www.superfish.com_0.localstorage
File Deleted : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_www.superfish.com_0.localstorage-journal
File Deleted : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxps_www.superfish.com_0.localstorage
File Deleted : C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxps_www.superfish.com_0.localstorage-journal
***** [ Scheduled Tasks ] *****
***** [ Shortcuts ] *****
***** [ Registry ] *****
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{E0D6077D-7186-48B2-A6C6-2F7C533E8CFF}
Key Deleted : HKLM\SOFTWARE\{12A61307-94CD-4F8E-94BC-918E511FAA81}
***** [ Browsers ] *****
-\\ Internet Explorer v11.0.9600.17496
-\\ Google Chrome v39.0.2171.95
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://en.softonic.com/s/{searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://www.default-search.net/search?si ... &src=ds&p={searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://www.mystartsearch.com/web/?type= ... 7018B69&q={searchTerms}
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Startup_URLs] : hxxp://search.gboxapp.com/
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Startup_URLs] : hxxp://isearch.omiga-plus.com/?type=hpp ... XX9QJ6Y5N4
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Startup_URLs] : hxxp://www.mystartsearch.com/?type=hp&t ... 7747018B69
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Startup_URLs] : hxxp://isearch.omiga-plus.com/?type=hpp ... XX9QJ6Y5N4
[C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Startup_URLs] : hxxp://www.mystartsearch.com/?type=hp&t ... 7747018B69
*************************
AdwCleaner[R1].txt - [11419 octets] - [21/01/2015 21:34:10]
AdwCleaner[R2].txt - [3096 octets] - [22/01/2015 22:46:17]
AdwCleaner[R3].txt - [3984 octets] - [26/01/2015 15:09:28]
AdwCleaner[S0].txt - [11464 octets] - [21/01/2015 21:35:21]
AdwCleaner[S1].txt - [3181 octets] - [22/01/2015 22:49:50]
AdwCleaner[S2].txt - [3943 octets] - [26/01/2015 15:11:24]
########## EOF - C:\AdwCleaner\AdwCleaner[S2].txt - [4003 octets] ##########
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.4.1 (12.28.2014:1)
OS: Windows 7 Ultimate x64
Ran by jarda on po 26.01.2015 at 15:17:26,62
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~ Services
~~~ Registry Values
~~~ Registry Keys
~~~ Files
Successfully deleted: [File] "C:\Users\jarda\appdata\local\google\chrome\user data\default\local storage\http_www.superfish.com_0.localstorage"
Successfully deleted: [File] "C:\Users\jarda\appdata\local\google\chrome\user data\default\local storage\http_www.superfish.com_0.localstorage-journal"
~~~ Folders
~~~ Event Viewer Logs were cleared
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on po 26.01.2015 at 15:19:53,29
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Re: Prosím o kontrolu
U programu RogueKiller mi program zamrzne na 60% kdy kontroluje skryté procesy měl jsem ho puštěný celí den a stále je jen 60% tak nemohu spustit prohlídku dokud se nedokončí ta automatická zkoušel jsem ho i přepsat jak jste psal a stále zamrznuto na 60%
Re: Prosím o kontrolu
Dnes jsem zkusil ještě jednou a vše proběhlo během chvíle bez zámrzu . nevím kde byl předtím problém..
RogueKiller V10.2.0.0 (x64) [Jan 19 2015] by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Webová stránka : http://www.adlice.com/softwares/roguekiller/
Blog : http://www.adlice.com
Operační systém : Windows 7 (6.1.7600 ) 64 bits version
Spuštěno : Normální režim
Uživatel : jarda [Práva správce]
Mód : Prohledat -- Datum : 01/26/2015 16:06:00
¤¤¤ Procesy : 4 ¤¤¤
[Suspicious.Path] szninstall.exe(2504) -- C:\Users\jarda\AppData\Roaming\Seznam.cz\szninstall.exe[7] -> Zastaveno [TermProc]
[Suspicious.Path] szndesktop.exe(2940) -- C:\Users\jarda\AppData\Roaming\Seznam.cz\bin\szndesktop.exe[7] -> Zastaveno [TermProc]
[Suspicious.Path] listicka-x64.exe(3024) -- C:\Users\jarda\AppData\Roaming\Seznam.cz\bin\listicka-x64.exe[7] -> Zastaveno [TermThr]
[Suspicious.Path] explorer.exe(1796) -- C:\Users\jarda\AppData\Roaming\Seznam.cz\bin\15518libfoxloader-x64.dll[-] -> Uvolněno
¤¤¤ Registry : 22 ¤¤¤
[Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Windows\CurrentVersion\Run | cz.seznam.software.autoupdate : "C:\Users\jarda\AppData\Roaming\Seznam.cz\szninstall.exe" -c -> Nalezeno
[Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Windows\CurrentVersion\Run | cz.seznam.software.szndesktop : "C:\Users\jarda\AppData\Roaming\Seznam.cz\bin\wszndesktop.exe" -q -> Nalezeno
[Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Windows\CurrentVersion\Run | cz.seznam.software.autoupdate : "C:\Users\jarda\AppData\Roaming\Seznam.cz\szninstall.exe" -c -> Nalezeno
[Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Windows\CurrentVersion\Run | cz.seznam.software.szndesktop : "C:\Users\jarda\AppData\Roaming\Seznam.cz\bin\wszndesktop.exe" -q -> Nalezeno
[PUM.HomePage] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Start Page : www.google.com -> Nalezeno
[PUM.HomePage] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Start Page : www.google.com -> Nalezeno
[PUM.SearchPage] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Search Page : www.google.com -> Nalezeno
[PUM.SearchPage] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Search Page : www.google.com -> Nalezeno
[PUM.SearchPage] (X64) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Main | Search Page : www.google.com -> Nalezeno
[PUM.SearchPage] (X86) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Main | Search Page : www.google.com -> Nalezeno
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nalezeno
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nalezeno
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nalezeno
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{A79119AF-3FDC-4E2E-99ED-DA3E66C85B52} | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nalezeno
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{A79119AF-3FDC-4E2E-99ED-DA3E66C85B52} | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nalezeno
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{A79119AF-3FDC-4E2E-99ED-DA3E66C85B52} | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nalezeno
[PUM.Policies] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | ConsentPromptBehaviorAdmin : 0 -> Nalezeno
[PUM.Policies] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | ConsentPromptBehaviorAdmin : 0 -> Nalezeno
[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Nalezeno
[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1 -> Nalezeno
[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Nalezeno
[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1 -> Nalezeno
¤¤¤ Úlohy : 3 ¤¤¤
[Suspicious.Path] ZUTRP.job -- C:\Users\jarda\AppData\Roaming\ZUTRP.exe (/infocmdline=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) -> Nalezeno
[Suspicious.Path] \\ZUTRP -- C:\Users\jarda\AppData\Roaming\ZUTRP.exe (/infocmdline=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) -> Nalezeno
[Suspicious.Path] \Microsoft\508801c9773c0acbedf82acb4d9a6d42 -- C:\Users\jarda\AppData\Roaming\DownloadManager\Loader.exe -> Nalezeno
¤¤¤ Soubory : 0 ¤¤¤
¤¤¤ Soubor HOSTS : 0 ¤¤¤
¤¤¤ Antirootkit : 0 (Driver: Nahrán) ¤¤¤
¤¤¤ Webové prohlížeče : 0 ¤¤¤
¤¤¤ Kontrola MBR : ¤¤¤
+++++ PhysicalDrive0: KINGSTON SV300S37A120G ATA Device +++++
--- User ---
[MBR] ae30860a1ba1d940d00f21a52660e01b
[BSP] 80bcdcdd052455fb09d4650d6e5c16e4 : Windows Vista/7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 114371 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
User = LL1 ... OK
User = LL2 ... OK
+++++ PhysicalDrive1: ST31000340NS ATA Device +++++
--- User ---
[MBR] a397fd1ee12b4f7ff83a8200fb2a52f7
[BSP] e6300b558c127abcbfa76dec2d59b64b : Windows Vista/7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 82767 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 169713664 | Size: 870999 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
User = LL1 ... OK
User = LL2 ... OK
RogueKiller V10.2.0.0 (x64) [Jan 19 2015] by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Webová stránka : http://www.adlice.com/softwares/roguekiller/
Blog : http://www.adlice.com
Operační systém : Windows 7 (6.1.7600 ) 64 bits version
Spuštěno : Normální režim
Uživatel : jarda [Práva správce]
Mód : Prohledat -- Datum : 01/26/2015 16:06:00
¤¤¤ Procesy : 4 ¤¤¤
[Suspicious.Path] szninstall.exe(2504) -- C:\Users\jarda\AppData\Roaming\Seznam.cz\szninstall.exe[7] -> Zastaveno [TermProc]
[Suspicious.Path] szndesktop.exe(2940) -- C:\Users\jarda\AppData\Roaming\Seznam.cz\bin\szndesktop.exe[7] -> Zastaveno [TermProc]
[Suspicious.Path] listicka-x64.exe(3024) -- C:\Users\jarda\AppData\Roaming\Seznam.cz\bin\listicka-x64.exe[7] -> Zastaveno [TermThr]
[Suspicious.Path] explorer.exe(1796) -- C:\Users\jarda\AppData\Roaming\Seznam.cz\bin\15518libfoxloader-x64.dll[-] -> Uvolněno
¤¤¤ Registry : 22 ¤¤¤
[Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Windows\CurrentVersion\Run | cz.seznam.software.autoupdate : "C:\Users\jarda\AppData\Roaming\Seznam.cz\szninstall.exe" -c -> Nalezeno
[Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Windows\CurrentVersion\Run | cz.seznam.software.szndesktop : "C:\Users\jarda\AppData\Roaming\Seznam.cz\bin\wszndesktop.exe" -q -> Nalezeno
[Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Windows\CurrentVersion\Run | cz.seznam.software.autoupdate : "C:\Users\jarda\AppData\Roaming\Seznam.cz\szninstall.exe" -c -> Nalezeno
[Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Windows\CurrentVersion\Run | cz.seznam.software.szndesktop : "C:\Users\jarda\AppData\Roaming\Seznam.cz\bin\wszndesktop.exe" -q -> Nalezeno
[PUM.HomePage] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Start Page : www.google.com -> Nalezeno
[PUM.HomePage] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Start Page : www.google.com -> Nalezeno
[PUM.SearchPage] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Search Page : www.google.com -> Nalezeno
[PUM.SearchPage] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Search Page : www.google.com -> Nalezeno
[PUM.SearchPage] (X64) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Main | Search Page : www.google.com -> Nalezeno
[PUM.SearchPage] (X86) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Main | Search Page : www.google.com -> Nalezeno
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nalezeno
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nalezeno
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nalezeno
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{A79119AF-3FDC-4E2E-99ED-DA3E66C85B52} | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nalezeno
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{A79119AF-3FDC-4E2E-99ED-DA3E66C85B52} | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nalezeno
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{A79119AF-3FDC-4E2E-99ED-DA3E66C85B52} | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nalezeno
[PUM.Policies] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | ConsentPromptBehaviorAdmin : 0 -> Nalezeno
[PUM.Policies] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | ConsentPromptBehaviorAdmin : 0 -> Nalezeno
[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Nalezeno
[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1 -> Nalezeno
[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Nalezeno
[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1 -> Nalezeno
¤¤¤ Úlohy : 3 ¤¤¤
[Suspicious.Path] ZUTRP.job -- C:\Users\jarda\AppData\Roaming\ZUTRP.exe (/infocmdline=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) -> Nalezeno
[Suspicious.Path] \\ZUTRP -- C:\Users\jarda\AppData\Roaming\ZUTRP.exe (/infocmdline=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) -> Nalezeno
[Suspicious.Path] \Microsoft\508801c9773c0acbedf82acb4d9a6d42 -- C:\Users\jarda\AppData\Roaming\DownloadManager\Loader.exe -> Nalezeno
¤¤¤ Soubory : 0 ¤¤¤
¤¤¤ Soubor HOSTS : 0 ¤¤¤
¤¤¤ Antirootkit : 0 (Driver: Nahrán) ¤¤¤
¤¤¤ Webové prohlížeče : 0 ¤¤¤
¤¤¤ Kontrola MBR : ¤¤¤
+++++ PhysicalDrive0: KINGSTON SV300S37A120G ATA Device +++++
--- User ---
[MBR] ae30860a1ba1d940d00f21a52660e01b
[BSP] 80bcdcdd052455fb09d4650d6e5c16e4 : Windows Vista/7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 114371 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
User = LL1 ... OK
User = LL2 ... OK
+++++ PhysicalDrive1: ST31000340NS ATA Device +++++
--- User ---
[MBR] a397fd1ee12b4f7ff83a8200fb2a52f7
[BSP] e6300b558c127abcbfa76dec2d59b64b : Windows Vista/7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 82767 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 169713664 | Size: 870999 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
User = LL1 ... OK
User = LL2 ... OK
- Orcus
- člen Security týmu
-
Elite Level 10.5
- Příspěvky: 10645
- Registrován: duben 10
- Bydliště: Okolo rostou 3 růže =o)
- Pohlaví:
- Stav:
Offline
Re: Prosím o kontrolu
Zavři všechny programy a prohlížeče. Deaktivuj antivir a firewall.
Prosím, odpoj všechny USB nebo externí disky z počítače před spuštěním tohoto programu.
Spusť RogueKiller ( Pro Windows Vista nebo Windows 7, klepni pravým a vyber "Spustit jako správce", ve Windows XP poklepej ke spuštění).
- Počkej, až Prescan dokončí práci...
- Počkej, dokud status okno zobrazuje "Prohledat "
- V záložkách (Registry , Tasks , Web Browser apod.) vše zatrhni (dej zatržítka).
- Klikni na "Smazat"
- Počkej, dokud Status box zobrazuje " Mazání dokončeno "
- Klikni na "Zpráva" a zkopíruj a vlož obsah té zprávy prosím sem. Log je možno nalézt v RKreport [číslo]. txt na ploše.
- Zavři RogueKiller
====================================================
Stáhni
Zoek.exe
a ulož si ho na plochu.
Zavři všechny ostatní programy, okna i prohlížeče.
Spusť Zoek.exe ( u win vista , win7, 8 klikni na něj pravým a vyber : „Spustit jako správce“
- pozor, náběh programu může trvat déle.
Do okna programu vlož skript níže:
Klikni na Run Script
Program provede sken, opravu, sken i oprava může trvat i více minut, je třeba posečkat do konce. Do okna neklikej!
Program nabídne restart , potvrď .
Po restartu se může nějaký čas ukázat pouze černá plocha , to je normální. Je třeba počkat až se vytvoří log. Ten si můžeš uložit třeba do dokumentů, jinak se sám ukládá do:
C:\zoek-results.log
Zkopíruj sem celý obsah toho logu.
Prosím, odpoj všechny USB nebo externí disky z počítače před spuštěním tohoto programu.
Spusť RogueKiller ( Pro Windows Vista nebo Windows 7, klepni pravým a vyber "Spustit jako správce", ve Windows XP poklepej ke spuštění).
- Počkej, až Prescan dokončí práci...
- Počkej, dokud status okno zobrazuje "Prohledat "
- V záložkách (Registry , Tasks , Web Browser apod.) vše zatrhni (dej zatržítka).
- Klikni na "Smazat"
- Počkej, dokud Status box zobrazuje " Mazání dokončeno "
- Klikni na "Zpráva" a zkopíruj a vlož obsah té zprávy prosím sem. Log je možno nalézt v RKreport [číslo]. txt na ploše.
- Zavři RogueKiller
====================================================
Stáhni
Zoek.exe
a ulož si ho na plochu.
Zavři všechny ostatní programy, okna i prohlížeče.
Spusť Zoek.exe ( u win vista , win7, 8 klikni na něj pravým a vyber : „Spustit jako správce“
- pozor, náběh programu může trvat déle.
Do okna programu vlož skript níže:
Kód: Vybrat vše
autoclean;
emptyclsid;
iedefaults;
FFdefaults;
CHRdefaults;
emptyalltemp;
resethosts;
Klikni na Run Script
Program provede sken, opravu, sken i oprava může trvat i více minut, je třeba posečkat do konce. Do okna neklikej!
Program nabídne restart , potvrď .
Po restartu se může nějaký čas ukázat pouze černá plocha , to je normální. Je třeba počkat až se vytvoří log. Ten si můžeš uložit třeba do dokumentů, jinak se sám ukládá do:
C:\zoek-results.log
Zkopíruj sem celý obsah toho logu.
Láska hřeje, ale uhlí je uhlí.
Log z HJT vkládejte do HJT sekce. Je-li moc dlouhý, rozděl jej do více zpráv.
Pár rad k bezpečnosti PC.
Po dobu mé nepřítomnosti mě zastupuje memphisto, jaro3 a Diallix
Pokud budete spokojeni , můžete podpořit naše fórum.

Log z HJT vkládejte do HJT sekce. Je-li moc dlouhý, rozděl jej do více zpráv.
Pár rad k bezpečnosti PC.
Po dobu mé nepřítomnosti mě zastupuje memphisto, jaro3 a Diallix
Pokud budete spokojeni , můžete podpořit naše fórum.
Re: Prosím o kontrolu
RogueKiller V10.2.0.0 (x64) [Jan 19 2015] by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Webová stránka : http://www.adlice.com/softwares/roguekiller/
Blog : http://www.adlice.com
Operační systém : Windows 7 (6.1.7600 ) 64 bits version
Spuštěno : Normální režim
Uživatel : jarda [Práva správce]
Mód : Smazat -- Datum : 01/26/2015 19:23:12
¤¤¤ Procesy : 0 ¤¤¤
¤¤¤ Registry : 22 ¤¤¤
[Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Windows\CurrentVersion\Run | cz.seznam.software.autoupdate : "C:\Users\jarda\AppData\Roaming\Seznam.cz\szninstall.exe" -c [7][x] -> Smazáno
[Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Windows\CurrentVersion\Run | cz.seznam.software.szndesktop : "C:\Users\jarda\AppData\Roaming\Seznam.cz\bin\wszndesktop.exe" -q [7][x] -> Smazáno
[Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Windows\CurrentVersion\Run | cz.seznam.software.autoupdate : "C:\Users\jarda\AppData\Roaming\Seznam.cz\szninstall.exe" -c -> ERROR [2]
[Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Windows\CurrentVersion\Run | cz.seznam.software.szndesktop : "C:\Users\jarda\AppData\Roaming\Seznam.cz\bin\wszndesktop.exe" -q -> ERROR [2]
[PUM.HomePage] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Start Page : www.google.com -> Nahrazeno (http://go.microsoft.com/fwlink/p/?LinkId=255141)
[PUM.HomePage] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Start Page : www.google.com -> Nahrazeno (http://go.microsoft.com/fwlink/p/?LinkId=255141)
[PUM.SearchPage] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Search Page : www.google.com -> Nahrazeno (http://go.microsoft.com/fwlink/?LinkId=54896)
[PUM.SearchPage] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Search Page : www.google.com -> Nahrazeno (http://go.microsoft.com/fwlink/?LinkId=54896)
[PUM.SearchPage] (X64) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Main | Search Page : www.google.com -> Nahrazeno (http://go.microsoft.com/fwlink/?LinkId=54896)
[PUM.SearchPage] (X86) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Main | Search Page : www.google.com -> Nahrazeno (http://go.microsoft.com/fwlink/?LinkId=54896)
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nahrazeno ()
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nahrazeno ()
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nahrazeno ()
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{A79119AF-3FDC-4E2E-99ED-DA3E66C85B52} | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nahrazeno ()
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{A79119AF-3FDC-4E2E-99ED-DA3E66C85B52} | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nahrazeno ()
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{A79119AF-3FDC-4E2E-99ED-DA3E66C85B52} | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nahrazeno ()
[PUM.Policies] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | ConsentPromptBehaviorAdmin : 0 -> Nahrazeno (2)
[PUM.Policies] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | ConsentPromptBehaviorAdmin : 0 -> Nahrazeno (2)
[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Nahrazeno (0)
[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1 -> Nahrazeno (0)
[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Nahrazeno (0)
[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1 -> Nahrazeno (0)
¤¤¤ Úlohy : 3 ¤¤¤
[Suspicious.Path] ZUTRP.job -- C:\Users\jarda\AppData\Roaming\ZUTRP.exe (/infocmdline=Lmfx3DA/NYrzwPGQbCuxwFvOoBjvJVylJaIk0UaulamJwzwUsEqihqpPYE62euju3PXe5WPKBX6i8cgHydleOLWsgf9pg+VQNsbZYc8viNh94jjD6pt7+Vafx0rDmew9x2UdT5Fxv/i57F1N96Y1v4sFL9A2VKjtfRQdJ951dvO5TM/wPyHo5gU/GZxTzUb4axBXRp2NPopSwUIvNCTFvW0sOQpErUSGq/qAyQrAR/mK0B0yrbW5PKyua8tPKm6Q7Cjg/Z7ltvOJOEnVTlyzsrZ8p494V+cBSCXiioRqemzwtyU5q8OGhAj9CS/a5crOj/xTq+JR8L/2dIQdD4c9oRZBJ5AsSUlVSyQ9vR0i8XoSlaUfGO3s/hVTTwJex4OqDlvnC1xYPRCAGayCOIe8vDCTm3GYP+UWjB1oHD8GSojdzi83ASFfRKRG/CSPQDVpJ66Pv2gP3eykfGpZJtY4WxlTjDthWD4/LKWEcIuOMle6k3Tlbvdl+hO1//SRMGpe) -> Smazáno
[Suspicious.Path] \\ZUTRP -- C:\Users\jarda\AppData\Roaming\ZUTRP.exe (/infocmdline=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) -> Smazáno
[Suspicious.Path] \Microsoft\508801c9773c0acbedf82acb4d9a6d42 -- C:\Users\jarda\AppData\Roaming\DownloadManager\Loader.exe -> Smazáno
¤¤¤ Soubory : 0 ¤¤¤
¤¤¤ Soubor HOSTS : 0 ¤¤¤
¤¤¤ Antirootkit : 0 (Driver: Nahrán) ¤¤¤
¤¤¤ Webové prohlížeče : 0 ¤¤¤
¤¤¤ Kontrola MBR : ¤¤¤
+++++ PhysicalDrive0: KINGSTON SV300S37A120G ATA Device +++++
--- User ---
[MBR] ae30860a1ba1d940d00f21a52660e01b
[BSP] 80bcdcdd052455fb09d4650d6e5c16e4 : Windows Vista/7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 114371 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
User = LL1 ... OK
User = LL2 ... OK
+++++ PhysicalDrive1: ST31000340NS ATA Device +++++
--- User ---
[MBR] a397fd1ee12b4f7ff83a8200fb2a52f7
[BSP] e6300b558c127abcbfa76dec2d59b64b : Windows Vista/7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 82767 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 169713664 | Size: 870999 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
User = LL1 ... OK
User = LL2 ... OK
============================================
RKreport_SCN_01262015_160555.log - RKreport_SCN_01262015_192054.log
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Webová stránka : http://www.adlice.com/softwares/roguekiller/
Blog : http://www.adlice.com
Operační systém : Windows 7 (6.1.7600 ) 64 bits version
Spuštěno : Normální režim
Uživatel : jarda [Práva správce]
Mód : Smazat -- Datum : 01/26/2015 19:23:12
¤¤¤ Procesy : 0 ¤¤¤
¤¤¤ Registry : 22 ¤¤¤
[Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Windows\CurrentVersion\Run | cz.seznam.software.autoupdate : "C:\Users\jarda\AppData\Roaming\Seznam.cz\szninstall.exe" -c [7][x] -> Smazáno
[Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Windows\CurrentVersion\Run | cz.seznam.software.szndesktop : "C:\Users\jarda\AppData\Roaming\Seznam.cz\bin\wszndesktop.exe" -q [7][x] -> Smazáno
[Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Windows\CurrentVersion\Run | cz.seznam.software.autoupdate : "C:\Users\jarda\AppData\Roaming\Seznam.cz\szninstall.exe" -c -> ERROR [2]
[Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Windows\CurrentVersion\Run | cz.seznam.software.szndesktop : "C:\Users\jarda\AppData\Roaming\Seznam.cz\bin\wszndesktop.exe" -q -> ERROR [2]
[PUM.HomePage] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Start Page : www.google.com -> Nahrazeno (http://go.microsoft.com/fwlink/p/?LinkId=255141)
[PUM.HomePage] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Start Page : www.google.com -> Nahrazeno (http://go.microsoft.com/fwlink/p/?LinkId=255141)
[PUM.SearchPage] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Search Page : www.google.com -> Nahrazeno (http://go.microsoft.com/fwlink/?LinkId=54896)
[PUM.SearchPage] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Search Page : www.google.com -> Nahrazeno (http://go.microsoft.com/fwlink/?LinkId=54896)
[PUM.SearchPage] (X64) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Main | Search Page : www.google.com -> Nahrazeno (http://go.microsoft.com/fwlink/?LinkId=54896)
[PUM.SearchPage] (X86) HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Main | Search Page : www.google.com -> Nahrazeno (http://go.microsoft.com/fwlink/?LinkId=54896)
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nahrazeno ()
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nahrazeno ()
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nahrazeno ()
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{A79119AF-3FDC-4E2E-99ED-DA3E66C85B52} | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nahrazeno ()
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{A79119AF-3FDC-4E2E-99ED-DA3E66C85B52} | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nahrazeno ()
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{A79119AF-3FDC-4E2E-99ED-DA3E66C85B52} | DhcpNameServer : 10.5.0.1 10.1.0.20 [(Private Address) (XX)][(Private Address) (XX)] -> Nahrazeno ()
[PUM.Policies] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | ConsentPromptBehaviorAdmin : 0 -> Nahrazeno (2)
[PUM.Policies] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | ConsentPromptBehaviorAdmin : 0 -> Nahrazeno (2)
[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Nahrazeno (0)
[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1 -> Nahrazeno (0)
[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Nahrazeno (0)
[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1 -> Nahrazeno (0)
¤¤¤ Úlohy : 3 ¤¤¤
[Suspicious.Path] ZUTRP.job -- C:\Users\jarda\AppData\Roaming\ZUTRP.exe (/infocmdline=Lmfx3DA/NYrzwPGQbCuxwFvOoBjvJVylJaIk0UaulamJwzwUsEqihqpPYE62euju3PXe5WPKBX6i8cgHydleOLWsgf9pg+VQNsbZYc8viNh94jjD6pt7+Vafx0rDmew9x2UdT5Fxv/i57F1N96Y1v4sFL9A2VKjtfRQdJ951dvO5TM/wPyHo5gU/GZxTzUb4axBXRp2NPopSwUIvNCTFvW0sOQpErUSGq/qAyQrAR/mK0B0yrbW5PKyua8tPKm6Q7Cjg/Z7ltvOJOEnVTlyzsrZ8p494V+cBSCXiioRqemzwtyU5q8OGhAj9CS/a5crOj/xTq+JR8L/2dIQdD4c9oRZBJ5AsSUlVSyQ9vR0i8XoSlaUfGO3s/hVTTwJex4OqDlvnC1xYPRCAGayCOIe8vDCTm3GYP+UWjB1oHD8GSojdzi83ASFfRKRG/CSPQDVpJ66Pv2gP3eykfGpZJtY4WxlTjDthWD4/LKWEcIuOMle6k3Tlbvdl+hO1//SRMGpe) -> Smazáno
[Suspicious.Path] \\ZUTRP -- C:\Users\jarda\AppData\Roaming\ZUTRP.exe (/infocmdline=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) -> Smazáno
[Suspicious.Path] \Microsoft\508801c9773c0acbedf82acb4d9a6d42 -- C:\Users\jarda\AppData\Roaming\DownloadManager\Loader.exe -> Smazáno
¤¤¤ Soubory : 0 ¤¤¤
¤¤¤ Soubor HOSTS : 0 ¤¤¤
¤¤¤ Antirootkit : 0 (Driver: Nahrán) ¤¤¤
¤¤¤ Webové prohlížeče : 0 ¤¤¤
¤¤¤ Kontrola MBR : ¤¤¤
+++++ PhysicalDrive0: KINGSTON SV300S37A120G ATA Device +++++
--- User ---
[MBR] ae30860a1ba1d940d00f21a52660e01b
[BSP] 80bcdcdd052455fb09d4650d6e5c16e4 : Windows Vista/7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 114371 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
User = LL1 ... OK
User = LL2 ... OK
+++++ PhysicalDrive1: ST31000340NS ATA Device +++++
--- User ---
[MBR] a397fd1ee12b4f7ff83a8200fb2a52f7
[BSP] e6300b558c127abcbfa76dec2d59b64b : Windows Vista/7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 82767 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 169713664 | Size: 870999 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
User = LL1 ... OK
User = LL2 ... OK
============================================
RKreport_SCN_01262015_160555.log - RKreport_SCN_01262015_192054.log
Re: Prosím o kontrolu
Zoek.exe v5.0.0.0 Updated 18-01-2015
Tool run by jarda on po 26.01.2015 at 19:25:45,62.
Microsoft Windows 7 Ultimate 6.1.7601 Service Pack 1 x64
Running in: Normal Mode Internet Access Detected
Launched: C:\Users\jarda\Desktop\zoek.exe [Scan all users] [Script inserted]
==== System Restore Info ======================
26.1.2015 19:27:17 Zoek.exe System Restore Point Created Succesfully.
==== Reset Hosts File ======================
# Copyright (c) 1993-2006 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
# localhost name resolution is handle within DNS itself.
127.0.0.1 localhost
::1 localhost
==== Empty Folders Check ======================
C:\Program Files\ATI Technologies deleted successfully
C:\Users\jarda\AppData\Roaming\Opera deleted successfully
C:\Windows\serviceprofiles\Localservice\AppData\Roaming\Xfire deleted successfully
C:\Users\jarda\AppData\Local\DriverToolkit deleted successfully
C:\Users\jarda\AppData\Local\GHISLER deleted successfully
C:\Users\jarda\AppData\Local\Opera deleted successfully
==== Deleting CLSID Registry Keys ======================
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{1B149C6F-3FAA-4D93-8197-FA8E5DDC3C9A} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{206E7D6A-627F-405F-8F8F-6C618A672F4A} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{238409D9-271D-41D1-8678-8A1A6C4374FE} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{247E995B-BF79-4E85-AD60-C5A7436EA8C} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{3C70443A-4A41-4990-96E6-75D3587A80B5} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{478AFDA5-51EB-481B-9C80-867A9964B165} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{4CD6D59B-DDD7-4D66-907F-1C638A1ACC6} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{4ED0B1B1-9217-4E72-BC7F-F5BB90E3483B} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{6030FF7B-F611-4D3B-9030-28CEB6FAE6F6} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{6E5BEB2A-DF2D-406B-BE5B-7495D6AA4AB} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7472E87C-9806-4E04-92AC-13A0C38AC16} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{771255C6-BBE6-4A41-9DD0-59AFCFBB3155} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{8950878A-345-4655-81B0-D560518CCFE2} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9198165B-1EA7-44DF-B11E-19EC17189277} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{968c07bf-bb22-4a66-899b-d5ba72a6e3a0} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9773BB33-F4F4-41E9-A652-8267F5675A72} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A2064578-B814-4465-9E83-D6CEB94F3356} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A432E04B-FEF3-4D9F-8315-BEFBC23BAD6} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A47D40B0-C249-4823-902A-97FC8A2323C8} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A704AF57-8249-48A9-B92C-367527B1777} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A7BF6C77-6802-4E53-B33A-DB76C92A8460} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{B7E14DED-B935-4E2A-9A82-6381C3236656} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{BAF8A3F7-5DD3-48EF-B361-87B4679DEA6} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C45E8A80-B864-41F0-976C-AEAACE4D7662} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C6208822-28BC-4D02-9FCB-2D4CE6E386E2} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{CDC5AE95-CF8-42D4-9EBD-5A325959435} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D2834307-6474-4389-9822-9FB269CFD3B5} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{DD4750A9-20B5-4E6A-B767-D593E6C693EC} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{e2cdcae0-6c26-485c-becb-6ce2248057a9} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E81A2E77-2A65-47F1-8C2E-B122099CC6F} deleted successfully
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{968c07bf-bb22-4a66-899b-d5ba72a6e3a0} deleted successfully
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{e2cdcae0-6c26-485c-becb-6ce2248057a9} deleted successfully
==== Deleting CLSID Registry Values ======================
==== Deleting Services ======================
==== Deleting Files \ Folders ======================
C:\PROGRA~3\mkajofcbnllodpbiipongjinkhnchkig deleted
C:\PROGRA~2\e7978a8b-6c2e-4b87-890f-ba5966498eb5 deleted
C:\Users\jarda\AppData\Roaming\appdataFr2.bin deleted
C:\PROGRA~3\Package Cache deleted
C:\Users\jarda\AppData\Local\Installer deleted
C:\Windows\SysNative\config\systemprofile\Searches deleted
C:\windows\SysNative\GroupPolicy\machine deleted
C:\windows\SysNative\GroupPolicy\User deleted
C:\windows\SysNative\GroupPolicy\gpt.ini deleted
C:\Windows\Syswow64\GroupPolicy\gpt.ini deleted
"C:\Users\jarda\AppData\Roaming\ZUTRP" deleted
==== Chromium Look ======================
Google Chrome Version: 39.0.2171.95 (Possible outdated, latest Stable version: 39.0.2171.99)
jhodopgnkbcmfgggehanaepcofglnboh - jarda\AppData\Local\Google\Chrome\User Data\Default\Extensions\jhodopgnkbcmfgggehanaepcofglnboh
==== Chromium Startpages ======================
C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Preferences
"startup_urls": [ "http://search.gboxapp.com/", "http://isearch.omiga-plus.com/?type=hp&ts=1421365687&from=ild&uid=ST31000340NS_9QJ6Y5N4XXXX9QJ6Y5N4", "http://isearch.omiga-plus.com/?type=hppp&ts=1421365722&from=ild&uid=ST31000340NS_9QJ6Y5N4XXXX9QJ6Y5N4", "http://www.google.com/", "http://www.mystartsearch.com/?type=hp&ts=1421706009&from=mp3&uid=KINGSTONXSV300S37A120G_50026B7747018B69", "http://www.mystartsearch.com/?type=hp&ts=1421785948&from=mp3&uid=KINGSTONXSV300S37A120G_50026B7747018B69" ],
==== Chromium Fix ======================
C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_www.superfish.com_0.localstorage deleted successfully
C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_www.superfish.com_0.localstorage-journal deleted successfully
C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.superfish.com_0.localstorage deleted successfully
C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.superfish.com_0.localstorage-journal deleted successfully
C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_static.williamhill.com_0.localstorage deleted successfully
C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_static.williamhill.com_0.localstorage-journal deleted successfully
==== Set IE to Default ======================
Old Values:
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Start Page"="http://www.google.com"
New Values:
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Start Page"="http://www.google.com"
==== All HKCU SearchScopes ======================
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes
"DefaultScope"="{0633EE93-D776-472f-A0FF-E1416B8B2E3A}"
{012E1000-F331-11DB-8314-0800200C9A66} Google Url="http://www.google.com/search?q={searchTerms}"
{0633EE93-D776-472f-A0FF-E1416B8B2E3A} Bing Url="http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE8SRC"
==== Reset Google Chrome ======================
C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Preferences was reset successfully
C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web Data was reset successfully
==== Deleting Registry Keys ======================
HKEY_LOCAL_MACHINE\Software\wow6432node\Policies\Google deleted successfully
==== Empty IE Cache ======================
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5 emptied successfully
C:\Users\jarda\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5 emptied successfully
C:\Windows\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5 emptied successfully
C:\Windows\sysWoW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5 emptied successfully
C:\Windows\sysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5 emptied successfully
==== Empty FireFox Cache ======================
No FireFox Profiles found
==== Empty Chrome Cache ======================
C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Cache emptied successfully
==== Empty All Flash Cache ======================
No Flash Cache Found
==== Empty All Java Cache ======================
Java Cache cleared successfully
==== C:\zoek_backup content ======================
C:\zoek_backup (files=36 folders=25 19185975 bytes)
==== Empty Temp Folders ======================
C:\Users\Default\AppData\Local\Temp emptied successfully
C:\Users\Default User\AppData\Local\Temp emptied successfully
C:\Users\jarda\AppData\Local\Temp will be emptied at reboot
C:\Windows\serviceprofiles\networkservice\AppData\Local\Temp emptied successfully
C:\Windows\serviceprofiles\Localservice\AppData\Local\Temp emptied successfully
C:\Windows\Temp will be emptied at reboot
==== After Reboot ======================
==== Empty Temp Folders ======================
C:\Windows\Temp successfully emptied
C:\Users\jarda\AppData\Local\Temp successfully emptied
==== Empty Recycle Bin ======================
C:\$RECYCLE.BIN successfully emptied
==== EOF on po 26.01.2015 at 19:38:33,25 ======================
Tool run by jarda on po 26.01.2015 at 19:25:45,62.
Microsoft Windows 7 Ultimate 6.1.7601 Service Pack 1 x64
Running in: Normal Mode Internet Access Detected
Launched: C:\Users\jarda\Desktop\zoek.exe [Scan all users] [Script inserted]
==== System Restore Info ======================
26.1.2015 19:27:17 Zoek.exe System Restore Point Created Succesfully.
==== Reset Hosts File ======================
# Copyright (c) 1993-2006 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
# localhost name resolution is handle within DNS itself.
127.0.0.1 localhost
::1 localhost
==== Empty Folders Check ======================
C:\Program Files\ATI Technologies deleted successfully
C:\Users\jarda\AppData\Roaming\Opera deleted successfully
C:\Windows\serviceprofiles\Localservice\AppData\Roaming\Xfire deleted successfully
C:\Users\jarda\AppData\Local\DriverToolkit deleted successfully
C:\Users\jarda\AppData\Local\GHISLER deleted successfully
C:\Users\jarda\AppData\Local\Opera deleted successfully
==== Deleting CLSID Registry Keys ======================
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{1B149C6F-3FAA-4D93-8197-FA8E5DDC3C9A} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{206E7D6A-627F-405F-8F8F-6C618A672F4A} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{238409D9-271D-41D1-8678-8A1A6C4374FE} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{247E995B-BF79-4E85-AD60-C5A7436EA8C} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{3C70443A-4A41-4990-96E6-75D3587A80B5} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{478AFDA5-51EB-481B-9C80-867A9964B165} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{4CD6D59B-DDD7-4D66-907F-1C638A1ACC6} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{4ED0B1B1-9217-4E72-BC7F-F5BB90E3483B} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{6030FF7B-F611-4D3B-9030-28CEB6FAE6F6} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{6E5BEB2A-DF2D-406B-BE5B-7495D6AA4AB} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7472E87C-9806-4E04-92AC-13A0C38AC16} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{771255C6-BBE6-4A41-9DD0-59AFCFBB3155} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{8950878A-345-4655-81B0-D560518CCFE2} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9198165B-1EA7-44DF-B11E-19EC17189277} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{968c07bf-bb22-4a66-899b-d5ba72a6e3a0} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9773BB33-F4F4-41E9-A652-8267F5675A72} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A2064578-B814-4465-9E83-D6CEB94F3356} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A432E04B-FEF3-4D9F-8315-BEFBC23BAD6} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A47D40B0-C249-4823-902A-97FC8A2323C8} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A704AF57-8249-48A9-B92C-367527B1777} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A7BF6C77-6802-4E53-B33A-DB76C92A8460} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{B7E14DED-B935-4E2A-9A82-6381C3236656} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{BAF8A3F7-5DD3-48EF-B361-87B4679DEA6} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C45E8A80-B864-41F0-976C-AEAACE4D7662} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C6208822-28BC-4D02-9FCB-2D4CE6E386E2} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{CDC5AE95-CF8-42D4-9EBD-5A325959435} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D2834307-6474-4389-9822-9FB269CFD3B5} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{DD4750A9-20B5-4E6A-B767-D593E6C693EC} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{e2cdcae0-6c26-485c-becb-6ce2248057a9} deleted successfully
HKEY_USERS\S-1-5-21-3846785248-3606963408-3163492440-1006\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E81A2E77-2A65-47F1-8C2E-B122099CC6F} deleted successfully
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{968c07bf-bb22-4a66-899b-d5ba72a6e3a0} deleted successfully
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{e2cdcae0-6c26-485c-becb-6ce2248057a9} deleted successfully
==== Deleting CLSID Registry Values ======================
==== Deleting Services ======================
==== Deleting Files \ Folders ======================
C:\PROGRA~3\mkajofcbnllodpbiipongjinkhnchkig deleted
C:\PROGRA~2\e7978a8b-6c2e-4b87-890f-ba5966498eb5 deleted
C:\Users\jarda\AppData\Roaming\appdataFr2.bin deleted
C:\PROGRA~3\Package Cache deleted
C:\Users\jarda\AppData\Local\Installer deleted
C:\Windows\SysNative\config\systemprofile\Searches deleted
C:\windows\SysNative\GroupPolicy\machine deleted
C:\windows\SysNative\GroupPolicy\User deleted
C:\windows\SysNative\GroupPolicy\gpt.ini deleted
C:\Windows\Syswow64\GroupPolicy\gpt.ini deleted
"C:\Users\jarda\AppData\Roaming\ZUTRP" deleted
==== Chromium Look ======================
Google Chrome Version: 39.0.2171.95 (Possible outdated, latest Stable version: 39.0.2171.99)
jhodopgnkbcmfgggehanaepcofglnboh - jarda\AppData\Local\Google\Chrome\User Data\Default\Extensions\jhodopgnkbcmfgggehanaepcofglnboh
==== Chromium Startpages ======================
C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Preferences
"startup_urls": [ "http://search.gboxapp.com/", "http://isearch.omiga-plus.com/?type=hp&ts=1421365687&from=ild&uid=ST31000340NS_9QJ6Y5N4XXXX9QJ6Y5N4", "http://isearch.omiga-plus.com/?type=hppp&ts=1421365722&from=ild&uid=ST31000340NS_9QJ6Y5N4XXXX9QJ6Y5N4", "http://www.google.com/", "http://www.mystartsearch.com/?type=hp&ts=1421706009&from=mp3&uid=KINGSTONXSV300S37A120G_50026B7747018B69", "http://www.mystartsearch.com/?type=hp&ts=1421785948&from=mp3&uid=KINGSTONXSV300S37A120G_50026B7747018B69" ],
==== Chromium Fix ======================
C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_www.superfish.com_0.localstorage deleted successfully
C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_www.superfish.com_0.localstorage-journal deleted successfully
C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.superfish.com_0.localstorage deleted successfully
C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.superfish.com_0.localstorage-journal deleted successfully
C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_static.williamhill.com_0.localstorage deleted successfully
C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_static.williamhill.com_0.localstorage-journal deleted successfully
==== Set IE to Default ======================
Old Values:
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Start Page"="http://www.google.com"
New Values:
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Start Page"="http://www.google.com"
==== All HKCU SearchScopes ======================
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes
"DefaultScope"="{0633EE93-D776-472f-A0FF-E1416B8B2E3A}"
{012E1000-F331-11DB-8314-0800200C9A66} Google Url="http://www.google.com/search?q={searchTerms}"
{0633EE93-D776-472f-A0FF-E1416B8B2E3A} Bing Url="http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE8SRC"
==== Reset Google Chrome ======================
C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Preferences was reset successfully
C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Web Data was reset successfully
==== Deleting Registry Keys ======================
HKEY_LOCAL_MACHINE\Software\wow6432node\Policies\Google deleted successfully
==== Empty IE Cache ======================
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5 emptied successfully
C:\Users\jarda\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5 emptied successfully
C:\Windows\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5 emptied successfully
C:\Windows\sysWoW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5 emptied successfully
C:\Windows\sysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5 emptied successfully
==== Empty FireFox Cache ======================
No FireFox Profiles found
==== Empty Chrome Cache ======================
C:\Users\jarda\AppData\Local\Google\Chrome\User Data\Default\Cache emptied successfully
==== Empty All Flash Cache ======================
No Flash Cache Found
==== Empty All Java Cache ======================
Java Cache cleared successfully
==== C:\zoek_backup content ======================
C:\zoek_backup (files=36 folders=25 19185975 bytes)
==== Empty Temp Folders ======================
C:\Users\Default\AppData\Local\Temp emptied successfully
C:\Users\Default User\AppData\Local\Temp emptied successfully
C:\Users\jarda\AppData\Local\Temp will be emptied at reboot
C:\Windows\serviceprofiles\networkservice\AppData\Local\Temp emptied successfully
C:\Windows\serviceprofiles\Localservice\AppData\Local\Temp emptied successfully
C:\Windows\Temp will be emptied at reboot
==== After Reboot ======================
==== Empty Temp Folders ======================
C:\Windows\Temp successfully emptied
C:\Users\jarda\AppData\Local\Temp successfully emptied
==== Empty Recycle Bin ======================
C:\$RECYCLE.BIN successfully emptied
==== EOF on po 26.01.2015 at 19:38:33,25 ======================
Kdo je online
Uživatelé prohlížející si toto fórum: Žádní registrovaní uživatelé a 28 hostů