Preventivní kontrola

Místo pro vaše HiJackThis logy a logy z dalších programů…

Moderátoři: Mods_senior, Security team

cerberos2
Level 3.5
Level 3.5
Příspěvky: 663
Registrován: prosinec 12
Pohlaví: Muž
Stav:
Offline

Preventivní kontrola

Příspěvekod cerberos2 » 05 pro 2016 23:36

Budu tento PC dávat příbuzným, tak chci mít jistotu, že tam není nic co by škodilo.

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 23:32:39, on 5. 12. 2016
Platform: Unknown Windows (WinNT 6.02.1008)
MSIE: Internet Explorer v11.0 (11.00.14393.0000)


Boot mode: Normal

Running processes:
C:\Users\Bezrayer\AppData\Roaming\Telegram Desktop\Telegram.exe
C:\PROGRA~2\DUMETE~1\DUMeter.exe
C:\Users\Bezrayer\Desktop\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/p/?LinkId=255141
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/p/?LinkId=255141
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/p/?LinkId=255141
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
F2 - REG:system.ini: UserInit=
O2 - BHO: Skype for Business Click to Call BHO - {31D09BA0-12F5-4CCE-BE8A-2923E76605DA} - C:\Program Files\Microsoft Office 15\root\VFS\ProgramFilesX86\Microsoft Office\Office15\OCHelper.dll
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Java\jre1.8.0_66\bin\ssv.dll
O2 - BHO: Microsoft SkyDrive Pro Browser Helper - {D0498E0A-45B7-42AE-A9AA-ABA463DBD3BF} - C:\Program Files\Microsoft Office 15\root\VFS\ProgramFilesX86\Microsoft Office\Office15\GROOVEEX.DLL
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre1.8.0_66\bin\jp2ssv.dll
O4 - HKLM\..\Run: [StartCCC] "C:\Program Files (x86)\AMD\ATI.ACE\Core-Static\amd64\CLIStart.exe" MSRun
O4 - HKLM\..\Run: [CMD] cmd.exe /c start http://gangnamgame.org && exit
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"
O4 - HKCU\..\Run: [HydraVisionDesktopManager] "C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe"
O4 - HKCU\..\Run: [Sony PC Companion] "C:\Program Files (x86)\Sony\Sony PC Companion\PCCompanion.exe" /Background
O4 - HKCU\..\Run: [DU Meter] "C:\Program Files (x86)\DU Meter\DUMeter.exe" /autostart
O4 - HKCU\..\Run: [Spotify Web Helper] "C:\Users\Bezrayer\AppData\Roaming\Spotify\SpotifyWebHelper.exe"
O4 - HKCU\..\Run: [OneDrive] "C:\Users\Bezrayer\AppData\Local\Microsoft\OneDrive\OneDrive.exe" /background
O4 - HKCU\..\Run: [Spotify] "C:\Users\Bezrayer\AppData\Roaming\Spotify\Spotify.exe" -autostart -minimized
O4 - HKCU\..\Run: [NetBalancer] C:\Program Files\NetBalancer\SeriousBit.NetBalancer.Tray.exe
O4 - HKCU\..\Run: [CCleaner Monitoring] "C:\Program Files\CCleaner\CCleaner64.exe" /MONITOR
O4 - HKCU\..\Run: [DAEMON Tools Lite Automount] "C:\Program Files\DAEMON Tools Lite\DTAgent.exe" -autorun
O4 - HKCU\..\Run: [gmSWG] C:\Program Files\RAVEN Gaming Mouse\gmSWG.exe
O4 - HKCU\..\Run: [gmPoint] C:\Program Files\RAVEN Gaming Mouse\gmPoint.exe
O4 - HKCU\..\Run: [Wechat] C:\Program Files (x86)\Tencent\WeChat\WeChat.exe -autorun
O4 - HKCU\..\Run: [NetLimiter] "D:\Games\Netlimit\nlclientapp.exe" /minimized
O4 - HKCU\..\Run: [MyComGames] "C:\Users\Bezrayer\AppData\Local\MyComGames\MyComGames.exe" -autostart
O4 - HKCU\..\Run: [GalaxyClient] C:\Program Files (x86)\GOG Galaxy\GalaxyClient.exe /launchViaAutoStart
O4 - HKCU\..\RunOnce: [Uninstall C:\Users\Bezrayer\AppData\Local\Microsoft\OneDrive\17.3.6381.0405\amd64] C:\WINDOWS\system32\cmd.exe /q /c rmdir /s /q "C:\Users\Bezrayer\AppData\Local\Microsoft\OneDrive\17.3.6381.0405\amd64"
O4 - HKUS\S-1-5-19\..\Run: [OneDriveSetup] C:\Windows\SysWOW64\OneDriveSetup.exe /thfirstsetup (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [OneDriveSetup] C:\Windows\SysWOW64\OneDriveSetup.exe /thfirstsetup (User 'NETWORK SERVICE')
O4 - Startup: CurseClientStartup.ccip
O4 - Startup: MEGAsync.lnk = Bezrayer\AppData\Local\MEGAsync\MEGAsync.exe
O4 - Startup: Telegram.lnk = Bezrayer\AppData\Roaming\Telegram Desktop\Telegram.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\Program Files\Microsoft Office 15\Root\Office15\EXCEL.EXE/3000
O8 - Extra context menu item: Se&nd to OneNote - res://C:\Program Files\Microsoft Office 15\Root\Office15\ONBttnIE.dll/105
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\Program Files\Microsoft Office 15\root\VFS\ProgramFilesX86\Microsoft Office\Office15\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: Se&nd to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\Program Files\Microsoft Office 15\root\VFS\ProgramFilesX86\Microsoft Office\Office15\ONBttnIE.dll
O9 - Extra button: Skype for Business Click to Call - {31D09BA0-12F5-4CCE-BE8A-2923E76605DA} - C:\Program Files\Microsoft Office 15\root\VFS\ProgramFilesX86\Microsoft Office\Office15\OCHelper.dll
O9 - Extra 'Tools' menuitem: Skype for Business Click to Call - {31D09BA0-12F5-4CCE-BE8A-2923E76605DA} - C:\Program Files\Microsoft Office 15\root\VFS\ProgramFilesX86\Microsoft Office\Office15\OCHelper.dll
O9 - Extra button: OneNote Lin&ked Notes - {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} - C:\Program Files\Microsoft Office 15\root\VFS\ProgramFilesX86\Microsoft Office\Office15\ONBttnIELinkedNotes.dll
O9 - Extra 'Tools' menuitem: OneNote Lin&ked Notes - {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} - C:\Program Files\Microsoft Office 15\root\VFS\ProgramFilesX86\Microsoft Office\Office15\ONBttnIELinkedNotes.dll
O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics
O15 - Trusted Zone: *.clonewarsadventures.com
O15 - Trusted Zone: *.freerealms.com
O15 - Trusted Zone: *.soe.com
O15 - Trusted Zone: *.sony.com
O18 - Protocol: osf - {D924BDC6-C83A-4BD5-90D0-095128A113D1} - C:\Program Files\Microsoft Office 15\root\VFS\ProgramFilesX86\Microsoft Office\Office15\MSOSB.DLL
O18 - Protocol: tbauth - {14654CA6-5711-491D-B89A-58E571679951} - C:\Windows\SysWOW64\tbauth.dll
O18 - Protocol: windows.tbauth - {14654CA6-5711-491D-B89A-58E571679951} - C:\Windows\SysWOW64\tbauth.dll
O23 - Service: Adobe Acrobat Update Service (AdobeARMservice) - Adobe Systems Incorporated - C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
O23 - Service: Adobe Flash Player Update Service (AdobeFlashPlayerUpdateSvc) - Adobe Systems Incorporated - C:\WINDOWS\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe
O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\WINDOWS\System32\alg.exe (file missing)
O23 - Service: AMD External Events Utility - Unknown owner - C:\WINDOWS\system32\atiesrxx.exe (file missing)
O23 - Service: AODService - Unknown owner - C:\Program Files (x86)\AMD\OverDrive\AODAssist.exe
O23 - Service: DbxSvc - Unknown owner - C:\WINDOWS\system32\DbxSvc.exe (file missing)
O23 - Service: @%SystemRoot%\system32\DiagSvcs\DiagnosticsHub.StandardCollector.ServiceRes.dll,-1000 (diagnosticshub.standardcollector.service) - Unknown owner - C:\WINDOWS\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe (file missing)
O23 - Service: Disc Soft Lite Bus Service - Disc Soft Ltd - C:\Program Files\DAEMON Tools Lite\DiscSoftBusServiceLite.exe
O23 - Service: DU Meter Service (DUMeterSvc) - Hagel Technologies Ltd. - C:\Program Files (x86)\DU Meter\DUMeterSvc.exe
O23 - Service: @%SystemRoot%\system32\efssvc.dll,-100 (EFS) - Unknown owner - C:\WINDOWS\System32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\fxsresm.dll,-118 (Fax) - Unknown owner - C:\WINDOWS\system32\fxssvc.exe (file missing)
O23 - Service: GalaxyClientService - GOG.com - C:\Program Files (x86)\GOG Galaxy\GalaxyClientService.exe
O23 - Service: GalaxyCommunication - GOG.com - C:\ProgramData\GOG.com\Galaxy\redists\GalaxyCommunication.exe
O23 - Service: Tjänsten Google Update (gupdate) (gupdate) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Tjänsten Google Update (gupdatem) (gupdatem) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Hi-Rez Studios Authenticate and Update Service (HiPatchService) - Hi-Rez Studios - F:\Program Files (x86)\Hi-Rez Studios\HiPatchService.exe
O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\WINDOWS\System32\msdtc.exe (file missing)
O23 - Service: NetBalancerService - SeriousBit - C:\Program Files\NetBalancer\SeriousBit.NetBalancer.Service.exe
O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: NitroPDFDriverCreatorReadSpool11 (NitroDriverReadSpool11) - Nitro Software, Inc. - C:\Program Files\Nitro\Pro 11\NitroPDFDriverService11x64.exe
O23 - Service: NitroUpdateService - Unknown owner - C:\Program Files\Nitro\Pro 11\Nitro_UpdateService.exe
O23 - Service: NetLimiter 4 Service (nlsvc) - Locktime Software - D:\Games\Netlimit\NLSvc.exe
O23 - Service: Nalpeiron Licensing Service (nlsX86cc) - Nalpeiron Ltd. - C:\WINDOWS\SysWOW64\NLSSRV32.EXE
O23 - Service: nProtect GameGuard Service (npggsvc) - Unknown owner - C:\WINDOWS\system32\GameMon.des.exe (file missing)
O23 - Service: OpenVPN Service (OpenVPNService) - The OpenVPN Project - C:\Program Files\OpenVPN\bin\openvpnserv.exe
O23 - Service: Origin Client Service - Electronic Arts - C:\Program Files (x86)\Origin\OriginClientService.exe
O23 - Service: Origin Web Helper Service - Electronic Arts - C:\Program Files (x86)\Origin\OriginWebHelperService.exe
O23 - Service: Razer Game Scanner (Razer Game Scanner Service) - Unknown owner - C:\Program Files (x86)\Razer\Razer Services\GSS\GameScannerService.exe
O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\WINDOWS\system32\locator.exe (file missing)
O23 - Service: RzKLService - Razer Inc. - C:\Program Files (x86)\Razer\Razer Cortex\RzKLService.exe
O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: @%ProgramFiles%\Windows Defender Advanced Threat Protection\MsSense.exe,-1001 (Sense) - Unknown owner - C:\Program Files (x86)\Windows Defender Advanced Threat Protection\MsSense.exe (file missing)
O23 - Service: @%SystemRoot%\system32\SensorDataService.exe,-101 (SensorDataService) - Unknown owner - C:\WINDOWS\System32\SensorDataService.exe (file missing)
O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\WINDOWS\System32\snmptrap.exe (file missing)
O23 - Service: Sony PC Companion - Avanquest Software - C:\Program Files (x86)\Sony\Sony PC Companion\PCCService.exe
O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\WINDOWS\System32\spoolsv.exe (file missing)
O23 - Service: @%SystemRoot%\system32\sppsvc.exe,-101 (sppsvc) - Unknown owner - C:\WINDOWS\system32\sppsvc.exe (file missing)
O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files (x86)\Common Files\Steam\SteamService.exe
O23 - Service: @%SystemRoot%\system32\TieringEngineService.exe,-702 (TieringEngineService) - Unknown owner - C:\WINDOWS\system32\TieringEngineService.exe (file missing)
O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\WINDOWS\system32\UI0Detect.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vaultsvc.dll,-1003 (VaultSvc) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\WINDOWS\System32\vds.exe (file missing)
O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\WINDOWS\system32\vssvc.exe (file missing)
O23 - Service: @%systemroot%\system32\wbengine.exe,-104 (wbengine) - Unknown owner - C:\WINDOWS\system32\wbengine.exe (file missing)
O23 - Service: @%ProgramFiles%\Windows Defender\MpAsDesc.dll,-320 (WdNisSvc) - Unknown owner - C:\Program Files (x86)\Windows Defender\NisSrv.exe (file missing)
O23 - Service: @%ProgramFiles%\Windows Defender\MpAsDesc.dll,-310 (WinDefend) - Unknown owner - C:\Program Files (x86)\Windows Defender\MsMpEng.exe (file missing)
O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\WINDOWS\system32\wbem\WmiApSrv.exe (file missing)
O23 - Service: @%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing)

--
End of file - 12998 bytes
Asus M5A78L-M LX V2
AMD Athlon II X4 640
8GB DDR3 1333MHz
MSI Radeon HD5670 Cyclone 1G
Windows 10 Pro 64-bit

Reklama
Uživatelský avatar
jaro3
člen Security týmu
Guru Level 15
Guru Level 15
Příspěvky: 43298
Registrován: červen 07
Bydliště: Jižní Čechy
Pohlaví: Muž
Stav:
Offline

Re: Preventivní kontrola

Příspěvekod jaro3 » 06 pro 2016 09:04

Stáhni si ATF Cleaner
Poklepej na ATF Cleaner.exe, klikni na select all found, poté:
-Když používáš Firefox (Mozzila), klikni na Firefox nahoře a vyber: Select All, poté klikni na Empty Selected.
-Když používáš Operu, klikni nahoře na Operu a vyber: Select All, poté klikni na Empty Selected. Poté klikni na Main (hlavní stránku ) a klikni na Empty Selected.
Po vyčištění klikni na Exit k zavření programu.
ATF-Cleaner je jednoduchý nástroj na odstranění historie z webového prohlížeče. Program dokáže odstranit cache, cookies, historii a další stopy po surfování na Internetu. Mezi podporované prohlížeče patří Internet Explorer, Firefox a Opera. Aplikace navíc umí odstranit dočasné soubory Windows, vysypat koš atd.
- Pokud používáš jen Google Chrome , tak ATF nemusíš použít.


Stáhni si TFC
http://www.geekstogo.com/forum/files/fi ... -oldtimer/
Otevři soubor a zavři všechny ostatní okna, Klikni na Start k zahájení procesu. Program by neměl trvat dlouho.
Poté by se měl PC restartovat, pokud ne , proveď sám.

Stáhni AdwCleaner (by Xplode)
http://www.bleepingcomputer.com/download/adwcleaner/

Ulož si ho na svojí plochu
Ukonči všechny programy , okna a prohlížeče
Spusť program poklepáním a klikni na „Scan“
Po skenu klikni na „Logfile“ ,objeví se okno „Log Manager“ a pak poklepej na odpovídající log , který se otevře. ( jinak je uložen systémovem disku jako C:\AdwCleaner [C?].txt ), jeho obsah sem celý vlož.

Stáhni si Malwarebytes' Anti-Malware
- Při instalaci odeber zatržítko u „Povolit bezplatnou zkušební verzi Malwarebytes' Anti-Malware Premium“
Nainstaluj a spusť ho
- na konci instalace se ujisti že máš zvoleny/zatrhnuty obě možnosti:
Aktualizace Malwarebytes' Anti-Malware a Spustit aplikaci Malwarebytes' Anti-Malware, pokud jo tak klikni na tlačítko konec
-Pokud není program aktuální , klikni na možnost „Aktualizovat nyní“ či „Opravit nyní“.
- bude nalezena aktualizace a nainstaluje se.
- poté klikni na Skenovat nyní
- po proběhnutí programu se ti objeví hláška vpravo dole, tak klikni na Uložit výsledky a vyber zkopírovat do schránky a vlož sem celý log. Nebo klikni na „Textový soubor ( .txt)“ a log si ulož.
-jinak se log nachází zde: C:\ProgramData\Malwarebytes\Malwarebytes Anti-Malware\Logs

- po té klikni na tlačítko Dokončit, a program zavři křížkem vpravo nahoře.
(zatím nic nemaž!).
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra

cerberos2
Level 3.5
Level 3.5
Příspěvky: 663
Registrován: prosinec 12
Pohlaví: Muž
Stav:
Offline

Re: Preventivní kontrola

Příspěvekod cerberos2 » 06 pro 2016 10:33

ADW
# AdwCleaner v6.040 - Logfile created 06/12/2016 at 10:09:23
# Updated on 02/12/2016 by Malwarebytes
# Database : 2016-12-05.1 [Server]
# Operating System : Windows 10 Pro (X64)
# Username : Bezrayer - SELDA
# Running from : C:\Users\Bezrayer\Desktop\AdwCleaner.exe
# Mode: Scan
# Support : https://www.malwarebytes.com/support



***** [ Services ] *****

No malicious services found.


***** [ Folders ] *****

Folder Found: C:\ProgramData\yWMiniProy
Folder Found: C:\Users\Bezrayer\ScreenShot
Folder Found: C:\Users\Bezrayer\AppData\Roaming\Tencent
Folder Found: C:\Program Files (x86)\Tencent
Folder Found: C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Extensions\mamnihopcnbfnbfnnneplcohmnkkpipb


***** [ Files ] *****

File Found: C:\ProgramData\{262E20B8-6E20-4CEF-B1FD-D022AB1085F5}.dat
File Found: C:\ProgramData\Application Data\{262E20B8-6E20-4CEF-B1FD-D022AB1085F5}.dat


***** [ DLL ] *****

No malicious DLLs found.


***** [ WMI ] *****

No malicious keys found.


***** [ Shortcuts ] *****

No infected shortcut found.


***** [ Scheduled Tasks ] *****

Task Found: LaunchPreSignup


***** [ Registry ] *****

Key Found: HKLM\SYSTEM\CurrentControlSet\Services\EventLog\Application\WdsManPro
Key Found: [x64] HKLM\SYSTEM\CurrentControlSet\Services\EventLog\Application\WdsManPro
Key Found: HKU\S-1-5-21-3025460961-235328027-311272571-1001\Software\ICSW1.17
Key Found: HKU\S-1-5-21-3025460961-235328027-311272571-1001\Software\PRODUCTSETUP
Key Found: HKU\S-1-5-21-3025460961-235328027-311272571-1001\Software\csastats
Key Found: HKCU\Software\ICSW1.17
Key Found: HKCU\Software\PRODUCTSETUP
Key Found: HKCU\Software\csastats
Key Found: HKLM\SOFTWARE\WdsManPro
Key Found: HKLM\SOFTWARE\yoursearchingSoftware
Key Found: [x64] HKCU\Software\ICSW1.17
Key Found: [x64] HKCU\Software\PRODUCTSETUP
Key Found: [x64] HKCU\Software\csastats
Key Found: HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\st.chatango.com
Key Found: HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\st.chatango.com
Key Found: [x64] HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\st.chatango.com
Key Found: [x64] HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\st.chatango.com
Value Found: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [cmd]
Value Found: [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run32 [cmd]
Value Found: HKU\S-1-5-21-3025460961-235328027-311272571-1001\Software\Microsoft\Windows\CurrentVersion\Run [Wechat]
Value Found: HKU\S-1-5-21-3025460961-235328027-311272571-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run [Wechat]
Value Found: HKCU\Software\Microsoft\Windows\CurrentVersion\Run [Wechat]
Value Found: [x64] HKCU\Software\Microsoft\Windows\CurrentVersion\Run [Wechat]


***** [ Web browsers ] *****

No malicious Firefox based browser items found.
Chrome pref Found: [C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Web data] - isearch.avg.com
Chrome pref Found: [C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Web data] - babylon.com
Chrome pref Found: [C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Web data] - yoursearching
Chrome pref Found: [C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Web data] - pandora-one-desktop-app.en.softonic.com
Chrome pref Found: [C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Web data] - mystart.incredibar.com/mb188
Chrome pref Found: [C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Web data] - ask.com
Chrome pref Found: [C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences] - hxxp://www.yoursearching.com/?type=hp&t ... r&uid=ST37
Chrome pref Found: [C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences ] - mamnihopcnbfnbfnnneplcohmnkkpipb

*************************

C:\AdwCleaner\AdwCleaner[S0].txt - [4557 Bytes] - [06/12/2016 10:09:23]

########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [4630 Bytes] ##########
Asus M5A78L-M LX V2
AMD Athlon II X4 640
8GB DDR3 1333MHz
MSI Radeon HD5670 Cyclone 1G
Windows 10 Pro 64-bit

cerberos2
Level 3.5
Level 3.5
Příspěvky: 663
Registrován: prosinec 12
Pohlaví: Muž
Stav:
Offline

Re: Preventivní kontrola

Příspěvekod cerberos2 » 06 pro 2016 10:34

Malwarebytes
Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 6. 12. 2016
Scan Time: 10:14
Logfile:
Administrator: Yes

Version: 2.2.1.1043
Malware Database: v2016.12.06.05
Rootkit Database: v2016.11.20.01
License: Trial
Malware Protection: Enabled
Malicious Website Protection: Enabled
Self-protection: Disabled

OS: Windows 10
CPU: x64
File System: NTFS
User: Bezrayer

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 337594
Time Elapsed: 16 min, 45 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 11
PUP.Optional.MyPCBackup, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{05D75ABE-1342-436A-AF59-501F55FB832B}, , [100d05dffe9c4aeceb58f47e52b1f30d],
PUP.Optional.StartPage, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\AION NF Saturday, , [f825a440edad60d6ca10c7ca778bce32],
PUP.Optional.StartPage, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\AION NF Sunday, , [0a13bc28b8e273c36e6c80114cb64fb1],
PUP.Optional.StartPage, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\AION NS Saturday, , [5ebf6a7a5e3c34027f5bdeb3ba48728e],
PUP.Optional.StartPage, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\AION NS Sunday, , [55c87e6653471d19bd1de0b1e61cb050],
PUP.Optional.MyPCBackup, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\LaunchPreSignup, , [8a93cf15801a77bf4f1abb7cf40f6e92],
PUP.Optional.WdsManPro, HKLM\SOFTWARE\WOW6432NODE\WdsManPro, , [30ed05df39612e08cd60ca7eaf54e917],
PUP.Optional.YourSearching.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\yoursearchingSoftware, , [68b501e3e0babf7748b5dd880ff4b14f],
PUP.Optional.WindowsProtectionManager, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\EVENTLOG\APPLICATION\WdsManPro, , [aa73776d475303331fd1c1ce34ce5ca4],
PUP.Optional.InstallCore, HKU\S-1-5-21-3025460961-235328027-311272571-1001\SOFTWARE\csastats, , [a37ac123841674c256c4eb908d764cb4],
PUP.Optional.InstallCore, HKU\S-1-5-21-3025460961-235328027-311272571-1001\SOFTWARE\ICSW1.17, , [5dc010d4702a78beb13a8ba6b74cde22],

Registry Values: 2
PUP.Optional.MyPCBackup, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{05D75ABE-1342-436A-AF59-501F55FB832B}|Path, \LaunchPreSignup, , [100d05dffe9c4aeceb58f47e52b1f30d]
PUP.Optional.StartPage, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|CMD, cmd.exe /c start http://gangnamgame.org && exit, , [1805c61e32685dd95619bad9cd35aa56]

Registry Data: 0
(No malicious items detected)

Folders: 3
PUP.Optional.AION, C:\Users\Bezrayer\AppData\Roaming\AION, , [5bc2e301306a49edff854d246b9514ec],
PUP.Optional.WindowsProtectManager, C:\ProgramData\yWMiniProy, , [3fdea242dcbef6402c8b88f84bb713ed],
PUP.Optional.WindowsProtectManager, C:\ProgramData\yWMiniProy\mitest, , [3fdea242dcbef6402c8b88f84bb713ed],

Files: 7
RiskWare.FilePatcher, C:\Program Files (x86)\DU Meter\du.meter.6.x-patch.exe, , [c756f4f00c8eba7c66fbd4b07190ae52],
PUP.Optional.InstallCore, C:\Users\Bezrayer\AppData\Roaming\FlvtoConverter\FlvtoConverterSetupV0.7.3.exe, , [64b9786c0991e1552a30a9d0c53ce719],
PUP.Optional.InstallCore, C:\Users\Bezrayer\AppData\Roaming\FlvtoConverter\FlvtoConverterSetupV1.0.5.exe, , [829b0fd5b7e356e0f862b5c4fd045aa6],
PUP.Optional.BundleInstaller, C:\Users\Bezrayer\AppData\Roaming\FlvtoConverter\FlvtoConverterSetupV1.0.6.exe, , [a17c479d21797abc2164b837de22f907],
PUP.Optional.AION, C:\Users\Bezrayer\AppData\Roaming\AION\td.ico, , [5bc2e301306a49edff854d246b9514ec],
PUP.Optional.MyPCBackup, C:\Windows\System32\Tasks\LaunchPreSignup, , [2fee1dc71288290d7ceb80b7f90acf31],
PUP.Optional.WindowsProtectManager, C:\ProgramData\yWMiniProy\mitestconf, , [3fdea242dcbef6402c8b88f84bb713ed],

Physical Sectors: 0
(No malicious items detected)


(end)
Asus M5A78L-M LX V2
AMD Athlon II X4 640
8GB DDR3 1333MHz
MSI Radeon HD5670 Cyclone 1G
Windows 10 Pro 64-bit

Uživatelský avatar
jaro3
člen Security týmu
Guru Level 15
Guru Level 15
Příspěvky: 43298
Registrován: červen 07
Bydliště: Jižní Čechy
Pohlaví: Muž
Stav:
Offline

Re: Preventivní kontrola

Příspěvekod jaro3 » 06 pro 2016 17:18

Spusť znovu AdwCleaner (u Windows Vista či Windows7, klikni na AdwCleaner pravým a vyber „Spustit jako správce
klikni na „Scan“, po prohledání klikni na „ Clean

Program provede opravu, po automatickém restartu klikni na „Log Manager“ a pak poklepej na odpovídají log, (C:\AdwCleaner [C?].txt) , jeho obsah sem celý vlož.

Stáhni si Junkware Removal Tool by Thisisu
http://www.bleepingcomputer.com/downloa ... oval-tool/
na svojí plochu.

Deaktivuj si svůj antivirový program. Pravým tl. myši klikni na JRT.exe a vyber „spustit jako správce“. Pro pokračování budeš vyzván ke stisknutí jakékoliv klávesy. Na nějakou klikni.
Začne skenování programu. Skenování může trvat dloho , podle množství nákaz. Po ukončení skenu se objeví log (JRT.txt) , který se uloží na ploše.
Zkopíruj sem prosím celý jeho obsah.

. spusť znovu Malwarebytes' Anti-Malware a dej Skenovat nyní
- po proběhnutí programu se ti objeví hláška tak klikni na „Vše do karantény(smazat vybrané)“ a na „Exportovat záznam“ a vyber „textový soubor“ , soubor nějak pojmenuj a někam ho ulož. Zkopíruj se celý obsah toho logu.

Sophos Virus Removal Tool je praktický softwarový nástroj, který by mohl odstranit infekce, které antivirový program nedetekuje .
Stáhněte si ho zde z některého odkazu:
http://www.majorgeeks.com/mg/get/sophos ... ool,1.html
http://www.majorgeeks.com/mg/getmirror/ ... ool,1.html
http://www.majorgeeks.com/mg/getmirror/ ... ool,2.html

Viry mohou zpomalit počítač, nebo se snaží ukrást vaše data, a ani nevíte , že je máte. Co potřebujete, je rychlý a snadný způsob, jak je najít a zbavit se jich, pokud již máte antivirový program v počítači nainstalován , můžete nainstalovat i nástroj Sophos Virus Removal , který identifikuje a vyčistí zbylé infekce, které mohl Váš antivirový program přehlédnout.
K použití Sophos Virus Removal Tool na něj poklepejte a stiskněte tlačítko „Start scanning“ . Pak bude Sophos Virus Removal Tool vyhledávat a odstraňovat viry, které najde. Může být vyžadován restart.


Stáhni si RogueKiller by Adlice Software
32bit.:
http://www.adlice.com/download/roguekil ... HlwZT14ODY

64bit.:
http://www.adlice.com/download/roguekil ... HlwZT14NjQ
na svojí plochu.
- Zavři všechny ostatní programy a prohlížeče.
- Pro OS Vista a win7,8,10 spusť program RogueKiller.exe jako správce , u XP poklepáním.
- klikni na „Start Scan“. V novém okně nic neměň a klikni dole na „Start Scan“
- Program skenuje procesy PC. Po proskenování klikni na „Open Report “ , v okně pak na „Open TXT“ a celý obsah logu sem zkopíruj.
Pokud je program blokován , zkus ho spustit několikrát. Pokud dále program nepůjde spustit a pracovat, přejmenuj ho na winlogon.exe.
-pokud bude mít log více než 60.000 znaků , rozděl ho a vlož do více příspěvků
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra

cerberos2
Level 3.5
Level 3.5
Příspěvky: 663
Registrován: prosinec 12
Pohlaví: Muž
Stav:
Offline

Re: Preventivní kontrola

Příspěvekod cerberos2 » 06 pro 2016 17:54

ADW
# AdwCleaner v6.040 - Logfile created 06/12/2016 at 17:42:21
# Updated on 02/12/2016 by Malwarebytes
# Database : 2016-12-05.1 [Local]
# Operating System : Windows 10 Pro (X64)
# Username : Bezrayer - SELDA
# Running from : C:\Users\Bezrayer\Desktop\AdwCleaner.exe
# Mode: Clean
# Support : https://www.malwarebytes.com/support



***** [ Services ] *****



***** [ Folders ] *****

[-] Folder deleted: C:\ProgramData\yWMiniProy
[-] Folder deleted: C:\Users\Bezrayer\ScreenShot
[-] Folder deleted: C:\Users\Bezrayer\AppData\Roaming\Tencent
[-] Folder deleted: C:\Program Files (x86)\Tencent
[-] Folder deleted: C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Extensions\mamnihopcnbfnbfnnneplcohmnkkpipb


***** [ Files ] *****

[-] File deleted: C:\ProgramData\{262E20B8-6E20-4CEF-B1FD-D022AB1085F5}.dat
[#] File deleted: C:\ProgramData\Application Data\{262E20B8-6E20-4CEF-B1FD-D022AB1085F5}.dat


***** [ DLL ] *****



***** [ WMI ] *****



***** [ Shortcuts ] *****



***** [ Scheduled Tasks ] *****

[-] Task deleted: LaunchPreSignup


***** [ Registry ] *****

[-] Key deleted: HKLM\SYSTEM\CurrentControlSet\Services\EventLog\Application\WdsManPro
[#] Key deleted on reboot: [x64] HKLM\SYSTEM\CurrentControlSet\Services\EventLog\Application\WdsManPro
[-] Key deleted: HKU\S-1-5-21-3025460961-235328027-311272571-1001\Software\ICSW1.17
[-] Key deleted: HKU\S-1-5-21-3025460961-235328027-311272571-1001\Software\PRODUCTSETUP
[-] Key deleted: HKU\S-1-5-21-3025460961-235328027-311272571-1001\Software\csastats
[#] Key deleted on reboot: HKCU\Software\ICSW1.17
[#] Key deleted on reboot: HKCU\Software\PRODUCTSETUP
[#] Key deleted on reboot: HKCU\Software\csastats
[-] Key deleted: HKLM\SOFTWARE\WdsManPro
[-] Key deleted: HKLM\SOFTWARE\yoursearchingSoftware
[#] Key deleted on reboot: [x64] HKCU\Software\ICSW1.17
[#] Key deleted on reboot: [x64] HKCU\Software\PRODUCTSETUP
[#] Key deleted on reboot: [x64] HKCU\Software\csastats
[-] Key deleted: HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\st.chatango.com
[-] Key deleted: HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\st.chatango.com
[#] Key deleted on reboot: [x64] HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\st.chatango.com
[#] Key deleted on reboot: [x64] HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\st.chatango.com
[-] Value deleted: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [cmd]
[-] Value deleted: [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run32 [cmd]
[-] Value deleted: HKU\S-1-5-21-3025460961-235328027-311272571-1001\Software\Microsoft\Windows\CurrentVersion\Run [Wechat]
[-] Value deleted: HKU\S-1-5-21-3025460961-235328027-311272571-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run [Wechat]
[#] Value deleted on reboot: HKCU\Software\Microsoft\Windows\CurrentVersion\Run [Wechat]
[#] Value deleted on reboot: [x64] HKCU\Software\Microsoft\Windows\CurrentVersion\Run [Wechat]


***** [ Web browsers ] *****

[-] [C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Web data] [Search Provider] Deleted: isearch.avg.com
[-] [C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Web data] [Search Provider] Deleted: babylon.com
[-] [C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Web data] [Search Provider] Deleted: yoursearching
[-] [C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Web data] [Search Provider] Deleted: pandora-one-desktop-app.en.softonic.com
[-] [C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Web data] [Search Provider] Deleted: mystart.incredibar.com/mb188
[-] [C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Web data] [Search Provider] Deleted: ask.com
[-] [C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default] [startup_urls] Deleted: hxxp://www.yoursearching.com/?type=hp&t ... XX6VPJV3N2
[-] [C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default] [extension] Deleted: mamnihopcnbfnbfnnneplcohmnkkpipb


*************************

:: "Tracing" keys deleted
:: Winsock settings cleared

*************************

C:\AdwCleaner\AdwCleaner[C0].txt - [4803 Bytes] - [06/12/2016 17:42:21]
C:\AdwCleaner\AdwCleaner[S0].txt - [4741 Bytes] - [06/12/2016 10:09:23]
C:\AdwCleaner\AdwCleaner[S1].txt - [4813 Bytes] - [06/12/2016 17:41:11]

########## EOF - C:\AdwCleaner\AdwCleaner[C0].txt - [5022 Bytes] ##########
Asus M5A78L-M LX V2
AMD Athlon II X4 640
8GB DDR3 1333MHz
MSI Radeon HD5670 Cyclone 1G
Windows 10 Pro 64-bit

cerberos2
Level 3.5
Level 3.5
Příspěvky: 663
Registrován: prosinec 12
Pohlaví: Muž
Stav:
Offline

Re: Preventivní kontrola

Příspěvekod cerberos2 » 06 pro 2016 17:54

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 8.0.9 (09.30.2016)
Operating System: Windows 10 Pro x64
Ran by Bezrayer (Administrator) on £t 06. 12. 2016 at 17:47:30,86
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




File System: 8

Successfully deleted: C:\ProgramData\Start Menu\Programs\clipgrab (Folder)
Successfully deleted: C:\Users\Bezrayer\AppData\Local\crashrpt (Folder)
Successfully deleted: C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Extensions\gkojfkhlekighikafcpjkiklfbnlmeio (Folder)
Successfully deleted: C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gkojfkhlekighikafcpjkiklfbnlmeio (Folder)
Successfully deleted: C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_gkojfkhlekighikafcpjkiklfbnlmeio_0.localstorage (File)
Successfully deleted: C:\Users\Bezrayer\AppData\Roaming\3909 (Folder)
Successfully deleted: C:\users\Public\Documents\alawarwrapper (Folder)
Successfully deleted: C:\Program Files (x86)\GUT3BF.tmp (File)



Registry: 0





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on £t 06. 12. 2016 at 17:51:27,67
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Asus M5A78L-M LX V2
AMD Athlon II X4 640
8GB DDR3 1333MHz
MSI Radeon HD5670 Cyclone 1G
Windows 10 Pro 64-bit

cerberos2
Level 3.5
Level 3.5
Příspěvky: 663
Registrován: prosinec 12
Pohlaví: Muž
Stav:
Offline

Re: Preventivní kontrola

Příspěvekod cerberos2 » 06 pro 2016 19:31

Snažil jsem, ale poté co jsem uložil log z malwarebytes na plochu tak po restartu PC je pryč a ve složcce s logy jsou jen ty XML.

RogueKiller V12.8.4.0 (x64) [Dec 5 2016] (Free) by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Webová stránka : http://www.adlice.com/download/roguekiller/
Blog : http://www.adlice.com

Operační systém : Windows 10 (10.0.14393) 64 bits version
Spuštěno : Normální režim
Uživatel : Bezrayer [Práva správce]
Started from : C:\Users\Bezrayer\Desktop\RogueKillerX64.exe
Mód : Prohledat -- Datum : 12/06/2016 18:31:05 (Duration : 00:59:04)

¤¤¤ Procesy : 0 ¤¤¤

¤¤¤ Registry : 8 ¤¤¤
[PUP] (X64) HKEY_USERS\S-1-5-21-3025460961-235328027-311272571-1001\Software\Tencent -> Nalezeno
[PUP] (X86) HKEY_USERS\S-1-5-21-3025460961-235328027-311272571-1001\Software\Tencent -> Nalezeno
[PUP.HackTool] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {E4C57284-7EA6-46F2-BDA2-E249C5649591} : v2.25|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\Program Files\KMSpico\AutoPico.exe|Name=KMS Emulator: AutoPico.exe| [x] -> Nalezeno
[PUP.HackTool] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {DA931DC6-4499-419B-9B42-87E55A31B595} : v2.25|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\Program Files\KMSpico\AutoPico.exe|Name=KMS Emulator: AutoPico.exe| [x] -> Nalezeno
[PUP.HackTool] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {C5CE1613-8170-49A3-ADEE-61EBE2EE7992} : v2.25|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\Program Files\KMSpico\KMSELDI.exe|Name=KMS Emulator: KMSELDI.exe| [x] -> Nalezeno
[PUP.HackTool] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {74AD65D7-F52A-4FCE-A0BB-F8D18A57D032} : v2.25|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\Program Files\KMSpico\KMSELDI.exe|Name=KMS Emulator: KMSELDI.exe| [x] -> Nalezeno
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {D8F41EC9-9656-4C48-9EBC-A7D46A5BD3A8} : v2.25|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Private|RPort=80|RPort=443|RPort=8080|RPort2_10=6665-6669|RPort2_10=6695-6699|App=C:\Users\Bezrayer\AppData\Local\Warframe\Downloaded\Public\Tools\Launcher.exe|Name=Warframe Launcher (TCP-Out)|EmbedCtxt=Warframe| [x] -> Nalezeno
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {42B6E099-6ACF-4BC3-8DA1-8E4D48E00693} : v2.25|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|RPort=80|RPort=443|RPort=8080|RPort2_10=6665-6669|RPort2_10=6695-6699|App=C:\Users\Bezrayer\AppData\Local\Warframe\Downloaded\Public\Tools\Launcher.exe|Name=Warframe Launcher (TCP-In)|EmbedCtxt=Warframe|Edge=TRUE| [x] -> Nalezeno

¤¤¤ Úlohy : 1 ¤¤¤
[PUP.HackTool] \AutoPico Daily Restart -- "C:\Program Files\KMSpico\AutoPico.exe" (/silent) -> Nalezeno

¤¤¤ Soubory : 4 ¤¤¤
[Hj.Shortcut][Soubor] C:\2-click run\Google Chrome.lnk [LNK@] C:\PROGRA~2\Google\Chrome\APPLIC~1\chrome.exe http://free-apps.friendsinwar.com/viewp ... ?page_id=2 -> Nalezeno
[Hj.Shortcut][Soubor] C:\2-click run\Internet Explorer.lnk [LNK@] C:\PROGRA~2\INTERN~1\iexplore.exe http://free-apps.friendsinwar.com/viewp ... ?page_id=2 -> Nalezeno
[Hj.Shortcut][Soubor] C:\2-click run\Mozilla Firefox.lnk [LNK@] C:\PROGRA~2\MOZILL~1\firefox.exe http://free-apps.friendsinwar.com/viewp ... ?page_id=2 -> Nalezeno
[PUP][Soubor] C:\Windows\SECOH-QAD.exe -> Nalezeno

¤¤¤ WMI : 0 ¤¤¤

¤¤¤ Soubor HOSTS : 0 ¤¤¤

¤¤¤ Antirootkit : 0 (Driver: Nenahrán [0x20]) ¤¤¤

¤¤¤ Webové prohlížeče : 3 ¤¤¤
[PUP][Chrome:Addon] Default : Illimitux [mamnihopcnbfnbfnnneplcohmnkkpipb] -> Nalezeno
[PUM.HomePage][Chrome:Config] Default [SecurePrefs] : homepage [https://www.idoklad.cz/enter.aspx#Login/LoginView] -> Nalezeno
[PUM.HomePage][Chrome:Config] Default [SecurePrefs] : session.startup_urls [http://www.seznam.cz/|http://www.yoursearching.com/?type=hp&ts=1448905336&z=320d1f1bc3a494af4e4274eg2zbzab3t2ebwecac1b&from=cor&uid=ST3750525AS_6VPJV3N2XXXX6VPJV3N2] -> Nalezeno

¤¤¤ Kontrola MBR : ¤¤¤
+++++ PhysicalDrive0: ST3750525AS ATA Device +++++
--- User ---
[MBR] 65b9a11788fcc4630bb4201689ac73ee
[BSP] 3fe0461c3c90f1105101c5774df27091 : Windows Vista/7/8|VT.Unknown MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 224413 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
2 - [XXXXXX] ACER (0x27) [VISIBLE] Offset (sectors): 459804672 | Size: 450 MB
3 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 460726272 | Size: 490440 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
User = LL1 ... OK
User = LL2 ... OK

+++++ PhysicalDrive1: SAMSUNG HD103SI ATA Device +++++
--- User ---
[MBR] a9ef61d2bd80e799242396c0e0cd574a
[BSP] dc9b476f6daa3e4a2b93b8b329059e12 : Empty|VT.Unknown MBR Code
Partition table:
0 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 63 | Size: 953867 MB [Windows XP Bootstrap | Windows XP Bootloader]
User = LL1 ... OK
User = LL2 ... OK
Asus M5A78L-M LX V2
AMD Athlon II X4 640
8GB DDR3 1333MHz
MSI Radeon HD5670 Cyclone 1G
Windows 10 Pro 64-bit

Uživatelský avatar
jaro3
člen Security týmu
Guru Level 15
Guru Level 15
Příspěvky: 43298
Registrován: červen 07
Bydliště: Jižní Čechy
Pohlaví: Muž
Stav:
Offline

Re: Preventivní kontrola

Příspěvekod jaro3 » 06 pro 2016 22:22

Exportovat záznam“ a vyber „textový soubor“ , soubor nějak pojmenuj a někam ho ulož. Zkopíruj se celý obsah toho logu.
tohle si neudělal?

Zavři všechny programy a prohlížeče. Deaktivuj antivir a firewall.
Prosím, odpoj všechny USB (kromě myši s klávesnice) nebo externí disky z počítače před spuštěním tohoto programu.
Spusť znovu RogueKiller ( Pro Windows Vista nebo Windows 7, klepni pravým a vyber "Spustit jako správce", ve Windows XP poklepej ke spuštění).
- klikni na „Start Scan“. V novém okně nic neměň a klikni dole na „Start Scan“,
po jeho skončení - vše zatrhni (dej zatržítka vlevo od nálezů , do bílých políček)
- pak klikni na "Remove Selected"
- Počkej, dokud Status box nezobrazí " Removal finished, please review result "
- Klikni na "Open report " a pak na " Open TXT“ a zkopíruj ten log a vlož obsah té zprávy prosím sem. Log je možno nalézt v C:\ProgramData\RogueKiller\Logs - Zavři RogueKiller.


Vypni antivir i firewall.
Stáhni
Zoek.exe
a uloz si ho na plochu.
Zavři všechny ostatní programy , okna i prohlížeče.
Spusť Zoek.exe ( u win vista , win7, 8 klikni na něj pravým a vyber : „Spustit jako správce“
-pozor , náběh programu může trvat déle.

Do okna programu vlož skript níže:

Kód: Vybrat vše

autoclean;
emptyclsid;
iedefaults;
FFdefaults;
CHRdefaults;
emptyalltemp;
resethosts;


klikni na Run Script
Program provede sken , opravu, sken i oprava může trvat i více minut ,je třeba posečkat do konce. Do okna neklikej!
Program nabídne restart , potvrď .

Po restartu se může nějaký čas ukázat pouze černá plocha , to je normální. Je třeba počkat až se vytvoří log. Ten si můžeš uložit třeba do dokumentů , jinak se sám ukládá do:
C:\zoek-results.log
Zkopíruj sem celý obsah toho logu.

Vlož nový log z HJT

Prosím stáhni příslušnou verzi programu pro Tvůj systém 32-bit/64-bit FarbarRecovery Scan Tool (FrSt)
32bit.:
http://www.bleepingcomputer.com/downloa ... ool/dl/81/
64bit.:
http://www.bleepingcomputer.com/downloa ... ool/dl/82/
a ulož jej na plochu. ,pak spusť FrSt.
Potvrď způsob užití.
Neměň žádné z výchozích nastavení a klikni na položku „Scan“ („Skenovat“) .Když je skenování dokončeno, ukážou se dva logy = FRST.txt a Addition.txt a uloží se na ploše.Prosím zkopíruj sem celý jejich obsah.
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra

cerberos2
Level 3.5
Level 3.5
Příspěvky: 663
Registrován: prosinec 12
Pohlaví: Muž
Stav:
Offline

Re: Preventivní kontrola

Příspěvekod cerberos2 » 06 pro 2016 23:46

Ano udělal jsem vše, dokonce ten log byl vidět na ploše..
Jinak dělám ten Zoek, ale ten už 45 minut stojí a nic se neděje snad to není špatné znamení.

RogueKiller V12.8.4.0 (x64) [Dec 5 2016] (Free) by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Webová stránka : http://www.adlice.com/download/roguekiller/
Blog : http://www.adlice.com

Operační systém : Windows 10 (10.0.14393) 64 bits version
Spuštěno : Normální režim
Uživatel : Bezrayer [Práva správce]
Started from : C:\Users\Bezrayer\Desktop\RogueKillerX64.exe
Mód : Smazat -- Datum : 12/06/2016 18:31:05 (Duration : 00:59:04)

¤¤¤ Procesy : 0 ¤¤¤

¤¤¤ Registry : 8 ¤¤¤
[PUP] (X64) HKEY_USERS\S-1-5-21-3025460961-235328027-311272571-1001\Software\Tencent -> Smazáno
[PUP] (X86) HKEY_USERS\S-1-5-21-3025460961-235328027-311272571-1001\Software\Tencent -> Smazáno
[PUP.HackTool] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {E4C57284-7EA6-46F2-BDA2-E249C5649591} : v2.25|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\Program Files\KMSpico\AutoPico.exe|Name=KMS Emulator: AutoPico.exe| [x] -> Smazáno
[PUP.HackTool] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {DA931DC6-4499-419B-9B42-87E55A31B595} : v2.25|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\Program Files\KMSpico\AutoPico.exe|Name=KMS Emulator: AutoPico.exe| [x] -> Smazáno
[PUP.HackTool] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {C5CE1613-8170-49A3-ADEE-61EBE2EE7992} : v2.25|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\Program Files\KMSpico\KMSELDI.exe|Name=KMS Emulator: KMSELDI.exe| [x] -> Smazáno
[PUP.HackTool] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {74AD65D7-F52A-4FCE-A0BB-F8D18A57D032} : v2.25|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\Program Files\KMSpico\KMSELDI.exe|Name=KMS Emulator: KMSELDI.exe| [x] -> Smazáno
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {D8F41EC9-9656-4C48-9EBC-A7D46A5BD3A8} : v2.25|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Private|RPort=80|RPort=443|RPort=8080|RPort2_10=6665-6669|RPort2_10=6695-6699|App=C:\Users\Bezrayer\AppData\Local\Warframe\Downloaded\Public\Tools\Launcher.exe|Name=Warframe Launcher (TCP-Out)|EmbedCtxt=Warframe| [x] -> Smazáno
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {42B6E099-6ACF-4BC3-8DA1-8E4D48E00693} : v2.25|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|RPort=80|RPort=443|RPort=8080|RPort2_10=6665-6669|RPort2_10=6695-6699|App=C:\Users\Bezrayer\AppData\Local\Warframe\Downloaded\Public\Tools\Launcher.exe|Name=Warframe Launcher (TCP-In)|EmbedCtxt=Warframe|Edge=TRUE| [x] -> Smazáno

¤¤¤ Úlohy : 1 ¤¤¤
[PUP.HackTool] \AutoPico Daily Restart -- "C:\Program Files\KMSpico\AutoPico.exe" (/silent) -> Smazáno

¤¤¤ Soubory : 4 ¤¤¤
[Hj.Shortcut][Soubor] C:\2-click run\Google Chrome.lnk [LNK@] C:\PROGRA~2\Google\Chrome\APPLIC~1\chrome.exe http://free-apps.friendsinwar.com/viewp ... ?page_id=2 -> Shortcut cleaned
[Hj.Shortcut][Soubor] C:\2-click run\Internet Explorer.lnk [LNK@] C:\PROGRA~2\INTERN~1\iexplore.exe http://free-apps.friendsinwar.com/viewp ... ?page_id=2 -> Shortcut cleaned
[Hj.Shortcut][Soubor] C:\2-click run\Mozilla Firefox.lnk [LNK@] C:\PROGRA~2\MOZILL~1\firefox.exe http://free-apps.friendsinwar.com/viewp ... ?page_id=2 -> Shortcut cleaned
[PUP][Soubor] C:\Windows\SECOH-QAD.exe -> Smazáno

¤¤¤ WMI : 0 ¤¤¤

¤¤¤ Soubor HOSTS : 0 ¤¤¤

¤¤¤ Antirootkit : 0 (Driver: Nenahrán [0x20]) ¤¤¤

¤¤¤ Webové prohlížeče : 3 ¤¤¤
[PUP][Chrome:Addon] Default : Illimitux [mamnihopcnbfnbfnnneplcohmnkkpipb] -> Smazáno
[PUM.HomePage][Chrome:Config] Default [SecurePrefs] : homepage [https://www.idoklad.cz/enter.aspx#Login/LoginView] -> Smazáno
[PUM.HomePage][Chrome:Config] Default [SecurePrefs] : session.startup_urls [http://www.seznam.cz/|http://www.yoursearching.com/?type=hp&ts=1448905336&z=320d1f1bc3a494af4e4274eg2zbzab3t2ebwecac1b&from=cor&uid=ST3750525AS_6VPJV3N2XXXX6VPJV3N2] -> Smazáno

¤¤¤ Kontrola MBR : ¤¤¤
+++++ PhysicalDrive0: ST3750525AS ATA Device +++++
--- User ---
[MBR] 65b9a11788fcc4630bb4201689ac73ee
[BSP] 3fe0461c3c90f1105101c5774df27091 : Windows Vista/7/8|VT.Unknown MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 224413 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
2 - [XXXXXX] ACER (0x27) [VISIBLE] Offset (sectors): 459804672 | Size: 450 MB
3 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 460726272 | Size: 490440 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
User = LL1 ... OK
User = LL2 ... OK

+++++ PhysicalDrive1: SAMSUNG HD103SI ATA Device +++++
--- User ---
[MBR] a9ef61d2bd80e799242396c0e0cd574a
[BSP] dc9b476f6daa3e4a2b93b8b329059e12 : Empty|VT.Unknown MBR Code
Partition table:
0 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 63 | Size: 953867 MB [Windows XP Bootstrap | Windows XP Bootloader]
User = LL1 ... OK
User = LL2 ... OK
Asus M5A78L-M LX V2
AMD Athlon II X4 640
8GB DDR3 1333MHz
MSI Radeon HD5670 Cyclone 1G
Windows 10 Pro 64-bit

cerberos2
Level 3.5
Level 3.5
Příspěvky: 663
Registrován: prosinec 12
Pohlaví: Muž
Stav:
Offline

Re: Preventivní kontrola

Příspěvekod cerberos2 » 07 pro 2016 09:19

Zoek.exe v5.0.0.1 Updated 19-September-2016
Tool run by Bezrayer on £t 06. 12. 2016 at 22:42:54,35.
Microsoft Windows 10 Pro 10.0.14393 x64
Running in: Normal Mode Internet Access Detected
Launched: C:\Users\Bezrayer\Desktop\zoek.exe [Scan all users] [Script inserted]

==== System Restore Info ======================

6. 12. 2016 22:43:55 Zoek.exe System Restore Point Created Successfully.

==== Reset Hosts File ======================

# Copyright (c) 1993-2006 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host

127.0.0.1 localhost

==== Empty Folders Check ======================

C:\PROGRA~2\AGEIA Technologies deleted successfully
C:\PROGRA~3\Comms deleted successfully
C:\PROGRA~3\SoftwareDistribution deleted successfully
C:\Users\Bezrayer\AppData\Local\ActiveSync deleted successfully
C:\Users\Bezrayer\AppData\Local\EmieBrowserModeList deleted successfully
C:\Users\Bezrayer\AppData\Local\EmieSiteList deleted successfully
C:\Users\Bezrayer\AppData\Local\EmieUserList deleted successfully
C:\Users\Bezrayer\AppData\Local\Ori and the Blind Forest deleted successfully
C:\Users\Bezrayer\AppData\Local\PeerDistRepub deleted successfully
C:\Users\Bezrayer\AppData\Local\Skyrim Special Edition deleted successfully
C:\WINDOWS\serviceprofiles\networkservice\AppData\Local\Maps deleted successfully
C:\WINDOWS\serviceprofiles\networkservice\AppData\Local\PeerDistPub deleted successfully
C:\WINDOWS\serviceprofiles\networkservice\AppData\Local\PeerDistRepub deleted successfully

==== Deleting CLSID Registry Keys ======================


==== Deleting CLSID Registry Values ======================


==== Deleting Services ======================


==== FireFox Fix ======================

Deleted from C:\Users\Bezrayer\AppData\Roaming\Mozilla\Firefox\Profiles\hgsmjkuf.default\prefs.js:

Added to C:\Users\Bezrayer\AppData\Roaming\Mozilla\Firefox\Profiles\hgsmjkuf.default\prefs.js:
user_pref("browser.startup.homepage", "about:home");
user_pref("browser.newtab.url", "about:newtab");

==== Deleting Files \ Folders ======================

C:\PROGRA~2\AGEIA Technologies not found
C:\Users\Bezrayer\AppData\Roaming\Factorio deleted
C:\Users\Bezrayer\AppData\Roaming\PoESkillTree - The Awakening deleted
C:\PROGRA~2\GUM3BE.tmp deleted
C:\found.000 deleted
C:\PROGRA~3\Package Cache deleted
C:\Users\Bezrayer\AppData\LocalLow\Unity deleted
C:\windows\SysNative\GroupPolicy\Machine deleted
C:\windows\SysNative\GroupPolicy\User deleted
C:\windows\SysNative\GroupPolicy\GPT.INI deleted
C:\WINDOWS\Syswow64\GroupPolicy\gpt.ini deleted
C:\Users\Bezrayer\AppData\Roaming\Mozilla\Firefox\Profiles\hgsmjkuf.default\jetpack deleted

==== Firefox Start and Search pages ======================

ProfilePath: C:\Users\Bezrayer\AppData\Roaming\Mozilla\Firefox\Profiles\hgsmjkuf.default
user_pref("browser.startup.homepage", "about:home");
user_pref("browser.newtab.url", "about:newtab");

==== Firefox Extensions ======================

ProfilePath: C:\Users\Bezrayer\AppData\Roaming\Mozilla\Firefox\Profiles\hgsmjkuf.default
- Twitch Now - %ProfilePath%\extensions\jid1-jwVSihNsgAw5jA@jetpack.xpi
- Undetermined - %ProfilePath%\extensions\uBlock0@raymondhill.net.xpi

AppDir: C:\Program Files (x86)\Mozilla Firefox
- Undetermined - %AppDir%\browser\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}.xpi

==== Firefox Plugins ======================

Profilepath: C:\Users\Bezrayer\AppData\Roaming\Mozilla\Firefox\Profiles\hgsmjkuf.default
18CF51689186AEB9D1D149AEB0E92D03 - C:\Program Files\Microsoft Office 15\root\VFS\ProgramFilesX86\Microsoft Office\Office15\NPSPWRAP.DLL - Microsoft Office 2013
F987F944D2B9A9D5D7886061B0D87120 - C:\Program Files\Microsoft Office 15\root\VFS\ProgramFilesX86\Mozilla Firefox\plugins\npmeetingjoinpluginoc.dll - Microsoft Office 2013
83FCFA3C1E0D7523C21CCFBF336D2687 - C:\WINDOWS\SysWoW64\Macromed\Flash\NPSWF32_23_0_0_207.dll - Shockwave Flash
5B6E82D37D684488C226303BAD70D58C - C:\Users\Bezrayer\AppData\Local\MyComGames\npmycomdetector.dll - My.Com Game Center component npmycomdetector.dll


==== Chromium Look ======================

Google Chrome Version: 46.0.2490.86


Bejeweled - Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Extensions\adpkifcfcacgmnggcbpbjbkdijciiigm
FB Refresh - Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Extensions\bdlfdaajmclngiomogmleihllaejcnni
uBlockâ‚€ - Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Extensions\cjpalhdlnbpafiamejdnhcphjbkeiagm
Tampermonkey - Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Extensions\dhdgffkkebhmkfjojejmpbldmpobfkfo
Twitch Mini Player - Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Extensions\efgochcggfpajofoidkjhelkaihdflpo
AirDroid - Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Extensions\hkgndiocipalkpejnpafdbdlfdjihomd
AirMirror - Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Extensions\macmgoeeggnlnmpiojbcniblabkdjphe
Online U block For Origin - Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Extensions\mhjlmldjigkmjgddplfinomfcdpaecih
Twitch Now - Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Extensions\nlmbdmpjmlijibeockamioakdpmhjnpk
imo free video calls and text - Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Extensions\ocaebkdojpikfmhmnekiflipcicedobi
Psykopaint - Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Extensions\pgjchkcfmigkkhedgjedmffdepgmpfil
YT Repeat - Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Extensions\piicimoiaiblachamdicgngccadhlecl
Chrome Media Router - Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm

==== Chromium Fix ======================

C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_toolbar.yahoo.com_0.localstorage deleted successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_toolbar.yahoo.com_0.localstorage-journal deleted successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.lyricsmode.com_0.localstorage deleted successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.lyricsmode.com_0.localstorage-journal deleted successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.metrolyrics.com_0.localstorage deleted successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.metrolyrics.com_0.localstorage-journal deleted successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_static.foodity.com_0.localstorage deleted successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_static.foodity.com_0.localstorage-journal deleted successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_static.olark.com_0.localstorage deleted successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_static.olark.com_0.localstorage-journal deleted successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.tunefind.com_0.localstorage deleted successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.tunefind.com_0.localstorage-journal deleted successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_c.betrad.com_0.localstorage deleted successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_c.betrad.com_0.localstorage-journal deleted successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_rzmask.com_0.localstorage deleted successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_rzmask.com_0.localstorage-journal deleted successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_www.rzmask.com_0.localstorage deleted successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_www.rzmask.com_0.localstorage-journal deleted successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.apkask.com_0.localstorage deleted successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.apkask.com_0.localstorage-journal deleted successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_search.fulltabsearch.com_0.localstorage deleted successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_search.fulltabsearch.com_0.localstorage-journal deleted successfully

==== Set IE to Default ======================

Old Values:
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Start Page"="http://go.microsoft.com/fwlink/p/?LinkId=255141"

New Values:
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Start Page"="http://go.microsoft.com/fwlink/p/?LinkId=255141"

==== All HKLM and HKCU SearchScopes ======================

HKLM\SearchScopes "DefaultScope"="{0633EE93-D776-472f-A0FF-E1416B8B2E3A}"
HKLM\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} - http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC
HKLM\Wow6432Node\SearchScopes "DefaultScope"="{0633EE93-D776-472f-A0FF-E1416B8B2E3A}"
HKLM\Wow6432Node\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} - http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC
HKCU\SearchScopes "DefaultScope"="{0633EE93-D776-472f-A0FF-E1416B8B2E3A}"
HKCU\SearchScopes\{012E1000-F331-11DB-8314-0800200C9A66} - http://www.google.com/search?q={searchTerms}
HKCU\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} - http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IESR02

==== Reset Google Chrome ======================

C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Preferences was reset successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences was reset successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Web Data was reset successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Web Data-journal was reset successfully

==== Empty IE Cache ======================

C:\WINDOWS\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5 emptied successfully
C:\Users\Bezrayer\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\Users\Bezrayer\AppData\Local\Microsoft\Windows\INetCache\Low\Content.IE5 emptied successfully
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\WINDOWS\sysWoW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\WINDOWS\sysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\Users\Bezrayer\AppData\Local\Microsoft\Windows\INetCache\IE emptied successfully
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE emptied successfully
C:\WINDOWS\sysWoW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE emptied successfully

==== Empty FireFox Cache ======================

C:\Users\Bezrayer\AppData\Local\Mozilla\Firefox\Profiles\hgsmjkuf.default\cache2 emptied successfully

==== Empty Chrome Cache ======================

C:\Users\Bezrayer\AppData\Local\Opera Software\Opera Stable\Cache emptied successfully
C:\Users\Bezrayer\AppData\Local\Google\Chrome\User Data\Default\Cache emptied successfully

==== Empty All Flash Cache ======================

No Flash Cache Found

==== Empty All Java Cache ======================

No Java Cache Found

==== C:\zoek_backup content ======================

C:\zoek_backup (files=270 folders=141 517396544 bytes)

==== Empty Temp Folders ======================

C:\WINDOWS\Temp will be emptied at reboot

==== After Reboot ======================

==== Empty Temp Folders ======================

C:\WINDOWS\Temp successfully emptied
C:\Users\Bezrayer\AppData\Local\Temp successfully emptied

==== Empty Recycle Bin ======================

C:\$RECYCLE.BIN successfully emptied

==== EOF on st 07. 12. 2016 at 9:16:37,62 ======================
Asus M5A78L-M LX V2
AMD Athlon II X4 640
8GB DDR3 1333MHz
MSI Radeon HD5670 Cyclone 1G
Windows 10 Pro 64-bit

Uživatelský avatar
jaro3
člen Security týmu
Guru Level 15
Guru Level 15
Příspěvky: 43298
Registrován: červen 07
Bydliště: Jižní Čechy
Pohlaví: Muž
Stav:
Offline

Re: Preventivní kontrola

Příspěvekod jaro3 » 07 pro 2016 09:19

Vlož nový log z HJT

Stáhni si Zemana AntiMalware Free z tohoto odkazu:
https://www.zemana.com/Download/AntiMal ... .Setup.exe
a ulož si ho na plochu.
Poklepej na tento soubor na ploše a postupuj podle pokynů k instalaci programu.
Přijmi licenci k používání programu EULA , pokud se nabídne.
Pokud je k dispozici aktualizace programu , klepni na tlačítko „Update now“ ( aktualizovat nyní).
Na konci klepni na tlačítko Nastavení (ozubené kolo v rohu)> Advanced> ""
- "Přečetl jsem si upozornění a chci pokračovat stejně .....
Zaškrtnutí Auto Launch
Nezaškrtnutí Auto upload
Zaškrtnutí All Browser Extensions (Všechna rozšíření prohlížeče)
Inteligentní nastavení skenování jako náhrada za hloubkové prověření
Zavři všechny otevřené soubory, složky a prohlížeče
Klepni na tlačítko Scan now (Skenovat) a začne sken hrozeb.
Když je skenování dokončeno, objeví se tisková zpráva , zkopíruj sem celý obsah té zprávy.

Prosím stáhni příslušnou verzi programu pro Tvůj systém 32-bit/64-bit FarbarRecovery Scan Tool (FrSt)
32bit.:
http://www.bleepingcomputer.com/downloa ... ool/dl/81/
64bit.:
http://www.bleepingcomputer.com/downloa ... ool/dl/82/
a ulož jej na plochu. ,pak spusť FrSt.
Potvrď způsob užití.
Neměň žádné z výchozích nastavení a klikni na položku „Scan“ („Skenovat“) .Když je skenování dokončeno, ukážou se dva logy = FRST.txt a Addition.txt a uloží se na ploše.Prosím zkopíruj sem celý jejich obsah.
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra


Zpět na “HiJackThis”

Kdo je online

Uživatelé prohlížející si toto fórum: Žádní registrovaní uživatelé a 116 hostů