Kontrola logu Vyřešeno

Místo pro vaše HiJackThis logy a logy z dalších programů…

Moderátoři: Mods_senior, Security team

pajas92
Level 1
Level 1
Příspěvky: 73
Registrován: květen 14
Pohlaví: Muž
Stav:
Offline

Kontrola logu

Příspěvekod pajas92 » 29 srp 2020 13:12

Zdravím,

prosím o kontrolu logu. Provedl jsem obnovení do továrního nastavení. Notebook HP-bw065nc.
Notebook byl velmi pomalý, spouštěl se 20 minut. Po spuštění Google Chrome, Správce úloh bylo nutné dalších 15, někdy 30 minut čekat na spuštění.
Teď po obnovení se situace zlepšila, ale stále je notebook velmi pomalý.
Prosím o kontrolu.
Děkuji.


Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 13:03:10, on 29.08.2020
Platform: Unknown Windows (WinNT 6.02.1008)
MSIE: Internet Explorer v11.0 (11.00.16299.0015)
Boot mode: Normal

Running processes:
C:\Program Files (x86)\HP\HPAudioSwitch\HPAudioSwitch.exe
C:\Users\Míra\AppData\Local\Microsoft\OneDrive\OneDrive.exe
C:\Program Files (x86)\HP\HP System Event\HPMSGSVC.exe
C:\Program Files (x86)\Realtek\PCIE Wireless LAN\RtlS5Wake\RtlS5Wake.exe
C:\Users\Míra\Desktop\Programy_cisteni\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://hp17win10.msn.com/?pc=HCTE
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://hp17win10.msn.com/?pc=HCTE
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://hp17win10.msn.com/?pc=HCTE
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://hp17win10.msn.com/?pc=HCTE
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = %11%\blank.htm
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
F2 - REG:system.ini: UserInit=
O2 - BHO: HP Network Check Helper - {E76FD755-C1BA-4DCB-9F13-99BD91223ADE} - C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\Resources\HPNetworkCheck\HPNetworkCheckPlugin.dll
O4 - HKLM\..\Run: [HPMessageService] C:\Program Files (x86)\HP\HP System Event\HPMSGSVC.exe
O4 - HKLM\..\Run: [RtlS5Wake] C:\PROGRA~2\Realtek\PCIEWI~1\RTLS5W~1\RtlS5Wake.exe
O4 - HKLM\..\Run: [HPRadioMgr] C:\Program Files (x86)\HP\HP Wireless Button Driver\HPRadioMgr64.exe
O4 - HKCU\..\Run: [OneDrive] "C:\Users\Míra\AppData\Local\Microsoft\OneDrive\OneDrive.exe" /background
O9 - Extra button: @C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\Resources\HPNetworkCheck\HPNetworkCheckPlugin.dll,-103 - {25510184-5A38-4A99-B273-DCA8EEF6CD08} - C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\Resources\HPNetworkCheck\NCLauncherFromIE.exe
O9 - Extra 'Tools' menuitem: @C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\Resources\HPNetworkCheck\HPNetworkCheckPlugin.dll,-102 - {25510184-5A38-4A99-B273-DCA8EEF6CD08} - C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\Resources\HPNetworkCheck\NCLauncherFromIE.exe
O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics
O18 - Protocol: tbauth - {14654CA6-5711-491D-B89A-58E571679951} - C:\Windows\SysWOW64\tbauth.dll
O18 - Protocol: windows.tbauth - {14654CA6-5711-491D-B89A-58E571679951} - C:\Windows\SysWOW64\tbauth.dll
O18 - Filter: application/x-mfe-ipt - {3EF5086B-5478-4598-A054-786C45D75692} - c:\PROGRA~2\mcafee\msc\mcsniepl.dll
O23 - Service: AdaptiveSleepService - Unknown owner - c:\Program Files\ATI Technologies\ATI.ACE\A4\AdaptiveSleepService.exe
O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\windows\System32\alg.exe (file missing)
O23 - Service: AMD External Events Utility - Unknown owner - C:\windows\system32\atiesrxx.exe (file missing)
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: BTDevManager - Realtek Semiconductor Corp. - C:\Program Files (x86)\REALTEK\Realtek Bluetooth\BTDevMgr.exe
O23 - Service: ClientAnalyticsService - McAfee, Inc. - C:\Program Files\Common Files\McAfee\ClientAnalytics\Legacy\McClientAnalytics.exe
O23 - Service: @%SystemRoot%\system32\DiagSvcs\DiagnosticsHub.StandardCollector.ServiceRes.dll,-1000 (diagnosticshub.standardcollector.service) - Unknown owner - C:\windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe (file missing)
O23 - Service: @%SystemRoot%\system32\efssvc.dll,-100 (EFS) - Unknown owner - C:\windows\System32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\fxsresm.dll,-118 (Fax) - Unknown owner - C:\windows\system32\fxssvc.exe (file missing)
O23 - Service: McAfee Home Network (HomeNetSvc) - McAfee, Inc. - C:\Program Files\Common Files\McAfee\Platform\McSvcHost\McSvHost.exe
O23 - Service: HP Comm Recovery (HP Comm Recover) - HP Inc. - C:\Program Files\HPCommRecovery\HPCommRecovery.exe
O23 - Service: HP JumpStart Bridge (HPJumpStartBridge) - HP Inc. - c:\Program Files (x86)\HP\HP JumpStart Bridge\HPJumpStartBridge.exe
O23 - Service: HP CASL Framework Service (hpqcaslwmiex) - HP - C:\Program Files (x86)\HP\Shared\hpqwmiex.exe
O23 - Service: HP Support Solutions Framework Service (HPSupportSolutionsFrameworkService) - HP Inc. - C:\Program Files (x86)\Hewlett-Packard\HP Support Solutions\HPSupportSolutionsFrameworkService.exe
O23 - Service: HPWMISVC - HP Inc. - c:\Program Files (x86)\HP\HP System Event\HPWMISVC.exe
O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\windows\system32\lsass.exe (file missing)
O23 - Service: McAfee AP Service (McAPExe) - McAfee, Inc. - C:\Program Files\Common Files\McAfee\VSCore_15_7\McApExe.exe
O23 - Service: McAfee Activation Service (McAWFwk) - McAfee, Inc. - c:\PROGRA~1\COMMON~1\mcafee\actwiz\mcawfwk.exe
O23 - Service: McAfee Boot Delay Start Service (McBootDelayStartSvc) - McAfee, Inc. - C:\Program Files\Common Files\McAfee\Platform\McSvcHost\McSvHost.exe
O23 - Service: McAfee CSP Service (mccspsvc) - McAfee, Inc. - C:\Program Files\Common Files\McAfee\CSP\2.5.312.0\\McCSPServiceHost.exe
O23 - Service: McAfee Personal Firewall Service (McMPFSvc) - McAfee, Inc. - C:\Program Files\Common Files\McAfee\Platform\McSvcHost\McSvHost.exe
O23 - Service: McAfee Platform Services (mcpltsvc) - McAfee, Inc. - C:\Program Files\Common Files\mcafee\platform\McSvcHost\McSvHost.exe
O23 - Service: McAfee Proxy Service (McProxy) - McAfee, Inc. - C:\Program Files\Common Files\mcafee\platform\McSvcHost\McSvHost.exe
O23 - Service: McAfee Firewall Core Service (mfefire) - McAfee LLC - C:\Program Files\Common Files\McAfee\SystemCore\mfefire.exe
O23 - Service: McAfee Service Controller (mfemms) - McAfee LLC - C:\Program Files\Common Files\McAfee\SystemCore\mfemms.exe
O23 - Service: McAfee Validation Trust Protection Service (mfevtp) - Unknown owner - C:\windows\system32\mfevtps.exe (file missing)
O23 - Service: McAfee Module Core Service (ModuleCoreService) - McAfee, Inc. - C:\Program Files\Common Files\McAfee\ModuleCore\ModuleCoreService.exe
O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\windows\System32\msdtc.exe (file missing)
O23 - Service: McAfee Anti-Spam Service (MSK80Service) - McAfee, Inc. - C:\Program Files\Common Files\McAfee\Platform\McSvcHost\McSvHost.exe
O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\windows\system32\lsass.exe (file missing)
O23 - Service: Intel Security PEF Service (PEFService) - Intel Security, Inc. - C:\Program Files\Common Files\Intel Security\PEF\CORE\PEFService.exe
O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\windows\system32\locator.exe (file missing)
O23 - Service: Realtek Audio Service (RtkAudioService) - Realtek Semiconductor - C:\Program Files\Realtek\Audio\HDA\RtkAudioService64.exe
O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\windows\system32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\SecurityHealthAgent.dll,-1002 (SecurityHealthService) - Unknown owner - C:\windows\system32\SecurityHealthService.exe (file missing)
O23 - Service: @%SystemRoot%\system32\SensorDataService.exe,-101 (SensorDataService) - Unknown owner - C:\windows\System32\SensorDataService.exe (file missing)
O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\windows\System32\snmptrap.exe (file missing)
O23 - Service: @%systemroot%\system32\spectrum.exe,-101 (spectrum) - Unknown owner - C:\windows\system32\spectrum.exe (file missing)
O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\windows\System32\spoolsv.exe (file missing)
O23 - Service: @%SystemRoot%\system32\sppsvc.exe,-101 (sppsvc) - Unknown owner - C:\windows\system32\sppsvc.exe (file missing)
O23 - Service: SynTPEnh Caller Service (SynTPEnhService) - Synaptics Incorporated - C:\Program Files\Synaptics\SynTP\SynTPEnhService.exe
O23 - Service: @%SystemRoot%\system32\TieringEngineService.exe,-702 (TieringEngineService) - Unknown owner - C:\windows\system32\TieringEngineService.exe (file missing)
O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\windows\system32\UI0Detect.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vaultsvc.dll,-1003 (VaultSvc) - Unknown owner - C:\windows\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\windows\System32\vds.exe (file missing)
O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\windows\system32\vssvc.exe (file missing)
O23 - Service: @%systemroot%\system32\wbengine.exe,-104 (wbengine) - Unknown owner - C:\windows\system32\wbengine.exe (file missing)
O23 - Service: @%ProgramFiles%\Windows Defender\MpAsDesc.dll,-320 (WdNisSvc) - Unknown owner - C:\Program Files (x86)\Windows Defender\NisSrv.exe (file missing)
O23 - Service: @%ProgramFiles%\Windows Defender\MpAsDesc.dll,-310 (WinDefend) - Unknown owner - C:\Program Files (x86)\Windows Defender\MsMpEng.exe (file missing)
O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\windows\system32\wbem\WmiApSrv.exe (file missing)
O23 - Service: @%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing)
O23 - Service: @%systemroot%\system32\xbgmsvc.exe,-100 (xbgm) - Unknown owner - C:\windows\system32\xbgmsvc.exe (file missing)

--
End of file - 10371 bytes

Reklama
pajas92
Level 1
Level 1
Příspěvky: 73
Registrován: květen 14
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu

Příspěvekod pajas92 » 29 srp 2020 13:21

# -------------------------------
# Malwarebytes AdwCleaner 7.1.1.0
# -------------------------------
# Build: 04-27-2018
# Database:
# Support: https://www.malwarebytes.com/support
#
# -------------------------------
# Mode: Scan
# -------------------------------
# Start: 08-29-2020
# Duration: 00:00:17
# OS: Windows 10 Home
# Scanned: 31078
# Detected: 0


***** [ Services ] *****

No malicious services found.

***** [ Folders ] *****

No malicious folders found.

***** [ Files ] *****

No malicious files found.

***** [ DLL ] *****

No malicious DLLs found.

***** [ WMI ] *****

No malicious WMI found.

***** [ Shortcuts ] *****

No malicious shortcuts found.

***** [ Tasks ] *****

No malicious tasks found.

***** [ Registry ] *****

No malicious registry entries found.

***** [ Chromium (and derivatives) ] *****

No malicious Chromium entries found.

***** [ Chromium URLs ] *****

No malicious Chromium URLs found.

***** [ Firefox (and derivatives) ] *****

No malicious Firefox entries found.

***** [ Firefox URLs ] *****

No malicious Firefox URLs found.



########## EOF - C:\AdwCleaner\Logs\AdwCleaner[S00].txt ##########

pajas92
Level 1
Level 1
Příspěvky: 73
Registrován: květen 14
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu

Příspěvekod pajas92 » 29 srp 2020 13:27

Malwarebytes
www.malwarebytes.com

-Podrobnosti logovacího souboru-
Datum skenování: 29.08.20
Čas skenování: 13:23
Logovací soubor: 09e4cc70-e9ea-11ea-ab17-2c6fc9486798.json
Správce: Ano

-Informace o softwaru-
Verze: 3.5.1.2522
Verze komponentů: 1.0.365
Aktualizovat verzi balíku komponent: 1.0.17850
Licence: Zkušební

-Systémová informace-
OS: Windows 10 (Build 16299.15)
CPU: x64
Systém souborů: NTFS
Uživatel: LAPTOP-6U7E1JP1\M\u00c3\u00adra

-Shrnutí skenování-
Typ skenování: Skenování hrozeb (Threat Scan)
Spuštění skenování: Ruční
Výsledek: Dokončeno
Skenované objekty: 253498
Zjištěné hrozby: 0
(Nebyly zjištěny žádné škodlivé položky)
Hrozby umístěné do karantény: 0
(Nebyly zjištěny žádné škodlivé položky)
Uplynulý čas: 3 min, 2 sek

-Možnosti skenování-
Paměť: Povoleno
Start: Povoleno
Systém souborů: Povoleno
Archivy: Povoleno
Rootkity: Zakázáno
Heuristika: Povoleno
Potenciálně nežádoucí program: Detekovat
Potenciálně nežádoucí modifikace: Detekovat

-Podrobnosti skenování-
Proces: 0
(Nebyly zjištěny žádné škodlivé položky)

Modul: 0
(Nebyly zjištěny žádné škodlivé položky)

Klíč registru: 0
(Nebyly zjištěny žádné škodlivé položky)

Hodnota v registru: 0
(Nebyly zjištěny žádné škodlivé položky)

Data registrů: 0
(Nebyly zjištěny žádné škodlivé položky)

Datové proudy: 0
(Nebyly zjištěny žádné škodlivé položky)

Adresář: 0
(Nebyly zjištěny žádné škodlivé položky)

Soubor: 0
(Nebyly zjištěny žádné škodlivé položky)

Fyzický sektor: 0
(Nebyly zjištěny žádné škodlivé položky)

WMI: 0
(Nebyly zjištěny žádné škodlivé položky)


(end)

Uživatelský avatar
jaro3
člen Security týmu
Guru Level 15
Guru Level 15
Příspěvky: 43060
Registrován: červen 07
Bydliště: Jižní Čechy
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu

Příspěvekod jaro3 » 29 srp 2020 19:46

Stáhni si Junkware Removal Tool by Thisisu
http://www.bleepingcomputer.com/downloa ... oval-tool/
https://downloads.malwarebytes.com/file/JRT-EOL
na svojí plochu.

Deaktivuj si svůj antivirový program. Pravým tl. myši klikni na JRT.exe a vyber „spustit jako správce“. Pro pokračování budeš vyzván ke stisknutí jakékoliv klávesy. Na nějakou klikni.
Začne skenování programu. Skenování může trvat dloho , podle množství nákaz. Po ukončení skenu se objeví log (JRT.txt) , který se uloží na ploše.
Zkopíruj sem prosím celý jeho obsah.

Sophos Virus Removal Tool je praktický softwarový nástroj, který by mohl odstranit infekce, které antivirový program nedetekuje .
Stáhněte si ho zde z některého odkazu:
http://www.majorgeeks.com/files/details ... _tool.html
http://www.majorgeeks.com/mg/get/sophos ... ool,1.html
http://www.majorgeeks.com/mg/getmirror/ ... ool,1.html
http://www.majorgeeks.com/mg/getmirror/ ... ool,2.html

Viry mohou zpomalit počítač, nebo se snaží ukrást vaše data, a ani nevíte , že je máte. Co potřebujete, je rychlý a snadný způsob, jak je najít a zbavit se jich, pokud již máte antivirový program v počítači nainstalován , můžete nainstalovat i nástroj Sophos Virus Removal , který identifikuje a vyčistí zbylé infekce, které mohl Váš antivirový program přehlédnout.
K použití Sophos Virus Removal Tool na něj poklepejte a stiskněte tlačítko „Start scanning“ . Pak bude Sophos Virus Removal Tool vyhledávat a odstraňovat viry, které najde. Může být vyžadován restart.
Pokud byly nalezeny viry , tak po skenu klikni na „Details…“ a potom na „View log file“. Zkopíruj celý log a vlož ho sem. Potom zavři „threat detail“ a klikni na „Start cleanup“.
Jinak se log nachází zde:
C:\ProgramData\Sophos\Sophos Virus Removal Tool\Logs

Stáhni si RogueKiller by Adlice Software
32bit.:
http://www.adlice.com/download/roguekil ... HlwZT14ODY
64bit.:
http://www.adlice.com/download/roguekil ... HlwZT14NjQ
na svojí plochu.
- Zavři všechny ostatní programy a prohlížeče.
- Pro OS Vista a win7,8,10 spusť program RogueKiller.exe jako správce , u XP poklepáním.
- klikni na „Start Scan“. V novém okně nic neměň a klikni dole na „Start Scan“
- Program skenuje procesy PC. Po proskenování klikni na „Open Report “ , v okně pak na „Open TXT“ a celý obsah logu sem zkopíruj.
Pokud je program blokován , zkus ho spustit několikrát. Pokud dále program nepůjde spustit a pracovat, přejmenuj ho na winlogon.exe.
-pokud bude mít log více než 60.000 znaků , rozděl ho a vlož do více příspěvků

další odkazy:
http://www.adlice.com/download/roguekiller/
http://www.bleepingcomputer.com/download/roguekiller/

Stáhni si CrystalDiskInfo
Spusť program a klikni na Úpravy-Kopírovat. Poté sem vlož pomocí Ctrl+V obsah logu.
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra

pajas92
Level 1
Level 1
Příspěvky: 73
Registrován: květen 14
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu

Příspěvekod pajas92 » 30 srp 2020 04:35

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 8.1.4 (07.09.2017)
Operating System: Windows 10 Home x64
Ran by Mˇra (Administrator) on 29.08.2020 at 22:34:59,55
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




File System: 0




Registry: 0





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 29.08.2020 at 22:39:46,62
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

pajas92
Level 1
Level 1
Příspěvky: 73
Registrován: květen 14
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu

Příspěvekod pajas92 » 30 srp 2020 04:41

SophosVirusRemovalTool
Přílohy
SophosVirusRemovalTool.zip
(20.6 KiB) Staženo 33 x

pajas92
Level 1
Level 1
Příspěvky: 73
Registrován: květen 14
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu

Příspěvekod pajas92 » 30 srp 2020 04:42

RogueKiller V12.12.23.0 (x64) [Jun 18 2018] (Free) by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : https://forum.adlice.com
Webová stránka : http://www.adlice.com/download/roguekiller/
Blog : http://www.adlice.com

Operační systém : Windows 10 (10.0.16299) 64 bits version
Spuštěno : Normální režim
Uživatel : Míra [Práva správce]
Started from : C:\Program Files\RogueKiller\RogueKiller64.exe
Mód : Prohledat -- Datum : 08/30/2020 03:03:14 (Duration : 01:29:04)
Přepínač : -refid

¤¤¤ Procesy : 0 ¤¤¤

¤¤¤ Registry : 14 ¤¤¤
[PUM.HomePage] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Start Page : http://hp17win10.msn.com/?pc=HCTE -> Nalezeno
[PUM.HomePage] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Start Page : http://hp17win10.msn.com/?pc=HCTE -> Nalezeno
[PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-2391460587-3527569240-2793632488-1001\Software\Microsoft\Internet Explorer\Main | Start Page : http://hp17win10.msn.com/?pc=HCTE -> Nalezeno
[PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-2391460587-3527569240-2793632488-1001\Software\Microsoft\Internet Explorer\Main | Start Page : http://hp17win10.msn.com/?pc=HCTE -> Nalezeno
[PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-2391460587-3527569240-2793632488-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-08302020025925378\Software\Microsoft\Internet Explorer\Main | Start Page : http://hp17win10.msn.com/?pc=HCTE -> Nalezeno
[PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-2391460587-3527569240-2793632488-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-08302020025925378\Software\Microsoft\Internet Explorer\Main | Start Page : http://hp17win10.msn.com/?pc=HCTE -> Nalezeno
[PUM.HomePage] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Default_Page_URL : http://hp17win10.msn.com/?pc=HCTE -> Nalezeno
[PUM.HomePage] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Default_Page_URL : http://hp17win10.msn.com/?pc=HCTE -> Nalezeno
[PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-2391460587-3527569240-2793632488-1001\Software\Microsoft\Internet Explorer\Main | Default_Page_URL : http://hp17win10.msn.com/?pc=HCTE -> Nalezeno
[PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-2391460587-3527569240-2793632488-1001\Software\Microsoft\Internet Explorer\Main | Default_Page_URL : http://hp17win10.msn.com/?pc=HCTE -> Nalezeno
[PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-2391460587-3527569240-2793632488-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-08302020025925378\Software\Microsoft\Internet Explorer\Main | Default_Page_URL : http://hp17win10.msn.com/?pc=HCTE -> Nalezeno
[PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-2391460587-3527569240-2793632488-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-08302020025925378\Software\Microsoft\Internet Explorer\Main | Default_Page_URL : http://hp17win10.msn.com/?pc=HCTE -> Nalezeno
[PUM.Policies] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | ConsentPromptBehaviorAdmin : 0 -> Nalezeno
[PUM.Policies] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | ConsentPromptBehaviorAdmin : 0 -> Nalezeno

¤¤¤ Úlohy : 0 ¤¤¤

¤¤¤ Soubory : 0 ¤¤¤

¤¤¤ WMI : 0 ¤¤¤

¤¤¤ Soubor HOSTS : 0 ¤¤¤

¤¤¤ Antirootkit : 0 (Driver: Nahrán) ¤¤¤

¤¤¤ Webové prohlížeče : 0 ¤¤¤

¤¤¤ Kontrola MBR : ¤¤¤
+++++ PhysicalDrive0: WDC WD10JPVX-60JC3T1 +++++
--- User ---
[MBR] 2af37ef5bc45a5623b1bf6a2422c5f85
[BSP] f104efb94b90307ba504014bbb34bfaf : Empty MBR Code
Partition table:
0 - [MAN-MOUNT] EFI system partition | Offset (sectors): 2048 | Size: 260 MB
1 - [MAN-MOUNT] Microsoft reserved partition | Offset (sectors): 534528 | Size: 16 MB
2 - Basic data partition | Offset (sectors): 567296 | Size: 939431 MB
3 - [SYSTEM][MAN-MOUNT] Basic data partition | Offset (sectors): 1924521984 | Size: 980 MB
4 - [SYSTEM] Basic data partition | Offset (sectors): 1926529024 | Size: 13175 MB
User = LL1 ... OK
User = LL2 ... OK

pajas92
Level 1
Level 1
Příspěvky: 73
Registrován: květen 14
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu

Příspěvekod pajas92 » 30 srp 2020 04:42

----------------------------------------------------------------------------
CrystalDiskInfo 7.6.0 (C) 2008-2018 hiyohiyo
Crystal Dew World : https://crystalmark.info/
----------------------------------------------------------------------------

OS : Windows 10 [10.0 Build 16299] (x64)
Date : 2020/08/30 4:42:25

-- Controller Map ----------------------------------------------------------
+ Řadič SATA AMD [ATA]
- WDC WD10JPVX-60JC3T1
- hp DVDRW GUE1N
- Řadič prostorů úložišť [SCSI]

-- Disk List ---------------------------------------------------------------
(1) WDC WD10JPVX-60JC3T1 : 1000,2 GB [0/0/0, pd1] - wd

----------------------------------------------------------------------------
(1) WDC WD10JPVX-60JC3T1
----------------------------------------------------------------------------
Model : WDC WD10JPVX-60JC3T1
Firmware : 02.01A02
Serial Number : WD-WXA1AB7NERZP
Disk Size : 1000,2 GB (8,4/137,4/1000,2/1000,2)
Buffer Size : 8192 KB
Queue Depth : 32
# of Sectors : 1953525168
Rotation Rate : 5400 RPM
Interface : Serial ATA
Major Version : ACS-2
Minor Version : ----
Transfer Mode : SATA/600 | SATA/600
Power On Hours : 1272 hod.
Power On Count : 2129 krát
Temperature : 33 C (91 F)
Health Status : Dobrý
Features : S.M.A.R.T., APM, 48bit LBA, NCQ
APM Level : 0080h [ON]
AAM Level : ----
Drive Letter : C: D:

-- S.M.A.R.T. --------------------------------------------------------------
ID Cur Wor Thr RawValues(6) Attribute Name
01 200 200 _51 000000000000 Počet chyb čtení
03 182 180 _21 00000000075B Čas na roztočení ploten
04 _98 _98 __0 000000000907 Počet spuštění/zastavení
05 200 200 140 000000000000 Počet přemapovaných sektorů
07 200 200 _51 000000000000 Počet chybných hledání
09 _99 _99 __0 0000000004F8 Hodin v činnosti
0A 100 100 _51 000000000000 Počet opakovaných pokusů o roztočení ploten
0B 100 100 __0 000000000000 Počet pokusů o překalibrování
0C _98 _98 __0 000000000851 Počet cyklů zapnutí zařízení
B7 100 100 __0 000000000000 Specifický pro výrobce
B8 100 100 _97 000000000000 Ukončovacích chyb
BB 100 100 __0 000000000000 Ohlášeno neopravitelných chyb
BC 100 _99 __0 000000000001 Časový limit příkazu
BE _67 _53 _40 0000211C0021 Teplota toku vzduchu
BF _82 _82 __0 000000000012 Počet udalostí zaznamenaných otřesovým senzorem
C0 200 200 __0 00000000000B Počet vypnutí disku
C1 185 185 __0 00000000B3B3 Počet cyklů načítání/vymazání
C2 114 100 __0 000000000021 Teplota
C4 200 200 __0 000000000000 Počet udalostí s číslem realokování sektorů
C5 200 200 __0 000000000000 Počet podezřelých sektorů
C6 100 253 __0 000000000000 Počet neopravitelných sektorů
C7 200 200 __0 000000000000 Počet chyb v kontrolním součtu UltraDMA
C8 100 253 _51 000000000000 Počet chyb při zápisu sektorů

-- IDENTIFY_DEVICE ---------------------------------------------------------
0 1 2 3 4 5 6 7 8 9
000: 427A 3FFF C837 0010 0000 0000 003F 0000 0000 0000
010: 2020 2020 2057 442D 5758 4131 4142 374E 4552 5A50
020: 0000 4000 0000 3032 2E30 3141 3032 5744 4320 5744
030: 3130 4A50 5658 2D36 304A 4333 5431 2020 2020 2020
040: 2020 2020 2020 2020 2020 2020 2020 8010 4000 2F00
050: 4001 0000 0000 0007 3FFF 0010 003F FC10 00FB 0100
060: FFFF 0FFF 0000 0007 0003 0078 0078 0078 0078 0000
070: 0000 0000 0000 0000 0000 001F 8D0E 0006 004C 004C
080: 03FE 0000 706B 7C69 6123 7069 BC49 6123 407F 005E
090: 005E 0080 FFFE 0000 0000 0000 0000 0000 0000 0000
100: 6DB0 7470 0000 0000 0000 0000 6003 0000 5001 4EE2
110: BA28 9902 0000 0000 0000 0000 0000 0000 0000 401C
120: 401C 0000 0000 0000 0000 0000 0000 0000 0029 0400
130: 0001 0000 0000 0000 0000 0000 0000 0000 0000 0000
140: 0000 0000 0004 0000 0000 0000 0000 0000 0000 0000
150: 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
160: 0000 0000 0000 0000 0000 0000 0000 0000 0003 0000
170: 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
180: 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
190: 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
200: 0000 0000 0000 0000 0000 0000 703D 0000 0000 4000
210: 0000 0000 0000 0000 0000 0000 0000 1518 0000 0000
220: 0000 0000 103E 0000 0000 0000 0000 0000 0000 0000
230: 0000 0000 0000 0000 0001 1000 0000 0000 0000 0000
240: 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
250: 0000 0000 0000 0000 0000 42A5

-- SMART_READ_DATA ---------------------------------------------------------
+0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +A +B +C +D +E +F
000: 10 00 01 2F 00 C8 C8 00 00 00 00 00 00 00 03 27
010: 00 B6 B4 5B 07 00 00 00 00 00 04 32 00 62 62 07
020: 09 00 00 00 00 00 05 33 00 C8 C8 00 00 00 00 00
030: 00 00 07 2F 00 C8 C8 00 00 00 00 00 00 00 09 32
040: 00 63 63 F8 04 00 00 00 00 00 0A 33 00 64 64 00
050: 00 00 00 00 00 00 0B 32 00 64 64 00 00 00 00 00
060: 00 00 0C 32 00 62 62 51 08 00 00 00 00 00 B7 32
070: 00 64 64 00 00 00 00 00 00 00 B8 33 00 64 64 00
080: 00 00 00 00 00 00 BB 32 00 64 64 00 00 00 00 00
090: 00 00 BC 32 00 64 63 01 00 00 00 00 00 00 BE 22
0A0: 00 43 35 21 00 1C 21 00 00 00 BF 32 00 52 52 12
0B0: 00 00 00 00 00 00 C0 32 00 C8 C8 0B 00 00 00 00
0C0: 00 00 C1 32 00 B9 B9 B3 B3 00 00 00 00 00 C2 22
0D0: 00 72 64 21 00 00 00 00 00 00 C4 32 00 C8 C8 00
0E0: 00 00 00 00 00 00 C5 32 00 C8 C8 00 00 00 00 00
0F0: 00 00 C6 30 00 64 FD 00 00 00 00 00 00 00 C7 32
100: 00 C8 C8 00 00 00 00 00 00 00 C8 09 00 64 FD 00
110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
160: 00 00 00 00 00 00 00 00 00 00 00 00 E8 44 01 51
170: 03 00 01 00 02 C6 00 00 00 00 00 00 00 00 00 00
180: 00 00 01 04 00 00 00 00 00 00 00 00 00 00 00 00
190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1A0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1B0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1C0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1D0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1E0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1F0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 73

-- SMART_READ_THRESHOLD ----------------------------------------------------
+0 +1 +2 +3 +4 +5 +6 +7 +8 +9 +A +B +C +D +E +F
000: 10 00 01 33 C8 C8 C8 C8 00 00 00 00 00 00 03 15
010: 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00
020: 00 00 00 00 00 00 05 8C 00 00 00 00 00 00 00 00
030: 00 00 07 33 C8 C8 C8 C8 00 00 00 00 00 00 09 00
040: 00 00 00 00 00 00 00 00 00 00 0A 33 00 00 00 00
050: 00 00 00 00 00 00 0B 00 00 00 00 00 00 00 00 00
060: 00 00 0C 00 00 00 00 00 00 00 00 00 00 00 B7 00
070: 00 00 00 00 00 00 00 00 00 00 B8 61 00 00 00 00
080: 00 00 00 00 00 00 BB 00 00 00 00 00 00 00 00 00
090: 00 00 BC 00 00 00 00 00 00 00 00 00 00 00 BE 28
0A0: 00 00 00 00 00 00 00 00 00 00 BF 00 00 00 00 00
0B0: 00 00 00 00 00 00 C0 00 00 00 00 00 00 00 00 00
0C0: 00 00 C1 00 00 00 00 00 00 00 00 00 00 00 C2 00
0D0: 00 00 00 00 00 00 00 00 00 00 C4 00 00 00 00 00
0E0: 00 00 00 00 00 00 C5 00 00 00 00 00 00 00 00 00
0F0: 00 00 C6 00 00 00 00 00 00 00 00 00 00 00 C7 00
100: 00 00 00 00 00 00 00 00 00 00 C8 33 00 00 00 00
110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1A0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1B0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1C0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1D0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1E0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1F0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 F8

Uživatelský avatar
jaro3
člen Security týmu
Guru Level 15
Guru Level 15
Příspěvky: 43060
Registrován: červen 07
Bydliště: Jižní Čechy
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu

Příspěvekod jaro3 » 30 srp 2020 16:12

Zavři všechny programy a prohlížeče. Deaktivuj antivir a firewall.
Prosím, odpoj všechny USB (kromě myši s klávesnice) nebo externí disky z počítače před spuštěním tohoto programu.
Spusť znovu RogueKiller ( Pro Windows Vista nebo Windows 7, klepni pravým a vyber "Spustit jako správce", ve Windows XP poklepej ke spuštění).
- klikni na „Start Scan“. V novém okně nic neměň a klikni dole na „Start Scan“,
po jeho skončení - vše zatrhni (dej zatržítka vlevo od nálezů , do bílých políček)
- pak klikni na "Remove Selected"
- Počkej, dokud Status box nezobrazí " Removal finished, please review result "
- Klikni na "Open report " a pak na " Open TXT“ a zkopíruj ten log a vlož obsah té zprávy prosím sem. Log je možno nalézt v C:\ProgramData\RogueKiller\Logs - Zavři RogueKiller.

Vypni antivir i firewall.
Stáhni Zoek.exe
http://download.bleepingcomputer.com/smeenk/zoek.exe

Zavři všechny ostatní programy , okna i prohlížeče.
Spusť Zoek.exe ( u win vista , win7, 8 klikni na něj pravým a vyber : „Spustit jako správce“
-pozor , náběh programu může trvat déle.
Do okna programu vlož skript níže:

Kód: Vybrat vše

autoclean;
resethosts;
emptyclsid;
IEdefaults;
FFdefaults;
CHRdefaults;
emptyIEcache;
emptyFFcache;
emptyCHRcache;
emptyalltemp;
emptyflash;
emptyjava;
emptyrecycle.bin;

klikni na Run Script
Program provede sken , opravu, sken i oprava může trvat i více minut ,je třeba posečkat do konce. Do okna neklikej!
Program nabídne restart , potvrď .
Po restartu se může nějaký čas ukázat pouze černá plocha , to je normální. Je třeba počkat až se vytvoří log. Ten si můžeš uložit třeba do dokumentů , jinak se sám ukládá do:
C:\zoek-results.log Zkopíruj sem celý obsah toho logu.
Pokud budou problémy , spusť zoek v nouz. režimu.


Stáhni si Zemana AntiMalware Free z tohoto odkazu:
https://www.zemana.com/Download/AntiMal ... .Setup.exe
a ulož si ho na plochu.
Poklepej na tento soubor na ploše a postupuj podle pokynů k instalaci programu.
Přijmi licenci k používání programu EULA , pokud se nabídne.
Pokud je k dispozici aktualizace programu , klepni na tlačítko „Update now“ ( aktualizovat nyní).
Můžeš si zatrhnout i vytvoření bodu obnovy:
Klikni na ozubené kolečko , poté na „Skenování“ a zatrhni „vytvářet body obnovy“.
Vrať se zpět ( klikni na domeček).
Zavři všechny otevřené soubory, složky a prohlížeče
Neměň žádné nastavení. Klikni na „Skenovat“.
Po skenu lze vidět , zda jsou nějaké nákazy. Klikni na „Další“. Nákazy budou přemístěny do karantény.
Když je skenování dokončeno, objeví se tisková zpráva , zkopíruj sem celý obsah té zprávy.
Jinak můžeš zprávy vidět , když klikneš vpravo nahoře na „ zprávy“.


Vlož nový log z HJT + informuj o problémech
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra

pajas92
Level 1
Level 1
Příspěvky: 73
Registrován: květen 14
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu

Příspěvekod pajas92 » 31 srp 2020 12:39

RogueKiller V12.12.23.0 (x64) [Jun 18 2018] (Free) by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : https://forum.adlice.com
Webová stránka : http://www.adlice.com/download/roguekiller/
Blog : http://www.adlice.com

Operační systém : Windows 10 (10.0.18362) 64 bits version
Spuštěno : Normální režim
Uživatel : Míra [Práva správce]
Started from : C:\Program Files\RogueKiller\RogueKiller64.exe
Mód : Smazat -- Datum : 08/31/2020 10:41:12 (Duration : 01:47:39)
Přepínač : -refid

¤¤¤ Procesy : 0 ¤¤¤

¤¤¤ Registry : 2 ¤¤¤
[PUM.Policies] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | ConsentPromptBehaviorAdmin : 0 -> Nahrazeno (2)
[PUM.Policies] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | ConsentPromptBehaviorAdmin : 0 -> Nahrazeno (2)

¤¤¤ Úlohy : 0 ¤¤¤

¤¤¤ Soubory : 0 ¤¤¤

¤¤¤ WMI : 0 ¤¤¤

¤¤¤ Soubor HOSTS : 0 ¤¤¤

¤¤¤ Antirootkit : 0 (Driver: Nahrán) ¤¤¤

¤¤¤ Webové prohlížeče : 0 ¤¤¤

¤¤¤ Kontrola MBR : ¤¤¤
+++++ PhysicalDrive0: WDC WD10JPVX-60JC3T1 +++++
--- User ---
[MBR] 2af37ef5bc45a5623b1bf6a2422c5f85
[BSP] f104efb94b90307ba504014bbb34bfaf : Empty MBR Code
Partition table:
0 - [MAN-MOUNT] EFI system partition | Offset (sectors): 2048 | Size: 260 MB
1 - [MAN-MOUNT] Microsoft reserved partition | Offset (sectors): 534528 | Size: 16 MB
2 - Basic data partition | Offset (sectors): 567296 | Size: 939431 MB
3 - [SYSTEM][MAN-MOUNT] Basic data partition | Offset (sectors): 1924521984 | Size: 980 MB
4 - [SYSTEM] Basic data partition | Offset (sectors): 1926529024 | Size: 13175 MB
User = LL1 ... OK
User = LL2 ... OK

pajas92
Level 1
Level 1
Příspěvky: 73
Registrován: květen 14
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu

Příspěvekod pajas92 » 31 srp 2020 13:41

Zoek.exe v5.0.0.2 Updated 03-May-2018(Online Version)
Tool run by Mˇra on 31.08.2020 at 12:40:49,13.
Microsoft Windows 10 Home 10.0.18362 x64
Running in: Normal Mode Internet Access Detected
Launched: C:\Users\MRA~1\Desktop\zoek.exe [Scan all users] [Script inserted]

==== System Restore Info ======================

31.08.2020 12:43:58 Zoek.exe System Restore Point Created Successfully.

==== Reset Hosts File ======================

# Copyright (c) 1993-2006 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host

# localhost name resolution is handled within DNS itself.
127.0.0.1 localhost
::1 localhost

==== Empty Folders Check ======================

C:\PROGRA~3\SoftwareDistribution deleted successfully
C:\PROGRA~3\ssh deleted successfully
C:\WINDOWS\serviceprofiles\networkservice\AppData\\LocalLow deleted successfully
C:\Users\MRA~1\AppData\Local\PlaceholderTileLogoFolder deleted successfully

==== Deleting CLSID Registry Keys ======================


==== Deleting CLSID Registry Values ======================


==== Deleting Services ======================


==== Deleting Files \ Folders ======================

C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-2338-1d38-1ba7278.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-2338-1d38-1ba72a9.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-2338-1d38-1ba72bb.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-2338-1d38-1ba73f5.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-2338-1d38-1ba7426.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-2338-1d38-1ba7447.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-2338-1d38-1ba7459.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-2338-1d38-1ba747a.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-2338-1d38-1ba748c.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-2338-1d38-1ba74ad.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-2338-1d38-1ba74bf.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-2338-1d38-1ba74e0.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-2338-1d38-1ba7501.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-2338-1d38-1ba7513.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-2338-1d38-1ba7524.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-2338-1d38-1ba7546.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-2338-1d38-1ba7557.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-2338-1d38-1ba75a7.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-2338-1d38-1ba75b9.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-d9c50.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-d9c90.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-d9d0f.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-d9dae.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-d9e0d.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-d9e3e.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-d9e9e.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-d9eee.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-d9f4e.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-d9f9e.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da01d.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da05e.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da0ae.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da11d.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da16d.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da1ae.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da1ee.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da22f.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da28e.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da30d.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da35e.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da3ae.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da3cf.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da400.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da421.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da442.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da492.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da4f2.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da513.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da554.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da575.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da596.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da5e7.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da608.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da629.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da64a.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da821.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da842.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da854.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da885.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da8a6.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da8c7.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da8d9.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da8fa.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da90c.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da92d.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da94e.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da960.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da981.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da993.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da9b4.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da9c6.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da9d7.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-da9f9.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-daa0a.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-daa1c.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-27ec-27f4-daa3d.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-440-24d0-b1286.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-440-24d0-b12a7.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-440-24d0-b12b9.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-440-24d0-b12bb.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-440-24d0-b12cd.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-440-24d0-b12de.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-440-24d0-b12f0.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-440-24d0-b12f2.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-440-24d0-b1303.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-440-24d0-b1315.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-440-24d0-b1327.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-440-24d0-b1329.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-440-24d0-b133a.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-440-24d0-b134c.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-440-24d0-b135e.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-440-24d0-b136f.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-440-24d0-b1371.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-440-24d0-b1392.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-440-24d0-b13a4.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-52c-530-10b2e4.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-52c-530-10b315.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-52c-530-10b327.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-52c-530-10b339.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-52c-530-10b34a.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-52c-530-10b35c.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-52c-530-10b36d.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-52c-530-10b37f.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-52c-530-10b391.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-52c-530-10b3a2.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-52c-530-10b3b4.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-52c-530-10b3c6.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-52c-530-10b3d7.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-52c-530-10b3e9.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-52c-530-10b3eb.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-52c-530-10b3fc.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-52c-530-10b40e.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-52c-530-10b43f.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-52c-530-10b441.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-c10-1f20-1b3d13.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-c10-1f20-1b3d34.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-c10-1f20-1b3d55.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-c10-1f20-1b3d77.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-c10-1f20-1b3d88.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-c10-1f20-1b3db9.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-c10-1f20-1b3dda.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-c10-1f20-1b3dec.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-c10-1f20-1b3e0d.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-c10-1f20-1b3e2e.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-c10-1f20-1b3e50.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-c10-1f20-1b3e71.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-c10-1f20-1b3e92.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-c10-1f20-1b3eb3.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-c10-1f20-1b3ed5.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-c10-1f20-1b3ef6.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-c10-1f20-1b3f27.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-c10-1f20-1b3f48.tmp deleted
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\tw-c10-1f20-1b3f69.tmp deleted
C:\windows\SysNative\GroupPolicy\Machine deleted
C:\windows\SysNative\GroupPolicy\User deleted

==== Chromium Look ======================


Chrome Media Router - MRA~1\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm

==== Set IE to Default ======================

Old Values:
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Start Page"="http://go.microsoft.com/fwlink/p/?LinkId=255141"

New Values:
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Start Page"="http://go.microsoft.com/fwlink/p/?LinkId=255141"

==== All HKLM and HKCU SearchScopes ======================

HKLM\SearchScopes "DefaultScope"="{0633EE93-D776-472f-A0FF-E1416B8B2E3A}"
HKLM\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} - http://www.bing.com/search?q={searchTerms}&form=PRHPC1&src=IE11TR&pc=HCTE
HKLM\Wow6432Node\SearchScopes "DefaultScope"="{0633EE93-D776-472f-A0FF-E1416B8B2E3A}"
HKLM\Wow6432Node\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} - http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC
HKCU\SearchScopes "DefaultScope"="{0633EE93-D776-472f-A0FF-E1416B8B2E3A}"
HKCU\SearchScopes\{012E1000-F331-11DB-8314-0800200C9A66} - http://www.google.com/search?q={searchTerms}
HKCU\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} - http://www.bing.com/search?q={searchTerms}&form=PRHPC1&src=IE11TR&pc=HCTE

==== Reset Google Chrome ======================

C:\Users\MRA~1\AppData\Local\Google\Chrome\User Data\Default\Preferences was reset successfully
C:\Users\MRA~1\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences was reset successfully
C:\Users\MRA~1\AppData\Local\Google\Chrome\User Data\Default\Web Data was reset successfully
C:\Users\MRA~1\AppData\Local\Google\Chrome\User Data\Default\Web Data-journal was reset successfully

==== Empty IE Cache ======================

C:\WINDOWS\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5 emptied successfully
C:\Users\MRA~1\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\Users\MRA~1\AppData\Local\Microsoft\Windows\INetCache\IE emptied successfully
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE emptied successfully

==== Empty FireFox Cache ======================

No FireFox Profiles found

==== Empty Edge Cache ======================

Edge Cache is not empty, a reboot is needed

==== Empty Chrome Cache ======================

C:\Users\MRA~1\AppData\Local\Google\Chrome\User Data\Default\Cache emptied successfully

==== Empty All Flash Cache ======================

No Flash Cache Found

==== Empty All Java Cache ======================

No Java Cache Found

==== C:\zoek_backup content ======================

C:\zoek_backup (files=49 folders=192 57713758 bytes)

==== Empty Temp Folders ======================

C:\Users\Default\AppData\Local\Temp emptied successfully
C:\Users\Default User\AppData\Local\Temp emptied successfully
C:\Users\MRA~1\AppData\Local\Temp will be emptied at reboot
C:\WINDOWS\serviceprofiles\networkservice\AppData\Local\Temp emptied successfully
C:\WINDOWS\serviceprofiles\Localservice\AppData\Local\Temp emptied successfully
C:\WINDOWS\Temp will be emptied at reboot

==== After Reboot ======================

==== Empty Temp Folders ======================

C:\WINDOWS\Temp successfully emptied
C:\Users\MRA~1\AppData\Local\Temp successfully emptied

==== Empty Recycle Bin ======================

C:\$RECYCLE.BIN successfully emptied

==== Deleting Files / Folders ======================

"C:\Users\MRA~1\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\AMD" not found
"C:\Users\MRA~1\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge" not found
"C:\Users\MRA~1\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp" not found

==== EOF on 31.08.2020 at 13:28:04,49 ======================

pajas92
Level 1
Level 1
Příspěvky: 73
Registrován: květen 14
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu

Příspěvekod pajas92 » 31 srp 2020 13:55

Název produktu    :  Zemana AntiMalware
Stav kontroly    :  Dokončena
Datum kontroly    :  31.08.2020 13:46:37
Typ kontroly    :  Inteligentní kontrola
Čas trvání    :  00:01:29
Zkontrolované objekty    :  1600
Zjištěné objekty    :  0
Vyloučené objekty    :  0
Automatické odesílání    :  Ano
Operační systém    :  Windows 10 x64
Procesor    :  2X AMD A9-9420 RADEON R5, 5 COMPUTE CORES 2C+3G
Režim systému BIOS    :  UEFI
Informace o doméně    :  WORKGROUP,False,NetSetupWorkgroupName
CUID    :  1227F68C6678BD31848E40


Zpět na “HiJackThis”

Kdo je online

Uživatelé prohlížející si toto fórum: Google [Bot] a 9 hostů