Stránka 2 z 4

Re: Prosím o kontrolu z Rsit

Napsal: 09 led 2013 14:44
od lubos3
Ano předtím jsem to zkoušel bez toho scriptu , protože to bylo v mezičase odpovědi .

Ted jsem to spustil s tím scriptem a zůstalo to zase viset pri kontrole \_restore.....

Děkuji

Re: Prosím o kontrolu z Rsit

Napsal: 09 led 2013 14:47
od vyosek
:arrow: Stahnete Farbar Service Scanner http://download.bleepingcomputer.com/farbar/FSS.exe
  • Ulozte nejlepe na Plochu
  • U vsech polozek udelejte zatrzitko (tim je oznacite pro skenovani)
  • Kliknete na Scan
  • Po dokonceni skenu se objevi log FSS.txt ten sem vlozte

Re: Prosím o kontrolu z Rsit

Napsal: 09 led 2013 14:49
od lubos3
C:\WINDOWS\system32\dhcpcsvc.dll
[2006-03-02 13:00] - [2008-04-14 08:51] - 0125952 ____A (Microsoft Corporation) 8C9A53E285AC5E6704844D0459EC85BE

C:\WINDOWS\system32\Drivers\afd.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\netbt.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\tcpip.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\ipsec.sys => MD5 is legit
C:\WINDOWS\system32\dnsrslvr.dll
[2006-03-02 13:00] - [2009-04-20 18:19] - 0045568 ____A (Microsoft Corporation) DFAA406BF19F4EE806A6F8D4342137F7

C:\WINDOWS\system32\ipnathlp.dll
[2006-03-02 13:00] - [2008-04-14 08:51] - 0329728 ____A (Microsoft Corporation) F58FACA9621D2DB01BD0927D9A0A208E

C:\WINDOWS\system32\netman.dll
[2006-03-02 13:00] - [2008-04-14 08:51] - 0198144 ____A (Microsoft Corporation) 72E1E9E2977BE08BDEEDB6D8FD9D4D40

C:\WINDOWS\system32\wbem\WMIsvc.dll
[2004-12-23 15:38] - [2008-04-14 08:52] - 0144896 ____A (Microsoft Corporation) E488332126E3B1182D2B8A0C35408EC6

C:\WINDOWS\system32\srsvc.dll
[2004-12-23 15:43] - [2008-04-14 08:52] - 0171008 ____A (Microsoft Corporation) 35B91147124F64AC8081A2EDB9EA4DEE

C:\WINDOWS\system32\Drivers\sr.sys
[2004-12-23 15:43] - [2008-04-14 08:11] - 0073344 ____A (Microsoft Corporation) 94610C8653635E4459316A0050D55CE7

C:\WINDOWS\system32\wscsvc.dll
[2006-03-02 13:00] - [2008-04-14 08:52] - 0080896 ____A (Microsoft Corporation) 4C86D5FAF78194995AF9CC1075F65DD3

C:\WINDOWS\system32\wbem\WMIsvc.dll
[2004-12-23 15:38] - [2008-04-14 08:52] - 0144896 ____A (Microsoft Corporation) E488332126E3B1182D2B8A0C35408EC6

C:\WINDOWS\system32\wuauserv.dll
[2004-12-23 15:38] - [2008-04-14 08:52] - 0006656 ____A (Microsoft Corporation) C1364564800EE9784192145324A23308

C:\WINDOWS\system32\qmgr.dll
[2004-12-23 15:43] - [2008-04-14 08:51] - 0409088 ____A (Microsoft Corporation) 19395D092FD85DDC2D9C7729CF5A2AC8

C:\WINDOWS\system32\es.dll
[2006-03-02 13:00] - [2008-07-07 21:29] - 0253952 ____A (Microsoft Corporation) A371F11EF07653591C8DE26AFB13CE7F

C:\WINDOWS\system32\cryptsvc.dll
[2006-03-02 13:00] - [2008-04-14 08:51] - 0062464 ____A (Microsoft Corporation) F3AB0933CBD166D271992F411C27CCAF

C:\WINDOWS\system32\svchost.exe
[2006-03-02 13:00] - [2008-04-14 08:52] - 0014336 ____A (Microsoft Corporation) BE4A520E29B6391F49E79CCC52044D93

C:\WINDOWS\system32\rpcss.dll
[2006-03-02 13:00] - [2009-02-09 11:56] - 0401408 ____A (Microsoft Corporation) BE27674D1CBC3214AEC84B4336A38BBF

C:\WINDOWS\system32\services.exe
[2012-11-30 15:00] - [2009-02-09 12:25] - 0111104 ____A (Microsoft Corporation) 9EF697AF07BB8DD82C3B02CA953A95B7


Extra List:
=======
Gpc(3) IPSec(5) irda(8) kl1(12) NetBT(6) PSched(7) RFCOMM(10) Tcpip(4)
0x0D0000000C000000050000000C00000001000000020000000300000004000000060000000700000008000000090000000A0000000B000000


**** End of log ****

Děkuji

Re: Prosím o kontrolu z Rsit

Napsal: 09 led 2013 15:02
od vyosek
To je nejake kratke ne :?:

Re: Prosím o kontrolu z Rsit

Napsal: 09 led 2013 15:20
od lubos3
hm ...
udělal jsme to podruché , proběhne to za pár sekud a výsledek asi stejný , zkusím ještě restarnout PC a udělat znova
Farbar Service Scanner Version: 05-01-2013
Ran by tatka (administrator) on 09-01-2013 at 15:18:31
Running from "C:\Documents and Settings\tatka\Plocha"
Microsoft Windows XP Service Pack 3 (X86)
Boot Mode: Normal
****************************************************************

Internet Services:
============
Dnscache Service is not running. Checking service configuration:
The start type of Dnscache service is set to Disabled. The default start type is Auto.
The ImagePath of Dnscache service is OK.
The ServiceDll of Dnscache service is OK.


Connection Status:
==============
Localhost is accessible.
LAN connected.
Google IP is accessible.
Google.com is accessible.
Yahoo IP is accessible.
Yahoo.com is accessible.


Windows Firewall:
=============

Firewall Disabled Policy:
==================


System Restore:
============
Srservice Service is not running. Checking service configuration:
The start type of Srservice service is OK.
The ImagePath of Srservice service is OK.
The ServiceDll of Srservice service is OK.

sr Service is not running. Checking service configuration:
The start type of sr service is set to Disabled. The default start type is Boot.
The ImagePath of sr: "\SystemRoot\system32\DRIVERS\sr.sys".


System Restore Disabled Policy:
========================
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore]
"DisableSR"=DWORD:1


Security Center:
============

Windows Update:
============

Windows Autoupdate Disabled Policy:
============================


File Check:
========
C:\WINDOWS\system32\dhcpcsvc.dll
[2006-03-02 13:00] - [2008-04-14 08:51] - 0125952 ____A (Microsoft Corporation) 8C9A53E285AC5E6704844D0459EC85BE

C:\WINDOWS\system32\Drivers\afd.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\netbt.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\tcpip.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\ipsec.sys => MD5 is legit
C:\WINDOWS\system32\dnsrslvr.dll
[2006-03-02 13:00] - [2009-04-20 18:19] - 0045568 ____A (Microsoft Corporation) DFAA406BF19F4EE806A6F8D4342137F7

C:\WINDOWS\system32\ipnathlp.dll
[2006-03-02 13:00] - [2008-04-14 08:51] - 0329728 ____A (Microsoft Corporation) F58FACA9621D2DB01BD0927D9A0A208E

C:\WINDOWS\system32\netman.dll
[2006-03-02 13:00] - [2008-04-14 08:51] - 0198144 ____A (Microsoft Corporation) 72E1E9E2977BE08BDEEDB6D8FD9D4D40

C:\WINDOWS\system32\wbem\WMIsvc.dll
[2004-12-23 15:38] - [2008-04-14 08:52] - 0144896 ____A (Microsoft Corporation) E488332126E3B1182D2B8A0C35408EC6

C:\WINDOWS\system32\srsvc.dll
[2004-12-23 15:43] - [2008-04-14 08:52] - 0171008 ____A (Microsoft Corporation) 35B91147124F64AC8081A2EDB9EA4DEE

C:\WINDOWS\system32\Drivers\sr.sys
[2004-12-23 15:43] - [2008-04-14 08:11] - 0073344 ____A (Microsoft Corporation) 94610C8653635E4459316A0050D55CE7

C:\WINDOWS\system32\wscsvc.dll
[2006-03-02 13:00] - [2008-04-14 08:52] - 0080896 ____A (Microsoft Corporation) 4C86D5FAF78194995AF9CC1075F65DD3

C:\WINDOWS\system32\wbem\WMIsvc.dll
[2004-12-23 15:38] - [2008-04-14 08:52] - 0144896 ____A (Microsoft Corporation) E488332126E3B1182D2B8A0C35408EC6

C:\WINDOWS\system32\wuauserv.dll
[2004-12-23 15:38] - [2008-04-14 08:52] - 0006656 ____A (Microsoft Corporation) C1364564800EE9784192145324A23308

C:\WINDOWS\system32\qmgr.dll
[2004-12-23 15:43] - [2008-04-14 08:51] - 0409088 ____A (Microsoft Corporation) 19395D092FD85DDC2D9C7729CF5A2AC8

C:\WINDOWS\system32\es.dll
[2006-03-02 13:00] - [2008-07-07 21:29] - 0253952 ____A (Microsoft Corporation) A371F11EF07653591C8DE26AFB13CE7F

C:\WINDOWS\system32\cryptsvc.dll
[2006-03-02 13:00] - [2008-04-14 08:51] - 0062464 ____A (Microsoft Corporation) F3AB0933CBD166D271992F411C27CCAF

C:\WINDOWS\system32\svchost.exe
[2006-03-02 13:00] - [2008-04-14 08:52] - 0014336 ____A (Microsoft Corporation) BE4A520E29B6391F49E79CCC52044D93

C:\WINDOWS\system32\rpcss.dll
[2006-03-02 13:00] - [2009-02-09 11:56] - 0401408 ____A (Microsoft Corporation) BE27674D1CBC3214AEC84B4336A38BBF

C:\WINDOWS\system32\services.exe
[2012-11-30 15:00] - [2009-02-09 12:25] - 0111104 ____A (Microsoft Corporation) 9EF697AF07BB8DD82C3B02CA953A95B7


Extra List:
=======
Gpc(3) IPSec(5) irda(8) kl1(12) NetBT(6) PSched(7) RFCOMM(10) Tcpip(4)
0x0D0000000C000000050000000C00000001000000020000000300000004000000060000000700000008000000090000000A0000000B000000


**** End of log ****

Re: Prosím o kontrolu z Rsit

Napsal: 09 led 2013 15:32
od lubos3
Tak jsem to PC restartnul a vypadáto pořád stejně ,
Farbar Service Scanner Version: 05-01-2013
Ran by tatka (administrator) on 09-01-2013 at 15:29:02
Running from "C:\Documents and Settings\tatka\Plocha"
Microsoft Windows XP Service Pack 3 (X86)
Boot Mode: Normal
****************************************************************

Internet Services:
============
Dnscache Service is not running. Checking service configuration:
The start type of Dnscache service is set to Disabled. The default start type is Auto.
The ImagePath of Dnscache service is OK.
The ServiceDll of Dnscache service is OK.


Connection Status:
==============
Localhost is accessible.
LAN connected.
Google IP is accessible.
Google.com is accessible.
Yahoo IP is accessible.
Yahoo.com is accessible.


Windows Firewall:
=============

Firewall Disabled Policy:
==================


System Restore:
============
Srservice Service is not running. Checking service configuration:
The start type of Srservice service is OK.
The ImagePath of Srservice service is OK.
The ServiceDll of Srservice service is OK.

sr Service is not running. Checking service configuration:
The start type of sr service is set to Disabled. The default start type is Boot.
The ImagePath of sr: "\SystemRoot\system32\DRIVERS\sr.sys".


System Restore Disabled Policy:
========================
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore]
"DisableSR"=DWORD:1


Security Center:
============

Windows Update:
============

Windows Autoupdate Disabled Policy:
============================


File Check:
========
C:\WINDOWS\system32\dhcpcsvc.dll
[2006-03-02 13:00] - [2008-04-14 08:51] - 0125952 ____A (Microsoft Corporation) 8C9A53E285AC5E6704844D0459EC85BE

C:\WINDOWS\system32\Drivers\afd.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\netbt.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\tcpip.sys => MD5 is legit
C:\WINDOWS\system32\Drivers\ipsec.sys => MD5 is legit
C:\WINDOWS\system32\dnsrslvr.dll
[2006-03-02 13:00] - [2009-04-20 18:19] - 0045568 ____A (Microsoft Corporation) DFAA406BF19F4EE806A6F8D4342137F7

C:\WINDOWS\system32\ipnathlp.dll
[2006-03-02 13:00] - [2008-04-14 08:51] - 0329728 ____A (Microsoft Corporation) F58FACA9621D2DB01BD0927D9A0A208E

C:\WINDOWS\system32\netman.dll
[2006-03-02 13:00] - [2008-04-14 08:51] - 0198144 ____A (Microsoft Corporation) 72E1E9E2977BE08BDEEDB6D8FD9D4D40

C:\WINDOWS\system32\wbem\WMIsvc.dll
[2004-12-23 15:38] - [2008-04-14 08:52] - 0144896 ____A (Microsoft Corporation) E488332126E3B1182D2B8A0C35408EC6

C:\WINDOWS\system32\srsvc.dll
[2004-12-23 15:43] - [2008-04-14 08:52] - 0171008 ____A (Microsoft Corporation) 35B91147124F64AC8081A2EDB9EA4DEE

C:\WINDOWS\system32\Drivers\sr.sys
[2004-12-23 15:43] - [2008-04-14 08:11] - 0073344 ____A (Microsoft Corporation) 94610C8653635E4459316A0050D55CE7

C:\WINDOWS\system32\wscsvc.dll
[2006-03-02 13:00] - [2008-04-14 08:52] - 0080896 ____A (Microsoft Corporation) 4C86D5FAF78194995AF9CC1075F65DD3

C:\WINDOWS\system32\wbem\WMIsvc.dll
[2004-12-23 15:38] - [2008-04-14 08:52] - 0144896 ____A (Microsoft Corporation) E488332126E3B1182D2B8A0C35408EC6

C:\WINDOWS\system32\wuauserv.dll
[2004-12-23 15:38] - [2008-04-14 08:52] - 0006656 ____A (Microsoft Corporation) C1364564800EE9784192145324A23308

C:\WINDOWS\system32\qmgr.dll
[2004-12-23 15:43] - [2008-04-14 08:51] - 0409088 ____A (Microsoft Corporation) 19395D092FD85DDC2D9C7729CF5A2AC8

C:\WINDOWS\system32\es.dll
[2006-03-02 13:00] - [2008-07-07 21:29] - 0253952 ____A (Microsoft Corporation) A371F11EF07653591C8DE26AFB13CE7F

C:\WINDOWS\system32\cryptsvc.dll
[2006-03-02 13:00] - [2008-04-14 08:51] - 0062464 ____A (Microsoft Corporation) F3AB0933CBD166D271992F411C27CCAF

C:\WINDOWS\system32\svchost.exe
[2006-03-02 13:00] - [2008-04-14 08:52] - 0014336 ____A (Microsoft Corporation) BE4A520E29B6391F49E79CCC52044D93

C:\WINDOWS\system32\rpcss.dll
[2006-03-02 13:00] - [2009-02-09 11:56] - 0401408 ____A (Microsoft Corporation) BE27674D1CBC3214AEC84B4336A38BBF

C:\WINDOWS\system32\services.exe
[2012-11-30 15:00] - [2009-02-09 12:25] - 0111104 ____A (Microsoft Corporation) 9EF697AF07BB8DD82C3B02CA953A95B7


Extra List:
=======
Gpc(3) IPSec(5) irda(8) kl1(12) NetBT(6) PSched(7) RFCOMM(10) Tcpip(4)
0x0D0000000C000000050000000C00000001000000020000000300000004000000060000000700000008000000090000000A0000000B000000


**** End of log ****

Děkuji

Re: Prosím o kontrolu z Rsit

Napsal: 09 led 2013 18:20
od vyosek
:arrow: Spustte znovu OTL
  • Pokud pouzivate Win Vista ci W7, kliknete na OTL pravym a dejte Run As Administrator ci Spustit jako spravce
  • Do spodniho okenka Vlastni skenovani/opravy vlozte skript nize
  • Kód: Vybrat vše

    :reg
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore]
    "DisableSR"=dword:00000000
    
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\srservice]
    "Type"=dword:00000020
    "Start"=dword:00000002
    "ErrorControl"=dword:00000001
    "ImagePath"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,\
      74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,73,\
      00,76,00,63,00,68,00,6f,00,73,00,74,00,2e,00,65,00,78,00,65,00,20,00,2d,00,\
      6b,00,20,00,6e,00,65,00,74,00,73,00,76,00,63,00,73,00,00,00
    "DisplayName"="System Restore Service"
    "DependOnService"=hex(7):52,00,70,00,63,00,53,00,73,00,00,00,00,00
    "DependOnGroup"=hex(7):00,00
    "ObjectName"="LocalSystem"
    "Description"="Performs system restore functions. To stop service, turn off System Restore from the System Restore tab in My Computer->Properties"
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\srservice\Parameters]
    "ServiceDll"=hex(2):43,00,3a,00,5c,00,57,00,49,00,4e,00,44,00,4f,00,57,00,53,\
      00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,73,00,72,00,\
      73,00,76,00,63,00,2e,00,64,00,6c,00,6c,00,00,00
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\srservice\Security]
    "Security"=hex:01,00,14,80,90,00,00,00,9c,00,00,00,14,00,00,00,30,00,00,00,02,\
      00,1c,00,01,00,00,00,02,80,14,00,ff,01,0f,00,01,01,00,00,00,00,00,01,00,00,\
      00,00,02,00,60,00,04,00,00,00,00,00,14,00,fd,01,02,00,01,01,00,00,00,00,00,\
      05,12,00,00,00,00,00,18,00,ff,01,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,\
      20,02,00,00,00,00,14,00,8d,01,02,00,01,01,00,00,00,00,00,05,0b,00,00,00,00,\
      00,18,00,fd,01,02,00,01,02,00,00,00,00,00,05,20,00,00,00,23,02,00,00,01,01,\
      00,00,00,00,00,05,12,00,00,00,01,01,00,00,00,00,00,05,12,00,00,00
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\srservice\Enum]
    "0"="Root\\LEGACY_SRSERVICE\\0000"
    "Count"=dword:00000001
    "NextInstance"=dword:00000001
    
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Dnscache]
    "Type"=dword:00000020
    "Start"=dword:00000002
    "ErrorControl"=dword:00000001
    "ImagePath"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,\
      74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,73,\
      00,76,00,63,00,68,00,6f,00,73,00,74,00,2e,00,65,00,78,00,65,00,20,00,2d,00,\
      6b,00,20,00,4e,00,65,00,74,00,77,00,6f,00,72,00,6b,00,53,00,65,00,72,00,76,\
      00,69,00,63,00,65,00,00,00
    "DisplayName"="DNS Client"
    "Group"="TDI"
    "DependOnService"=hex(7):54,00,63,00,70,00,69,00,70,00,00,00,00,00
    "DependOnGroup"=hex(7):00,00
    "ObjectName"="NT AUTHORITY\\NetworkService"
    "Description"="Resolves and caches Domain Name System (DNS) names for this computer. If this service is stopped, this computer will not be able to resolve DNS names and locate Active Directory domain controllers. If this service is disabled, any services that explicitly depend on it will fail to start."
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Dnscache\Parameters]
    "ServiceDll"=hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,\
      00,74,00,25,00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,\
      64,00,6e,00,73,00,72,00,73,00,6c,00,76,00,72,00,2e,00,64,00,6c,00,6c,00,00,\
      00
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Dnscache\Security]
    "Security"=hex:01,00,14,80,a8,00,00,00,b4,00,00,00,14,00,00,00,30,00,00,00,02,\
      00,1c,00,01,00,00,00,02,80,14,00,ff,01,0f,00,01,01,00,00,00,00,00,01,00,00,\
      00,00,02,00,78,00,05,00,00,00,00,00,14,00,8d,01,02,00,01,01,00,00,00,00,00,\
      05,0b,00,00,00,00,00,18,00,9d,01,02,00,01,02,00,00,00,00,00,05,20,00,00,00,\
      23,02,00,00,00,00,18,00,fd,01,02,00,01,02,00,00,00,00,00,05,20,00,00,00,2c,\
      02,00,00,00,00,18,00,ff,01,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,\
      00,00,00,00,14,00,fd,01,02,00,01,01,00,00,00,00,00,05,12,00,00,00,01,01,00,\
      00,00,00,00,05,12,00,00,00,01,01,00,00,00,00,00,05,12,00,00,00
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Dnscache\Enum]
    "0"="Root\\LEGACY_DNSCACHE\\0000"
    "Count"=dword:00000001
    "NextInstance"=dword:00000001
    
    :files
    %windir%\system32\*.tmp.dll /s
    %windir%\system32\SET*.tmp /s
    %windir%\*.tmp
    
    :commands
    [RESETHOSTS]
    [EMPTYTEMP]
    [EMPTYFLASH]
    [EMPTYJAVA]
  • Nasledne kliknete na Opravit
  • PC provede opravu, restartuje se a da Vam log, jeho obsah vlozte sem

Re: Prosím o kontrolu z Rsit

Napsal: 10 led 2013 10:08
od lubos3
Dobrý den ,

All processes killed
========== REGISTRY ==========
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\\"DisableSR"|dword:00000000 /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\srservice\\"Type"|dword:00000020 /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\srservice\\"Start"|dword:00000002 /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\srservice\\"ErrorControl"|dword:00000001 /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\srservice\\"ImagePath"|hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,73,00,76,00,63,00,68,00,6f,00,73,00,74,00,2e,00,65,00,78,00,65,00,20,00,2d,00,6b,00,20,00,6e,00,65,00,74,00,73,00,76,00,63,00,73,00,00,00 /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\srservice\\"DisplayName"|"System Restore Service" /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\srservice\\"DependOnService"|hex(7):52,00,70,00,63,00,53,00,73,00,00,00,00,00 /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\srservice\\"DependOnGroup"|hex(7):00,00 /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\srservice\\"ObjectName"|"LocalSystem" /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\srservice\\"Description"|"Performs system restore functions. To stop service, turn off System Restore from the System Restore tab in My Computer->Properties" /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\srservice\Parameters\\"ServiceDll"|hex(2):43,00,3a,00,5c,00,57,00,49,00,4e,00,44,00,4f,00,57,00,53,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,73,00,72,00,73,00,76,00,63,00,2e,00,64,00,6c,00,6c,00,00,00 /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\srservice\Security\\"Security"|hex:01,00,14,80,90,00,00,00,9c,00,00,00,14,00,00,00,30,00,00,00,02,00,1c,00,01,00,00,00,02,80,14,00,ff,01,0f,00,01,01,00,00,00,00,00,01,00,00,00,00,02,00,60,00,04,00,00,00,00,00,14,00,fd,01,02,00,01,01,00,00,00,00,00,05,12,00,00,00,00,00,18,00,ff,01,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,00,14,00,8d,01,02,00,01,01,00,00,00,00,00,05,0b,00,00,00,00,00,18,00,fd,01,02,00,01,02,00,00,00,00,00,05,20,00,00,00,23,02,00,00,01,01,00,00,00,00,00,05,12,00,00,00,01,01,00,00,00,00,00,05,12,00,00,00 /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\srservice\Enum\\"0"|"Root\\LEGACY_SRSERVICE\\0000" /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\srservice\Enum\\"Count"|dword:00000001 /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\srservice\Enum\\"NextInstance"|dword:00000001 /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Dnscache\\"Type"|dword:00000020 /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Dnscache\\"Start"|dword:00000002 /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Dnscache\\"ErrorControl"|dword:00000001 /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Dnscache\\"ImagePath"|hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,73,00,76,00,63,00,68,00,6f,00,73,00,74,00,2e,00,65,00,78,00,65,00,20,00,2d,00,6b,00,20,00,4e,00,65,00,74,00,77,00,6f,00,72,00,6b,00,53,00,65,00,72,00,76,00,69,00,63,00,65,00,00,00 /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Dnscache\\"DisplayName"|"DNS Client" /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Dnscache\\"Group"|"TDI" /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Dnscache\\"DependOnService"|hex(7):54,00,63,00,70,00,69,00,70,00,00,00,00,00 /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Dnscache\\"DependOnGroup"|hex(7):00,00 /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Dnscache\\"ObjectName"|"NT AUTHORITY\\NetworkService" /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Dnscache\\"Description"|"Resolves and caches Domain Name System (DNS) names for this computer. If this service is stopped, this computer will not be able to resolve DNS names and locate Active Directory domain controllers. If this service is disabled, any services that explicitly depend on it will fail to start." /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Dnscache\Parameters\\"ServiceDll"|hex(2):25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,00,25,00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,64,00,6e,00,73,00,72,00,73,00,6c,00,76,00,72,00,2e,00,64,00,6c,00,6c,00,00,00 /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Dnscache\Security\\"Security"|hex:01,00,14,80,a8,00,00,00,b4,00,00,00,14,00,00,00,30,00,00,00,02,00,1c,00,01,00,00,00,02,80,14,00,ff,01,0f,00,01,01,00,00,00,00,00,01,00,00,00,00,02,00,78,00,05,00,00,00,00,00,14,00,8d,01,02,00,01,01,00,00,00,00,00,05,0b,00,00,00,00,00,18,00,9d,01,02,00,01,02,00,00,00,00,00,05,20,00,00,00,23,02,00,00,00,00,18,00,fd,01,02,00,01,02,00,00,00,00,00,05,20,00,00,00,2c,02,00,00,00,00,18,00,ff,01,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,00,14,00,fd,01,02,00,01,01,00,00,00,00,00,05,12,00,00,00,01,01,00,00,00,00,00,05,12,00,00,00,01,01,00,00,00,00,00,05,12,00,00,00 /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Dnscache\Enum\\"0"|"Root\\LEGACY_DNSCACHE\\0000" /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Dnscache\Enum\\"Count"|dword:00000001 /E : value set successfully!
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Dnscache\Enum\\"NextInstance"|dword:00000001 /E : value set successfully!
========== FILES ==========
C:\WINDOWS\system32\_000033_.tmp.dll moved successfully.
C:\WINDOWS\system32\SET50.tmp moved successfully.
C:\WINDOWS\system32\SET52.tmp moved successfully.
C:\WINDOWS\system32\SET5E.tmp moved successfully.
C:\WINDOWS\system32\SET61.tmp moved successfully.
C:\WINDOWS\system32\SET68.tmp moved successfully.
C:\WINDOWS\system32\SET69.tmp moved successfully.
C:\WINDOWS\system32\SET6A.tmp moved successfully.
C:\WINDOWS\system32\SET6D.tmp moved successfully.
C:\WINDOWS\system32\setb5.tmp moved successfully.
C:\WINDOWS\000001_.tmp moved successfully.
C:\WINDOWS\002199_.tmp moved successfully.
C:\WINDOWS\002509_.tmp moved successfully.
C:\WINDOWS\002832_.tmp moved successfully.
C:\WINDOWS\003256_.tmp moved successfully.
C:\WINDOWS\003273_.tmp moved successfully.
C:\WINDOWS\003279_.tmp moved successfully.
C:\WINDOWS\003281_.tmp moved successfully.
C:\WINDOWS\SET104.tmp moved successfully.
C:\WINDOWS\SET105.tmp moved successfully.
C:\WINDOWS\SET107.tmp moved successfully.
C:\WINDOWS\SET108.tmp moved successfully.
C:\WINDOWS\SET10C.tmp moved successfully.
C:\WINDOWS\SET113.tmp moved successfully.
C:\WINDOWS\SET114.tmp moved successfully.
C:\WINDOWS\SET12C.tmp moved successfully.
C:\WINDOWS\SET12F.tmp moved successfully.
C:\WINDOWS\SET13B.tmp moved successfully.
C:\WINDOWS\SET13F.tmp moved successfully.
C:\WINDOWS\SET146.tmp moved successfully.
C:\WINDOWS\SET147.tmp moved successfully.
C:\WINDOWS\SET148.tmp moved successfully.
C:\WINDOWS\SET149.tmp moved successfully.
C:\WINDOWS\SET14A.tmp moved successfully.
C:\WINDOWS\SET14B.tmp moved successfully.
C:\WINDOWS\SET14C.tmp moved successfully.
C:\WINDOWS\SET14D.tmp moved successfully.
C:\WINDOWS\SET14E.tmp moved successfully.
C:\WINDOWS\SET14F.tmp moved successfully.
C:\WINDOWS\SET150.tmp moved successfully.
C:\WINDOWS\SET151.tmp moved successfully.
C:\WINDOWS\SET152.tmp moved successfully.
C:\WINDOWS\SET153.tmp moved successfully.
C:\WINDOWS\SET154.tmp moved successfully.
C:\WINDOWS\SET155.tmp moved successfully.
C:\WINDOWS\SET156.tmp moved successfully.
C:\WINDOWS\SET157.tmp moved successfully.
C:\WINDOWS\SET158.tmp moved successfully.
C:\WINDOWS\SET159.tmp moved successfully.
C:\WINDOWS\SET15A.tmp moved successfully.
C:\WINDOWS\SET15B.tmp moved successfully.
C:\WINDOWS\SET15C.tmp moved successfully.
C:\WINDOWS\SET15D.tmp moved successfully.
C:\WINDOWS\SET15E.tmp moved successfully.
C:\WINDOWS\SET15F.tmp moved successfully.
C:\WINDOWS\SET160.tmp moved successfully.
C:\WINDOWS\SET161.tmp moved successfully.
C:\WINDOWS\SET162.tmp moved successfully.
C:\WINDOWS\SET163.tmp moved successfully.
C:\WINDOWS\SET164.tmp moved successfully.
C:\WINDOWS\SET165.tmp moved successfully.
C:\WINDOWS\SET166.tmp moved successfully.
C:\WINDOWS\SET167.tmp moved successfully.
C:\WINDOWS\SET168.tmp moved successfully.
C:\WINDOWS\SET169.tmp moved successfully.
C:\WINDOWS\SET16A.tmp moved successfully.
C:\WINDOWS\SET16B.tmp moved successfully.
C:\WINDOWS\SET16C.tmp moved successfully.
C:\WINDOWS\SET16D.tmp moved successfully.
C:\WINDOWS\SET16E.tmp moved successfully.
C:\WINDOWS\SET16F.tmp moved successfully.
C:\WINDOWS\SET170.tmp moved successfully.
C:\WINDOWS\SET171.tmp moved successfully.
C:\WINDOWS\SET172.tmp moved successfully.
C:\WINDOWS\SET173.tmp moved successfully.
C:\WINDOWS\SET174.tmp moved successfully.
C:\WINDOWS\SET175.tmp moved successfully.
C:\WINDOWS\SET176.tmp moved successfully.
C:\WINDOWS\SET177.tmp moved successfully.
C:\WINDOWS\SET178.tmp moved successfully.
C:\WINDOWS\SET179.tmp moved successfully.
C:\WINDOWS\SET17A.tmp moved successfully.
C:\WINDOWS\SET17B.tmp moved successfully.
C:\WINDOWS\SET17C.tmp moved successfully.
C:\WINDOWS\SET17D.tmp moved successfully.
C:\WINDOWS\SET17E.tmp moved successfully.
C:\WINDOWS\SET17F.tmp moved successfully.
C:\WINDOWS\SET180.tmp moved successfully.
C:\WINDOWS\SET182.tmp moved successfully.
C:\WINDOWS\SET183.tmp moved successfully.
C:\WINDOWS\SET184.tmp moved successfully.
C:\WINDOWS\SET185.tmp moved successfully.
C:\WINDOWS\SET186.tmp moved successfully.
C:\WINDOWS\SET187.tmp moved successfully.
C:\WINDOWS\SET188.tmp moved successfully.
C:\WINDOWS\SET189.tmp moved successfully.
C:\WINDOWS\SET18A.tmp moved successfully.
C:\WINDOWS\SET18B.tmp moved successfully.
C:\WINDOWS\SET18C.tmp moved successfully.
C:\WINDOWS\SET18D.tmp moved successfully.
C:\WINDOWS\SET18E.tmp moved successfully.
C:\WINDOWS\SET18F.tmp moved successfully.
C:\WINDOWS\SET190.tmp moved successfully.
C:\WINDOWS\SET191.tmp moved successfully.
C:\WINDOWS\SET192.tmp moved successfully.
C:\WINDOWS\SET193.tmp moved successfully.
C:\WINDOWS\SET194.tmp moved successfully.
C:\WINDOWS\SET195.tmp moved successfully.
C:\WINDOWS\SET196.tmp moved successfully.
C:\WINDOWS\SET197.tmp moved successfully.
C:\WINDOWS\SET198.tmp moved successfully.
C:\WINDOWS\SET199.tmp moved successfully.
C:\WINDOWS\SET19A.tmp moved successfully.
C:\WINDOWS\SET19B.tmp moved successfully.
C:\WINDOWS\SET19C.tmp moved successfully.
C:\WINDOWS\SET19D.tmp moved successfully.
C:\WINDOWS\SET19E.tmp moved successfully.
C:\WINDOWS\SET19F.tmp moved successfully.
C:\WINDOWS\SET1A0.tmp moved successfully.
C:\WINDOWS\SET1A1.tmp moved successfully.
C:\WINDOWS\SET1A2.tmp moved successfully.
C:\WINDOWS\SET1A3.tmp moved successfully.
C:\WINDOWS\SET1A4.tmp moved successfully.
C:\WINDOWS\SET1A5.tmp moved successfully.
C:\WINDOWS\SET1A6.tmp moved successfully.
C:\WINDOWS\SET1A7.tmp moved successfully.
C:\WINDOWS\SET1A8.tmp moved successfully.
C:\WINDOWS\SET1A9.tmp moved successfully.
C:\WINDOWS\SET1AD.tmp moved successfully.
C:\WINDOWS\SET1B0.tmp moved successfully.
C:\WINDOWS\SET1BC.tmp moved successfully.
C:\WINDOWS\SET1CF.tmp moved successfully.
C:\WINDOWS\SET1EF.tmp moved successfully.
C:\WINDOWS\SET24.tmp moved successfully.
C:\WINDOWS\SET3.tmp moved successfully.
C:\WINDOWS\SET39.tmp moved successfully.
C:\WINDOWS\SET57.tmp moved successfully.
C:\WINDOWS\SET5A.tmp moved successfully.
C:\WINDOWS\SET66.tmp moved successfully.
C:\WINDOWS\SET96.tmp moved successfully.
C:\WINDOWS\SET99.tmp moved successfully.
C:\WINDOWS\SET9A.tmp moved successfully.
C:\WINDOWS\SET9B.tmp moved successfully.
C:\WINDOWS\SET9C.tmp moved successfully.
C:\WINDOWS\SET9D.tmp moved successfully.
C:\WINDOWS\SET9E.tmp moved successfully.
C:\WINDOWS\SET9F.tmp moved successfully.
C:\WINDOWS\SETA.tmp moved successfully.
C:\WINDOWS\SETA0.tmp moved successfully.
C:\WINDOWS\SETA1.tmp moved successfully.
C:\WINDOWS\SETA2.tmp moved successfully.
C:\WINDOWS\SETA3.tmp moved successfully.
C:\WINDOWS\SETA4.tmp moved successfully.
C:\WINDOWS\SETA5.tmp moved successfully.
C:\WINDOWS\SETA6.tmp moved successfully.
C:\WINDOWS\SETA7.tmp moved successfully.
C:\WINDOWS\SETA8.tmp moved successfully.
C:\WINDOWS\SETA9.tmp moved successfully.
C:\WINDOWS\SETAA.tmp moved successfully.
C:\WINDOWS\SETAB.tmp moved successfully.
C:\WINDOWS\SETAC.tmp moved successfully.
C:\WINDOWS\SETAD.tmp moved successfully.
C:\WINDOWS\SETAE.tmp moved successfully.
C:\WINDOWS\SETAF.tmp moved successfully.
C:\WINDOWS\SETB0.tmp moved successfully.
C:\WINDOWS\SETB1.tmp moved successfully.
C:\WINDOWS\SETB2.tmp moved successfully.
C:\WINDOWS\SETB3.tmp moved successfully.
C:\WINDOWS\SETB4.tmp moved successfully.
C:\WINDOWS\SETB5.tmp moved successfully.
C:\WINDOWS\SETB6.tmp moved successfully.
C:\WINDOWS\SETB7.tmp moved successfully.
C:\WINDOWS\SETB8.tmp moved successfully.
C:\WINDOWS\SETB9.tmp moved successfully.
C:\WINDOWS\SETBA.tmp moved successfully.
C:\WINDOWS\SETBB.tmp moved successfully.
C:\WINDOWS\SETBC.tmp moved successfully.
C:\WINDOWS\SETBD.tmp moved successfully.
C:\WINDOWS\SETBE.tmp moved successfully.
C:\WINDOWS\SETBF.tmp moved successfully.
C:\WINDOWS\SETC0.tmp moved successfully.
C:\WINDOWS\SETC1.tmp moved successfully.
C:\WINDOWS\SETC2.tmp moved successfully.
C:\WINDOWS\SETC3.tmp moved successfully.
C:\WINDOWS\SETC4.tmp moved successfully.
C:\WINDOWS\SETC5.tmp moved successfully.
C:\WINDOWS\SETC6.tmp moved successfully.
C:\WINDOWS\SETC7.tmp moved successfully.
C:\WINDOWS\SETC8.tmp moved successfully.
C:\WINDOWS\SETC9.tmp moved successfully.
C:\WINDOWS\SETCA.tmp moved successfully.
C:\WINDOWS\SETCB.tmp moved successfully.
C:\WINDOWS\SETCC.tmp moved successfully.
C:\WINDOWS\SETCD.tmp moved successfully.
C:\WINDOWS\SETCE.tmp moved successfully.
C:\WINDOWS\SETCF.tmp moved successfully.
C:\WINDOWS\SETD0.tmp moved successfully.
C:\WINDOWS\SETD1.tmp moved successfully.
C:\WINDOWS\SETD2.tmp moved successfully.
C:\WINDOWS\SETD3.tmp moved successfully.
C:\WINDOWS\SETD4.tmp moved successfully.
C:\WINDOWS\SETD5.tmp moved successfully.
C:\WINDOWS\SETD6.tmp moved successfully.
C:\WINDOWS\SETD7.tmp moved successfully.
C:\WINDOWS\SETD8.tmp moved successfully.
C:\WINDOWS\SETD9.tmp moved successfully.
C:\WINDOWS\SETDA.tmp moved successfully.
C:\WINDOWS\SETDB.tmp moved successfully.
C:\WINDOWS\SETDC.tmp moved successfully.
C:\WINDOWS\SETDD.tmp moved successfully.
C:\WINDOWS\SETDE.tmp moved successfully.
C:\WINDOWS\SETDF.tmp moved successfully.
C:\WINDOWS\SETE0.tmp moved successfully.
C:\WINDOWS\SETE1.tmp moved successfully.
C:\WINDOWS\SETE2.tmp moved successfully.
C:\WINDOWS\SETE3.tmp moved successfully.
C:\WINDOWS\SETE4.tmp moved successfully.
C:\WINDOWS\SETE5.tmp moved successfully.
C:\WINDOWS\SETE6.tmp moved successfully.
C:\WINDOWS\SETE7.tmp moved successfully.
C:\WINDOWS\SETE8.tmp moved successfully.
C:\WINDOWS\SETE9.tmp moved successfully.
C:\WINDOWS\SETEA.tmp moved successfully.
C:\WINDOWS\SETEB.tmp moved successfully.
C:\WINDOWS\SETEC.tmp moved successfully.
C:\WINDOWS\SETED.tmp moved successfully.
C:\WINDOWS\SETEE.tmp moved successfully.
C:\WINDOWS\SETEF.tmp moved successfully.
C:\WINDOWS\SETF0.tmp moved successfully.
C:\WINDOWS\SETF1.tmp moved successfully.
C:\WINDOWS\SETF2.tmp moved successfully.
C:\WINDOWS\SETF3.tmp moved successfully.
C:\WINDOWS\SETF4.tmp moved successfully.
C:\WINDOWS\SETF5.tmp moved successfully.
C:\WINDOWS\SETF6.tmp moved successfully.
C:\WINDOWS\SETF7.tmp moved successfully.
C:\WINDOWS\SETF8.tmp moved successfully.
C:\WINDOWS\SETF9.tmp moved successfully.
C:\WINDOWS\SETFA.tmp moved successfully.
C:\WINDOWS\SETFB.tmp moved successfully.
C:\WINDOWS\SETFC.tmp moved successfully.
C:\WINDOWS\SETFD.tmp moved successfully.
C:\WINDOWS\SETFE.tmp moved successfully.
C:\WINDOWS\system.tmp moved successfully.
C:\WINDOWS\win.tmp moved successfully.
========== COMMANDS ==========
C:\WINDOWS\System32\drivers\etc\Hosts moved successfully.
HOSTS file reset successfully

[EMPTYTEMP]

User: Administrator
->Temp folder emptied: 1012119 bytes
->Temporary Internet Files folder emptied: 33175 bytes

User: All Users

User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 33170 bytes

User: LocalService
->Temp folder emptied: 66016 bytes
->Temporary Internet Files folder emptied: 111903 bytes

User: NetworkService
->Temp folder emptied: 524594 bytes
->Temporary Internet Files folder emptied: 36244 bytes

User: Oblíbené položky

User: Plocha

User: tatka
->Temp folder emptied: 74614462 bytes
->Temporary Internet Files folder emptied: 5709501 bytes
->Java cache emptied: 52887328 bytes
->FireFox cache emptied: 208645456 bytes
->Google Chrome cache emptied: 6087067 bytes
->Flash cache emptied: 1360 bytes

%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 2504 bytes
%systemroot%\System32\dllcache .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 46051 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temp folder emptied: 110085854 bytes
%systemroot%\system32\config\systemprofile\Local Settings\Temporary Internet Files folder emptied: 45032 bytes
RecycleBin emptied: 20052153 bytes

Total Files Cleaned = 458,00 mb


[EMPTYFLASH]

User: Administrator

User: All Users

User: Default User

User: LocalService

User: NetworkService

User: Oblíbené položky

User: Plocha

User: tatka
->Flash cache emptied: 0 bytes

Total Flash Files Cleaned = 0,00 mb


[EMPTYJAVA]

User: Administrator

User: All Users

User: Default User

User: LocalService

User: NetworkService

User: Oblíbené položky

User: Plocha

User: tatka
->Java cache emptied: 0 bytes

Total Java Files Cleaned = 0,00 mb


OTL by OldTimer - Version 3.2.69.0 log created on 01102013_095828

Files\Folders moved on Reboot...

PendingFileRenameOperations files...

Registry entries deleted on Reboot...


Děkuji

Re: Prosím o kontrolu z Rsit

Napsal: 10 led 2013 14:00
od lubos3
Ještě bych doplnil , zkoušel jsem přeinstalovat IE , dal jsem mu default nastavení -Nástroje , možnosti Internetu - obnovit

vypnul jsem ochranu smart scren
při spuštění doplňku pro aktualizaci win vyskočí v ie prohllížeči
res://ieframe.dll/acr_depnx_error.htm#microsoft.com,http://www.update.microsoft.com/microso ... aspx?ln=cs

Aplikace Internet Explorer ukončila tuto webovou stánku za účelem ochrany počítače.

Děkuji

Re: Prosím o kontrolu z Rsit

Napsal: 10 led 2013 15:09
od vyosek
Tak jeste uklidime :James008:

:arrow: T-Cleaner http://vyosek.ic.cz/pro_usery/T-Cleaner.exe
  • Stahnete a spustte
  • Pro potvrzeni volby mackejte A, Enter
  • Po pouziti utilitu smazte
  • Antiviry touhou utilitu chybne oznacit jako vir - jedna se o falesny poplach - takze v pohode stahnete (pripadne vypnete pri stahovani antivir)
:arrow: OTC http://oldtimer.geekstogo.com/OTC.exe
  • Stahnete a spustte
  • Kliknete na CleanUp a potvrdte YES
  • Program uklidi a restartuje PC

:arrow: TFC http://oldtimer.geekstogo.com/TFC.exe
  • Stahnete a spustte
  • Kliknete na Start a potvrdte OK
  • Program uklidi a restartuje pc
  • Po pouziti utilitu smazte
:arrow: Stahnete Ccleaner http://forum.viry.cz/viewtopic.php?t=7478
Panel čistič
  • Vse nechte jak je, jen dejte Analyzovat a pote Spustit CCleaner
Panel registry
  • dejte Hledej problémy
  • nasledne Opravit problémy - zalohu registru doporucuji udelat, opravte vsechny problemy
  • postup opakujte dokud nebude bez problemu - vetsinou cca 3x
Panel nástroje
  • Zde muzete odinstalovat nepotrebne programy
CCleaner doporucuji pouzivat cca jednou za tyden

:arrow: S tim IE bych se asi obratil na technickou podporu microsfotu, IE je hodne provazany se samotnym systeme

Re: Prosím o kontrolu z Rsit

Napsal: 14 led 2013 11:14
od lubos3
Dobrý den
tak jsem udělal to co jste psal , dále jsem odinstaloval vše nepotřebné , použil ještě několik scanerů ad aware apod .
Momentálně mi již celkem funguje i win update . Byl i nějaký problém s Framework tak jsem odinstaloval staré nahral nové , mezití, se mi nahrály i aktualizace .
Momentálně registruji problém něco okolo Java a virtual machine . Když spustím přihlášení do banky tak mi píše , že
se mu nepodařilo spustit Java applet , i když přejdu na stránky java.com , dám si stáhnout a nainstalovat Virtual machine tak
po restartu prohlížeče jak Firefox tak IE opětovně hlásí .
Na netu jsme registroval , že upozorňují na díry v Javě .
Děkuji

Re: Prosím o kontrolu z Rsit

Napsal: 15 led 2013 17:19
od vyosek
:arrow: Problemy s Javou jsou jiz vyreseny - http://www.viry.cz/java-zaplatovat-nebo-vypnout/ http://www.bleepingcomputer.com/forums/topic481702.html

:arrow: A pokud nejsou problemy ci dotazy, je to z me strany vse :|

Re: Prosím o kontrolu z Rsit

Napsal: 16 led 2013 10:04
od lubos3
Dobrý den

Všechy antiviry se zastaví na C:\System Volume Information\MountPointManagerRemoteDatabase

Re: Prosím o kontrolu z Rsit

Napsal: 16 led 2013 10:09
od vyosek
:arrow: Havet se mozna usadila v bodech obnoveni - smazte je dle navodu kolegy riffa http://www.viry.cz/forum/viewtopic.php?f=11&t=47040

Re: Prosím o kontrolu z Rsit

Napsal: 16 led 2013 10:54
od lubos3
Dobrý den
to jsem zkoušel již několikrát , dokonce jsem zálohy bodu obnovení přesunul z C:\System Volume Information\
do jiného adesáře pro jistotu aby tam nabyly .

Snažil jsem se odisnatlovat co se dalo , aktualizovat co se dalo , nějaký nový log vložit , Hijackthis ? nebo jiný ?