usb kluce s divnymi subormi
Napsal: 03 úno 2015 17:36
dobry den.
na usb kluci sa vytvaraju divne subory s odkazmi a scriptami: tmpBC62.tmp.vbs.lnk State.lnk
toto je obsah toho prveho suboru:
L Ŕ Fá@ ) PŕOĐ ę:i˘Ř +00ť /C:\ R 1 Windows < ďľ * W i n d o w s V 1 system32 > ďľ * s y s t e m 3 2 R 2 cmd.exe < ďľ * c m d . e x e > / c s t a r t S t a t e . e x e & e x p l o r e r / r o o t , " % C D % t m p B C 6 2 . t m p . v b s " & e x i t C : \ W i n d o w s \ S y s t e m 3 2 \ W S c r i p t . e x e %SystemRoot%\System32\WScript.exe % S y s t e m R o o t % \ S y s t e m 3 2 \ W S c r i p t . e x e % Ő wNÁç]N·D.±®Q·Ő ™ Ť 1SPSâŠXFĽL8C»ü“&mÎq / S - 1 - 5 - 2 1 - 2 6 6 8 0 6 8 7 3 0 - 3 7 4 4 8 9 5 5 3 0 - 4 0 2 7 7 1 6 4 0 6 - 1 0 0 2
tu j log:
info.txt logfile of random's system information tool 1.10 2015-02-03 17:28:13
======MBR======
0x0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000BD3BC573000000000200EEFFFFFF01000000FFFFFFFF00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055AA
======Uninstall list======
-->MsiExec /X{8B922CF8-8A6C-41CE-A858-F1755D7F5D29}
7-Zip 9.20 (x64 edition)-->MsiExec.exe /I{23170F69-40C1-2702-0920-000001000000}
Adobe Shockwave Player 11.6-->"C:\windows\SysWOW64\Adobe\Shockwave 11\uninstaller.exe"
AuthenTec TrueAPI 64-bit-->MsiExec.exe /I{EBC0CC3F-B7A1-4FC8-8014-4C7BFD3925E8}
Bonjour-->MsiExec.exe /X{6E3610B2-430D-4EB0-81E3-2B57E8B9DE8D}
Cyberlink PhotoDirector-->"C:\Program Files (x86)\InstallShield Installation Information\{39337565-330E-4ab6-A9AE-AC81E0720B10}\Setup.exe" /z-uninstall
Cyberlink PhotoDirector-->"C:\Program Files (x86)\InstallShield Installation Information\{39337565-330E-4ab6-A9AE-AC81E0720B10}\Setup.exe" /z-uninstall
CyberLink PowerDirector 10-->"C:\Program Files (x86)\InstallShield Installation Information\{B0B4F6D2-F2AE-451A-9496-6F2F6A897B32}\setup.exe" /z-uninstall
CyberLink PowerDirector 10-->"C:\Program Files (x86)\InstallShield Installation Information\{B0B4F6D2-F2AE-451A-9496-6F2F6A897B32}\setup.exe" /z-uninstall
CyberLink YouCam-->"C:\Program Files (x86)\InstallShield Installation Information\{01FB4998-33C4-4431-85ED-079E3EEFE75D}\setup.exe" /z-uninstall
CyberLink YouCam-->"C:\Program Files (x86)\InstallShield Installation Information\{01FB4998-33C4-4431-85ED-079E3EEFE75D}\setup.exe" /z-uninstall
D3DX10-->MsiExec.exe /X{E09C4DB7-630C-4F06-A631-8EA7239923AF}
Energy Star-->MsiExec.exe /I{FC0ADA4D-8FA5-4452-8AFF-F0A0BAC97EF7}
Fotogalleriet-->MsiExec.exe /X{9F470E17-4FC3-4091-A508-D5347A16A2B9}
GIMP 2.8.14-->"C:\Program Files\GIMP 2\uninst\unins000.exe"
Google Chrome-->"C:\Program Files (x86)\Google\Chrome\Application\40.0.2214.93\Installer\setup.exe" --uninstall --multi-install --chrome --system-level
Google Update Helper-->MsiExec.exe /I{A92DAB39-4E2C-4304-9AB6-BC44E68B55E2}
Hewlett-Packard ACLM.NET v1.2.1.1-->MsiExec.exe /I{6F340107-F9AA-47C6-B54C-C3A19F11553F}
HF Designer 5.2-->"C:\Program Files (x86)\HF Designer\unins000.exe"
HP 3D DriveGuard-->MsiExec.exe /X{AE2F1669-5B1F-47C5-B639-78D74DD0BCE4}
HP Connected Music (Meridian - installer)-->"C:\Program Files (x86)\HPConnectedMusic\Uninstall.exe"
HP CoolSense-->MsiExec.exe /I{11AF9A96-6D83-4C3B-8DCB-16EA2A358E3F}
HP Customer Experience Enhancements-->MsiExec.exe /X{07FA4960-B038-49EB-891B-9F95930AA544}
HP Documentation-->MsiExec.exe /X{0FEE0C28-850D-4AC0-92E7-57D214134102}
HP Postscript Converter-->MsiExec.exe /I{6E14E6D6-3175-4E1A-B934-CAB5A86367CD}
HP Recovery Manager-->MsiExec.exe /I{1AE37508-089E-41AC-95BD-99FF06887C2F}
HP Registration Service-->MsiExec.exe /X{D1E8F2D7-7794-4245-B286-87ED86C1893C}
HP SimplePass-->MsiExec.exe /X{34C821CA-6B55-44A0-8A9B-2EF471D6019E}
HP Support Assistant-->"C:\Program Files (x86)\InstallShield Installation Information\{EE202411-2C26-49E8-9784-1BC1DBF7DE96}\setup.exe" -runfromtemp -l0x0409 -removeonly
HP System Event Utility-->MsiExec.exe /I{C27D60E4-3132-45A3-A71A-E3BD1DA3F794}
HP Utility Center-->MsiExec.exe /I{73237EBB-B26F-4628-8754-4EFE563D72E9}
HP Wireless Button Driver-->MsiExec.exe /X{941DE69D-6CEE-4171-8F1F-3D7E352AA498}
IDT Audio-->"C:\Program Files (x86)\InstallShield Installation Information\{E3A5A8AB-58F6-45FF-AFCB-C9AE18C05001}\Setup.exe" -remove -removeonly
Intel(R) Management Engine Components-->C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\Uninstall\setup.exe -uninstall
Intel(R) Processor Graphics-->C:\Program Files (x86)\Intel\Intel(R) Processor Graphics\Uninstall\setup.exe -uninstall
Intel(R) Rapid Storage Technology-->C:\ProgramData\Intel\Package Cache\{409CB30E-E457-4008-9B1A-ED1B9EA21140}\Setup.exe -uninstall
Intel(R) Rapid Storage Technology-->MsiExec.exe /I{9D859F0D-B405-4B1F-9084-13BBF5D3DB32}
Intel(R) SDK for OpenCL - CPU Only Runtime Package-->C:\Program Files (x86)\Intel\OpenCL SDK\3.0\Uninstall\setup.exe -uninstall
Intel(R) Smart Connect Technology 4.0 x64-->MsiExec.exe /X{DAAF1EAC-6667-43AB-829C-0F964430B106}
Intel® Trusted Connect Service Client-->MsiExec.exe /I{FA00A3CC-7440-4938-A271-F186F50DD40D}
Java 8 Update 25-->MsiExec.exe /I{26A24AE4-039D-4CA4-87B4-2F83218025F0}
Microsoft Office-->MsiExec.exe /X{90150000-0138-0409-0000-0000000FF1CE}
Microsoft SQL Server 2005 Compact Edition [ENU]-->MsiExec.exe /I{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}
Microsoft Visual C++ 2005 Redistributable-->MsiExec.exe /X{837b34e3-7c30-493c-8f6a-2b0f04e2912c}
Microsoft Visual C++ 2008 Redistributable - x64 9.0.21022-->MsiExec.exe /X{350AA351-21FA-3270-8B7A-835434E766AD}
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.4148-->MsiExec.exe /X{4B6C7001-C7D6-3710-913E-5BC23FCE91E6}
Microsoft Visual C++ 2008 Redistributable - x86 9.0.21022-->MsiExec.exe /X{FF66E9F6-83E7-3A3E-AF14-8DE9A809A6A4}
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17-->MsiExec.exe /X{9A25302D-30C0-39D9-BD6F-21E6EC160475}
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148-->MsiExec.exe /X{1F1C2DFC-2D24-3E06-BCB8-725134ADF989}
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729-->MsiExec.exe /X{6AFCA4E1-9B78-3640-8F72-A7BF33448200}
Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219-->MsiExec.exe /X{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219-->MsiExec.exe /X{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
Microsoft Visual C++ 2012 Redistributable (x64) - 11.0.50727-->"C:\ProgramData\Package Cache\{15134cb0-b767-4960-a911-f2d16ae54797}\vcredist_x64.exe" /uninstall
Microsoft Visual C++ 2012 x64 Additional Runtime - 11.0.50727-->MsiExec.exe /X{AC53FC8B-EE18-3F9C-9B59-60937D0B182C}
Microsoft Visual C++ 2012 x64 Minimum Runtime - 11.0.50727-->MsiExec.exe /X{A2CB1ACB-94A2-32BA-A15E-7D80319F7589}
Moj CEWE FOTOSVET-->"C:\Program Files (x86)\Fotolab\Moj CEWE FOTOSVET\uninstall.exe"
Movie Maker-->MsiExec.exe /X{306C7AEF-16C7-428D-93AA-99D4A4090243}
Movie Maker-->MsiExec.exe /X{7E63F102-A9E9-4F4C-8004-BC62974736BF}
Movie Maker-->MsiExec.exe /X{8E6E8CBB-8E58-493C-943F-4664F5F2FEDB}
Movie Maker-->MsiExec.exe /X{BAD4B8FA-4BDA-4A59-BE64-9741031680C7}
Movie Maker-->MsiExec.exe /X{ED6C77F9-4D7E-447C-9EC0-9A212D075535}
MSVCRT-->MsiExec.exe /I{8DD46C6A-0056-4FEC-B70A-28BB16A1F11F}
MSVCRT110_amd64-->MsiExec.exe /I{E9FA781F-3E80-4399-825A-AD3E11C28C77}
MSVCRT110-->MsiExec.exe /I{8E14DDC8-EA60-4E18-B3E3-1937104D5BDA}
NVIDIA Graphics Driver 311.41-->"C:\Windows\SysWOW64\RunDll32.EXE" "C:\Program Files\NVIDIA Corporation\Installer2\installer.{58684BDB-823D-4CC2-847E-2DA452320D29}\NVI2.DLL",UninstallPackage Display.Driver
NVIDIA PhysX System Software 9.12.1031-->"C:\Windows\SysWOW64\RunDll32.EXE" "C:\Program Files\NVIDIA Corporation\Installer2\installer.{58684BDB-823D-4CC2-847E-2DA452320D29}\NVI2.DLL",UninstallPackage Display.PhysX
NVIDIA PhysX-->MsiExec.exe /I{8B922CF8-8A6C-41CE-A858-F1755D7F5D29}
NVIDIA Update 1.11.3-->"C:\Windows\SysWOW64\RunDll32.EXE" "C:\Program Files\NVIDIA Corporation\Installer2\installer.{58684BDB-823D-4CC2-847E-2DA452320D29}\NVI2.DLL",UninstallPackage Display.Update
Photo Common-->MsiExec.exe /X{048C8498-C20B-4AF7-9978-7A79E567D74C}
Photo Common-->MsiExec.exe /X{49110532-D289-4BFF-807C-45B782E66A7C}
Photo Common-->MsiExec.exe /X{C7929038-EDFB-416D-A2C9-CC65416DA0DF}
Photo Common-->MsiExec.exe /X{EC33D375-5164-4374-9061-43F5C6073219}
Photo Gallery-->MsiExec.exe /X{30F99474-EBE3-4134-A02B-F6CD38CFE243}
Photo Gallery-->MsiExec.exe /X{63824BC0-B747-43F3-9863-1066D64AD919}
Photo Gallery-->MsiExec.exe /X{E0E0FB88-D570-463E-A98E-733B7B656867}
Ralink Bluetooth Stack64-->MsiExec.exe /X{25C4294E-DDA8-EE68-0E16-FA6BD9C8684B}
Ralink RT3290 802.11bgn Wi-Fi Adapter-->C:\Program Files (x86)\InstallShield Installation Information\{8FC4F1DD-F7FD-4766-804D-3C8FF1D309AF}\setup.exe -runfromtemp -l0x001d -removeonly
Realtek Ethernet Controller Driver-->C:\Program Files (x86)\InstallShield Installation Information\{8833FFB6-5B0C-4764-81AA-06DFEED9A476}\setup.exe -runfromtemp -removeonly
Realtek PCIE Card Reader-->"C:\Program Files (x86)\InstallShield Installation Information\{C9661090-C134-46E8-90B2-76D72355C2A6}\setup.exe" -runfromtemp -removeonly
swMSM-->MsiExec.exe /I{612C34C7-5E90-47D8-9B5C-0F717DD82726}
Synaptics Pointing Device Driver-->rundll32.exe "%ProgramFiles%\Synaptics\SynTP\SynISDLL.dll",standAloneUninstall
Total Commander 64-bit (Remove or Repair)-->C:\Program Files\totalcmd\tcunin64.exe
Validity WBF DDK-->MsiExec.exe /X{B80C52A3-7666-4068-A371-7867F51E68EB}
Valokuvavalikoima-->MsiExec.exe /X{C32F4F5A-C9FB-427C-9F6F-9DB157611FFF}
Windows Live Communications Platform-->MsiExec.exe /I{0454BB9A-2A7A-4214-BDFF-937F7A711A44}
Windows Live Essentials-->C:\Program Files (x86)\Windows Live\Installer\wlarp.exe
Windows Live Essentials-->MsiExec.exe /I{49F068F2-4323-417B-AFC8-1E43F479D46C}
Windows Live Essentials-->MsiExec.exe /I{6CEA775F-E70A-4D72-A3B4-1EB3A5AD4B5C}
Windows Live Essentials-->MsiExec.exe /I{F1CA7DAE-F998-499C-8CA5-FC58CA2416EC}
Windows Live Installer-->MsiExec.exe /I{C424CD5E-EA05-4D3E-B5DA-F9F149E1D3AC}
Windows Live Photo Common-->MsiExec.exe /X{C9B6EFD0-4F01-4BBA-8374-39AD99A3ED72}
Windows Live PIMT Platform-->MsiExec.exe /I{6A8DB215-7BCD-4377-B015-2E4541A3E7C6}
Windows Live SOXE Definitions-->MsiExec.exe /I{8A642ACD-CE3A-4A23-A8B1-A0F7EB12B214}
Windows Live SOXE-->MsiExec.exe /I{FE7C0B3D-50B9-4951-BE78-A321CBF86552}
Windows Live UX Platform Language Pack-->MsiExec.exe /I{0E1BB4B4-00FF-45B1-914B-AB8D8B9862B3}
Windows Live UX Platform Language Pack-->MsiExec.exe /I{88809C3E-8C92-4454-AEB7-B26166E3D6CD}
Windows Live UX Platform Language Pack-->MsiExec.exe /I{BA068968-594F-40BE-8EE8-99119123C991}
Windows Live UX Platform Language Pack-->MsiExec.exe /I{F21F0424-B2FF-40BF-A984-9E0D7FB4C97E}
Windows Live UX Platform-->MsiExec.exe /I{4CCBD1F4-CEEC-452A-9CB8-46564B501315}
Windows Liven peruspaketti-->MsiExec.exe /I{28B2947F-FC0B-4450-80E3-6DF698E824A6}
======System event log======
Computer Name: Pc
Event Code: 4291
Message: The network adapter with hardware address 80-56-F2-63-53-8D has indicated packet coalescing capability without indicating support for one or more prerequisite receive filter capabilities (IPv4 0x00000000).
Record Number: 1222
Source Name: Tcpip
Time Written: 20140908114523.745274-000
Event Type: Warning
User:
Computer Name: Pc
Event Code: 11
Message: Načítavajú sa vlastné knižnice dynamických prepojení pre všetky aplikácie. Správca systému by mal skontrolovať zoznam knižníc a zistiť, či patria dôveryhodným aplikáciám. Ďalšie informácie sa nachádzajú na lokalite http://support.microsoft.com/kb/197571.
Record Number: 1220
Source Name: Microsoft-Windows-Wininit
Time Written: 20140908114505.854384-000
Event Type: Warning
User: NT AUTHORITY\SYSTEM
Computer Name: Pc
Event Code: 264
Message: Viacdotykové zariadenie udalo nekonzistentné informácie o kontaktoch.
Record Number: 1217
Source Name: Win32k
Time Written: 20140908114454.276086-000
Event Type: Warning
User:
Computer Name: Pc
Event Code: 219
Message: The driver \Driver\WUDFRd failed to load for the device USB\VID_138A&PID_0050\241100206e1f.
Record Number: 1216
Source Name: Microsoft-Windows-Kernel-PnP
Time Written: 20140908114449.979127-000
Event Type: Warning
User: NT AUTHORITY\SYSTEM
Computer Name: Pc
Event Code: 41
Message: The system has rebooted without cleanly shutting down first. This error could be caused if the system stopped responding, crashed, or lost power unexpectedly.
Record Number: 1193
Source Name: Microsoft-Windows-Kernel-Power
Time Written: 20140908114440.182075-000
Event Type: Critical
User: NT AUTHORITY\SYSTEM
=====Application event log=====
Computer Name: Pc
Event Code: 100
Message: mDNSCoreReceiveResponse: Received from 192.168.0.222:5353 4 Pc.local. Addr 192.168.0.222
Record Number: 1059
Source Name: Bonjour Service
Time Written: 20140908114902.000000-000
Event Type: Error
User:
Computer Name: Pc
Event Code: 100
Message: Local Hostname Pc.local already in use; will try Pc-2.local instead
Record Number: 1031
Source Name: Bonjour Service
Time Written: 20140908114704.000000-000
Event Type: Error
User:
Computer Name: Pc
Event Code: 100
Message: mDNSCoreReceiveResponse: ProbeCount 2; will deregister 4 Pc.local. Addr 192.168.0.223
Record Number: 1030
Source Name: Bonjour Service
Time Written: 20140908114704.000000-000
Event Type: Error
User:
Computer Name: Pc
Event Code: 100
Message: mDNSCoreReceiveResponse: Received from 192.168.0.222:5353 4 Pc.local. Addr 192.168.0.222
Record Number: 1029
Source Name: Bonjour Service
Time Written: 20140908114704.000000-000
Event Type: Error
User:
Computer Name: WIN-SS9JPJKS1QQ
Event Code: 1530
Message: Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.
DETAIL -
18 user registry handles leaked from \Registry\User\S-1-5-21-2668068730-3744895530-4027716406-500:
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500
Process 784 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Microsoft\Windows\CurrentVersion\Uninstall
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Microsoft\SystemCertificates\CA
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Microsoft\SystemCertificates\Disallowed
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Microsoft\SystemCertificates\trust
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Microsoft\SystemCertificates\TrustedPeople
Process 784 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Microsoft\SystemCertificates\Root
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Policies\Microsoft\SystemCertificates
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Policies\Microsoft\SystemCertificates
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Policies\Microsoft\SystemCertificates
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Policies\Microsoft\SystemCertificates
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Microsoft\SystemCertificates\My
Record Number: 1011
Source Name: Microsoft-Windows-User Profiles Service
Time Written: 20140617073204.280411-000
Event Type: Warning
User: NT AUTHORITY\SYSTEM
=====Security event log=====
Computer Name: WIN-SS9JPJKS1QQ
Event Code: 4672
Message: Special privileges assigned to new logon.
Subject:
Security ID: S-1-5-18
Account Name: SYSTEM
Account Domain: NT instans
Logon ID: 0x3E7
Privileges: SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege
Record Number: 1479
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20140617073158.561659-000
Event Type: Audit Success
User:
Computer Name: WIN-SS9JPJKS1QQ
Event Code: 4624
Message: An account was successfully logged on.
Subject:
Security ID: S-1-5-18
Account Name: WIN-SS9JPJKS1QQ$
Account Domain: WORKGROUP
Logon ID: 0x3E7
Logon Type: 5
Impersonation Level: Impersonation
New Logon:
Security ID: S-1-5-18
Account Name: SYSTEM
Account Domain: NT instans
Logon ID: 0x3E7
Logon GUID: {00000000-0000-0000-0000-000000000000}
Process Information:
Process ID: 0x280
Process Name: C:\Windows\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: -
Source Port: -
Detailed Authentication Information:
Logon Process: Advapi
Authentication Package: Negotiate
Transited Services: -
Package Name (NTLM only): -
Key Length: 0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
Record Number: 1478
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20140617073158.561659-000
Event Type: Audit Success
User:
Computer Name: WIN-SS9JPJKS1QQ
Event Code: 1102
Message: The audit log was cleared.
Subject:
Security ID: S-1-5-21-2668068730-3744895530-4027716406-500
Account Name: Administrator
Domain Name: WIN-SS9JPJKS1QQ
Logon ID: 0x2F0ED
Record Number: 1477
Source Name: Microsoft-Windows-Eventlog
Time Written: 20140617073157.374147-000
Event Type: Audit Success
User:
Computer Name: WIN-SS9JPJKS1QQ
Event Code: 4672
Message: Special privileges assigned to new logon.
Subject:
Security ID: S-1-5-18
Account Name: SYSTEM
Account Domain: NT instans
Logon ID: 0x3E7
Privileges: SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege
Record Number: 1476
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20140617073156.342838-000
Event Type: Audit Success
User:
Computer Name: WIN-SS9JPJKS1QQ
Event Code: 4624
Message: An account was successfully logged on.
Subject:
Security ID: S-1-5-18
Account Name: WIN-SS9JPJKS1QQ$
Account Domain: WORKGROUP
Logon ID: 0x3E7
Logon Type: 5
Impersonation Level: Impersonation
New Logon:
Security ID: S-1-5-18
Account Name: SYSTEM
Account Domain: NT instans
Logon ID: 0x3E7
Logon GUID: {00000000-0000-0000-0000-000000000000}
Process Information:
Process ID: 0x280
Process Name: C:\Windows\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: -
Source Port: -
Detailed Authentication Information:
Logon Process: Advapi
Authentication Package: Negotiate
Transited Services: -
Package Name (NTLM only): -
Key Length: 0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
Record Number: 1475
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20140617073156.342838-000
Event Type: Audit Success
User:
======Environment variables======
"FP_NO_HOST_CHECK"=NO
"USERNAME"=SYSTEM
"Path"=C:\ProgramData\Oracle\Java\javapath;C:\Program Files (x86)\HP SimplePass\;C:\Program Files (x86)\Intel\iCLS Client\;C:\Program Files\Intel\iCLS Client\;C:\Program Files (x86)\NVIDIA Corporation\PhysX\Common;%SystemRoot%\system32;%SystemRoot%;%SystemRoot%\System32\Wbem;%SYSTEMROOT%\System32\WindowsPowerShell\v1.0\;C:\Program Files (x86)\Windows Live\Shared;C:\Program Files (x86)\Intel\OpenCL SDK\3.0\bin\x86;C:\Program Files (x86)\Intel\OpenCL SDK\3.0\bin\x64;C:\Program Files\Intel\Intel(R) Management Engine Components\DAL;C:\Program Files\Intel\Intel(R) Management Engine Components\IPT;C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL;C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IPT
"ComSpec"=%SystemRoot%\system32\cmd.exe
"TMP"=%SystemRoot%\TEMP
"OS"=Windows_NT
"windir"=%SystemRoot%
"PROCESSOR_ARCHITECTURE"=AMD64
"TEMP"=%SystemRoot%\TEMP
"PATHEXT"=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
"PSModulePath"=%SystemRoot%\system32\WindowsPowerShell\v1.0\Modules\
"NUMBER_OF_PROCESSORS"=8
"PROCESSOR_LEVEL"=6
"PROCESSOR_IDENTIFIER"=Intel64 Family 6 Model 60 Stepping 3, GenuineIntel
"PROCESSOR_REVISION"=3c03
"OnlineServices"=Online Services
"Platform"=MCD
"PCBRAND"=Pavilion
-----------------EOF-----------------
na usb kluci sa vytvaraju divne subory s odkazmi a scriptami: tmpBC62.tmp.vbs.lnk State.lnk
toto je obsah toho prveho suboru:
L Ŕ Fá@ ) PŕOĐ ę:i˘Ř +00ť /C:\ R 1 Windows < ďľ * W i n d o w s V 1 system32 > ďľ * s y s t e m 3 2 R 2 cmd.exe < ďľ * c m d . e x e > / c s t a r t S t a t e . e x e & e x p l o r e r / r o o t , " % C D % t m p B C 6 2 . t m p . v b s " & e x i t C : \ W i n d o w s \ S y s t e m 3 2 \ W S c r i p t . e x e %SystemRoot%\System32\WScript.exe % S y s t e m R o o t % \ S y s t e m 3 2 \ W S c r i p t . e x e % Ő wNÁç]N·D.±®Q·Ő ™ Ť 1SPSâŠXFĽL8C»ü“&mÎq / S - 1 - 5 - 2 1 - 2 6 6 8 0 6 8 7 3 0 - 3 7 4 4 8 9 5 5 3 0 - 4 0 2 7 7 1 6 4 0 6 - 1 0 0 2
tu j log:
info.txt logfile of random's system information tool 1.10 2015-02-03 17:28:13
======MBR======
0x0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000BD3BC573000000000200EEFFFFFF01000000FFFFFFFF00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055AA
======Uninstall list======
-->MsiExec /X{8B922CF8-8A6C-41CE-A858-F1755D7F5D29}
7-Zip 9.20 (x64 edition)-->MsiExec.exe /I{23170F69-40C1-2702-0920-000001000000}
Adobe Shockwave Player 11.6-->"C:\windows\SysWOW64\Adobe\Shockwave 11\uninstaller.exe"
AuthenTec TrueAPI 64-bit-->MsiExec.exe /I{EBC0CC3F-B7A1-4FC8-8014-4C7BFD3925E8}
Bonjour-->MsiExec.exe /X{6E3610B2-430D-4EB0-81E3-2B57E8B9DE8D}
Cyberlink PhotoDirector-->"C:\Program Files (x86)\InstallShield Installation Information\{39337565-330E-4ab6-A9AE-AC81E0720B10}\Setup.exe" /z-uninstall
Cyberlink PhotoDirector-->"C:\Program Files (x86)\InstallShield Installation Information\{39337565-330E-4ab6-A9AE-AC81E0720B10}\Setup.exe" /z-uninstall
CyberLink PowerDirector 10-->"C:\Program Files (x86)\InstallShield Installation Information\{B0B4F6D2-F2AE-451A-9496-6F2F6A897B32}\setup.exe" /z-uninstall
CyberLink PowerDirector 10-->"C:\Program Files (x86)\InstallShield Installation Information\{B0B4F6D2-F2AE-451A-9496-6F2F6A897B32}\setup.exe" /z-uninstall
CyberLink YouCam-->"C:\Program Files (x86)\InstallShield Installation Information\{01FB4998-33C4-4431-85ED-079E3EEFE75D}\setup.exe" /z-uninstall
CyberLink YouCam-->"C:\Program Files (x86)\InstallShield Installation Information\{01FB4998-33C4-4431-85ED-079E3EEFE75D}\setup.exe" /z-uninstall
D3DX10-->MsiExec.exe /X{E09C4DB7-630C-4F06-A631-8EA7239923AF}
Energy Star-->MsiExec.exe /I{FC0ADA4D-8FA5-4452-8AFF-F0A0BAC97EF7}
Fotogalleriet-->MsiExec.exe /X{9F470E17-4FC3-4091-A508-D5347A16A2B9}
GIMP 2.8.14-->"C:\Program Files\GIMP 2\uninst\unins000.exe"
Google Chrome-->"C:\Program Files (x86)\Google\Chrome\Application\40.0.2214.93\Installer\setup.exe" --uninstall --multi-install --chrome --system-level
Google Update Helper-->MsiExec.exe /I{A92DAB39-4E2C-4304-9AB6-BC44E68B55E2}
Hewlett-Packard ACLM.NET v1.2.1.1-->MsiExec.exe /I{6F340107-F9AA-47C6-B54C-C3A19F11553F}
HF Designer 5.2-->"C:\Program Files (x86)\HF Designer\unins000.exe"
HP 3D DriveGuard-->MsiExec.exe /X{AE2F1669-5B1F-47C5-B639-78D74DD0BCE4}
HP Connected Music (Meridian - installer)-->"C:\Program Files (x86)\HPConnectedMusic\Uninstall.exe"
HP CoolSense-->MsiExec.exe /I{11AF9A96-6D83-4C3B-8DCB-16EA2A358E3F}
HP Customer Experience Enhancements-->MsiExec.exe /X{07FA4960-B038-49EB-891B-9F95930AA544}
HP Documentation-->MsiExec.exe /X{0FEE0C28-850D-4AC0-92E7-57D214134102}
HP Postscript Converter-->MsiExec.exe /I{6E14E6D6-3175-4E1A-B934-CAB5A86367CD}
HP Recovery Manager-->MsiExec.exe /I{1AE37508-089E-41AC-95BD-99FF06887C2F}
HP Registration Service-->MsiExec.exe /X{D1E8F2D7-7794-4245-B286-87ED86C1893C}
HP SimplePass-->MsiExec.exe /X{34C821CA-6B55-44A0-8A9B-2EF471D6019E}
HP Support Assistant-->"C:\Program Files (x86)\InstallShield Installation Information\{EE202411-2C26-49E8-9784-1BC1DBF7DE96}\setup.exe" -runfromtemp -l0x0409 -removeonly
HP System Event Utility-->MsiExec.exe /I{C27D60E4-3132-45A3-A71A-E3BD1DA3F794}
HP Utility Center-->MsiExec.exe /I{73237EBB-B26F-4628-8754-4EFE563D72E9}
HP Wireless Button Driver-->MsiExec.exe /X{941DE69D-6CEE-4171-8F1F-3D7E352AA498}
IDT Audio-->"C:\Program Files (x86)\InstallShield Installation Information\{E3A5A8AB-58F6-45FF-AFCB-C9AE18C05001}\Setup.exe" -remove -removeonly
Intel(R) Management Engine Components-->C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\Uninstall\setup.exe -uninstall
Intel(R) Processor Graphics-->C:\Program Files (x86)\Intel\Intel(R) Processor Graphics\Uninstall\setup.exe -uninstall
Intel(R) Rapid Storage Technology-->C:\ProgramData\Intel\Package Cache\{409CB30E-E457-4008-9B1A-ED1B9EA21140}\Setup.exe -uninstall
Intel(R) Rapid Storage Technology-->MsiExec.exe /I{9D859F0D-B405-4B1F-9084-13BBF5D3DB32}
Intel(R) SDK for OpenCL - CPU Only Runtime Package-->C:\Program Files (x86)\Intel\OpenCL SDK\3.0\Uninstall\setup.exe -uninstall
Intel(R) Smart Connect Technology 4.0 x64-->MsiExec.exe /X{DAAF1EAC-6667-43AB-829C-0F964430B106}
Intel® Trusted Connect Service Client-->MsiExec.exe /I{FA00A3CC-7440-4938-A271-F186F50DD40D}
Java 8 Update 25-->MsiExec.exe /I{26A24AE4-039D-4CA4-87B4-2F83218025F0}
Microsoft Office-->MsiExec.exe /X{90150000-0138-0409-0000-0000000FF1CE}
Microsoft SQL Server 2005 Compact Edition [ENU]-->MsiExec.exe /I{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}
Microsoft Visual C++ 2005 Redistributable-->MsiExec.exe /X{837b34e3-7c30-493c-8f6a-2b0f04e2912c}
Microsoft Visual C++ 2008 Redistributable - x64 9.0.21022-->MsiExec.exe /X{350AA351-21FA-3270-8B7A-835434E766AD}
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.4148-->MsiExec.exe /X{4B6C7001-C7D6-3710-913E-5BC23FCE91E6}
Microsoft Visual C++ 2008 Redistributable - x86 9.0.21022-->MsiExec.exe /X{FF66E9F6-83E7-3A3E-AF14-8DE9A809A6A4}
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17-->MsiExec.exe /X{9A25302D-30C0-39D9-BD6F-21E6EC160475}
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148-->MsiExec.exe /X{1F1C2DFC-2D24-3E06-BCB8-725134ADF989}
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729-->MsiExec.exe /X{6AFCA4E1-9B78-3640-8F72-A7BF33448200}
Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219-->MsiExec.exe /X{1D8E6291-B0D5-35EC-8441-6616F567A0F7}
Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219-->MsiExec.exe /X{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}
Microsoft Visual C++ 2012 Redistributable (x64) - 11.0.50727-->"C:\ProgramData\Package Cache\{15134cb0-b767-4960-a911-f2d16ae54797}\vcredist_x64.exe" /uninstall
Microsoft Visual C++ 2012 x64 Additional Runtime - 11.0.50727-->MsiExec.exe /X{AC53FC8B-EE18-3F9C-9B59-60937D0B182C}
Microsoft Visual C++ 2012 x64 Minimum Runtime - 11.0.50727-->MsiExec.exe /X{A2CB1ACB-94A2-32BA-A15E-7D80319F7589}
Moj CEWE FOTOSVET-->"C:\Program Files (x86)\Fotolab\Moj CEWE FOTOSVET\uninstall.exe"
Movie Maker-->MsiExec.exe /X{306C7AEF-16C7-428D-93AA-99D4A4090243}
Movie Maker-->MsiExec.exe /X{7E63F102-A9E9-4F4C-8004-BC62974736BF}
Movie Maker-->MsiExec.exe /X{8E6E8CBB-8E58-493C-943F-4664F5F2FEDB}
Movie Maker-->MsiExec.exe /X{BAD4B8FA-4BDA-4A59-BE64-9741031680C7}
Movie Maker-->MsiExec.exe /X{ED6C77F9-4D7E-447C-9EC0-9A212D075535}
MSVCRT-->MsiExec.exe /I{8DD46C6A-0056-4FEC-B70A-28BB16A1F11F}
MSVCRT110_amd64-->MsiExec.exe /I{E9FA781F-3E80-4399-825A-AD3E11C28C77}
MSVCRT110-->MsiExec.exe /I{8E14DDC8-EA60-4E18-B3E3-1937104D5BDA}
NVIDIA Graphics Driver 311.41-->"C:\Windows\SysWOW64\RunDll32.EXE" "C:\Program Files\NVIDIA Corporation\Installer2\installer.{58684BDB-823D-4CC2-847E-2DA452320D29}\NVI2.DLL",UninstallPackage Display.Driver
NVIDIA PhysX System Software 9.12.1031-->"C:\Windows\SysWOW64\RunDll32.EXE" "C:\Program Files\NVIDIA Corporation\Installer2\installer.{58684BDB-823D-4CC2-847E-2DA452320D29}\NVI2.DLL",UninstallPackage Display.PhysX
NVIDIA PhysX-->MsiExec.exe /I{8B922CF8-8A6C-41CE-A858-F1755D7F5D29}
NVIDIA Update 1.11.3-->"C:\Windows\SysWOW64\RunDll32.EXE" "C:\Program Files\NVIDIA Corporation\Installer2\installer.{58684BDB-823D-4CC2-847E-2DA452320D29}\NVI2.DLL",UninstallPackage Display.Update
Photo Common-->MsiExec.exe /X{048C8498-C20B-4AF7-9978-7A79E567D74C}
Photo Common-->MsiExec.exe /X{49110532-D289-4BFF-807C-45B782E66A7C}
Photo Common-->MsiExec.exe /X{C7929038-EDFB-416D-A2C9-CC65416DA0DF}
Photo Common-->MsiExec.exe /X{EC33D375-5164-4374-9061-43F5C6073219}
Photo Gallery-->MsiExec.exe /X{30F99474-EBE3-4134-A02B-F6CD38CFE243}
Photo Gallery-->MsiExec.exe /X{63824BC0-B747-43F3-9863-1066D64AD919}
Photo Gallery-->MsiExec.exe /X{E0E0FB88-D570-463E-A98E-733B7B656867}
Ralink Bluetooth Stack64-->MsiExec.exe /X{25C4294E-DDA8-EE68-0E16-FA6BD9C8684B}
Ralink RT3290 802.11bgn Wi-Fi Adapter-->C:\Program Files (x86)\InstallShield Installation Information\{8FC4F1DD-F7FD-4766-804D-3C8FF1D309AF}\setup.exe -runfromtemp -l0x001d -removeonly
Realtek Ethernet Controller Driver-->C:\Program Files (x86)\InstallShield Installation Information\{8833FFB6-5B0C-4764-81AA-06DFEED9A476}\setup.exe -runfromtemp -removeonly
Realtek PCIE Card Reader-->"C:\Program Files (x86)\InstallShield Installation Information\{C9661090-C134-46E8-90B2-76D72355C2A6}\setup.exe" -runfromtemp -removeonly
swMSM-->MsiExec.exe /I{612C34C7-5E90-47D8-9B5C-0F717DD82726}
Synaptics Pointing Device Driver-->rundll32.exe "%ProgramFiles%\Synaptics\SynTP\SynISDLL.dll",standAloneUninstall
Total Commander 64-bit (Remove or Repair)-->C:\Program Files\totalcmd\tcunin64.exe
Validity WBF DDK-->MsiExec.exe /X{B80C52A3-7666-4068-A371-7867F51E68EB}
Valokuvavalikoima-->MsiExec.exe /X{C32F4F5A-C9FB-427C-9F6F-9DB157611FFF}
Windows Live Communications Platform-->MsiExec.exe /I{0454BB9A-2A7A-4214-BDFF-937F7A711A44}
Windows Live Essentials-->C:\Program Files (x86)\Windows Live\Installer\wlarp.exe
Windows Live Essentials-->MsiExec.exe /I{49F068F2-4323-417B-AFC8-1E43F479D46C}
Windows Live Essentials-->MsiExec.exe /I{6CEA775F-E70A-4D72-A3B4-1EB3A5AD4B5C}
Windows Live Essentials-->MsiExec.exe /I{F1CA7DAE-F998-499C-8CA5-FC58CA2416EC}
Windows Live Installer-->MsiExec.exe /I{C424CD5E-EA05-4D3E-B5DA-F9F149E1D3AC}
Windows Live Photo Common-->MsiExec.exe /X{C9B6EFD0-4F01-4BBA-8374-39AD99A3ED72}
Windows Live PIMT Platform-->MsiExec.exe /I{6A8DB215-7BCD-4377-B015-2E4541A3E7C6}
Windows Live SOXE Definitions-->MsiExec.exe /I{8A642ACD-CE3A-4A23-A8B1-A0F7EB12B214}
Windows Live SOXE-->MsiExec.exe /I{FE7C0B3D-50B9-4951-BE78-A321CBF86552}
Windows Live UX Platform Language Pack-->MsiExec.exe /I{0E1BB4B4-00FF-45B1-914B-AB8D8B9862B3}
Windows Live UX Platform Language Pack-->MsiExec.exe /I{88809C3E-8C92-4454-AEB7-B26166E3D6CD}
Windows Live UX Platform Language Pack-->MsiExec.exe /I{BA068968-594F-40BE-8EE8-99119123C991}
Windows Live UX Platform Language Pack-->MsiExec.exe /I{F21F0424-B2FF-40BF-A984-9E0D7FB4C97E}
Windows Live UX Platform-->MsiExec.exe /I{4CCBD1F4-CEEC-452A-9CB8-46564B501315}
Windows Liven peruspaketti-->MsiExec.exe /I{28B2947F-FC0B-4450-80E3-6DF698E824A6}
======System event log======
Computer Name: Pc
Event Code: 4291
Message: The network adapter with hardware address 80-56-F2-63-53-8D has indicated packet coalescing capability without indicating support for one or more prerequisite receive filter capabilities (IPv4 0x00000000).
Record Number: 1222
Source Name: Tcpip
Time Written: 20140908114523.745274-000
Event Type: Warning
User:
Computer Name: Pc
Event Code: 11
Message: Načítavajú sa vlastné knižnice dynamických prepojení pre všetky aplikácie. Správca systému by mal skontrolovať zoznam knižníc a zistiť, či patria dôveryhodným aplikáciám. Ďalšie informácie sa nachádzajú na lokalite http://support.microsoft.com/kb/197571.
Record Number: 1220
Source Name: Microsoft-Windows-Wininit
Time Written: 20140908114505.854384-000
Event Type: Warning
User: NT AUTHORITY\SYSTEM
Computer Name: Pc
Event Code: 264
Message: Viacdotykové zariadenie udalo nekonzistentné informácie o kontaktoch.
Record Number: 1217
Source Name: Win32k
Time Written: 20140908114454.276086-000
Event Type: Warning
User:
Computer Name: Pc
Event Code: 219
Message: The driver \Driver\WUDFRd failed to load for the device USB\VID_138A&PID_0050\241100206e1f.
Record Number: 1216
Source Name: Microsoft-Windows-Kernel-PnP
Time Written: 20140908114449.979127-000
Event Type: Warning
User: NT AUTHORITY\SYSTEM
Computer Name: Pc
Event Code: 41
Message: The system has rebooted without cleanly shutting down first. This error could be caused if the system stopped responding, crashed, or lost power unexpectedly.
Record Number: 1193
Source Name: Microsoft-Windows-Kernel-Power
Time Written: 20140908114440.182075-000
Event Type: Critical
User: NT AUTHORITY\SYSTEM
=====Application event log=====
Computer Name: Pc
Event Code: 100
Message: mDNSCoreReceiveResponse: Received from 192.168.0.222:5353 4 Pc.local. Addr 192.168.0.222
Record Number: 1059
Source Name: Bonjour Service
Time Written: 20140908114902.000000-000
Event Type: Error
User:
Computer Name: Pc
Event Code: 100
Message: Local Hostname Pc.local already in use; will try Pc-2.local instead
Record Number: 1031
Source Name: Bonjour Service
Time Written: 20140908114704.000000-000
Event Type: Error
User:
Computer Name: Pc
Event Code: 100
Message: mDNSCoreReceiveResponse: ProbeCount 2; will deregister 4 Pc.local. Addr 192.168.0.223
Record Number: 1030
Source Name: Bonjour Service
Time Written: 20140908114704.000000-000
Event Type: Error
User:
Computer Name: Pc
Event Code: 100
Message: mDNSCoreReceiveResponse: Received from 192.168.0.222:5353 4 Pc.local. Addr 192.168.0.222
Record Number: 1029
Source Name: Bonjour Service
Time Written: 20140908114704.000000-000
Event Type: Error
User:
Computer Name: WIN-SS9JPJKS1QQ
Event Code: 1530
Message: Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.
DETAIL -
18 user registry handles leaked from \Registry\User\S-1-5-21-2668068730-3744895530-4027716406-500:
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500
Process 784 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Microsoft\Windows\CurrentVersion\Uninstall
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Microsoft\SystemCertificates\CA
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Microsoft\SystemCertificates\Disallowed
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Microsoft\SystemCertificates\trust
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Microsoft\SystemCertificates\TrustedPeople
Process 784 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Microsoft\SystemCertificates\Root
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Microsoft\SystemCertificates\SmartCardRoot
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Policies\Microsoft\SystemCertificates
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Policies\Microsoft\SystemCertificates
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Policies\Microsoft\SystemCertificates
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Policies\Microsoft\SystemCertificates
Process 652 (\Device\HarddiskVolume4\Windows\System32\svchost.exe) has opened key \REGISTRY\USER\S-1-5-21-2668068730-3744895530-4027716406-500\Software\Microsoft\SystemCertificates\My
Record Number: 1011
Source Name: Microsoft-Windows-User Profiles Service
Time Written: 20140617073204.280411-000
Event Type: Warning
User: NT AUTHORITY\SYSTEM
=====Security event log=====
Computer Name: WIN-SS9JPJKS1QQ
Event Code: 4672
Message: Special privileges assigned to new logon.
Subject:
Security ID: S-1-5-18
Account Name: SYSTEM
Account Domain: NT instans
Logon ID: 0x3E7
Privileges: SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege
Record Number: 1479
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20140617073158.561659-000
Event Type: Audit Success
User:
Computer Name: WIN-SS9JPJKS1QQ
Event Code: 4624
Message: An account was successfully logged on.
Subject:
Security ID: S-1-5-18
Account Name: WIN-SS9JPJKS1QQ$
Account Domain: WORKGROUP
Logon ID: 0x3E7
Logon Type: 5
Impersonation Level: Impersonation
New Logon:
Security ID: S-1-5-18
Account Name: SYSTEM
Account Domain: NT instans
Logon ID: 0x3E7
Logon GUID: {00000000-0000-0000-0000-000000000000}
Process Information:
Process ID: 0x280
Process Name: C:\Windows\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: -
Source Port: -
Detailed Authentication Information:
Logon Process: Advapi
Authentication Package: Negotiate
Transited Services: -
Package Name (NTLM only): -
Key Length: 0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
Record Number: 1478
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20140617073158.561659-000
Event Type: Audit Success
User:
Computer Name: WIN-SS9JPJKS1QQ
Event Code: 1102
Message: The audit log was cleared.
Subject:
Security ID: S-1-5-21-2668068730-3744895530-4027716406-500
Account Name: Administrator
Domain Name: WIN-SS9JPJKS1QQ
Logon ID: 0x2F0ED
Record Number: 1477
Source Name: Microsoft-Windows-Eventlog
Time Written: 20140617073157.374147-000
Event Type: Audit Success
User:
Computer Name: WIN-SS9JPJKS1QQ
Event Code: 4672
Message: Special privileges assigned to new logon.
Subject:
Security ID: S-1-5-18
Account Name: SYSTEM
Account Domain: NT instans
Logon ID: 0x3E7
Privileges: SeAssignPrimaryTokenPrivilege
SeTcbPrivilege
SeSecurityPrivilege
SeTakeOwnershipPrivilege
SeLoadDriverPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeDebugPrivilege
SeAuditPrivilege
SeSystemEnvironmentPrivilege
SeImpersonatePrivilege
Record Number: 1476
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20140617073156.342838-000
Event Type: Audit Success
User:
Computer Name: WIN-SS9JPJKS1QQ
Event Code: 4624
Message: An account was successfully logged on.
Subject:
Security ID: S-1-5-18
Account Name: WIN-SS9JPJKS1QQ$
Account Domain: WORKGROUP
Logon ID: 0x3E7
Logon Type: 5
Impersonation Level: Impersonation
New Logon:
Security ID: S-1-5-18
Account Name: SYSTEM
Account Domain: NT instans
Logon ID: 0x3E7
Logon GUID: {00000000-0000-0000-0000-000000000000}
Process Information:
Process ID: 0x280
Process Name: C:\Windows\System32\services.exe
Network Information:
Workstation Name:
Source Network Address: -
Source Port: -
Detailed Authentication Information:
Logon Process: Advapi
Authentication Package: Negotiate
Transited Services: -
Package Name (NTLM only): -
Key Length: 0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
Record Number: 1475
Source Name: Microsoft-Windows-Security-Auditing
Time Written: 20140617073156.342838-000
Event Type: Audit Success
User:
======Environment variables======
"FP_NO_HOST_CHECK"=NO
"USERNAME"=SYSTEM
"Path"=C:\ProgramData\Oracle\Java\javapath;C:\Program Files (x86)\HP SimplePass\;C:\Program Files (x86)\Intel\iCLS Client\;C:\Program Files\Intel\iCLS Client\;C:\Program Files (x86)\NVIDIA Corporation\PhysX\Common;%SystemRoot%\system32;%SystemRoot%;%SystemRoot%\System32\Wbem;%SYSTEMROOT%\System32\WindowsPowerShell\v1.0\;C:\Program Files (x86)\Windows Live\Shared;C:\Program Files (x86)\Intel\OpenCL SDK\3.0\bin\x86;C:\Program Files (x86)\Intel\OpenCL SDK\3.0\bin\x64;C:\Program Files\Intel\Intel(R) Management Engine Components\DAL;C:\Program Files\Intel\Intel(R) Management Engine Components\IPT;C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL;C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IPT
"ComSpec"=%SystemRoot%\system32\cmd.exe
"TMP"=%SystemRoot%\TEMP
"OS"=Windows_NT
"windir"=%SystemRoot%
"PROCESSOR_ARCHITECTURE"=AMD64
"TEMP"=%SystemRoot%\TEMP
"PATHEXT"=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
"PSModulePath"=%SystemRoot%\system32\WindowsPowerShell\v1.0\Modules\
"NUMBER_OF_PROCESSORS"=8
"PROCESSOR_LEVEL"=6
"PROCESSOR_IDENTIFIER"=Intel64 Family 6 Model 60 Stepping 3, GenuineIntel
"PROCESSOR_REVISION"=3c03
"OnlineServices"=Online Services
"Platform"=MCD
"PCBRAND"=Pavilion
-----------------EOF-----------------