Prosím o kontrolu - PC kolegyně - Outlook odeslal 20000 zpr
Napsal: 02 lis 2015 14:36
Dobrý den,
prosím o kontrolu logu PC kolegyně. Včera a dnes jí MS Outlook odeslal sám cca 20.000 e-mailů na úplně cizí neznámé adresy.
přikládám logy co již jsem udělal:
1. MBAM
Malwarebytes Anti-Malware
www.malwarebytes.org
Scan Date: 2. 11. 2015
Scan Time: 11:08
Logfile: MBAM.txt
Administrator: Yes
Version: 2.2.0.1024
Malware Database: v2015.09.22.05
Rootkit Database: v2015.09.18.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled
OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Richard
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 415296
Time Elapsed: 15 min, 18 sec
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
Processes: 0
(No malicious items detected)
Modules: 0
(No malicious items detected)
Registry Keys: 34
PUP.Optional.DefaultTab, HKLM\SOFTWARE\CLASSES\APPID\{72D89EBF-0C5D-4190-91FD-398E45F1D007}, Quarantined, [866773bf93f8ce68946cbb2bce34e020],
PUP.Optional.DefaultTab, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\{72D89EBF-0C5D-4190-91FD-398E45F1D007}, Quarantined, [866773bf93f8ce68946cbb2bce34e020],
PUP.Optional.DefaultTab, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\{72D89EBF-0C5D-4190-91FD-398E45F1D007}, Quarantined, [866773bf93f8ce68946cbb2bce34e020],
PUP.Optional.MixiDJToolbar, HKLM\SOFTWARE\CLASSES\APPID\{A2773ED4-83BD-488A-A186-73590706C916}, Quarantined, [539a0b272863c76fdd1b8c5d897923dd],
PUP.Optional.MixiDJToolbar, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\{A2773ED4-83BD-488A-A186-73590706C916}, Quarantined, [539a0b272863c76fdd1b8c5d897923dd],
PUP.Optional.MixiDJToolbar, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\{A2773ED4-83BD-488A-A186-73590706C916}, Quarantined, [539a0b272863c76fdd1b8c5d897923dd],
PUP.Optional.Delta.ShrtCln, HKLM\SOFTWARE\CLASSES\APPID\{C26644C4-2A12-4CA6-8F2E-0EDE6CF018F3}, Quarantined, [1ad3c56d1b708caa01b96080e51d8878],
PUP.Optional.Delta.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\{C26644C4-2A12-4CA6-8F2E-0EDE6CF018F3}, Quarantined, [1ad3c56d1b708caa01b96080e51d8878],
PUP.Optional.Delta.ShrtCln, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\{C26644C4-2A12-4CA6-8F2E-0EDE6CF018F3}, Quarantined, [1ad3c56d1b708caa01b96080e51d8878],
PUP.Optional.OutBrowse, HKLM\SOFTWARE\CLASSES\TYPELIB\{DCABB943-792E-44C4-9029-ECBEE6265AF9}, Quarantined, [e10c3200bad187af1f54e7c7ad557888],
PUP.Optional.OutBrowse, HKLM\SOFTWARE\CLASSES\INTERFACE\{3408AC0D-510E-4808-8F7B-6B70B1F88534}, Quarantined, [e10c3200bad187af1f54e7c7ad557888],
PUP.Optional.OutBrowse, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{3408AC0D-510E-4808-8F7B-6B70B1F88534}, Quarantined, [e10c3200bad187af1f54e7c7ad557888],
PUP.Optional.OutBrowse, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{3408AC0D-510E-4808-8F7B-6B70B1F88534}, Quarantined, [e10c3200bad187af1f54e7c7ad557888],
PUP.Optional.OutBrowse, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{DCABB943-792E-44C4-9029-ECBEE6265AF9}, Quarantined, [e10c3200bad187af1f54e7c7ad557888],
PUP.Optional.OutBrowse, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{DCABB943-792E-44C4-9029-ECBEE6265AF9}, Quarantined, [e10c3200bad187af1f54e7c7ad557888],
PUP.Optional.Babylon, HKU\S-1-5-21-2697576798-3047597159-1036163815-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9}, Quarantined, [db125fd34f3c989e761f8d57a35f54ac],
PUP.Optional.Babylon, HKU\S-1-5-21-2697576798-3047597159-1036163815-1005\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0ECDF796-C2DC-4D79-A620-CCE0C0A66CC9}, Quarantined, [db125fd34f3c989e761f8d57a35f54ac],
PUP.Optional.DefaultTab, HKU\S-1-5-21-2697576798-3047597159-1036163815-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{7F6AFBF1-E065-4627-A2FD-810366367D01}, Quarantined, [ba3360d296f586b03ac76c7ab052c13f],
PUP.Optional.DefaultTab, HKU\S-1-5-21-2697576798-3047597159-1036163815-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{7F6AFBF1-E065-4627-A2FD-810366367D01}, Quarantined, [ba3360d296f586b03ac76c7ab052c13f],
PUP.Optional.Iminent, HKU\S-1-5-21-2697576798-3047597159-1036163815-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{84FF7BD6-B47F-46F8-9130-01B2696B36CB}, Quarantined, [f5f888aa08830c2afe21509748ba7c84],
PUP.Optional.Iminent, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{84FF7BD6-B47F-46F8-9130-01B2696B36CB}, Quarantined, [f5f888aa08830c2afe21509748ba7c84],
PUP.Optional.Iminent, HKU\S-1-5-21-2697576798-3047597159-1036163815-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{84FF7BD6-B47F-46F8-9130-01B2696B36CB}, Quarantined, [f5f888aa08830c2afe21509748ba7c84],
PUP.Optional.DefaultTab, HKU\S-1-5-21-2697576798-3047597159-1036163815-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{A1E28287-1A31-4B0F-8D05-AA8C465D3C5A}, Quarantined, [a7461022cebd2115c14106e01de512ee],
PUP.Optional.DefaultTab, HKU\S-1-5-21-2697576798-3047597159-1036163815-1005\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{A1E28287-1A31-4B0F-8D05-AA8C465D3C5A}, Quarantined, [a7461022cebd2115c14106e01de512ee],
PUP.Optional.Iminent, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{68B81CCD-A80C-4060-8947-5AE69ED01199}, Quarantined, [6c8134feadde75c134ea9b4c3cc6936d],
PUP.Optional.Iminent, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{E6B969FB-6D33-48d2-9061-8BBD4899EB08}, Quarantined, [19d42b07d8b3fe386fb452956f93e11f],
PUP.Optional.WebCake, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{C4ED781C-7394-4906-AAFF-D6AB64FF7C38}, Quarantined, [c627052dcac150e664bc42851aea56aa],
PUP.Optional.PCKeeper, HKLM\SOFTWARE\KROMTECH\PCKeeper, Quarantined, [6687a1915b30db5b79b7268b5ca89e62],
PUP.Optional.Iminent, HKLM\SOFTWARE\WOW6432NODE\Iminent, Quarantined, [509d29097a11eb4b7af4c9d92fd5da26],
PUP.Optional.WebCake, HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\fjoijdanhaiflhibkljeklcghcmmfffh, Quarantined, [ac415ad82b606cca55d47354ab599c64],
PUP.Optional.APNToolBar.Gen, HKU\S-1-5-18\SOFTWARE\AskPartnerNetwork, Quarantined, [35b82909296246f0008b1e151ee5b34d],
PUP.Optional.DefaultTab, HKU\S-1-5-18\SOFTWARE\Default tab, Quarantined, [688586acf497b97d17530a8c64a02cd4],
PUP.Optional.DefaultTab, HKU\S-1-5-18\SOFTWARE\DefaultTab, Quarantined, [e40920128b00c96d1556fb9b62a241bf],
PUP.Optional.DefaultTab, HKU\S-1-5-18\SOFTWARE\APPDATALOW\SOFTWARE\DefaultTab, Quarantined, [ac41d75be5a6ab8b93d6dfb78a7ad32d],
Registry Values: 4
PUP.Optional.Iminent, HKU\S-1-5-21-2697576798-3047597159-1036163815-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\URLSEARCHHOOKS|{84FF7BD6-B47F-46F8-9130-01B2696B36CB}, Quarantined, [f5f888aa08830c2afe21509748ba7c84],
PUP.Optional.Iminent, HKU\S-1-5-21-2697576798-3047597159-1036163815-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\URLSEARCHHOOKS\{84FF7BD6-B47F-46F8-9130-01B2696B36CB}, Quarantined, [30bdc46eb2d948ee9c83a542e0226d93],
PUP.Optional.Delta.ShrtCln, HKU\S-1-5-21-2697576798-3047597159-1036163815-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9}|URL, http://mixidj.delta-search.com/?q={sear ... 6&tsp=4949, Quarantined, [6e7f1e14e8a390a6b94a3e3b3cc80cf4]
PUP.Optional.Delta.ShrtCln, HKU\S-1-5-21-2697576798-3047597159-1036163815-1005\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9}|URL, http://mixidj.delta-search.com/?q={sear ... 6&tsp=4949, Quarantined, [38b556dc06859d9955aedf9a4eb6867a]
Registry Data: 0
(No malicious items detected)
Folders: 11
PUP.Optional.MyPCBackup, C:\Users\Richard\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MyPC Backup, Quarantined, [dd10b08294f779bd8d2de9c4699b2bd5],
PUP.Optional.WebCake, C:\ProgramData\Tarma Installer\{C4ED781C-7394-4906-AAFF-D6AB64FF7C38}, Quarantined, [c627052dcac150e664bc42851aea56aa],
PUP.Optional.OpenCandy, C:\Users\Richard\AppData\Roaming\OpenCandy, Quarantined, [8469959dbccf7fb77e3af20a9b679967],
PUP.Optional.OpenCandy, C:\Users\Richard\AppData\Roaming\OpenCandy\5D93151059CA47F89553302DEA9F5823, Quarantined, [8469959dbccf7fb77e3af20a9b679967],
PUP.Optional.APNToolBar.Gen, C:\ProgramData\APN\APN-Stub, Quarantined, [d6176dc544473afc3074fe06b74c7090],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\Apps, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.Iminent, C:\Users\Richard\AppData\Roaming\IminentToolbar, Quarantined, [36b7a48e5e2d4aec469f13078e757a86],
PUP.Optional.Iminent, C:\Program Files (x86)\IminentToolbar, Quarantined, [d01d55dd6c1f0f27648e849655ae867a],
PUP.Optional.PCKeeper, C:\ProgramData\Kromtech\PCKeeper, Quarantined, [7677ec462f5c63d3bfc171b1c043f60a],
Files: 22
PUP.Optional.OpenCandy, C:\Users\Richard\AppData\Roaming\OpenCandy\5D93151059CA47F89553302DEA9F5823\LatestDLMgr.exe, Quarantined, [d01d46ecc4c755e19d1675495ca55fa1],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\DefaultTabBHO.dll, Quarantined, [b13ce052137882b4d564a63a35cb7888],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\DefaultTabStart.exe, Quarantined, [22cb87abb4d72412e950e8f8718f7888],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\DefaultTabStart64.exe, Quarantined, [feef70c28704fe38ba7fedf3b14f867a],
PUP.Optional.Iminent, C:\Users\Richard\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_igdhbblpcellaljokkpfhcjlagemhgjl_0.localstorage, Quarantined, [5994e54d7f0c51e582c6b1f15ba94db3],
PUP.Optional.MyPCBackup, C:\Users\Richard\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MyPC Backup\MyPC Backup.lnk, Quarantined, [dd10b08294f779bd8d2de9c4699b2bd5],
PUP.Optional.MyPCBackup, C:\Users\Richard\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MyPC Backup\Uninstall.lnk, Quarantined, [dd10b08294f779bd8d2de9c4699b2bd5],
PUP.Optional.WebCake, C:\ProgramData\Tarma Installer\{C4ED781C-7394-4906-AAFF-D6AB64FF7C38}\Setup.ico, Quarantined, [c627052dcac150e664bc42851aea56aa],
PUP.Optional.WebCake, C:\ProgramData\Tarma Installer\{C4ED781C-7394-4906-AAFF-D6AB64FF7C38}\Setup.exe, Quarantined, [c627052dcac150e664bc42851aea56aa],
PUP.Optional.WebCake, C:\ProgramData\Tarma Installer\{C4ED781C-7394-4906-AAFF-D6AB64FF7C38}\_Setup.dll, Quarantined, [c627052dcac150e664bc42851aea56aa],
PUP.Optional.WebCake, C:\ProgramData\Tarma Installer\{C4ED781C-7394-4906-AAFF-D6AB64FF7C38}\_Setupx.dll, Quarantined, [c627052dcac150e664bc42851aea56aa],
PUP.Optional.OpenCandy, C:\Users\Richard\AppData\Roaming\OpenCandy\5D93151059CA47F89553302DEA9F5823\TuneUpUtilities2013-2200319-p3v0.exe, Quarantined, [8469959dbccf7fb77e3af20a9b679967],
PUP.Optional.OpenCandy, C:\Users\Richard\AppData\Roaming\OpenCandy\5D93151059CA47F89553302DEA9F5823\TuneUpUtilities2013-2200319_en-US.exe, Quarantined, [8469959dbccf7fb77e3af20a9b679967],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\addon.ico, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\DefaultTabBHO.cfg, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\DefaultTabUninstaller.exe, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\DefaultTabWrap.dll, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\DefaultTabWrap64.dll, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\DT.ico, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\searchhere.ico, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\uninstalldt.exe, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.Iminent, C:\Users\Richard\AppData\Roaming\IminentToolbar\sqlite3.dll, Quarantined, [36b7a48e5e2d4aec469f13078e757a86],
Physical Sectors: 0
(No malicious items detected)
(end)
následovala instavace AVIRA a kompletní scan:
Avira Free Antivirus
Report file date: 2. novembra 2015 11:54
The program is running as an unrestricted full version.
Online services are available.
Licensee : Avira Antivirus Free
Serial number : 0000149996-AVHOE-0000001
Platform : Windows 7 Professional
Windows version : (Service Pack 1) [6.1.7601]
Boot mode : Normally booted
Username : Richard
Computer name : NBRICHARD
Version information:
BUILD.DAT : 15.0.8.658 91859 Bytes 4/9/2015 15:05:00
AVSCAN.EXE : 15.0.8.652 1014064 Bytes 11/2/2015 10:43:06
AVSCANRC.DLL : 15.0.8.652 54064 Bytes 4/9/2015 14:05:31
LUKE.DLL : 15.0.8.652 60664 Bytes 4/9/2015 14:05:37
AVSCPLR.DLL : 15.0.8.652 93488 Bytes 4/9/2015 14:05:31
REPAIR.DLL : 15.0.8.652 365360 Bytes 4/9/2015 14:05:30
REPAIR.RDF : 1.0.6.96 831229 Bytes 4/9/2015 14:05:46
AVREG.DLL : 15.0.8.652 265464 Bytes 4/9/2015 14:05:30
AVLODE.DLL : 15.0.8.656 645368 Bytes 4/9/2015 14:05:29
AVLODE.RDF : 14.0.4.60 79192 Bytes 4/9/2015 14:05:29
XBV00018.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00019.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00020.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00021.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00022.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00023.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00024.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00025.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00026.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00027.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00028.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00029.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00030.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00031.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00032.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00033.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00034.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00035.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00036.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00037.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00038.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00039.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00040.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00041.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00161.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00162.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00163.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00164.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00165.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00166.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00167.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00168.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00169.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00170.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00171.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00172.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00173.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00174.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00175.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00176.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00177.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00178.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00179.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00180.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00181.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00182.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00183.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00184.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00185.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00186.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00187.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00188.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00189.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00190.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00191.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00192.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00193.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00194.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00195.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00196.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00197.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00198.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00199.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00200.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00201.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00202.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00203.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00204.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00205.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00206.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00207.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00208.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00209.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00210.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00211.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00212.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00213.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00214.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00215.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00216.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00217.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00218.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00219.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00220.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00221.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00222.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00223.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00224.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00225.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00226.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00227.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00228.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00229.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00230.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00231.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00232.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00233.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00234.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00235.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00236.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00237.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00238.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00239.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00240.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00241.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00242.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00243.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00244.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00245.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00246.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00247.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00248.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00249.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00250.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00251.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00252.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00253.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00254.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00255.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00000.VDF : 7.11.70.0 66736640 Bytes 4/4/2013 14:05:46
XBV00001.VDF : 7.11.74.226 2201600 Bytes 4/30/2013 14:05:46
XBV00002.VDF : 7.11.80.60 2751488 Bytes 5/28/2013 14:05:46
XBV00003.VDF : 7.11.85.214 2162688 Bytes 6/21/2013 14:05:46
XBV00004.VDF : 7.11.91.176 3903488 Bytes 7/23/2013 14:05:46
XBV00005.VDF : 7.11.98.186 6822912 Bytes 8/29/2013 14:05:46
XBV00006.VDF : 7.11.139.38 15708672 Bytes 3/27/2014 14:05:46
XBV00007.VDF : 7.11.152.100 4193792 Bytes 6/2/2014 14:05:46
XBV00008.VDF : 8.11.165.192 4251136 Bytes 8/7/2014 14:05:46
XBV00009.VDF : 8.11.172.30 2094080 Bytes 9/15/2014 14:05:46
XBV00010.VDF : 8.11.178.32 1581056 Bytes 10/14/2014 14:05:46
XBV00011.VDF : 8.11.184.50 2178560 Bytes 11/11/2014 14:05:46
XBV00012.VDF : 8.11.190.32 1876992 Bytes 12/3/2014 14:05:46
XBV00013.VDF : 8.11.201.28 2973696 Bytes 1/14/2015 14:05:46
XBV00014.VDF : 8.11.206.252 2695680 Bytes 2/4/2015 14:05:46
XBV00015.VDF : 8.11.213.84 3175936 Bytes 3/3/2015 14:05:46
XBV00016.VDF : 8.11.213.176 212480 Bytes 3/5/2015 14:05:46
XBV00017.VDF : 8.11.219.166 2033664 Bytes 3/25/2015 14:05:46
XBV00042.VDF : 8.11.219.194 36864 Bytes 3/25/2015 14:05:46
XBV00043.VDF : 8.11.219.218 7168 Bytes 3/25/2015 14:05:46
XBV00044.VDF : 8.11.219.242 6144 Bytes 3/25/2015 14:05:46
XBV00045.VDF : 8.11.219.244 7680 Bytes 3/25/2015 14:05:46
XBV00046.VDF : 8.11.219.246 5632 Bytes 3/26/2015 14:05:46
XBV00047.VDF : 8.11.219.250 38400 Bytes 3/26/2015 14:05:46
XBV00048.VDF : 8.11.219.252 14336 Bytes 3/26/2015 14:05:46
XBV00049.VDF : 8.11.219.254 18432 Bytes 3/26/2015 14:05:46
XBV00050.VDF : 8.11.220.0 7680 Bytes 3/26/2015 14:05:46
XBV00051.VDF : 8.11.220.2 10240 Bytes 3/26/2015 14:05:46
XBV00052.VDF : 8.11.220.6 2048 Bytes 3/26/2015 14:05:46
XBV00053.VDF : 8.11.220.8 2560 Bytes 3/26/2015 14:05:46
XBV00054.VDF : 8.11.220.10 17408 Bytes 3/26/2015 14:05:46
XBV00055.VDF : 8.11.220.12 2048 Bytes 3/26/2015 14:05:46
XBV00056.VDF : 8.11.220.16 23040 Bytes 3/26/2015 14:05:46
XBV00057.VDF : 8.11.220.18 8704 Bytes 3/26/2015 14:05:46
XBV00058.VDF : 8.11.220.22 30720 Bytes 3/27/2015 14:05:46
XBV00059.VDF : 8.11.220.24 6144 Bytes 3/27/2015 14:05:46
XBV00060.VDF : 8.11.220.26 2048 Bytes 3/27/2015 14:05:46
XBV00061.VDF : 8.11.220.48 9728 Bytes 3/27/2015 14:05:46
XBV00062.VDF : 8.11.220.68 14848 Bytes 3/27/2015 14:05:46
XBV00063.VDF : 8.11.220.88 23552 Bytes 3/27/2015 14:05:46
XBV00064.VDF : 8.11.220.108 9216 Bytes 3/27/2015 14:05:46
XBV00065.VDF : 8.11.220.110 15360 Bytes 3/27/2015 14:05:46
XBV00066.VDF : 8.11.220.116 27648 Bytes 3/27/2015 14:05:46
XBV00067.VDF : 8.11.220.118 10752 Bytes 3/27/2015 14:05:46
XBV00068.VDF : 8.11.220.120 6144 Bytes 3/27/2015 14:05:46
XBV00069.VDF : 8.11.220.122 62976 Bytes 3/28/2015 14:05:46
XBV00070.VDF : 8.11.220.124 2048 Bytes 3/28/2015 14:05:46
XBV00071.VDF : 8.11.220.126 9728 Bytes 3/28/2015 14:05:46
XBV00072.VDF : 8.11.220.128 20992 Bytes 3/28/2015 14:05:46
XBV00073.VDF : 8.11.220.148 54784 Bytes 3/29/2015 14:05:46
XBV00074.VDF : 8.11.220.176 7680 Bytes 3/29/2015 14:05:46
XBV00075.VDF : 8.11.220.196 32768 Bytes 3/30/2015 14:05:46
XBV00076.VDF : 8.11.220.216 2048 Bytes 3/30/2015 14:05:46
XBV00077.VDF : 8.11.220.236 9728 Bytes 3/30/2015 14:05:46
XBV00078.VDF : 8.11.220.238 15360 Bytes 3/30/2015 14:05:46
XBV00079.VDF : 8.11.220.240 9216 Bytes 3/30/2015 14:05:46
XBV00080.VDF : 8.11.220.242 4608 Bytes 3/30/2015 14:05:46
XBV00081.VDF : 8.11.220.248 58368 Bytes 3/30/2015 14:05:46
XBV00082.VDF : 8.11.220.250 2048 Bytes 3/30/2015 14:05:46
XBV00083.VDF : 8.11.220.252 2048 Bytes 3/30/2015 14:05:46
XBV00084.VDF : 8.11.220.254 39424 Bytes 3/31/2015 14:05:46
XBV00085.VDF : 8.11.221.0 2048 Bytes 3/31/2015 14:05:46
XBV00086.VDF : 8.11.221.6 40960 Bytes 3/31/2015 14:05:46
XBV00087.VDF : 8.11.221.8 2048 Bytes 3/31/2015 14:05:46
XBV00088.VDF : 8.11.221.10 16896 Bytes 3/31/2015 14:05:46
XBV00089.VDF : 8.11.221.30 10240 Bytes 3/31/2015 14:05:46
XBV00090.VDF : 8.11.221.48 29184 Bytes 3/31/2015 14:05:46
XBV00091.VDF : 8.11.221.50 2048 Bytes 3/31/2015 14:05:46
XBV00092.VDF : 8.11.221.70 27648 Bytes 3/31/2015 14:05:46
XBV00093.VDF : 8.11.221.88 3584 Bytes 3/31/2015 14:05:46
XBV00094.VDF : 8.11.221.90 32256 Bytes 3/31/2015 14:05:46
XBV00095.VDF : 8.11.221.94 34816 Bytes 4/1/2015 14:05:46
XBV00096.VDF : 8.11.221.96 8704 Bytes 4/1/2015 14:05:46
XBV00097.VDF : 8.11.221.100 8704 Bytes 4/1/2015 14:05:46
XBV00098.VDF : 8.11.221.102 7680 Bytes 4/1/2015 14:05:46
XBV00099.VDF : 8.11.221.106 39936 Bytes 4/1/2015 14:05:46
XBV00100.VDF : 8.11.221.124 8704 Bytes 4/1/2015 14:05:46
XBV00101.VDF : 8.11.221.142 12288 Bytes 4/1/2015 14:05:46
XBV00102.VDF : 8.11.221.160 7168 Bytes 4/1/2015 14:05:46
XBV00103.VDF : 8.11.221.178 7168 Bytes 4/1/2015 14:05:46
XBV00104.VDF : 8.11.221.196 8192 Bytes 4/1/2015 14:05:46
XBV00105.VDF : 8.11.221.200 33280 Bytes 4/2/2015 14:05:46
XBV00106.VDF : 8.11.221.202 2048 Bytes 4/2/2015 14:05:46
XBV00107.VDF : 8.11.221.204 28160 Bytes 4/2/2015 14:05:46
XBV00108.VDF : 8.11.221.206 2048 Bytes 4/2/2015 14:05:46
XBV00109.VDF : 8.11.221.208 33792 Bytes 4/2/2015 14:05:46
XBV00110.VDF : 8.11.221.210 24576 Bytes 4/2/2015 14:05:46
XBV00111.VDF : 8.11.221.214 18944 Bytes 4/2/2015 14:05:46
XBV00112.VDF : 8.11.221.216 11264 Bytes 4/2/2015 14:05:46
XBV00113.VDF : 8.11.221.220 29696 Bytes 4/3/2015 14:05:46
XBV00114.VDF : 8.11.221.222 2048 Bytes 4/3/2015 14:05:46
XBV00115.VDF : 8.11.221.224 31232 Bytes 4/3/2015 14:05:46
XBV00116.VDF : 8.11.221.242 3584 Bytes 4/3/2015 14:05:46
XBV00117.VDF : 8.11.222.2 11776 Bytes 4/3/2015 14:05:46
XBV00118.VDF : 8.11.222.18 7168 Bytes 4/3/2015 14:05:46
XBV00119.VDF : 8.11.222.34 6656 Bytes 4/3/2015 14:05:46
XBV00120.VDF : 8.11.222.38 15360 Bytes 4/3/2015 14:05:46
XBV00121.VDF : 8.11.222.40 5632 Bytes 4/3/2015 14:05:46
XBV00122.VDF : 8.11.222.42 6144 Bytes 4/3/2015 14:05:46
XBV00123.VDF : 8.11.222.44 46592 Bytes 4/4/2015 14:05:46
XBV00124.VDF : 8.11.222.46 2048 Bytes 4/4/2015 14:05:46
XBV00125.VDF : 8.11.222.48 2048 Bytes 4/4/2015 14:05:46
XBV00126.VDF : 8.11.222.50 36864 Bytes 4/4/2015 14:05:46
XBV00127.VDF : 8.11.222.52 2048 Bytes 4/4/2015 14:05:46
XBV00128.VDF : 8.11.222.68 68096 Bytes 4/5/2015 14:05:46
XBV00129.VDF : 8.11.222.84 2048 Bytes 4/5/2015 14:05:46
XBV00130.VDF : 8.11.222.116 18432 Bytes 4/5/2015 14:05:46
XBV00131.VDF : 8.11.222.132 62464 Bytes 4/6/2015 14:05:46
XBV00132.VDF : 8.11.222.134 10752 Bytes 4/6/2015 14:05:46
XBV00133.VDF : 8.11.222.138 2048 Bytes 4/6/2015 14:05:46
XBV00134.VDF : 8.11.222.154 13312 Bytes 4/6/2015 14:05:46
XBV00135.VDF : 8.11.222.156 8704 Bytes 4/6/2015 14:05:46
XBV00136.VDF : 8.11.222.158 9216 Bytes 4/6/2015 14:05:46
XBV00137.VDF : 8.11.222.160 2048 Bytes 4/6/2015 14:05:46
XBV00138.VDF : 8.11.222.164 18432 Bytes 4/6/2015 14:05:46
XBV00139.VDF : 8.11.222.166 10752 Bytes 4/6/2015 14:05:46
XBV00140.VDF : 8.11.222.182 7168 Bytes 4/6/2015 14:05:46
XBV00141.VDF : 8.11.222.196 8704 Bytes 4/7/2015 14:05:46
XBV00142.VDF : 8.11.222.212 29696 Bytes 4/7/2015 14:05:46
XBV00143.VDF : 8.11.222.226 6656 Bytes 4/7/2015 14:05:46
XBV00144.VDF : 8.11.222.228 10752 Bytes 4/7/2015 14:05:46
XBV00145.VDF : 8.11.222.230 4096 Bytes 4/7/2015 14:05:46
XBV00146.VDF : 8.11.222.232 5120 Bytes 4/7/2015 14:05:46
XBV00147.VDF : 8.11.222.234 5632 Bytes 4/7/2015 14:05:46
XBV00148.VDF : 8.11.222.240 34816 Bytes 4/7/2015 14:05:46
XBV00149.VDF : 8.11.222.242 2048 Bytes 4/7/2015 14:05:46
XBV00150.VDF : 8.11.222.244 3584 Bytes 4/7/2015 14:05:46
XBV00151.VDF : 8.11.222.246 24576 Bytes 4/7/2015 14:05:46
XBV00152.VDF : 8.11.222.250 37888 Bytes 4/8/2015 14:05:46
XBV00153.VDF : 8.11.223.8 12800 Bytes 4/8/2015 14:05:46
XBV00154.VDF : 8.11.223.22 2048 Bytes 4/8/2015 14:05:46
XBV00155.VDF : 8.11.223.36 10752 Bytes 4/8/2015 14:05:46
XBV00156.VDF : 8.11.223.52 35328 Bytes 4/8/2015 14:05:46
XBV00157.VDF : 8.11.223.66 7168 Bytes 4/8/2015 14:05:46
XBV00158.VDF : 8.11.223.68 2048 Bytes 4/8/2015 14:05:46
XBV00159.VDF : 8.11.223.72 15360 Bytes 4/8/2015 14:05:46
XBV00160.VDF : 8.11.223.74 7168 Bytes 4/9/2015 14:05:46
LOCAL000.VDF : 8.11.223.74 126684672 Bytes 4/9/2015 10:45:18
Engine version : 8.3.30.10
AEVDF.DLL : 8.3.1.6 133992 Bytes 4/9/2015 14:05:27
AESCRIPT.DLL : 8.2.2.58 560248 Bytes 4/9/2015 14:05:27
AESCN.DLL : 8.3.2.2 139456 Bytes 4/9/2015 14:05:27
AESBX.DLL : 8.2.20.34 1615784 Bytes 4/9/2015 14:05:27
AERDL.DLL : 8.2.1.20 731040 Bytes 4/9/2015 14:05:27
AEPACK.DLL : 8.4.0.62 793456 Bytes 4/9/2015 14:05:27
AEOFFICE.DLL : 8.3.1.16 359280 Bytes 4/9/2015 14:05:27
AEMOBILE.DLL : 8.1.7.0 281456 Bytes 4/9/2015 14:05:27
AEHEUR.DLL : 8.1.4.1612 8244344 Bytes 4/9/2015 14:05:27
AEHELP.DLL : 8.3.2.0 281456 Bytes 4/9/2015 14:05:27
AEGEN.DLL : 8.1.7.40 456608 Bytes 4/9/2015 14:05:27
AEEXP.DLL : 8.4.2.70 255904 Bytes 4/9/2015 14:05:27
AEEMU.DLL : 8.1.3.4 399264 Bytes 4/9/2015 14:05:27
AEDROID.DLL : 8.4.3.116 1050536 Bytes 4/9/2015 14:05:27
AECORE.DLL : 8.3.4.0 243624 Bytes 4/9/2015 14:05:27
AEBB.DLL : 8.1.2.0 60448 Bytes 4/9/2015 14:05:27
AVWINLL.DLL : 15.0.8.652 25904 Bytes 4/9/2015 14:05:31
AVPREF.DLL : 15.0.8.652 53248 Bytes 4/9/2015 14:05:30
AVREP.DLL : 15.0.8.652 221432 Bytes 4/9/2015 14:05:30
AVARKT.DLL : 15.0.8.652 228088 Bytes 4/9/2015 14:05:28
AVEVTLOG.DLL : 15.0.8.652 183600 Bytes 4/9/2015 14:05:28
SQLITE3.DLL : 15.0.8.652 456440 Bytes 4/9/2015 14:05:39
AVSMTP.DLL : 15.0.8.652 79360 Bytes 4/9/2015 14:05:31
NETNT.DLL : 15.0.8.652 17352 Bytes 4/9/2015 14:05:37
RCIMAGE.DLL : 15.0.8.652 4865328 Bytes 4/9/2015 14:05:38
RCTEXT.DLL : 15.0.8.652 76744 Bytes 4/9/2015 14:05:38
Configuration settings for the scan:
Jobname.............................: Local Drives
Configuration file..................: C:\Program Files (x86)\Avira\AntiVir Desktop\alldrives.avp
Reporting...........................: default
Primary action......................: Interactive
Secondary action....................: Ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:, E:,
Process scan........................: on
Scan registry.......................: on
Search for rootkits.................: off
Integrity checking of system files..: off
Scan all files......................: Intelligent file selection
Scan archives.......................: on
Limit recursion depth...............: 20
Smart extensions....................: on
Macrovirus heuristic................: on
File heuristic......................: extended
Start of the scan: 2. novembra 2015 11:54
Start scanning boot sectors:
Boot sector 'HDD0(C:)'
[INFO] No virus was found!
The scan of running processes will be started:
Scan process 'svchost.exe' - '57' Module(s) have been scanned
Scan process 'launcher_service.exe' - '38' Module(s) have been scanned
Scan process 'nvvsvc.exe' - '34' Module(s) have been scanned
Scan process 'svchost.exe' - '40' Module(s) have been scanned
Scan process 'cmdagent.exe' - '106' Module(s) have been scanned
Scan process 'svchost.exe' - '83' Module(s) have been scanned
Scan process 'svchost.exe' - '81' Module(s) have been scanned
Scan process 'svchost.exe' - '113' Module(s) have been scanned
Scan process 'svchost.exe' - '82' Module(s) have been scanned
Scan process 'svchost.exe' - '172' Module(s) have been scanned
Scan process 'WUDFHost.exe' - '34' Module(s) have been scanned
Scan process 'WLANExt.exe' - '83' Module(s) have been scanned
Scan process 'conhost.exe' - '21' Module(s) have been scanned
Scan process 'svchost.exe' - '71' Module(s) have been scanned
Scan process 'spoolsv.exe' - '95' Module(s) have been scanned
Scan process 'taskhost.exe' - '61' Module(s) have been scanned
Scan process 'btwdins.exe' - '37' Module(s) have been scanned
Scan process 'chromodo_updater.exe' - '64' Module(s) have been scanned
Scan process 'Dwm.exe' - '35' Module(s) have been scanned
Scan process 'svchost.exe' - '49' Module(s) have been scanned
Scan process 'dtsrvc.exe' - '30' Module(s) have been scanned
Scan process 'GeekBuddyRSP.exe' - '46' Module(s) have been scanned
Scan process 'taskeng.exe' - '32' Module(s) have been scanned
Scan process 'GoogleUpdate.exe' - '64' Module(s) have been scanned
Scan process 'taskeng.exe' - '34' Module(s) have been scanned
Scan process 'taskeng.exe' - '34' Module(s) have been scanned
Scan process 'AccountService.exe' - '93' Module(s) have been scanned
Scan process 'LMS.exe' - '38' Module(s) have been scanned
Scan process 'Explorer.EXE' - '170' Module(s) have been scanned
Scan process 'cistray.exe' - '60' Module(s) have been scanned
Scan process 'SPMgr.exe' - '62' Module(s) have been scanned
Scan process 'pdisrvc.exe' - '36' Module(s) have been scanned
Scan process 'RegSrvc.exe' - '36' Module(s) have been scanned
Scan process 'svchost.exe' - '36' Module(s) have been scanned
Scan process 'WLIDSVC.EXE' - '58' Module(s) have been scanned
Scan process 'EvtEng.exe' - '70' Module(s) have been scanned
Scan process 'WLIDSvcM.exe' - '21' Module(s) have been scanned
Scan process 'unsecapp.exe' - '32' Module(s) have been scanned
Scan process 'svchost.exe' - '41' Module(s) have been scanned
Scan process 'wmiprvse.exe' - '51' Module(s) have been scanned
Scan process 'SearchIndexer.exe' - '58' Module(s) have been scanned
Scan process 'GWX.exe' - '41' Module(s) have been scanned
Scan process 'iFrmewrk.exe' - '75' Module(s) have been scanned
Scan process 'igfxpers.exe' - '52' Module(s) have been scanned
Scan process 'igfxtray.exe' - '33' Module(s) have been scanned
Scan process 'hkcmd.exe' - '32' Module(s) have been scanned
Scan process 'flux.exe' - '86' Module(s) have been scanned
Scan process 'cavwp.exe' - '50' Module(s) have been scanned
Scan process 'unsecapp.exe' - '33' Module(s) have been scanned
Scan process 'esrv_svc.exe' - '27' Module(s) have been scanned
Scan process 'svchost.exe' - '38' Module(s) have been scanned
Scan process 'cis.exe' - '74' Module(s) have been scanned
Scan process 'VAIOUpdt.exe' - '55' Module(s) have been scanned
Scan process 'vuagent.exe' - '40' Module(s) have been scanned
Scan process 'IAStorDataMgrSvc.exe' - '53' Module(s) have been scanned
Scan process 'UNS.exe' - '62' Module(s) have been scanned
Scan process 'SPMService.exe' - '59' Module(s) have been scanned
Scan process 'TrustedInstaller.exe' - '52' Module(s) have been scanned
Scan process 'VCSystemTray.exe' - '173' Module(s) have been scanned
Scan process 'VCService.exe' - '39' Module(s) have been scanned
Scan process 'VCAgent.exe' - '188' Module(s) have been scanned
Scan process 'wmiprvse.exe' - '64' Module(s) have been scanned
Scan process 'avgnt.exe' - '104' Module(s) have been scanned
Scan process 'avguard.exe' - '135' Module(s) have been scanned
Scan process 'avshadow.exe' - '34' Module(s) have been scanned
Scan process 'sched.exe' - '66' Module(s) have been scanned
Scan process 'msiexec.exe' - '58' Module(s) have been scanned
Scan process 'taskhost.exe' - '36' Module(s) have been scanned
Scan process 'Avira.OE.ServiceHost.exe' - '128' Module(s) have been scanned
Scan process 'Avira.OE.Systray.exe' - '121' Module(s) have been scanned
Scan process 'svchost.exe' - '32' Module(s) have been scanned
Scan process 'avcenter.exe' - '146' Module(s) have been scanned
Scan process 'igfxsrvc.exe' - '33' Module(s) have been scanned
Scan process 'avscan.exe' - '114' Module(s) have been scanned
Scan process 'smss.exe' - '2' Module(s) have been scanned
Scan process 'csrss.exe' - '19' Module(s) have been scanned
Scan process 'wininit.exe' - '26' Module(s) have been scanned
Scan process 'csrss.exe' - '19' Module(s) have been scanned
Scan process 'services.exe' - '39' Module(s) have been scanned
Scan process 'lsass.exe' - '77' Module(s) have been scanned
Scan process 'lsm.exe' - '28' Module(s) have been scanned
Scan process 'winlogon.exe' - '36' Module(s) have been scanned
Starting to scan executable files (registry):
The registry was scanned ( '3798' files ).
Starting the file scan:
Begin scan in 'C:\'
C:\ProgramData\dtdata\R002.exe
[DETECTION] Contains patterns of software PUA/DefaultTab.196608.2
Begin scan in 'E:\' <Princess>
Beginning disinfection:
C:\ProgramData\dtdata\R002.exe
[DETECTION] Contains patterns of software PUA/DefaultTab.196608.2
[NOTE] The file was moved to the quarantine directory under the name '5013f5ec.qua'!
End of the scan: 2. novembra 2015 13:25
Used time: 1:30:18 Hour(s)
The scan has been done completely.
36470 Scanned directories
753032 Files were scanned
1 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 Files were deleted
0 Viruses and unwanted programs were repaired
1 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
753031 Files not concerned
10359 Archives were scanned
0 Warnings
1 Notes
poté ADWCleaner
# AdwCleaner v5.016 - Logfile created 02/11/2015 at 13:38:59
# Updated 01/11/2015 by Xplode
# Database : 2015-11-01.2 [Local]
# Operating system : Windows 7 Professional Service Pack 1 (x64)
# Username : Richard - NBRICHARD
# Running from : C:\Users\Richard\Desktop\adwcleaner_5.016.exe
# Option : Cleaning
# Support : http://toolslib.net/forum
***** [ Services ] *****
***** [ Folders ] *****
[-] Folder Deleted : C:\Program Files\Kromtech
[-] Folder Deleted : C:\ProgramData\apn
[-] Folder Deleted : C:\ProgramData\Babylon
[-] Folder Deleted : C:\ProgramData\Tarma Installer
[-] Folder Deleted : C:\ProgramData\dtdata
[-] Folder Deleted : C:\ProgramData\Kromtech
[-] Folder Deleted : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Rich Media Player
[-] Folder Deleted : C:\Users\Richard\AppData\Local\Rich Media Player
[-] Folder Deleted : C:\Users\Richard\AppData\LocalLow\IminentToolbar
[-] Folder Deleted : C:\Users\Richard\AppData\Roaming\Babylon
[-] Folder Deleted : C:\Windows\SysWOW64\config\systemprofile\AppData\Local\PackageAware
***** [ Files ] *****
***** [ DLLs ] *****
***** [ Shortcuts ] *****
***** [ Scheduled tasks ] *****
[-] Task Deleted : DefaultCheck
[-] Task Deleted : DefaultReg
***** [ Registry ] *****
[-] Key Deleted : HKLM\SOFTWARE\Classes\Prod.cap
[-] Key Deleted : HKCU\Software\Classes\CLSID\{FB684D26-01F4-4D9D-87CB-F486BEBA56DC}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{7825CFB6-490A-436B-9F26-4A7B5CFC01A9}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{F511AFDB-726E-4458-90E7-1ECB97406544}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{FB684D26-01F4-4D9D-87CB-F486BEBA56DC}
[-] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{7D86A08B-0A8F-4BE0-B693-F05E6947E780}
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7825CFB6-490A-436B-9F26-4A7B5CFC01A9}
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A7DF592F-6E2A-45C4-9A87-4BD217D714ED}
[-] Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{7825CFB6-490A-436B-9F26-4A7B5CFC01A9}
[-] Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{A7DF592F-6E2A-45C4-9A87-4BD217D714ED}
[-] Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{7825CFB6-490A-436B-9F26-4A7B5CFC01A9}
[-] Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{A7DF592F-6E2A-45C4-9A87-4BD217D714ED}
[-] Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{7825CFB6-490A-436B-9F26-4A7B5CFC01A9}
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{7825CFB6-490A-436B-9F26-4A7B5CFC01A9}
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Extensions\{A7DF592F-6E2A-45C4-9A87-4BD217D714ED}
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7825CFB6-490A-436B-9F26-4A7B5CFC01A9}
[-] Key Deleted : HKU\.DEFAULT\Software\VNT
[-] Key Deleted : HKCU\Software\Softonic
[-] Key Deleted : HKLM\SOFTWARE\GeekBuddyRSP
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\sl-dlc
[-] Key Deleted : [x64] HKLM\SOFTWARE\Kromtech
***** [ Web browsers ] *****
[-] [C:\Users\Richard\AppData\Local\Google\Chrome\User Data\Default\Web Data] [Search Provider] Deleted : aol.com
[-] [C:\Users\Richard\AppData\Local\Google\Chrome\User Data\Default\Web Data] [Search Provider] Deleted : ask.com
[-] [C:\Users\Richard\AppData\Local\Google\Chrome\User Data\Default\Web Data] [Search Provider] Deleted : swish.en.softonic.com
*************************
:: "Tracing" keys removed
:: Winsock settings cleared
########## EOF - C:\AdwCleaner\AdwCleaner[C1].txt - [3736 bytes] ##########
pak následoval RogueKiller:
RogueKiller V10.11.4.0 [Nov 2 2015] (Free) by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Website : http://www.adlice.com/software/roguekiller/
Blog : http://www.adlice.com
Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Started in : Normal mode
User : Richard [Administrator]
Started from : C:\Users\Richard\Desktop\RogueKiller.exe
Mode : Delete -- Date : 11/02/2015 14:18:42
¤¤¤ Processes : 0 ¤¤¤
¤¤¤ Registry : 11 ¤¤¤
[PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\KromtechAccountService ("C:\Program Files\Kromtech\Common\AccountService.exe") -> Deleted
[PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\KromtechAccountService ("C:\Program Files\Kromtech\Common\AccountService.exe") -> Deleted
[PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\KromtechAccountService ("C:\Program Files\Kromtech\Common\AccountService.exe") -> Deleted
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{811146CE-350F-4163-A078-78B21742B62E} | DhcpNameServer : 217.77.165.81 217.77.161.131 ([X][X]) -> Replaced ()
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{DEB75603-BAEF-42C2-9C62-F22FF89827B3} | DhcpNameServer : 10.0.0.15 10.0.0.138 ([X][X]) -> Replaced ()
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{811146CE-350F-4163-A078-78B21742B62E} | DhcpNameServer : 217.77.165.81 217.77.161.131 ([X][X]) -> Replaced ()
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{DEB75603-BAEF-42C2-9C62-F22FF89827B3} | DhcpNameServer : 10.0.0.15 10.0.0.138 ([X][X]) -> Replaced ()
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{811146CE-350F-4163-A078-78B21742B62E} | DhcpNameServer : 217.77.165.81 217.77.161.131 ([X][X]) -> Replaced ()
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{DEB75603-BAEF-42C2-9C62-F22FF89827B3} | DhcpNameServer : 10.0.0.15 10.0.0.138 ([X][X]) -> Replaced ()
[PUM.StartMenu] (X64) HKEY_USERS\S-1-5-21-2697576798-3047597159-1036163815-1005\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowMyGames : 0 -> Replaced (1)
[PUM.StartMenu] (X86) HKEY_USERS\S-1-5-21-2697576798-3047597159-1036163815-1005\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowMyGames : 0 -> Replaced (1)
¤¤¤ Tasks : 0 ¤¤¤
¤¤¤ Files : 1 ¤¤¤
[PUP][Folder] C:\ProgramData\{C4ABDBC8-1C81-42C9-BFFC-4A68511E9E4F} -> Deleted
[PUP][File] C:\ProgramData\{C4ABDBC8-1C81-42C9-BFFC-4A68511E9E4F}\{D3742F82-1C1A-4DCC-ABBD-0E831C0185CC}.msi -> Deleted
¤¤¤ Hosts File : 1 ¤¤¤
[C:\Windows\System32\drivers\etc\hosts] 127.0.0.1 localhost
¤¤¤ Antirootkit : 0 (Driver: Not loaded [0xc000036b]) ¤¤¤
¤¤¤ Web browsers : 0 ¤¤¤
¤¤¤ MBR Check : ¤¤¤
+++++ PhysicalDrive0: +++++
--- User ---
[MBR] 624e722d5d2358e9be30290149d0b09f
[BSP] fde85cc8f7798e7b5e4a766cd45a535c : Windows Vista/7/8 MBR Code
Partition table:
0 - [XXXXXX] ACER (0x27) [VISIBLE] Offset (sectors): 2048 | Size: 12029 MB
1 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 24637440 | Size: 100 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
2 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 24842240 | Size: 598349 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
User = LL1 ... OK
User = LL2 ... OK
+++++ PhysicalDrive1: +++++
--- User ---
[MBR] 4997e18ca45e5487d109d2c61ef9564d
[BSP] 33a07a59d299ab4ea9f4ab0156f9d86f : Windows XP MBR Code
Partition table:
0 - [XXXXXX] FAT32-LBA (0xc) [VISIBLE] Offset (sectors): 8064 | Size: 7381 MB
User = LL1 ... OK
Error reading LL2 MBR! ([32] The request is not supported. )
Děkuji
prosím o kontrolu logu PC kolegyně. Včera a dnes jí MS Outlook odeslal sám cca 20.000 e-mailů na úplně cizí neznámé adresy.
přikládám logy co již jsem udělal:
1. MBAM
Malwarebytes Anti-Malware
www.malwarebytes.org
Scan Date: 2. 11. 2015
Scan Time: 11:08
Logfile: MBAM.txt
Administrator: Yes
Version: 2.2.0.1024
Malware Database: v2015.09.22.05
Rootkit Database: v2015.09.18.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled
OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Richard
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 415296
Time Elapsed: 15 min, 18 sec
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
Processes: 0
(No malicious items detected)
Modules: 0
(No malicious items detected)
Registry Keys: 34
PUP.Optional.DefaultTab, HKLM\SOFTWARE\CLASSES\APPID\{72D89EBF-0C5D-4190-91FD-398E45F1D007}, Quarantined, [866773bf93f8ce68946cbb2bce34e020],
PUP.Optional.DefaultTab, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\{72D89EBF-0C5D-4190-91FD-398E45F1D007}, Quarantined, [866773bf93f8ce68946cbb2bce34e020],
PUP.Optional.DefaultTab, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\{72D89EBF-0C5D-4190-91FD-398E45F1D007}, Quarantined, [866773bf93f8ce68946cbb2bce34e020],
PUP.Optional.MixiDJToolbar, HKLM\SOFTWARE\CLASSES\APPID\{A2773ED4-83BD-488A-A186-73590706C916}, Quarantined, [539a0b272863c76fdd1b8c5d897923dd],
PUP.Optional.MixiDJToolbar, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\{A2773ED4-83BD-488A-A186-73590706C916}, Quarantined, [539a0b272863c76fdd1b8c5d897923dd],
PUP.Optional.MixiDJToolbar, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\{A2773ED4-83BD-488A-A186-73590706C916}, Quarantined, [539a0b272863c76fdd1b8c5d897923dd],
PUP.Optional.Delta.ShrtCln, HKLM\SOFTWARE\CLASSES\APPID\{C26644C4-2A12-4CA6-8F2E-0EDE6CF018F3}, Quarantined, [1ad3c56d1b708caa01b96080e51d8878],
PUP.Optional.Delta.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\{C26644C4-2A12-4CA6-8F2E-0EDE6CF018F3}, Quarantined, [1ad3c56d1b708caa01b96080e51d8878],
PUP.Optional.Delta.ShrtCln, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\{C26644C4-2A12-4CA6-8F2E-0EDE6CF018F3}, Quarantined, [1ad3c56d1b708caa01b96080e51d8878],
PUP.Optional.OutBrowse, HKLM\SOFTWARE\CLASSES\TYPELIB\{DCABB943-792E-44C4-9029-ECBEE6265AF9}, Quarantined, [e10c3200bad187af1f54e7c7ad557888],
PUP.Optional.OutBrowse, HKLM\SOFTWARE\CLASSES\INTERFACE\{3408AC0D-510E-4808-8F7B-6B70B1F88534}, Quarantined, [e10c3200bad187af1f54e7c7ad557888],
PUP.Optional.OutBrowse, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{3408AC0D-510E-4808-8F7B-6B70B1F88534}, Quarantined, [e10c3200bad187af1f54e7c7ad557888],
PUP.Optional.OutBrowse, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{3408AC0D-510E-4808-8F7B-6B70B1F88534}, Quarantined, [e10c3200bad187af1f54e7c7ad557888],
PUP.Optional.OutBrowse, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{DCABB943-792E-44C4-9029-ECBEE6265AF9}, Quarantined, [e10c3200bad187af1f54e7c7ad557888],
PUP.Optional.OutBrowse, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{DCABB943-792E-44C4-9029-ECBEE6265AF9}, Quarantined, [e10c3200bad187af1f54e7c7ad557888],
PUP.Optional.Babylon, HKU\S-1-5-21-2697576798-3047597159-1036163815-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9}, Quarantined, [db125fd34f3c989e761f8d57a35f54ac],
PUP.Optional.Babylon, HKU\S-1-5-21-2697576798-3047597159-1036163815-1005\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0ECDF796-C2DC-4D79-A620-CCE0C0A66CC9}, Quarantined, [db125fd34f3c989e761f8d57a35f54ac],
PUP.Optional.DefaultTab, HKU\S-1-5-21-2697576798-3047597159-1036163815-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{7F6AFBF1-E065-4627-A2FD-810366367D01}, Quarantined, [ba3360d296f586b03ac76c7ab052c13f],
PUP.Optional.DefaultTab, HKU\S-1-5-21-2697576798-3047597159-1036163815-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{7F6AFBF1-E065-4627-A2FD-810366367D01}, Quarantined, [ba3360d296f586b03ac76c7ab052c13f],
PUP.Optional.Iminent, HKU\S-1-5-21-2697576798-3047597159-1036163815-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{84FF7BD6-B47F-46F8-9130-01B2696B36CB}, Quarantined, [f5f888aa08830c2afe21509748ba7c84],
PUP.Optional.Iminent, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{84FF7BD6-B47F-46F8-9130-01B2696B36CB}, Quarantined, [f5f888aa08830c2afe21509748ba7c84],
PUP.Optional.Iminent, HKU\S-1-5-21-2697576798-3047597159-1036163815-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{84FF7BD6-B47F-46F8-9130-01B2696B36CB}, Quarantined, [f5f888aa08830c2afe21509748ba7c84],
PUP.Optional.DefaultTab, HKU\S-1-5-21-2697576798-3047597159-1036163815-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{A1E28287-1A31-4B0F-8D05-AA8C465D3C5A}, Quarantined, [a7461022cebd2115c14106e01de512ee],
PUP.Optional.DefaultTab, HKU\S-1-5-21-2697576798-3047597159-1036163815-1005\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{A1E28287-1A31-4B0F-8D05-AA8C465D3C5A}, Quarantined, [a7461022cebd2115c14106e01de512ee],
PUP.Optional.Iminent, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{68B81CCD-A80C-4060-8947-5AE69ED01199}, Quarantined, [6c8134feadde75c134ea9b4c3cc6936d],
PUP.Optional.Iminent, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\LOW RIGHTS\ELEVATIONPOLICY\{E6B969FB-6D33-48d2-9061-8BBD4899EB08}, Quarantined, [19d42b07d8b3fe386fb452956f93e11f],
PUP.Optional.WebCake, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{C4ED781C-7394-4906-AAFF-D6AB64FF7C38}, Quarantined, [c627052dcac150e664bc42851aea56aa],
PUP.Optional.PCKeeper, HKLM\SOFTWARE\KROMTECH\PCKeeper, Quarantined, [6687a1915b30db5b79b7268b5ca89e62],
PUP.Optional.Iminent, HKLM\SOFTWARE\WOW6432NODE\Iminent, Quarantined, [509d29097a11eb4b7af4c9d92fd5da26],
PUP.Optional.WebCake, HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\fjoijdanhaiflhibkljeklcghcmmfffh, Quarantined, [ac415ad82b606cca55d47354ab599c64],
PUP.Optional.APNToolBar.Gen, HKU\S-1-5-18\SOFTWARE\AskPartnerNetwork, Quarantined, [35b82909296246f0008b1e151ee5b34d],
PUP.Optional.DefaultTab, HKU\S-1-5-18\SOFTWARE\Default tab, Quarantined, [688586acf497b97d17530a8c64a02cd4],
PUP.Optional.DefaultTab, HKU\S-1-5-18\SOFTWARE\DefaultTab, Quarantined, [e40920128b00c96d1556fb9b62a241bf],
PUP.Optional.DefaultTab, HKU\S-1-5-18\SOFTWARE\APPDATALOW\SOFTWARE\DefaultTab, Quarantined, [ac41d75be5a6ab8b93d6dfb78a7ad32d],
Registry Values: 4
PUP.Optional.Iminent, HKU\S-1-5-21-2697576798-3047597159-1036163815-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\URLSEARCHHOOKS|{84FF7BD6-B47F-46F8-9130-01B2696B36CB}, Quarantined, [f5f888aa08830c2afe21509748ba7c84],
PUP.Optional.Iminent, HKU\S-1-5-21-2697576798-3047597159-1036163815-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\URLSEARCHHOOKS\{84FF7BD6-B47F-46F8-9130-01B2696B36CB}, Quarantined, [30bdc46eb2d948ee9c83a542e0226d93],
PUP.Optional.Delta.ShrtCln, HKU\S-1-5-21-2697576798-3047597159-1036163815-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9}|URL, http://mixidj.delta-search.com/?q={sear ... 6&tsp=4949, Quarantined, [6e7f1e14e8a390a6b94a3e3b3cc80cf4]
PUP.Optional.Delta.ShrtCln, HKU\S-1-5-21-2697576798-3047597159-1036163815-1005\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9}|URL, http://mixidj.delta-search.com/?q={sear ... 6&tsp=4949, Quarantined, [38b556dc06859d9955aedf9a4eb6867a]
Registry Data: 0
(No malicious items detected)
Folders: 11
PUP.Optional.MyPCBackup, C:\Users\Richard\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MyPC Backup, Quarantined, [dd10b08294f779bd8d2de9c4699b2bd5],
PUP.Optional.WebCake, C:\ProgramData\Tarma Installer\{C4ED781C-7394-4906-AAFF-D6AB64FF7C38}, Quarantined, [c627052dcac150e664bc42851aea56aa],
PUP.Optional.OpenCandy, C:\Users\Richard\AppData\Roaming\OpenCandy, Quarantined, [8469959dbccf7fb77e3af20a9b679967],
PUP.Optional.OpenCandy, C:\Users\Richard\AppData\Roaming\OpenCandy\5D93151059CA47F89553302DEA9F5823, Quarantined, [8469959dbccf7fb77e3af20a9b679967],
PUP.Optional.APNToolBar.Gen, C:\ProgramData\APN\APN-Stub, Quarantined, [d6176dc544473afc3074fe06b74c7090],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\Apps, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.Iminent, C:\Users\Richard\AppData\Roaming\IminentToolbar, Quarantined, [36b7a48e5e2d4aec469f13078e757a86],
PUP.Optional.Iminent, C:\Program Files (x86)\IminentToolbar, Quarantined, [d01d55dd6c1f0f27648e849655ae867a],
PUP.Optional.PCKeeper, C:\ProgramData\Kromtech\PCKeeper, Quarantined, [7677ec462f5c63d3bfc171b1c043f60a],
Files: 22
PUP.Optional.OpenCandy, C:\Users\Richard\AppData\Roaming\OpenCandy\5D93151059CA47F89553302DEA9F5823\LatestDLMgr.exe, Quarantined, [d01d46ecc4c755e19d1675495ca55fa1],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\DefaultTabBHO.dll, Quarantined, [b13ce052137882b4d564a63a35cb7888],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\DefaultTabStart.exe, Quarantined, [22cb87abb4d72412e950e8f8718f7888],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\DefaultTabStart64.exe, Quarantined, [feef70c28704fe38ba7fedf3b14f867a],
PUP.Optional.Iminent, C:\Users\Richard\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_igdhbblpcellaljokkpfhcjlagemhgjl_0.localstorage, Quarantined, [5994e54d7f0c51e582c6b1f15ba94db3],
PUP.Optional.MyPCBackup, C:\Users\Richard\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MyPC Backup\MyPC Backup.lnk, Quarantined, [dd10b08294f779bd8d2de9c4699b2bd5],
PUP.Optional.MyPCBackup, C:\Users\Richard\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MyPC Backup\Uninstall.lnk, Quarantined, [dd10b08294f779bd8d2de9c4699b2bd5],
PUP.Optional.WebCake, C:\ProgramData\Tarma Installer\{C4ED781C-7394-4906-AAFF-D6AB64FF7C38}\Setup.ico, Quarantined, [c627052dcac150e664bc42851aea56aa],
PUP.Optional.WebCake, C:\ProgramData\Tarma Installer\{C4ED781C-7394-4906-AAFF-D6AB64FF7C38}\Setup.exe, Quarantined, [c627052dcac150e664bc42851aea56aa],
PUP.Optional.WebCake, C:\ProgramData\Tarma Installer\{C4ED781C-7394-4906-AAFF-D6AB64FF7C38}\_Setup.dll, Quarantined, [c627052dcac150e664bc42851aea56aa],
PUP.Optional.WebCake, C:\ProgramData\Tarma Installer\{C4ED781C-7394-4906-AAFF-D6AB64FF7C38}\_Setupx.dll, Quarantined, [c627052dcac150e664bc42851aea56aa],
PUP.Optional.OpenCandy, C:\Users\Richard\AppData\Roaming\OpenCandy\5D93151059CA47F89553302DEA9F5823\TuneUpUtilities2013-2200319-p3v0.exe, Quarantined, [8469959dbccf7fb77e3af20a9b679967],
PUP.Optional.OpenCandy, C:\Users\Richard\AppData\Roaming\OpenCandy\5D93151059CA47F89553302DEA9F5823\TuneUpUtilities2013-2200319_en-US.exe, Quarantined, [8469959dbccf7fb77e3af20a9b679967],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\addon.ico, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\DefaultTabBHO.cfg, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\DefaultTabUninstaller.exe, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\DefaultTabWrap.dll, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\DefaultTabWrap64.dll, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\DT.ico, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\searchhere.ico, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.DefaultTab, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\defaulttab\defaulttab\uninstalldt.exe, Quarantined, [eb02bd75eba0cb6ba81961b31fe4926e],
PUP.Optional.Iminent, C:\Users\Richard\AppData\Roaming\IminentToolbar\sqlite3.dll, Quarantined, [36b7a48e5e2d4aec469f13078e757a86],
Physical Sectors: 0
(No malicious items detected)
(end)
následovala instavace AVIRA a kompletní scan:
Avira Free Antivirus
Report file date: 2. novembra 2015 11:54
The program is running as an unrestricted full version.
Online services are available.
Licensee : Avira Antivirus Free
Serial number : 0000149996-AVHOE-0000001
Platform : Windows 7 Professional
Windows version : (Service Pack 1) [6.1.7601]
Boot mode : Normally booted
Username : Richard
Computer name : NBRICHARD
Version information:
BUILD.DAT : 15.0.8.658 91859 Bytes 4/9/2015 15:05:00
AVSCAN.EXE : 15.0.8.652 1014064 Bytes 11/2/2015 10:43:06
AVSCANRC.DLL : 15.0.8.652 54064 Bytes 4/9/2015 14:05:31
LUKE.DLL : 15.0.8.652 60664 Bytes 4/9/2015 14:05:37
AVSCPLR.DLL : 15.0.8.652 93488 Bytes 4/9/2015 14:05:31
REPAIR.DLL : 15.0.8.652 365360 Bytes 4/9/2015 14:05:30
REPAIR.RDF : 1.0.6.96 831229 Bytes 4/9/2015 14:05:46
AVREG.DLL : 15.0.8.652 265464 Bytes 4/9/2015 14:05:30
AVLODE.DLL : 15.0.8.656 645368 Bytes 4/9/2015 14:05:29
AVLODE.RDF : 14.0.4.60 79192 Bytes 4/9/2015 14:05:29
XBV00018.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00019.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00020.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00021.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00022.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00023.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00024.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00025.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00026.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00027.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00028.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00029.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00030.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00031.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00032.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00033.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00034.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00035.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00036.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00037.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00038.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00039.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00040.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00041.VDF : 8.11.165.190 2048 Bytes 8/7/2014 14:05:46
XBV00161.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00162.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00163.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00164.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00165.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00166.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00167.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00168.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00169.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00170.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00171.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00172.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00173.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00174.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00175.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00176.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00177.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00178.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00179.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00180.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00181.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00182.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00183.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00184.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00185.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00186.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00187.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00188.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00189.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00190.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00191.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00192.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00193.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00194.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00195.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00196.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00197.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00198.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00199.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00200.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00201.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00202.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00203.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00204.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00205.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00206.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00207.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00208.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00209.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00210.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00211.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00212.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00213.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00214.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00215.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00216.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00217.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00218.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00219.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00220.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00221.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00222.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00223.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00224.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00225.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00226.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00227.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00228.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00229.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00230.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00231.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00232.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00233.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00234.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00235.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00236.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00237.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00238.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00239.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00240.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00241.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00242.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00243.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00244.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00245.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00246.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00247.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00248.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00249.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00250.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00251.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00252.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00253.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00254.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00255.VDF : 8.11.219.166 2048 Bytes 3/25/2015 14:05:46
XBV00000.VDF : 7.11.70.0 66736640 Bytes 4/4/2013 14:05:46
XBV00001.VDF : 7.11.74.226 2201600 Bytes 4/30/2013 14:05:46
XBV00002.VDF : 7.11.80.60 2751488 Bytes 5/28/2013 14:05:46
XBV00003.VDF : 7.11.85.214 2162688 Bytes 6/21/2013 14:05:46
XBV00004.VDF : 7.11.91.176 3903488 Bytes 7/23/2013 14:05:46
XBV00005.VDF : 7.11.98.186 6822912 Bytes 8/29/2013 14:05:46
XBV00006.VDF : 7.11.139.38 15708672 Bytes 3/27/2014 14:05:46
XBV00007.VDF : 7.11.152.100 4193792 Bytes 6/2/2014 14:05:46
XBV00008.VDF : 8.11.165.192 4251136 Bytes 8/7/2014 14:05:46
XBV00009.VDF : 8.11.172.30 2094080 Bytes 9/15/2014 14:05:46
XBV00010.VDF : 8.11.178.32 1581056 Bytes 10/14/2014 14:05:46
XBV00011.VDF : 8.11.184.50 2178560 Bytes 11/11/2014 14:05:46
XBV00012.VDF : 8.11.190.32 1876992 Bytes 12/3/2014 14:05:46
XBV00013.VDF : 8.11.201.28 2973696 Bytes 1/14/2015 14:05:46
XBV00014.VDF : 8.11.206.252 2695680 Bytes 2/4/2015 14:05:46
XBV00015.VDF : 8.11.213.84 3175936 Bytes 3/3/2015 14:05:46
XBV00016.VDF : 8.11.213.176 212480 Bytes 3/5/2015 14:05:46
XBV00017.VDF : 8.11.219.166 2033664 Bytes 3/25/2015 14:05:46
XBV00042.VDF : 8.11.219.194 36864 Bytes 3/25/2015 14:05:46
XBV00043.VDF : 8.11.219.218 7168 Bytes 3/25/2015 14:05:46
XBV00044.VDF : 8.11.219.242 6144 Bytes 3/25/2015 14:05:46
XBV00045.VDF : 8.11.219.244 7680 Bytes 3/25/2015 14:05:46
XBV00046.VDF : 8.11.219.246 5632 Bytes 3/26/2015 14:05:46
XBV00047.VDF : 8.11.219.250 38400 Bytes 3/26/2015 14:05:46
XBV00048.VDF : 8.11.219.252 14336 Bytes 3/26/2015 14:05:46
XBV00049.VDF : 8.11.219.254 18432 Bytes 3/26/2015 14:05:46
XBV00050.VDF : 8.11.220.0 7680 Bytes 3/26/2015 14:05:46
XBV00051.VDF : 8.11.220.2 10240 Bytes 3/26/2015 14:05:46
XBV00052.VDF : 8.11.220.6 2048 Bytes 3/26/2015 14:05:46
XBV00053.VDF : 8.11.220.8 2560 Bytes 3/26/2015 14:05:46
XBV00054.VDF : 8.11.220.10 17408 Bytes 3/26/2015 14:05:46
XBV00055.VDF : 8.11.220.12 2048 Bytes 3/26/2015 14:05:46
XBV00056.VDF : 8.11.220.16 23040 Bytes 3/26/2015 14:05:46
XBV00057.VDF : 8.11.220.18 8704 Bytes 3/26/2015 14:05:46
XBV00058.VDF : 8.11.220.22 30720 Bytes 3/27/2015 14:05:46
XBV00059.VDF : 8.11.220.24 6144 Bytes 3/27/2015 14:05:46
XBV00060.VDF : 8.11.220.26 2048 Bytes 3/27/2015 14:05:46
XBV00061.VDF : 8.11.220.48 9728 Bytes 3/27/2015 14:05:46
XBV00062.VDF : 8.11.220.68 14848 Bytes 3/27/2015 14:05:46
XBV00063.VDF : 8.11.220.88 23552 Bytes 3/27/2015 14:05:46
XBV00064.VDF : 8.11.220.108 9216 Bytes 3/27/2015 14:05:46
XBV00065.VDF : 8.11.220.110 15360 Bytes 3/27/2015 14:05:46
XBV00066.VDF : 8.11.220.116 27648 Bytes 3/27/2015 14:05:46
XBV00067.VDF : 8.11.220.118 10752 Bytes 3/27/2015 14:05:46
XBV00068.VDF : 8.11.220.120 6144 Bytes 3/27/2015 14:05:46
XBV00069.VDF : 8.11.220.122 62976 Bytes 3/28/2015 14:05:46
XBV00070.VDF : 8.11.220.124 2048 Bytes 3/28/2015 14:05:46
XBV00071.VDF : 8.11.220.126 9728 Bytes 3/28/2015 14:05:46
XBV00072.VDF : 8.11.220.128 20992 Bytes 3/28/2015 14:05:46
XBV00073.VDF : 8.11.220.148 54784 Bytes 3/29/2015 14:05:46
XBV00074.VDF : 8.11.220.176 7680 Bytes 3/29/2015 14:05:46
XBV00075.VDF : 8.11.220.196 32768 Bytes 3/30/2015 14:05:46
XBV00076.VDF : 8.11.220.216 2048 Bytes 3/30/2015 14:05:46
XBV00077.VDF : 8.11.220.236 9728 Bytes 3/30/2015 14:05:46
XBV00078.VDF : 8.11.220.238 15360 Bytes 3/30/2015 14:05:46
XBV00079.VDF : 8.11.220.240 9216 Bytes 3/30/2015 14:05:46
XBV00080.VDF : 8.11.220.242 4608 Bytes 3/30/2015 14:05:46
XBV00081.VDF : 8.11.220.248 58368 Bytes 3/30/2015 14:05:46
XBV00082.VDF : 8.11.220.250 2048 Bytes 3/30/2015 14:05:46
XBV00083.VDF : 8.11.220.252 2048 Bytes 3/30/2015 14:05:46
XBV00084.VDF : 8.11.220.254 39424 Bytes 3/31/2015 14:05:46
XBV00085.VDF : 8.11.221.0 2048 Bytes 3/31/2015 14:05:46
XBV00086.VDF : 8.11.221.6 40960 Bytes 3/31/2015 14:05:46
XBV00087.VDF : 8.11.221.8 2048 Bytes 3/31/2015 14:05:46
XBV00088.VDF : 8.11.221.10 16896 Bytes 3/31/2015 14:05:46
XBV00089.VDF : 8.11.221.30 10240 Bytes 3/31/2015 14:05:46
XBV00090.VDF : 8.11.221.48 29184 Bytes 3/31/2015 14:05:46
XBV00091.VDF : 8.11.221.50 2048 Bytes 3/31/2015 14:05:46
XBV00092.VDF : 8.11.221.70 27648 Bytes 3/31/2015 14:05:46
XBV00093.VDF : 8.11.221.88 3584 Bytes 3/31/2015 14:05:46
XBV00094.VDF : 8.11.221.90 32256 Bytes 3/31/2015 14:05:46
XBV00095.VDF : 8.11.221.94 34816 Bytes 4/1/2015 14:05:46
XBV00096.VDF : 8.11.221.96 8704 Bytes 4/1/2015 14:05:46
XBV00097.VDF : 8.11.221.100 8704 Bytes 4/1/2015 14:05:46
XBV00098.VDF : 8.11.221.102 7680 Bytes 4/1/2015 14:05:46
XBV00099.VDF : 8.11.221.106 39936 Bytes 4/1/2015 14:05:46
XBV00100.VDF : 8.11.221.124 8704 Bytes 4/1/2015 14:05:46
XBV00101.VDF : 8.11.221.142 12288 Bytes 4/1/2015 14:05:46
XBV00102.VDF : 8.11.221.160 7168 Bytes 4/1/2015 14:05:46
XBV00103.VDF : 8.11.221.178 7168 Bytes 4/1/2015 14:05:46
XBV00104.VDF : 8.11.221.196 8192 Bytes 4/1/2015 14:05:46
XBV00105.VDF : 8.11.221.200 33280 Bytes 4/2/2015 14:05:46
XBV00106.VDF : 8.11.221.202 2048 Bytes 4/2/2015 14:05:46
XBV00107.VDF : 8.11.221.204 28160 Bytes 4/2/2015 14:05:46
XBV00108.VDF : 8.11.221.206 2048 Bytes 4/2/2015 14:05:46
XBV00109.VDF : 8.11.221.208 33792 Bytes 4/2/2015 14:05:46
XBV00110.VDF : 8.11.221.210 24576 Bytes 4/2/2015 14:05:46
XBV00111.VDF : 8.11.221.214 18944 Bytes 4/2/2015 14:05:46
XBV00112.VDF : 8.11.221.216 11264 Bytes 4/2/2015 14:05:46
XBV00113.VDF : 8.11.221.220 29696 Bytes 4/3/2015 14:05:46
XBV00114.VDF : 8.11.221.222 2048 Bytes 4/3/2015 14:05:46
XBV00115.VDF : 8.11.221.224 31232 Bytes 4/3/2015 14:05:46
XBV00116.VDF : 8.11.221.242 3584 Bytes 4/3/2015 14:05:46
XBV00117.VDF : 8.11.222.2 11776 Bytes 4/3/2015 14:05:46
XBV00118.VDF : 8.11.222.18 7168 Bytes 4/3/2015 14:05:46
XBV00119.VDF : 8.11.222.34 6656 Bytes 4/3/2015 14:05:46
XBV00120.VDF : 8.11.222.38 15360 Bytes 4/3/2015 14:05:46
XBV00121.VDF : 8.11.222.40 5632 Bytes 4/3/2015 14:05:46
XBV00122.VDF : 8.11.222.42 6144 Bytes 4/3/2015 14:05:46
XBV00123.VDF : 8.11.222.44 46592 Bytes 4/4/2015 14:05:46
XBV00124.VDF : 8.11.222.46 2048 Bytes 4/4/2015 14:05:46
XBV00125.VDF : 8.11.222.48 2048 Bytes 4/4/2015 14:05:46
XBV00126.VDF : 8.11.222.50 36864 Bytes 4/4/2015 14:05:46
XBV00127.VDF : 8.11.222.52 2048 Bytes 4/4/2015 14:05:46
XBV00128.VDF : 8.11.222.68 68096 Bytes 4/5/2015 14:05:46
XBV00129.VDF : 8.11.222.84 2048 Bytes 4/5/2015 14:05:46
XBV00130.VDF : 8.11.222.116 18432 Bytes 4/5/2015 14:05:46
XBV00131.VDF : 8.11.222.132 62464 Bytes 4/6/2015 14:05:46
XBV00132.VDF : 8.11.222.134 10752 Bytes 4/6/2015 14:05:46
XBV00133.VDF : 8.11.222.138 2048 Bytes 4/6/2015 14:05:46
XBV00134.VDF : 8.11.222.154 13312 Bytes 4/6/2015 14:05:46
XBV00135.VDF : 8.11.222.156 8704 Bytes 4/6/2015 14:05:46
XBV00136.VDF : 8.11.222.158 9216 Bytes 4/6/2015 14:05:46
XBV00137.VDF : 8.11.222.160 2048 Bytes 4/6/2015 14:05:46
XBV00138.VDF : 8.11.222.164 18432 Bytes 4/6/2015 14:05:46
XBV00139.VDF : 8.11.222.166 10752 Bytes 4/6/2015 14:05:46
XBV00140.VDF : 8.11.222.182 7168 Bytes 4/6/2015 14:05:46
XBV00141.VDF : 8.11.222.196 8704 Bytes 4/7/2015 14:05:46
XBV00142.VDF : 8.11.222.212 29696 Bytes 4/7/2015 14:05:46
XBV00143.VDF : 8.11.222.226 6656 Bytes 4/7/2015 14:05:46
XBV00144.VDF : 8.11.222.228 10752 Bytes 4/7/2015 14:05:46
XBV00145.VDF : 8.11.222.230 4096 Bytes 4/7/2015 14:05:46
XBV00146.VDF : 8.11.222.232 5120 Bytes 4/7/2015 14:05:46
XBV00147.VDF : 8.11.222.234 5632 Bytes 4/7/2015 14:05:46
XBV00148.VDF : 8.11.222.240 34816 Bytes 4/7/2015 14:05:46
XBV00149.VDF : 8.11.222.242 2048 Bytes 4/7/2015 14:05:46
XBV00150.VDF : 8.11.222.244 3584 Bytes 4/7/2015 14:05:46
XBV00151.VDF : 8.11.222.246 24576 Bytes 4/7/2015 14:05:46
XBV00152.VDF : 8.11.222.250 37888 Bytes 4/8/2015 14:05:46
XBV00153.VDF : 8.11.223.8 12800 Bytes 4/8/2015 14:05:46
XBV00154.VDF : 8.11.223.22 2048 Bytes 4/8/2015 14:05:46
XBV00155.VDF : 8.11.223.36 10752 Bytes 4/8/2015 14:05:46
XBV00156.VDF : 8.11.223.52 35328 Bytes 4/8/2015 14:05:46
XBV00157.VDF : 8.11.223.66 7168 Bytes 4/8/2015 14:05:46
XBV00158.VDF : 8.11.223.68 2048 Bytes 4/8/2015 14:05:46
XBV00159.VDF : 8.11.223.72 15360 Bytes 4/8/2015 14:05:46
XBV00160.VDF : 8.11.223.74 7168 Bytes 4/9/2015 14:05:46
LOCAL000.VDF : 8.11.223.74 126684672 Bytes 4/9/2015 10:45:18
Engine version : 8.3.30.10
AEVDF.DLL : 8.3.1.6 133992 Bytes 4/9/2015 14:05:27
AESCRIPT.DLL : 8.2.2.58 560248 Bytes 4/9/2015 14:05:27
AESCN.DLL : 8.3.2.2 139456 Bytes 4/9/2015 14:05:27
AESBX.DLL : 8.2.20.34 1615784 Bytes 4/9/2015 14:05:27
AERDL.DLL : 8.2.1.20 731040 Bytes 4/9/2015 14:05:27
AEPACK.DLL : 8.4.0.62 793456 Bytes 4/9/2015 14:05:27
AEOFFICE.DLL : 8.3.1.16 359280 Bytes 4/9/2015 14:05:27
AEMOBILE.DLL : 8.1.7.0 281456 Bytes 4/9/2015 14:05:27
AEHEUR.DLL : 8.1.4.1612 8244344 Bytes 4/9/2015 14:05:27
AEHELP.DLL : 8.3.2.0 281456 Bytes 4/9/2015 14:05:27
AEGEN.DLL : 8.1.7.40 456608 Bytes 4/9/2015 14:05:27
AEEXP.DLL : 8.4.2.70 255904 Bytes 4/9/2015 14:05:27
AEEMU.DLL : 8.1.3.4 399264 Bytes 4/9/2015 14:05:27
AEDROID.DLL : 8.4.3.116 1050536 Bytes 4/9/2015 14:05:27
AECORE.DLL : 8.3.4.0 243624 Bytes 4/9/2015 14:05:27
AEBB.DLL : 8.1.2.0 60448 Bytes 4/9/2015 14:05:27
AVWINLL.DLL : 15.0.8.652 25904 Bytes 4/9/2015 14:05:31
AVPREF.DLL : 15.0.8.652 53248 Bytes 4/9/2015 14:05:30
AVREP.DLL : 15.0.8.652 221432 Bytes 4/9/2015 14:05:30
AVARKT.DLL : 15.0.8.652 228088 Bytes 4/9/2015 14:05:28
AVEVTLOG.DLL : 15.0.8.652 183600 Bytes 4/9/2015 14:05:28
SQLITE3.DLL : 15.0.8.652 456440 Bytes 4/9/2015 14:05:39
AVSMTP.DLL : 15.0.8.652 79360 Bytes 4/9/2015 14:05:31
NETNT.DLL : 15.0.8.652 17352 Bytes 4/9/2015 14:05:37
RCIMAGE.DLL : 15.0.8.652 4865328 Bytes 4/9/2015 14:05:38
RCTEXT.DLL : 15.0.8.652 76744 Bytes 4/9/2015 14:05:38
Configuration settings for the scan:
Jobname.............................: Local Drives
Configuration file..................: C:\Program Files (x86)\Avira\AntiVir Desktop\alldrives.avp
Reporting...........................: default
Primary action......................: Interactive
Secondary action....................: Ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:, E:,
Process scan........................: on
Scan registry.......................: on
Search for rootkits.................: off
Integrity checking of system files..: off
Scan all files......................: Intelligent file selection
Scan archives.......................: on
Limit recursion depth...............: 20
Smart extensions....................: on
Macrovirus heuristic................: on
File heuristic......................: extended
Start of the scan: 2. novembra 2015 11:54
Start scanning boot sectors:
Boot sector 'HDD0(C:)'
[INFO] No virus was found!
The scan of running processes will be started:
Scan process 'svchost.exe' - '57' Module(s) have been scanned
Scan process 'launcher_service.exe' - '38' Module(s) have been scanned
Scan process 'nvvsvc.exe' - '34' Module(s) have been scanned
Scan process 'svchost.exe' - '40' Module(s) have been scanned
Scan process 'cmdagent.exe' - '106' Module(s) have been scanned
Scan process 'svchost.exe' - '83' Module(s) have been scanned
Scan process 'svchost.exe' - '81' Module(s) have been scanned
Scan process 'svchost.exe' - '113' Module(s) have been scanned
Scan process 'svchost.exe' - '82' Module(s) have been scanned
Scan process 'svchost.exe' - '172' Module(s) have been scanned
Scan process 'WUDFHost.exe' - '34' Module(s) have been scanned
Scan process 'WLANExt.exe' - '83' Module(s) have been scanned
Scan process 'conhost.exe' - '21' Module(s) have been scanned
Scan process 'svchost.exe' - '71' Module(s) have been scanned
Scan process 'spoolsv.exe' - '95' Module(s) have been scanned
Scan process 'taskhost.exe' - '61' Module(s) have been scanned
Scan process 'btwdins.exe' - '37' Module(s) have been scanned
Scan process 'chromodo_updater.exe' - '64' Module(s) have been scanned
Scan process 'Dwm.exe' - '35' Module(s) have been scanned
Scan process 'svchost.exe' - '49' Module(s) have been scanned
Scan process 'dtsrvc.exe' - '30' Module(s) have been scanned
Scan process 'GeekBuddyRSP.exe' - '46' Module(s) have been scanned
Scan process 'taskeng.exe' - '32' Module(s) have been scanned
Scan process 'GoogleUpdate.exe' - '64' Module(s) have been scanned
Scan process 'taskeng.exe' - '34' Module(s) have been scanned
Scan process 'taskeng.exe' - '34' Module(s) have been scanned
Scan process 'AccountService.exe' - '93' Module(s) have been scanned
Scan process 'LMS.exe' - '38' Module(s) have been scanned
Scan process 'Explorer.EXE' - '170' Module(s) have been scanned
Scan process 'cistray.exe' - '60' Module(s) have been scanned
Scan process 'SPMgr.exe' - '62' Module(s) have been scanned
Scan process 'pdisrvc.exe' - '36' Module(s) have been scanned
Scan process 'RegSrvc.exe' - '36' Module(s) have been scanned
Scan process 'svchost.exe' - '36' Module(s) have been scanned
Scan process 'WLIDSVC.EXE' - '58' Module(s) have been scanned
Scan process 'EvtEng.exe' - '70' Module(s) have been scanned
Scan process 'WLIDSvcM.exe' - '21' Module(s) have been scanned
Scan process 'unsecapp.exe' - '32' Module(s) have been scanned
Scan process 'svchost.exe' - '41' Module(s) have been scanned
Scan process 'wmiprvse.exe' - '51' Module(s) have been scanned
Scan process 'SearchIndexer.exe' - '58' Module(s) have been scanned
Scan process 'GWX.exe' - '41' Module(s) have been scanned
Scan process 'iFrmewrk.exe' - '75' Module(s) have been scanned
Scan process 'igfxpers.exe' - '52' Module(s) have been scanned
Scan process 'igfxtray.exe' - '33' Module(s) have been scanned
Scan process 'hkcmd.exe' - '32' Module(s) have been scanned
Scan process 'flux.exe' - '86' Module(s) have been scanned
Scan process 'cavwp.exe' - '50' Module(s) have been scanned
Scan process 'unsecapp.exe' - '33' Module(s) have been scanned
Scan process 'esrv_svc.exe' - '27' Module(s) have been scanned
Scan process 'svchost.exe' - '38' Module(s) have been scanned
Scan process 'cis.exe' - '74' Module(s) have been scanned
Scan process 'VAIOUpdt.exe' - '55' Module(s) have been scanned
Scan process 'vuagent.exe' - '40' Module(s) have been scanned
Scan process 'IAStorDataMgrSvc.exe' - '53' Module(s) have been scanned
Scan process 'UNS.exe' - '62' Module(s) have been scanned
Scan process 'SPMService.exe' - '59' Module(s) have been scanned
Scan process 'TrustedInstaller.exe' - '52' Module(s) have been scanned
Scan process 'VCSystemTray.exe' - '173' Module(s) have been scanned
Scan process 'VCService.exe' - '39' Module(s) have been scanned
Scan process 'VCAgent.exe' - '188' Module(s) have been scanned
Scan process 'wmiprvse.exe' - '64' Module(s) have been scanned
Scan process 'avgnt.exe' - '104' Module(s) have been scanned
Scan process 'avguard.exe' - '135' Module(s) have been scanned
Scan process 'avshadow.exe' - '34' Module(s) have been scanned
Scan process 'sched.exe' - '66' Module(s) have been scanned
Scan process 'msiexec.exe' - '58' Module(s) have been scanned
Scan process 'taskhost.exe' - '36' Module(s) have been scanned
Scan process 'Avira.OE.ServiceHost.exe' - '128' Module(s) have been scanned
Scan process 'Avira.OE.Systray.exe' - '121' Module(s) have been scanned
Scan process 'svchost.exe' - '32' Module(s) have been scanned
Scan process 'avcenter.exe' - '146' Module(s) have been scanned
Scan process 'igfxsrvc.exe' - '33' Module(s) have been scanned
Scan process 'avscan.exe' - '114' Module(s) have been scanned
Scan process 'smss.exe' - '2' Module(s) have been scanned
Scan process 'csrss.exe' - '19' Module(s) have been scanned
Scan process 'wininit.exe' - '26' Module(s) have been scanned
Scan process 'csrss.exe' - '19' Module(s) have been scanned
Scan process 'services.exe' - '39' Module(s) have been scanned
Scan process 'lsass.exe' - '77' Module(s) have been scanned
Scan process 'lsm.exe' - '28' Module(s) have been scanned
Scan process 'winlogon.exe' - '36' Module(s) have been scanned
Starting to scan executable files (registry):
The registry was scanned ( '3798' files ).
Starting the file scan:
Begin scan in 'C:\'
C:\ProgramData\dtdata\R002.exe
[DETECTION] Contains patterns of software PUA/DefaultTab.196608.2
Begin scan in 'E:\' <Princess>
Beginning disinfection:
C:\ProgramData\dtdata\R002.exe
[DETECTION] Contains patterns of software PUA/DefaultTab.196608.2
[NOTE] The file was moved to the quarantine directory under the name '5013f5ec.qua'!
End of the scan: 2. novembra 2015 13:25
Used time: 1:30:18 Hour(s)
The scan has been done completely.
36470 Scanned directories
753032 Files were scanned
1 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 Files were deleted
0 Viruses and unwanted programs were repaired
1 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
753031 Files not concerned
10359 Archives were scanned
0 Warnings
1 Notes
poté ADWCleaner
# AdwCleaner v5.016 - Logfile created 02/11/2015 at 13:38:59
# Updated 01/11/2015 by Xplode
# Database : 2015-11-01.2 [Local]
# Operating system : Windows 7 Professional Service Pack 1 (x64)
# Username : Richard - NBRICHARD
# Running from : C:\Users\Richard\Desktop\adwcleaner_5.016.exe
# Option : Cleaning
# Support : http://toolslib.net/forum
***** [ Services ] *****
***** [ Folders ] *****
[-] Folder Deleted : C:\Program Files\Kromtech
[-] Folder Deleted : C:\ProgramData\apn
[-] Folder Deleted : C:\ProgramData\Babylon
[-] Folder Deleted : C:\ProgramData\Tarma Installer
[-] Folder Deleted : C:\ProgramData\dtdata
[-] Folder Deleted : C:\ProgramData\Kromtech
[-] Folder Deleted : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Rich Media Player
[-] Folder Deleted : C:\Users\Richard\AppData\Local\Rich Media Player
[-] Folder Deleted : C:\Users\Richard\AppData\LocalLow\IminentToolbar
[-] Folder Deleted : C:\Users\Richard\AppData\Roaming\Babylon
[-] Folder Deleted : C:\Windows\SysWOW64\config\systemprofile\AppData\Local\PackageAware
***** [ Files ] *****
***** [ DLLs ] *****
***** [ Shortcuts ] *****
***** [ Scheduled tasks ] *****
[-] Task Deleted : DefaultCheck
[-] Task Deleted : DefaultReg
***** [ Registry ] *****
[-] Key Deleted : HKLM\SOFTWARE\Classes\Prod.cap
[-] Key Deleted : HKCU\Software\Classes\CLSID\{FB684D26-01F4-4D9D-87CB-F486BEBA56DC}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{7825CFB6-490A-436B-9F26-4A7B5CFC01A9}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{F511AFDB-726E-4458-90E7-1ECB97406544}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{FB684D26-01F4-4D9D-87CB-F486BEBA56DC}
[-] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{7D86A08B-0A8F-4BE0-B693-F05E6947E780}
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7825CFB6-490A-436B-9F26-4A7B5CFC01A9}
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A7DF592F-6E2A-45C4-9A87-4BD217D714ED}
[-] Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{7825CFB6-490A-436B-9F26-4A7B5CFC01A9}
[-] Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{A7DF592F-6E2A-45C4-9A87-4BD217D714ED}
[-] Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{7825CFB6-490A-436B-9F26-4A7B5CFC01A9}
[-] Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{A7DF592F-6E2A-45C4-9A87-4BD217D714ED}
[-] Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{7825CFB6-490A-436B-9F26-4A7B5CFC01A9}
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{7825CFB6-490A-436B-9F26-4A7B5CFC01A9}
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Extensions\{A7DF592F-6E2A-45C4-9A87-4BD217D714ED}
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7825CFB6-490A-436B-9F26-4A7B5CFC01A9}
[-] Key Deleted : HKU\.DEFAULT\Software\VNT
[-] Key Deleted : HKCU\Software\Softonic
[-] Key Deleted : HKLM\SOFTWARE\GeekBuddyRSP
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\sl-dlc
[-] Key Deleted : [x64] HKLM\SOFTWARE\Kromtech
***** [ Web browsers ] *****
[-] [C:\Users\Richard\AppData\Local\Google\Chrome\User Data\Default\Web Data] [Search Provider] Deleted : aol.com
[-] [C:\Users\Richard\AppData\Local\Google\Chrome\User Data\Default\Web Data] [Search Provider] Deleted : ask.com
[-] [C:\Users\Richard\AppData\Local\Google\Chrome\User Data\Default\Web Data] [Search Provider] Deleted : swish.en.softonic.com
*************************
:: "Tracing" keys removed
:: Winsock settings cleared
########## EOF - C:\AdwCleaner\AdwCleaner[C1].txt - [3736 bytes] ##########
pak následoval RogueKiller:
RogueKiller V10.11.4.0 [Nov 2 2015] (Free) by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Website : http://www.adlice.com/software/roguekiller/
Blog : http://www.adlice.com
Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Started in : Normal mode
User : Richard [Administrator]
Started from : C:\Users\Richard\Desktop\RogueKiller.exe
Mode : Delete -- Date : 11/02/2015 14:18:42
¤¤¤ Processes : 0 ¤¤¤
¤¤¤ Registry : 11 ¤¤¤
[PUP] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\KromtechAccountService ("C:\Program Files\Kromtech\Common\AccountService.exe") -> Deleted
[PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\KromtechAccountService ("C:\Program Files\Kromtech\Common\AccountService.exe") -> Deleted
[PUP] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\KromtechAccountService ("C:\Program Files\Kromtech\Common\AccountService.exe") -> Deleted
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{811146CE-350F-4163-A078-78B21742B62E} | DhcpNameServer : 217.77.165.81 217.77.161.131 ([X][X]) -> Replaced ()
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{DEB75603-BAEF-42C2-9C62-F22FF89827B3} | DhcpNameServer : 10.0.0.15 10.0.0.138 ([X][X]) -> Replaced ()
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{811146CE-350F-4163-A078-78B21742B62E} | DhcpNameServer : 217.77.165.81 217.77.161.131 ([X][X]) -> Replaced ()
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{DEB75603-BAEF-42C2-9C62-F22FF89827B3} | DhcpNameServer : 10.0.0.15 10.0.0.138 ([X][X]) -> Replaced ()
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{811146CE-350F-4163-A078-78B21742B62E} | DhcpNameServer : 217.77.165.81 217.77.161.131 ([X][X]) -> Replaced ()
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{DEB75603-BAEF-42C2-9C62-F22FF89827B3} | DhcpNameServer : 10.0.0.15 10.0.0.138 ([X][X]) -> Replaced ()
[PUM.StartMenu] (X64) HKEY_USERS\S-1-5-21-2697576798-3047597159-1036163815-1005\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowMyGames : 0 -> Replaced (1)
[PUM.StartMenu] (X86) HKEY_USERS\S-1-5-21-2697576798-3047597159-1036163815-1005\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowMyGames : 0 -> Replaced (1)
¤¤¤ Tasks : 0 ¤¤¤
¤¤¤ Files : 1 ¤¤¤
[PUP][Folder] C:\ProgramData\{C4ABDBC8-1C81-42C9-BFFC-4A68511E9E4F} -> Deleted
[PUP][File] C:\ProgramData\{C4ABDBC8-1C81-42C9-BFFC-4A68511E9E4F}\{D3742F82-1C1A-4DCC-ABBD-0E831C0185CC}.msi -> Deleted
¤¤¤ Hosts File : 1 ¤¤¤
[C:\Windows\System32\drivers\etc\hosts] 127.0.0.1 localhost
¤¤¤ Antirootkit : 0 (Driver: Not loaded [0xc000036b]) ¤¤¤
¤¤¤ Web browsers : 0 ¤¤¤
¤¤¤ MBR Check : ¤¤¤
+++++ PhysicalDrive0: +++++
--- User ---
[MBR] 624e722d5d2358e9be30290149d0b09f
[BSP] fde85cc8f7798e7b5e4a766cd45a535c : Windows Vista/7/8 MBR Code
Partition table:
0 - [XXXXXX] ACER (0x27) [VISIBLE] Offset (sectors): 2048 | Size: 12029 MB
1 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 24637440 | Size: 100 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
2 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 24842240 | Size: 598349 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
User = LL1 ... OK
User = LL2 ... OK
+++++ PhysicalDrive1: +++++
--- User ---
[MBR] 4997e18ca45e5487d109d2c61ef9564d
[BSP] 33a07a59d299ab4ea9f4ab0156f9d86f : Windows XP MBR Code
Partition table:
0 - [XXXXXX] FAT32-LBA (0xc) [VISIBLE] Offset (sectors): 8064 | Size: 7381 MB
User = LL1 ... OK
Error reading LL2 MBR! ([32] The request is not supported. )
Děkuji