Tak jsem dneska ráno zapnul PC a nešel net. Rogue Killer sice nic nenašel ale MBAR mi smazal toto. A po rebootu to našlo znovu. Je možné že by to byl falešný poplach?
Malwarebytes Anti-Rootkit BETA 1.9.3.1001
http://www.malwarebytes.org
Database version:
main: v2014.11.18.05
rootkit: v2014.11.12.01
Windows 10 x64 NTFS
Internet Explorer 11.674.15063.0
cunik.cz :: DESKTOP-JMFHIRU [administrator]
26.10.2017 9:08:26
mbar-log-2017-10-26 (09-08-26).txt
Scan type: Quick scan
Scan options enabled: Anti-Rootkit | Drivers | MBR | Physical Sectors | Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken
Scan options disabled:
Objects scanned: 318894
Time elapsed: 25 minute(s), 43 second(s)
Memory Processes Detected: 0
(No malicious items detected)
Memory Modules Detected: 0
(No malicious items detected)
Registry Keys Detected: 14
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\about.exe (Security.Hijack) -> Delete on reboot. [5fde5be2176582b49b707e73ba4920e0]
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\bdfvcl.exe (Security.Hijack) -> Delete on reboot. [b984c77693e93cfaef46d12130d316ea]
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\bdfvwiz.exe (Security.Hijack) -> Delete on reboot. [231aa09d2557b086d561de149271c937]
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\deloeminfs.exe (Security.Hijack) -> Delete on reboot. [d46984b9df9d95a1945026cccd367e82]
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\driverctrl.exe (Security.Hijack) -> Delete on reboot. [b88554e9fc80e65004edc131996a3cc4]
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\odsw.exe (Security.Hijack) -> Delete on reboot. [97a6f845adcf8fa7165f07ee966dd12f]
HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\setloadorder.exe (Security.Hijack) -> Delete on reboot. [bb82f548017b45f1ded1c23414efbc44]
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\about.exe (Security.Hijack) -> Delete on reboot. [b687a09deb91c472c74406eb887bc739]
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\bdfvcl.exe (Security.Hijack) -> Delete on reboot. [112c5de00379092d0a2b3bb71de60af6]
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\bdfvwiz.exe (Security.Hijack) -> Delete on reboot. [2b1265d8fd7f90a6f244569c8e75718f]
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\deloeminfs.exe (Security.Hijack) -> Delete on reboot. [72cb70cd1c60142204e006ec14ef6d93]
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\driverctrl.exe (Security.Hijack) -> Delete on reboot. [ef4e2f0e1f5d4ceac62ba052ea1947b9]
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\odsw.exe (Security.Hijack) -> Delete on reboot. [5ce15edf304c9b9b7afbad48e0237f81]
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\setloadorder.exe (Security.Hijack) -> Delete on reboot. [75c8ae8f790345f1f8b756a027dc57a9]
Registry Values Detected: 0
(No malicious items detected)
Registry Data Items Detected: 0
(No malicious items detected)
Folders Detected: 0
(No malicious items detected)
Files Detected: 0
(No malicious items detected)
Physical Sectors Detected: 0
(No malicious items detected)
(end)