@polymans
If you need help, all you have to do is to carefully read the instructions, set and post here the logs. If others can, so can you.
By looking at the logs I can determine whether or what maliciously is running on your machine or not, or if nothing else, I can determine the next steps in the detection and simular ...