Ir ao conteúdo
  • Cadastre-se

Delano Lima de Carvalho

Membros Juniores
  • Total de itens

    4
  • Registro em

  • Última visita

  • Qualificações

    N/D
  1. RogueKiller V12.13.6.0 [Oct 22 2018] (Free) por Adlice Software mail : http://www.adlice.com/contact/ Feedback : https://forum.adlice.com Site : http://www.adlice.com/download/roguekiller/ Blog : http://www.adlice.com Sistema Operacional : Windows 7 (6.1.7601 Service Pack 1) 32 bits version Iniciou : Modo normal Usuário : Raquel [Administrador] Started from : C:\Users\Raquel\Desktop\RogueKiller_portable32.exe Modo : Deletar -- Data : 10/29/2018 16:46:13 (Duration : 01:52:20) ¤¤¤ Processos : 0 ¤¤¤ ¤¤¤ Registro : 5 ¤¤¤ [PUP.Gen1] HKEY_USERS\S-1-5-21-81060879-2362427551-1445345640-1000\Software\csastats -> Deletado [Suspicious.Path] HKEY_USERS\S-1-5-21-81060879-2362427551-1445345640-1000\Software\Microsoft\Windows\CurrentVersion\Run | WallpaperSuite : "C:\Users\Raquel\AppData\Local\WallpaperSuite\WallpaperSuite.exe" /regrun [-] -> Deletado [PUM.HomePage] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Start Page : http://www.bing.com/search?FORM=INCOH1&PC=IC05&PTAG=ICO-24827ba4ac50aac7 -> Substituído (http://go.microsoft.com/fwlink/p/?LinkId=255141) [PUP.HackTool] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {10BC938A-C118-4698-A628-3C9617362211} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\Program Files\KMSpico\Service_KMS.exe|Name=KMS Emulator: Service_KMS.exe| [x] -> Deletado [PUP.HackTool] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {809A723D-F45E-4E04-B037-DD6917BB7F9D} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\Program Files\KMSpico\Service_KMS.exe|Name=KMS Emulator: Service_KMS.exe| [x] -> Deletado ¤¤¤ Tarefas : 1 ¤¤¤ [PUP.HackTool] \AutoPico Daily Restart -- "C:\Program Files\KMSpico\AutoPico.exe" (/silent) -> Deletado ¤¤¤ Arquivos : 2 ¤¤¤ [PUP.uTorrentAds][Arquivo] C:\Users\Raquel\AppData\Roaming\uTorrent\updates\3.5.3_44428\utorrentie.exe -> Deletado [PUP.HackTool][Pasta] C:\Program Files\KMSpico -> Deletado [PUP.HackTool][Arquivo] C:\Program Files\KMSpico\logs\Service_KMS.log -> Deletado [PUP.HackTool][Pasta] C:\Program Files\KMSpico\logs -> Deletado ¤¤¤ WMI : 0 ¤¤¤ ¤¤¤ Arquivos de hosts : 0 ¤¤¤ ¤¤¤ Antirootkit : 0 (Driver: Carregado) ¤¤¤ ¤¤¤ Navegadores : 0 ¤¤¤ ¤¤¤ Verificação da MBR : ¤¤¤ +++++ PhysicalDrive0: Hitachi HTS545032B9A300 ATA Device +++++ --- User --- [MBR] 49ff733fd98d6d01fa22367c91624e23 [BSP] 56d0e7e45e95afb6889ef379a6549b8d : Windows Vista/7/8 MBR Code Partition table: 0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader] 1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 305143 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader] User = LL1 ... OK User = LL2 ... OK
  2. RogueKiller V12.13.6.0 [Oct 22 2018] (Free) por Adlice Software mail : http://www.adlice.com/contact/ Feedback : https://forum.adlice.com Site : http://www.adlice.com/download/roguekiller/ Blog : http://www.adlice.com Sistema Operacional : Windows 7 (6.1.7601 Service Pack 1) 32 bits version Iniciou : Modo normal Usuário : Raquel [Administrador] Started from : C:\Users\Raquel\Desktop\RogueKiller_portable32.exe Modo : Escanear -- Data : 10/27/2018 09:57:40 (Duration : 01:21:03) ¤¤¤ Processos : 0 ¤¤¤ ¤¤¤ Registro : 5 ¤¤¤ [PUP.Gen1] HKEY_USERS\S-1-5-21-81060879-2362427551-1445345640-1000\Software\csastats -> Encontrado [Suspicious.Path] HKEY_USERS\S-1-5-21-81060879-2362427551-1445345640-1000\Software\Microsoft\Windows\CurrentVersion\Run | WallpaperSuite : "C:\Users\Raquel\AppData\Local\WallpaperSuite\WallpaperSuite.exe" /regrun [-] -> Encontrado [PUM.HomePage] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main | Start Page : http://www.bing.com/search?FORM=INCOH1&PC=IC05&PTAG=ICO-24827ba4ac50aac7 -> Encontrado [PUP.HackTool] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {10BC938A-C118-4698-A628-3C9617362211} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\Program Files\KMSpico\Service_KMS.exe|Name=KMS Emulator: Service_KMS.exe| [x] -> Encontrado [PUP.HackTool] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {809A723D-F45E-4E04-B037-DD6917BB7F9D} : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\Program Files\KMSpico\Service_KMS.exe|Name=KMS Emulator: Service_KMS.exe| [x] -> Encontrado ¤¤¤ Tarefas : 1 ¤¤¤ [PUP.HackTool] \AutoPico Daily Restart -- "C:\Program Files\KMSpico\AutoPico.exe" (/silent) -> Encontrado ¤¤¤ Arquivos : 2 ¤¤¤ [PUP.uTorrentAds][Arquivo] C:\Users\Raquel\AppData\Roaming\uTorrent\updates\3.5.3_44428\utorrentie.exe -> Encontrado [PUP.HackTool][Pasta] C:\Program Files\KMSpico -> Encontrado ¤¤¤ WMI : 0 ¤¤¤ ¤¤¤ Arquivos de hosts : 0 ¤¤¤ ¤¤¤ Antirootkit : 0 (Driver: Carregado) ¤¤¤ ¤¤¤ Navegadores : 0 ¤¤¤ ¤¤¤ Verificação da MBR : ¤¤¤ +++++ PhysicalDrive0: Hitachi HTS545032B9A300 ATA Device +++++ --- User --- [MBR] 49ff733fd98d6d01fa22367c91624e23 [BSP] 56d0e7e45e95afb6889ef379a6549b8d : Windows Vista/7/8 MBR Code Partition table: 0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader] 1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 305143 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader] User = LL1 ... OK User = LL2 ... OK
  3. Segue Logs: Malwarebytes www.malwarebytes.com -Detalhes de registro- Data da análise: 22/10/2018 Hora da análise: 02:55 Arquivo de registro: 0dc67212-d5bf-11e8-a8e6-1c7508c2001a.json -Informação do software- Versão: 3.6.1.2711 Versão de componentes: 1.0.463 Versão do pacote de definições: 1.0.7461 Licença: Versão de Avaliação -Informação do sistema- Sistema operacional: Windows 7 Service Pack 1 CPU: x86 Sistema de arquivos: NTFS Usuário: System -Resumo da análise- Tipo de análise: Análise de Ameaças Análise Iniciada Por: Agendamento Resultado: Concluído Objetos verificados: 183354 Ameaças detectadas: 45 Ameaças em quarentena: 45 Tempo decorrido: 24 min, 48 seg -Opções da análise- Memória: Habilitado Inicialização: Habilitado Sistema de arquivos: Habilitado Arquivos compactados: Habilitado Rootkits: Desabilitado Heurística: Habilitado PUP: Detectar PUM: Detectar -Detalhes da análise- Processo: 0 (Nenhum item malicioso detectado) Módulo: 0 (Nenhum item malicioso detectado) Chave de registro: 9 PUP.Optional.WinBing, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Search Provided by Bing nasit, Quarentena, [5378], [336089],1.0.7461 PUP.Optional.WinBing, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{26158849-2209-446B-8B01-784686D42EEE}, Quarentena, [5378], [336089],1.0.7461 PUP.Optional.WinBing, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{26158849-2209-446B-8B01-784686D42EEE}, Quarentena, [5378], [336089],1.0.7461 PUP.Optional.WinYahoo.TskLnk, HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Search Provided by Bing nasit, Quarentena, [3723], [-1],0.0.0 PUP.Optional.WinYahoo.TskLnk, HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{26158849-2209-446B-8B01-784686D42EEE}, Quarentena, [3723], [-1],0.0.0 PUP.Optional.WinYahoo.TskLnk, HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{26158849-2209-446B-8B01-784686D42EEE}, Quarentena, [3723], [-1],0.0.0 PUP.Optional.SearchManager, HKLM\SOFTWARE\GOOGLE\CHROME\EXTENSIONS\OLOJCNAGMCBPLPDDDABMPFEHHLLEOBPB, Quarentena, [250], [509543],1.0.7461 PUP.Optional.SearchManager, HKU\S-1-5-21-81060879-2362427551-1445345640-1000\SOFTWARE\GOOGLE\CHROME\EXTENSIONS\olojcnagmcbplpdddabmpfehhlleobpb, Quarentena, [250], [509543],1.0.7461 PUP.Optional.WinYahoo.TskLnk, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{01D3E913-5153-3893-E0D3-481330539B93}, Quarentena, [3723], [542290],1.0.7461 Valor de registro: 2 PUP.Optional.SearchManager, HKU\S-1-5-21-81060879-2362427551-1445345640-1000\SOFTWARE\GOOGLE\CHROME\PREFERENCEMACS\Default\extensions.settings|OLOJCNAGMCBPLPDDDABMPFEHHLLEOBPB, Quarentena, [250], [509543],1.0.7461 PUP.Optional.WinBing, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{26158849-2209-446B-8B01-784686D42EEE}|PATH, Quarentena, [5378], [336082],1.0.7461 Dados de registro: 0 (Nenhum item malicioso detectado) Fluxo de dados: 0 (Nenhum item malicioso detectado) Pasta: 3 PUP.Optional.WinYahoo.TskLnk, C:\PROGRAMDATA\{F68833EB-7CCA-B92D-FA0C-276F604EACA1}, Quarentena, [3723], [484243],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\Users\Raquel\AppData\Local\{FD6ACB36-D9C2-A78E-B45A-826690327EFE}\HowToRemove, Quarentena, [3723], [542290],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\USERS\RAQUEL\APPDATA\LOCAL\{FD6ACB36-D9C2-A78E-B45A-826690327EFE}, Quarentena, [3723], [542290],1.0.7461 Arquivo: 31 PUP.Optional.WinBing, C:\WINDOWS\TASKS\Search Provided by Bing nasit.job, Quarentena, [5378], [336088],1.0.7461 PUP.Optional.WinBing, C:\WINDOWS\SYSTEM32\TASKS\Search Provided by Bing nasit, Quarentena, [5378], [336089],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\PROGRAMDATA\{F68833EB-7CCA-B92D-FA0C-276F604EACA1}\tama, Quarentena, [3723], [484243],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\ProgramData\{F68833EB-7CCA-B92D-FA0C-276F604EACA1}\aowLC, Quarentena, [3723], [484243],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\ProgramData\{F68833EB-7CCA-B92D-FA0C-276F604EACA1}\hdat1, Quarentena, [3723], [484243],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\ProgramData\{F68833EB-7CCA-B92D-FA0C-276F604EACA1}\hdat2, Quarentena, [3723], [484243],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\WINDOWS\SYSTEM32\TASKS\Search Provided by Bing nasit, Quarentena, [3723], [-1],0.0.0 PUP.Optional.SearchManager, C:\USERS\RAQUEL\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Substituído, [250], [509543],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\PROGRAMDATA\Microsoft\Windows\Start Menu\Programs\HowToRemove.lnk, Quarentena, [3723], [542290],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\USERS\RAQUEL\APPDATA\LOCAL\{FD6ACB36-D9C2-A78E-B45A-826690327EFE}\HOWTOREMOVE\HOWTOREMOVE.HTML, Quarentena, [3723], [542290],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\Users\Raquel\AppData\Local\{FD6ACB36-D9C2-A78E-B45A-826690327EFE}\HowToRemove\chromium-min.jpg, Quarentena, [3723], [542290],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\Users\Raquel\AppData\Local\{FD6ACB36-D9C2-A78E-B45A-826690327EFE}\HowToRemove\control panel-min-min.JPG, Quarentena, [3723], [542290],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\Users\Raquel\AppData\Local\{FD6ACB36-D9C2-A78E-B45A-826690327EFE}\HowToRemove\down.png, Quarentena, [3723], [542290],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\Users\Raquel\AppData\Local\{FD6ACB36-D9C2-A78E-B45A-826690327EFE}\HowToRemove\ff menu.JPG, Quarentena, [3723], [542290],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\Users\Raquel\AppData\Local\{FD6ACB36-D9C2-A78E-B45A-826690327EFE}\HowToRemove\ff search engine-min.png, Quarentena, [3723], [542290],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\Users\Raquel\AppData\Local\{FD6ACB36-D9C2-A78E-B45A-826690327EFE}\HowToRemove\hp-min ff.png, Quarentena, [3723], [542290],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\Users\Raquel\AppData\Local\{FD6ACB36-D9C2-A78E-B45A-826690327EFE}\HowToRemove\hp-min ie.png, Quarentena, [3723], [542290],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\Users\Raquel\AppData\Local\{FD6ACB36-D9C2-A78E-B45A-826690327EFE}\HowToRemove\search engine.gif, Quarentena, [3723], [542290],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\Users\Raquel\AppData\Local\{FD6ACB36-D9C2-A78E-B45A-826690327EFE}\HowToRemove\setup pages.gif, Quarentena, [3723], [542290],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\Users\Raquel\AppData\Local\{FD6ACB36-D9C2-A78E-B45A-826690327EFE}\HowToRemove\sp-min.png, Quarentena, [3723], [542290],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\Users\Raquel\AppData\Local\{FD6ACB36-D9C2-A78E-B45A-826690327EFE}\HowToRemove\start-min.jpg, Quarentena, [3723], [542290],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\Users\Raquel\AppData\Local\{FD6ACB36-D9C2-A78E-B45A-826690327EFE}\HowToRemove\up.png, Quarentena, [3723], [542290],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\Users\Raquel\AppData\Local\{FD6ACB36-D9C2-A78E-B45A-826690327EFE}\macatadot, Quarentena, [3723], [542290],1.0.7461 PUP.Optional.WinYahoo.TskLnk, C:\Users\Raquel\AppData\Local\{FD6ACB36-D9C2-A78E-B45A-826690327EFE}\uninst.exe, Quarentena, [3723], [542290],1.0.7461 Adware.DealPly, C:\USERS\RAQUEL\APPDATA\LOCAL\TEMP\TMP5288393\SESESENE.EXE, Quarentena, [1657], [553051],1.0.7461 PUP.Optional.InstallCore, C:\USERS\RAQUEL\APPDATA\LOCAL\TEMP\131817048910042738.EXE, Quarentena, [401], [542680],1.0.7461 PUP.Optional.BundleInstaller, C:\USERS\RAQUEL\APPDATA\LOCAL\TEMP\13181704899924704929.EXE, Quarentena, [415], [505366],1.0.7461 Generic.Malware/Suspicious, C:\USERS\RAQUEL\DOWNLOADS\ATVDR W7 BY PH DOWNS.RAR, Quarentena, [0], [392686],1.0.7461 RiskWare.Hack, C:\USERS\RAQUEL\DOWNLOADS\KMSPICO V10.0.4 (OFFICE AND WINDOWS ACTIVATOR).RAR, Quarentena, [7840], [144330],1.0.7461 PUP.Optional.SearchManager, C:\USERS\RAQUEL\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Substituído, [250], [501411],1.0.7461 PUP.Optional.SearchManager, C:\USERS\RAQUEL\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Substituído, [250], [501411],1.0.7461 Setor físico: 0 (Nenhum item malicioso detectado) Instrumentação do Windows (WMI): 0 (Nenhum item malicioso detectado) (end) -------- # ------------------------------- # Malwarebytes AdwCleaner 7.2.4.0 # ------------------------------- # Build: 09-25-2018 # Database: 2018-10-12.1 (Cloud) # Support: https://www.malwarebytes.com/support # # ------------------------------- # Mode: Clean # ------------------------------- # Start: 10-22-2018 # Duration: 00:00:17 # OS: Windows 7 Ultimate # Cleaned: 1 # Failed: 1 ***** [ Services ] ***** No malicious services cleaned. ***** [ Folders ] ***** No malicious folders cleaned. ***** [ Files ] ***** No malicious files cleaned. ***** [ DLL ] ***** No malicious DLLs cleaned. ***** [ WMI ] ***** No malicious WMI cleaned. ***** [ Shortcuts ] ***** No malicious shortcuts cleaned. ***** [ Tasks ] ***** No malicious tasks cleaned. ***** [ Registry ] ***** Deleted HKCU\Software\csastats ***** [ Chromium (and derivatives) ] ***** No malicious Chromium entries cleaned. ***** [ Chromium URLs ] ***** Not Deleted Ask Brasil ***** [ Firefox (and derivatives) ] ***** No malicious Firefox entries cleaned. ***** [ Firefox URLs ] ***** No malicious Firefox URLs cleaned. ************************* [+] Delete Tracing Keys [+] Reset Winsock ************************* AdwCleaner[S00].txt - [1280 octets] - [22/10/2018 12:19:08] ########## EOF - C:\AdwCleaner\Logs\AdwCleaner[C00].txt ########## -------- ~ ZHPCleaner v2018.10.19.185 by Nicolas Coolman (2018/10/19) ~ Run by Raquel (Administrator) (22/10/2018 13:34:55) ~ Web: https://www.nicolascoolman.com ~ Blog: https://nicolascoolman.eu/ ~ Facebook : https://www.facebook.com/nicolascoolman1 ~ State version : Version OK ~ Certificate ZHPCleaner: Legal ~ Type : Repair ~ Report : C:\Users\Raquel\Desktop\ZHPCleaner.txt ~ Quarantine : C:\Users\Raquel\AppData\Roaming\ZHP\ZHPCleaner_Reg.txt ~ UAC : Activate ~ Boot Mode : Normal (Normal boot) Windows 7 Ultimate, 32-bit Service Pack 1 (Build 7601) ---\\ Alternate Data Stream (ADS). (0) ~ No malicious or unnecessary items found. ---\\ Services (0) ~ No malicious or unnecessary items found. ---\\ Browser internet (0) ~ No malicious or unnecessary items found. ---\\ Hosts file (1) ~ The hosts file is legitimate (21) ---\\ Scheduled automatic tasks. (0) ~ No malicious or unnecessary items found. ---\\ Explorer ( File, Folder) (6) MOVED file: C:\Users\Raquel\Desktop\µTorrent.lnk [Bad : C:\Users\Raquel\AppData\Roaming\uTorrent\uTorrent.exe](.BitTorrent Inc..) =>BitTorrent (P2P) MOVED file: C:\Users\Raquel\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\µTorrent.lnk [Bad : C:\Users\Raquel\AppData\Roaming\uTorrent\uTorrent.exe](.BitTorrent Inc..) =>BitTorrent (P2P) MOVED file: C:\Users\Raquel\Downloads\uTorrent.exe [BitTorrent Inc. - µTorrent] =>BitTorrent (P2P) MOVED file: C:\Program Files\KMSpico\Service_KMS.exe [@ByELDI - Service_KMS] =>HackTool.KMSpico MOVED folder: C:\Program Files\KMSpico =>HackTool.KMSpico MOVED folder: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\KMSpico =>HackTool.KMSpico ---\\ Registry ( Key, Value, Data) (3) DELETED key*: HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\uTorrent [BitTorrent Inc.] =>BitTorrent (P2P) DELETED value: HKLM\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\firewallRules\\{10BC938A-C118-4698-A628-3C9617362211} [C:\Program Files\KMSpico\Service_KMS.exe] =>HackTool.KMSpico DELETED value: HKLM\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\firewallRules\\{809A723D-F45E-4E04-B037-DD6917BB7F9D} [C:\Program Files\KMSpico\Service_KMS.exe] =>HackTool.KMSpico ---\\ Summary of the elements found (2) https://nicolascoolman.eu/2017/01/27/repaquetage-et-infection/ =>BitTorrent (P2P) https://nicolascoolman.eu/2017/02/16/hacktool-kmspico/ =>HackTool.KMSpico ---\\ Other deletions. (13) ~ Registry Keys Tracing deleted (13) ~ Remove the old reports ZHPCleaner. (0) ---\\ Result of repair ~ Repair carried out successfully ~ Browser not found (Mozilla Firefox) ~ Browser not found (Opera Software) ---\\ Statistics ~ Items scanned : 528 ~ Items found : 0 ~ Items cancelled : 0 ~ Items options : 0/7 ~ Space saving (bytes) : 0 ~ End of clean in 00h00mn36s ---\\ Reports (2) ZHPCleaner--22102018-13_15_53.txt ZHPCleaner-[R]-22102018-13_35_31.txt
  4. Ultimamente meu computador está lento, principalmente quando estou usando o navegador Chrome. ZA-Scan.txt

Sobre o Clube do Hardware

No ar desde 1996, o Clube do Hardware é uma das maiores, mais antigas e mais respeitadas publicações sobre tecnologia do Brasil. Leia mais

Direitos autorais

Não permitimos a cópia ou reprodução do conteúdo do nosso site, fórum, newsletters e redes sociais, mesmo citando-se a fonte. Leia mais

×