Ir ao conteúdo
  • Cadastre-se

arcksouls

Membros Plenos
  • Total de itens

    21
  • Registro em

  • Última visita

  • Qualificações

    0%

Reputação

1

Informações gerais

  • Cidade e Estado
    aaa
  1. Rodei o Adwcleaner novamente e tem alguns arquivos apontados como malware, o malwarebytes não encontrou nada. # ------------------------------- # Malwarebytes AdwCleaner 7.4.0.0 # ------------------------------- # Build: 07-23-2019 # Database: 2019-08-13.1 (Cloud) # Support: https://www.malwarebytes.com/support # # ------------------------------- # Mode: Scan # ------------------------------- # Start: 08-14-2019 # Duration: 00:00:11 # OS: Windows 10 Pro # Scanned: 35493 # Detected: 31 ***** [ Services ] ***** No malicious services found. ***** [ Folders ] ***** No malicious folders found. ***** [ Files ] ***** No malicious files found. ***** [ DLL ] ***** No malicious DLLs found. ***** [ WMI ] ***** No malicious WMI found. ***** [ Shortcuts ] ***** No malicious shortcuts found. ***** [ Tasks ] ***** No malicious tasks found. ***** [ Registry ] ***** PUP.Optional.DriverUpdatePlus HKLM\Software\Wow6432Node\BSD ***** [ Chromium (and derivatives) ] ***** No malicious Chromium entries found. ***** [ Chromium URLs ] ***** No malicious Chromium URLs found. ***** [ Firefox (and derivatives) ] ***** No malicious Firefox entries found. ***** [ Firefox URLs ] ***** No malicious Firefox URLs found. ***** [ Preinstalled Software ] ***** Preinstalled.AcerCareCenter Preinstalled.AcerCollection Preinstalled.AcerQuickAccess Preinstalled.AcerUpdater Preinstalled.EpsonCustomerResearchParticipation Preinstalled.SamsungSmartSwitch AdwCleaner[S00].txt - [1723 octets] - [12/08/2019 14:30:41] AdwCleaner[S01].txt - [1599 octets] - [13/08/2019 15:42:22] ########## EOF - C:\AdwCleaner\Logs\AdwCleaner[S02].txt ##########
  2. RogueKiller Anti-Malware V13.4.2.0 (x64) [Aug 9 2019] (Free) by Adlice Software mail : https://adlice.com/contact/ Website : https://adlice.com/download/roguekiller/ Operating System : Windows 10 (10.0.18362) 64 bits Started in : Normal mode User : Leonardo Faleiros [Administrator] Started from : C:\Users\Leonardo Faleiros\Desktop\RogueKiller_portable64.exe Signatures : 20190812_111803, Driver : Loaded Mode : Standard Scan, Delete -- Date : 2019/08/13 15:28:27 (Duration : 00:05:45) ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Delete ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ [PUP.HackTool (Potentially Malicious)] KMS-R@1nhook.exe -- %SystemRoot%\KMS-R@1nhook.exe -> [PUP.Auslogics (Potentially Malicious)] HKEY_LOCAL_MACHINE\Software\Auslogics -- -> Deleted [PUP.InnovativeSolutions (Potentially Malicious)] HKEY_USERS\S-1-5-21-977247346-805206526-1613214045-1001\Software\Innovative Solutions -- -> Deleted [PUP.HackTool (Potentially Malicious)] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|{BA5FF6E2-AB12-43C2-A669-BBA8874B330D} -- [%SystemRoot%\KMS-R@1n.exe] -> Deleted [PUP.HackTool (Potentially Malicious)] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|{12027607-3B71-423D-BA50-6FDACB69BCA2} -- [%SystemRoot%\KMS-R@1n.exe] -> Deleted [Suspicious.Path (Potentially Malicious)] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|{2F1FBC67-0E23-4FC4-961E-85798B011681} -- [%localappdata%\Temp\DriverPack-20190802121330\tools\aria2c.exe] -> Deleted [PUP.HackTool (Potentially Malicious)] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe|Debugger -- [%SystemRoot%\KMS-R@1nhook.exe] -> Deleted [PUP.HackTool (Potentially Malicious)] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\OSppSvc.exe|Debugger -- [%SystemRoot%\KMS-R@1nhook.exe] -> Deleted [PUP.HackTool (Potentially Malicious)] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\OSppSvc.exe|Debugger -- [%SystemRoot%\KMS-R@1nhook.exe] -> Deleted [PUP.HackTool (Potentially Malicious)] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe|Debugger -- [%SystemRoot%\KMS-R@1nhook.exe] -> Deleted [PUM.Policies (Potentially Malicious)] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System|ConsentPromptBehaviorAdmin -- -> Replaced (2) [PUP.HackTool (Potentially Malicious)] KMS-R@1nhook.exe -- %SystemRoot%\KMS-R@1nhook.exe -> Removed at reboot [5] [PUP.HighPCBooster (Potentially Malicious)] BSD -- %programdata%\BSD -> Deleted [PUP.InnovativeSolutions (Potentially Malicious)] Innovative Solutions -- %programfiles(x86)%\Innovative Solutions -> Deleted
  3. RogueKiller Anti-Malware V13.4.2.0 (x64) [Aug 9 2019] (Free) by Adlice Software mail : https://adlice.com/contact/ Website : https://adlice.com/download/roguekiller/ Operating System : Windows 10 (10.0.18362) 64 bits Started in : Normal mode User : Leonardo Faleiros [Administrator] Started from : C:\Users\Leonardo Faleiros\Desktop\RogueKiller_portable64.exe Signatures : 20190812_111803, Driver : Loaded Mode : Standard Scan, Scan -- Date : 2019/08/13 10:19:58 (Duration : 00:07:09) ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Processes ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ [PUP.HackTool (Potentially Malicious)] KMS-R@1nhook.exe (10944) -- C:\Windows\KMS-R@1nhook.exe -> Found ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Process Modules ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Services ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Tasks ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Registry ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ >>>>>> XX - Software [PUP.Auslogics (Potentially Malicious)] (X86) HKEY_LOCAL_MACHINE\Software\Auslogics -- N/A -> Found [PUP.InnovativeSolutions (Potentially Malicious)] (X64) HKEY_USERS\S-1-5-21-977247346-805206526-1613214045-1001\Software\Innovative Solutions -- N/A -> Found >>>>>> O87 - Firewall [PUP.HackTool (Potentially Malicious)] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|{BA5FF6E2-AB12-43C2-A669-BBA8874B330D} -- v2.28|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|LPort=1688|App=C:\Windows\KMS-R@1n.exe|Name=KMS-R@1n| (C:\Windows\KMS-R@1n.exe) (missing) -> Found [PUP.HackTool (Potentially Malicious)] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|{12027607-3B71-423D-BA50-6FDACB69BCA2} -- v2.28|Action=Allow|Active=TRUE|Dir=In|Protocol=6|LPort=1688|App=C:\Windows\KMS-R@1n.exe|Name=KMS-R@1n| (C:\Windows\KMS-R@1n.exe) (missing) -> Found [Suspicious.Path (Potentially Malicious)] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|{2F1FBC67-0E23-4FC4-961E-85798B011681} -- v2.30|Action=Allow|Active=TRUE|Dir=In|App=C:\Users\Leonardo Faleiros\AppData\Local\Temp\DriverPack-20190802121330\tools\aria2c.exe|Name=DriverPack aria2c.exe| (C:\Users\Leonardo Faleiros\AppData\Local\Temp\DriverPack-20190802121330\tools\aria2c.exe) (missing) -> Found >>>>>> O50 - Image File Execution Options [PUP.HackTool (Potentially Malicious)] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe|Debugger -- KMS-R@1nhook.exe -> Found [PUP.HackTool (Potentially Malicious)] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\OSppSvc.exe|Debugger -- KMS-R@1nhook.exe -> Found [PUP.HackTool (Potentially Malicious)] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\OSppSvc.exe|Debugger -- KMS-R@1nhook.exe -> Found [PUP.HackTool (Potentially Malicious)] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe|Debugger -- KMS-R@1nhook.exe -> Found >>>>>> XX - System Policies [PUM.Policies (Potentially Malicious)] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System|ConsentPromptBehaviorAdmin -- 0 -> Found ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ WMI ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Hosts File ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Files ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ [PUP.HackTool (Potentially Malicious)] (file) KMS-R@1nhook.exe -- C:\Windows\KMS-R@1nhook.exe -> Found [PUP.HighPCBooster (Potentially Malicious)] (folder) BSD -- C:\ProgramData\BSD -> Found [PUP.InnovativeSolutions (Potentially Malicious)] (folder) Innovative Solutions -- C:\Program Files (x86)\Innovative Solutions -> Found ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Web browsers ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤
  4. Boa tarde, O log do AdwCleaner não tinha a opção limpar, só tinha a opção quarentena e eram drivers da acer e samsung, acabei não colocando, fico no aguardo de orientação. Muito obrigado Malwarebytes www.malwarebytes.com -Detalhes de registro- Data da análise: 12/08/2019 Hora da análise: 12:02 Arquivo de registro: 414f9d6c-bd12-11e9-8153-9829a64604f0.json -Informação do software- Versão: 3.8.3.2965 Versão de componentes: 1.0.613 Versão do pacote de definições: 1.0.11972 Licença: Gratuita -Informação do sistema- Sistema operacional: Windows 10 (Build 18362.267) CPU: x64 Sistema de arquivos: NTFS Usuário: DESKTOP-CA646NS\Leonardo Faleiros -Resumo da análise- Tipo de análise: Análise Customizada Análise Iniciada Por: Manual Resultado: Concluído Objetos verificados: 665634 Ameaças detectadas: 14 Ameaças em quarentena: 14 Tempo decorrido: 1 hr, 52 min, 34 seg -Opções da análise- Memória: Habilitado Inicialização: Habilitado Sistema de arquivos: Habilitado Arquivos compactados: Habilitado Rootkits: Habilitado Heurística: Habilitado PUP: Detectar PUM: Detectar -Detalhes da análise- Processo: 0 (Nenhum item malicioso detectado) Módulo: 0 (Nenhum item malicioso detectado) Chave de registro: 3 PUP.Optional.DriverPack, HKU\S-1-5-21-977247346-805206526-1613214045-1001\SOFTWARE\DRPSU, Quarentena, [563], [472301],1.0.11972 PUP.Optional.DriverPack, HKU\S-1-5-21-977247346-805206526-1613214045-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP\DOMAINS\drp.su, Quarentena, [563], [472299],1.0.11972 PUP.Optional.DriverPack, HKLM\SOFTWARE\WOW6432NODE\DRPSU, Quarentena, [563], [472300],1.0.11972 Valor de registro: 2 PUP.Optional.DriverPack, HKU\S-1-5-21-977247346-805206526-1613214045-1001\SOFTWARE\DRPSU|CLIENTID, Quarentena, [563], [472301],1.0.11972 PUP.Optional.DriverPack, HKLM\SOFTWARE\WOW6432NODE\DRPSU|CLIENTID, Quarentena, [563], [472300],1.0.11972 Dados de registro: 0 (Nenhum item malicioso detectado) Fluxo de dados: 0 (Nenhum item malicioso detectado) Pasta: 0 (Nenhum item malicioso detectado) Arquivo: 9 PUP.Optional.DriverPack, C:\USERS\LEONARDO FALEIROS\APPDATA\ROAMING\DRPSU\ALICE\LIBEGL.DLL, Quarentena, [563], [542228],1.0.11972 PUP.Optional.DriverPack, C:\USERS\LEONARDO FALEIROS\APPDATA\ROAMING\DRPSU\ALICE\FFMPEG.DLL, Quarentena, [563], [542228],1.0.11972 PUP.Optional.DriverPack, C:\USERS\LEONARDO FALEIROS\APPDATA\ROAMING\DRPSU\ALICE\CLOUD.EXE, Quarentena, [563], [542228],1.0.11972 PUP.Optional.DriverPack, C:\USERS\LEONARDO FALEIROS\APPDATA\ROAMING\DRPSU\ALICE\LIBGLESV2.DLL, Quarentena, [563], [542228],1.0.11972 PUP.Optional.DriverPack, C:\USERS\LEONARDO FALEIROS\APPDATA\ROAMING\DRPSU\ALICE\NW_ELF.DLL, Quarentena, [563], [542228],1.0.11972 PUP.Optional.DriverPack, C:\USERS\LEONARDO FALEIROS\APPDATA\ROAMING\DRPSU\ALICE\NODE.DLL, Quarentena, [563], [542228],1.0.11972 Generic.Malware/Suspicious, C:\USERS\LEONARDO FALEIROS\DESKTOP\NOVA PASTA\ZA-SCAN.EXE, Quarentena, [0], [392686],1.0.11972 Generic.Malware/Suspicious, C:\USERS\LEONARDO FALEIROS\DESKTOP\NOVA PASTA\ZOEK.EXE, Quarentena, [0], [392686],1.0.11972 RiskWare.DontStealOurSoftware, C:\WINDOWS\SYSTEM32\DRIVERS\ETC\HOSTS, Quarentena, [5301], [353142],0.0.0 Setor físico: 0 (Nenhum item malicioso detectado) Instrumentação do Windows (WMI): 0 (Nenhum item malicioso detectado) (end) <><><><><><><><><><> # ------------------------------- # Malwarebytes AdwCleaner 7.4.0.0 # ------------------------------- # Build: 07-23-2019 # Database: 2019-08-09.1 (Cloud) # Support: https://www.malwarebytes.com/support # # ------------------------------- # Mode: Scan # ------------------------------- # Start: 08-12-2019 # Duration: 00:00:16 # OS: Windows 10 Pro # Scanned: 35457 # Detected: 34 ***** [ Services ] ***** No malicious services found. ***** [ Folders ] ***** PUP.Optional.DriverPack C:\Users\Leonardo Faleiros\AppData\Roaming\DRPSu PUP.Optional.Legacy C:\ProgramData\BSD\DriverHiveEngine PUP.Optional.TweakBit C:\ProgramData\BSD\DriverHive ***** [ Files ] ***** No malicious files found. ***** [ DLL ] ***** No malicious DLLs found. ***** [ WMI ] ***** No malicious WMI found. ***** [ Shortcuts ] ***** No malicious shortcuts found. ***** [ Tasks ] ***** No malicious tasks found. ***** [ Registry ] ***** PUP.Optional.DriverUpdatePlus HKLM\Software\Wow6432Node\BSD ***** [ Chromium (and derivatives) ] ***** No malicious Chromium entries found. ***** [ Chromium URLs ] ***** No malicious Chromium URLs found. ***** [ Firefox (and derivatives) ] ***** No malicious Firefox entries found. ***** [ Firefox URLs ] ***** No malicious Firefox URLs found. ***** [ Preinstalled Software ] ***** Preinstalled.AcerCareCenter Preinstalled.AcerCollection Preinstalled.AcerQuickAccess Preinstalled.AcerUpdater Preinstalled.EpsonCustomerResearchParticipation Preinstalled.SamsungSmartSwitch ########## EOF - C:\AdwCleaner\Logs\AdwCleaner[S00].txt ########## <><><><><><><><><><><><> ~ ZHPCleaner v2019.8.12.120 by Nicolas Coolman (2019/08/12) ~ Run by Leonardo Faleiros (Administrator) (12/08/2019 14:45:10) ~ Web: https://www.nicolascoolman.com ~ Blog: https://nicolascoolman.eu/ ~ Facebook : https://www.facebook.com/nicolascoolman1 ~ State version : Version OK ~ Certificate ZHPCleaner: Legal ~ Type : Repair ~ Report : C:\Users\Leonardo Faleiros\Desktop\ZHPCleaner (R).txt ~ Quarantine : C:\Users\Leonardo Faleiros\AppData\Roaming\ZHP\ZHPCleaner_Reg.txt ~ UAC : Activate ~ Boot Mode : Normal (Normal boot) Windows 10 Pro, 64-bit (Build 18362) ---\ Alternate Data Stream (ADS). (0) ~ No malicious or unnecessary items found. (ADS) ---\ Services (0) ~ No malicious or unnecessary items found. (Service) ---\ Browser internet (0) ~ No malicious or unnecessary items found. (Browser) ---\ Hosts file (0) ~ No malicious or unnecessary items found. (Hosts) ---\ Scheduled automatic tasks. (0) ~ No malicious or unnecessary items found. (Task) ---\ Explorer ( File, Folder) (4) MOVED file: C:\Windows\Prefetch\KMS-R@1NHOOK.EXE-9B150C30.pf =>HackTool.AutoKMS MOVED folder: C:\Users\Leonardo Faleiros\AppData\Roaming\DRPSu =>.SUP.DriverPack MOVED folder: C:\Users\Leonardo Faleiros\AppData\Local\MSfree Inc =>HackTool.WinActivator MOVED folder: C:\ProgramData\BSD\DriverHive =>.SUP.DriverUpdatePlus ---\ Registry ( Key, Value, Data) (3) DELETED key*: HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\uTorrent [BitTorrent Inc.] =>BitTorrent (P2P) DELETED key*: [X64] HKLM\SOFTWARE\Classes\AppID\{4D076AB4-7562-427A-B5D2-BD96E19DEE56} [secman] =>PUP.Optional.Camec DELETED key**: [X64] HKLM\SOFTWARE\Wow6432Node\Classes\AppID\{4D076AB4-7562-427A-B5D2-BD96E19DEE56} [secman] =>PUP.Optional.Camec ---\ Summary of the elements found (6) https://nicolascoolman.eu/2017/02/02/hacktool-autokms/ =>HackTool.AutoKMS https://nicolascoolman.eu/2018/07/04/sup-driverpack/ =>.SUP.DriverPack https://nicolascoolman.eu/2017/01/13/hacktool-winactivator/ =>HackTool.WinActivator https://nicolascoolman.eu/2017/01/20/logiciels-superflus/ =>.SUP.DriverUpdatePlus https://nicolascoolman.eu/2017/01/27/repaquetage-et-infection/ =>BitTorrent (P2P) https://nicolascoolman.eu/2017/01/27/repaquetage-et-infection/ =>PUP.Optional.Camec ---\ Other deletions. (18) ~ Registry Keys Tracing deleted (16) ~ Remove the old reports ZHPCleaner. (2) ---\ Result of repair ~ Repair carried out successfully ~ Browser not found (Mozilla Firefox) ~ Browser not found (Opera Software) ---\ Statistics ~ Items scanned : 634 ~ Items found : 0 ~ Items cancelled : 0 ~ Items options : 6/13 ~ Space saving (bytes) : 0 ~ End of clean in 00h00mn22s ---\ Reports (2) ZHPCleaner--12082019-14_41_06.txt ZHPCleaner-[R]-12082019-14_45_32.txt <><><><><><><><> ~ ZHPCleaner v2019.8.12.120 by Nicolas Coolman (2019/08/12) ~ Run by Leonardo Faleiros (Administrator) (12/08/2019 14:34:43) ~ Web: https://www.nicolascoolman.com ~ Blog: https://nicolascoolman.eu/ ~ Facebook : https://www.facebook.com/nicolascoolman1 ~ State version : Version OK ~ Certificate ZHPCleaner: Legal ~ Type : Scan ~ Report : C:\Users\Leonardo Faleiros\Desktop\ZHPCleaner (S).txt ~ Quarantine : C:\Users\Leonardo Faleiros\AppData\Roaming\ZHP\ZHPCleaner_Reg.txt ~ System Restore Point : ~ UAC : Activate ~ Boot Mode : Normal (Normal boot) Windows 10 Pro, 64-bit (Build 18362) ---\\ Alternate Data Stream (ADS). (0) ~ No malicious or unnecessary items found. ---\\ Services (0) ~ No malicious or unnecessary items found. ---\\ Browser internet (0) ~ No malicious or unnecessary items found. ---\\ Hosts file (0) ~ No malicious or unnecessary items found. ---\\ Scheduled automatic tasks. (0) ~ No malicious or unnecessary items found. ---\\ Explorer ( File, Folder) (5) FOUND folder: C:\Users\Leonardo Faleiros\AppData\Roaming\DRPSu =>.SUP.DriverPack FOUND file: C:\Windows\Prefetch\KMS-R@1NHOOK.EXE-9B150C30.pf =>HackTool.AutoKMS FOUND file: C:\Users\Leonardo Faleiros\AppData\Local\MSfree Inc\kmsauto.ini =>HackTool.WinActivator FOUND folder: C:\Users\Leonardo Faleiros\AppData\Local\MSfree Inc =>HackTool.WinActivator FOUND folder: C:\ProgramData\BSD\DriverHive =>.SUP.DriverUpdatePlus ---\\ Registry ( Key, Value, Data) (3) FOUND key: HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\uTorrent [BitTorrent Inc.] =>BitTorrent (P2P) FOUND key: [X64] HKLM\SOFTWARE\Classes\AppID\{4D076AB4-7562-427A-B5D2-BD96E19DEE56} [secman] =>PUP.Optional.Camec FOUND key: [X64] HKLM\SOFTWARE\Wow6432Node\Classes\AppID\{4D076AB4-7562-427A-B5D2-BD96E19DEE56} [secman] =>PUP.Optional.Camec ---\\ Summary of the elements found (6) https://nicolascoolman.eu/2018/07/04/sup-driverpack/ =>.SUP.DriverPack https://nicolascoolman.eu/2017/02/02/hacktool-autokms/ =>HackTool.AutoKMS https://nicolascoolman.eu/2017/01/13/hacktool-winactivator/ =>HackTool.WinActivator https://nicolascoolman.eu/2017/01/20/logiciels-superflus/ =>.SUP.DriverUpdatePlus https://nicolascoolman.eu/2017/01/27/repaquetage-et-infection/ =>BitTorrent (P2P) https://nicolascoolman.eu/2017/01/27/repaquetage-et-infection/ =>PUP.Optional.Camec ---\\ Result of repair ~ Any repair made ~ Browser not found (Mozilla Firefox) ~ Browser not found (Opera Software) ---\\ Statistics ~ Items scanned : 107934 ~ Items found : 12 ~ Items cancelled : 0 ~ Items options : 6/13 ~ Space saving (bytes) : 0 ~ End of search in 00h06mn23s ---\\ Reports (3) ZHPCleaner-[R]-07042018-15_29_11.txt ZHPCleaner--07042018-15_11_03.txt ZHPCleaner--12082019-14_41_06.txt
  5. Boa noite, Recebi um email com o título Save Yourself mostrando uma senha minha e pedindo o depósito de U$ 900,00 em bitcoin. Fiz uma pesquisa e parece que é scam, algum site teve quebra de sigilo e essa senha seria desse site em específico, mas fiquei preocupado. Poderiam verificar meu log por favor? Att, ZA-Scan.txt
  6. Bom dia, apesar de recém formatada, o windows defender está alertando alguns vírus em minha máquina. Agradeço desde já. ZA-Scan.txt
  7. Elias o resultado até agora está ótimo, inclusive a bateria esta durando mais tempo devido o último passo realizado. Muito obrigado
  8. Obrigado Elias, Vou testar o sistema por uns dias antes de postar a conclusão, se preferir pode trancar o tópico. Muito obrigado mesmo! Att, Arcksouls
  9. Boa noite, segue o resultado abaixo: RogueKiller V12.11.1.0 (x64) [Jun 4 2017] (Free) por Adlice Software mail : http://www.adlice.com/contact/ Feedback : https://forum.adlice.com Site : http://www.adlice.com/download/roguekiller/ Blog : http://www.adlice.com Sistema Operacional : Windows 7 (6.1.7601 Service Pack 1) 64 bits version Iniciou : Modo normal Usuário : Leonardo [Administrador] Started from : C:\Users\Leonardo\Desktop\RogueKiller_portable64.exe Modo : Deletar -- Data : 06/13/2017 19:50:54 (Duration : 00:51:01) ¤¤¤ Processos : 2 ¤¤¤ [PUP.HackTool|VT.Patched3_c.BWLA] KMS Server Service.exe(2040) -- C:\Windows\KMSServerService\KMS Server Service.exe[-] -> Interrompido [TermProc] [PUP.HackTool|VT.Patched3_c.BWLA] (SVC) KMSServerService -- C:\Windows\KMSServerService\KMS Server Service.exe [-] -> ERROR [6d] ¤¤¤ Registro : 6 ¤¤¤ [PUP.HackTool|VT.Patched3_c.BWLA] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\KMSServerService (C:\Windows\KMSServerService\KMS Server Service.exe ) -> Deletado [PUP.HackTool|VT.Patched3_c.BWLA] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\KMSServerService (C:\Windows\KMSServerService\KMS Server Service.exe ) -> Deletado [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters | DhcpNameServer : 187.2.88.41 187.2.88.46 ([Brazil][Brazil]) -> Substituído () [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters | DhcpNameServer : 187.2.88.41 187.2.88.46 ([Brazil][Brazil]) -> Substituído () [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{623EE748-4E50-484A-B5B2-EA28D6F58E81} | DhcpNameServer : 187.2.88.41 187.2.88.46 ([Brazil][Brazil]) -> Substituído () [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{623EE748-4E50-484A-B5B2-EA28D6F58E81} | DhcpNameServer : 187.2.88.41 187.2.88.46 ([Brazil][Brazil]) -> Substituído () ¤¤¤ Tarefas : 0 ¤¤¤ ¤¤¤ Arquivos : 20 ¤¤¤ [PUP.HackTool][Pasta] C:\Windows\KMSServerService -> Deletado [PUP.HackTool][Arquivo] C:\Windows\KMSServerService\KMS Server Service.exe -> Deletado [Hidden.ADS][Stream] C:\Windows\System32:DEA1351C_Bb.gbp -> Deletado [Hidden.ADS][Stream] C:\Windows\System32:DEA1351C_Cef.gbp -> Deletado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.5_41073\utorrentie.exe -> Deletado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.5_41162\utorrentie.exe -> Deletado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.5_41202\utorrentie.exe -> Deletado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.5_41372\utorrentie.exe -> Deletado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.5_41712\utorrentie.exe -> Deletado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.5_41865\utorrentie.exe -> Deletado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.6_42094\utorrentie.exe -> Deletado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.7_42330\utorrentie.exe -> Deletado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.8_42449\utorrentie.exe -> Deletado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.8_42576\utorrentie.exe -> Deletado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.9_42923\utorrentie.exe -> Deletado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.9_42973\utorrentie.exe -> Deletado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.9_43085\utorrentie.exe -> Deletado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.9_43295\utorrentie.exe -> Deletado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.9_43388\utorrentie.exe -> Deletado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.5.0_43580\utorrentie.exe -> Deletado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.5.0_43804\utorrentie.exe -> Removido na reinicialização [5] ¤¤¤ WMI : 0 ¤¤¤ ¤¤¤ Arquivos de hosts : 0 ¤¤¤ ¤¤¤ Antirootkit : 0 (Driver: Carregado) ¤¤¤ ¤¤¤ Navegadores : 2 ¤¤¤ [PUP.Gen0][Chrome:Addon] Default : Video Downloader professional [elicpjhcidhpjomhibiffojpinpmmpil] -> Deletado [PUM.SearchPage][Chrome:Config] Default [SecurePrefs] : default_search_provider_data.template_url_data.keyword [google.com_] -> Deletado ¤¤¤ Verificação da MBR : ¤¤¤ +++++ PhysicalDrive0: ST9500325AS +++++ --- User --- [MBR] 7a68a598c8b4211b611442cc3f5bdaed [BSP] 37f9f7a0e1af97df9a0bbc2fde5e745e : Windows Vista/7/8|VT.Unknown MBR Code Partition table: 0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 200 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader] 1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 411648 | Size: 431937 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader] 2 - [XXXXXX] EXTEN-LBA (0xf) [VISIBLE] Offset (sectors): 885019008 | Size: 29693 MB 3 - [XXXXXX] COMPAQ (0x12) [VISIBLE] Offset (sectors): 945830272 | Size: 15108 MB User = LL1 ... OK User = LL2 ... OK
  10. Boa noite, Segue abaixo a resposta do log, não deletei os arquivos encontrados, pois não foi recomendado. RogueKiller V12.11.1.0 (x64) [Jun 4 2017] (Free) por Adlice Software mail : http://www.adlice.com/contact/ Feedback : https://forum.adlice.com Site : http://www.adlice.com/download/roguekiller/ Blog : http://www.adlice.com Sistema Operacional : Windows 7 (6.1.7601 Service Pack 1) 64 bits version Iniciou : Modo normal Usuário : Leonardo [Administrador] Started from : C:\Users\Leonardo\Desktop\RogueKiller_portable64.exe Modo : Escanear -- Data : 06/11/2017 19:49:37 (Duration : 01:03:11) ¤¤¤ Processos : 2 ¤¤¤ [PUP.HackTool|VT.Patched3_c.BWLA] KMS Server Service.exe(2020) -- C:\Windows\KMSServerService\KMS Server Service.exe[-] -> Encontrado [PUP.HackTool|VT.Patched3_c.BWLA] (SVC) KMSServerService -- C:\Windows\KMSServerService\KMS Server Service.exe [-] -> Encontrado ¤¤¤ Registro : 6 ¤¤¤ [PUP.HackTool|VT.Patched3_c.BWLA] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\KMSServerService (C:\Windows\KMSServerService\KMS Server Service.exe ) -> Encontrado [PUP.HackTool|VT.Patched3_c.BWLA] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\KMSServerService (C:\Windows\KMSServerService\KMS Server Service.exe ) -> Encontrado [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters | DhcpNameServer : 187.2.88.41 187.2.88.46 ([Brazil][Brazil]) -> Encontrado [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters | DhcpNameServer : 187.2.88.41 187.2.88.46 ([Brazil][Brazil]) -> Encontrado [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{623EE748-4E50-484A-B5B2-EA28D6F58E81} | DhcpNameServer : 187.2.88.41 187.2.88.46 ([Brazil][Brazil]) -> Encontrado [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{623EE748-4E50-484A-B5B2-EA28D6F58E81} | DhcpNameServer : 187.2.88.41 187.2.88.46 ([Brazil][Brazil]) -> Encontrado ¤¤¤ Tarefas : 0 ¤¤¤ ¤¤¤ Arquivos : 20 ¤¤¤ [PUP.HackTool][Pasta] C:\Windows\KMSServerService -> Encontrado [Hidden.ADS][Stream] C:\Windows\System32:DEA1351C_Bb.gbp -> Encontrado [Hidden.ADS][Stream] C:\Windows\System32:DEA1351C_Cef.gbp -> Encontrado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.5_41073\utorrentie.exe -> Encontrado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.5_41162\utorrentie.exe -> Encontrado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.5_41202\utorrentie.exe -> Encontrado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.5_41372\utorrentie.exe -> Encontrado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.5_41712\utorrentie.exe -> Encontrado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.5_41865\utorrentie.exe -> Encontrado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.6_42094\utorrentie.exe -> Encontrado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.7_42330\utorrentie.exe -> Encontrado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.8_42449\utorrentie.exe -> Encontrado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.8_42576\utorrentie.exe -> Encontrado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.9_42923\utorrentie.exe -> Encontrado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.9_42973\utorrentie.exe -> Encontrado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.9_43085\utorrentie.exe -> Encontrado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.9_43295\utorrentie.exe -> Encontrado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.4.9_43388\utorrentie.exe -> Encontrado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.5.0_43580\utorrentie.exe -> Encontrado [Tr.Gen0][Arquivo] C:\Users\Leonardo\AppData\Roaming\uTorrent\updates\3.5.0_43804\utorrentie.exe -> Encontrado ¤¤¤ WMI : 0 ¤¤¤ ¤¤¤ Arquivos de hosts : 0 ¤¤¤ ¤¤¤ Antirootkit : 0 (Driver: Carregado) ¤¤¤ ¤¤¤ Navegadores : 2 ¤¤¤ [PUP.Gen0][Chrome:Addon] Default : Video Downloader professional [elicpjhcidhpjomhibiffojpinpmmpil] -> Encontrado [PUM.SearchPage][Chrome:Config] Default [SecurePrefs] : default_search_provider_data.template_url_data.keyword [google.com_] -> Encontrado ¤¤¤ Verificação da MBR : ¤¤¤ +++++ PhysicalDrive0: ST9500325AS +++++ --- User --- [MBR] 7a68a598c8b4211b611442cc3f5bdaed [BSP] 37f9f7a0e1af97df9a0bbc2fde5e745e : Windows Vista/7/8|VT.Unknown MBR Code Partition table: 0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 200 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader] 1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 411648 | Size: 431937 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader] 2 - [XXXXXX] EXTEN-LBA (0xf) [VISIBLE] Offset (sectors): 885019008 | Size: 29693 MB 3 - [XXXXXX] COMPAQ (0x12) [VISIBLE] Offset (sectors): 945830272 | Size: 15108 MB User = LL1 ... OK User = LL2 ... OK Att, Arcksouls
  11. Boa tarde Elias, Segue abaixo os logs. Malwarebytes www.malwarebytes.com -Detalhes de registro- Data da análise: 09/06/17 Hora da análise: 19:43 Arquivo de registro: Relatório Malwarebytes.txt Administrador: Sim -Informação do software- Versão: 3.0.6.1469 Versão de componentes: 1.0.103 Versão do pacote de definições: 1.0.2124 Licença: Grátis -Informação do sistema- Sistema operacional: Windows 7 Service Pack 1 CPU: x64 Sistema de arquivos: NTFS Usuário: Leonardo-PC\Leonardo -Resumo da análise- Tipo de análise: Análise Customizada Resultado: Concluído Objetos verificados: 374326 Tempo decorrido: 5 hr, 56 min, 16 seg -Opções da análise- Memória: Habilitado Inicialização: Habilitado Sistema de arquivos: Habilitado Arquivos compactados: Habilitado Rootkits: Habilitado Heurística: Habilitado PUP: Habilitado PUM: Habilitado -Detalhes da análise- Processo: 0 (Nenhum item malicioso detectado) Módulo: 0 (Nenhum item malicioso detectado) Chave de registro: 0 (Nenhum item malicioso detectado) Valor de registro: 0 (Nenhum item malicioso detectado) Dados de registro: 0 (Nenhum item malicioso detectado) Fluxo de dados: 0 (Nenhum item malicioso detectado) Pasta: 0 (Nenhum item malicioso detectado) Arquivo: 1 RiskWare.DontStealOurSoftware, C:\USERS\LEONARDO\DOWNLOADS\MALWAREBYTES.PREMIUM.V3.0.6.1469.MULTILINGUAL.KEYGEN\MALWAREBYTES_ANTI-MALWARE_KEYGEN_V1.5.EXE, Falha ao remover, [719], [77941],1.0.2124 Setor físico: 0 (Nenhum item malicioso detectado) (end) ---------------------------------- # AdwCleaner v6.047 - Logfile created 10/06/2017 at 12:03:27 # Updated on 19/05/2017 by Malwarebytes # Database : 2017-06-10.1 [Server] # Operating System : Windows 7 Ultimate Service Pack 1 (X64) # Username : Leonardo - LEONARDO-PC # Running from : C:\Users\Leonardo\Desktop\adwcleaner_6.047.exe # Mode: Clean # Support : https://www.malwarebytes.com/support ***** [ Services ] ***** ***** [ Folders ] ***** ***** [ Files ] ***** ***** [ DLL ] ***** ***** [ WMI ] ***** ***** [ Shortcuts ] ***** ***** [ Scheduled Tasks ] ***** ***** [ Registry ] ***** ***** [ Web browsers ] ***** ************************* :: "Tracing" keys deleted :: Winsock settings cleared ************************* C:\AdwCleaner\AdwCleaner[C1].txt - [2554 Bytes] - [03/11/2015 09:01:57] C:\AdwCleaner\AdwCleaner[C2].txt - [1376 Bytes] - [06/03/2017 19:37:49] C:\AdwCleaner\AdwCleaner[C3].txt - [2516 Bytes] - [16/05/2017 15:53:10] C:\AdwCleaner\AdwCleaner[C4].txt - [995 Bytes] - [10/06/2017 12:03:27] C:\AdwCleaner\AdwCleaner[S1].txt - [2344 Bytes] - [03/11/2015 08:41:40] C:\AdwCleaner\AdwCleaner[S2].txt - [1426 Bytes] - [06/03/2017 19:36:56] C:\AdwCleaner\AdwCleaner[S3].txt - [2468 Bytes] - [16/05/2017 15:51:36] C:\AdwCleaner\AdwCleaner[S4].txt - [1606 Bytes] - [10/06/2017 12:03:07] ########## EOF - C:\AdwCleaner\AdwCleaner[C4].txt - [1359 Bytes] ########## --------------------------------------- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Junkware Removal Tool (JRT) by Malwarebytes Version: 8.1.3 (04.10.2017) Operating System: Windows 7 Ultimate x64 Ran by Leonardo (Administrator) on 10/06/2017 at 12:51:00,68 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ File System: 15 Successfully deleted: C:\ProgramData\productdata (Folder) Successfully deleted: C:\Users\Leonardo\AppData\Local\Google\Chrome\User Data\Default\Extensions\gkojfkhlekighikafcpjkiklfbnlmeio (Folder) Successfully deleted: C:\Users\Leonardo\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gkojfkhlekighikafcpjkiklfbnlmeio (Folder) Successfully deleted: C:\Users\Leonardo\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_gkojfkhlekighikafcpjkiklfbnlmeio_0.localstorage (File) Successfully deleted: C:\Users\Leonardo\AppData\Roaming\productdata (Folder) Successfully deleted: C:\Windows\system32\Tasks\Driver Booster SkipUAC (Leonardo) (Task) Successfully deleted: C:\Users\Leonardo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D889WDBF (Temporary Internet Files Folder) Successfully deleted: C:\Users\Leonardo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F90PFQ6R (Temporary Internet Files Folder) Successfully deleted: C:\Users\Leonardo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KU5WXCWP (Temporary Internet Files Folder) Successfully deleted: C:\Users\Leonardo\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MT5ZOSTF (Temporary Internet Files Folder) Successfully deleted: C:\Windows\system32\REN51E7.tmp (File) Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D889WDBF (Temporary Internet Files Folder) Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F90PFQ6R (Temporary Internet Files Folder) Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KU5WXCWP (Temporary Internet Files Folder) Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MT5ZOSTF (Temporary Internet Files Folder) Registry: 0 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Scan was completed on 10/06/2017 at 13:15:49,31 End of JRT log ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  12. Boa noite, Meu notebook ficou muito lento de uns dias pra cá, venho solicitar a análise do log. Muito obrigado, Att, Arcksouls FSS.txt MbrScan.log ZA-Scan.txt
  13. Por favor alguem pode me ajudar ? Meu micro ja tem uns 6 anos ou mais ... e ja tem uns 5 anos que ele comecou a apresentar problemas frequentemente ... uma das vezes que levei no tecnico ele me mostrou o processador e tava cheio de pasta termina grudada e o animal tinha raspado com a chave do carro pra tirar e ficou tudo arranhada... ai beleza parou um pouco de dar problema .. ai dps de um tempo comecou a acusar overclock e a placa de video foi pro brejo ... ai minha mae levo pra troca a placa de video e quando trouxe o pc de volta deu o mesmo problema .... até briguei com o cara da loja porque ele fico me acusando de ter feito overclock de novo e queimado a placa nova .... ai depois disso continuou com varios problemas de travar , reiniciar e etc ... quando fazia muito tempo que tava com a pasta termica eu trocava ... ai semana passada ele comeco a reiniciar e nao parava ... eu tentei formatar e ficava reiniciando direto ... ai peguei o hd desse pc e coloquei em outro pc pra formatar e agora só consigo ligar esse pc "problematico" só em modo de segurança .... o hd desse pc aparentemente nao deu problema no outro pc ... então discartei ser no hd ... ele tem 2 pent de memoria ... tentei ligar com um só revezando os dois e continua reiniciando ... (pode ser problema nas duas memorias) pode ser a MB pode ser o processador ferrado pelo tecnico ou a placa de video ... nao sei mais o que fazer e to precisando muito desse pc em casa ... eu nao tenho dinheiro pra trocar todas as peças .... eu dismontei o pc todo e limpei ... limpei o processador com alcool isopropilico e troquei a pasta .... acredito que nao seja problema de aquecimento .... MB -> asus p4s800d-x processador intel p4 3.0 2 pent de memoria totalizando 512mb placa de video eu nao lembro nao estou em casa agora .. se nao me engano é fx 5200 por favor me ajudem ... amanha sera provavelmente minha ultima tentativa... existe algum programa pra identificar o problema ? obs: o micro esta recem formatado ... porém foi com o hd em outro micro de configuracoes diferentes...
  14. consegui passar, nao apareceu nenhum aviso e o note desligou uma vez durante a analise ... obs o note ta esquentando muito e as vezes até desliga
  15. nao estou conseguindo fazer o scan, o note esta superaquecendo com o scan e apagando a tela ou desligando.

Sobre o Clube do Hardware

No ar desde 1996, o Clube do Hardware é uma das maiores, mais antigas e mais respeitadas publicações sobre tecnologia do Brasil. Leia mais

Direitos autorais

Não permitimos a cópia ou reprodução do conteúdo do nosso site, fórum, newsletters e redes sociais, mesmo citando-se a fonte. Leia mais

×
×
  • Criar novo...

GRÁTIS: minicurso “Como ganhar dinheiro montando computadores”

Gabriel TorresGabriel Torres, fundador e editor executivo do Clube do Hardware, acaba de lançar um minicurso totalmente gratuito: "Como ganhar dinheiro montando computadores".

Você aprenderá sobre o quanto pode ganhar, como cobrar, como lidar com a concorrência, como se tornar um profissional altamente qualificado e muito mais!

Inscreva-se agora!