Ir ao conteúdo
  • Cadastre-se

Posts recomendados

  • Analista de Segurança

@teffa.monsu

 

Por favor, atente para o seguinte:

  • Sobre o Fórum: Este é um espaço privado, não público. Seu uso é um privilégio, não um direito;
  • O que será passado aqui, somente será com relação ao problema do seu computador portanto, não faça mais em nenhum outro;
  • IMPORTANTE: Caso tenha programas de ativação do windows ou de compartilhamento p2p/toŕŕent, sugiro desinstalar. Só irei dar procedimento na analise após a remoção. Regras do forum;
  • Siga, por favor, atentamente as instruções passadas e em caso de dúvidas não hesite em perguntá-las;
  • Respeite a ordem das instruções passadas;
  • Observação: Não tome outra medida além das passadas aqui; atente para que, caso peça ajuda em outro fórum, não deixe de nos informar, sob risco de desconfigurar seu computador!


Regras da Área de Remoção de Malware << IMPORTANTE A LEITURA

Regras Gerais do Forum Clube do Hardware << IMPORTANTE A LEITURA
 

Siga os passos abaixo:

Desative temporariamente seu antivirus, antispywares e firewall, para não causar conflitos.

 

ETAPA 1

 

Faça o download do AdwCleaner de um dos links abaixo e salve no desktop.

https://toolslib.net/downloads/viewdownload/1-adwcleaner/

http://www.bleepingcomputer.com/download/adwcleaner/

Clique em DOWNLOAD NOW para baixar o arquivo.

Execute o adwcleaner.exe

OBS: Usuários do Windows Vista, 7, 8/8.1 e windows 10 clique com o direito sobre o arquivo AdwCleaner.exe, depois clique em image.png

Clique em VERIFICAR AGORA/SCAN NOW. Após o termino clique em LIMPAR/CLEAN e aguarde.

Será aberto o bloco de notas com o resultado.

 

ATENÇÃO: Selecione, copie e cole o seu conteúdo na próxima resposta.

 

ETAPA 2

 

Faça o download do ZHPCleaner no link abaixo e salve em sua Área de trabalho (Desktop)

https://www.majorgeeks.com/files/details/zhpcleaner.html

Execute o arquivo ZHPCleaner.exe Como Administrador

  • Clique no botão Scanner.
  • A ferramenta começara o exame do seu sistema.
  • Tenha paciência pois pode demorar um pouco dependendo da quantidades de itens a examinar.
  • Em seguida clique no botão Reparar.
  • Será gerado um log chamado ZHPCleaner.txt

ATENÇÃO: Selecione, copie e cole o seu conteúdo na próxima resposta.

Link para o post
Compartilhar em outros sites

# -------------------------------
# Malwarebytes AdwCleaner 8.2.0.0
# -------------------------------
# Build:    03-22-2021
# Database: 2021-04-01.1 (Cloud)
# Support: https://www.malwarebytes.com/support
#
# -------------------------------
# Mode: Scan
# -------------------------------
# Start:    04-06-2021
# Duration: 00:00:52
# OS:       Windows 7 Home Premium
# Scanned:  31986
# Detected: 11


***** [ Services ] *****

No malicious services found.

***** [ Folders ] *****

No malicious folders found.

***** [ Files ] *****

No malicious files found.

***** [ DLL ] *****

No malicious DLLs found.

***** [ WMI ] *****

No malicious WMI found.

***** [ Shortcuts ] *****

No malicious shortcuts found.

***** [ Tasks ] *****

No malicious tasks found.

***** [ Registry ] *****

No malicious registry entries found.

***** [ Chromium (and derivatives) ] *****

No malicious Chromium entries found.

***** [ Chromium URLs ] *****

No malicious Chromium URLs found.

***** [ Firefox (and derivatives) ] *****

No malicious Firefox entries found.

***** [ Firefox URLs ] *****

No malicious Firefox URLs found.

***** [ Hosts File Entries ] *****

No malicious hosts file entries found.

***** [ Preinstalled Software ] *****

Preinstalled.SamsungBatteryLifeExtender   Folder   C:\Program Files (x86)\SAMSUNG\BATTERYLIFEEXTENDER 
Preinstalled.SamsungBatteryLifeExtender   Registry   HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{54BA6022-385A-4D7D-868A-821C6CB45667} 
Preinstalled.SamsungBatteryLifeExtender   Registry   HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\BatteryLifeExtender 
Preinstalled.SamsungBatteryLifeExtender   Task   C:\Windows\System32\Tasks\BATTERYLIFEEXTENDER 
Preinstalled.SamsungEasyDisplayManager   Folder   C:\Program Files (x86)\SAMSUNG\EASY DISPLAY MANAGER 
Preinstalled.SamsungEasyDisplayManager   Folder   C:\ProgramData\Microsoft\Windows\Start Menu\Programs\SAMSUNG\EASY DISPLAY MANAGER 
Preinstalled.SamsungEasyDisplayManager   Folder   C:\ProgramData\SAMSUNG\EASY DISPLAY MANAGER 
Preinstalled.SamsungEasyDisplayManager   Registry   HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{38560B8D-7D48-4D86-ACA3-699260D36935} 
Preinstalled.SamsungEasyDisplayManager   Registry   HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\EasyDisplayMgr 
Preinstalled.SamsungEasyDisplayManager   Registry   HKLM\Software\Wow6432Node\\Microsoft\Windows\CurrentVersion\Uninstall\{17283B95-21A8-4996-97DA-547A48DB266F} 
Preinstalled.SamsungEasyDisplayManager   Task   C:\Windows\System32\Tasks\EASYDISPLAYMGR 

########## EOF - C:\AdwCleaner\Logs\AdwCleaner[S00].txt ##########
 

~ ZHPCleaner v2021.4.3.289 by Nicolas Coolman (2021/04/03) ~ Run by Monsu (Administrator) (06/04/2021 00:52:51) ~ Web: https://www.nicolascoolman.com ~ Blog: https://nicolascoolman.eu/ ~ Facebook : https://www.facebook.com/nicolascoolman1 ~ State version : ~ Certificate ZHPCleaner: Legal ~ Type : Repair ~ Report : C:\Users\Monsu\Desktop\ZHPCleaner (R).txt ~ Quarantine : C:\Users\Monsu\AppData\Roaming\ZHP\ZHPCleaner_Reg.txt ~ UAC : Deactivate ~ Boot Mode : Normal (Normal boot) Windows 7 Home Premium, 64-bit Service Pack 1 (Build 7601) ---\ Alternate Data Stream (ADS). (0) ~ No malicious or unnecessary items found. (ADS) ---\ Services (0) ~ No malicious or unnecessary items found. (Service) ---\ Browser internet (0) ~ No malicious or unnecessary items found. (Browser) ---\ Hosts file (1) ~ The hosts file is legitimate (21) ---\ Scheduled automatic tasks. (1) DELETED task: [AutoKMS] [C:\Windows\Tasks\AutoKMS.job (Not File) ] =>HackTool.AutoKMS ---\ Explorer ( File, Folder) (32) MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Preferences =>Préférences Chromium MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Profile 1\Preferences =>Préférences Chromium MOVED file: C:\Users\Monsu\AppData\Local\Microsoft\Edge\User Data\Default\Preferences =>Préférences Chromium MOVED file: C:\Windows\Tasks\AutoKMS.job =>HackTool.AutoKMS MOVED file: C:\Windows\Temp\GUR3DC5.exe =>Heuristic.Suspect MOVED file: C:\Windows\Temp\GUR447F.exe =>Heuristic.Suspect MOVED file: C:\Windows\Temp\GUR4DCD.exe =>Heuristic.Suspect MOVED file: C:\Windows\Temp\GURD473.exe =>Heuristic.Suspect MOVED file: C:\Windows\Temp\{6048E065-29FF-49CC-A5BA-55E7815D3CB7}-GoogleUpdateSetup.exe =>Heuristic.Suspect MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_dsms0mj1bbhn4.cloudfront.net_0.localstorage =>.SUP.CloudfrontNet MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_dsms0mj1bbhn4.cloudfront.net_0.localstorage-journal =>.SUP.CloudfrontNet MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_secure.booking.com_0.localstorage =>PUP.Optional.Booking MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_secure.booking.com_0.localstorage-journal =>PUP.Optional.Booking MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_static.olark.com_0.localstorage =>PUP.Optional.Generic MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_static.olark.com_0.localstorage-journal =>PUP.Optional.Generic MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_d1w1h2aw6b6mz2.cloudfront.net_0.localstorage =>.SUP.CloudfrontNet MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_d1w1h2aw6b6mz2.cloudfront.net_0.localstorage-journal =>.SUP.CloudfrontNet MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_static.audienceinsights.net_0.localstorage =>.SUP.AudienceInsights MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_static.audienceinsights.net_0.localstorage-journal =>.SUP.AudienceInsights MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.ask.com_0.localstorage =>Toolbar.Ask MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.ask.com_0.localstorage-journal =>Toolbar.Ask MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.booking.com_0.localstorage =>PUP.Optional.Booking MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.booking.com_0.localstorage-journal =>PUP.Optional.Booking MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.superfish.com_0.localstorage =>.SUP.Superfish MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.superfish.com_0.localstorage-journal =>.SUP.Superfish MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.vitruvianleads.com_0.localstorage =>Adware.Vitruvian MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.vitruvianleads.com_0.localstorage-journal =>Adware.Vitruvian MOVED file: C:\Windows\AutoKMS\AutoKMS.log =>HackTool.AutoKMS MOVED folder: C:\Users\Monsu\AppData\Roaming\HMYGSetting =>Adware.Suspect MOVED folder: C:\Windows\AutoKMS =>HackTool.AutoKMS MOVED folder: C:\Program Files (x86)\QuickTime =>Riskware.QuickTime MOVED folder: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\QuickTime =>Riskware.QuickTime ---\ Registry ( Key, Value, Data) (4) DELETED key*: [X64] HKLM\SOFTWARE\Classes\f [f] =>PUP.Optional.Funmoods DELETED key*: [X64] HKLM\SOFTWARE\Classes\AppID\{4D076AB4-7562-427A-B5D2-BD96E19DEE56} [secman] =>PUP.Optional.Camec DELETED key**: [X64] HKLM\SOFTWARE\Wow6432Node\Classes\AppID\{4D076AB4-7562-427A-B5D2-BD96E19DEE56} [secman] =>PUP.Optional.Camec DELETED key*: [X64] HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{79FB5FC8-44B9-4AF5-BADD-CCE547F953E5} [ITool] =>Toolbar.Ask ---\ Summary of the elements found (14) https://nicolascoolman.eu/2017/02/02/hacktool-autokms/ =>HackTool.AutoKMS https://nicolascoolman.eu/forum/Topic/repaquetage-et-infection/ =>Préférences Chromium https://nicolascoolman.eu/2017/01/28/heuristic-suspect/ =>Heuristic.Suspect https://nicolascoolman.eu/forum/Topic/logiciels-potentiellement-superflus-lps/ =>.SUP.CloudfrontNet https://nicolascoolman.eu/forum/Topic/booking-logiciel-potentiellement-indesirable-pup-lpi/ =>PUP.Optional.Booking https://nicolascoolman.eu/2017/01/27/repaquetage-et-infection/ =>PUP.Optional.Generic https://nicolascoolman.eu/forum/Topic/logiciels-potentiellement-superflus-lps/ =>.SUP.AudienceInsights https://nicolascoolman.eu/2017/02/28/toolbar-ask/ =>Toolbar.Ask https://nicolascoolman.eu/forum/Topic/logiciels-potentiellement-superflus-lps/ =>.SUP.Superfish https://nicolascoolman.eu/2017/10/06/adware-vitruvian/ =>Adware.Vitruvian https://nicolascoolman.eu/2017/03/02/adware-suspect/ =>Adware.Suspect https://nicolascoolman.eu/2017/01/15/riskware-quicktime/ =>Riskware.QuickTime https://nicolascoolman.eu/forum/Topic/funmoods-logiciel-potentiellement-indesirable-pup-lpi/ =>PUP.Optional.Funmoods https://nicolascoolman.eu/forum/Topic/repaquetage-et-infection/ =>PUP.Optional.Camec ---\ Other deletions. (22) ~ Registry Keys Tracing deleted (22) ~ Remove the old reports ZHPCleaner. (0) ---\ Result of repair ~ Repair carried out successfully ~ Google Chrome OK ~ Internet Explorer OK ---\ Statistics ~ Items scanned : 9377 ~ Items found : 0 ~ Items cancelled : 0 ~ Space saving (bytes) : 0 ~ Items options : 9/17 ---\ OPTIONS NOT ACTIVES ~ Temporary file analysis ~ Temporary folder analysis ~ Empty Folder CLSID Analysis ~ Empty Other Folder Analysis ~ Empty LocalLow Folder Analysis ~ Empty Local Folder Analysis ~ Obsolete Installer File Analysis ~ Start browsers with extensions removed ~ End of clean in 00h00mn15s ---\ Reports (2) ZHPCleaner-[S]-06042021-00_51_08.txt ZHPCleaner-[R]-06042021-00_53_06.txt

~ ZHPCleaner v2021.4.3.289 by Nicolas Coolman (2021/04/03) ~ Run by Monsu (Administrator) (06/04/2021 00:52:51) ~ Web: https://www.nicolascoolman.com ~ Blog: https://nicolascoolman.eu/ ~ Facebook : https://www.facebook.com/nicolascoolman1 ~ State version : ~ Certificate ZHPCleaner: Legal ~ Type : Repair ~ Report : C:\Users\Monsu\Desktop\ZHPCleaner (R).txt ~ Quarantine : C:\Users\Monsu\AppData\Roaming\ZHP\ZHPCleaner_Reg.txt ~ UAC : Deactivate ~ Boot Mode : Normal (Normal boot) Windows 7 Home Premium, 64-bit Service Pack 1 (Build 7601) ---\ Alternate Data Stream (ADS). (0) ~ No malicious or unnecessary items found. (ADS) ---\ Services (0) ~ No malicious or unnecessary items found. (Service) ---\ Browser internet (0) ~ No malicious or unnecessary items found. (Browser) ---\ Hosts file (1) ~ The hosts file is legitimate (21) ---\ Scheduled automatic tasks. (1) DELETED task: [AutoKMS] [C:\Windows\Tasks\AutoKMS.job (Not File) ] =>HackTool.AutoKMS ---\ Explorer ( File, Folder) (32) MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Preferences =>Préférences Chromium MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Profile 1\Preferences =>Préférences Chromium MOVED file: C:\Users\Monsu\AppData\Local\Microsoft\Edge\User Data\Default\Preferences =>Préférences Chromium MOVED file: C:\Windows\Tasks\AutoKMS.job =>HackTool.AutoKMS MOVED file: C:\Windows\Temp\GUR3DC5.exe =>Heuristic.Suspect MOVED file: C:\Windows\Temp\GUR447F.exe =>Heuristic.Suspect MOVED file: C:\Windows\Temp\GUR4DCD.exe =>Heuristic.Suspect MOVED file: C:\Windows\Temp\GURD473.exe =>Heuristic.Suspect MOVED file: C:\Windows\Temp\{6048E065-29FF-49CC-A5BA-55E7815D3CB7}-GoogleUpdateSetup.exe =>Heuristic.Suspect MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_dsms0mj1bbhn4.cloudfront.net_0.localstorage =>.SUP.CloudfrontNet MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_dsms0mj1bbhn4.cloudfront.net_0.localstorage-journal =>.SUP.CloudfrontNet MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_secure.booking.com_0.localstorage =>PUP.Optional.Booking MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_secure.booking.com_0.localstorage-journal =>PUP.Optional.Booking MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_static.olark.com_0.localstorage =>PUP.Optional.Generic MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_static.olark.com_0.localstorage-journal =>PUP.Optional.Generic MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_d1w1h2aw6b6mz2.cloudfront.net_0.localstorage =>.SUP.CloudfrontNet MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_d1w1h2aw6b6mz2.cloudfront.net_0.localstorage-journal =>.SUP.CloudfrontNet MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_static.audienceinsights.net_0.localstorage =>.SUP.AudienceInsights MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_static.audienceinsights.net_0.localstorage-journal =>.SUP.AudienceInsights MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.ask.com_0.localstorage =>Toolbar.Ask MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.ask.com_0.localstorage-journal =>Toolbar.Ask MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.booking.com_0.localstorage =>PUP.Optional.Booking MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.booking.com_0.localstorage-journal =>PUP.Optional.Booking MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.superfish.com_0.localstorage =>.SUP.Superfish MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.superfish.com_0.localstorage-journal =>.SUP.Superfish MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.vitruvianleads.com_0.localstorage =>Adware.Vitruvian MOVED file: C:\Users\Monsu\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.vitruvianleads.com_0.localstorage-journal =>Adware.Vitruvian MOVED file: C:\Windows\AutoKMS\AutoKMS.log =>HackTool.AutoKMS MOVED folder: C:\Users\Monsu\AppData\Roaming\HMYGSetting =>Adware.Suspect MOVED folder: C:\Windows\AutoKMS =>HackTool.AutoKMS MOVED folder: C:\Program Files (x86)\QuickTime =>Riskware.QuickTime MOVED folder: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\QuickTime =>Riskware.QuickTime ---\ Registry ( Key, Value, Data) (4) DELETED key*: [X64] HKLM\SOFTWARE\Classes\f [f] =>PUP.Optional.Funmoods DELETED key*: [X64] HKLM\SOFTWARE\Classes\AppID\{4D076AB4-7562-427A-B5D2-BD96E19DEE56} [secman] =>PUP.Optional.Camec DELETED key**: [X64] HKLM\SOFTWARE\Wow6432Node\Classes\AppID\{4D076AB4-7562-427A-B5D2-BD96E19DEE56} [secman] =>PUP.Optional.Camec DELETED key*: [X64] HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{79FB5FC8-44B9-4AF5-BADD-CCE547F953E5} [ITool] =>Toolbar.Ask ---\ Summary of the elements found (14) https://nicolascoolman.eu/2017/02/02/hacktool-autokms/ =>HackTool.AutoKMS https://nicolascoolman.eu/forum/Topic/repaquetage-et-infection/ =>Préférences Chromium https://nicolascoolman.eu/2017/01/28/heuristic-suspect/ =>Heuristic.Suspect https://nicolascoolman.eu/forum/Topic/logiciels-potentiellement-superflus-lps/ =>.SUP.CloudfrontNet https://nicolascoolman.eu/forum/Topic/booking-logiciel-potentiellement-indesirable-pup-lpi/ =>PUP.Optional.Booking https://nicolascoolman.eu/2017/01/27/repaquetage-et-infection/ =>PUP.Optional.Generic https://nicolascoolman.eu/forum/Topic/logiciels-potentiellement-superflus-lps/ =>.SUP.AudienceInsights https://nicolascoolman.eu/2017/02/28/toolbar-ask/ =>Toolbar.Ask https://nicolascoolman.eu/forum/Topic/logiciels-potentiellement-superflus-lps/ =>.SUP.Superfish https://nicolascoolman.eu/2017/10/06/adware-vitruvian/ =>Adware.Vitruvian https://nicolascoolman.eu/2017/03/02/adware-suspect/ =>Adware.Suspect https://nicolascoolman.eu/2017/01/15/riskware-quicktime/ =>Riskware.QuickTime https://nicolascoolman.eu/forum/Topic/funmoods-logiciel-potentiellement-indesirable-pup-lpi/ =>PUP.Optional.Funmoods https://nicolascoolman.eu/forum/Topic/repaquetage-et-infection/ =>PUP.Optional.Camec ---\ Other deletions. (22) ~ Registry Keys Tracing deleted (22) ~ Remove the old reports ZHPCleaner. (0) ---\ Result of repair ~ Repair carried out successfully ~ Google Chrome OK ~ Internet Explorer OK ---\ Statistics ~ Items scanned : 9377 ~ Items found : 0 ~ Items cancelled : 0 ~ Space saving (bytes) : 0 ~ Items options : 9/17 ---\ OPTIONS NOT ACTIVES ~ Temporary file analysis ~ Temporary folder analysis ~ Empty Folder CLSID Analysis ~ Empty Other Folder Analysis ~ Empty LocalLow Folder Analysis ~ Empty Local Folder Analysis ~ Obsolete Installer File Analysis ~ Start browsers with extensions removed ~ End of clean in 00h00mn15s ---\ Reports (2) ZHPCleaner-[S]-06042021-00_51_08.txt ZHPCleaner-[R]-06042021-00_53_06.txt

Link para o post
Compartilhar em outros sites
  • Analista de Segurança

@teffa.monsu

 

Faça o download do RogueKiller by Tigzy, e salve na sua área de trabalho (Desktop)

roguekiller.exe (x64) << link

  • Feche todos os programas
  • Execute o RogueKiller.exe.
    ** Usuários do Windows Vista, Windows 7, 8, 8.1 e Windows 10:Clique com o direito sobre o arquivo rogueKiller.exe, depois clique em image.png
  • Clique em SCAN
  • Clique no primeiro START "Standard Scan (recommended)" e aguarde o scan...
  • Clique no botão RESULTS
  • Clique na opção REPORT e em EXPORT e selecione a opção Text file...
  • Salve o arquivo na area de trabalho com o nome roguekiller_report

Atente para abrir o arquivo, copiar e colar todo o conteúdo na sua próxima resposta

Link para o post
Compartilhar em outros sites

RogueKiller Anti-Malware V14.8.6.0 (x64) [Mar 24 2021] (Free) by Adlice Software
mail : https://adlice.com/contact/
Website : https://adlice.com/download/roguekiller/
Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits
Started in : Normal mode
User : Monsu [Administrator]
Started from : C:\Program Files\RogueKiller\RogueKiller64.exe
Signatures : 20210407_080335, Driver : Loaded
Mode : Standard Scan, Scan -- Date : 2021/04/07 22:12:25 (Duration : 00:23:58)

¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Processes ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤

¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Process Modules ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤

¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Services ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤

¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Tasks ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤

¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Registry ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤
>>>>>> XX - System Policies
  [PUM.Policies (Potentially Malicious)] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System|ConsentPromptBehaviorAdmin -- 0 -> Found

¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ WMI ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤

¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Hosts File ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤

¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Files ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤

¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Web browsers ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤

¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Antirootkit : 0 (Driver: Loaded) ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤
 

Link para o post
Compartilhar em outros sites

RogueKiller Anti-Malware V14.8.6.0 (x64) [Mar 24 2021] (Free) by Adlice Software
mail : https://adlice.com/contact/
Website : https://adlice.com/download/roguekiller/
Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits
Started in : Normal mode
User : Monsu [Administrator]
Started from : C:\Program Files\RogueKiller\RogueKiller64.exe
Signatures : 20210407_080335, Driver : Loaded
Mode : Standard Scan, Delete -- Date : 2021/04/10 02:15:41 (Duration : 00:25:29)
Switches : -minimize

¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤ Delete ¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤¤
[PUM.Policies (Potentially Malicious)] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System|ConsentPromptBehaviorAdmin --  -> Replaced (2)
 

Link para o post
Compartilhar em outros sites
  • Analista de Segurança

@teffa.monsu

 

  1. Clique no menu Iniciar, e após isso clique com o botão direito do mouse sob Meu computador e selecione a opção Propriedades.
  2. Em Propriedades, selecione a opção Configurações avançadas do sistema.
  3. Vá na aba Proteção do Sistema, e em Restauração do Sistema, vá na opção Criar.
    fce2f587-5556-456b-93d4-00966ae7f59d
  4. Depois basta seguir as instruções em tela, para criar seu ponto de restauração.OBS: Lembre-se de colocar um nome de fácil entendimento para uma posterior restauração a partir deste ponto.

Pressione as teclas Windows conheca-atalhos-de-teclado-para-dominar-o-windows-8-2.jpg + R e digite: msconfig 

- Clique na guia Serviços, marque a opção Ocultar todos os serviços Microsoft e depois clique em Desativar tudo

- Clique na guia Inicialização de Programas e clique em Desativar tudo 

 

Siga as mensagens ate que seja solicitado a reiniciar.Após isso me informe se os problemas em relação a malwares ainda persistem.

 

Link para o post
Compartilhar em outros sites

Crie uma conta ou entre para comentar

Você precisa ser um usuário para fazer um comentário

Criar uma conta

Crie uma nova conta em nossa comunidade. É fácil!

Crie uma nova conta

Entrar

Já tem uma conta? Faça o login.

Entrar agora

Sobre o Clube do Hardware

No ar desde 1996, o Clube do Hardware é uma das maiores, mais antigas e mais respeitadas comunidades sobre tecnologia do Brasil. Leia mais

Direitos autorais

Não permitimos a cópia ou reprodução do conteúdo do nosso site, fórum, newsletters e redes sociais, mesmo citando-se a fonte. Leia mais

×
×
  • Criar novo...

Redes-Wi-Fi-capa-3d-newsletter.png

EBOOK GRÁTIS!

CLIQUE AQUI E BAIXE AGORA MESMO!