Imposible eliminar malware, ¡ayuda!

He formateado y reinstalado el sistema operativo Windows, pero se vuelve a infectar de inmediato, no sé si ya viene de raíz en la instalación de Windows la infección, ya que tras reinstalar el sistema operativo con el formateo de la unidad continúa las mismas infecciones.

El programa Zemana AntiMalware detecta ciertos troyanos y adwares, los consigue eliminar, pero lo tengo capado por los malwares en el sistema, y al tratar de abrir el programa actualmente, aparece un error, sólo se abre en el modo seguro, pero funciona la opción smart scan, en la que en ocasiones detecta adwares y los elimina, la opción deep scan surgen fallos en ciertos archivos durante el escaneo y se cierra inesperadamente el programa, con lo que no puedo utilizarlo actualmente debido a los malwares en el sistema. En el modo deep scan se han detectado troyanos y adwares cuando funciona el programa. He debido de instalarlo en modo seguro de Windows, ya que el instalador me daba error, debido al malware del sistema. Aún tras instalarlo en modo seguro, el programa Zemana AntiMalware en modo deep scan y modo seguro de Windows se cierra inesperadamente durante el análisis actualmente, además que no se puede abrir en el modo normal de inicio de Windows.

El sistema operativo es Microsoft Windows 10 Pro.

También utilizo el software Malwarebytes AntiMalware en modo Premium.

He utilizado la herramienta Stinger x64, la cual no ha detectado amenazas en el sistema.

La herramienta MSERT (Windows Malicious Removal Tool), la cual detecta durante el análisis elementos infectados, pero al finalizar el análisis indica que no se encontraron infecciones, con lo cual no funciona correctamente.

He utilizado la herramienta GetSusp, la cual ha detectado más de mil elementos sospechosos en el sistema, pero esta herramienta no elimina infecciones, solo detecta elementos sospechosos.

En ocasiones, tras utilizar las reparaciones en el software Tweaking Windows Repair y haciendo posteriormente un scandisk de errores en los discos duros, el software Zemana AntiMalware ha funcionado en el modo deep scan detectando troyanos y adwares y eliminandolos correctamente, pero vuelven a aparecer dichos malwares, y se bloquea esta herramienta como me ocurre actualmente ya explicado anteiromente.

También surgen pantallazos azules (BlueScreen) y se cierra el sistema, debido a los malwares.

Espero su respuesta. Saludos cordiales, razlasasz.

1 me gusta

También sólo la carpeta documentos, cuando se abre el menú para guardar un archivo, aparece en la raíz en el idioma árabe, y tengo el sistema en idioma Español.

He utilizado el programa DrWeb CureIt!, ha detectado 5 amenazas; 4 amenzas como programa no deseado, y refieren al programa IOBit Unlocker, el cual he instalado personalmente; la otra amenaza refiere al programa Xampp, el cual he instalado personalmente. Estimo estas cinco amenazas como falsos positivos.

He utilizado la herramienta de eliminación de software malintencionado de Microsoft (Windows-KB890830-x64-V5.123), no ha detectado ninguna amenaza.

He utilizado RKill.

He utilizado Hitman Pro, no ha detectado ninguna amenza.

Espero su respuesta. Saludos cordiales.

He utilizado el programa Emsisoft Emergency kit, no ha detectado amenazas.

Hola @razlasasz ¡Te damos la Bienvenida a los foros de InfoSpyware!

Como podrás ver, el sistema de nuestro foro se basa en meritos, necesitas participar en el foro para conseguir algunos de ellos para poder subir imágenes o adjuntar archivos capturada7

Por la cantidad de respuestas que has puesto das a entender que ya recibes asistencia y tu tema puede legar a pasarse por alto.

Explica mas a detalle este punto

En este momento no se si te refieres a una instalación limpia (formatear la unidad C y volver a instalar Windows desde cero) o estas hablando de la opción “Restablecer este equipo” que viene integrada en Windows 10 ya sea que conserves o no tus datos

Tienes que ser honesto con nosotros ¿No estarás usando alguna clase de activador para tu sistema o sí? si estamos hablando de una instalación limpia

Parece que entre tus programas “básicos” se encuentra Zemana AntiMalware. Hace mucho que no oigo hablar de el. No hay evidencia de que este programa sea o no algún rogue, sin embargo no sabemos que tan confiable pueda ser en estos tiempos Se me hace muy raro que este programa sea el único que detecta amenazas en tu equipo

Todos tenemos algún tipo de instalación o configuración “básica” para nuestros equipos. Me refiero a los programas que siempre solemos instalar cada vez que instalamos o reinstalamos nuestro sistema y sin saberlo uno de ellos puede ser el origen de las infecciones. Así que cuéntanos sobre la configuración básica de tu equipo

Me preocupa mandarte a hacer algunos análisis con un sistema tan cargado de programas que pueden llegar a interferir en el correcto funcionamiento de las herramientas que nosotros te indiquemos.

Saludos y esperamos tus respuestas

Estos son los programas que he instalado o ejecutado, algunos son versiones diferentes, portables o drivers… El sistema operativo es Windows 10 Pro 22H2, con licencia original. Ningún programa instalado o ejecutado está pirateado de antemano, son freeware o con licencia el software que utilizo.

4kme44ww.exe 551.76-notebook-win10-win11-64bit-international-dch-whql.exe 552.22-notebook-win10-win11-64bit-international-dch-whql.exe 6trun064.exe 6yst0aaf09mc.exe 9uls09af.exe ADE_4.5_Installer.exe adwcleaner.exe AlanWake.themepack AmazonGamesSetup.exe Anti-Malware_Toolkit Apache-NetBeans-21-bin-windows-x64.exe ashampoo_uninstaller_free_31187.exe ASIO4ALL_2_15_English.exe autorun-organizer-setup.exe avira_es_sptl1_5d15da8a14747819__pavwws.exe b3y702af.exe b3y802af.exe b4y004af07gu.exe b4y506af07dy.exe b4yc01af.exe b4ym01af.exe b4yx02af0838.exe Battle.net-Setup.exe BCUninstaller_5.7_setup.exe bcyc06af06wg.exe Boom3D.msi Brackets-2.1.3.exe burnaware_free_17.7.exe calibre-64bit-7.7.0.msi calibre-64bit-7.8.0.msi calibre-64bit-7.9.0.msi ccsetup622_pro_trial.exe ChromeSetup.exe CiscoPacketTracer822_64bit_setup_signed.exe clockify-setup.msi ComboFix.exe Cursor luminoso amarillo datamodeler-23.1.0.087.0806-x64.zip DaVinci_Resolve_18.6.6_Windows.exe dfsetup222.exe DiscordSetup.exe Docker Desktop Installer.exe Drivers dxwebsetup.exe EmsisoftEmergencyKit.exe EpicInstaller-15.17.1.msi epubdrmsetup.4.23.11201.exe epubee-manager.exe esetonlinescanner.exe Firefox Installer.en-US.exe FiveM.exe freefixer_portable FRST64.exe gaiasky_windows-x64_3_6_0-3.exe GarminExpress.exe GeForce_Experience_v3.28.0.412.exe getsusp64-epo getsusp64-epo.zip getsusp64.exe Git-2.44.0-64-bit.exe GitHubDesktopSetup-x64.exe GoogleDriveSetup.exe GoogleEarthProSetup.exe gpg4win-4.3.1.exe HiJackThis_test hmpalert3b983.exe HP_Network_Simulator_for_Comware_Devices_Windows HuionFirmwareInstall_2.0.1.7.exe HuionTablet_WinDriver_v15.7.6.756.exe hyperterminal.zip ideaIC-2024.1.exe Intel-Driver-and-Support-Assistant-Installer.exe jdk-17_windows-x64_bin.msi jdk-22_windows-x64_bin.msi JDownloader2Setup_windows-amd64_v21_0_2.exe JDownloaderSetup.exe kodi-21.0-Omega-x64.exe krita-x64-5.2.2-setup.exe LatencyMon.exe ldiag_5.11.0_windows_x64.exe legacy-games-launcher-setup-1.13.0-x64-full.exe lghub_installer.exe lista.txt ManageEngine_NetFlowAnalyzer_64bit.exe MBSetup.exe McAfee_Installer_serial_KeY0H_9TJBvBkeIrJSYlHA2_key_affid_1274_akey.exe MediaCreationTool.bat MediaCreationTool_22H2.exe MEGAsyncSetup64_5_2_0_0_RC3.exe MSERT (2).exe MSERT (3).exe MSERT.exe musiccenter_setup_2.7.0.exe mysql-installer-web-community-8.0.36.0.msi Native-Access_2.exe nmap-7.94-setup.exe NoBot.exe npcap-1.79.exe npp.8.6.5.Installer.x64.exe OfficeSetup.exe OneDriveSetup (2).exe OneDriveSetup.exe OperaGXSetup.exe OracleXE213_Win64 OverwolfInstaller.exe PLITCH_Setup_2.3.7.exe PortableApps.com_Platform_Setup_29.5.paf.exe ProcessExplorer.zip putty-64bit-0.80-installer.msi pycharm-community-2024.1.exe rcsetup153.exe rkill.exe RogueKiller RogueKiller_portable64.exe sanitySetup.exe setup.exe Sigil-2.1.0-Windows-x64-Setup.exe sleep_rest_sleeping_bed_icon_143397.ico SmartFix.exe SoulseekQt-2024-2-1-64bit.exe spsetup132.exe sqldeveloper SteamSetup.exe stinger64 (2).exe stinger64-epo.zip stinger64.exe sublime_text_build_4169_x64_setup.exe teraterm-5.2.exe trjsetup695.exe tweaking.com_registry_compressor_setup.exe tweaking.com_simple_system_tweaker_setup.exe tweaking.com_windows_repair_aio_setup.exe unlocker-setup.exe User_Manual_Q11K_V2.zip utorrent_installer.exe utweb_installer.exe Visual_Paradigm_CE_17_1_20240307_Win64.exe vlc-3.0.20-win64.exe VMWare Workstaion 17.5 Pro…txt VMware-workstation-full-17.5.0-22583795.exe winamp_latest_full.exe windefthreatsview-x64 Windows-KB890830-x64-V5.122.exe Windows-KB890830-x64-V5.123.exe windowsdesktop-runtime-7.0.18-win-x64.exe winrar-x64-700.exe Wireshark-4.2.3-x64.exe WMOSetup_4.2.0.123.exe wwe00dae07jw.exe wwlb090e.exe xampp-windows-x64-8.2.12-0-VS16-installer.exe Xmind-for-Windows-x64bit-24.04.05171-202404242230.exe xmlcopyeditor-1.3.1.0-x64-install.exe XSplit_VCam_4.2.2402.0901.exe Zemana.AntiMalware.Setup.exe ZoomInstallerFull.exe ZoomOutlookPluginSetup.msi

Speccy report for DESKTOP-H77O3Q3, [01/05/2024 11:12:15] Summary Operating System Windows 10 Pro 64-bit CPU Intel Core i7 7700HQ @ 2.80GHz 65 °C Kaby Lake 14nm Technology RAM 16,0GB Dual-Channel DDR4 @ 1197MHz (17-17-17-39) Motherboard LENOVO LNVNB161216 (U3E1) Graphics Generic PnP Monitor (1920x1080@60Hz) S24D590 (1920x1080@59Hz) Intel HD Graphics 630 (Lenovo) 4095MB NVIDIA GeForce GTX 1050 Ti (Lenovo) 52 °C SLI Disabled Storage 931GB Western Digital WDC WD10SPZX-24Z10T0 (SATA (SSD)) 29 °C 1863GB NVMe Corsair MP400 (RAID (SSD)) Optical Drives No optical disk drives detected Audio NVIDIA Virtual Audio Device (Wave Extensible) (WDM) Operating System Windows 10 Pro 64-bit Computer type: Virtual Installation Date: 25/04/2024 16:43:14 Serial Number: TRWVQ-RDGF4-KFCPP-D3K9P-JB49G Windows Security Center User Account Control (UAC) Enabled Notify level 2 - Default Windows Update AutoUpdate Not configured Windows Defender Windows Defender Enabled Firewall Firewall Enabled Display Name McAfee Antivirus Malwarebytes Antivirus Enabled Virus Signature Database Up to date Windows Defender Antivirus Disabled Virus Signature Database Up to date McAfee Antivirus Enabled Virus Signature Database Up to date .NET Frameworks installed v4.8 Full v4.8 Client v3.5 SP1 v3.0 SP2 v2.0 SP2 Internet Explorer Version 11.3636.19041.0 PowerShell Version 5.1.19041.1 Environment Variables USERPROFILE C:\Users\v5060 SystemRoot C:\Windows User Variables IntelliJ IDEA Community Edition C:\Program Files\JetBrains\IntelliJ IDEA Community Edition 2024.1\bin; JD2_HOME C:\Users\v5060\AppData\Local\JDownloader 2 OneDrive C:\Users\v5060\OneDrive OneDriveConsumer C:\Users\v5060\OneDrive Path C:\Program Files\MySQL\MySQL Shell 8.0\bin
C:\Users\v5060\AppData\Local\Microsoft\WindowsApps C:\Program Files (x86)\Nmap C:\Program Files (x86)\Brackets
%IntelliJ IDEA Community Edition% C:\Users\v5060\AppData\Local\Programs\Microsoft VS Code Insiders\bin %PyCharm Community Edition% C:\Users\v5060\AppData\Local\GitHubDesktop\bin PyCharm Community Edition C:\Program Files\JetBrains\PyCharm Community Edition 2024.1\bin; TEMP C:\Users\v5060\AppData\Local\Temp TMP C:\Users\v5060\AppData\Local\Temp Machine Variables _PSLockDownPolicy 0 ComSpec C:\Windows\System32\cmd.exe DriverData C:\Windows\System32\Drivers\DriverData HNS_INSTALL_PATH C:\Program Files (x86)\HNS NUMBER_OF_PROCES SORS 8 OS Windows_NT Path C:\Program Files (x86)\VMware\VMware Workstation\bin C:\app\v5060\product\21c\dbhomeXE\bin C:\Program Files\Common Files\Oracle\Java\javapath C:\Program Files (x86)\Intel\iCLS Client C:\Program Files\Intel\iCLS Client C:\Windows\system32 C:\Windows C:\Windows\System32\Wbem C:\Windows\System32\WindowsPowerShell\v1.0 C:\Windows\System32\OpenSSH C:\Program Files (x86)\Intel\Intel Management Engine Components\DAL C:\Program Files\Intel\Intel Management Engine Components\DAL C:\Program Files (x86)\Intel\Intel Management Engine Components\IPT C:\Program Files\Intel\Intel Management Engine Components\IPT C:\Program Files (x86)\NVIDIA Corporation\PhysX\Common C:\Program Files\NVIDIA Corporation\NVIDIA NvDLISR C:\Program Files\Calibre2 C:\Program Files\Git\cmd C:\Program Files\PuTTY C:\Program Files\dotnet C:\Program Files\Docker\Docker\resources\bin C:\Program Files (x86)\Gpg4win..\GnuPG\bin PATHEXT .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WS H;.MSC PROCESSOR_ARCHITE CTURE AMD64 PROCESSOR_IDENTIFI ER Intel64 Family 6 Model 158 Stepping 9, GenuineIntel PROCESSOR_LEVEL 6 PROCESSOR_REVISIO N 9e09 PSModulePath C:\Windows\system32\WindowsPowerShell\v1.0\Modul es PT8HOME C:\Program Files\Cisco Packet Tracer 8.2.2 TEMP C:\Windows\TEMP TMP C:\Windows\TEMP USERNAME SYSTEM windir C:\Windows ZES_ENABLE_SYSMAN 1 Battery AC Line Online Battery Charge % 55 % Battery State Unknown status Remaining Battery Time Unknown Power Profile Active power scheme Mi plan personalizado 1 Hibernation Enabled Turn Off Monitor after: (On AC Power) Never Turn Off Monitor after: (On Battery Power) 10 min Turn Off Hard Disk after: (On AC Power) Never Turn Off Hard Disk after: (On Battery Power) 20 min Suspend after: (On AC Power) Never Suspend after: (On Battery Power) Never Screen saver Disabled Uptime Current Session Current Time 01/05/2024 11:12:15 Current Uptime 7.224 sec (0 d, 02 h, 00 m, 24 s) Last Boot Time 01/05/2024 9:11:51 Services Run ning Administrador de conexiones de acceso remoto Run ning Administrador de conexiones de Windows Run ning Administrador de credenciales Run ning Administrador de cuentas de seguridad Run ning Administrador de cuentas web Run ning Administrador de pagos y NFC/SE Run ning Administrador de sesión local Run ning Administrador de usuarios Run ning Agente de conexión de red Run ning Agente de directiva IPsec Run ning Agente de eventos de tiempo Run ning Agente de eventos del sistema Run ning Agente de supervisión en tiempo de ejecución de Protección del sistema Run ning Aislamiento de claves CNG Run ning Aplicación auxiliar de NetBIOS sobre TCP/IP Run ning Aplicación auxiliar IP Run ning Asignador de extremos de RPC Run ning Audio de Windows Run ning cbdhsvc_4e91d Run ning CDPUserSvc_4e91d Run ning Centro de seguridad Run ning Cliente de directiva de grupo Run ning Cliente de seguimiento de vínculos distribuidos Run ning Cliente DHCP Run ning Cliente DNS Run ning Cliente para NFS Run ning Cola de impresión Run ning Compilador de extremo de audio de Windows Run ning Conexión compartida a Internet (ICS) Run ning Configuración automática de dispositivos conectados a la red Run ning Configuración automática de WLAN Run ning Contenedor de Microsoft Passport Run ning CoreMessaging Run ning Detección de hardware shell Run ning Detección SSDP Run ning Dolby DAX2 API Service Run ning Elan Service Run ning Energía Run ning Estación de trabajo Run ning Examinador de equipos Run ning Experiencia de calidad de audio y vídeo de Windows (qWave) Run ning Experiencias del usuario y telemetría asociadas Run ning Firewall de Windows Defender Run ning Gaming Services Run ning Gaming Services Run ning GlassWire Control Service Run ning Hora de Windows Run ning Host de proveedor de detección de función Run ning Host de sistema de diagnóstico Run ning Host del servicio de diagnóstico Run ning Identity Manager de redes de mismo nivel Run ning Información de la aplicación Run ning Iniciador de procesos de servidor DCOM Run ning Instrumental de administración de Windows Run ning Intel Content Protection HDCP Service Run ning Intel Content Protection HECI Service Run ning Intel Dynamic Application Loader Host Interface Service Run ning Intel Graphics Command Center Service Run ning Intel HD Graphics Control Panel Service Run ning Intel Management and Security Application Local Management Service Run ning Intel Management Engine WMI Provider Registration Run ning LGHUB Updater Service Run ning Llamada a procedimiento remoto (RPC) Run ning Malwarebytes Service Run ning Microsoft Office Click-to-Run Service Run ning Microsoft Passport Run ning Mostrar el servicio de directivas Run ning Motor de filtrado de base Run ning MySQL80 Run ning NTKDaemonService Run ning NVIDIA Display Container LS Run ning NVIDIA LocalSystem Container Run ning OneSyncSvc_4e91d Run ning OracleOraDB21Home1MTSRecoveryService Run ning OracleOraDB21Home1TNSListener Run ning OracleServiceXE Run ning Plug and Play Run ning PluginLoaderSvc Run ning Programador de tareas Run ning Protocolo de resolución de nombres de mismo nivel Run ning Publicación de recurso de detección de función Run ning Realtek Audio Service Run ning Realtek Bluetooth Device Manager Service Run ning Reconoc. ubicación de red Run ning Registro de eventos de Windows Run ning Servicio Administrador de funcionalidad de acceso Run ning Servicio Asistente para la compatibilidad de programas Run ning Servicio AVCTP Run ning Servicio de administración de radio Run ning Servicio de administrador de contenedores Run ning Servicio de almacenamiento Run ning Servicio de asociación de dispositivos Run ning Servicio de caché de fuentes de Windows Run ning Servicio de compatibilidad con Bluetooth Run ning Servicio de configuración de red Run ning Servicio de contenedor de protección de aplicaciones Run ning Servicio de detección automática de proxy web WinHTTP Run ning Servicio de directivas de diagnóstico Run ning Servicio de dispositivo de interfaz humana Run ning Servicio de geolocalización Run ning Servicio de host HV Run ning Servicio de implementación de AppX (AppXSVC) Run ning Servicio de infraestructura de tareas en segundo plano Run ning Servicio de instalación de dispositivos Run ning Servicio de instalación de Microsoft Store Run ning Servicio de lista de redes Run ning Servicio de mejora de visualización Run ning Servicio de notificación de eventos de sistema Run ning Servicio de Panel de escritura a mano y teclado táctil Run ning Servicio de perfil de usuario Run ning Servicio de plataforma de dispositivos conectados Run ning Servicio de proceso de host de Hyper-V Run ning Servicio de protocolo de túnel de sockets seguros Run ning Servicio de puerta de enlace de audio de Bluetooth Run ning Servicio de red de host Run ning Servicio de repositorio de estado Run ning Servicio de transferencia inteligente en segundo plano (BITS) Run ning Servicio de uso compartido de red del Reproductor de Windows Media Run ning Servicio de virtualización de red Run ning Servicio del sistema de notificaciones de inserción de Windows Run ning Servicio HitmanPro.Alert Run ning Servicio Interfaz de almacenamiento en red Run ning Servicio orquestador de actualizaciones Run ning Servicio Seguridad de Windows Run ning Servicio telefónico Run ning Servicios de cifrado Run ning Servicios simples de TCP/IP Run ning Servidor Run ning Sistema de eventos COM+ Run ning SysMain Run ning Temas Run ning Uso de datos Run ning VMware Authorization Service Run ning VMware DHCP Service Run ning VMware NAT Service Run ning VMware USB Arbitration Service Run ning Windows Presentation Foundation Font Cache 3.0.0.0 Run ning Windows Search Run ning WpnUserService_4e91d Run ning WSL Service Run ning XSplit VCam Capture Source Service Stop ped AarSvc_4e91d Stop ped Actualizador de zona horaria automática Stop ped Adaptador de rendimiento de WMI Stop ped Administración de aplicaciones Stop ped Administración de autenticación de Xbox Live Stop ped Administración de capas de almacenamiento Stop ped Administración de máquinas virtuales de Hyper-V Stop ped Administración remota de Windows (WS-Management) Stop ped Administrador de conexiones automáticas de acceso remoto Stop ped Administrador de configuración de dispositivos Stop ped Administrador de mapas descargados Stop ped Adquisición de imágenes de Windows (WIA) Stop ped Agente de detección en segundo plano de DevQuery Stop ped Agrupación de red del mismo nivel Stop ped Aplicación del sistema COM+ Stop ped Archivos sin conexión Stop ped Asignador de detección de topologías de nivel de vínculo Stop ped Asistente para la conectividad de red Stop ped Autenticación natural Stop ped Ayudante para el inicio de sesión de cuenta Microsoft Stop ped Battle.net Update Helper Svc Stop ped BattlEye Service Stop ped BcastDVRUserService_4e91d Stop ped BluetoothUserService_4e91d Stop ped BranchCache Stop ped Captura de SNMP Stop ped CaptureService_4e91d Stop ped Carpetas de trabajo Stop ped CCleaner Performance Optimizer Service Stop ped Cliente web Stop ped Comprobador puntual Stop ped Conexiones de red Stop ped Configuración automática de redes cableadas Stop ped Configuración automática de WWAN Stop ped Configuración de Escritorio remoto Stop ped ConsentUxUserSvc_4e91d Stop ped Control parental Stop ped Coordinador de transacciones distribuidas Stop ped Copias de seguridad de Windows Stop ped CredentialEnrollmentManagerUserSvc_4e91d Stop ped Declared Configuration(DC) service Stop ped DeviceAssociationBrokerSvc_4e91d Stop ped DevicePickerUserSvc_4e91d Stop ped DevicesFlowUserSvc_4e91d Stop ped Diagnostic Execution Service Stop ped DialogBlockingService Stop ped Directiva de extracción de tarjetas inteligentes Stop ped Disco virtual Stop ped Dispositivo host de UPnP Stop ped DLL de host del Contador de rendimiento Stop ped Docker Desktop Service Stop ped EABackgroundService Stop ped Easy Anti-Cheat (Epic Online Services) Stop ped EasyAntiCheat Stop ped Enrutamiento y acceso remoto Stop ped Epic Online Services Stop ped Eventos de adquisición de imágenes estáticas Stop ped Extensiones y notificaciones de impresora Stop ped Fax Stop ped FileSyncHelper Stop ped Filtro de teclado de Microsoft Stop ped GalaxyClientService Stop ped GalaxyCommunication Stop ped GameInput Service Stop ped GameRecorderSVC Stop ped Google Chrome Elevation Service (GoogleChromeElevationService) Stop ped GoogleUpdater InternalService 126.0.6441.0 (GoogleUpdaterInternalService126.0.6441.0) Stop ped GoogleUpdater Service 126.0.6441.0 (GoogleUpdaterService126.0.6441.0) Stop ped GraphicsPerfSvc Stop ped Hora de la red de telefonía móvil Stop ped Identidad de aplicación Stop ped Inicio de sesión secundario Stop ped Instalador de ActiveX (AxInstSV) Stop ped Instalador de módulos de Windows Stop ped Instantáneas de volumen Stop ped Intel Capability Licensing Service TCP IP Interface Stop ped Intel Optane Memory Service Stop ped Intel TPM Provisioning Service Stop ped Interfaz de servicio invitado de Hyper-V Stop ped KTMRM para DTC (Coordinador de transacciones distribuidas) Stop ped LxssManager Stop ped LxssManagerUser_4e91d Stop ped MBVpnTunnelService Stop ped McpManagementService Stop ped MessagingService_4e91d Stop ped Microsoft App-V Client Stop ped Microsoft Edge Elevation Service (MicrosoftEdgeElevationService) Stop ped Microsoft Edge Update Service (edgeupdate) Stop ped Microsoft Edge Update Service (edgeupdatem) Stop ped Microsoft Update Health Service Stop ped Modo insertado Stop ped Mozilla Maintenance Service Stop ped Módulos de creación de claves de IPsec para IKE y AuthIP Stop ped Net Logon Stop ped NVIDIA FrameView SDK service Stop ped OneDrive Updater Service Stop ped OpenSSH Authentication Agent Stop ped Optimización de distribución Stop ped Optimizar unidades Stop ped OracleJobSchedulerXE Stop ped OracleVssWriterXE Stop ped Overwolf Updater Windows SCM Stop ped Partida guardada en Xbox Live Stop ped PimIndexMaintenanceSvc_4e91d Stop ped Preparación de aplicaciones Stop ped PrintWorkflowUserSvc_4e91d Stop ped Propagación de certificados Stop ped Protección de software Stop ped Protocolo de autenticación extensible Stop ped Proveedor de instantáneas de software de Microsoft Stop ped Recopilador de eventos de Windows Stop ped Redirector de puerto en modo usuario de Servicios de Escritorio remoto Stop ped Registrador de configuración de Windows Connect Now Stop ped Registro remoto Stop ped Registros y alertas de rendimiento Stop ped Rockstar Game Library Service Stop ped Servicio Antivirus de Microsoft Defender Stop ped Servicio AssignedAccessManager Stop ped Servicio biométrico de Windows Stop ped Servicio Cifrado de unidad BitLocker Stop ped Servicio de administración de aplicaciones de empresa Stop ped Servicio de administración de Windows Stop ped Servicio de administrador de conexiones con servicios Wi-Fi Direct Stop ped Servicio de administrador de licencias de Windows Stop ped Servicio de asistente para perfil local Stop ped Servicio de cierre de invitado de Hyper-V Stop ped Servicio de cliente de protección de host Stop ped Servicio de configuración de traslación de IP Stop ped Servicio de datos del sensor Stop ped Servicio de datos espacial Stop ped Servicio de enrutador de AllJoyn Stop ped Servicio de enrutamiento de mensajes de inserción del Protocolo de aplicación inalámbrica (WAP) de administración de dispositivos Stop ped Servicio de enumeración de dispositivos de tarjeta inteligente Stop ped Servicio de experiencia de idioma Stop ped Servicio de Google Update (gupdate) Stop ped Servicio de Google Update (gupdatem) Stop ped Servicio de historial de archivos Stop ped Servicio de identidad en la nube de Microsoft Stop ped Servicio de inscripción de administración de dispositivos Stop ped Servicio de inspección de red de Antivirus de Microsoft Defender Stop ped Servicio de intercambio de datos de Hyper-V Stop ped Servicio de latido de Hyper-V Stop ped Servicio de licencia de cliente (ClipSVC) Stop ped Servicio de percepción de Windows Stop ped Servicio de proceso de invitado de Hyper-V Stop ped Servicio de Protección contra amenazas avanzada de Windows Defender Stop ped Servicio de prueba comercial Stop ped Servicio de publicación de nombres de equipo PNRP Stop ped Servicio de puerta de enlace de nivel de aplicación Stop ped Servicio de red de Xbox Live Stop ped Servicio de sensores Stop ped Servicio de simulación de percepción de Windows Stop ped Servicio de sincronización de hora de Hyper-V Stop ped Servicio de solución de problemas recomendado Stop ped Servicio de supervisión de sensores Stop ped Servicio de uso compartido de datos Stop ped Servicio de uso compartido de puertos Net.Tcp Stop ped Servicio de virtualización de Escritorio remoto de Hyper-V Stop ped Servicio de virtualización de la experiencia de usuario Stop ped Servicio de Windows Insider Stop ped Servicio de Windows Update Medic Stop ped Servicio de zona con cobertura inalámbrica móvil de Windows Stop ped Servicio del iniciador iSCSI de Microsoft Stop ped Servicio del módulo de copia de seguridad a nivel de bloque Stop ped Servicio enrutador de SMS de Microsoft Windows. Stop ped Servicio enumerador de dispositivos portátiles Stop ped Servicio FrameServer de la Cámara de Windows Stop ped Servicio host de proveedor de cifrado de Windows Stop ped Servicio Informe de errores de Windows Stop ped Servicio PowerShell Direct de Hyper-V Stop ped Servicio PushToInstall de Windows Stop ped Servicio Recopilador estándar del concentrador de diagnósticos de Microsoft Stop ped Servicio Volumetric Audio Compositor Stop ped Servicios de Escritorio remoto Stop ped Shared PC Account Manager Stop ped Sistema de cifrado de archivos (EFS) Stop ped SMP de Espacios de almacenamiento de Microsoft Stop ped Solicitante de instantáneas de volumen de Hyper-V Stop ped Soporte técnico del panel de control Informes de problemas Stop ped Steam Client Service Stop ped Subsistema de Windows para Linux Stop ped Tarjeta inteligente Stop ped Telefonía Stop ped Ubicador de llamada a procedimiento remoto (RPC) Stop ped UdkUserSvc_4e91d Stop ped UnistoreSvc_4e91d Stop ped UserDataSvc_4e91d Stop ped VMware Autostart Service Stop ped WalletService Stop ped WarpJITSvc Stop ped Windows Installer Stop ped Windows Mixed Reality OpenXR Service Stop ped Windows Update Stop ped Xbox Accessory Management Service Stop ped XSplit VCam Updater TimeZone TimeZone GMT +1:00 Hours Language Español (España, internacional) Location España Format Español (España, internacional) Currency € Date Format dd/MM/yyyy Time Format H:mm:ss Scheduler 01/05/2024 11:51; MicrosoftEdgeUpdateTaskMachineUA 01/05/2024 12:32; Overwolf Updater Task 01/05/2024 16:14; TR_Updater 01/05/2024 16:29; TR_FastScan_Daily_v5060 01/05/2024 17:21; MicrosoftEdgeUpdateTaskMachineCore 01/05/2024 18:58; CCleanerCrashReporting 01/05/2024 20:01; Git for Windows Updater 01/05/2024 20:26; OneDrive Reporting Task-S-1-5-21-2430942409-2953790725-1835786908-1001 01/05/2024 21:24; Opera GX scheduled Autoupdate 1714073080 01/05/2024 22:32; OneDrive Per-Machine Standalone Update Task 02/05/2024 2:26; GarminUpdaterTask Autorun Organizer Autorun Organizer UAC Warning Skip CCleanerSkipUAC - v5060 NerveCenterUpdate npcapwatchdog TR_FastScan_AtLogon Wise Memory Optimizer Task.job Hotfixes Installed Not Installed 26/04/2024 9MWPM2CQNLHN-Microsoft.GamingServices Installation Status Failed 9MWPM2CQNLHN-1152921505697644636 26/04/2024 9MWPM2CQNLHN-Microsoft.GamingServices Installation Status Failed 9MWPM2CQNLHN-1152921505697679193 System Folders Application Data C:\ProgramData Cookies C:\Users\v5060\AppData\Local\Microsoft\Windows\INetCooki es Desktop C:\Users\v5060\OneDrive\Desktop Documents C:\Users\Public\Documents Fonts C:\Windows\Fonts Global Favorites C:\Users\v5060\Favorites Internet History C:\Users\v5060\AppData\Local\Microsoft\Windows\History Local Application Data C:\Users\v5060\AppData\Local Music C:\Users\Public\Music Path for burning CD C:\Users\v5060\AppData\Local\Microsoft\Windows\Burn\Bur n Physical Desktop C:\Users\v5060\OneDrive\Desktop Pictures C:\Users\Public\Pictures Program Files C:\Program Files Public Desktop C:\Users\Public\Desktop Start Menu C:\ProgramData\Microsoft\Windows\Start Menu Start Menu Programs C:\ProgramData\Microsoft\Windows\Start Menu\Programs Startup C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup Templates C:\ProgramData\Microsoft\Windows\Templates Temporary Internet Files C:\Users\v5060\AppData\Local\Microsoft\Windows\INetCach e User Favorites C:\Users\v5060\Favorites Videos C:\Users\Public\Videos Windows Directory C:\Windows Windows/System C:\Windows\system32 Process List AggregatorHost.exe Process ID 5688 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\AggregatorHost.exe Memory Usage 5.86 MB Peak Memory Usage 7.16 MB ApplicationFrameHost.exe Process ID 20028 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\ApplicationFrameHost.exe Memory Usage 32 MB Peak Memory Usage 33 MB audiodg.exe Process ID 6580 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\audiodg.exe Memory Usage 17 MB Peak Memory Usage 19 MB AutorunOrganizer.exe Process ID 4480 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Autorun Organizer\AutorunOrganizer.exe Memory Usage 8.89 MB Peak Memory Usage 40 MB backgroundTaskHost.exe Process ID 12840 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\backgroundTaskHost.exe Memory Usage 14 MB Peak Memory Usage 16 MB Boom3D.exe Process ID 15996 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Global Delight\Boom 3D\Boom3D.exe Memory Usage 225 MB Peak Memory Usage 261 MB chrome.exe Process ID 15968 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Chrome\Application\chrome.exe Memory Usage 83 MB Peak Memory Usage 92 MB chrome.exe Process ID 12316 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Chrome\Application\chrome.exe Memory Usage 153 MB Peak Memory Usage 206 MB chrome.exe Process ID 6916 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Chrome\Application\chrome.exe Memory Usage 22 MB Peak Memory Usage 22 MB chrome.exe Process ID 8928 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Chrome\Application\chrome.exe Memory Usage 32 MB Peak Memory Usage 33 MB chrome.exe Process ID 19200 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Chrome\Application\chrome.exe Memory Usage 104 MB Peak Memory Usage 150 MB chrome.exe Process ID 7976 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Chrome\Application\chrome.exe Memory Usage 57 MB Peak Memory Usage 59 MB chrome.exe Process ID 11880 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Chrome\Application\chrome.exe Memory Usage 27 MB Peak Memory Usage 27 MB chrome.exe Process ID 11004 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Chrome\Application\chrome.exe Memory Usage 93 MB Peak Memory Usage 104 MB chrome.exe Process ID 7012 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Chrome\Application\chrome.exe Memory Usage 45 MB Peak Memory Usage 64 MB chrome.exe Process ID 19760 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Chrome\Application\chrome.exe Memory Usage 54 MB Peak Memory Usage 58 MB chrome.exe Process ID 19372 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Chrome\Application\chrome.exe Memory Usage 135 MB Peak Memory Usage 529 MB chrome.exe Process ID 19392 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Chrome\Application\chrome.exe Memory Usage 179 MB Peak Memory Usage 217 MB chrome.exe Process ID 1428 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Chrome\Application\chrome.exe Memory Usage 158 MB Peak Memory Usage 173 MB chrome.exe Process ID 19272 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Chrome\Application\chrome.exe Memory Usage 54 MB Peak Memory Usage 57 MB chrome.exe Process ID 11052 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Chrome\Application\chrome.exe Memory Usage 11 MB Peak Memory Usage 11 MB chrome.exe Process ID 6700 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Chrome\Application\chrome.exe Memory Usage 196 MB Peak Memory Usage 240 MB chrome.exe Process ID 14988 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Chrome\Application\chrome.exe Memory Usage 72 MB Peak Memory Usage 84 MB chrome.exe Process ID 18720 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Chrome\Application\chrome.exe Memory Usage 214 MB Peak Memory Usage 305 MB chrome.exe Process ID 3356 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Chrome\Application\chrome.exe Memory Usage 25 MB Peak Memory Usage 25 MB cmd.exe Process ID 19412 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\cmd.exe Memory Usage 6.13 MB Peak Memory Usage 8.70 MB CompPkgSrv.exe Process ID 5256 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\CompPkgSrv.exe Memory Usage 10 MB Peak Memory Usage 11 MB conhost.exe Process ID 11048 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\conhost.exe Memory Usage 14 MB Peak Memory Usage 14 MB conhost.exe Process ID 5116 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\conhost.exe Memory Usage 5.53 MB Peak Memory Usage 11 MB conhost.exe Process ID 10188 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\conhost.exe Memory Usage 1.02 MB Peak Memory Usage 12 MB conhost.exe Process ID 7236 User Servicio de red Domain NT AUTHORITY Path C:\Windows\System32\conhost.exe Memory Usage 7.40 MB Peak Memory Usage 14 MB conhost.exe Process ID 11756 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\conhost.exe Memory Usage 6.15 MB Peak Memory Usage 12 MB conhost.exe Process ID 16820 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\conhost.exe Memory Usage 12 MB Peak Memory Usage 17 MB crashpad_handler.exe Process ID 15136 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\Common Files\Native Instruments\NTK\crashpad_handler.exe Memory Usage 5.78 MB Peak Memory Usage 6.51 MB crashpad_handler.exe Process ID 16556 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Drive File Stream\90.0.3.0\crashpad_handler.exe Memory Usage 6.60 MB Peak Memory Usage 7.56 MB csrss.exe Process ID 796 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\csrss.exe Memory Usage 5.09 MB Peak Memory Usage 5.57 MB csrss.exe Process ID 904 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\csrss.exe Memory Usage 5.88 MB Peak Memory Usage 39 MB ctfmon.exe Process ID 14316 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\ctfmon.exe Memory Usage 21 MB Peak Memory Usage 22 MB dasHost.exe Process ID 9592 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\dasHost.exe Memory Usage 11 MB Peak Memory Usage 17 MB dllhost.exe Process ID 14492 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\dllhost.exe Memory Usage 13 MB Peak Memory Usage 14 MB dllhost.exe Process ID 10048 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\dllhost.exe Memory Usage 10 MB Peak Memory Usage 12 MB DolbyDAX2API.exe Process ID 16592 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\Dolby\Dolby DAX2\DAX2_API\DolbyDAX2API.exe Memory Usage 33 MB Peak Memory Usage 44 MB dwm.exe Process ID 1232 User DWM-1 Domain Window Manager Path C:\Windows\System32\dwm.exe Memory Usage 115 MB Peak Memory Usage 131 MB ESETOnlineScanner.exe Process ID 15832 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\ESET\ESETOnlineScanner\ESE TOnlineScanner.exe Memory Usage 241 MB Peak Memory Usage 452 MB ETDCtrl.exe Process ID 7548 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Elantech\ETDCtrl.exe Memory Usage 27 MB Peak Memory Usage 35 MB ETDCtrlHelper.exe Process ID 12216 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Elantech\ETDCtrlHelper.exe Memory Usage 9.88 MB Peak Memory Usage 12 MB ETDIntelligent.exe Process ID 4968 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Elantech\ETDIntelligent.exe Memory Usage 9.55 MB Peak Memory Usage 11 MB ETDService.exe Process ID 5760 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\Elantech\ETDService.exe Memory Usage 6.01 MB Peak Memory Usage 11 MB explorer.exe Process ID 20404 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\explorer.exe Memory Usage 80 MB Peak Memory Usage 83 MB explorer.exe Process ID 2260 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\explorer.exe Memory Usage 149 MB Peak Memory Usage 231 MB FileCoAuth.exe Process ID 20204 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Microsoft OneDrive\24.081.0421.0001\FileCoAuth.exe Memory Usage 29 MB Peak Memory Usage 31 MB fontdrvhost.exe Process ID 788 User UMFD-0 Domain Font Driver Host Path C:\Windows\System32\fontdrvhost.exe Memory Usage 5.08 MB Peak Memory Usage 5.08 MB fontdrvhost.exe Process ID 1168 User UMFD-1 Domain Font Driver Host Path C:\Windows\System32\fontdrvhost.exe Memory Usage 8.81 MB Peak Memory Usage 12 MB gamingservices.exe Process ID 6072 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\WindowsApps\Microsoft.GamingServices_21.88.26001.0_x64 8wekyb3d8bbwe\gamingservices.exe Memory Usage 30 MB Peak Memory Usage 32 MB gamingservicesnet.exe Process ID 6088 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Program Files\WindowsApps\Microsoft.GamingServices_21.88.26001.0_x64 _8wekyb3d8bbwe\gamingservicesnet.exe Memory Usage 5.57 MB Peak Memory Usage 6.92 MB GlassWire.exe Process ID 15712 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files (x86)\Steam\steamapps\common\GlassWire\app\GlassWire.exe Memory Usage 32 MB Peak Memory Usage 52 MB GoogleDriveFS.exe Process ID 16988 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Drive File Stream\90.0.3.0\GoogleDriveFS.exe Memory Usage 59 MB Peak Memory Usage 74 MB GoogleDriveFS.exe Process ID 16900 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Drive File Stream\90.0.3.0\GoogleDriveFS.exe Memory Usage 32 MB Peak Memory Usage 35 MB GoogleDriveFS.exe Process ID 16876 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Drive File Stream\90.0.3.0\GoogleDriveFS.exe Memory Usage 24 MB Peak Memory Usage 26 MB GoogleDriveFS.exe Process ID 16788 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Drive File Stream\90.0.3.0\GoogleDriveFS.exe Memory Usage 53 MB Peak Memory Usage 78 MB GoogleDriveFS.exe Process ID 4044 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Drive File Stream\90.0.3.0\GoogleDriveFS.exe Memory Usage 18 MB Peak Memory Usage 22 MB GoogleDriveFS.exe Process ID 16584 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Drive File Stream\90.0.3.0\GoogleDriveFS.exe Memory Usage 90 MB Peak Memory Usage 117 MB GoogleDriveFS.exe Process ID 16960 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Google\Drive File Stream\90.0.3.0\GoogleDriveFS.exe Memory Usage 31 MB Peak Memory Usage 35 MB GWCtlSrv.exe Process ID 5836 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Steam\steamapps\common\GlassWire\app\GWCtlSrv.exe Memory Usage 64 MB Peak Memory Usage 84 MB GWIdlMon.exe Process ID 11704 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files (x86)\Steam\steamapps\common\GlassWire\app\GWIdlMon.exe Memory Usage 13 MB Peak Memory Usage 19 MB hmpalert.exe Process ID 3836 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files (x86)\HitmanPro.Alert\hmpalert.exe Memory Usage 19 MB Peak Memory Usage 20 MB hmpalert.exe Process ID 2244 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\HitmanPro.Alert\hmpalert.exe Memory Usage 21 MB Peak Memory Usage 50 MB igfxCUIService.exe Process ID 3164 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd6 4_f47cef52ac4d1535\igfxCUIService.exe Memory Usage 9.21 MB Peak Memory Usage 12 MB igfxEM.exe Process ID 4716 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd 64_f47cef52ac4d1535\igfxEM.exe Memory Usage 13 MB Peak Memory Usage 16 MB IntelCpHDCPSvc.exe Process ID 1524 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd6 4_d0e181bba89305c6\IntelCpHDCPSvc.exe Memory Usage 6.66 MB Peak Memory Usage 7.77 MB IntelCpHeciSvc.exe Process ID 1816 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd6 4_d0e181bba89305c6\IntelCpHeciSvc.exe Memory Usage 6.42 MB Peak Memory Usage 7.53 MB jhi_service.exe Process ID 18100 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Intel\Intel Management Engine Components\DAL\jhi_service.exe Memory Usage 7.68 MB Peak Memory Usage 8.75 MB LenovoNerveCenterTray.exe Process ID 1628 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Lenovo\Nerve Center\bin\x64\LenovoNerveCenterTray.exe Memory Usage 16 MB Peak Memory Usage 19 MB LenovoNerveCenterUpdateAgent.exe Process ID 4472 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Lenovo\Nerve Center\bin\x64\LenovoNerveCenterUpdateAgent.exe Memory Usage 1.63 MB Peak Memory Usage 10 MB lghub_agent.exe Process ID 4460 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\LGHUB\lghub_agent.exe Memory Usage 55 MB Peak Memory Usage 100 MB lghub_system_tray.exe Process ID 16352 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\LGHUB\system_tray\lghub_system_tray.exe Memory Usage 51 MB Peak Memory Usage 94 MB lghub_updater.exe Process ID 5812 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\LGHUB\lghub_updater.exe Memory Usage 19 MB Peak Memory Usage 29 MB LMS.exe Process ID 18096 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Intel\Intel Management Engine Components\LMS\LMS.exe Memory Usage 12 MB Peak Memory Usage 16 MB logi_crashpad_handler.exe Process ID 17208 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\LGHUB\logi_crashpad_handler.exe Memory Usage 5.68 MB Peak Memory Usage 6.49 MB logi_crashpad_handler.exe Process ID 17124 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\LGHUB\logi_crashpad_handler.exe Memory Usage 6.76 MB Peak Memory Usage 7.64 MB LsaIso.exe Process ID 988 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\LsaIso.exe Memory Usage 3.38 MB Peak Memory Usage 3.51 MB lsass.exe Process ID 1000 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\lsass.exe Memory Usage 24 MB Peak Memory Usage 28 MB Malwarebytes.exe Process ID 12360 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Malwarebytes\Anti-Malware\Malwarebytes.exe Memory Usage 109 MB Peak Memory Usage 155 MB MbamBgNativeMsg.exe Process ID 19736 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Malwarebytes\Anti-Malware\MbamBgNativeMsg.exe Memory Usage 14 MB Peak Memory Usage 14 MB MBAMCrashHandler.exe Process ID 6360 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\Malwarebytes\Anti-Malware\MBAMCrashHandler.exe Memory Usage 4.17 MB Peak Memory Usage 4.76 MB MBAMService.exe Process ID 5844 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe Memory Usage 131 MB Peak Memory Usage 281 MB Memory Compression Process ID 3128 User SYSTEM Domain NT AUTHORITY Memory Usage 748 MB Peak Memory Usage 750 MB msedgewebview2.exe Process ID 3180 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.67\msedge webview2.exe Memory Usage 92 MB Peak Memory Usage 101 MB msedgewebview2.exe Process ID 17488 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.67\msedge webview2.exe Memory Usage 8.13 MB Peak Memory Usage 8.92 MB msedgewebview2.exe Process ID 4276 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.67\msedge webview2.exe Memory Usage 109 MB Peak Memory Usage 124 MB msedgewebview2.exe Process ID 11148 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.67\msedge webview2.exe Memory Usage 18 MB Peak Memory Usage 20 MB msedgewebview2.exe Process ID 8996 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.67\msedge webview2.exe Memory Usage 210 MB Peak Memory Usage 220 MB msedgewebview2.exe Process ID 6548 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files (x86)\Microsoft\EdgeWebView\Application\124.0.2478.67\msedge webview2.exe Memory Usage 34 MB Peak Memory Usage 37 MB mysqld.exe Process ID 7228 User Servicio de red Domain NT AUTHORITY Path C:\Program Files\MySQL\MySQL Server 8.0\bin\mysqld.exe Memory Usage 63 MB Peak Memory Usage 388 MB mysqld.exe Process ID 5908 User Servicio de red Domain NT AUTHORITY Path C:\Program Files\MySQL\MySQL Server 8.0\bin\mysqld.exe Memory Usage 8.88 MB Peak Memory Usage 26 MB nfsclnt.exe Process ID 6308 User Servicio de red Domain NT AUTHORITY Path C:\Windows\System32\nfsclnt.exe Memory Usage 5.84 MB Peak Memory Usage 6.75 MB notepad.exe Process ID 4784 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\notepad.exe Memory Usage 22 MB Peak Memory Usage 23 MB NTKDaemon.exe Process ID 4812 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\Common Files\Native Instruments\NTK\NTKDaemon.exe Memory Usage 24 MB Peak Memory Usage 55 MB nvcontainer.exe Process ID 5852 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\NVIDIA Corporation\NvContainer\nvcontainer.exe Memory Usage 36 MB Peak Memory Usage 45 MB nvcontainer.exe Process ID 14036 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\NVIDIA Corporation\NvContainer\nvcontainer.exe Memory Usage 33 MB Peak Memory Usage 55 MB nvcontainer.exe Process ID 14052 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\NVIDIA Corporation\NvContainer\nvcontainer.exe Memory Usage 37 MB Peak Memory Usage 134 MB NVDisplay.Container.exe Process ID 3036 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\DriverStore\FileRepository\nvltig.inf_amd64_8a 5f4454d3faac1c\Display.NvContainer\NVDisplay.Container.exe Memory Usage 29 MB Peak Memory Usage 50 MB NVDisplay.Container.exe Process ID 3724 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\DriverStore\FileRepository\nvltig.inf_amd64_8a 5f4454d3faac1c\Display.NvContainer\NVDisplay.Container.exe Memory Usage 38 MB Peak Memory Usage 177 MB NVIDIA Share.exe Process ID 14708 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\NVIDIA Corporation\NVIDIA GeForce Experience\NVIDIA Share.exe Memory Usage 52 MB Peak Memory Usage 86 MB NVIDIA Share.exe Process ID 15944 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\NVIDIA Corporation\NVIDIA GeForce Experience\NVIDIA Share.exe Memory Usage 42 MB Peak Memory Usage 56 MB NVIDIA Share.exe Process ID 14324 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\NVIDIA Corporation\NVIDIA GeForce Experience\NVIDIA Share.exe Memory Usage 61 MB Peak Memory Usage 91 MB NVIDIA Web Helper.exe Process ID 7504 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files (x86)\NVIDIA Corporation\NvNode\NVIDIA Web Helper.exe Memory Usage 9.23 MB Peak Memory Usage 71 MB nvsphelper64.exe Process ID 9172 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\NVIDIA Corporation\ShadowPlay\nvsphelper64.exe Memory Usage 13 MB Peak Memory Usage 20 MB OfficeClickToRun.exe Process ID 5744 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe Memory Usage 36 MB Peak Memory Usage 97 MB omtsreco.exe Process ID 5516 User OracleOraDB21Home1MTSRecoveryService Domain NT SERVICE Path C:\app\v5060\product\21c\dbhomeXE\bin\omtsreco.exe Memory Usage 13 MB Peak Memory Usage 17 MB OneApp.IGCC.WinService.exe Process ID 5792 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd6 4_bee333b3fb02dacb\OneApp.IGCC.WinService.exe Memory Usage 42 MB Peak Memory Usage 52 MB OneDrive.exe Process ID 5080 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Microsoft OneDrive\OneDrive.exe Memory Usage 130 MB Peak Memory Usage 164 MB opera.exe Process ID 2508 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 308 MB Peak Memory Usage 634 MB opera.exe Process ID 2988 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 139 MB Peak Memory Usage 388 MB opera.exe Process ID 3256 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 20 MB Peak Memory Usage 23 MB opera.exe Process ID 14076 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 103 MB Peak Memory Usage 116 MB opera.exe Process ID 10764 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 106 MB Peak Memory Usage 117 MB opera.exe Process ID 11032 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 155 MB Peak Memory Usage 171 MB opera.exe Process ID 10972 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 110 MB Peak Memory Usage 127 MB opera.exe Process ID 14980 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 147 MB Peak Memory Usage 233 MB opera.exe Process ID 3432 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 103 MB Peak Memory Usage 113 MB opera.exe Process ID 17132 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 25 MB Peak Memory Usage 28 MB opera.exe Process ID 10544 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 103 MB Peak Memory Usage 114 MB opera.exe Process ID 7900 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 272 MB Peak Memory Usage 441 MB opera.exe Process ID 9368 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 115 MB Peak Memory Usage 126 MB opera.exe Process ID 10320 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 108 MB Peak Memory Usage 128 MB opera.exe Process ID 5472 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 106 MB Peak Memory Usage 123 MB opera.exe Process ID 2340 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 107 MB Peak Memory Usage 115 MB opera.exe Process ID 2436 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 119 MB Peak Memory Usage 154 MB opera.exe Process ID 12724 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 252 MB Peak Memory Usage 301 MB opera.exe Process ID 3852 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 112 MB Peak Memory Usage 131 MB opera.exe Process ID 3380 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 43 MB Peak Memory Usage 66 MB opera.exe Process ID 15260 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 149 MB Peak Memory Usage 180 MB opera.exe Process ID 12928 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe Memory Usage 123 MB Peak Memory Usage 157 MB opera_crashreporter.exe Process ID 5640 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Users\v5060\AppData\Local\Programs\Opera GX\109.0.5097.62\opera_crashreporter.exe Memory Usage 9.87 MB Peak Memory Usage 11 MB oracle.exe Process ID 5420 User OracleServiceXE Domain NT SERVICE Path C:\app\v5060\product\21c\dbhomeXE\bin\oracle.exe Memory Usage 430 MB Peak Memory Usage 1.93 GB PhoneExperienceHost.exe Process ID 14784 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\WindowsApps\Microsoft.YourPhone_1.24032.123.0_x64__8we kyb3d8bbwe\PhoneExperienceHost.exe Memory Usage 117 MB Peak Memory Usage 139 MB PluginLoaderSvc.exe Process ID 5864 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\Lenovo\Nerve Center\bin\x64\PluginLoaderSvc.exe Memory Usage 16 MB Peak Memory Usage 22 MB PresentationFontCache.exe Process ID 4224 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\Microsoft.NET\Framework64\v3.0\WPF\Presentatio nFontCache.exe Memory Usage 19 MB Peak Memory Usage 24 MB Registry Process ID 132 User SYSTEM Domain NT AUTHORITY Memory Usage 119 MB Peak Memory Usage 119 MB RtkAudioService64.exe Process ID 3668 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\Realtek\Audio\HDA\RtkAudioService64.exe Memory Usage 7.14 MB Peak Memory Usage 7.88 MB RtkBtManServ.exe Process ID 5880 User SYSTEM Domain NT AUTHORITY Path C:\Windows\RtkBtManServ.exe Memory Usage 8.16 MB Peak Memory Usage 11 MB rundll32.exe Process ID 9200 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\rundll32.exe Memory Usage 7.07 MB Peak Memory Usage 8.05 MB RuntimeBroker.exe Process ID 7040 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 7.96 MB Peak Memory Usage 9.62 MB RuntimeBroker.exe Process ID 15140 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 15 MB Peak Memory Usage 19 MB RuntimeBroker.exe Process ID 12712 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 46 MB Peak Memory Usage 46 MB RuntimeBroker.exe Process ID 13264 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 33 MB Peak Memory Usage 56 MB RuntimeBroker.exe Process ID 11808 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 19 MB Peak Memory Usage 22 MB RuntimeBroker.exe Process ID 14192 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\RuntimeBroker.exe Memory Usage 22 MB Peak Memory Usage 28 MB SDXHelper.exe Process ID 14448 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Microsoft Office\root\Office16\SDXHelper.exe Memory Usage 19 MB Peak Memory Usage 32 MB SearchApp.exe Process ID 17724 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2tx yewy\SearchApp.exe Memory Usage 78 MB Peak Memory Usage 85 MB SearchApp.exe Process ID 14864 User v5060

Domain DESKTOP-H77O3Q3 Path C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2tx yewy\SearchApp.exe Memory Usage 200 MB Peak Memory Usage 223 MB SearchFilterHost.exe Process ID 3772 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\SearchFilterHost.exe Memory Usage 20 MB Peak Memory Usage 29 MB SearchIndexer.exe Process ID 6012 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\SearchIndexer.exe Memory Usage 53 MB Peak Memory Usage 57 MB SearchProtocolHost.exe Process ID 13244 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\SearchProtocolHost.exe Memory Usage 29 MB Peak Memory Usage 29 MB Secure System Process ID 72 User SYSTEM Domain NT AUTHORITY Memory Usage 100 KB Peak Memory Usage 212 KB SecurityHealthService.exe Process ID 9092 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\SecurityHealthService.exe Memory Usage 14 MB Peak Memory Usage 15 MB SecurityHealthSystray.exe Process ID 12560 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\SecurityHealthSystray.exe Memory Usage 9.63 MB Peak Memory Usage 11 MB services.exe Process ID 968 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\services.exe Memory Usage 13 MB Peak Memory Usage 76 MB SgrmBroker.exe Process ID 3352 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\SgrmBroker.exe Memory Usage 7.81 MB Peak Memory Usage 11 MB ShellExperienceHost.exe Process ID 18420 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\S hellExperienceHost.exe Memory Usage 52 MB Peak Memory Usage 66 MB sihost.exe Process ID 4160 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\sihost.exe Memory Usage 27 MB Peak Memory Usage 28 MB smartscreen.exe Process ID 8656 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\smartscreen.exe Memory Usage 26 MB Peak Memory Usage 26 MB smss.exe Process ID 488 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\smss.exe Memory Usage 1.07 MB Peak Memory Usage 2.08 MB Speccy64.exe Process ID 7576 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Speccy\Speccy64.exe Memory Usage 39 MB Peak Memory Usage 40 MB spoolsv.exe Process ID 5224 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\spoolsv.exe Memory Usage 15 MB Peak Memory Usage 17 MB Spotify.exe Process ID 4804 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\WindowsApps\SpotifyAB.SpotifyMusic_1.235.663.0_x64__zp dnekdrzrea0\Spotify.exe Memory Usage 157 MB Peak Memory Usage 228 MB Spotify.exe Process ID 2132 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\WindowsApps\SpotifyAB.SpotifyMusic_1.235.663.0_x64__zp dnekdrzrea0\Spotify.exe Memory Usage 18 MB Peak Memory Usage 29 MB Spotify.exe Process ID 12880 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\WindowsApps\SpotifyAB.SpotifyMusic_1.235.663.0_x64__zp dnekdrzrea0\Spotify.exe Memory Usage 75 MB Peak Memory Usage 179 MB Spotify.exe Process ID 2188 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\WindowsApps\SpotifyAB.SpotifyMusic_1.235.663.0_x64__zp dnekdrzrea0\Spotify.exe Memory Usage 164 MB Peak Memory Usage 232 MB Spotify.exe Process ID 6940 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\WindowsApps\SpotifyAB.SpotifyMusic_1.235.663.0_x64__zp dnekdrzrea0\Spotify.exe Memory Usage 35 MB Peak Memory Usage 47 MB Spotify.exe Process ID 12304 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\WindowsApps\SpotifyAB.SpotifyMusic_1.235.663.0_x64__zp dnekdrzrea0\Spotify.exe Memory Usage 20 MB Peak Memory Usage 29 MB StartMenuExperienceHost.exe Process ID 10724 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceH ost_cw5n1h2txyewy\StartMenuExperienceHost.exe Memory Usage 108 MB Peak Memory Usage 116 MB svchost.exe Process ID 1832 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.94 MB Peak Memory Usage 7.74 MB svchost.exe Process ID 1968 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 14 MB Peak Memory Usage 16 MB svchost.exe Process ID 1988 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.48 MB Peak Memory Usage 10 MB svchost.exe Process ID 4424 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 17 MB Peak Memory Usage 23 MB svchost.exe Process ID 2208 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 23 MB Peak Memory Usage 25 MB svchost.exe Process ID 3436 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.65 MB Peak Memory Usage 8.27 MB svchost.exe Process ID 9692 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\svchost.exe Memory Usage 14 MB Peak Memory Usage 15 MB svchost.exe Process ID 2216 User Servicio de red Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 13 MB Peak Memory Usage 16 MB svchost.exe Process ID 2228 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.47 MB Peak Memory Usage 8.79 MB svchost.exe Process ID 2236 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 16 MB Peak Memory Usage 46 MB svchost.exe Process ID 2292 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 11 MB Peak Memory Usage 12 MB svchost.exe Process ID 2412 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 16 MB Peak Memory Usage 24 MB svchost.exe Process ID 2484 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 11 MB Peak Memory Usage 13 MB svchost.exe Process ID 15800 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 11 MB Peak Memory Usage 16 MB svchost.exe Process ID 2552 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.14 MB Peak Memory Usage 9.35 MB svchost.exe Process ID 2744 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.54 MB Peak Memory Usage 10 MB svchost.exe Process ID 2752 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 13 MB Peak Memory Usage 16 MB svchost.exe Process ID 2864 User Servicio de red Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 9.60 MB Peak Memory Usage 11 MB svchost.exe Process ID 2904 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.46 MB Peak Memory Usage 8.58 MB svchost.exe Process ID 2912 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.58 MB Peak Memory Usage 16 MB svchost.exe Process ID 3008 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 18 MB Peak Memory Usage 58 MB svchost.exe Process ID 9020 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.25 MB Peak Memory Usage 9.16 MB svchost.exe Process ID 1672 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.36 MB Peak Memory Usage 9.46 MB svchost.exe Process ID 3016 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 15 MB Peak Memory Usage 18 MB svchost.exe Process ID 3068 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.80 MB Peak Memory Usage 7.51 MB svchost.exe Process ID 2440 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.54 MB Peak Memory Usage 10 MB svchost.exe Process ID 3196 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 9.32 MB Peak Memory Usage 10 MB svchost.exe Process ID 3284 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.25 MB Peak Memory Usage 8.24 MB svchost.exe Process ID 3944 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 16 MB Peak Memory Usage 16 MB svchost.exe Process ID 4196 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\svchost.exe Memory Usage 30 MB Peak Memory Usage 38 MB svchost.exe Process ID 4288 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\svchost.exe Memory Usage 42 MB Peak Memory Usage 48 MB svchost.exe Process ID 4340 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.54 MB Peak Memory Usage 8.73 MB svchost.exe Process ID 4348 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 11 MB Peak Memory Usage 13 MB svchost.exe Process ID 4592 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 18 MB Peak Memory Usage 21 MB svchost.exe Process ID 4616 User Servicio de red Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 16 MB Peak Memory Usage 18 MB svchost.exe Process ID 5020 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 9.10 MB Peak Memory Usage 11 MB svchost.exe Process ID 5048 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 19 MB Peak Memory Usage 21 MB svchost.exe Process ID 5088 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 11 MB Peak Memory Usage 12 MB svchost.exe Process ID 4748 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 15 MB Peak Memory Usage 16 MB svchost.exe Process ID 5160 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 12 MB Peak Memory Usage 14 MB svchost.exe Process ID 5476 User Servicio de red Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.82 MB Peak Memory Usage 10 MB svchost.exe Process ID 5776 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 35 MB Peak Memory Usage 71 MB svchost.exe Process ID 5784 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 28 MB Peak Memory Usage 745 MB svchost.exe Process ID 5800 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 10 MB Peak Memory Usage 13 MB svchost.exe Process ID 5888 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.17 MB Peak Memory Usage 8.57 MB svchost.exe Process ID 5928 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 14 MB Peak Memory Usage 15 MB svchost.exe Process ID 5936 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.84 MB Peak Memory Usage 7.50 MB svchost.exe Process ID 9244 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 11 MB Peak Memory Usage 12 MB svchost.exe Process ID 6020 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.16 MB Peak Memory Usage 8.98 MB svchost.exe Process ID 6028 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 20 MB Peak Memory Usage 23 MB svchost.exe Process ID 6256 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 9.99 MB Peak Memory Usage 11 MB svchost.exe Process ID 6784 User Servicio de red Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.40 MB Peak Memory Usage 13 MB svchost.exe Process ID 6436 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.72 MB Peak Memory Usage 8.73 MB svchost.exe Process ID 7408 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 5.90 MB Peak Memory Usage 6.60 MB svchost.exe Process ID 7812 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 9.91 MB Peak Memory Usage 11 MB svchost.exe Process ID 7560 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.62 MB Peak Memory Usage 7.73 MB svchost.exe Process ID 19356 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.22 MB Peak Memory Usage 11 MB svchost.exe Process ID 8684 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 13 MB Peak Memory Usage 15 MB svchost.exe Process ID 8696 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.90 MB Peak Memory Usage 11 MB svchost.exe Process ID 8704 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.88 MB Peak Memory Usage 9.14 MB svchost.exe Process ID 9160 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 9.79 MB Peak Memory Usage 13 MB svchost.exe Process ID 8836 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 13 MB Peak Memory Usage 17 MB svchost.exe Process ID 5976 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 9.81 MB Peak Memory Usage 11 MB svchost.exe Process ID 9328 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 17 MB Peak Memory Usage 19 MB svchost.exe Process ID 10776 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\svchost.exe Memory Usage 26 MB Peak Memory Usage 27 MB svchost.exe Process ID 11984 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 11 MB Peak Memory Usage 11 MB svchost.exe Process ID 11992 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 12 MB Peak Memory Usage 27 MB svchost.exe Process ID 12988 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 14 MB Peak Memory Usage 15 MB svchost.exe Process ID 2080 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 12 MB Peak Memory Usage 16 MB svchost.exe Process ID 800 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 33 MB Peak Memory Usage 38 MB svchost.exe Process ID 1040 User Servicio de red Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 17 MB Peak Memory Usage 17 MB svchost.exe Process ID 1080 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 9.51 MB Peak Memory Usage 10 MB svchost.exe Process ID 1316 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.74 MB Peak Memory Usage 10 MB svchost.exe Process ID 1324 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 13 MB Peak Memory Usage 14 MB svchost.exe Process ID 1332 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 13 MB Peak Memory Usage 15 MB svchost.exe Process ID 1340 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.00 MB Peak Memory Usage 7.09 MB svchost.exe Process ID 10132 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.47 MB Peak Memory Usage 10 MB svchost.exe Process ID 1360 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 6.31 MB Peak Memory Usage 6.98 MB svchost.exe Process ID 14528 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 26 MB Peak Memory Usage 27 MB svchost.exe Process ID 18872 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.96 MB Peak Memory Usage 9.02 MB svchost.exe Process ID 1396 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 11 MB Peak Memory Usage 12 MB svchost.exe Process ID 1404 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 12 MB Peak Memory Usage 13 MB svchost.exe Process ID 1476 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 17 MB Peak Memory Usage 25 MB svchost.exe Process ID 1532 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.91 MB Peak Memory Usage 11 MB svchost.exe Process ID 1576 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.28 MB Peak Memory Usage 8.14 MB svchost.exe Process ID 1732 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 9.00 MB Peak Memory Usage 9.70 MB svchost.exe Process ID 1788 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.98 MB Peak Memory Usage 11 MB svchost.exe Process ID 1800 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 9.17 MB Peak Memory Usage 11 MB svchost.exe Process ID 1808 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 11 MB Peak Memory Usage 13 MB svchost.exe Process ID 11360 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 8.73 MB Peak Memory Usage 8.73 MB svchost.exe Process ID 6880 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 7.83 MB Peak Memory Usage 7.96 MB svchost.exe Process ID 20124 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\svchost.exe Memory Usage 18 MB Peak Memory Usage 18 MB System Process ID 4 Memory Usage 4.28 MB Peak Memory Usage 54 MB System Idle Process Process ID 0 SystemSettings.exe Process ID 12348 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\ImmersiveControlPanel\SystemSettings.exe Memory Usage 58 MB Peak Memory Usage 100 MB taskhostw.exe Process ID 4528 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\taskhostw.exe Memory Usage 16 MB Peak Memory Usage 17 MB taskhostw.exe Process ID 9004 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\taskhostw.exe Memory Usage 10 MB Peak Memory Usage 15 MB TCPSVCS.EXE Process ID 5944 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\TCPSVCS.EXE Memory Usage 4.95 MB Peak Memory Usage 6.02 MB TextInputHost.exe Process ID 14284 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2 txyewy\TextInputHost.exe Memory Usage 48 MB Peak Memory Usage 58 MB tnslsnr.exe Process ID 3032 User OracleOraDB21Home1TNSListener Domain NT SERVICE Path C:\app\v5060\product\21c\dbhomeXE\bin\tnslsnr.exe Memory Usage 19 MB Peak Memory Usage 24 MB unsecapp.exe Process ID 17216 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\wbem\unsecapp.exe Memory Usage 9.47 MB Peak Memory Usage 9.79 MB UserOOBEBroker.exe Process ID 14468 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Windows\System32\oobe\UserOOBEBroker.exe Memory Usage 11 MB Peak Memory Usage 11 MB utility.exe Process ID 6296 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Lenovo\LenovoUtility\utility.exe Memory Usage 11 MB Peak Memory Usage 12 MB vmcompute.exe Process ID 6052 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\vmcompute.exe Memory Usage 11 MB Peak Memory Usage 16 MB vmmem Process ID 7656 User C4E8BB25-2DA1-4281-8F51-AD18C3AFB677 Domain NT VIRTUAL MACHINE Peak Memory Usage 20 KB vmnat.exe Process ID 5992 User SYSTEM Domain NT AUTHORITY Path C:\Windows\SysWOW64\vmnat.exe Memory Usage 7.40 MB Peak Memory Usage 8.36 MB vmnetdhcp.exe Process ID 5960 User SYSTEM Domain NT AUTHORITY Path C:\Windows\SysWOW64\vmnetdhcp.exe Memory Usage 5.97 MB Peak Memory Usage 13 MB vmware-authd.exe Process ID 5952 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe Memory Usage 11 MB Peak Memory Usage 13 MB vmware-usbarbitrator64.exe Process ID 5968 User SYSTEM Domain NT AUTHORITY Path C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe Memory Usage 12 MB Peak Memory Usage 13 MB wininit.exe Process ID 896 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\wininit.exe Memory Usage 5.91 MB Peak Memory Usage 7.25 MB winlogon.exe Process ID 1128 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\winlogon.exe Memory Usage 13 MB Peak Memory Usage 29 MB WiseMemoryOptimzer.exe Process ID 15700 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\Wise\Wise Memory Optimizer\WiseMemoryOptimzer.exe Memory Usage 4.36 MB Peak Memory Usage 28 MB wlanext.exe Process ID 2128 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\wlanext.exe Memory Usage 7.77 MB Peak Memory Usage 9.30 MB WmiApSrv.exe Process ID 19788 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\wbem\WmiApSrv.exe Memory Usage 10 MB Peak Memory Usage 10 MB WmiPrvSE.exe Process ID 2628 User Servicio de red Domain NT AUTHORITY Path C:\Windows\System32\wbem\WmiPrvSE.exe Memory Usage 33 MB Peak Memory Usage 35 MB WmiPrvSE.exe Process ID 1748 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\wbem\WmiPrvSE.exe Memory Usage 49 MB Peak Memory Usage 49 MB WMIRegistrationService.exe Process ID 6004 User SYSTEM Domain NT AUTHORITY Path C:\Windows\System32\DriverStore\FileRepository\mewmiprov.inf_am d64_cad1db73e8c782a6\WMIRegistrationService.exe Memory Usage 13 MB Peak Memory Usage 18 MB wmpnetwk.exe Process ID 8576 User Servicio de red Domain NT AUTHORITY Path C:\Program Files\Windows Media Player\wmpnetwk.exe Memory Usage 9.13 MB Peak Memory Usage 12 MB wslservice.exe Process ID 6036 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\WSL\wslservice.exe Memory Usage 18 MB Peak Memory Usage 21 MB WUDFHost.exe Process ID 2588 User SERVICIO LOCAL Domain NT AUTHORITY Path C:\Windows\System32\WUDFHost.exe Memory Usage 8.27 MB Peak Memory Usage 10 MB XSplit.bp.exe Process ID 14084 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\XSplit\VCam\x64\cef3_3440\XSplit.bp.exe Memory Usage 52 MB Peak Memory Usage 107 MB XSplit.bp.exe Process ID 2116 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\XSplit\VCam\x64\cef3_3440\XSplit.bp.exe Memory Usage 92 MB Peak Memory Usage 130 MB XSplitVCam.exe Process ID 8512 User v5060 Domain DESKTOP-H77O3Q3 Path C:\Program Files\XSplit\VCam\x64\XSplitVCam.exe Memory Usage 119 MB Peak Memory Usage 169 MB XSpltVidSvc.exe Process ID 6044 User SYSTEM Domain NT AUTHORITY Path C:\Program Files\XSplit\VCam\service\XSpltVidSvc.exe Memory Usage 8.09 MB Peak Memory Usage 13 MB Security Options Acceso a redes: canalizaciones con nombre accesibles anónimamente Acceso a redes: modelo de seguridad y uso compartido para cuentas locales Clásico: usuarios locales se autentican con credenciales propias Acceso a redes: no permitir el almacenamiento de contraseñas y credenciales para la autenticación de la red Deshabilitada Acceso a redes: no permitir enumeraciones anónimas de cuentas SAM Habilitada Acceso a redes: no permitir enumeraciones anónimas de cuentas y recursos compartidos SAM Deshabilitada Acceso a redes: permitir la aplicación de los permisos Todos a los usuarios anónimos Deshabilitada Acceso a redes: recursos compartidos accesibles anónimamente No está definido Acceso a redes: restringir acceso anónimo a canalizaciones con nombre y recursos compartidos Habilitada Acceso a redes: rutas del Registro accesibles remotamente System\CurrentControlSet\Control\ProductOptions,System\Curr entControlSet\Control\Server Applications,Software\Microsoft\Windows NT\CurrentVersion Acceso a redes: rutas y subrutas del Registro accesibles remotamente System\CurrentControlSet\Control\Print\Printers,System\Current ControlSet\Services\Eventlog,Software\Microsoft\OLAP Server,Software\Microsoft\Windows NT\CurrentVersion\Print,Software\Microsoft\Windows NT\CurrentVersion\Windows,System\CurrentControlSet\Control
ContentIndex,System\CurrentControlSet\Control\Terminal Server,System\CurrentControlSet\Control\Terminal Server\UserConfig,System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration,Software\Microsoft\Windows NT\CurrentVersion\Perflib,System\CurrentControlSet\Services\S ysmonLog Acceso de red: evitar que clientes con permiso realicen llamadas remotas a SAM Acceso de red: permitir traducción SID/nombre anónima Deshabilitada Apagado: borrar el archivo de paginación de la memoria virtual Deshabilitada Apagado: permitir apagar el sistema sin tener que iniciar sesión Habilitada Auditoría de longitud mínima de contraseña No está definido Auditoría: apagar el sistema de inmediato si no se pueden registrar las auditorías de seguridad Deshabilitada Auditoría: auditar el acceso de objetos globales del sistema Deshabilitada Auditoría: auditar el uso del privilegio de copias de seguridad y restauración Deshabilitada Auditoría: forzar la configuración de subcategorías de la directiva de auditoría (Windows Vista o posterior) para invalidar la configuración de la categoría de directiva de auditoría No está definido Cliente de redes de Microsoft: enviar contraseña sin cifrar a servidores SMB de terceros Deshabilitada Cliente de redes de Microsoft: firmar digitalmente las comunicaciones (si el servidor lo permite) Habilitada Cliente de redes de Microsoft: firmar digitalmente las comunicaciones (siempre) Deshabilitada Configuración del sistema: subsistemas opcionales Configuración del sistema: usar reglas de certificado en ejecutables de Windows para directivas de restricción de software Deshabilitada Consola de recuperación: permitir el inicio de sesión administrativo automático Habilitada Consola de recuperación: permitir la copia de disquetes y el acceso a todas las unidades y carpetas Habilitada Control de cuentas de usuario: cambiar al escritorio seguro cuando se pida confirmación de elevación Habilitada Control de cuentas de usuario: comportamiento de la petición de elevación para los administradores en Modo de aprobación de administrador Pedir consentimiento para binarios que no son de Windows Control de cuentas de usuario: comportamiento de la petición de elevación para los usuarios estándar Pedir credenciales Control de cuentas de usuario: detectar instalaciones de aplicaciones y pedir confirmación de elevación Habilitada Control de cuentas de usuario: ejecutar todos los administradores en Modo de aprobación de administrador Habilitada Control de cuentas de usuario: elevar solo aplicaciones UIAccess instaladas en ubicaciones seguras Habilitada Control de cuentas de usuario: elevar solo los archivos ejecutables firmados y validados Deshabilitada Control de cuentas de usuario: Modo de aprobación de administrador para la cuenta predefinida Administrador Deshabilitada Control de cuentas de usuario: permitir que las aplicaciones UIAccess pidan confirmación de elevación sin usar el escritorio seguro Deshabilitada Control de cuentas de usuario: virtualizar los errores de escritura de archivo y de Registro en diferentes ubicaciones por usuario Habilitada Controlador de dominio: no permitir los cambios de contraseña de cuenta de equipo No está definido Controlador de dominio: permitir a los operadores de servidor programar tareas No está definido Controlador de dominio: permitir que se vuelva a usar la cuenta de equipo durante la unión a un dominio No está definido Controlador de dominio: requisitos de firma de servidor LDAP No está definido Controlador de dominio: requisitos del token de enlace de canal del servidor LDAP No está definido Controlador del dominio: permite conexiones de canal seguro vulnerables de Netlogon No está definido Criptografía de sistema: forzar la protección con claves seguras para las claves de usuario almacenadas en el equipo No está definido Criptografía de sistema: usar algoritmos que cumplan FIPS para cifrado, firma y operaciones hash Deshabilitada Cuentas: bloquear cuentas Microsoft No está definido Cuentas: cambiar el nombre de cuenta de invitado Invitado Cuentas: cambiar el nombre de la cuenta de administrador Administrador Cuentas: estado de la cuenta de administrador Deshabilitada Cuentas: estado de la cuenta de invitado Deshabilitada Cuentas: limitar el uso de cuentas locales con contraseña en blanco solo para iniciar sesión en la consola Habilitada DCOM: restricciones de acceso al equipo en sintaxis de Lenguaje de definición de descriptores de seguridad (SDDL) No está definido DCOM: restricciones de inicio de equipo en sintaxis de Lenguaje de definición de descriptores de seguridad (SDDL) No está definido Dispositivos: impedir que los usuarios instalen controladores de impresora Deshabilitada Dispositivos: permitir desacoplamiento sin tener que iniciar sesión Habilitada Dispositivos: permitir formatear y expulsar medios extraíbles No está definido Dispositivos: restringir el acceso a disquetes solo al usuario con sesión iniciada localmente No está definido Dispositivos: restringir el acceso al CD-ROM solo al usuario con sesión iniciada localmente No está definido Inicio de sesión interactivo: comportamiento de extracción de tarjeta inteligente Ninguna acción Inicio de sesión interactivo: límite de inactividad del equipo No está definido Inicio de sesión interactivo: mostrar información de usuario cuando se bloquee la sesión No está definido Inicio de sesión interactivo: No mostrar el nombre de usuario al iniciar sesión No está definido Inicio de sesión interactivo: No mostrar último inicio de sesión Deshabilitada Inicio de sesión interactivo: no requerir Ctrl+Alt+Supr No está definido Inicio de sesión interactivo: número de inicios de sesión anteriores que se almacenarán en caché (si el controlador de dominio no está disponible) 10 inicios de sesión Inicio de sesión interactivo: pedir al usuario que cambie la contraseña antes de que expire 5 días Inicio de sesión interactivo: requerir la autenticación del controlador de dominio para desbloquear la estación de trabajo Deshabilitada Inicio de sesión interactivo: requerir Windows Hello para empresas o tarjeta inteligente Deshabilitada Inicio de sesión interactivo: texto del mensaje para los usuarios que intentan iniciar una sesión Inicio de sesión interactivo: título del mensaje para los usuarios que intentan iniciar una sesión Inicio de sesión interactivo: umbral de bloqueo de cuenta del equipo No está definido Miembro de dominio: cifrar digitalmente datos de un canal seguro (cuando sea posible) Habilitada Miembro de dominio: cifrar o firmar digitalmente datos de un canal seguro (siempre) Habilitada Miembro de dominio: deshabilitar los cambios de contraseña de cuentas de equipo Deshabilitada Miembro de dominio: duración máxima de contraseña de cuenta de equipo 30 días Miembro de dominio: firmar digitalmente datos de un canal seguro (cuando sea posible) Habilitada Miembro de dominio: requerir clave de sesión segura (Windows 2000 o posterior) Habilitada Objetos de sistema: reforzar los permisos predeterminados de los objetos internos del sistema (por ejemplo, vínculos simbólicos) Habilitada Objetos de sistema: requerir no distinguir mayúsculas de minúsculas para subsistemas que no sean de Windows Habilitada Reducir los límites de longitud mínima de la contraseña No está definido Seguridad de red: configurar tipos de cifrado permitidos para Kerberos No está definido Seguridad de red: forzar el cierre de sesión cuando expire la hora de inicio de sesión Deshabilitada Seguridad de red: nivel de autenticación de LAN Manager No está definido Seguridad de red: no almacenar valor de hash de LAN Manager en el próximo cambio de contraseña Habilitada Seguridad de red: permitir que LocalSystem use la identidad del equipo para NTLM No está definido Seguridad de red: permitir retroceso a sesión NULL de LocalSystem No está definido Seguridad de red: permitir solicitudes de autenticación PKU2U a este equipo para usar identidades en Internet. No está definido Seguridad de red: requisitos de firma de cliente LDAP Negociar firma Seguridad de red: restringir NTLM: agregar excepciones de servidor en este dominio No está definido Seguridad de red: restringir NTLM: agregar excepciones de servidor remoto para autenticación NTLM No está definido Seguridad de red: restringir NTLM: auditar el tráfico NTLM entrante No está definido Seguridad de red: restringir NTLM: auditar la autenticación NTLM en este dominio No está definido Seguridad de red: restringir NTLM: autenticación NTLM en este dominio No está definido Seguridad de red: restringir NTLM: tráfico NTLM entrante No está definido Seguridad de red: restringir NTLM: tráfico NTLM saliente hacia servidores remotos No está definido Seguridad de red: seguridad de sesión mínima para clientes NTLM basados en SSP (incluida RPC segura) Requerir cifrado de 128 bits Seguridad de red: seguridad de sesión mínima para servidores NTLM basados en SSP (incluida RPC segura) Requerir cifrado de 128 bits Servidor de red de Microsoft: intentar S4U2Self para obtener información de notificaciones No está definido Servidor de red Microsoft: desconectar a los clientes cuando expire el tiempo de inicio de sesión Habilitada Servidor de red Microsoft: firmar digitalmente las comunicaciones (si el cliente lo permite) Deshabilitada Servidor de red Microsoft: firmar digitalmente las comunicaciones (siempre) Deshabilitada Servidor de red Microsoft: nivel de validación de nombres de destino SPN del servidor No está definido Servidor de red Microsoft: tiempo de inactividad requerido antes de suspender la sesión -1 minutos Device Tree Equipo basado en x64 ACPI Sistema Microsoft compatible con ACPI Adaptador de CA de Microsoft Agregador de procesador ACPI Botón de característica fija ACPI Botón de inicio/apagado ACPI Intel Core i7-7700HQ CPU @ 2.80GHz Intel Core i7-7700HQ CPU @ 2.80GHz Intel Core i7-7700HQ CPU @ 2.80GHz Intel Core i7-7700HQ CPU @ 2.80GHz Intel Core i7-7700HQ CPU @ 2.80GHz Intel Core i7-7700HQ CPU @ 2.80GHz Intel Core i7-7700HQ CPU @ 2.80GHz Intel Core i7-7700HQ CPU @ 2.80GHz Interfaz de administración para ACPI de Microsoft Windows Interfaz de administración para ACPI de Microsoft Windows Módulo de plataforma segura 2.0 Recursos de la placa base Tapa ACPI Complejo raíz PCI Express Controladora de host de Intel Serial IO GPIO: INT345D ELAN SMBus Driver Intel 100 Series/C230 Series Chipset Family PMC - A121 Intel 100 Series/C230 Series Chipset Family Thermal subsystem - A131 Intel Management Engine Interface Intel Xeon E3 - 1200 v6/7th Gen Intel Core Host Bridge/DRAM Registers - 5910 Interfaz de administración para ACPI de Microsoft Windows Recursos de la placa base Recursos de la placa base Recursos de la placa base Recursos de la placa base Intel(R) Xeon(R) E3 - 1200/1500 v5/6th Gen Intel(R) Core™ PCIe Controller (x16) - 1901 NVIDIA GeForce GTX 1050 Ti Intel(R) HD Graphics 630 Intel Graphics Command Center Intel Graphics Control Panel Monitor PnP genérico Monitor PnP genérico Controlador de host eXtensible Intel(R) USB 3.0 - 1.0 (Microsoft) Concentrador raíz USB (USB 3.0) Concentrador USB genérico Concentrador USB genérico Concentrador USB genérico Concentrador USB genérico Concentrador USB genérico Dispositivo compuesto USB Dispositivo de entrada USB Dispositivo de teclado HID Dispositivo de entrada USB Controlador del sistema compatible con HID Dispositivo de control del consumidor compatible con HID Dispositivo definido por el proveedor compatible con HID Mouse compatible con HID Dispositivo de entrada USB Dispositivo definido por el proveedor compatible con HID Dispositivo definido por el proveedor compatible con HID Dispositivo definido por el proveedor compatible con HID Dispositivo compuesto USB Dispositivo de entrada USB Dispositivo de teclado HID Dispositivo de entrada USB Dispositivo de control del consumidor compatible con HID Dispositivo de teclado HID Dispositivo definido por el proveedor compatible con HID Dispositivo definido por el proveedor compatible con HID Dispositivo compuesto USB EasyCamera Realtek Bluetooth Adapter Bluetooth Device (Personal Area Network) Bluetooth Device (RFCOMM Protocol TDI) Serie estándar sobre el vínculo Bluetooth (COM3) Serie estándar sobre el vínculo Bluetooth (COM4) Enumerador Bluetooth de Microsoft Dispositivo periférico Bluetooth Dispositivo periférico Bluetooth Dispositivo periférico Bluetooth Dispositivo periférico Bluetooth Dispositivo periférico Bluetooth Dispositivo periférico Bluetooth JBL TUNE660NC JBL TUNE660NC Stereo JBL TUNE660NC Transporte AVRCP JBL TUNE660NC Transporte AVRCP MUSE M-1850 SBT MUSE M-1850 SBT A2DP SNK MUSE M-1850 SBT Transporte AVRCP MUSE M-1850 SBT Transporte AVRCP serial port Spp1 SRS-XB100 SRS-XB100 A2DP SNK SRS-XB100 Stereo SRS-XB100 Transporte AVRCP SRS-XB100 Transporte AVRCP MUSE M-1850 SBT Stereo Auriculares (MUSE M-1850 SBT Stereo) JBL TUNE660NC Hands-Free AG JBL TUNE660NC Hands-Free AG Audio SRS-XB100 Hands-Free AG SRS-XB100 Hands-Free AG Audio Enumerador de Bluetooth LE de Microsoft Xbox Wireless Controller Dispositivo de entrada Bluetooth de bajo consumo compatible con XINPUT Perfil de acceso genérico Perfil de atributo genérico Servicio de atributo genérico de LE de Bluetooth Servicio de atributo genérico de LE de Bluetooth Servicio de información del dispositivo Intel(R) Chipset SATA/PCIe RST Premium Controller NVMe Corsair MP400 WDC WD10SPZX-24Z10T0 Intel(R) 100 Series/C230 Series Chipset Family PCI Express Root Port #2 - A111 BayHubTech Integrated MMC/SD controller Intel(R) 100 Series/C230 Series Chipset Family PCI Express Root Port #3 - A112 Realtek 8821AE Wireless LAN 802.11ac PCI-E NIC Microsoft Wi-Fi Direct Virtual Adapter Microsoft Wi-Fi Direct Virtual Adapter #2 Intel(R) 100 Series/C230 Series Chipset Family PCI Express Root Port #4 - A113 Realtek PCIe GBE Family Controller Intel(R) 100 Series/C230 Series Chipset Family LPC Controller (HM175) - A152 Controladora programable de interrupciones Dispositivo heredado ELAN pointing device Procesador de datos numéricos Recursos de la placa base Recursos de la placa base Recursos de la placa base Sistema CMOS/reloj en tiempo real Teclado PS/2 estándar Temporizador de eventos de alta precisión Temporizador del sistema Controladora integrada compatible con Microsoft ACPI Batería con método de control compatible con ACPI de Microsoft Lenovo ACPI-Compliant Virtual Power Controller Controladora de High Definition Audio Sonido Intel para pantallas Realtek High Definition Audio Altavoces (Realtek High Definition Audio) Varios micrófonos (Realtek High Definition Audio) Sistema compatible con Microsoft UEFI Firmware de dispositivo Firmware de dispositivo Firmware de dispositivo Firmware de sistema CPU Intel Core i7 7700HQ Cores 4 Threads 8 Name Intel Core i7 7700HQ Code Name Kaby Lake Package Socket 1440 FCBGA Technology 14nm Specification Intel Core i7-7700HQ CPU @ 2.80GHz Family 6 Extended Family 6 Model E Extended Model 9E Stepping 9 Revision B0 Instructions MMX, SSE, SSE2, SSE3, SSSE3, SSE4.1, SSE4.2, Intel 64, NX, AES, AVX, AVX2, FMA3 Virtualization Not supported Hyperthreading Supported, Enabled Stock Core Speed 2800 MHz Average Temperature 65 °C Caches L1 Data Cache Size 4 x 32 KBytes L1 Instructions Cache Size 4 x 32 KBytes L2 Unified Cache Size 4 x 256 KBytes L3 Unified Cache Size 6144 KBytes Cores Core 0 Core Speed 3390.0 MHz Multiplier x 34.0 Bus Speed 99.7 MHz Temperature 62 °C Threads APIC ID: 0, 1 Core 1 Core Speed 3390.0 MHz Multiplier x 34.0 Bus Speed 99.7 MHz Temperature 68 °C Threads APIC ID: 2, 3 Core 2 Core Speed 3390.0 MHz Multiplier x 34.0 Bus Speed 99.7 MHz Temperature 66 °C Threads APIC ID: 4, 5 Core 3 Core Speed 3390.0 MHz Multiplier x 34.0 Bus Speed 99.7 MHz Temperature 64 °C Threads APIC ID: 6, 7 RAM Memory slots Total memory slots 2 Used memory slots 2 Free memory slots 0 Memory Type DDR4 Size 16384 MBytes Channels # Dual DRAM Frequency 1196.5 MHz CAS# Latency (CL) 17 clocks RAS# to CAS# Delay (tRCD) 17 clocks RAS# Precharge (tRP) 17 clocks Cycle Time (tRAS) 39 clocks Command Rate (CR) 2T Physical Memory Memory Usage 59 % Total Physical 16 GB Available Physical 6.49 GB Total Virtual 32 GB Available Virtual 17 GB SPD Number Of SPD Modules 2 Slot #1 Type DDR4 Size 8192 MBytes Manufacturer Ramaxel Technology Max Bandwidth DDR4-2666 (1333 MHz) Part Number RMSA3260MH78HAF-2666 Serial Number 291556885 Week/year 37 / 17 Timing table JEDEC #1 Frequency 727.3 MHz CAS# Latency 10,0 RAS# To CAS# 10 RAS# Precharge 10 tRAS 24 tRC 34 Voltage 1,200 V JEDEC #2 Frequency 800.0 MHz CAS# Latency 11,0 RAS# To CAS# 11 RAS# Precharge 11 tRAS 26 tRC 37 Voltage 1,200 V JEDEC #3 Frequency 872.7 MHz CAS# Latency 12,0 RAS# To CAS# 12 RAS# Precharge 12 tRAS 28 tRC 40 Voltage 1,200 V JEDEC #4 Frequency 945.5 MHz CAS# Latency 13,0 RAS# To CAS# 13 RAS# Precharge 13 tRAS 31 tRC 44 Voltage 1,200 V JEDEC #5 Frequency 1018.2 MHz CAS# Latency 14,0 RAS# To CAS# 14 RAS# Precharge 14 tRAS 33 tRC 47 Voltage 1,200 V JEDEC #6 Frequency 1090.9 MHz CAS# Latency 15,0 RAS# To CAS# 15 RAS# Precharge 15 tRAS 35 tRC 50 Voltage 1,200 V JEDEC #7 Frequency 1163.6 MHz CAS# Latency 16,0 RAS# To CAS# 16 RAS# Precharge 16 tRAS 38 tRC 54 Voltage 1,200 V JEDEC #8 Frequency 1236.4 MHz CAS# Latency 17,0 RAS# To CAS# 17 RAS# Precharge 17 tRAS 40 tRC 57 Voltage 1,200 V JEDEC #9 Frequency 1309.1 MHz CAS# Latency 18,0 RAS# To CAS# 18 RAS# Precharge 18 tRAS 42 tRC 60 Voltage 1,200 V JEDEC #10 Frequency 1333.3 MHz CAS# Latency 19,0 RAS# To CAS# 19 RAS# Precharge 19 tRAS 43 tRC 61 Voltage 1,200 V JEDEC #11 Frequency 1333.3 MHz CAS# Latency 20,0 RAS# To CAS# 19 RAS# Precharge 19 tRAS 43 tRC 61 Voltage 1,200 V JEDEC #12 Frequency 1333.3 MHz CAS# Latency 21,0 RAS# To CAS# 19 RAS# Precharge 19 tRAS 43 tRC 61 Voltage 1,200 V JEDEC #13 Frequency 1333.3 MHz CAS# Latency 22,0 RAS# To CAS# 19 RAS# Precharge 19 tRAS 43 tRC 61 Voltage 1,200 V JEDEC #14 Frequency 1333.3 MHz CAS# Latency 23,0 RAS# To CAS# 19 RAS# Precharge 19 tRAS 43 tRC 61 Voltage 1,200 V Slot #2 Type DDR4 Size 8192 MBytes Manufacturer Ramaxel Technology Max Bandwidth DDR4-2666 (1333 MHz) Part Number RMSA3260MH78HAF-2666 Serial Number 291360277 Week/year 37 / 17 Timing table JEDEC #1 Frequency 727.3 MHz CAS# Latency 10,0 RAS# To CAS# 10 RAS# Precharge 10 tRAS 24 tRC 34 Voltage 1,200 V JEDEC #2 Frequency 800.0 MHz CAS# Latency 11,0 RAS# To CAS# 11 RAS# Precharge 11 tRAS 26 tRC 37 Voltage 1,200 V JEDEC #3 Frequency 872.7 MHz CAS# Latency 12,0 RAS# To CAS# 12 RAS# Precharge 12 tRAS 28 tRC 40 Voltage 1,200 V JEDEC #4 Frequency 945.5 MHz CAS# Latency 13,0 RAS# To CAS# 13 RAS# Precharge 13 tRAS 31 tRC 44 Voltage 1,200 V JEDEC #5 Frequency 1018.2 MHz CAS# Latency 14,0 RAS# To CAS# 14 RAS# Precharge 14 tRAS 33 tRC 47 Voltage 1,200 V JEDEC #6 Frequency 1090.9 MHz CAS# Latency 15,0 RAS# To CAS# 15 RAS# Precharge 15 tRAS 35 tRC 50 Voltage 1,200 V JEDEC #7 Frequency 1163.6 MHz CAS# Latency 16,0 RAS# To CAS# 16 RAS# Precharge 16 tRAS 38 tRC 54 Voltage 1,200 V JEDEC #8 Frequency 1236.4 MHz CAS# Latency 17,0 RAS# To CAS# 17 RAS# Precharge 17 tRAS 40 tRC 57 Voltage 1,200 V JEDEC #9 Frequency 1309.1 MHz CAS# Latency 18,0 RAS# To CAS# 18 RAS# Precharge 18 tRAS 42 tRC 60 Voltage 1,200 V JEDEC #10 Frequency 1333.3 MHz CAS# Latency 19,0 RAS# To CAS# 19 RAS# Precharge 19 tRAS 43 tRC 61 Voltage 1,200 V JEDEC #11 Frequency 1333.3 MHz CAS# Latency 20,0 RAS# To CAS# 19 RAS# Precharge 19 tRAS 43 tRC 61 Voltage 1,200 V JEDEC #12 Frequency 1333.3 MHz CAS# Latency 21,0 RAS# To CAS# 19 RAS# Precharge 19 tRAS 43 tRC 61 Voltage 1,200 V JEDEC #13 Frequency 1333.3 MHz CAS# Latency 22,0 RAS# To CAS# 19 RAS# Precharge 19 tRAS 43 tRC 61 Voltage 1,200 V JEDEC #14 Frequency 1333.3 MHz CAS# Latency 23,0 RAS# To CAS# 19 RAS# Precharge 19 tRAS 43 tRC 61 Voltage 1,200 V Motherboard Manufacturer LENOVO Model LNVNB161216 (U3E1) Version SDK0J40709 WIN Chipset Vendor Intel Chipset Model Kaby Lake Chipset Revision 05 Southbridge Vendor Intel Southbridge Model HM175 Southbridge Revision 31 BIOS Brand LENOVO Version 4KCN45WW Date 11/01/2019 PCI Data Slot PCI-E x1 Slot Type PCI-E x1 Slot Usage In Use Data lanes x1 Slot Designation J6C1 Characteristics PME, Hot Plug Slot Number 0 Slot PCI-E x1 Slot Type PCI-E x1 Slot Usage Available Data lanes x1 Slot Designation J6D2 Characteristics PME, Hot Plug Slot Number 1 Slot PCI-E x1 Slot Type PCI-E x1 Slot Usage In Use Data lanes x1 Slot Designation J7C1 Characteristics PME, Hot Plug Slot Number 2 Slot PCI-E x1 Slot Type PCI-E x1 Slot Usage In Use Data lanes x1 Slot Designation J7D1 Characteristics PME, Hot Plug Slot Number 3 Slot PCI-E x4 Slot Type PCI-E x4 Slot Usage Available Data lanes x4 Slot Designation J8C1 Characteristics PME, Hot Plug Slot Number 4 Graphics Monitor 1 Name Generic PnP Monitor on Intel HD Graphics 630 Current Resolution 1920x1080 pixels Work Resolution 1920x1050 pixels State Enabled Multiple displays Extended, Secondary, Enabled Monitor Width 1920 Monitor Height 1080 Monitor BPP 32 bits per pixel Monitor Frequency 60 Hz Device \.\DISPLAY1\Monitor0 Monitor 2 Name S24D590 on Intel HD Graphics 630 Current Resolution 1920x1080 pixels Work Resolution 1920x1050 pixels State Enabled Multiple displays Extended, Primary, Enabled Monitor Width 1920 Monitor Height 1080 Monitor BPP 32 bits per pixel Monitor Frequency 59 Hz Device \.\DISPLAY2\Monitor0 Intel HD Graphics 630 Manufacturer Intel Model HD Graphics 630 Device ID 8086-591B Revision 5 Subvendor Lenovo (17AA) Current Performance Level Level 0 Current GPU Clock 0 MHz Voltage 0.631 V Driver version 31.0.101.2127 Count of performance levels : 1 Level 1 - “Perf Level 0” NVIDIA GeForce GTX 1050 Ti Manufacturer NVIDIA Model GeForce GTX 1050 Ti Device ID 10DE-1C8C Revision A2 Subvendor Lenovo (17AA) Current Performance Level Level 0 Current GPU Clock 139 MHz Current Memory Clock 405 MHz Current Shader Clock 405 MHz Voltage 0.631 V Technology 14 nm Bus Interface PCI Express x8 Temperature 52 °C Driver version 31.0.15.5222 BIOS Version 86.07.3a.00.27 Memory 4095 MB Count of performance levels : 1 Level 1 - “Perf Level 0” GPU Clock 139 MHz Shader Clock 405 MHz Storage Hard drives WDC WD10SPZX-24Z10T0 (SSD) Manufacturer Western Digital Heads 16 Cylinders 121.601 Tracks 31.008.255 Sectors 1.953.520.065 SATA type SATA-III 6.0Gb/s Device type Fixed ATA Standard ACS3 Serial Number WD-WX81A77EAL3X Firmware Version Number 01.01A01 LBA Size 48-bit LBA Power On Count 5938 times Power On Time 564,6 days Speed 5400 RPM Features S.M.A.R.T., APM, NCQ, TRIM Max. Transfer Mode SATA III 6.0Gb/s Used Transfer Mode SATA III 6.0Gb/s Interface SATA Capacity 931 GB Real size 1.000.204.886.016 bytes RAID Type None S.M.A.R.T Status Good Temperature 29 °C Temperature Range OK (less than 50 °C) S.M.A.R.T attributes 01 Attribute name Read Error Rate Real value 0 Current 200 Worst 200 Threshold 51 Raw Value 0000000000 Status Good 03 Attribute name Spin-Up Time Real value 1233 ms Current 195 Worst 189 Threshold 21 Raw Value 00000004D1 Status Good 04 Attribute name Start/Stop Count Real value 210.486 Current 1 Worst 1 Threshold 0 Raw Value 0000033636 Status Good 05 Attribute name Reallocated Sectors Count Real value 0 Current 200 Worst 200 Threshold 140 Raw Value 0000000000 Status Good 07 Attribute name Seek Error Rate Real value 0 Current 200 Worst 200 Threshold 0 Raw Value 0000000000 Status Good 09 Attribute name Power-On Hours (POH) Real value 564d 14h Current 82 Worst 82 Threshold 0 Raw Value 00000034EE Status Good 0A Attribute name Spin Retry Count Real value 0 Current 100 Worst 100 Threshold 0 Raw Value 0000000000 Status Good 0B Attribute name Recalibration Retries Real value 0 Current 100 Worst 100 Threshold 0 Raw Value 0000000000 Status Good 0C Attribute name Device Power Cycle Count Real value 5.938 Current 95 Worst 95 Threshold 0 Raw Value 0000001732 Status Good BB Attribute name Reported Uncorrectable Errors Real value 1 Current 100 Worst 99 Threshold 0 Raw Value 0000000001 Status Good C0 Attribute name Power-off Retract Count Real value 1.216 Current 199 Worst 199 Threshold 0 Raw Value 00000004C0 Status Good C1 Attribute name Load/Unload Cycle Count Real value 299.543 Current 101 Worst 101 Threshold 0 Raw Value 0000049217 Status Good C2 Attribute name Temperature Real value 29 °C Current 114 Worst 88 Threshold 0 Raw Value 0000370C1D Status Good C4 Attribute name Reallocation Event Count Real value 0 Current 200 Worst 200 Threshold 0 Raw Value 0000000000 Status Good C5 Attribute name Current Pending Sector Count Real value 0 Current 200 Worst 200 Threshold 0 Raw Value 0000000000 Status Good C6 Attribute name Uncorrectable Sector Count Real value 0 Current 100 Worst 253 Threshold 0 Raw Value 0000000000 Status Good C7 Attribute name UltraDMA CRC Error Count Real value 0 Current 200 Worst 200 Threshold 0 Raw Value 0000000000 Status Good C8 Attribute name Write Error Rate / Multi-Zone Error Rate Real value 0 Current 200 Worst 200 Threshold 0 Raw Value 0000000000 Status Good CE Attribute name Flying Height Real value 36 Current 100 Worst 0 Threshold 0 Raw Value 0000000024 Status Good F0 Attribute name Head Flying Hours Real value 346d 5h Current 89 Worst 89 Threshold 0 Raw Value 0000002075 Status Good Partition 0 Partition ID Disk #0, Partition #0 File System FAT32 Volume Serial Number DE73AEBD Size 256 MB Used Space 34,1 MB (13%) Free Space 221 MB (87%) Partition 1 Partition ID Disk #0, Partition #1 Disk Letter D: File System NTFS Volume Serial Number 7AD4E32F Size 905 GB Used Space 99 GB (10%) Free Space 806 GB (90%) Partition 2 Partition ID Disk #0, Partition #2 Disk Letter E: File System NTFS Volume Serial Number 6EBA454A Size 25 GB Used Space 19,9 GB (79%) Free Space 5,1 GB (21%) Partition 3 Partition ID Disk #0, Partition #3 File System NTFS Volume Serial Number 6078E54A Size 999 MB Used Space 545 MB (54%) Free Space 454 MB (46%) NVMe Corsair MP400 (SSD) Manufacturer Corsair Serial Number 210982750001295654A9 Firmware Version Number ECFM53.0 Interface RAID Capacity 1863 GB Real size 2.000.398.934.016 bytes RAID Type Software RAID S.M.A.R.T S.M.A.R.T not supported Partition 0 Partition ID Disk #1, Partition #0 Disk Letter C: File System NTFS Volume Serial Number D8C30CC3 Size 1862 GB Used Space 1718 GB (92%) Free Space 144 GB (8%) Optical Drives No optical disk drives detected Audio Sound Cards Sonido Intel para pantallas Realtek High Definition Audio NVIDIA Virtual Audio Device (Wave Extensible) (WDM) Boom Audio Playback Devices Altavoces (Boom Audio) Altavoces (Realtek High Definition Audio) Auriculares (MUSE M-1850 SBT Stereo) (default) Recording Device Varios micrófonos (Realtek High Definition Audio) Speaker Configuration Speaker type Stereo Peripherals Dispositivo de teclado HID Device Kind Keyboard Device Name Dispositivo de teclado HID Vendor Logitech Location Dispositivo de entrada USB Driver Date 6-21-2006 Version 10.0.19041.1 File C:\Windows\system32\DRIVERS\kbdhid.sys File C:\Windows\system32\DRIVERS\kbdclass.sys Teclado PS/2 estándar Device Kind Keyboard Device Name Teclado PS/2 estándar Vendor MSFT Location Intel 100 Series/C230 Series Chipset Family LPC Controller (HM175) - A152 Driver Date 6-21-2006 Version 10.0.19041.1 File C:\Windows\system32\DRIVERS\i8042prt.sys File C:\Windows\system32\DRIVERS\kbdclass.sys Dispositivo de teclado HID Device Kind Keyboard Device Name Dispositivo de teclado HID Vendor Logitech Location Dispositivo de entrada USB Driver Date 6-21-2006 Version 10.0.19041.1 File C:\Windows\system32\DRIVERS\kbdhid.sys File C:\Windows\system32\DRIVERS\kbdclass.sys Dispositivo de teclado HID Device Kind Keyboard Device Name Dispositivo de teclado HID Vendor Logitech Location Dispositivo de entrada USB Driver Date 6-21-2006 Version 10.0.19041.1 File C:\Windows\system32\DRIVERS\kbdhid.sys File C:\Windows\system32\DRIVERS\kbdclass.sys Dispositivo de teclado HID Device Kind Keyboard Device Name Dispositivo de teclado HID Vendor Logitech Location Logitech G HUB Virtual Keyboard Driver Date 6-21-2006 Version 10.0.19041.1 File C:\Windows\system32\DRIVERS\kbdhid.sys File C:\Windows\system32\DRIVERS\kbdclass.sys ELAN pointing device Device Kind Mouse Device Name ELAN pointing device Vendor ETD Location Intel 100 Series/C230 Series Chipset Family LPC Controller (HM175) - A152 Driver Date 8-18-2017 Version 11.4.109.3 File C:\Windows\system32\DRIVERS\ETD.sys File C:\Program Files\Elantech\ETD.inf File C:\Program Files\Elantech\ETDCtrl.exe File C:\Program Files\Elantech\ETDUninst.dll File C:\Program Files\Elantech\ETDUn_inst.exe File C:\Program Files\Elantech\ETDApi.dll File C:\Program Files\Elantech\ETDDeviceInformation.exe File C:\Program Files\Elantech\ETDApi32.dll File C:\Program Files\Elantech\ETD_DLL.dll File C:\Program Files\Elantech\ETDService.exe File C:\Program Files\Elantech\ETDCtrlHelper.exe File C:\Program Files\Elantech\ETDApix.dll File C:\Program Files\Elantech\ETDCmds.dll File C:\Program Files\Elantech\ETDMcpl.dll File C:\Program Files\Elantech\ETDFavorite.dll File C:\Program Files\Elantech\ETDTouch.exe File C:\Program Files\Elantech\ETDAniConf.exe File C:\Program Files\Elantech\ETDIntelligent.exe File C:\Program Files\Elantech\Lenovo.exe File C:\Program Files\Elantech\Lenovo_Win8.exe File C:\Program Files\Elantech\LenovoAPI.dll File C:\Program Files\Elantech\ETDSMBus.ini File C:\Program Files\Elantech\ETDSMBus.sys File C:\Program Files\Elantech\TouchpadEnableDisable.exe File C:\Program Files\Elantech\WdfCoInstaller01011.dll File C:\Program Files\Elantech\Button_ClickPad.avi File C:\Program Files\Elantech\Button_SmartPad.avi File C:\Program Files\Elantech\DnD01.avi File C:\Program Files\Elantech\DnD02.avi File C:\Program Files\Elantech\DnD03.avi File C:\Program Files\Elantech\Edge_Auto.avi File C:\Program Files\Elantech\Edge_Inertial.avi File C:\Program Files\Elantech\Edge_Scroll.avi File C:\Program Files\Elantech\Rotation_Twist.avi File C:\Program Files\Elantech\Rotation_Clockwise.avi File C:\Program Files\Elantech\Scroll_Auto.avi File C:\Program Files\Elantech\Scroll_Inertial.avi File C:\Program Files\Elantech\Scroll_No_FreeScroll.avi File C:\Program Files\Elantech\Swipe_3F_LR_PageupDown.avi File C:\Program Files\Elantech\Tapping_1F.avi File C:\Program Files\Elantech\Zooming.avi File C:\Program Files\Elantech\Press_3F.avi File C:\Program Files\Elantech\Continuous_EdgeScroll_H.avi File C:\Program Files\Elantech\Continuous_EdgeScroll_V.avi File C:\Program Files\Elantech\Continuous_Scroll_V_2F.avi File C:\Program Files\Elantech\Continuous_Scroll_H_2F.avi File C:\Program Files\Elantech\Scroll_Reverse_V.avi File C:\Program Files\Elantech\Scroll_Reverse_H.avi File C:\Program Files\Elantech\Edge_Reverse_V.avi File C:\Program Files\Elantech\Edge_Reverse_H.avi File C:\Program Files\Elantech\Win8EdgeSwipe_Left.avi File C:\Program Files\Elantech\Win8EdgeSwipe_Right.avi File C:\Program Files\Elantech\Win8EdgeSwipe_Top.avi File C:\Program Files\Elantech\Continuous_EdgeScroll_Reverse-H.avi File C:\Program Files\Elantech\Continuous_EdgeScroll_Reverse-V.avi File C:\Program Files\Elantech\Continuous_Scroll_Reverse-H_2F.avi File C:\Program Files\Elantech\Continuous_Scroll_Reverse-V_2F.avi File C:\Program Files\Elantech\Edge_Auto_Reverse.avi File C:\Program Files\Elantech\Edge_Inertial_Reverse.avi File C:\Program Files\Elantech\Scroll_Auto_Reverse.avi File C:\Program Files\Elantech\Scroll_Inertial_Reverse.avi File C:\Program Files\Elantech\PTP_Swipe_3F_Up_Down_Left_Right.avi File C:\Program Files\Elantech\PTP_Tapping_3F_Cortana.avi File C:\Program Files\Elantech\PTP_Tapping_4F_Notification_Center.avi File C:\Program Files\Elantech\Win10_4F_Desktop_Switch.avi File C:\Program Files\Elantech\ETDSetup.ini File C:\Windows\system32\DRIVERS\mouclass.sys File C:\Windows\system32\DRIVERS\i8042prt.sys File C:\Windows\system32\ETDCoInstaller15016.dll Mouse compatible con HID Device Kind Mouse Device Name Mouse compatible con HID Vendor Logitech Location Dispositivo de entrada USB Driver Date 6-21-2006 Version 10.0.19041.1 File C:\Windows\system32\DRIVERS\mouhid.sys File C:\Windows\system32\DRIVERS\mouclass.sys XSplit VCam Device Kind Camera/scanner Device Name XSplit VCam Vendor SplitmediaLabs Driver Date 4-19-2023 Version 1.0.2304.1902 File C:\Windows\system32\drivers\XSpltVid.sys Printers Fax Printer Port SHRFAX: Print Processor winprint Availability Always Priority 1 Duplex None Print Quality 200 * 200 dpi Monochrome Status Unknown Driver Driver Name Microsoft Shared Fax Driver (v4.00) Driver Path C:\Windows\system32\spool\DRIVERS\x64\3\FXSDRV.DLL Microsoft Print to PDF (Default Printer) Printer Port PORTPROMPT: Print Processor winprint Availability Always Priority 1 Duplex None Print Quality 600 * 600 dpi Color Status Unknown

Driver Driver Name Microsoft Print To PDF (v6.03) Driver Path C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_8 418b8585d9586f6\Amd64\mxdwdrv.dll Microsoft XPS Document Writer Printer Port PORTPROMPT: Print Processor winprint Availability Always Priority 1 Duplex None Print Quality 600 * 600 dpi Color Status Unknown Driver Driver Name Microsoft XPS Document Writer v4 (v6.03) Driver Path C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_8 418b8585d9586f6\Amd64\mxdwdrv.dll OneNote (Desktop) Printer Port nul: Print Processor winprint Availability Always Priority 1 Duplex None Print Quality 600 * 600 dpi Color Status Unknown Driver Driver Name Send to Microsoft OneNote 16 Driver (v6.03) Driver Path C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_8 418b8585d9586f6\Amd64\mxdwdrv.dll OneNote for Windows 10 Printer Port Microsoft.Office.OneNote_16001.14326.21886.0_x64__8wekyb3d8bbwe_ microsoft.onenoteim_S-1-5-21-2430942409-2953790725-1835786908-10 01 Print Proces sor winprint Availab ility Always Priority 1 Duplex None Print Quality 300 * 300 dpi Color Status Unknown Driver Driver Name Microsoft Software Printer Driver (v6.03) Driver Path C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_8 418b8585d9586f6\Amd64\mxdwdrv.dll Network You are connected to the internet Connected through Realtek 8821AE Wireless LAN 802.11ac PCI-E NIC IP Address 192.168.31.229 Subnet mask 255.255.255.0 Gateway server 192.168.31.1 Preferred DNS server 192.168.31.1 DHCP Enabled DHCP server 192.168.31.1 External IP Address 5.154.89.8 Adapter Type IEEE 802.11 wireless NetBIOS over TCP/IP Enabled via DHCP NETBIOS Node Type Hybrid node Link Speed 0 Bps Computer Name NetBIOS Name DESKTOP-H77O3Q3 DNS Name DESKTOP-H77O3Q3 Membership Part of workgroup Workgroup WORKGROUP Remote Desktop Disabled Console State Active Domain DESKTOP-H77O3Q3 WinInet Info Conexión LAN Local system uses a local area network to connect to the Internet Local system has RAS to connect to the Internet Wi-Fi Info Using native Wi-Fi API version 2 Available access points count 19 Wi-Fi () SSID Frequency 5320000 kHz Channel Number 64 Name No name Signal Strength/Quality 100 Security Enabled State The interface is connected to a network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi () SSID Frequency 2437000 kHz Channel Number 6 Name No name Signal Strength/Quality 100 Security Disabled State The interface is connected to a network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network No Cipher algorithm is enabled/supported Default Auth used to join this network for the first time IEEE 802.11 Open System authentication algorithm Wi-Fi (DIGIFIBRA-PLUS-FExG) SSID DIGIFIBRA-PLUS-FExG Frequency 5260000 kHz Channel Number 52 Name DIGIFIBRA-PLUS-FExG Signal Strength/Quality 45 Security Enabled State The interface is connected to a network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (DIGIFIBRA-PLUS-ufbR) SSID DIGIFIBRA-PLUS-ufbR Frequency 5260000 kHz Channel Number 52 Name DIGIFIBRA-PLUS-ufbR Signal Strength/Quality 45 Security Enabled State The interface is connected to a network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (DIGIFIBRA-YZeY) SSID DIGIFIBRA-YZeY Frequency 2412000 kHz Channel Number 1 Name DIGIFIBRA-YZeY Signal Strength/Quality 15 Security Enabled State The interface is connected to a network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (Finetwork_5G-s6sE) SSID Finetwork_5G-s6sE Frequency 5180000 kHz Channel Number 36 Name Finetwork_5G-s6sE Signal Strength/Quality 100 Security Enabled State The interface is connected to a network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (Finetwork_s6sE) SSID Finetwork_s6sE Frequency 2417000 kHz Channel Number 2 Name Finetwork_s6sE Signal Strength/Quality 100 Security Enabled State The interface is connected to a network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (JosetxuGV) SSID JosetxuGV Frequency 2437000 kHz Channel Number 6 Name JosetxuGV Signal Strength/Quality 100 Security Enabled State The interface is connected to a network Dot11 Type Infrastructure BSS network Network Connectible Network Flags Currently Connected to this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (MIWIFI_2G_Q6qd) SSID MIWIFI_2G_Q6qd Frequency 2462000 kHz Channel Number 11 Name MIWIFI_2G_Q6qd Signal Strength/Quality 25 Security Enabled State The interface is connected to a network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (MIWIFI_5G_Q6qd) SSID MIWIFI_5G_Q6qd Frequency 5180000 kHz Channel Number 36 Name MIWIFI_5G_Q6qd Signal Strength/Quality 14 Security Enabled State The interface is connected to a network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (MIWIFI_tCKN) SSID MIWIFI_tCKN Frequency 2462000 kHz Channel Number 11 Name MIWIFI_tCKN Signal Strength/Quality 100 Security Enabled State The interface is connected to a network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (MiFibra-0963) SSID MiFibra-0963 Frequency 5500000 kHz Channel Number 100 Name MiFibra-0963 Signal Strength/Quality 55 Security Enabled State The interface is connected to a network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (MiFibra-0963-5G) SSID MiFibra-0963-5G Frequency 5500000 kHz Channel Number 100 Name MiFibra-0963-5G Signal Strength/Quality 45 Security Enabled State The interface is connected to a network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (MiFibra-7346-24G) SSID MiFibra-7346-24G Frequency 2412000 kHz Channel Number 1 Name MiFibra-7346-24G Signal Strength/Quality 75 Security Enabled State The interface is connected to a network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (MiFibra-7346-5G) SSID MiFibra-7346-5G Frequency 5320000 kHz Channel Number 64 Name MiFibra-7346-5G Signal Strength/Quality 15 Security Enabled State The interface is connected to a network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (MiFibra-C5DA) SSID MiFibra-C5DA Frequency 2412000 kHz Channel Number 1 Name MiFibra-C5DA Signal Strength/Quality 35 Security Enabled State The interface is connected to a network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (WINET_19432_5Ghz) SSID WINET_19432_5Ghz Frequency 5200000 kHz Channel Number 40 Name WINET_19432_5Ghz Signal Strength/Quality 45 Security Enabled State The interface is connected to a network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (vodafone9668) SSID vodafone9668 Frequency 2412000 kHz Channel Number 1 Name vodafone9668 Signal Strength/Quality 65 Security Enabled State The interface is connected to a network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK Wi-Fi (vodafone9668-5G) SSID vodafone9668-5G Frequency 5180000 kHz Channel Number 36 Name vodafone9668-5G Signal Strength/Quality 25 Security Enabled State The interface is connected to a network Dot11 Type Infrastructure BSS network Network Connectible Network Flags There is a profile for this network Cipher Algorithm to be used when joining this network AES-CCMP algorithm Default Auth used to join this network for the first time 802.11i RSNA algorithm that uses PSK WinHTTPInfo WinHTTPSessionProxyType No proxy Session Proxy Session Proxy Bypass Connect Retries 5 Connect Timeout (ms) 60.000 HTTP Version HTTP 1.1 Max Connects Per 1.0 Servers INFINITE Max Connects Per Servers INFINITE Max HTTP automatic redirects 10 Max HTTP status continue 10 Send Timeout (ms) 30.000 IEProxy Auto Detect Yes IEProxy Auto Config IEProxy IEProxy Bypass Default Proxy Config Access Type No proxy Default Config Proxy Default Config Proxy Bypass Sharing and Discovery File and printer sharing service Enabled Simple File Sharing Enabled Administrative Shares Enabled Acceso a redes: modelo de seguridad y uso compartido para cuentas locales Clásico: usuarios locales se autentican con credenciales propias Private profile Network Discovery Enabled File and Printer Sharing Enabled Public profile Network Discovery Disabled File and Printer Sharing Enabled Adapters List Enabled Bluetooth Device (Personal Area Network) Connection Name Conexión de red Bluetooth DHCP enabled Yes MAC Address 60-14-B3-B8-92-8C Hyper-V Virtual Ethernet Adapter Connection Name vEthernet (Ethernet) NetBIOS over TCPIP Yes DHCP enabled No MAC Address 00-15-5D-AF-47-B6 IP Address 172.28.160.1 Subnet mask 255.255.240.0 Hyper-V Virtual Ethernet Adapter #2 Connection Name vEthernet (VMware Network ) NetBIOS over TCPIP Yes DHCP enabled No MAC Address 00-15-5D-5C-AA-5B IP Address 172.19.16.1 Subnet mask 255.255.240.0 Hyper-V Virtual Ethernet Adapter #3 Connection Name vEthernet (VMware Network ) 2 NetBIOS over TCPIP Yes DHCP enabled No MAC Address 00-15-5D-31-2B-47 IP Address 172.29.128.1 Subnet mask 255.255.240.0 Hyper-V Virtual Ethernet Adapter #4 Connection Name vEthernet (Wi-Fi) NetBIOS over TCPIP Yes DHCP enabled No MAC Address 00-15-5D-71-AA-BA IP Address 172.20.176.1 Subnet mask 255.255.240.0 Realtek 8821AE Wireless LAN 802.11ac PCI-E NIC Connection Name Wi-Fi NetBIOS over TCPIP Yes DHCP enabled Yes MAC Address 60-14-B3-B8-92-8B IP Address 192.168.31.229 Subnet mask 255.255.255.0 Gateway server 192.168.31.1 DHCP 192.168.31.1 DNS Server 192.168.31.1 Realtek PCIe GBE Family Controller Connection Name Ethernet DHCP enabled Yes MAC Address 54-E1-AD-97-18-17 TAP-Windows Adapter V9 Connection Name McAfee VPN DHCP enabled Yes MAC Address 00-FF-10-1B-BB-C7 VMware Virtual Ethernet Adapter for VMnet1 Connection Name VMware Network Adapter VMnet1 NetBIOS over TCPIP Yes DHCP enabled No MAC Address 00-50-56-C0-00-01 IP Address 192.168.59.1 Subnet mask 255.255.255.0 VMware Virtual Ethernet Adapter for VMnet8 Connection Name VMware Network Adapter VMnet8 NetBIOS over TCPIP Yes DHCP enabled No MAC Address 00-50-56-C0-00-08 IP Address 192.168.133.1 Subnet mask 255.255.255.0 Network Shares No network shares Current TCP Connections C:\Program Files (x86)\NVIDIA Corporation\NvNode\NVIDIA Web Helper.exe (7504) Local 127.0.0.1:62575 LISTEN Local 127.0.0.1:62575 ESTABLISHED Remote 127.0.0.1:62635 (Querying… ) C:\Program Files (x86)\Steam\steamapps\common\GlassWire\app\GlassWire.exe (15712) Local 127.0.0.1:62676 ESTABLISHED Remote 127.0.0.1:26887 (Querying… ) C:\Program Files (x86)\Steam\steamapps\common\GlassWire\app\GWIdlMon.exe (11704) Local 127.0.0.1:58701 ESTABLISHED Remote 127.0.0.1:26887 (Querying… ) C:\Program Files\Google\Chrome\Application\chrome.exe (7012) Local 192.168.31.229:6211 ESTABLISHED Remote 64.233.167.188:5228 (Querying… ) Local 192.168.31.229:6387 ESTABLISHED Remote 172.67.68.91:443 (Querying… ) (HTTPS) C:\Program Files\Google\Drive File Stream\90.0.3.0\GoogleDriveFS.exe (16584) Local 192.168.31.229:6534 CLOSE-WAIT Remote 142.250.184.170:443 (Querying… ) (HTTPS) Local 192.168.31.229:6481 CLOSE-WAIT Remote 142.250.201.74:443 (Querying… ) (HTTPS) Local 192.168.31.229:2846 ESTABLISHED Remote 142.250.178.170:443 (Querying… ) (HTTPS) C:\Program Files\LGHUB\lghub_agent.exe (4460) Local 127.0.0.1:62664 ESTABLISHED Remote 127.0.0.1:9100 (Querying… ) Local 127.0.0.1:9010 LISTEN Local 127.0.0.1:9010 ESTABLISHED Remote 127.0.0.1:62663 (Querying… ) Local 127.0.0.1:9010 ESTABLISHED Remote 127.0.0.1:63389 (Querying… ) Local 127.0.0.1:9080 LISTEN Local 127.0.0.1:45654 LISTEN Local 127.0.0.1:7273 SYN-SENT Remote 127.0.0.1:6465 (Querying… ) Local 127.0.0.1:7275 SYN-SENT Remote 127.0.0.1:28194 (Querying… ) C:\Program Files\LGHUB\system_tray\lghub_system_tray.exe (16352) Local 127.0.0.1:62663 ESTABLISHED Remote 127.0.0.1:9010 (Querying… ) C:\Program Files\Microsoft OneDrive\24.081.0421.0001\FileCoAuth.exe (20204) Local 192.168.31.229:7251 ESTABLISHED Remote 20.42.73.25:443 (Querying… ) (HTTPS) C:\Program Files\Microsoft OneDrive\OneDrive.exe (5080) Local 192.168.31.229:7247 ESTABLISHED Remote 20.190.177.25:443 (Querying… ) (HTTPS) Local 192.168.31.229:2874 ESTABLISHED Remote 20.54.37.64:443 (Querying… ) (HTTPS) Local 192.168.31.229:7252 ESTABLISHED Remote 20.189.173.1:443 (Querying… ) (HTTPS) C:\Program Files\NVIDIA Corporation\NVIDIA GeForce Experience\NVIDIA Share.exe (14324) Local 127.0.0.1:62635 ESTABLISHED Remote 127.0.0.1:62575 (Querying… ) C:\Program Files\WindowsApps\SpotifyAB.SpotifyMusic_1.235.663.0_x64__zpdnekdrzrea0\Spo tify.exe (4804) Local 192.168.31.229:2822 ESTABLISHED Remote 35.186.224.33:443 (Querying… ) (HTTPS) Local 0.0.0.0:2279 LISTEN Local 0.0.0.0:57621 LISTEN Local 192.168.31.229:2903 ESTABLISHED Remote 104.199.65.124:4070 (Querying… ) C:\Program Files\WindowsApps\SpotifyAB.SpotifyMusic_1.235.663.0_x64__zpdnekdrzrea0\Spo tify.exe (6940) Local 192.168.31.229:7266 ESTABLISHED Remote 23.1.106.35:443 (Querying… ) (HTTPS) Local 192.168.31.229:2328 ESTABLISHED Remote 35.186.224.33:443 (Querying… ) (HTTPS) Local 192.168.31.229:7269 ESTABLISHED Remote 35.186.224.18:443 (Querying… ) (HTTPS) C:\Program Files\XSplit\VCam\x64\XSplitVCam.exe (8512) Local 192.168.31.229:2318 ESTABLISHED Remote 18.184.197.212:443 (Querying… ) (HTTPS) C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe (2508) Local 127.0.0.1:63389 ESTABLISHED Remote 127.0.0.1:9010 (Querying… ) C:\Users\v5060\AppData\Local\Programs\Opera GX\opera.exe (3380) Local 192.168.31.229:63436 ESTABLISHED Remote 64.233.167.188:5228 (Querying… ) Local 192.168.31.229:63446 ESTABLISHED Remote 35.162.102.148:443 (Querying… ) (HTTPS) C:\Windows\System32\smartscreen.exe (8656) Local 192.168.31.229:7258 ESTABLISHED Remote 20.82.9.214:443 (Querying… ) (HTTPS) C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.e xe (14864) Local 192.168.31.229:7270 ESTABLISHED Remote 152.199.19.161:443 (Querying… ) (HTTPS) Local 192.168.31.229:7271 ESTABLISHED Remote 13.107.237.254:443 (Querying… ) (HTTPS) Local 192.168.31.229:7272 ESTABLISHED Remote 52.108.8.254:443 (Querying… ) (HTTPS) Local 192.168.31.229:7274 ESTABLISHED Remote 204.79.197.222:443 (Querying… ) (HTTPS) GWCtlSrv.exe (5836) Local 0.0.0.0:7010 LISTEN Local 127.0.0.1:26887 LISTEN Local 127.0.0.1:26887 ESTABLISHED Remote 127.0.0.1:58701 (Querying… ) Local 127.0.0.1:26887 ESTABLISHED Remote 127.0.0.1:62676 (Querying… ) lghub_updater.exe (5812) Local 127.0.0.1:9100 LISTEN Local 127.0.0.1:9100 ESTABLISHED Remote 127.0.0.1:62664 (Querying… ) Local 127.0.0.1:9180 LISTEN lsass.exe (1000) Local 0.0.0.0:49664 LISTEN MBAMService.exe (5844) Local 127.0.0.1:43227 LISTEN mysqld.exe (7228) Local 127.0.0.1:58693 ESTABLISHED Remote 127.0.0.1:58692 (Querying… ) Local 127.0.0.1:58694 ESTABLISHED Remote 127.0.0.1:58695 (Querying… ) Local 127.0.0.1:58695 ESTABLISHED Remote 127.0.0.1:58694 (Querying… ) Local 0.0.0.0:3306 LISTEN Local 127.0.0.1:58692 ESTABLISHED Remote 127.0.0.1:58693 (Querying… ) Local 0.0.0.0:33060 LISTEN NTKDaemon.exe (4812) Local 192.168.31.229:63169 ESTABLISHED Remote 35.246.235.84:443 (Querying… ) (HTTPS) Local 127.0.0.1:5146 LISTEN Local 127.0.0.1:7865 LISTEN Local 127.0.0.1:5563 LISTEN nvcontainer.exe (5852) Local 127.0.0.1:65001 LISTEN Local 127.0.0.1:65001 ESTABLISHED Remote 127.0.0.1:62563 (Querying… ) Local 127.0.0.1:62563 ESTABLISHED Remote 127.0.0.1:65001 (Querying… ) omtsreco.exe (5516) Local 192.168.59.1:2030 LISTEN Local 192.168.133.1:2030 LISTEN oracle.exe (5420) Local 127.0.0.1:61452 LISTEN Local 127.0.0.1:61451 LISTEN Local 127.0.0.1:61450 LISTEN Local 0.0.0.0:61448 LISTEN services.exe (968) Local 0.0.0.0:58676 LISTEN spoolsv.exe (5224) Local 0.0.0.0:58672 LISTEN svchost.exe (1040) Local 0.0.0.0:135 (DCE) LISTEN svchost.exe (1476) Local 0.0.0.0:49666 LISTEN svchost.exe (2236) Local 0.0.0.0:49667 LISTEN svchost.exe (5048) Local 0.0.0.0:5040 LISTEN svchost.exe (6028) Local 192.168.31.229:58682 ESTABLISHED Remote 20.54.37.64:443 (Querying… ) (HTTPS) System Process Local 0.0.0.0:5357 LISTEN Local 192.168.31.229:139 (NetBIOS session service) LISTEN Local 172.29.128.1:139 (NetBIOS session service) LISTEN Local 172.28.160.1:139 (NetBIOS session service) LISTEN Local 172.20.176.1:139 (NetBIOS session service) LISTEN Local 0.0.0.0:445 (Windows shares) LISTEN Local 172.19.16.1:139 (NetBIOS session service) LISTEN Local 192.168.133.1:139 (NetBIOS session service) LISTEN Local 192.168.59.1:139 (NetBIOS session service) LISTEN System Process Local 192.168.31.229:7243 TIME-WAIT Remote 192.168.31.1:53 (Querying… ) Local 192.168.31.229:7268 TIME-WAIT Remote 192.168.31.1:53 (Querying… ) Local 192.168.31.229:7253 TIME-WAIT Remote 192.168.31.1:53 (Querying… ) Local 192.168.31.229:7254 TIME-WAIT Remote 192.168.31.1:53 (Querying… ) Local 192.168.31.229:7260 TIME-WAIT Remote 192.168.31.1:53 (Querying… ) Local 192.168.31.229:7267 TIME-WAIT Remote 192.168.31.1:53 (Querying… ) Local 192.168.31.229:7264 TIME-WAIT Remote 192.168.31.1:53 (Querying… ) Local 192.168.31.229:7262 TIME-WAIT Remote 192.168.31.1:53 (Querying… ) Local 192.168.31.229:7263 TIME-WAIT Remote 192.168.31.1:53 (Querying… ) Local 192.168.31.229:7265 TIME-WAIT Remote 192.168.31.1:53 (Querying… ) Local 192.168.31.229:7242 TIME-WAIT Remote 192.168.31.1:53 (Querying… ) Local 192.168.31.229:7233 TIME-WAIT Remote 192.168.31.1:53 (Querying… ) Local 192.168.31.229:7232 TIME-WAIT Remote 192.168.31.1:53 (Querying… ) Local 192.168.31.229:7102 TIME-WAIT Remote 35.186.224.25:443 (Querying… ) (HTTPS) Local 192.168.31.229:6888 TIME-WAIT Remote 35.186.224.18:443 (Querying… ) (HTTPS) TCPSVCS.EXE (5944) Local 0.0.0.0:13 LISTEN Local 0.0.0.0:17 LISTEN Local 0.0.0.0:19 LISTEN Local 0.0.0.0:9 LISTEN Local 0.0.0.0:7 LISTEN tnslsnr.exe (3032) Local 0.0.0.0:1521 LISTEN Local 127.0.0.1:5500 LISTEN vmware-authd.exe (5952) Local 0.0.0.0:903 LISTEN Local 0.0.0.0:913 LISTEN wininit.exe (896) Local 0.0.0.0:49665 LISTEN

Hola.

Explicando el punto que me indica, refiere a una instalación limpia, formateo del disco duro de sistema e instalación del sistema operativo.

Utilizo una clave de Windows 10 Pro original para la activación de la licencia del sistema operativo, no utilizo activadores, software pirarteado, etcétera; sólo instalo en el sistema software libre y bajo licencia.

Tras reinstalar el sistema operativo, he instalado el software:

  • Drivers descargados de la página del fabricante para el modelo de PC.
  • Software de terceros (no sé si hace falta listar todos los programas de terceros que he instalado).
  • Como software de seguridad, utilizo Windows Defender, Malwarebytes AntiMalware Premium, Glasswire Network Security, y ahora mismo tengo instalado Hitman Pro, una versión de evaluación.

En el modo seguro ayer me ha dejado utilizar Zemana AntiMalware, el cual detecta Adwares y troyanos, y los elimina, pero no soluciona el problema, ya que al reiniciar normal el sistema operativo el software Zemana AntiMalware no funciona, surge un bug en el inicio y se cierra. Se eliminan el malware detectado pero vuelve a infectarse el sistema.

He tratado de utilizar Kapersky Virus Removal Tool, pero Hitman Pro lo cierra durante el análisis, debido a la ejecución de Ransomware y bloquearlo.

He tratado de instalar WhatsUp Gold Free Edition, pero Hitman Pro lo bloquea al ejecutarse malware y bloquearlo.

Estimo sea a causa de malware en mí sistema estas dos detecciones mencionadas.

He vuelto a utilizar Microsoft Safety Scanner (MSERT), el cual detecta archivos infectados, pero por alguna razón no los elimina al finalizar el análisis, en el que informa de ninguna detección al finalizar, cuando ha detectado durante el análisis varios archivos infectados.

Adjunté anteriormente, en anteriores mensajes, una lista de los ejecutables con los programas instalados en el sistema, podría dar una lista más concisa de todos los programas instalados en el sistema si es necesario y solicita.

También compartí un informe con las especificaciones del sistema, en varios mensajes, obtenido del programa Speccy. Si es necesario y me indica, podría ser más concreto con las especificaciones que necesita saber.

He reinstalado el sistema operativo, la carpeta ‘Documentos’ de los archivos de usuarios de sistema, en el menú de ‘guardar archivo’, me aparece en el idioma árabe, cuando tengo Español como idioma seleccionado para el sistema. Esto me ocurría antes de formatear el disco duro de sistema y reinstalar el sistema operativo.

Me han parecido extrañas dentro de la carpeta de archivos de usuarios en la unidad del sistema, las carpetas ‘Nethood’ y ‘Printhood’; he buscado por Internet, y he leído que son carpetas propias de sistemas operativos Windows antiguos, y utilizo Windows 10. No sé si es normal o han aparecido a causa de malware en el sistema.

Espero sus respuestas. Saludos cordiales.

Ahora entiendo los post que pusiste

He tenido que saltarlos porque la “lista” de la que hablas y el reporte de Speccy no llevan ningún formato y todas las líneas están juntas y eso complica mucho la lectura de ambos

Formateas la unidad del sistema pero ignoro si dejas intacta alguna partición de datos

Para Windows 10 es mas adecuado usar la función Restablecer este equipo

Puedes elegir entre conservar tus datos o borrar todo y reinstalar el sistema

Algunas herramientas no logras ejecutarlas porque tienes muy cargado el sistema con protección residente que impide su ejecución e incluso las protecciones residentes que tienes pueden estar chocando unas con otras. Lo único que estas logrando es generar posibles brechas de seguridad que estar completamente protegido

En este momento tanto Zemana AntiMalware como Hitman Pro están estorbando y quiero que los quites de tu equipo usando Revo Uninstaller

  • Sigues las instrucciones del manual para desinstalar ambos programas en el modo Avanzado
  • Si se abre el navegador durante la desinstalación de cualquiera de ellos solo cierralo
  • Si te pide reiniciar el equipo durante el procedimiento de desinstalación No lo hagas y continuas con los siguientes pasos es decir la detección y eliminación de archivos y claves de registro residuales
  • No vayas a reiniciar el equipo hasta que hayas desinstalado ambos programas

Después vas a instalar CCleaner puedes descargarlo desde el siguiente manual

Te dejo las instrucciones para un uso simple

Repite los pasos una y otra vez hasta que las funciones Limpiador y Registro no encuentren problemas que resolver

Me avisas cuando hayas desinstalado ambos programas y hayas terminado el mantenimiento con CCleaner para ver como vamos a seguir

Saludos

2 Me gusta

Hola de nuevo.

Creé con la herramienta de creación de medios un USB de instalación para Windows 10. Reinicié el PC desde el USB, formateé la unidad de sistema y reinstalé sólo el sistema operativo Windows 10, ya luego actualicé Windows e instalé los drivers y, software de terceros y otros programas en Microsoft Store.

El disco de sistema es una única partición, en la que se encuentran sistema y archivos de programas.

Hay una segunda unidad, tiene la partición de sistema EFI con 260 MB de capacidad, partición de recuperación con 1000 MB de capacidad, partición de datos con 905 GB de capacidad, partición de datos con 25 GB de capacidad en la que guardo los archivos de instalación del software instalado en el equipo.

Al volver a ver la carpeta ‘Documentos’ desde ‘guardar archivo’ en el idioma árabe tras formatear y reinstalar el sistema operativo, estimo el sistema operativo se encuentra actualmente infectado con el mismo malware que tenía antes de formatear la unidad de sistema.

He instalado el programa ‘Revo Uninstaller’ y desinstalado los programas que me pidió.

He ejecutado Ccleaner con la limpieza personalizada y la limpieza de registro hasta no encontrar resultados.

Para analizar la red tengo instalados Glasswire Network Security, Nmap, Wireshark, WhatsUp Gold Free Edition.

Tengo instalado ProtonVPN Free.

Espero sus respuestas. Saludos cordiales.

Así que tienes varias unidades de disco y particiones de datos donde conservas los programas que instalas y por ahora no tenemos ninguna certeza de que alguno de ellos no sea el origen de tus males

Como estas seguro de que tu equipo esta infectado, deberíamos empezar con un procedimiento “básico” para detectar y eliminar malware en tu sistema. Dicho procedimiento se basa en nuestra guía de detección/eliminación con algunos ajustes

Tomando estas consideraciones en cuenta Por favor, realiza lo siguiente: Si no puedes realizar algun paso lo omites y continuas con el siguiente ¡de acuerdo?

:one: Conecta cualquier dispositivo extraíble como pendrives USB, tarjetas SD o discos duros externos que hayan tenido acceso al equipo. Debes mantenerlos conectados durante todo el procedimiento

:two: Deshabilita tu Antivirus y toda protección residente que tengas para que no interfieran en la ejecución de las herramientas. Mantenlos deshabilitados durante todo el procedimiento

:three: Descargue y ejecute la utilidad Rkill by Grinler (renombrada bajo el nombre de “iExplore.exe”) para evitar el bloqueo de los malwares. Una vez que esta fue ejecutada, es importante no reiniciar el sistema hasta que se le solicite.

rkill

:four: Descargar Malwarebytes 4.x en el Escritorio. Lo instalas y ejecutas Realizas un Análisis Personalizado a tu equipo siguiendo las siguientes instrucciones

En tu próxima respuesta debes traernos el reporte de Malwarebytes Sigue las siguientes instrucciones para acceder a el y pegarlo en el foro

:five: Realiza un Análisis Personalizado a tu equipo con Eset Online Scanner siguiendo las instrucciones del siguiente manual

Es muy importante que selecciones todo lo que Eset detecte y lo mandes todo a cuarentena Asegúrate de guardar su reporte Este deberas entregarlo junto con tus respuestas.

Cuando respondas:

  • Debes traer los reportes de las herramientas que logres ejecutar
  • Debes comentarnos cualquier problema que haya surgido antes, durante y después del procedimiento
  • Necesitamos saber si el o los problemas planteados en tu consulta se siguen presentando y con que frecuencia
  • Debes decirnos como esta funcionando el equipo y cualquier otro comportamiento extraño que observes

Saludos y esperamos tus respuestas, además de los reportes de las herramientas

5 Me gusta

Hola @razlasasz Debido a que no me has respondido Imagino que has vuelto a formatear el equipo y me pregunto si finalmente has logrado resolver tu problema.

Saludos y Esperamos tus comentarios al respecto

2 Me gusta

Hola de nuevo. Le adjunto los reportes de las herramientas.

Rkill:

Rkill 2.9.1 by Lawrence Abrams (Grinler)

Copyright 2008-2024 BleepingComputer.com More Information about Rkill can be found at this link: RKill - What it does and What it Doesn't - A brief introduction to the program - Anti-Virus, Anti-Malware, and Privacy Software

Program started at: 05/04/2024 06:49:50 PM in x64 mode. Windows Version: Windows 10 Pro

Checking for Windows services to stop:

  • No malware services found to stop.

Checking for processes to terminate:

  • No malware processes found to kill.

Checking Registry for malware related settings:

  • No issues found in the Registry.

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks:

  • Reparse Point/Junctions Found (Most likely legitimate)!

    • C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\AppData\Local\Archivos temporales de Internet => C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\AppData\Local\Microsoft\Windows\INetCache [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\AppData\Local\Datos de programa => C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\AppData\Local [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\AppData\Local\Historial => C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\AppData\Local\Microsoft\Windows\History [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\AppData\Local\Microsoft\Windows\Temporary Internet Files => C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\AppData\Local\Microsoft\Windows\INetCache [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\AppData\Roaming\Microsoft\Windows\Start Menu\Programas => C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\AppData\Roaming\Microsoft\Windows\Start Menu\Programs [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\Configuración local => C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\AppData\Local [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\Cookies => C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\AppData\Local\Microsoft\Windows\INetCookies [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\Datos de programa => C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\AppData\Roaming [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\Documents\Mi música => C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\Music [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\Documents\Mis imágenes => C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\Pictures [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\Documents\Mis vídeos => C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\Videos [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\Entorno de red => C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\AppData\Roaming\Microsoft\Windows\Network Shortcuts [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\Impresoras => C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\AppData\Roaming\Microsoft\Windows\Printer Shortcuts [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\Menú Inicio => C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\AppData\Roaming\Microsoft\Windows\Start Menu [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\Mis documentos => C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\Documents [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\Plantillas => C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\AppData\Roaming\Microsoft\Windows\Templates [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\Reciente => C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\AppData\Roaming\Microsoft\Windows\Recent [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\SendTo => C:\Windows\ServiceProfiles\OracleOraDB21Home1MTSRecoveryService\AppData\Roaming\Microsoft\Windows\SendTo [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\AppData\Local\Archivos temporales de Internet => C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\AppData\Local\Microsoft\Windows\INetCache [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\AppData\Local\Datos de programa => C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\AppData\Local [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\AppData\Local\Historial => C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\AppData\Local\Microsoft\Windows\History [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\AppData\Local\Microsoft\Windows\Temporary Internet Files => C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\AppData\Local\Microsoft\Windows\INetCache [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\AppData\Roaming\Microsoft\Windows\Start Menu\Programas => C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\AppData\Roaming\Microsoft\Windows\Start Menu\Programs [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\Configuración local => C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\AppData\Local [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\Cookies => C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\AppData\Local\Microsoft\Windows\INetCookies [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\Datos de programa => C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\AppData\Roaming [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\Documents\Mi música => C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\Music [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\Documents\Mis imágenes => C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\Pictures [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\Documents\Mis vídeos => C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\Videos [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\Entorno de red => C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\AppData\Roaming\Microsoft\Windows\Network Shortcuts [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\Impresoras => C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\AppData\Roaming\Microsoft\Windows\Printer Shortcuts [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\Menú Inicio => C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\AppData\Roaming\Microsoft\Windows\Start Menu [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\Mis documentos => C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\Documents [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\Plantillas => C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\AppData\Roaming\Microsoft\Windows\Templates [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\Reciente => C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\AppData\Roaming\Microsoft\Windows\Recent [Dir]
    • C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\SendTo => C:\Windows\ServiceProfiles\OracleOraDB21Home1TNSListener\AppData\Roaming\Microsoft\Windows\SendTo [Dir]
    • C:\Windows\ServiceProfiles\OracleServiceXE\AppData\Local\Archivos temporales de Internet => C:\Windows\ServiceProfiles\OracleServiceXE\AppData\Local\Microsoft\Windows\INetCache [Dir]
    • C:\Windows\ServiceProfiles\OracleServiceXE\AppData\Local\Datos de programa => C:\Windows\ServiceProfiles\OracleServiceXE\AppData\Local [Dir]
    • C:\Windows\ServiceProfiles\OracleServiceXE\AppData\Local\Historial => C:\Windows\ServiceProfiles\OracleServiceXE\AppData\Local\Microsoft\Windows\History [Dir]
    • C:\Windows\ServiceProfiles\OracleServiceXE\AppData\Local\Microsoft\Windows\Temporary Internet Files => C:\Windows\ServiceProfiles\OracleServiceXE\AppData\Local\Microsoft\Windows\INetCache [Dir]
    • C:\Windows\ServiceProfiles\OracleServiceXE\AppData\Roaming\Microsoft\Windows\Start Menu\Programas => C:\Windows\ServiceProfiles\OracleServiceXE\AppData\Roaming\Microsoft\Windows\Start Menu\Programs [Dir]
    • C:\Windows\ServiceProfiles\OracleServiceXE\Configuración local => C:\Windows\ServiceProfiles\OracleServiceXE\AppData\Local [Dir]
    • C:\Windows\ServiceProfiles\OracleServiceXE\Cookies => C:\Windows\ServiceProfiles\OracleServiceXE\AppData\Local\Microsoft\Windows\INetCookies [Dir]
    • C:\Windows\ServiceProfiles\OracleServiceXE\Datos de programa => C:\Windows\ServiceProfiles\OracleServiceXE\AppData\Roaming [Dir]
    • C:\Windows\ServiceProfiles\OracleServiceXE\Documents\Mi música => C:\Windows\ServiceProfiles\OracleServiceXE\Music [Dir]
    • C:\Windows\ServiceProfiles\OracleServiceXE\Documents\Mis imágenes => C:\Windows\ServiceProfiles\OracleServiceXE\Pictures [Dir]
    • C:\Windows\ServiceProfiles\OracleServiceXE\Documents\Mis vídeos => C:\Windows\ServiceProfiles\OracleServiceXE\Videos [Dir]
    • C:\Windows\ServiceProfiles\OracleServiceXE\Entorno de red => C:\Windows\ServiceProfiles\OracleServiceXE\AppData\Roaming\Microsoft\Windows\Network Shortcuts [Dir]
    • C:\Windows\ServiceProfiles\OracleServiceXE\Impresoras => C:\Windows\ServiceProfiles\OracleServiceXE\AppData\Roaming\Microsoft\Windows\Printer Shortcuts [Dir]
    • C:\Windows\ServiceProfiles\OracleServiceXE\Menú Inicio => C:\Windows\ServiceProfiles\OracleServiceXE\AppData\Roaming\Microsoft\Windows\Start Menu [Dir]
    • C:\Windows\ServiceProfiles\OracleServiceXE\Mis documentos => C:\Windows\ServiceProfiles\OracleServiceXE\Documents [Dir]
    • C:\Windows\ServiceProfiles\OracleServiceXE\Plantillas => C:\Windows\ServiceProfiles\OracleServiceXE\AppData\Roaming\Microsoft\Windows\Templates [Dir]
    • C:\Windows\ServiceProfiles\OracleServiceXE\Reciente => C:\Windows\ServiceProfiles\OracleServiceXE\AppData\Roaming\Microsoft\Windows\Recent [Dir]
    • C:\Windows\ServiceProfiles\OracleServiceXE\SendTo => C:\Windows\ServiceProfiles\OracleServiceXE\AppData\Roaming\Microsoft\Windows\SendTo [Dir]
    • C:\Windows\ServiceProfiles\OracleVssWriterXE\AppData\Local\Archivos temporales de Internet => C:\Windows\ServiceProfiles\OracleVssWriterXE\AppData\Local\Microsoft\Windows\INetCache [Dir]
    • C:\Windows\ServiceProfiles\OracleVssWriterXE\AppData\Local\Datos de programa => C:\Windows\ServiceProfiles\OracleVssWriterXE\AppData\Local [Dir]
    • C:\Windows\ServiceProfiles\OracleVssWriterXE\AppData\Local\Historial => C:\Windows\ServiceProfiles\OracleVssWriterXE\AppData\Local\Microsoft\Windows\History [Dir]
    • C:\Windows\ServiceProfiles\OracleVssWriterXE\AppData\Local\Microsoft\Windows\Temporary Internet Files => C:\Windows\ServiceProfiles\OracleVssWriterXE\AppData\Local\Microsoft\Windows\INetCache [Dir]
    • C:\Windows\ServiceProfiles\OracleVssWriterXE\AppData\Roaming\Microsoft\Windows\Start Menu\Programas => C:\Windows\ServiceProfiles\OracleVssWriterXE\AppData\Roaming\Microsoft\Windows\Start Menu\Programs [Dir]
    • C:\Windows\ServiceProfiles\OracleVssWriterXE\Configuración local => C:\Windows\ServiceProfiles\OracleVssWriterXE\AppData\Local [Dir]
    • C:\Windows\ServiceProfiles\OracleVssWriterXE\Cookies => C:\Windows\ServiceProfiles\OracleVssWriterXE\AppData\Local\Microsoft\Windows\INetCookies [Dir]
    • C:\Windows\ServiceProfiles\OracleVssWriterXE\Datos de programa => C:\Windows\ServiceProfiles\OracleVssWriterXE\AppData\Roaming [Dir]
    • C:\Windows\ServiceProfiles\OracleVssWriterXE\Documents\Mi música => C:\Windows\ServiceProfiles\OracleVssWriterXE\Music [Dir]
    • C:\Windows\ServiceProfiles\OracleVssWriterXE\Documents\Mis imágenes => C:\Windows\ServiceProfiles\OracleVssWriterXE\Pictures [Dir]
    • C:\Windows\ServiceProfiles\OracleVssWriterXE\Documents\Mis vídeos => C:\Windows\ServiceProfiles\OracleVssWriterXE\Videos [Dir]
    • C:\Windows\ServiceProfiles\OracleVssWriterXE\Entorno de red => C:\Windows\ServiceProfiles\OracleVssWriterXE\AppData\Roaming\Microsoft\Windows\Network Shortcuts [Dir]
    • C:\Windows\ServiceProfiles\OracleVssWriterXE\Impresoras => C:\Windows\ServiceProfiles\OracleVssWriterXE\AppData\Roaming\Microsoft\Windows\Printer Shortcuts [Dir]
    • C:\Windows\ServiceProfiles\OracleVssWriterXE\Menú Inicio => C:\Windows\ServiceProfiles\OracleVssWriterXE\AppData\Roaming\Microsoft\Windows\Start Menu [Dir]
    • C:\Windows\ServiceProfiles\OracleVssWriterXE\Mis documentos => C:\Windows\ServiceProfiles\OracleVssWriterXE\Documents [Dir]
    • C:\Windows\ServiceProfiles\OracleVssWriterXE\Plantillas => C:\Windows\ServiceProfiles\OracleVssWriterXE\AppData\Roaming\Microsoft\Windows\Templates [Dir]
    • C:\Windows\ServiceProfiles\OracleVssWriterXE\Reciente => C:\Windows\ServiceProfiles\OracleVssWriterXE\AppData\Roaming\Microsoft\Windows\Recent [Dir]
    • C:\Windows\ServiceProfiles\OracleVssWriterXE\SendTo => C:\Windows\ServiceProfiles\OracleVssWriterXE\AppData\Roaming\Microsoft\Windows\SendTo [Dir]
    • C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\AppData\Local\Archivos temporales de Internet => C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\AppData\Local\Microsoft\Windows\INetCache [Dir]
    • C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\AppData\Local\Datos de programa => C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\AppData\Local [Dir]
    • C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\AppData\Local\Historial => C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\AppData\Local\Microsoft\Windows\History [Dir]
    • C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\AppData\Local\Microsoft\Windows\Temporary Internet Files => C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\AppData\Local\Microsoft\Windows\INetCache [Dir]
    • C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\AppData\Roaming\Microsoft\Windows\Start Menu\Programas => C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\AppData\Roaming\Microsoft\Windows\Start Menu\Programs [Dir]
    • C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\Configuración local => C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\AppData\Local [Dir]
    • C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\Cookies => C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\AppData\Local\Microsoft\Windows\INetCookies [Dir]
    • C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\Datos de programa => C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\AppData\Roaming [Dir]
    • C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\Documents\Mi música => C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\Music [Dir]
    • C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\Documents\Mis imágenes => C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\Pictures [Dir]
    • C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\Documents\Mis vídeos => C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\Videos [Dir]
    • C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\Entorno de red => C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\AppData\Roaming\Microsoft\Windows\Network Shortcuts [Dir]
    • C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\Impresoras => C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\AppData\Roaming\Microsoft\Windows\Printer Shortcuts [Dir]
    • C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\Menú Inicio => C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\AppData\Roaming\Microsoft\Windows\Start Menu [Dir]
    • C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\Mis documentos => C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\Documents [Dir]
    • C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\Plantillas => C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\AppData\Roaming\Microsoft\Windows\Templates [Dir]
    • C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\Reciente => C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\AppData\Roaming\Microsoft\Windows\Recent [Dir]
    • C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\SendTo => C:\Windows\ServiceProfiles\SQLTELEMETRY$WHATSUP\AppData\Roaming\Microsoft\Windows\SendTo [Dir]

Searching for Missing Digital Signatures:

  • No issues found.

Checking HOSTS File:

  • HOSTS file entries found:

127.0.0.1 localhost

Program finished at: 05/04/2024 06:50:11 PM Execution time: 0 hours(s), 0 minute(s), and 21 seconds(s)

Malwarebytes:

Malwarebytes

-Detalles del registro- Fecha del análisis: 04/05/2024 Hora del análisis: 18:55 Archivo de registro: 0d26a32e-0a37-11ef-9b3e-54e1ad971817.json

-Información del software- Versión: 5.1.4.112 Versión de los componentes: 1.0.1233 Versión del paquete de actualización: 1.0.84253 Licencia: Versión de prueba

-Información del sistema- SO: Windows 10 (Build 19045.4355) CPU: x64 Sistema de archivos: NTFS Usuario: DESKTOP-H77O3Q3\v5060

-Resumen del análisis- Tipo de análisis: Análisis personalizado Análisis iniciado por:: Manual Resultado: Completado Objetos analizados: 4356494 Amenazas detectadas: 202 Amenazas en cuarentena: 197 Tiempo transcurrido: STRING-NOT-ADDED

-Opciones de análisis- Memoria: Activado Inicio: Activado Sistema de archivos: Activado Archivo: Activado Rootkits: Desactivado Heurística: Activado PUP: Detectar PUM: Detectar

-Detalles del análisis- Proceso: 0 (No hay elementos maliciosos detectados)

Módulo: 0 (No hay elementos maliciosos detectados)

Clave del registro: 0 (No hay elementos maliciosos detectados)

Valor del registro: 0 (No hay elementos maliciosos detectados)

Datos del registro: 0 (No hay elementos maliciosos detectados)

Secuencia de datos: 0 (No hay elementos maliciosos detectados)

Carpeta: 0 (No hay elementos maliciosos detectados)

Archivo: 202 PUP.Optional.BundleInstaller, E:\UTWEB_INSTALLER.EXE, Sin acciones por parte del usuario, 76, 1190615, 1.0.84253, , ame, , 3769AC2D13B3A162D156BE9EF9BCACF7, 322B72FDE02347EEE92FACA2B199D63DB65CBC61C9C315D367680197F7DD7BAF Malware.AI.4246351622, E:\UNLOCKER-SETUP.EXE, En cuarentena, 1000000, -48615674, 1.0.84253, 9D92016A572731D3FD1A2F06, dds, 02808927, 646261D89E30C36B938DA1D7134691C9, 2EFDFFD1CF3ADAB21FF760F009D8893D8C4CBCF63B2C3BFCC1139457C9CD430B Generic.Malware/Suspicious, J:\SAMPLES\ADOBE AUDITION 1.5\KEYMAKER.EXE, En cuarentena, 0, 392686, 1.0.84253, , shuriken, , A5CCBCB5F7F7B97F1F066D75AEF1FE9F, D7AFE699220F8373F978026D8D41DB200D6E02ACD810F1BE3713860846ACC986 Trojan.FakeMS.SVSGen, J:\SAMPLES\SIELWOLF SAMP\SAMPLE TOTAL.SAMPLES.COLLECTION.WAV.AIFF.DRUMKITS.DRUM&BASS.TEK.HOUSE.HIP.HOP.SPECIALFX.BY.PSYKHAZE\SAMPLES\XTREME_ANALOG_SAMPLES\BASIC SYNTH\3HOOK24(00001).WAV, En cuarentena, 561, 48155, 1.0.84253, , ame, , 78C0FC1348BBF4054F7B2BD58240CA78, 89F1872DB3D1A6FCB4F88F4966827D30D6F2EF0E36EC45F4A4681D03EAC0CC18 PUP.Optional.ASK.DDS, J:\SOFTWARE\DL\ARES\ARES - MEGATUTOSPC\ARES - MEGATUTOSPC.RAR, En cuarentena, 1000002, 0, 1.0.84253, 2DF96DB285508BE44B56A8DF, dds, 02808927, 35BED4FC891557AD6E6BF94AA83F2A5A, 9270DD2F1AFC3E3F19660139B9DB00E88D2CAA45753FFC354451AD91C48B1E85 PUP.Optional.ASK.DDS, J:\SOFTWARE\DL\ARES\ARES - MEGATUTOSPC\OFFERCASTINSTALLER.EXE, En cuarentena, 1000002, 0, 1.0.84253, 2DF96DB285508BE44B56A8DF, dds, 02808927, CE877617FAB68F6F1F5B69177FD405C9, BE57147BE917B9457AD78B1220C2EF9BCF17E81CF580146D2B7DB8E7028524E4 PUP.Optional.BundleInstaller, J:\SOFTWARE\DL\UTORRENT\UTORRENT.EXE, Sin acciones por parte del usuario, 76, 816339, 1.0.84253, , ame, , 27DA3304BCFC3A131141543767FDFE35, 88FB7896BBEDE943277A2652C8B243EF477B07A2E733C4FB88E21E7472218435 PUP.Optional.uTorrent.DDS, J:\SOFTWARE\DL\BITTORRENT\BITORRENT PRO V7 [THHDPRO]\MEDICINA\UPGRADE TO PRO\ORIGINAL\BITTORRENT.EXE, En cuarentena, 1000002, 0, 1.0.84253, 8BD42DC943798B599A4776F8, dds, 02808927, A6E5F790B4F1E88A871ADAEAD921DB80, E77AD4B0978AE1B0377A07BD5162CDB15FF8294CFC9435D077D483FBF8660E8C PUP.Optional.uTorrent.DDS, J:\SOFTWARE\DL\BITTORRENT\BITTORRENT.EXE, En cuarentena, 1000002, 0, 1.0.84253, 8BD42DC943798B599A4776F8, dds, 02808927, A6E5F790B4F1E88A871ADAEAD921DB80, E77AD4B0978AE1B0377A07BD5162CDB15FF8294CFC9435D077D483FBF8660E8C PUP.Optional.Downloader.DDS, J:\SOFTWARE\DL\YOURFILEDOWNLOADER\UNINSTALL.EXE, En cuarentena, 1000002, 0, 1.0.84253, 35B38F9285A22F07F792433B, dds, 02808927, 5B6CFBF86423F7DCA40A4531196A0C60, FDEF8CF68930B545A646F27DE7056DA9007BE440E94A0715819E285339250230 PUP.Optional.Kikin, J:\SOFTWARE\DL\JDOWNLOADER 0.9.579\JDOWNLOADERSETUP0.9.579.EXE, En cuarentena, 1651, 1196769, 1.0.84253, , ame, , FFCE1916A87ADF77DFA12D4C424AC316, CEBB4361A2CC83184CFD23CE96F43412B63C62E133EA61214F83B4C4497226CB PUP.Optional.Downloader, J:\SOFTWARE\DL\YOURFILEDOWNLOADER\YOURFILE.EXE, En cuarentena, 238, 64647, 1.0.84253, 3251E8CC3578CFB8FDF00A6A, dds, 02808927, 3D53B02F7DD2164D66A47AD0AD31D352, A7EC569526E4D3FE49599070CF3DEB6B57949782E0E68D15219D8EA88C257770 PUP.Optional.BundleInstaller, J:\SOFTWARE\DL\UTORRENT\UTORRENT (3).EXE, Sin acciones por parte del usuario, 76, 1090108, 1.0.84253, , ame, , 007857E1CD5E960FEA0416B2EF54534D, 4C7F671006C954103B076F46DA7E2DA23669DA27A9E55B6AC268D071F8C90B86 PUP.Optional.BundleInstaller, J:\SOFTWARE\DL\UTORRENT\UTORRENT (2).EXE, Sin acciones por parte del usuario, 76, 790622, 1.0.84253, 4F33F8FD2F798F2F7F54F59D, dds, 02808927, 0F07BA2B4D0FA0CCBC028C44157E04D5, 6DC89DF370E5425A0197173EE7AEFEF430A1E79FBE9008A572A66EE1199C00F4 PUP.Optional.BundleInstaller.DDS, J:\SOFTWARE\DL\JDOWNLOADERSETUP (4).EXE, En cuarentena, 1000002, 0, 1.0.84253, 4F0735870B5E4CCE6D52EBD6, dds, 02808927, 880184CAB2617110D89FEA3447018F9E, 60B286BA1AE043A8F92FFEDC9513FE43CF712DA2C63F8E527D75207BFEE6A3BA PUP.Optional.BundleInstaller, J:\SOFTWARE\DL\UTWEB_INSTALLER.EXE, En cuarentena, 76, 1127556, 1.0.84253, , ame, , F96157E1E760A67D87881B1D6D6D212C, CF3473F9AF60276874957585CC30BA4E24C9A98DAD38113953EF0682411E6F32 PUP.Optional.OfferCore.DDS, J:\SOFTWARE\DL\FROSTWIRE-6.9.7.WINDOWS.EXE, En cuarentena, 1000002, 0, 1.0.84253, 80B0D95716927A7CFFA2B809, dds, 02808927, 9E877A72CDDDF68C074AEE101F676E4D, 7785AF24815A2D8D93D7889905B1B672B6B3A390B0355EA13B372226F77037F1 PUP.Optional.OpenCandy, J:\SOFTWARE\DL\BITTORRENT\BITORRENT PRO V7 [THHDPRO]\BITTORRENT.EXE, En cuarentena, 51, 640283, 1.0.84253, 003A6F880A3B1F2B5B5AB704, dds, 02808927, B941177BB7854140F2F78C6921F06395, F699D6D4F01FADD97FA8BA167EDE5258DA452D42368B0E4746CE3647D68ED1B5 PUP.Optional.Downloader, J:\SOFTWARE\DL\YOURFILEDOWNLOADER\YOURFILEUPDATER.EXE, En cuarentena, 238, 64647, 1.0.84253, 3221B19F323911202EFCCA61, dds, 02808927, 171D04A2E8D48DC48FAA83E32E28B226, 7DE7D4CD9A50D6A10590C754147A37548E801F574EB03EBFB3F3294AF5EBD23C PUP.Optional.DriverPack, J:\SOFTWARE\DRIVERS\DRIVERPACK.SOLUTION\DRIVERPACK.SOLUTION.V15.4.1.DVD.EDITION\DRP_15.4.1_DVD-WWW.INTERCAMBIOSVIRTUALES.ORG\TOOLS\MODULES\BACKUPER\PACKER\7ZSD.SFX, En cuarentena, 5053, 564064, 1.0.84253, , ame, , EC0A1B3E072CDB5656BEC8C091315C89, 6AAEA0782C768CBB9257175F17FC138C6B61D817A2F70AA4B659845E97AC0293 MachineLearning/Anomalous.100%, J:\SOFTWARE\DRIVERS\DRIVERPACK.SOLUTION\DRP_15.6_FULL\SOFT\WWW\UTORRENT.EXE, En cuarentena, 0, 392687, 1.0.84253, , shuriken, , FA757F7FA6978FEB09B15C86F05FA9CA, F22620646CFB17F816CD3D3D74B1A00CC245B5F649BA48D3C486077B76C13EF3 Malware.AI.2440005070, J:\SOFTWARE\DRIVERS\DRIVERSWEEPER 3.2.0\DRIVERSWEEPER_3.2.0.EXE, En cuarentena, 1000000, -1854962226, 1.0.84253, 2922E0656A6AF467916F85CE, dds, 02808927, A447E48BAF18422FD2EFE83C0F054A37, 6561EE6B52334A849BD0768FF626E0895B514A60903DE720851D1A23EF0CAB5D PUP.Optional.Yandex, J:\SOFTWARE\DRIVERS\DRIVERPACK.SOLUTION\DRP_15.6_FULL\SOFT\BROWSER\YANDEXPACK.EXE, En cuarentena, 10604, 1157338, 1.0.84253, , ame, , 8F44802332A0F0D971840803164DF7C9, 1E8B6F04D4070A54EA72DCB3C6DCFAFCA67D4D3AF9DC6929EF8A834E4DC06548 RiskWare.DontStealOurSoftware, J:\SOFTWARE\DRIVERS\DRIVERPACK.SOLUTION\DRP_15.6_FULL\SOFT\MBAM.EXE, En cuarentena, 1000, 156874, 1.0.84253, , ame, , CA33753D3305BD4F4948C2D782D9813E, A9EBF78A2654AFA884EA0D77CB39D679F238C48D9C312FF2599C6D55BE2AEF28 Generic.Malware.AI.DDS, J:\SOFTWARE\DRIVERS\DRIVERPACK.SOLUTION\DRP_15.6_FULL\SOFT\DRVUPDATER.EXE, En cuarentena, 1000002, 0, 1.0.84253, B59C95BA53EE13F9BAE7AB35, dds, 02808927, 45D33F615B8516DEE00505FD2A107DB6, AD1620BDCD9E0D51B50E3961CA927DDD84F01FB5F0E08A5596DC09408C03C2D9 PUP.Optional.DriverPack, J:\SOFTWARE\DRIVERS\DRIVERPACK.SOLUTION\DRP_15.6_FULL\TOOLS\MODULES\BACKUPER\PACKER\7ZSD.SFX, En cuarentena, 5053, 564064, 1.0.84253, , ame, , EC0A1B3E072CDB5656BEC8C091315C89, 6AAEA0782C768CBB9257175F17FC138C6B61D817A2F70AA4B659845E97AC0293 Malware.AI.3585923020, J:\SOFTWARE\DRIVERS\SOFTWAREZ CRIC\MALWAREBYTES.PREMIUM.V3.3.1.2183.MULTILINGUAL.KEYGEN-URET\MB3-TOOLBOX-2016\MB3-TOOLBOX-2016.EXE, En cuarentena, 1000000, -709044276, 1.0.84253, 0DBF801D49B2962AD5BCD7CC, dds, 02808927, 35B8A803FDDDAFB8B7DCBC3508ABB862, 598C6A5FEEAB60059A90CBA2ADEFFD2A5F0A376CE289ED85B2E1FE0E313565DF PUP.Optional.BundleInstaller, J:\SOFTWARE\DRIVERS\SOFTWARE POSTINSTALADO\UTORRENT.EXE, En cuarentena, 76, 790622, 1.0.84253, , ame, , 2AE9A7AD75509D509920E53444688040, EF2CF9A460373CB20EEDBC600DA0926F74EAFEE3185873B175B6E3B4FA075376 Generic.Malware.AI.DDS, J:\SOFTWARE\DRIVERS\SOFTWAREZ CRIC\UTORRENT (3).EXE, En cuarentena, 1000002, 0, 1.0.84253, 37ED394DC892C512347312E0, dds, 02808927, DC5BC216EC39C0ED0195600487952083, 14082C0E0E4DD6C89FE64B7F97049F6C87FF20E457C06170BF0BF230C7D84AB9 Generic.Malware.AI.DDS, J:\SOFTWARE\DRIVERS\SOFTWAREZ ZER0\UTORRENT (3).EXE, En cuarentena, 1000002, 0, 1.0.84253, 37ED394DC892C512347312E0, dds, 02808927, DC5BC216EC39C0ED0195600487952083, 14082C0E0E4DD6C89FE64B7F97049F6C87FF20E457C06170BF0BF230C7D84AB9 PUP.Optional.Babylon, J:\SOFTWARE\ESTUDIO\BABYLON\BABYLON10_SETUP_DICT (1).EXE, En cuarentena, 26, 8312, 1.0.84253, , ame, , 60AF71076056DEA8FF3AF67F63955313, 76632399237B2464311967B90B49B9856F5F4F8864EF63A900E70CB036D25F90 PUP.Optional.Babylon, J:\SOFTWARE\ESTUDIO\BABYLON.PRO.9.0.7_(R0).BY.AZULRELOAD\BABYLON9_SETUP.EXE, En cuarentena, 26, 8312, 1.0.84253, , ame, , 95137E43E11B4F954C62EBCFE44AD93A, CDBDB176A6F3AF380974BFE5F390440782DBAC8CC52322FFC59CB2F47414C84B PUP.Optional.Babylon, J:\SOFTWARE\ESTUDIO\BABYLON.PRO.V9.0.5.R19.MULTILENGUAJE.INCL.SERIAL\BABYLON9_SETUP.EXE, En cuarentena, 26, 8312, 1.0.84253, , ame, , 87EB2220CA8ACA94A03BA159CF5DF5C4, B1345C8F80864A05989A57C93D567EE698CA8669A4F66670878E845CF3B07E6B PUP.Optional.Babylon, J:\SOFTWARE\ESTUDIO\BABYLON\BABYLON10_SETUP_DICT.EXE, En cuarentena, 26, 8312, 1.0.84253, , ame, , 60AF71076056DEA8FF3AF67F63955313, 76632399237B2464311967B90B49B9856F5F4F8864EF63A900E70CB036D25F90 Crack.Trojan.HackTool.DDS, J:\SOFTWARE\HERRAMIENTAS\10.0.2.24-PVP\10.0.2.24-PVP\BOA.ZIP, En cuarentena, 1000002, 0, 1.0.84253, F22D6AB953AEA43A68E4B131, dds, 02808927, 51F4C1AE7E5436976B0A7799538A2827, 3A70B727D6501AE2A8C4EE229CA17CD6AEA1428440B832901837D05D7D181467 Trojan.MalPack.Krunchy, J:\SOFTWARE\HERRAMIENTAS\6.32.5600-PVP\6.32.5600-PVP\KEYGEN-SND.RAR, En cuarentena, 1061, 83935, 1.0.84253, 0000000000000000000007FB, dds, 02808927, 12E1A6CB973F11CC26DD97BB7EBC6645, 27D3747E7BFC97F1048D69CD6D217F2784FCAD6B2D815816D989F91F421E1122 PUP.Optional.SysTweak, J:\SOFTWARE\HERRAMIENTAS\ADVANCED SYSTEM OPTIMIZER\ADVANCED SYSTEM OPTIMIZER 3.2\ASO3SETUP.EXE, En cuarentena, 1296, 840401, 1.0.84253, , ame, , 86F43D2968ABED75C204C993188A3335, FBD4E158D86E237A09CAA33D6F5FC6A93B4FF57DB3AC514214342447954C9A6E PUP.Optional.SysTweak, J:\SOFTWARE\HERRAMIENTAS\ADVANCED SYSTEM OPTIMIZER\ADVANCED SYSTEM OPTIMIZER V3.0.0.1\ASO3SETUP_SPEEDTEST_TOPBANNER.EXE, En cuarentena, 1296, 840401, 1.0.84253, , ame, , BC9D83B1147AD4446182DED385338DED, 64C73FC047E96676266A9BD1E9C14A4498365B6E5E440E7E4A38D7DDF85D6350 PUP.Optional.AdvancedSystemCare, J:\SOFTWARE\HERRAMIENTAS\ADVANCED SYSTEM OPTIMIZER\ADVANCED SYSTEM OPTIMIZER 3.2\ASC-SETUP.EXE, En cuarentena, 4852, 396386, 1.0.84253, , ame, , 5063BF4D4E9025EC1F59D52E4B760994, 4906762EB4AFDBF1D16CAAD10B1DB2CF0E4A488852B5FE7DE76EFE6F7F4C2139 PUP.Optional.SysTweak, J:\SOFTWARE\HERRAMIENTAS\ADVANCED SYSTEM OPTIMIZER\ASO V3.2.648.12183\ASO3SETUP.EXE, En cuarentena, 1296, 840401, 1.0.84253, , ame, , B7A7BEB98945F68204DB89DC709BED11, 999A0251EEEFC169EC095EBF69567865B6531B3E64BF1814F7DFD8651E67920F PUP.Optional.AdvancedSystemCare, J:\SOFTWARE\HERRAMIENTAS\ADVANCED SYSTEMCARE\ADVANCED SYSTEM CARE PRO 5.0.0.152 FINAL ESPA\u00c3\u00b1OL\ASC5-SETUP-MEDIA.EXE, En cuarentena, 4852, 396386, 1.0.84253, , ame, , 9AEAF206E4C8F6E85DAB65C9F57EB000, D1DDC0AFB7902D790138C0CC3FEA670ACC7A33AF710C1D847C47ED4421937E4A PUP.Optional.AdvancedSystemCare, J:\SOFTWARE\HERRAMIENTAS\ADVANCED SYSTEMCARE\ADVANCED SYSTEMCARE PROFESSIONAL 4\ASC4-SETUP.EXE, En cuarentena, 4852, 396386, 1.0.84253, , ame, , 8E127A06DB77A3FFF1AD05DAF1DEA846, 81F358F2F04FE1621D0084D58A45F83C2FC83506AF95775F2EFECFD9F2B72819 PUP.Optional.BundleInstaller, J:\SOFTWARE\HERRAMIENTAS\DAEMON TOOLS\DAEMON TOOLS LITE 10.9.0\DTLITEINSTALLER.EXE, En cuarentena, 76, 1078096, 1.0.84253, , ame, , 40AF8BED09BFF955BA625B60A7065528, AD8D1D25FBB5A3F2E531CB30BA543756FC09D70978D48C728A866FAD4A27E007 PUP.Optional.OpenCandy, J:\SOFTWARE\HERRAMIENTAS\DAEMON TOOLS\DAEMON TOOLS LITE\DTLITE4413-0173.EXE, En cuarentena, 51, 297667, 1.0.84253, EF53C667480EDF51F26E93DB, dds, 02808927, E808A6B7751F6F980F97008D1AEB8036, C5E6CCF97EEF71E835AC37E7CF65E130E479D65CDE4A251CC57D7775C1410057 PUP.Optional.SysTweak, J:\SOFTWARE\HERRAMIENTAS\DUPLICATE.FILES.FIXER.V1.2.0.10608.MULTILINGUAL.INCL.CRACK\CRACK\DUPLICATEFILESFIXER.EXE, En cuarentena, 1296, 887004, 1.0.84253, , ame, , 390A43115EF9BD21B025A7BD94CEB77D, 8CA84EFFB556838D2311E10206688AB6142C8CE31A474CA05CB26B756EE45218 PUP.Optional.BundleInstaller, J:\SOFTWARE\HERRAMIENTAS\DAEMON TOOLS\DAEMON TOOLS LITE\DTLITEINSTALLER (2).EXE, En cuarentena, 76, 1078096, 1.0.84253, , ame, , A968A29BFEBDA5B9857A09D5D372E52C, 87D317EE5C296B7CF167B12EEF91668704997CB2033AEB90B6A27C6E9A7D4D79 PUP.Optional.BundleInstaller, J:\SOFTWARE\HERRAMIENTAS\DAEMON TOOLS\DAEMON TOOLS LITE\DTLITEINSTALLER.EXE, En cuarentena, 76, 1078096, 1.0.84253, , ame, , 40AF8BED09BFF955BA625B60A7065528, AD8D1D25FBB5A3F2E531CB30BA543756FC09D70978D48C728A866FAD4A27E007 Generic.Malware.AI.DDS, J:\SOFTWARE\HERRAMIENTAS\DAEMON TOOLS\DAEMONTOOLSULTRA110-0101.EXE, En cuarentena, 1000002, 0, 1.0.84253, B8E7359EF18BBE7AE861B00A, dds, 02808927, 4EFDC8EF378B9CF30FBFB01B6316B85D, E4387B8994E9C5DECFFB60E35F12082911FEC387400E3FCCF377FDB488D4E1F8 PUP.Optional.SysTweak, J:\SOFTWARE\HERRAMIENTAS\DUPLICATE.FILES.FIXER.V1.2.0.10608.MULTILINGUAL.INCL.CRACK\CRACK\ORIGINAL COPY\DUPLICATEFILESFIXER.EXE, En cuarentena, 1296, 887004, 1.0.84253, , ame, , 6BA4510E43005F99D3A27A5268CCCC91, F6AE9BFC447C6CB71E36B7B534618F608E9C0F2FB0C925EFFD1B777CA0656ECE PUP.Optional.InstallCore, J:\SOFTWARE\HERRAMIENTAS\FACEMOODS RADIO TOOLBAR 1.4.17\FACEMOODS.EXE, En cuarentena, 55, 300954, 1.0.84253, , ame, , 4B75B6E91684CA4F75296D72E417C8FE, FD5F289F3111F576DD50DE986424D26B826BE4A27A332DC1FB44766CA8403611 Malware.AI.1910471441, J:\SOFTWARE\HERRAMIENTAS\HIRENS BOOTCD 14.1\HBCDCUSTOMIZER.EXE, En cuarentena, 1000000, 1910471441, 1.0.84253, FC0136B1E3B709F871DF7B11, dds, 02808927, AD85FB93B3A360A2DE7F32762EE85792, 4D35357AB032C3D01CB5D35891C6131CB229D6BD9A56E582C83ABD1946A1D60C PUP.Optional.ASK, J:\SOFTWARE\HERRAMIENTAS\NERO\NERO.PLATINUM.HD.V11.2.00700.RETAIL.INCL.PATCH-IOTA\NEROINSTALLFILES\NERO20120416163928573\ISSETUPPREREQUISITES\NEROASKTOOLBAR\APNIC.DLL, En cuarentena, 1338, 935438, 1.0.84253, , ame, , 197215658B8015182192E1EBCA3BBCC3, 08DB125C09EB53CC28E7BC7C427B6C2217FF6134A122E6D65D1D24F70E875D9E PUP.Optional.ASK, J:\SOFTWARE\HERRAMIENTAS\NERO\NERO.PLATINUM.HD.V11.2.00700.RETAIL.INCL.PATCH-IOTA\NEROINSTALLFILES\NERO20120416163928573\ISSETUPPREREQUISITES\NEROASKTOOLBAR\ASKTOOLBARNRO3.EXE, En cuarentena, 1338, 383618, 1.0.84253, , ame, , 65F5805CC53C15CA548A2D97F6510D11, A2D23E79F2665A8C58B9DA98E85AA83B71707ABC9C55B9E449D99D971D89B1EC PUP.Optional.ASK, J:\SOFTWARE\HERRAMIENTAS\NERO\NERO.PLATINUM.HD.V11.2.00700.RETAIL.INCL.PATCH-IOTA\NEROINSTALLFILES\NERO20120416163928573\ISSETUPPREREQUISITES\NEROASKTOOLBAR\APNTOOLBARINSTALLER.EXE, En cuarentena, 1338, 383618, 1.0.84253, , ame, , D6A91A20DE7C2828F433842F98725FD9, 0644B6347AAB770878AD47FB2073D5FDB8795E9E03FEC49FC0A7736105FC3C2D PUP.Optional.ASK, J:\SOFTWARE\HERRAMIENTAS\NERO\NERO.PLATINUM.HD.V11.2.00700.RETAIL.INCL.PATCH-IOTA\NEROINSTALLFILES\NERO20120416163928573\ISSETUPPREREQUISITES\NEROASKTOOLBAR\APNSTUB.EXE, En cuarentena, 1338, 935438, 1.0.84253, , ame, , C36923084822C017F69396418A999D39, 7A158FDEEA8F7107BE5CE40242546A503193AA1C278F74A4730871B8EDD0BA76 PUP.Optional.ASK, J:\SOFTWARE\HERRAMIENTAS\NERO\NERO.PLATINUM.HD.V11.2.00700.RETAIL.INCL.PATCH-IOTA\NEROINSTALLFILES\NERO20120416163928573\ISSETUPPREREQUISITES\NEROASKTOOLBAR\ASKTOOLBARNRO.EXE, En cuarentena, 1338, 383618, 1.0.84253, , ame, , 6B048999E899F171EEC78D7F4BFC3392, 3B4D983F3156025F2A688160EE93D7A4DF0EC25A78ED3462FE17704985FE1E59 Generic.Malware/Suspicious, J:\SOFTWARE\HERRAMIENTAS\PASSWORD DECRYPTER\PWDGMAIL.EXE, En cuarentena, 0, 392686, 1.0.84253, , shuriken, , C0DC60DC0143A0CD7E0B5F8FB0390316, 28A2A6A1E667E927E235B1CDE0954F780BA1D5138F75C43FEFE9F2986AFE7281 PUP.Optional.RegistryWinner, J:\SOFTWARE\HERRAMIENTAS\REGISTRY WINNER 6.3.8.26 MULTILINGUAL\REGISTRYWINNER_SETUP.EXE, En cuarentena, 3009, 701533, 1.0.84253, , ame, , D5DCF1233DCAA99A37171BE46F25FC9F, E16AD213F57370BB859931D45AD2B3859547CA7D55974A52265A72A2DAC63B83 PUP.Optional.RegCleanPro, J:\SOFTWARE\HERRAMIENTAS\REGCLEAN PRO 6.21.65.1853\SYSRC_TRIAL (2).EXE, En cuarentena, 3114, 495008, 1.0.84253, , ame, , 81D4ABEA621AB14BB3FEECF57FE62AF6, C5BF81367D12DBE5A59B45B8178D9944CE91A570EB1ED9C5524A5D68CC2CF03D PUP.Optional.IntroKeygen, J:\SOFTWARE\HERRAMIENTAS\REGISTRY WINNER 6.3.8.26 MULTILINGUAL\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D Adware.AdRepack, J:\SOFTWARE\HERRAMIENTAS\REVO UNINSTALLER PRO 4.1.5 ERICKARROLIGA\REVO UNINSTALLER PRO 4.1.5 ERICKARROLIGA.ZIP, En cuarentena, 9323, 1199754, 1.0.84253, , ame, , C63687C38748DED7D788380F7B316D5F, 60E5826D71A393AF0665FBEC5FC43AC9A46DBDCEE410F2A34BA52043075FC95B Adware.AdRepack, J:\SOFTWARE\HERRAMIENTAS\REVO UNINSTALLER PRO 4.1.5 ERICKARROLIGA\REVO UNINSTALLER PRO 4.1.5 ERICKARROLIGA.EXE, En cuarentena, 9323, 1199754, 1.0.84253, , ame, , 3E9F55E0DD48CF78878FE60B8AF1DF2E, F453C363BF690AEF5EF3104222EDC5F3C3AFF71960622D4CE1D555F441566D51 Generic.Malware.AI.DDS, J:\SOFTWARE\HERRAMIENTAS\SOFTONIC.COM4 TOOLBAR\SOFTONIC.COM4.EXE, En cuarentena, 1000002, 0, 1.0.84253, 28ECE9E373B24EC75304C9AB, dds, 02808927, 2903BA2C39467DC3B607EE0C164FB952, A833C5C0B09299D564C9EDC52BF51B7BB19FA897E3C21191BA4ADABD16B4D69B PUP.Optional.SmartPCSolutions, J:\SOFTWARE\HERRAMIENTAS\TODO EN UNO RECUPERACION DE ARCHIVOS\AUTOPLAY\DOCS\RECOVERYSETUP.EXE, En cuarentena, 6093, 1221888, 1.0.84253, , ame, , B302175D3602348494DD2D4EE462C5C5, 9D70026C4255EA52EDCCFA20FFDB7CC86305DA8611B01106341BE94E873E2EB5 PUP.Optional.IntroKeygen, J:\SOFTWARE\HERRAMIENTAS\TUNEUP UTILITIES\TUNEUP.UTILITIES.2012.V12.0.2040.29.ES.INCL.KEYMAKER-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D Generic.Malware.AI.DDS, J:\SOFTWARE\HERRAMIENTAS\UNIBLUE REGISTRYBOOSTER\REGISTRYBOOSTER 2010 4.7.1.1\REGISTRYBOOSTER.EXE, En cuarentena, 1000002, 0, 1.0.84253, 29F7859D45D777E8FA812F97, dds, 02808927, 527DBFED65DA0D8528D54E03D27B15D2, A3AF2A74F57727E5830B62C7F8F3C6894E111CAC122C6E75B4457E4DFAF70D96 PUP.Optional.Uniblue, J:\SOFTWARE\HERRAMIENTAS\UNIBLUE REGISTRYBOOSTER\REGISTRYBOOSTER 2010 V4.5.0.17\REGISTRYBOOSTER.EXE, En cuarentena, 4787, 357774, 1.0.84253, 242D6331BE60B909565B1A69, dds, 02808927, 3D5D226F4E979674A651D8FA461C7DDC, 29328F383ED734D99E85B4F9FA33A16C4EE7C92711B745A63918F0C22AC6750A Generic.Malware.AI.DDS, J:\SOFTWARE\HERRAMIENTAS\UNIBLUE POWERSUITE 2011 V3.0.1.3\POWERSUITE.EXE, En cuarentena, 1000002, 0, 1.0.84253, 422D1210C7C209BD8B7BA1C2, dds, 02808927, A29CABB413EA8AD3981B5B7500390F90, 773EE2A6E6102714313D7F7E1E2D25E97510E31C23B021EF097591D959107042 PUP.Optional.Uniblue, J:\SOFTWARE\HERRAMIENTAS\UNIBLUE REGISTRYBOOSTER\REGISTRYBOOSTER 2011 V5.0.11.0\REGISTRYBOOSTER.EXE, En cuarentena, 4787, 357774, 1.0.84253, , ame, , 1E8AC8E8DF098BB39204871F846E437A, 4B20A3D01E84CBBA9B67416CCBEDCF5184B41AE0241E97C2AE8533D0FD935591 PUP.Optional.Uniblue, J:\SOFTWARE\HERRAMIENTAS\UNIBLUE REGISTRYBOOSTER\REGISTRYBOOSTER 2010\REGISTRYBOOSTER.EXE, En cuarentena, 4787, 357774, 1.0.84253, 83C89F11414A7029E157AF76, dds, 02808927, FE5EAEA40FB00D7531A76EE8D89457BD, 653A82A1DACE5A4EB019FCD1D7DE60B507982291DF8F26DCAB34247CB57F5A23 Generic.Malware.AI.DDS, J:\SOFTWARE\HERRAMIENTAS\UNIBLUE SPEEDUPMYPC\UNIBLUE SPEEDUPMYPC 2011 V5.1.1.1\SPEEDUPMYPC.EXE, En cuarentena, 1000002, 0, 1.0.84253, 422D1210C7C209BD8B7BA1C2, dds, 02808927, 6CF8078DFB98AC1B8B0AE55266D4A08B, 14EC46AD334445FB676CE40CCB97B88669B20ECEAE95C1B86AF74B3224F709D0 Generic.Malware/Suspicious, J:\SOFTWARE\HERRAMIENTAS\UNLOCKER 1.9.1 (MULTI, X86 X64 WITH PORTABLE)\UNLOCKER1.9.1-X64.EXE, En cuarentena, 0, 392686, 1.0.84253, , shuriken, , 1E1F13579E2B94C4DD40F57C2A71B362, 3694FEBB7D1758B92634B9793BEE6CA9E32D0815F3604468899DE8CCF0149291 Generic.Malware/Suspicious, J:\SOFTWARE\HERRAMIENTAS\UNLOCKER 1.9.1 (MULTI, X86 X64 WITH PORTABLE)\UNLOCKER1.9.1.EXE, En cuarentena, 0, 392686, 1.0.84253, , shuriken, , 2D81F8BA9F8B8F060CA0DE887D9EF41A, E6062E3F5CB60F73F75DBD640450CB1D8AD116B0A14180A0843F383A2707BC6C Generic.Malware.AI.DDS, J:\SOFTWARE\HERRAMIENTAS\UNIBLUE SPEEDUPMYPC\UNIBLUE.SPEEDUPMYPC.2011.V5.1.0 BYCARLOSHERNAN\SPEEDUPMYPCBYCARLOSHERNAN.EXE, En cuarentena, 1000002, 0, 1.0.84253, 422D1210C7C209BD8B7BA1C2, dds, 02808927, 636754562B22FE9F951B1A041DE4C982, 0BD52471F32D6DA364A70B25AB0193B3037ADA40E67FA9D582A94FED363204F6 Keygen.CrackTool.RiskWare.DDS, J:\SOFTWARE\HERRAMIENTAS\VMWARE WORKSTATION V9.0.1-894247\VMWARE.WORKSTATION.V9.0.0.812388.KEYMAKER-ZWT.RAR, En cuarentena, 1000002, 0, 1.0.84253, 147A8B0281579166E7F9FB2B, dds, 02808927, 3066C0480C21DE4ABDDC3387EF8FED5D, 19C05594D7B4E9090613FBA08CB69B30912AAE0075F317637E5EB992D3C7BCE7 PUP.Optional.Conduit.DDS, J:\SOFTWARE\HERRAMIENTAS\YOJOPO TOOLBAR\YOJOPO.EXE, En cuarentena, 1000002, 0, 1.0.84253, 3C560AA0A61FD599E17BE9E6, dds, 02808927, 6EAA311B1463D82228455F3BA596E6D0, E8C6C0523BD7353CDC22F2A39304DD4745832B55C32CD70E72125842F206ED41 PUP.Optional.IntroKeygen, J:\SOFTWARE\HERRAMIENTAS\WINUTILITIES PRO 10.36 (MULTILINGUAL)\CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.WinUtilities, J:\SOFTWARE\HERRAMIENTAS\WINUTILITIES PRO 10.36 (MULTILINGUAL)\SETUP.EXE, En cuarentena, 9095, 1002119, 1.0.84253, , ame, , 0D4B2F8541A93C018B243E7C05ECF823, B84DAC3FDB409D9458EFA33EE35FC70EC63E8B563BA98FFA383C3F0E83ADF4D3 PUP.Optional.BundleInstaller, J:\SOFTWARE\HERRAMIENTAS\IOBITUNINSTALLER.EXE, En cuarentena, 76, 1101650, 1.0.84253, , ame, , B68AD5F52522387A6F224A04FD603591, 24D3A996F53AECD7F9C20EF0943D1FAB9360B7AC6E72E806EAAC80A59851F36E RiskWare.Tool.CK, J:\SOFTWARE\MICROSOFT\WINDOWS\PROGRAMAS NECESARIOS PARA VALIDAR (WINXP)\MAGICAL JELLY BEAN KEYFINDER.EXE, En cuarentena, 9, 137335, 1.0.84253, 1ED5AE5F0E7A2C66D413C3B8, dds, 02808927, DDA549C475A5DC212290CC3FFDB93D3F, 65721D29F6D2939FDAC358F3BB6F890713FEAD828F22B25E5995FEC7FD9639A5 Malware.AI.1909147203, J:\SOFTWARE\MICROSOFT\WINDOWS\WINVISTA.SP2.64BITS\VISTA.LOADER.4.0\VISTALOADER 4.0.EXE, En cuarentena, 1000000, 1909147203, 1.0.84253, BB3C03C21313A15971CB4643, dds, 02808927, 9EF93A8F90D2B73E134C749A13046778, 3C7ACAE08887B52EE6DA7FAA36175C2017C7703D7B56B0BE26A5E66D83669D98 RiskWare.Tool.CK, J:\SOFTWARE\MICROSOFT\WINDOWS\PROGRAMAS NECESARIOS PARA VALIDAR (WINXP).ZIP, En cuarentena, 9, 137335, 1.0.84253, 1ED5AE5F0E7A2C66D413C3B8, dds, 02808927, 2D68C26AD7B3B3FF266B3A3DA9322201, 517C6D8711FA1317EB435E268A75967130D11E05478EE958262A302EC971E018 WinActivator.HackTool.RiskWare.DDS, J:\SOFTWARE\MICROSOFT\WINDOWS\WINDOWS.7.LOADER.EXTREME.EDITION.3.503-NAPALUM\W7LXE.EXE, En cuarentena, 1000002, 0, 1.0.84253, 5F245F385DBA5F30D3B2232A, dds, 02808927, 5AEBBABB272A369718C22DB292188123, CD0053AAC83948DF19F696A123A3D80B36BD62D9DA56981C7BFF4FE95DE745BA Malware.AI.1909147203, J:\SOFTWARE\MICROSOFT\WINDOWS\WINVISTA.SP2.64BITS\VISTA.LOADER.4.0.RAR, En cuarentena, 1000000, 1909147203, 1.0.84253, BB3C03C21313A15971CB4643, dds, 02808927, D9ABC68FFACFA6C9FD5E8D13266319D1, EEB1799CC96BFB7BA9AA84869314CEB0667C9DF7B7DB72BD7D38195F410FFDA0 PUP.Optional.BundleInstaller, J:\SOFTWARE\MOCOSOFT\SCREENSAVER\MARINE2.EXE, En cuarentena, 76, 1157020, 1.0.84253, , ame, , C9FD6DE022676D650D3295B8E4770EF3, 19C125EC21BDF0FD09BCFDC04D3CA03627466B11A51EDF2751973215ED880E02 PUP.Optional.IntroKeygen, J:\SOFTWARE\MOCOSOFT\YAMICSOFT WINXP MANAGER 7.0.9\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D RiskWare.Tool.CK, J:\SOFTWARE\MOCOSOFT\YAMICSOFT WINXP MANAGER 7.0.9\KEYGEN.EXE, En cuarentena, 9, 295732, 1.0.84253, 100A3FB7C8AE6555FD5928F3, dds, 02808927, 251D973264FBA03DBD0B58414836F399, 2CCA9078163F2C6E54CA0FF92BBD8E85F82860D57A890D0DA370D2C8916E46CC PUP.Optional.Conduit.DDS, J:\SOFTWARE\MOCOSOFT\ZONEALARM\ZONEALARM EXTREME SECURITY COMMUNITY TOOLBAR\ZONEALARM_EXTREME_SECURITY (2).EXE, En cuarentena, 1000002, 0, 1.0.84253, BE770A1776F4D16733AD688C, dds, 02808927, A2496FFFC5818C082F1691B60CB66685, 8B36383E25366BF22E6A593C0275518E5DCDA6E526937C7BF6E33829FC1AC18E PUP.Optional.Zugo.OL, J:\SOFTWARE\MULTIMEDIA+DOCUMENT CONVERTER\XPDFEPUB\X-PDF-TO-EPUB-CONVERTER.EXE, En cuarentena, 1641, 157951, 1.0.84253, A830052A55FC08FFFE38166F, dds, 02808927, F8DA7D545C786868D9F293281DFD1868, BA8EFCB154830BE9806FBE17E1D82C5ADAD0BB5705A068EE03688ABE49A408CC PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\ADOBE ACROBAT\ACROBAT X PRO 10.0.3\ADOBE ACROBAT X PRO 10.0.3\CRACK\CRACK\KEYGEN CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D Patcher.Trojan.HackTool.DDS, J:\SOFTWARE\MULTIMEDIA\ADOBE ACROBAT\ADOBE.ACROBAT.XI.PRO.V11.0.10.MULTILENGUAJE\4D0B3.4CR0B4T.XI.PRO.V11.0.10.MULTILENGUAJE\KEYGEN\ADOBE.SNR.PATCH-PAINTER-1.1\ADOBE.SNR.PATCH-PAINTER.EXE, En cuarentena, 1000002, 0, 1.0.84253, 216BE349208EB63D068F89A3, dds, 02808927, C650582D891CFEB1F2F97B983F1F0A34, E22F28FEC16B9EB0A6F6EC9357E7DAD8AC8C31F5A106DAD2663B1E0BC0100C5E PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\ADOBE.PHOTOSHOP.LIGHTROOM.MUNDOMANUALES.COM\ADOBE.PHOTOSHOP.LIGHTROOM.MUNDOMANUALES.COM\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.ASK, J:\SOFTWARE\MULTIMEDIA\ATUBE CATCHER\ATUBE_CATCHER_SETUP-291347.EXE, En cuarentena, 1338, 935438, 1.0.84253, , ame, , BA4E82626C7836C2A0B1B575E6A94810, A07F5F77019F20ADD9FD83C99D90BDD747B6C31069830B276DA9E8B1663AAAD5 Keygen.CrackTool.RiskWare.DDS, J:\SOFTWARE\MULTIMEDIA\CODECS+ CODECS\DIVX\KEY[ECLDX505.EXE, En cuarentena, 1000002, 0, 1.0.84253, 817638669A41E5A9F5F89396, dds, 02808927, 2669235C2FCE77DB89F48DCA684C41CE, 37A1F8F883CA1697788B1DD36BBD4C1CECFB116206D49A5B5AB2A9EC1E7C7AA5 RiskWare.Tool.CK, J:\SOFTWARE\MULTIMEDIA\CODECS\DIVX\PLUS 8-2-2-BUI-18538\KEYGEN.ZIP, En cuarentena, 9, 64094, 1.0.84253, 0000000000000000000007FF, dds, 02808927, 0AC5421D6D3C487F102EDB06C41F3C69, 971CC55BA0C2214A01A8ED356C634B8D70CB6740025529358295374E6ACC1F55 PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\CYBERLINK POWERDVD ULTRA 11.0.2024 (MULTILINGUAL)\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.OpenCandy.DDS, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX AUDIO ENHANCER 10.127 ALL EDITIONS\DFX.FOR.GOM.PLAYER.V10.008.INCL.KEYMAKER-CORE\DFX10SETUP-GOM.EXE, En cuarentena, 1000002, 0, 1.0.84253, DDE3A258EE8DF6E6705195B6, dds, 02808927, 1405C6C6DEBB00D63CA825AAB5E671C0, EDD1F6D73E64DCD09C2261E7997D9CCBC16AE4740E8B98F39613442B64BDADA6 PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX AUDIO ENHANCER 10.127 ALL EDITIONS\DFX.FOR.BS.PLAYER.V10.008.INCL.KEYMAKER-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.OpenCandy.DDS, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX AUDIO ENHANCER 10.127 ALL EDITIONS\DFX.FOR.BS.PLAYER.V10.008.INCL.KEYMAKER-CORE\DFX10SETUP-BSPLAYER.EXE, En cuarentena, 1000002, 0, 1.0.84253, DDE3A258EE8DF6E6705195B6, dds, 02808927, 5AADABAA77ABA5E1DE2CF750B02F996D, CE6D3713C7E6A53272F18AE059050A370273F256AEA0162CD2C15085F8959CF7 PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX AUDIO ENHANCER 10.127 ALL EDITIONS\DFX.FOR.GOM.PLAYER.V10.008.INCL.KEYMAKER-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX AUDIO ENHANCER 10.127 ALL EDITIONS\DFX.FOR.JETAUDIO.V10.008.INCL.KEYMAKER-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX AUDIO ENHANCER 10.127 ALL EDITIONS\DFX.FOR.MEDIAMONKEY.V10.008.INCL.KEYMAKER-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX AUDIO ENHANCER 10.127 ALL EDITIONS\DFX.FOR.WINDOWS.MEDIA.PLAYER.V10.008.INCL.KEYMAKER-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.OpenCandy.DDS, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX AUDIO ENHANCER 10.127 ALL EDITIONS\DFX.FOR.J.RIVER.MEDIA.CENTER.V10.008.INCL.KEYMAKER-CORE\DFX10SETUP-JRIVER.EXE, En cuarentena, 1000002, 0, 1.0.84253, DDE3A258EE8DF6E6705195B6, dds, 02808927, 60D3A69B5778D47A470271231525FA21, 41BBCA4514EB73C56D885074520D624C763ECFBC821613A34C290C6D01C6D10A PUP.Optional.OpenCandy.DDS, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX AUDIO ENHANCER 10.127 ALL EDITIONS\DFX.FOR.MEDIAMONKEY.V10.008.INCL.KEYMAKER-CORE\DFX10SETUP-MEDIAMONKEY.EXE, En cuarentena, 1000002, 0, 1.0.84253, DDE3A258EE8DF6E6705195B6, dds, 02808927, FFBE15BADD355B6B8511BE3FC52B3D1C, 055955DDAF29B281EA7324504576F10DFA79DE6DF6537AC8DD60DEA6F95F8917 PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX AUDIO ENHANCER 10.127 ALL EDITIONS\DFX.V10.127.INCL.KEYMAKER.READ.NFO-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX AUDIO ENHANCER 10.127 ALL EDITIONS\IDFX.V1.131.INCL.KEYMAKER-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.OpenCandy.DDS, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX AUDIO ENHANCER 10.127 ALL EDITIONS\IDFX.V1.131.INCL.KEYMAKER-CORE\IDFXSETUP.EXE, En cuarentena, 1000002, 0, 1.0.84253, DDE3A258EE8DF6E6705195B6, dds, 02808927, F6BFF705FC3502BB9BBD4259C666E46C, 5F75D796E54FEC5317238E23A3E92ADA0DBDF1C6FD22CCD2ECCCEAFB6639B5CB PUP.Optional.ASK, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX AUDIO ENHANCER 10.127 ALL EDITIONS\DFX.V10.127.INCL.KEYMAKER.READ.NFO-CORE\DFX10SETUP.EXE, En cuarentena, 1338, 935438, 1.0.84253, , ame, , D916DB90439FC65C4E0C549F6E12A65D, ACAD34B88CB7727BB0E3A05CF0CC9981E1A5865EEA0A6F7787A90831663E50B0 PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX.AUDIO.ENHANCER.V10.136.ALL.EDITIONS.INCL.KEYMAKER-CORE\DFX.FOR.FOOBAR2000.V10.008.INCL.KEYMAKER-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX.AUDIO.ENHANCER.V10.136.ALL.EDITIONS.INCL.KEYMAKER-CORE\DFX.FOR.J.RIVER.MEDIA.CENTER.V10.008.INCL.KEYMAKER-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX.AUDIO.ENHANCER.V10.136.ALL.EDITIONS.INCL.KEYMAKER-CORE\DFX.FOR.JETAUDIO.V10.008.INCL.KEYMAKER-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX.AUDIO.ENHANCER.V10.136.ALL.EDITIONS.INCL.KEYMAKER-CORE\DFX.FOR.BS.PLAYER.V10.008.INCL.KEYMAKER-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX.AUDIO.ENHANCER.V10.136.ALL.EDITIONS.INCL.KEYMAKER-CORE\DFX.FOR.WINAMP.V10.008.INCL.KEYMAKER-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.OpenCandy.DDS, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX.AUDIO.ENHANCER.V10.136.ALL.EDITIONS.INCL.KEYMAKER-CORE\DFX.FOR.JETAUDIO.V10.008.INCL.KEYMAKER-CORE\DFX10SETUP-JETAUDIO.EXE, En cuarentena, 1000002, 0, 1.0.84253, DDE3A258EE8DF6E6705195B6, dds, 02808927, 280F180A3DFD11ED73575461B373058D, 481B107DA94F2AEE6ACB8D85C6148BD67DF658768A33673F4CE4554B7379EC5E PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX.AUDIO.ENHANCER.V10.136.ALL.EDITIONS.INCL.KEYMAKER-CORE\DFX.FOR.WINDOWS.MEDIA.PLAYER.V10.008.INCL.KEYMAKER-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.OpenCandy.DDS, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX.AUDIO.ENHANCER.V10.136.ALL.EDITIONS.INCL.KEYMAKER-CORE\DFX.FOR.J.RIVER.MEDIA.CENTER.V10.008.INCL.KEYMAKER-CORE\DFX10SETUP-JRIVER.EXE, En cuarentena, 1000002, 0, 1.0.84253, DDE3A258EE8DF6E6705195B6, dds, 02808927, 60D3A69B5778D47A470271231525FA21, 41BBCA4514EB73C56D885074520D624C763ECFBC821613A34C290C6D01C6D10A PUP.Optional.ASK, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX.AUDIO.ENHANCER.V10.136.ALL.EDITIONS.INCL.KEYMAKER-CORE\DFX.FOR.WINDOWS.MEDIA.PLAYER.V10.008.INCL.KEYMAKER-CORE\DFXSETUP-WMP64.EXE, En cuarentena, 1338, 935438, 1.0.84253, , ame, , E2DB442AB296B77961F84E36E5F50D43, 2D5228FF4D938F995BD852D0A970BC64A5FE58BD395227804137211FF52A1FC0 PUP.Optional.OpenCandy.DDS, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX.AUDIO.ENHANCER.V10.136.ALL.EDITIONS.INCL.KEYMAKER-CORE\DFX.FOR.WINDOWS.MEDIA.PLAYER.V10.008.INCL.KEYMAKER-CORE\DFX10SETUP-WMP.EXE, En cuarentena, 1000002, 0, 1.0.84253, DDE3A258EE8DF6E6705195B6, dds, 02808927, A4783DA456620B0117C789F1B46D3DF1, AAC8B07473FD57620F42491C5E2EC04B090633E7A7AA653A990E6FCEB0C10E99 PUP.Optional.OpenCandy.DDS, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX.AUDIO.ENHANCER.V10.136.ALL.EDITIONS.INCL.KEYMAKER-CORE\DFX.FOR.WINAMP.V10.008.INCL.KEYMAKER-CORE\DFX10SETUP-WINAMP.EXE, En cuarentena, 1000002, 0, 1.0.84253, DDE3A258EE8DF6E6705195B6, dds, 02808927, 82D077AA7A17CC34302EFB03459D4599, 54DCCF9091D993552D0DCEEFD12EC49982585884601F97E812E391BAEE19DDB1 PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX.AUDIO.ENHANCER.V10.136.ALL.EDITIONS.INCL.KEYMAKER-CORE\IDFX.V1.131.INCL.KEYMAKER-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D Generic.Malware.AI.DDS, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX11.0.6\DFX11SETUP.EXE, En cuarentena, 1000002, 0, 1.0.84253, F347AE571204FA109F7869A5, dds, 02808927, A48421F90085512A148C139D6CF467E1, FA378EC186E00E7ED940DB3487102069FD82D86B8789DB1FDA97D3CA861A83BA PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX AUDIO ENHANCER 10.127 ALL EDITIONS\DFX.FOR.FOOBAR2000.V10.008.INCL.KEYMAKER-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.OpenCandy.DDS, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX AUDIO ENHANCER 10.127 ALL EDITIONS\DFX.FOR.JETAUDIO.V10.008.INCL.KEYMAKER-CORE\DFX10SETUP-JETAUDIO.EXE, En cuarentena, 1000002, 0, 1.0.84253, DDE3A258EE8DF6E6705195B6, dds, 02808927, 6C427092EDEA1B38EA9491F200976482, EA5625C66882C9124222C341B8B9D5BAD497BC2F401FA81F8F6240EC14068BA4 PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX_V10.134\KEYGEN\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.OpenCandy.DDS, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX AUDIO ENHANCER 10.127 ALL EDITIONS\DFX.FOR.WINDOWS.MEDIA.PLAYER.V10.008.INCL.KEYMAKER-CORE\DFX10SETUP-WMP.EXE, En cuarentena, 1000002, 0, 1.0.84253, DDE3A258EE8DF6E6705195B6, dds, 02808927, A4783DA456620B0117C789F1B46D3DF1, AAC8B07473FD57620F42491C5E2EC04B090633E7A7AA653A990E6FCEB0C10E99 PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX AUDIO ENHANCER 10.127 ALL EDITIONS\DFX.FOR.J.RIVER.MEDIA.CENTER.V10.008.INCL.KEYMAKER-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX AUDIO ENHANCER 10.127 ALL EDITIONS\DFX.FOR.WINAMP.V10.008.INCL.KEYMAKER-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.ASK, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX AUDIO ENHANCER 10.127 ALL EDITIONS\DFX.FOR.WINDOWS.MEDIA.PLAYER.V10.008.INCL.KEYMAKER-CORE\DFXSETUP-WMP64.EXE, En cuarentena, 1338, 935438, 1.0.84253, , ame, , E2DB442AB296B77961F84E36E5F50D43, 2D5228FF4D938F995BD852D0A970BC64A5FE58BD395227804137211FF52A1FC0 PUP.Optional.OpenCandy.DDS, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX.AUDIO.ENHANCER.V10.136.ALL.EDITIONS.INCL.KEYMAKER-CORE\DFX.FOR.BS.PLAYER.V10.008.INCL.KEYMAKER-CORE\DFX10SETUP-BSPLAYER.EXE, En cuarentena, 1000002, 0, 1.0.84253, DDE3A258EE8DF6E6705195B6, dds, 02808927, 5AADABAA77ABA5E1DE2CF750B02F996D, CE6D3713C7E6A53272F18AE059050A370273F256AEA0162CD2C15085F8959CF7 PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX.AUDIO.ENHANCER.V10.136.ALL.EDITIONS.INCL.KEYMAKER-CORE\DFX.FOR.GOM.PLAYER.V10.008.INCL.KEYMAKER-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX.AUDIO.ENHANCER.V10.136.ALL.EDITIONS.INCL.KEYMAKER-CORE\DFX.FOR.MEDIAMONKEY.V10.008.INCL.KEYMAKER-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.OpenCandy.DDS, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX.AUDIO.ENHANCER.V10.136.ALL.EDITIONS.INCL.KEYMAKER-CORE\DFX.FOR.GOM.PLAYER.V10.008.INCL.KEYMAKER-CORE\DFX10SETUP-GOM.EXE, En cuarentena, 1000002, 0, 1.0.84253, DDE3A258EE8DF6E6705195B6, dds, 02808927, 1405C6C6DEBB00D63CA825AAB5E671C0, EDD1F6D73E64DCD09C2261E7997D9CCBC16AE4740E8B98F39613442B64BDADA6 PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX11.0.6\DFX.V11.014.KEYMAKER-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.OpenCandy.DDS, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX.AUDIO.ENHANCER.V10.136.ALL.EDITIONS.INCL.KEYMAKER-CORE\DFX.FOR.MEDIAMONKEY.V10.008.INCL.KEYMAKER-CORE\DFX10SETUP-MEDIAMONKEY.EXE, En cuarentena, 1000002, 0, 1.0.84253, DDE3A258EE8DF6E6705195B6, dds, 02808927, 85665F06AB1F38278A0E07BD4506D92F, EB0E2394E392A65B046E4BF5D1D96C5460298C79571F7F778C66FBD2B6196A7A PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX.AUDIO.ENHANCER.V10.136.ALL.EDITIONS.INCL.KEYMAKER-CORE\DFX.V10.136.INCL.KEYMAKER-CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.OpenCandy.DDS, J:\SOFTWARE\MULTIMEDIA\DFX AUDIO ENHANCER\DFX.AUDIO.ENHANCER.V10.136.ALL.EDITIONS.INCL.KEYMAKER-CORE\IDFX.V1.131.INCL.KEYMAKER-CORE\IDFXSETUP.EXE, En cuarentena, 1000002, 0, 1.0.84253, DDE3A258EE8DF6E6705195B6, dds, 02808927, 38542DE5A851A4269EB4609CBC00D2D4, A510C63914122FDC45DDDE5BF94F16D2BC16333293481C12CDE12C08420F5C28 Neshta.Virus.FileInfector.DDS, J:\SOFTWARE\MULTIMEDIA\FREE VIDEO TO MP3 CONVERTER 4.2.14\FREEVIDEOTOMP3CONVERTER.EXE, En cuarentena, 1000002, 0, 1.0.84253, D601CE2E0D555D65760A06C0, dds, 02808927, 18DC7562960ED6BA7776AF69103A0F7F, 226DB3B1E068939C4D0049E72F9D1768F718561CC15A29A97B279C96FD13F437 Malware.AI.4265088623, J:\SOFTWARE\MULTIMEDIA\IMTOO VIDEO CONVERTER ULTIMATE\IVCHD.6.5.2.0215\HD-VIDEO-CONVERTER6.EXE, En cuarentena, 1000000, -29878673, 1.0.84253, A830052A55FC08FFFE38166F, dds, 02808927, A2E48F7EAC6A4E8C7F907994B9EAEE07, CC85D1E9BDCCA66E0DB98F73221BDFD21898A24CD90A4E8445C7A70E17DD9885 Malware.AI.4265088623, J:\SOFTWARE\MULTIMEDIA\IMTOO VIDEO CONVERTER ULTIMATE\IVC.6.5.2.0215\HD-VIDEO-CONVERTER6.EXE, En cuarentena, 1000000, -29878673, 1.0.84253, A830052A55FC08FFFE38166F, dds, 02808927, E3D068E4A9909167C63C2255510EA959, 5FF8150B21960BE47612A0E96467C6A6B2F75C4B571009A63BD52F64E37335DC Malware.AI.4265088623, J:\SOFTWARE\MULTIMEDIA\IMTOO VIDEO CONVERTER ULTIMATE\HD-VIDEO-CONVERTER6_WWW.XTHEDANIEX.COM\HD-VIDEO-CONVERTER6.EXE, En cuarentena, 1000000, -29878673, 1.0.84253, A830052A55FC08FFFE38166F, dds, 02808927, 7E714549CFFC34EB48F0873435166CFD, A9D2E972F1E4EFDDC840BAD3D71D5924F1CC67E8C9F8F882B259F1D330E91EC0 Malware.AI.4265088623, J:\SOFTWARE\MULTIMEDIA\IMTOO VIDEO CONVERTER ULTIMATE\11280111SFRD\HD-VIDEO-CONVERTER6.EXE, En cuarentena, 1000000, -29878673, 1.0.84253, A830052A55FC08FFFE38166F, dds, 02808927, 07040B57723EE6685718F17A256B19CA, BA87CA6B9C856355E970E89BF287004929E6D8145C66E0EB66CFD168DE304089 Malware.AI.4265088623, J:\SOFTWARE\MULTIMEDIA\IMTOO VIDEO CONVERTER ULTIMATE\JHVC.6.5.2.0127\HD-VIDEO-CONVERTER6.EXE, En cuarentena, 1000000, -29878673, 1.0.84253, A830052A55FC08FFFE38166F, dds, 02808927, ADD69A2C5740BB8BF47FCA5D50E887EF, 9336222E89949DD8DD8A518BC5759253F9C9AFE5F5D8BCA3BAB867F402799F52 Generic.Malware.AI.DDS, J:\SOFTWARE\MULTIMEDIA\MEDIACODER 2011 RC3 BUILD 5050\INSTALL_2105.EXE, En cuarentena, 1000002, 0, 1.0.84253, 4123DC4951A0A56DE8EC1451, dds, 02808927, 8C51CBA306E969F0994C281C7DA450E4, A6C7E2DCD03B6A3A3229EE3B0DB2A100E4F664655FA0FE36FE7124B01FEAA3B7 PUP.Optional.IntroKeygen, J:\SOFTWARE\MULTIMEDIA\PDF PRO 10.4.0000\CORE\CORE10K.EXE, En cuarentena, 4345, 279993, 1.0.84253, , ame, , D581068E84510083DDEA45E821EBDE36, FA04F7F08277B74677628A224A096D4B9FE4CAFB7EFF9F9D92E2AD776085959D PUP.Optional.BundleInstaller, J:\SOFTWARE\MULTIMEDIA\SMART DEFRAG 2.2\SD2-SETUP-SLIM.EXE, En cuarentena, 76, 1129457, 1.0.84253, , ame, , 7FF0DD0947B3BAD25B48008362D58865, 2FFA80F120A8826BE2343B1680B43B31EA80C5F82199E8A4E44D2171636F0DF6 Ramnit.Virus.FileInfector.DDS, J:\SOFTWARE\MULTIMEDIA\TV-ONLINE\VISION HD 1.9\MANDRILVISION HD 1.9\APP\FIREFOX\FREEBL3.DLL, En cuarentena, 1000002, 0, 1.0.84253, 8A069366E8D239BD0B025497, dds, 02808927, 400A55BB8D084D15AE947934087F8837, 2A8DC6919A737BC4C14B08239E8AC0FF7E22E65692114290143134E3F58561F5 OpenCandy.Adware.Advertising.DDS, J:\SOFTWARE\MULTIMEDIA\VEETLE TV 0.9.18\VEETLE 0.9.18.EXE, En cuarentena, 1000002, 0, 1.0.84253, F9B70A01C0F7E697FE3DF451, dds, 02808927, E8F2642E8AA3FD5490D76D3FCED0E3F9, A5CB1E7146FA2A3ACF8EB529478A8409A24043E071B3583825D4765326CC64E3 PUP.Optional.OpenCandy.DDS, J:\SOFTWARE\MULTIMEDIA\WINAMP\WINAMP563_FULL_EMUSIC-7PLUS_ALL.EXE, En cuarentena, 1000002, 0, 1.0.84253, 82AA94F21D5625FCF0971BA5, dds, 02808927, 11A05852C1C4A16A9C6E8704745900B2, F87928123BA79B0F9AAF978DA08CE6F316D437D4E341C2381C5E459105BDE5AF HackTool.Patcher, J:\SOFTWARE\SEGURIDAD+ANTISPYWARE\MALWAREBYTES PREMIUM\MALWAREBYTES PREMIUM\SETUP64.EXE, En cuarentena, 1411, 816012, 1.0.84253, , ame, , 5FE9527C28BAE9B5A888B10A8A6D56F5, C6E697FBD14A38E46BAD5C3CC5B6DAF766F64C9B330438E5665B25191784E275 Generic.Malware.AI.DDS, J:\SOFTWARE\SEGURIDAD+ANTISPYWARE\MALWAREBYTES-ANTI-MA_417028418\MALWAREBYTES-ANTI-MA_417028418.ZIP, En cuarentena, 1000002, 0, 1.0.84253, 5D3EB5A627037D0A208DBB15, dds, 02808927, 053CFA9E9178E20042104675E95F1961, 5EA3DB6EC2D558276249F08C203236CE757778972BE2ED8EAFA254FA34FB2909 CrackTool.Agent, J:\SOFTWARE\SEGURIDAD+ANTIVIRUS\ESET NOD32 ANTIVIRUS\NOD32 V2.5\NOD32 FIX 1.8.EXE, En cuarentena, 28, 299351, 1.0.84253, , ame, , A693A8F99A6A96AA4B9890FBD6DE5699, C8D5F3A846583632DA1FCDEC68FB054C57E90894ED6636C48D877DC653BCCE40 PUP.Optional.PCProtect, J:\SOFTWARE\SEGURIDAD+ANTIVIRUS\TOTALAV_INSTALLER.EXE, En cuarentena, 5066, 849704, 1.0.84253, F284A1447F9BB4EEFC8F1BFD, dds, 02808927, BA339B4D387B2C21DA7CE662E5098AEA, 8DC9AF56D772C356F9D1962F28269A15EBDCCAFA698115708342EA70DA58D1DF PUP.Optional.TotalAV, J:\SOFTWARE\SEGURIDAD+ANTIVIRUS\TOTALAV_SETUP.EXE, En cuarentena, 7415, 849702, 1.0.84253, , ame, , B736A845B8ADFE0742A94C891A2757AC, 7A75C2C9695157772541CD426D057FF382D011A2791BCC3E511D94592AB0DBB7 Generic.Malware/Suspicious, J:\SOFTWARE\SEGURIDAD\MASK MY IP V2.3.7.8 - [MUMBAI]\MASKMYIP-2.3.7.8.SETUP.EXE, En cuarentena, 0, 392686, 1.0.84253, , shuriken, , 97E7B9B7B7769EF803152C393C5CE8B1, 17BB58A8F225C8509CCEE198468AC6B9977F3878C3C15892D07E58752FB4B475 MachineLearning/Anomalous.94%, J:\SOFTWARE\UTILIDADES\PROFICAD.V10.5.1+PORTABLE.INCL.KEYGEN\KEYGEN.RAR, En cuarentena, 0, 392687, 1.0.84253, , shuriken, , BF1A3C42C05D552636E12AA41F14A9BE, 2203E9AAFE7F5E14945EE621C664982EF2B8EC578CF600D59A740BD6D4783882 PUP.Optional.WiseFixer, J:\SOFTWARE\SEGURIDAD\WISEFIXER 3.5\WISEFIXER.EXE, En cuarentena, 5810, 444867, 1.0.84253, , ame, , 8A238AE9C9CD95900FC17618A86DC7A0, 33AB01885E24EE46E4CD71EE1AD319D9FE264F792038FE3B6BF2F581E27190BE Generic.Malware.AI.DDS, J:\SOFTWARE\SEGURIDAD\ORCUS 1.9.1\ORCUS 1.9.1\PLUGINS\CONCURRENTRDP.ORCPLG, En cuarentena, 1000002, 0, 1.0.84253, 89F546F58923488E3B61594B, dds, 02808927, D09D5CA92612A54B04FAFF6547FF30B6, 482E549F87D36BF9F5CC2F89C3F86B362BF96ACCE687BD59AE97B8EADBDD55B9 Generic.Trojan.Malicious.DDS, J:\SOFTWARE\SEGURIDAD\ORCUS 1.9.1\ORCUS 1.9.1.RAR, En cuarentena, 1000002, 0, 1.0.84253, 3681283560FC5B80EB4BA5DF, dds, 02808927, 920C83F15A403F15930BE370E61A5D4D, 6B21DB4A10EA5398C9D7A587093B7C8A7424013921BDCD85780AFC107F0D6E43 Generic.Trojan.Malicious.DDS, J:\SOFTWARE\SEGURIDAD\ORCUS 1.9.1.RAR, En cuarentena, 1000002, 0, 1.0.84253, 3681283560FC5B80EB4BA5DF, dds, 02808927, 920C83F15A403F15930BE370E61A5D4D, 6B21DB4A10EA5398C9D7A587093B7C8A7424013921BDCD85780AFC107F0D6E43 JokeTool.ScreenMate, K:\TEXTO\SCREEN MATES\EL PROFESOR CHIFLADO II.EXE, En cuarentena, 9096, 999957, 1.0.84253, , ame, , BAD162EA72C595DD4AA99066529DF449, 0471D2DA7C6CF8080D47B5689443F218257CD2AC4CE33F2C1F74450318C23E01 Generic.Malware.AI.DDS, K:\TEXTO\SCREEN MATES\KAMIKAZE KAT.EXE, En cuarentena, 1000002, 0, 1.0.84253, 93D6F286899CC1AB738603DD, dds, 02808927, 5FF723473A2CCC578415D7E680B6B370, B3C66E92A0F541749572163ECDB0766ABD2AE9072765FC02DB448547046E3754 MachineLearning/Anomalous.100%, K:\TEXTO\VARIOS\ANIMACION\ASEREJE.EXE, En cuarentena, 0, 392687, 1.0.84253, , shuriken, , 05F423D373BD2BF28646B8374013E793, 8665BD6B2D084170BAF7EC37EB8FA6220675FF2FFADEEC54AB68A1B78F592FB1 Malware.AI.2357895056, K:\TEXTO\VARIOS\ANIMACION\DAVIDS ARMAGEDDON.EXE, En cuarentena, 1000000, -1937072240, 1.0.84253, E734DCC5C9E0FAFA8C8A9F90, dds, 02808927, 1A34E73591A924E5E03A51B96A23B24D, 7908D8B3AF7F2321FB4EE5B10559F9DB55E6ED2A2AA00DF84888766552C612B7 Crack.Trojan.HackTool.DDS, L:\CALL.OF.JUAREZ.GUNSLINGER-RELOADED\RLD-COJGS-WWW.INTERCAMBIOSVIRTUALES.ORG\CRACK\STEAM_API.DLL, En cuarentena, 1000002, 0, 1.0.84253, 07D0891E67FF98DA7C20E151, dds, 02808927, D02A903A703BECE0CF905888EB4FE845, AFE50D170B84FA9B2ABFA5A954163E5D544E231D342498663B11D141D164DC11 Malware.AI.1561212719, L:\CBKORP (15 JUEGOS + UTILIDADES)\XARA.3D.V3.03.WIN9XNT.INCL.KEYMAKER-CORE\CR-XA303.ZIP, En cuarentena, 1000000, 1561212719, 1.0.84253, C0A63EE37C07BABD5D0E372F, dds, 02808927, 2AC47DFDD16E258A75982C7A821EC887, E05C03331B0D32D7906A8A64D909CA783886E3F181BCC551FD8F2C0B99720C03 Malware.AI.1561212719, L:\CBKORP (15 JUEGOS + UTILIDADES)\WIN.RAR.V2.5.BETA.4.WIN9XNT.INCL.KEYMAKER-CORE\CR-WR254.ZIP, En cuarentena, 1000000, 1561212719, 1.0.84253, C0A63EE37C07BABD5D0E372F, dds, 02808927, B37726377667014D39A35E5A6D0888D6, 7A3CC935689455FDD8C69F3DA5F750E5D4D1C4DCD0B71256955FF884E28CD4EF Malware.AI.1386695451, L:\EMULADORES + ROMS\EMULADORES\NEORAGEX\NEORAGEX.EXE, En cuarentena, 1000000, 1386695451, 1.0.84253, AB9BA751F10E2F0D52A74B1B, dds, 02808927, BDB24E18D8865EACE0F61BA110ADB72C, F5B7C6FA1150DAFBEECD3653BA2EB9CC110FB14FD06BDD48A7ABD25A499C1895 MachineLearning/Anomalous.97%, L:\EMULADORES + ROMS\MEGADRIVE (279 JUEGOS) & SUPER NINTENDO (209 JUEGOS)\MENU.EXE, En cuarentena, 0, 392687, 1.0.84253, , shuriken, , B2190D5FB863843124D2112533BD1515, CFCBF77C2802561C76E6033EA304B649F1DA5BCBB681EA7916D2B78E5542FB69 MachineLearning/Anomalous.100%, L:\FIFA 2000\DIRECTX\DIRECTX\DXSETUP.EXE, En cuarentena, 0, 392687, 1.0.84253, , shuriken, , 733A0BF3FE208C8FBF23C12F7C842A32, E5F61ABE34189FC76D0A1ECA25C5733268B9262BE741D00E6F057D6E91190038 MachineLearning/Anomalous.100%, L:\FIFA 2000\FIFA2000.EXE, En cuarentena, 0, 392687, 1.0.84253, , shuriken, , 8CB9D30479FF797D8E45FDF8A482B964, 96A4D4E9FBD78ADB1B6A5F1BDB9E69086199AF7A0FF52357EB538E51A000BBD3 Generic.Malware.AI.DDS, L:\GRAND THEFT AUTO\GRAND THEFT AUTO IV (2008)\RZR-GTA4\LAUNCHGTAIV.EXE, En cuarentena, 1000002, 0, 1.0.84253, 5B89D498756BAE323E4E57EF, dds, 02808927, 25EA124FC3E2B578C48900633D00A0BD, 66AC1B7AE5C8092FC5260D237D2ACBD3A88530C89C4C099B6F7F39D7A7975B5F Generic.Malware.AI.DDS, L:\GRAND THEFT AUTO\GT4 5 CRK\CRACK\STEAM_API64.DLL, En cuarentena, 1000002, 0, 1.0.84253, 3FF123F3FED618E92523C5C9, dds, 02808927, 69E3B54AD96920ECCF50C0F82CA90351, DC18B7763A0A536A48C93B97683EB21339F455CC0035D2823930407009346B04 Generic.Malware.AI.DDS, L:\GRAND THEFT AUTO\GRAND THEFT AUTO IV (2008)\RZR-GTA4.EXE, En cuarentena, 1000002, 0, 1.0.84253, 5B89D498756BAE323E4E57EF, dds, 02808927, 6E6EF4AF5C3C2C711C847602BD3B1E95, 8A71B8A5B1D957FB1A1179022D1B10EEFF4E035E6097F8E97DF8D7AC08B98F15 Crack.HackTool.RiskWare.DDS, L:\GRAND THEFT AUTO\GT4 5 CRK\CRACK\SOCIALCLUB.DLL, En cuarentena, 1000002, 0, 1.0.84253, 173D2326F0C518590C9D9E09, dds, 02808927, CFB90E00A30D5FC57ECE0DCD8B41774C, E056A1767D40A48AF6C0EAFA547A1A1C4DC7988B5C3DA4A4D75F4BAC467EC94D MachineLearning/Anomalous.100%, L:\FIFA 2000\SETUP\SETUP.EXE, En cuarentena, 0, 392687, 1.0.84253, , shuriken, , 5FED54D0BBABC152A287F9446DAAE3D6, 49B0C79E158A23F73DAA34790CD6B74B7C626BC2B10AFC6C6526CE7CF1408845 Malware.AI.3256384855, L:\LOS SIMS 3\18 LOS SIMS 3 MOVIDA EN LA FACULTAD (THE_SIMS_3_UNIVERSITY_LIFE-FLT, EP09)\THE_SIMS_3_UNIVERSITY_LIFE_CRACK_ONLY-FLT\FAIRLIGHT\KEYGEN.EXE, En cuarentena, 1000000, -1038582441, 1.0.84253, C4DB6CCDD0AD790EC2187D57, dds, 02808927, 630BA972B03B7B09E9263687CF749360, 633F62C20F9F220792E2DC97B3B11713A279041A09277B8694EA4B5DD9F9B676 Crack.HackTool.RiskWare.DDS, L:\GRAND THEFT AUTO\GT4 5 CRK\GT4.5.CRK.RLD.RAR, En cuarentena, 1000002, 0, 1.0.84253, 173D2326F0C518590C9D9E09, dds, 02808927, A3071F67F1DF6AFA65FEE1F5FD555E37, ACD7AFF566E79898BD448169B238DB232D271B42E3CBD0FBFBC28B82A904BEED CrackTool.Agent.Steam, L:\M.K.K.EDI-PC-2DVD5-BY-MRPIANO\M.K.K.EDI-PC-DISC2-BY-MRPIANO\CRACK.RLD\DISCCONTENTPC\STEAM_API.DLL, En cuarentena, 1044, 352888, 1.0.84253, 1B4C44EFAE54944BDE2B058D, dds, 02808927, C2805315736AA466F28980DC752E395A, 5FD5A9DFA514609A2BD6764D04A119A245EAF4B991B0A8DB437FD75C80EFAF9A Generic.Malware.AI.DDS, K:\TEXTO\SCREEN MATES\DEATHWISH DOG.EXE, En cuarentena, 1000002, 0, 1.0.84253, 93D6F286899CC1AB738603DD, dds, 02808927, 61518B467F5D9FDD10E5B45B506B107C, 64F4EF7F014B8B0DF311ECE66978D0550B2B33C3E5B6C58E36E4C271829510DF JokeTool.ScreenMate, K:\TEXTO\SCREEN MATES\PUPPY.EXE, Sin acciones por parte del usuario, 9096, 999957, 1.0.84253, 11EAE182C4D24983FC267FF1, dds, 02808927, B205F94471677AADCA9362023B65D001, 34DA3F65A235B2F4FC72F87A50FCF22309D69BB6B5215221F75D797A9720F83F Backdoor.Flooder, L:\100 JUEGOS\XTRAS\MINIJUEGOS\3DRT DOMINOS\3DRT_DOMINOS_SHARE.EXE, En cuarentena, 1432, 131724, 1.0.84253, , ame, , F656B31C660A5F804B95840DBFFBD32F, F4A3148DB6CC991536CE7F58741590B98F84FB857D6190383C63CA59EE5DC9BC Malware.AI.1561212719, L:\CBKORP (15 JUEGOS + UTILIDADES)\NETBUS.PRO.V2.0.FINAL.WIN9XNT.INCL.KEYMAKER-CORE\CR-NBP2F.ZIP, En cuarentena, 1000000, 1561212719, 1.0.84253, C0A63EE37C07BABD5D0E372F, dds, 02808927, 9DEB9C3DA10B94447D0F735B0EB35447, 68A963E0F77083B7895EC01DDD3E608891CD2341C6C27BB7DE5800A4B1A4E8D5 MachineLearning/Anomalous.94%, L:\FIFA 2000\DIRECTX\DIRECTX\DPLAYSVR.EXE, En cuarentena, 0, 392687, 1.0.84253, , shuriken, , 19FC12FFFFC21CE136B4FEEB47D7105B, 13891C32E162250AD4978DC78018F3AA1958D2AFB0FF84E019B1B13BD2C17E10 Downloadadmin.Adware.Downloader.DDS, L:\JOY TO KEY\CBSIDLM-TR1_10A-JOYTOKEY-BP-75220348.EXE, En cuarentena, 1000002, 0, 1.0.84253, 1EA4ED3C16DDA2CFF7930388, dds, 02808927, 9F5119B4D8EAB88EC8B7CB2804EA7AF5, 85096A31802F5BD3279391D1CD2BDE58624D6E1C19DFA965B17683F3BBD118C9 PUP.Optional.OpenCandy.DDS, L:\CALL OF DUTY\CALL OF DUTY 4\XFIRE\XFIRE_INSTALLER_45862.EXE, En cuarentena, 1000002, 0, 1.0.84253, DDE3A258EE8DF6E6705195B6, dds, 02808927, 57F7883084AD41D274D748AEDDF9EF0C, 0862C276B1D8A99D5C8AAD32A97FD2D9E2D61568A3FE509FECBEA769AE7CD84D Malware.AI.3256384855, L:\LOS SIMS 3\15 LOS SIMS 3 CRIATURAS SOBRENATURALES (THE SIMS 3 SUPERNATURAL, EP07)\FLT-S3EN-WWW.INTERCAMBIOSVIRTUALES.ORG\FAIRLIGHT\GAME\BIN\KEYGEN.EXE, En cuarentena, 1000000, -1038582441, 1.0.84253, C4DB6CCDD0AD790EC2187D57, dds, 02808927, 6D2F9CA918C281620694D1C70F67CC77, DFE9D7F349782290CF0C6A137E8EACBBA009BCA1D81FC5CB8A2185CB4768FC8A Malware.Heuristic.2045, L:\CBKORP (15 JUEGOS + UTILIDADES)\SEGA_SMASH_PACK-CLS\CLSSMSH1.ZIP, En cuarentena, 1000001, 1163581, 1.0.84253, 0000000000000000000007FD, dds, 02808927, C7B9681D2B7228AC284EB8CD869F4264, 4E9BCA3DB06F758045BEAE6DA0A42BA11172978C421CAFB8A5C3979DFADF9EA6 MachineLearning/Anomalous.100%, L:\FIFA 2000\AUTORUN.EXE, En cuarentena, 0, 392687, 1.0.84253, , shuriken, , BA79A39ACF6EE91E20211DE28B9206CD, 82786E5B31556DAC310232E8D8BBFAF3284198534EDC829AFEF126EA0BE674B3 Malware.Heuristic.2048, L:\GRAND THEFT AUTO\GRAND THEFT AUTO - SAN ANDREAS (2004)\GTA SAN ANDREAS PC FULL ESP\HOODLUM\HLM-INTRO.EXE, En cuarentena, 1000001, 1163584, 1.0.84253, 000000000000000000000800, dds, 02808927, 6B1114186B8F261EA6759673B0A3E604, 71BE3455199987166D45759C33F88051D87288BE518D2FE14A48EE2EC00E1552 Crack.Trojan.HackTool.DDS, L:\GRID 2\RLD-GRID2\CRACK\STEAM_API.DLL, En cuarentena, 1000002, 0, 1.0.84253, 07D0891E67FF98DA7C20E151, dds, 02808927, 5BCDB7FD43FEB8FF65D32F613EE5126C, AC072CB85A79E96C9376FA7957A791856E65BCF423F8CB7FF963E05C513EBACD Malware.AI.3256384855, L:\LOS SIMS 3\18 LOS SIMS 3 MOVIDA EN LA FACULTAD (THE_SIMS_3_UNIVERSITY_LIFE-FLT, EP09)\FLT-S3UL-WWW.INTERCAMBIOSVIRTUALES.ORG\FAIRLIGHT\KEYGEN.EXE, En cuarentena, 1000000, -1038582441, 1.0.84253, C4DB6CCDD0AD790EC2187D57, dds, 02808927, 630BA972B03B7B09E9263687CF749360, 633F62C20F9F220792E2DC97B3B11713A279041A09277B8694EA4B5DD9F9B676 Generic.Malware/Suspicious, J:\SOFTWARE\EXPLORERS\UCBROWSER_V7.0.185.1002_WINDOWS_PF101_(BUILD18010215) (1) (2018_02_05 02_06_59 UTC).EXE, En cuarentena, 0, 392686, 1.0.84253, , shuriken, , 41F04143113A759524BD13993AFA4B8E, 76A40DC24A8AD150407F98ED0E69E68CC6481543DB7DA7C6615140805A07721F Generic.Malware/Suspicious, J:\SOFTWARE\SEGURIDAD+ANTIVIRUS\NORTON\NORTON INTERNET SECURITY\DOWNSERV.COM.NORTON IS 2013 20.2.0.19 360\NORT.AC\NORTON_TRIAL_RESET_2012_1.7A\NTR2012.EXE, En cuarentena, 0, 392686, 1.0.84253, , shuriken, , 5393E5F98962FD16D87700814BDE1EEB, 98362AC39301A58D6C2BC992BB0C65ABFC1BE6BFE552162D94F53EBE0BE721CD Malware.Heuristic.2090, L:\COMMANDOS - MAS ALLA DEL DEBER (EXPANSION)\COMAN_MP\COMAN_MP.ICD, En cuarentena, 1000001, 1199108, 1.0.84253, 00000000000000000000082A, dds, 02808927, 3856962E5198B2336F50E121B8182E0F, 7C29AED1E1D0E447319498057B30F81CF37F4FF28A9D4DB1A579E0676EC69237 Malware.Heuristic.2046, L:\COMMAND & CONQUER\COMMAND AND CONQUER 3 - TIBERIAN WARS\VARIOS\TIBERIAN WARS MAPS\KANE’S WRATH MAPS\TIMS_3_IN_1_KANES_WRATH_M0.EXE, En cuarentena, 1000001, 1163582, 1.0.84253, 0000000000000000000007FE, dds, 02808927, 139820271600DAE477BADFFA7FA70DA0, E280C3E55903A55D16F07B811315E3D2F5A9754DF3969FCDC94FCA70125D6A6D Malware.Heuristic.2090, L:\LOS SIMS 4\THE.SIMS.4.DIGITAL.DELUXE.EDITION-3DM\THE.SIMS.4.UPDATE.1.AND.CRACK-3DM\UPDATE\GAME\BIN\TS4.EXE, En cuarentena, 1000001, 1199108, 1.0.84253, 00000000000000000000082A, dds, 02808927, 278081C4A0F3A5D01C4E8E97C19D6339, F5AF964FB5F8651BE66654EE6E3D1075968FF0B1E82AD100EE202F023AA6D702 Malware.Heuristic.2090, L:\LOS SIMS 4\THE.SIMS.4.UPDATE.2.AND.CRACK.V5-3DM\THE.SIMS.4.UPDATE.2.AND.CRACK.V5-3DM\UPDATE\GAME\BIN\TS4.EXE, En cuarentena, 1000001, 1199108, 1.0.84253, 00000000000000000000082A, dds, 02808927, 96030CD50B8AE9B3F670265B92412D51, E3B1823FE4D6ED036749B977E149DD2B00140781FA7C5554F6383A1B9A938ECE Malware.Heuristic.2090, L:\DRAGON BALL 6 (17 JUEGOS)\MENU.EXE, En cuarentena, 1000001, 1199108, 1.0.84253, 00000000000000000000082A, dds, 02808927, B7C806E06D171488C777F94223050A26, 814948CE569F1F48F41EE791254A71D7373AF91CC164BEC4254F9D8AF8795B1C Malware.Heuristic.2090, L:\DRAGON BALL 5 (14 JUEGOS)\MENU.EXE, En cuarentena, 1000001, 1199108, 1.0.84253, 00000000000000000000082A, dds, 02808927, 830EBF2E97100FF19C9B8515DA1C436F, 15AFCCAFDC2B43B70EA071F22F36895DE5E2406BEC72684B7F8AC2792973DE4D Malware.Heuristic.2090, L:\LOS SIMS 4\THE SIMS 4\GAME\BIN\TS4.EXE, En cuarentena, 1000001, 1199108, 1.0.84253, 00000000000000000000082A, dds, 02808927, 52CAF70B13755B4919293E7DE6882C0C, 5C98EF223E4AC97CC68784DD4739B2383A13E0513F73D3F1B8548B4AABE2F264 Malware.Heuristic.2090, L:\LOS SIMS 4\THE.SIMS.4.DIGITAL.DELUXE.EDITION-3DM\THE SIMS 4\GAME\BIN\TS4.EXE, En cuarentena, 1000001, 1199108, 1.0.84253, 00000000000000000000082A, dds, 02808927, 0F753908825A25C742B77996D66A9B36, 2AEA96F9CED922AC3EF5FFC90156B97E1726BE93D6C1211CE3CCC13DDF4C7183

Sector físico: 0 (No hay elementos maliciosos detectados)

WMI: 0 (No hay elementos maliciosos detectados)

(end)

ESET:

06/05/2024 16:41:39 Archivos analizados: 1277197 Archivos detectados: 8 Archivos desinfectados: 5 Tiempo total de análisis 05:52:54 Estado del análisis: Finalizado C:\Program Files (x86)\IObit\IObit Unlocker\IObitUnlocker.sys a variant of Win64/IObitUnlocker.A potentially unsafe application cleaned by deleting

E:\JDownloaderSetup.exe a variant of Win32/Appwork.B potentially unwanted application cleaned by deleting

E:\utorrent_installer.exe a variant of Win32/OfferCore.E potentially unwanted application cleaned by deleting

E:\utweb_installer.exe a variant of Win32/OfferCore.E potentially unwanted application cleaned by deleting

J:$RECYCLE.BIN\S-1-5-21-953277430-3239005456-3853381122-1001$R24MQQ5.03_English\WinPE10_8_Sergei_Strelec_x86_x64_2022.01.03_English.iso multiple detections,Win32/EasySysPrep.F potentially unsafe application,Win32/Hidcon.A potentially unsafe application,Win32/RemoteAdmin.Ammyy.C potentially unsafe application,a variant of Win32/Auslogics.AA potentially unwanted application,a variant of Win32/AdapterWatch.A potentially unsafe application,a variant of Win64/BrowsingHistoryView.A potentially unsafe application,a variant of Win32/PSWTool.BulletsPassView.C potentially unsafe application,a variant of Win64/PSWTool.BulletsPassView.A potentially unsafe application,a variant of Win32/ChromeCookiesView.A potentially unsafe application,a variant of Win32/PSWTool.Agent.AI potentially unsafe application,a variant of Win64/PSWTool.CredentialsFileView.A potentially unsafe application,a variant of Win32/PSWTool.CredentialsFileView.A potentially unsafe application,a variant of Win32/PSWTool.CredentialsFileView.B potentially unsafe application,a variant of Win32/PSWTool.Dialupass.F potentially unsafe application,a variant of Win32/PSWTool.IEPassView.NAH potentially unsafe application,Win64/PSWTool.LsaSecretsDump.A potentially unsafe application,Win32/PSWTool.LsaSecretsDump.A potentially unsafe application,Win64/PSWTool.LsaSecretsDump.B potentially unsafe application,a variant of Win32/PSWTool.LsasView.AA potentially unsafe application,Win32/PSWTool.MailPassView.F potentially unsafe application,a variant of Win32/MPass.A potentially unsafe application,a variant of Win64/MozillaCookiesView.A potentially unsafe application,a variant of Win32/MozillaCookiesView.A potentially unsafe application,a variant of Win32/NetPass.AB potentially unsafe application,Win64/NetPass.C potentially unsafe application,Win32/PSWTool.OperaPassView potentially unsafe application,a variant of Win32/PSWTool.PassFox.I potentially unsafe application,Win64/PSWTool.PasswordFox.C potentially unsafe application,a variant of Win32/PSWTool.PCAnyPass.A potentially unsafe application,a variant of Win64/PSWTool.ProductKey.A potentially unsafe application,a variant of Win32/PSWTool.ProductKey.E potentially unsafe application,a variant of Win32/PSWTool.PstPassword.A potentially unsafe application,a variant of Win32/PSWTool.RDPassView.NAC potentially unsafe application,a variant of Win32/PSWTool.RouterPassView.B potentially unsafe application,a variant of Win32/SkypeContactsView.A potentially unsafe application,a variant of Win32/SkypeLogView.A potentially unsafe application,a variant of Win32/Sniffer.SniffPass.B potentially unsafe application,Win64/PSWTool.SniffPass.A potentially unsafe application,a variant of Win32/Sniffer.SniffPass.A potentially unsafe application,a variant of Win32/PSWTool.VNCPassView.A potentially unsafe application,a variant of Win32/PSWTool.WebBrowserPassView.J potentially unsafe application,a variant of Win32/WirelessKeyView.D potentially unsafe application,a variant of Win64/WirelessKeyView.E potentially unsafe application,a variant of Win32/PSWTool.WirelessNetView.A potentially unsafe application,a variant of Win32/WNetWatcher.A potentially unsafe application,a variant of Win32/RemoteAdmin.RemoteUtilities.W potentially unsafe application,Win32/AdRepack.A trojan,a variant of Win32/HackKMS.CG potentially unsafe application,a variant of Win32/uTorrent.C potentially unwanted application,Win64/Hidcon.A potentially unsafe application,a variant of Win64/EaseUS.B potentially unwanted application,Win32/HackTool.Agent.EV potentially unsafe application,a variant of Win64/MiniTool.B potentially unwanted application,Win64/Riskware.RecoverKeys.B application unable to clean

J:$RECYCLE.BIN\S-1-5-21-953277430-3239005456-3853381122-1001$RTJW9X8.04_English\WinPE10_8_Sergei_Strelec_x86_x64_2019.02.04_English.iso multiple detections,Win32/EasySysPrep.F potentially unsafe application,a variant of Win32/RemoteAdmin.Ammyy.B potentially unsafe application,a variant of Win32/Auslogics.AA potentially unwanted application,a variant of Win32/AdapterWatch.A potentially unsafe application,a variant of Win32/BrowsingHistoryView.A potentially unsafe application,a variant of Win64/BrowsingHistoryView.A potentially unsafe application,a variant of Win32/PSWTool.BulletsPassView.C potentially unsafe application,a variant of Win64/PSWTool.BulletsPassView.A potentially unsafe application,a variant of Win32/PSWTool.ChromePass.A potentially unsafe application,a variant of Win32/PSWTool.CredentialsFileView.A potentially unsafe application,a variant of Win64/PSWTool.CredentialsFileView.A potentially unsafe application,a variant of Win32/PSWTool.CredentialsFileView.B potentially unsafe application,a variant of Win32/PSWTool.Dialupass.F potentially unsafe application,Win32/PSWTool.IEPassView.NAH potentially unsafe application,Win64/PSWTool.LsaSecretsDump.A potentially unsafe application,Win32/PSWTool.LsaSecretsDump.A potentially unsafe application,Win64/PSWTool.LsaSecretsDump.B potentially unsafe application,a variant of Win32/PSWTool.LsasView.AA potentially unsafe application,a variant of Win32/PSWTool.MailPassView.E potentially unsafe application,a variant of Win32/MPass.A potentially unsafe application,a variant of Win64/MozillaCookiesView.A potentially unsafe application,a variant of Win32/MozillaCookiesView.A potentially unsafe application,a variant of Win32/NetPass.AA potentially unsafe application,a variant of Win64/NetPass.B potentially unsafe application,Win32/PSWTool.OperaPassView potentially unsafe application,a variant of Win32/PSWTool.PassFox.I potentially unsafe application,a variant of Win64/PSWTool.PasswordFox.A potentially unsafe application,a variant of Win32/PSWTool.WebBrowserPassView.C potentially unsafe application,a variant of Win32/PSWTool.PCAnyPass.A potentially unsafe application,a variant of Win32/PSWTool.ProductKey potentially unsafe application,a variant of Win64/PSWTool.ProductKey.A potentially unsafe application,a variant of Win32/PSWTool.PstPassword.A potentially unsafe application,a variant of Win32/PSWTool.RDPassView.NAC potentially unsafe application,a variant of Win32/PSWTool.RouterPassView.B potentially unsafe application,a variant of Win32/SkypeContactsView.A potentially unsafe application,a variant of Win32/SkypeLogView.A potentially unsafe application,a variant of Win32/Sniffer.SniffPass.B potentially unsafe application,Win64/PSWTool.SniffPass.A potentially unsafe application,a variant of Win32/Sniffer.SniffPass.A potentially unsafe application,a variant of Win32/PSWTool.VNCPassView.A potentially unsafe application,a variant of Win32/PSWTool.WebBrowserPassView.B potentially unsafe application,a variant of Win32/WirelessKeyView.A potentially unsafe application,a variant of Win64/WirelessKeyView.B potentially unsafe application,a variant of Win32/PSWTool.WirelessNetView.A potentially unsafe application,a variant of Win32/WNetWatcher.A potentially unsafe application,Win32/Hidcon.A potentially unsafe application,a variant of Win32/uTorrent.C potentially unwanted application,Win64/Hidcon.A potentially unsafe application,a variant of Win64/HackTool.Loader.B potentially unsafe application,a variant of Win32/HackTool.Agent_AGen.D potentially unsafe application,a variant of Win64/RecoverKeys.A potentially unsafe application,a variant of Win64/RecoverKeys.B potentially unsafe application,a variant of Win32/HackTool.Patcher.N potentially unsafe application,a variant of Win32/HackTool.Agent.DT potentially unsafe application,a variant of Win32/Packed.Autoit.NBT suspicious application,a variant of Win32/RecoverKeys.A potentially unsafe application,a variant of Win32/RecoverKeys.B potentially unsafe application,a variant of Win32/HackKMS_AGen.BR potentially unsafe application unable to clean

J:$RECYCLE.BIN\S-1-5-21-953277430-3239005456-3853381122-1001$RIRTMJG.iso Win32/HackTool.WinActivator.I potentially unsafe application unable to clean

J:\MUZIK\ELECTRÓNICA\TRACKS\ARCHITECT\Architect - Consume Adapt Create (2010)\EBM - INDUSTRIAL Terror Zone.htm JS/WidgetBox.A potentially unwanted application cleaned by deleting

Durante los análisis comentados no han surgido problemas. Cabe comentar, las detecciones y eliminaciones ó puestas en cuarentena, son instaladores para programas trucados, en los que se detecta alguna anomalía. He excluido ciertas detecciones, de programas que utilizo, estas son uTorrent y JDownloader, ya que estimo sea pueden llevar a contenido malicioso con código malicioso o alterado y utilizo bajo mí propia responsabilidad. Como comenté anteriormente en este post, no utilizo software alterado maliciosamente, los programas informáticos excluidos de las detecciones por mí parte y que tengo instalados, los nombra por contener a modo de patrocinio la opción de instalar otros programas informáticos durante su instalación. Las detecciones las he considerado falsos positivos, ya que son en este caso gestores de descargas los cuales se debe de utilizar bajo la responsabilidad del usuario.

En ocasiones surgen ‘bluescreen’ y debo reiniciar el equipo forzosamente ya que es su caso. La carpeta ‘Documentos’ continúa en otro idioma distinto al idioma utilizado, seleccionado en el sistema operativo.

El programa nVidia Geforce Experience tiene la opción de actualizar. He tratado de instalar la actualización de este ‘software’ por ambas vías, instalación rápida e instalación personalizada con la opción ‘instalación correcta’ tildada; y digo tratado ya que tras actualizar tres veces correctamente, dos vía ‘instalación personalizada’ con la opción ‘instalación correcta’ tildada, y una vez vía ‘instalación rápida’, las tres veces dicho ‘software’ me recomienda de nuevo actualizarse. Aunque sigue funcionando correctamente la versión instalada, de dicho ‘software’, salvo la opción de ‘configuración óptima’ para algunos programas instalados en el dispositivo y detectados por este ‘software’, nVidia Geforce Experience.

Saludos cordiales. @razlasasz