Buenas, ya hice todo, tiene buena pinta, gracias!
Adjunto los reportes
Malwarebytes
www.malwarebytes.com
-Detalles del registro-
Fecha del análisis: 16/1/22
Hora del análisis: 8:53
Archivo de registro: e8548fac-76c2-11ec-b136-74d4357507cb.json
-Información del software-
Versión: 4.5.0.152
Versión de los componentes: 1.0.1538
Versión del paquete de actualización: 1.0.49881
Licencia: Prueba
-Información del sistema-
SO: Windows 10 (Build 19043.1466)
CPU: x64
Sistema de archivos: NTFS
Usuario: Damián-PC\Damián
-Resumen del análisis-
Tipo de análisis: Análisis personalizado
Análisis iniciado por:: Manual
Resultado: Completado
Objetos analizados: 1254655
Amenazas detectadas: 10
Amenazas en cuarentena: 10
Tiempo transcurrido: 6 hr, 55 min, 2 seg
-Opciones de análisis-
Memoria: Activado
Inicio: Activado
Sistema de archivos: Activado
Archivo: Activado
Rootkits: Desactivado
Heurística: Activado
PUP: Detectar
PUM: Detectar
-Detalles del análisis-
Proceso: 0
(No hay elementos maliciosos detectados)
Módulo: 0
(No hay elementos maliciosos detectados)
Clave del registro: 0
(No hay elementos maliciosos detectados)
Valor del registro: 0
(No hay elementos maliciosos detectados)
Datos del registro: 0
(No hay elementos maliciosos detectados)
Secuencia de datos: 0
(No hay elementos maliciosos detectados)
Carpeta: 0
(No hay elementos maliciosos detectados)
Archivo: 10
CrackTool.Agent, D:\ADOBE ILLUSTRATOR CC 2017 V22.0.0 X64\ACTIVADOR\AMT EMULATOR 0.9.2.RAR, En cuarentena, 5774, 445980, 1.0.49881, 9082695A2E6099F583AC763F, dds, 01600459, 522AA0D40216167E0A28CF17038A7751, D60A52A955A718C3E9C9D157AF0FA49132064AAD980536FD6F7E65320A5825AA
Generic.Malware/Suspicious, D:\PENDRIVE 30 09 2020\3DP_CHIP_LITE_V2008.EXE, En cuarentena, 0, 392686, 1.0.49881, , shuriken, , 93DCCF9ED00D6CE5AE5B2418D708D224, C79FC13A326355C606332E29AC093FD6870D1154C3C72D127321CE03FF9E59BB
Generic.Malware/Suspicious, D:\PENDRIVE 30 09 2020\3DP_CHIP_LITE_V2009.EXE, En cuarentena, 0, 392686, 1.0.49881, , shuriken, , 67A678C1A658B1A28B37120D4C8386D5, C7BE9824A83B06E7F5A0BA51673E10FB0A6E2FF35D6F137CF0186FC21370CABD
Malware.Heuristic.1003, D:\PROGRAM FILES (X86)\ELECTRONIC ARTS\ALICE MADNESS RETURNS - THE COMPLETE COLLECTION\GAME\ALICE2\BINARIES\WIN32\RLD.DLL, En cuarentena, 1000001, 0, 1.0.49881, 0000000000000000000003EB, dds, 01600459, 5514B0BB1E2E04C97D1FB1FBC4CB8F08, 907B0F30D17C9B6AE1A77A2B6F56401463BF27186B9CA706F4187D99FF15425F
Malware.Heuristic.1003, D:\SAMURAI.SHODOWN.V.SPECIAL\CRACK ONLINE\STEAM_API.DLL, En cuarentena, 1000001, 0, 1.0.49881, 0000000000000000000003EB, dds, 01600459, 6A796C90DF769BBD9028D75B00724394, 120BE46B5A8D2E0C5E65064DF086F8A57C38CBFDC9765BD9DB19263783D3A744
Malware.Heuristic.1003, D:\SAMURAI.SHODOWN.V.SPECIAL\SAMURAI SHODOWN V SPECIAL\STEAM_API.DLL, En cuarentena, 1000001, 0, 1.0.49881, 0000000000000000000003EB, dds, 01600459, 6A796C90DF769BBD9028D75B00724394, 120BE46B5A8D2E0C5E65064DF086F8A57C38CBFDC9765BD9DB19263783D3A744
Malware.AI.3476172872, C:\N++\ONLINEFIX.DLL, En cuarentena, 1000000, 0, 1.0.49881, 88783E66C19EFD2FCF323048, dds, 01600459, 3A3A93B25D15CEB7DACB2DCF0A04B4D9, 740B74A7024E96E07028899E6155A5BD30A5D23C258C90AEC74B99D53E6A51D4
Malware.Heuristic.1003, C:\SUPER BOMBERMAN R\SUPERBOMBERMANR_DATA\PLUGINS\STEAM_API.DLL, En cuarentena, 1000001, 0, 1.0.49881, 0000000000000000000003EB, dds, 01600459, 6A796C90DF769BBD9028D75B00724394, 120BE46B5A8D2E0C5E65064DF086F8A57C38CBFDC9765BD9DB19263783D3A744
Malware.Sandbox.7, C:\USERS\DAMIáN\APPDATA\LOCAL\TACTICSTECHNOLOGY\SUPERNOVA\VERSIONS\0.0.0\SUPERNOVA LAUNCHER.EXE, En cuarentena, 7, 0, 1.0.49881, 7, dds, 01600459, A35D5F372F46820311C59840EBA6FFFB, EAD1DCFD124FE9005917B375EBC950A9770C49C218236EDA7B46C680C015354F
Malware.Heuristic.1003, C:\USERS\DAMIáN\DOWNLOADS\NE RO BY ELDE1026\NE.RO.BY.ELDE1026\BURNINGROMPORTABLE\APP\BURNINGROM\FFMPEG\AVCODEC-56.DLL, En cuarentena, 1000001, 0, 1.0.49881, 0000000000000000000003EB, dds, 01600459, BBFF950C167C1C690B29CA9A1BEEB7A3, 927694B94A19A0155A062104D16978DED818179CDBF5E7E267FCABA48EBCF560
Sector físico: 0
(No hay elementos maliciosos detectados)
WMI: 0
(No hay elementos maliciosos detectados)
(end)
# -------------------------------
# Malwarebytes AdwCleaner 8.3.1.0
# -------------------------------
# Build: 11-18-2021
# Database: 2021-12-02.1 (Cloud)
# Support: https://www.malwarebytes.com/support
#
# -------------------------------
# Mode: Clean
# -------------------------------
# Start: 01-16-2022
# Duration: 00:00:03
# OS: Windows 10 Pro
# Cleaned: 36
# Failed: 0
***** [ Services ] *****
No malicious services cleaned.
***** [ Folders ] *****
Deleted C:\ProgramData\Microsoft\Windows\Start Menu\Programs\mipony
Deleted C:\Users\Damián\AppData\Roaming\mipony
***** [ Files ] *****
Deleted C:\Users\Damián\AppData\Roaming\Mozilla\Firefox\Profiles\oiq5ml40.default\invalidprefs.js
***** [ DLL ] *****
No malicious DLLs cleaned.
***** [ WMI ] *****
No malicious WMI cleaned.
***** [ Shortcuts ] *****
No malicious shortcuts cleaned.
***** [ Tasks ] *****
Deleted C:\Windows\System32\Tasks\PRODUCT UPDATER
***** [ Registry ] *****
Deleted HKCU\Software\Lavasoft\Web Companion
Deleted HKCU\Software\Microsoft\Internet Explorer\Main|Start Page
Deleted HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\webcompanion.com
Deleted HKCU\Software\drpsu
Deleted HKCU\Software\infoSiw
Deleted HKCU\Software\win
Deleted HKLM\SOFTWARE\Classes\AppID\NCTAudioCDGrabber2.DLL
Deleted HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{7D44BAE4-5EF0-4B7D-AB8E-B05711BB4588}
Deleted HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Product Updater
Deleted HKLM\Software\Classes\Interface\{2BEF239C-752E-4001-8048-F256E0D8CD93}
Deleted HKLM\Software\Classes\Interface\{3F607E46-0D3C-4442-B1DE-DE7FA4768F5C}
Deleted HKLM\Software\Classes\Interface\{49C00A51-6E59-41FE-B3FA-2D2157FAD67B}
Deleted HKLM\Software\Classes\Interface\{6DFF5DBA-AE3A-46DB-B301-ECFFC6DB2982}
Deleted HKLM\Software\Classes\Interface\{DE34CD67-F1C8-4001-9A23-B8A68F63F377}
Deleted HKLM\Software\Classes\Interface\{FE0273D1-99DF-4AC0-87D5-1371C6271785}
Deleted HKLM\Software\Classes\TypeLib\{81CA8FCD-1420-4A07-B47D-B30F3DDA79E1}
Deleted HKLM\Software\Classes\TypeLib\{93E3D79C-0786-48FF-9329-93BC9F6DC2B3}
Deleted HKLM\Software\Microsoft\Shared Tools\MSConfig\startupreg\Opera GX Browser Assistant
Deleted HKLM\Software\Wow6432Node\Lavasoft\Web Companion
Deleted HKLM\Software\Wow6432Node\\Classes\AppID\NCTAudioCDGrabber2.DLL
Deleted HKLM\Software\Wow6432Node\\Classes\CLSID\{35B8892D-C3FB-4D88-990D-31DB2EBD72BD}
Deleted HKLM\Software\Wow6432Node\\Classes\CLSID\{5EB0259D-AB79-4AE6-A6E6-24FFE21C3DA4}
Deleted HKLM\Software\Wow6432Node\\Classes\CLSID\{8BF0126F-A5B7-4720-ABB2-2414A0AF5474}
Deleted HKLM\Software\Wow6432Node\\Classes\CLSID\{CADAF6BE-BF50-4669-8BFD-C27BD4E6181B}
Deleted HKLM\Software\Wow6432Node\\Classes\Interface\{2BEF239C-752E-4001-8048-F256E0D8CD93}
Deleted HKLM\Software\Wow6432Node\\Classes\Interface\{3F607E46-0D3C-4442-B1DE-DE7FA4768F5C}
Deleted HKLM\Software\Wow6432Node\\Classes\Interface\{49C00A51-6E59-41FE-B3FA-2D2157FAD67B}
Deleted HKLM\Software\Wow6432Node\\Classes\Interface\{6DFF5DBA-AE3A-46DB-B301-ECFFC6DB2982}
Deleted HKLM\Software\Wow6432Node\\Classes\Interface\{DE34CD67-F1C8-4001-9A23-B8A68F63F377}
Deleted HKLM\Software\Wow6432Node\\Classes\Interface\{FE0273D1-99DF-4AC0-87D5-1371C6271785}
Deleted HKLM\Software\Wow6432Node\\Classes\TypeLib\{81CA8FCD-1420-4A07-B47D-B30F3DDA79E1}
Deleted HKLM\Software\Wow6432Node\\Classes\TypeLib\{93E3D79C-0786-48FF-9329-93BC9F6DC2B3}
***** [ Chromium (and derivatives) ] *****
No malicious Chromium entries cleaned.
***** [ Chromium URLs ] *****
No malicious Chromium URLs cleaned.
***** [ Firefox (and derivatives) ] *****
No malicious Firefox entries cleaned.
***** [ Firefox URLs ] *****
No malicious Firefox URLs cleaned.
***** [ Hosts File Entries ] *****
No malicious hosts file entries cleaned.
***** [ Preinstalled Software ] *****
No Preinstalled Software cleaned.
*************************
[+] Delete Tracing Keys
[+] Reset Winsock
*************************
AdwCleaner[S00].txt - [4961 octets] - [16/01/2022 19:28:32]
########## EOF - C:\AdwCleaner\Logs\AdwCleaner[C00].txt ##########