• Registrarse
  • Iniciar sesión


  • Página 2 de 2 PrimeroPrimero 12
    Resultados 11 al 12 de 12

    Imposible instalar Malwarebytes: "Runtime Error (at 49:120. Could not call proc)".

    Quedo a la espera. Gracias...

    1. #11
      Usuario Avatar de OscarParra
      Registrado
      jun 2017
      Ubicación
      España
      Mensajes
      8

      Re: Imposible instalar Malwarebytes: "Runtime Error (at 49:120. Could not call proc)"

      Quedo a la espera. Gracias

    2. #12
      Warrior Avatar de @Miguelgrado
      Registrado
      dic 2005
      Ubicación
      Asturias-España
      Mensajes
      18.142

      Re: Imposible instalar Malwarebytes: "Runtime Error (at 49:120. Could not call proc)"

      Realiza lo siguiente por favor:

      En el equipo con los demas programas cerrados:
      Inicio >>> Ejecutar >>>Escribes notepad.exe.

      Ahora copia y pega estos archivos dentro del Notepad: (Se excluye la palabra código)
      Código:
      Start
      CreateRestorePoint:
      CloseProcesses:
      
      HKU\S-1-5-21-3509043553-72246325-1224621064-1004\...\MountPoints2: O - O:\autorun.exe
      HKU\S-1-5-21-3509043553-72246325-1224621064-1004\...\MountPoints2: {711e76d1-7cb1-11e3-9275-aaa1ab37a80b} - L:\CTRun\Start.EXE
      HKU\S-1-5-21-3509043553-72246325-1224621064-1004\...\MountPoints2: {b409750e-b853-11e4-97de-ddb09061d2bd} - "H:\WD SmartWare.exe" autoplay=true
      HKU\S-1-5-21-3509043553-72246325-1224621064-1004\...\MountPoints2: {c6e830b2-1b09-11e5-8c87-001a7dda710f} - K:\autorun.exe
      HKU\S-1-5-21-3509043553-72246325-1224621064-1004\...\MountPoints2: {e99ea66a-6c60-11e2-80bd-bd4c198d7847} - H:\Setup.exe
      GroupPolicy: Restriction - Chrome <==== ATTENTION
      CHR HKLM\SOFTWARE\Policies\Google: Restriction <==== ATTENTION
      HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Search Page =
      HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Search_URL = 
      SearchScopes: HKLM -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL =
      SearchScopes: HKLM-x32 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL =
      SearchScopes: HKU\S-1-5-19 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL =
      SearchScopes: HKU\S-1-5-20 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL =
      BHO: No Name -> {2E38825B-8815-42CF-9126-C58BC28D4591} -> No File
      BHO: No Name -> {DBC80044-A445-435b-BC74-9C25C1C588A9} -> No File
      Toolbar: HKLM - No Name - {093F479D-712E-46CD-9E06-62E734A05F68} - No File
      Toolbar: HKU\.DEFAULT -> No Name - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - No File
      Toolbar: HKU\S-1-5-21-3509043553-72246325-1224621064-1000 -> No Name - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - No File
      Toolbar: HKU\S-1-5-21-3509043553-72246325-1224621064-1004 -> No Name - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - No File
      FF Homepage: Mozilla\Firefox\Profiles\lp1ppwb1.default -> hxxps://www.malwarebytes.org/restorebrowser/_fs_16_30&param1=1&param2=f%3D1%26b%3DFirefox%26cc%3Des%26pa%3DWincy%26cd%3D2XzuyEtN2Y1L1Qzu0B0CyD0F0FyEyEyDzzyDyDtD0E0EyDtCtN0D0Tzu0StCyCyBtAtN1L2XzutAtFtBtBtFtAtFtDtN1L1Czu1ByEtN1L1G1B1V1N2Y1L1Qzu2StCtDyE0A0FyDtCtBtGtBzz0CzytG0F0CyD0CtGtAtBtCtCtGyEzz0DzzyC0E0A0AtD0EtA0A2QtN1M1F1B2Z1V1N2Y1L1Qzu2S0E0E0AyE0AtDtA0FtGtB0CtAtAtGyE0A0B0CtGzytCtD0CtG0C0A0BzzyB0EtA0F0D0DyE0F2QtN0A0LzuyEtN1B2Z1V1T1S1NzutBtAtDtC%26cr%3D1677167280%26a%3Dwncy_fs_16_30%26os_ver%3D6.1%26os%3DWindows%2B7%2BUltimate
      FF Extension: (TSearch) - C:\Program Files (x86)\Mozilla Firefox\browser\features\{D29DBC80-E8B5-4116-AB62-ECD8ED032A33} [2017-06-28] [not signed]
      FF Plugin-x32: @foxitsoftware.com/Foxit Reader Plugin,version=1.0,application/pdf -> C:\Program Files (x86)\Foxit Software\Foxit Reader\plugins\npFoxitReaderPlugin.dll [2017-04-06] (Foxit Corporation)
      FF Plugin-x32: @foxitsoftware.com/Foxit Reader Plugin,version=1.0,application/vnd.fdf -> C:\Program Files (x86)\Foxit Software\Foxit Reader\plugins\npFoxitReaderPlugin.dll [2017-04-06] (Foxit Corporation)
      FF Plugin-x32: @foxitsoftware.com/Foxit Reader Plugin,version=1.0,application/vnd.xdp -> C:\Program Files (x86)\Foxit Software\Foxit Reader\plugins\npFoxitReaderPlugin.dll [2017-04-06] (Foxit Corporation)
      FF Plugin-x32: @foxitsoftware.com/Foxit Reader Plugin,version=1.0,application/vnd.xfdf -> C:\Program Files (x86)\Foxit Software\Foxit Reader\plugins\npFoxitReaderPlugin.dll [2017-04-06] (Foxit Corporation)
      FF Plugin-x32: @videolan.org/vlc,version=2.0.5 -> C:\Program Files (x86)\VideoLAN\VLC\npvlc.dll [2017-05-24] (VideoLAN)
      FF Plugin-x32: @videolan.org/vlc,version=2.1.2 -> C:\Program Files (x86)\VideoLAN\VLC\npvlc.dll [2017-05-24] (VideoLAN)
      FF Plugin-x32: @videolan.org/vlc,version=2.1.3 -> C:\Program Files (x86)\VideoLAN\VLC\npvlc.dll [2017-05-24] (VideoLAN)
      FF Plugin-x32: @videolan.org/vlc,version=2.1.5 -> C:\Program Files (x86)\VideoLAN\VLC\npvlc.dll [2017-05-24] (VideoLAN)
      FF Plugin-x32: @videolan.org/vlc,version=2.2.1 -> C:\Program Files (x86)\VideoLAN\VLC\npvlc.dll [2017-05-24] (VideoLAN)
      FF Plugin-x32: @videolan.org/vlc,version=2.2.4 -> C:\Program Files (x86)\VideoLAN\VLC\npvlc.dll [2017-05-24] (VideoLAN)
      FF ExtraCheck: C:\Program Files (x86)\mozilla firefox\browser\defaults\preferences\prefs.js [2015-08-31] <==== ATTENTION (Points to *.cfg file)
      CHR HomePage: Default -> hxxp://www.sweet-page.com/?type=hp&ts=1428754548&from=cor&uid=ST2000DM001-1CH164_Z1E5EKZHXXXXZ1E5EKZH
      CHR Extension: (Chrome Media Router) - C:\Users\DLMDSKTP\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm [2017-06-30]
      CHR HKLM\...\Chrome\Extension: [fhoibnponjcgjgcnfacekaijdbbplhib] - hxxps://chrome.google.com/webstore/detail/fhoibnponjcgjgcnfacekaijdbbplhib
      CHR HKLM\...\Chrome\Extension: [ngpampappnmepgilojfohadhhmbhlaek] - C:\Program Files (x86)\Internet Download Manager\IDMGCExt.crx <not found>
      CHR HKLM-x32\...\Chrome\Extension: [fhoibnponjcgjgcnfacekaijdbbplhib] - hxxps://chrome.google.com/webstore/detail/fhoibnponjcgjgcnfacekaijdbbplhib
      S3 catchme; \??\C:\ComboFix\catchme.sys [X]
      S4 kltap; system32\DRIVERS\kltap.sys [X]
      S3 ksaud; system32\drivers\ksaud.sys [X]
      2017-07-01 09:18 - 2017-07-01 09:21 - 00000000 ____D C:\Program Files (x86)\kakakaka
      2017-07-01 09:04 - 2012-09-08 18:58 - 00000000 ____D C:\ProgramData\AVAST Software
      C:\ProgramData\SMRResults501.dat
      2017-06-29 23:26 - 2015-12-31 14:00 - 00000000 ____D C:\ProgramData\Avg
      2017-06-29 23:26 - 2015-12-31 14:00 - 00000000 ____D C:\Program Files (x86)\AVG
      2017-06-30 09:34 - 2013-11-25 01:37 - 00000000 ____D C:\Program Files (x86)\Spybot - Search & Destroy 2
      Task: {714CE5F2-4FC8-448C-88FD-4C0F7F18D213} - System32\Tasks\{D00E776A-E38B-4E24-B975-F72B77300A61} => pcalua.exe -a C:\Users\DLMDSKTP\AppData\Local\Temp\~vis0000\vcredist_x86.exe -d C:\Users\DLMDSKTP\AppData\Local\Temp\~vis0000 -c /q:a <==== ATTENTION
      Task: {9E8F7BEF-F4D9-4C81-8C32-B0B0E06D4ECC} - System32\Tasks\WMS Total Security => Rundll32.exe "C:\Program Files\WMS Total Security\WMS Total Security.dll",IhZWdMZFHr <==== ATTENTION
      C:\Program Files\WMS Total Security
      Task: {F8E4A62C-DD01-45E0-99FF-DFCA3B0D0B7D} - System32\Tasks\{399CF70F-0A61-4DE7-86F8-68B925AB48DB} => pcalua.exe -a "C:\Program Files\JoeAlter\shaveHaircut\maya2012\Uninstall.exe" -c "C:\Program Files\JoeAlter\shaveHaircut\maya2012\install.log" -u
      C:\Program Files\JoeAlter
      ShortcutWithArgument: C:\Users\DLMDSKTP\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Aplicaciones de Chrome\Escritorio Remoto de Chrome.lnk -> C:\Program Files (x86)\Google\Chrome\Application\chrome.exe (Google Inc.) -> --profile-directory=Default --app-id=gbchcmhmhahfdphkhkmpfmihenigjmpp
      ShortcutWithArgument: C:\Users\DLMDSKTP\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Aplicaciones de Chrome\WhatsChrome.lnk -> C:\Program Files (x86)\Google\Chrome\Application\chrome.exe (Google Inc.) -> --profile-directory=Default --app-id=bgkodfmeijboinjdegggmkbkjfiagaan
      AlternateDataStreams: C:\ProgramData:482EE99B1E21CE8C [217]
      AlternateDataStreams: C:\Users\All Users:482EE99B1E21CE8C [217]
      AlternateDataStreams: C:\ProgramData\Application Data:482EE99B1E21CE8C [217]
      AlternateDataStreams: C:\ProgramData\Microsoft:0GWN4OgWtolVD6HzoA5eQ [2576]
      AlternateDataStreams: C:\ProgramData\Microsoft:2mwiBf5xldsCGRS8Af0Y9CNu [2112]
      AlternateDataStreams: C:\ProgramData\Microsoft:4WNqStOCDcW3ysojv2ld [2676]
      AlternateDataStreams: C:\ProgramData\Microsoft:7pDwo5AJk27u7lM0VLjKsNd [2730]
      AlternateDataStreams: C:\ProgramData\Microsoft:9N0fuze9dbJBFLdxApZT [2960]
      AlternateDataStreams: C:\ProgramData\Microsoft:B9H7KriWilJzowELr6jCza9e [2368]
      AlternateDataStreams: C:\ProgramData\Microsoft:byyvFHe78DroXsjRbI [2736]
      AlternateDataStreams: C:\ProgramData\Microsoft:GR1ENLSwU1DidWxe11u [2708]
      AlternateDataStreams: C:\ProgramData\Microsoft:IcwcdF6LuNI4GV20xzUsY [2724]
      AlternateDataStreams: C:\ProgramData\Microsoft:JFL5Oyk9h9bn84ziaeToU4HifRY [2882]
      AlternateDataStreams: C:\ProgramData\Microsoft:Jv9p8rnUpGtd9JQwOcjWnM4ym [2450]
      AlternateDataStreams: C:\ProgramData\TEMP:1AAB2E68 [119]
      AlternateDataStreams: C:\ProgramData\TEMP:2B600C25 [292]
      AlternateDataStreams: C:\ProgramData\TEMP:5C321E34 [120]
      AlternateDataStreams: C:\ProgramData\TEMP:6DDED7D9 [149]
      AlternateDataStreams: C:\ProgramData\TEMP:B755D674 [270]
      AlternateDataStreams: C:\ProgramData\TEMP:CD30FA91 [127]
      AlternateDataStreams: C:\ProgramData\TEMP:D5FBE8F9 [164]
      AlternateDataStreams: C:\Users\DLMDSKTP\Cookies:uP2eI9GQ0Ia99YToYWynmsHmq [2830]
      AlternateDataStreams: C:\Users\DLMDSKTP\Local Settings:tyYfwubrjPw7rzaDThMScmL [2168]
      AlternateDataStreams: C:\Users\DLMDSKTP\Local Settings:XNMlMovGdMftQ68hcLrlFAk63 [2192]
      AlternateDataStreams: C:\Users\DLMDSKTP\Downloads\2015 ESPINA DE DIOS,LA Informe MYSTICAL FILMS SLU.pdf:com.dropbox.attributes [168]
      AlternateDataStreams: C:\Users\DLMDSKTP\AppData\Local:tyYfwubrjPw7rzaDThMScmL [2168]
      AlternateDataStreams: C:\Users\DLMDSKTP\AppData\Local:XNMlMovGdMftQ68hcLrlFAk63 [2192]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\ANTO1.jpg:com.dropbox.attributes [426]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\ANTO2.jpg:com.dropbox.attributes [416]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\ANTO3.jpg:com.dropbox.attributes [422]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\ANTO4.jpg:com.dropbox.attributes [424]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\ANTO5.jpg:com.dropbox.attributes [213]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\ANTO6.jpg:com.dropbox.attributes [426]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\ANTO_P1.jpg:com.dropbox.attributes [422]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\ANTO_P2.jpg:com.dropbox.attributes [428]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\ANTO_SHORT.jpg:com.dropbox.attributes [416]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\CAMISETA_AMARILLA_VICTORIA.jpg:com.dropbox.attributes [414]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\CAMISETA_AZUL_VICTORIA.jpg:com.dropbox.attributes [210]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\CAMISETA_ROJA_VICTORIA.jpg:com.dropbox.attributes [418]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\CAMISETA_SIRENITA_VICTORIA.jpg:com.dropbox.attributes [416]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\CORBATA_LJ_NARANJA.jpg:com.dropbox.attributes [424]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\CORBATA_RAMON_AMARILLA.jpg:com.dropbox.attributes [420]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\CORBATA_RAMON_AZUL.jpg:com.dropbox.attributes [212]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\CORBATA_RAMON_ROJA.jpg:com.dropbox.attributes [422]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\CORBATA_RAMON_ROSA.jpg:com.dropbox.attributes [213]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\DAMIAN1.jpg:com.dropbox.attributes [420]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\DAMIAN2.jpg:com.dropbox.attributes [426]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\DAMIAN3.jpg:com.dropbox.attributes [212]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\DAMIAN4.jpg:com.dropbox.attributes [418]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\DAMIAN5.jpg:com.dropbox.attributes [424]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\DAMIAN6.jpg:com.dropbox.attributes [424]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\DAMIAN_P1.jpg:com.dropbox.attributes [426]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\DAMIAN_SHORT.jpg:com.dropbox.attributes [422]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\GAFAS_GEMA_ROSAS.jpg:com.dropbox.attributes [420]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\GAFAS_MELEN.jpg:com.dropbox.attributes [426]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\GAFAS_ROSENDO.jpg:com.dropbox.attributes [424]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\GAFAS_VICTORIA_1.jpg:com.dropbox.attributes [208]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\GEMA_CAMISETA.jpg:com.dropbox.attributes [416]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\GEMA_FALDA.jpg:com.dropbox.attributes [426]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\LUISJOSE1.jpg:com.dropbox.attributes [420]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\LUISJOSE2.jpg:com.dropbox.attributes [424]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\LUISJOSE3.jpg:com.dropbox.attributes [212]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\LUISJOSE_COMP_1.jpg:com.dropbox.attributes [212]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\LUISJOSE_TIRANTES.jpg:com.dropbox.attributes [422]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\LUISJO_CORBATA_NEGRA.jpg:com.dropbox.attributes [211]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\LUISJO_CORBATA_SPAIN.jpg:com.dropbox.attributes [422]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\LUISJ_P1.jpg:com.dropbox.attributes [416]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\MALLA_BLANCA_VICTORIA.jpg:com.dropbox.attributes [422]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\MALLA_NEGRA_VICTORIA.jpg:com.dropbox.attributes [211]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\MONO_VICTORIA.jpg:com.dropbox.attributes [206]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\POLAR1.jpg:com.dropbox.attributes [418]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\POLAR2.jpg:com.dropbox.attributes [424]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\POLAR3.jpg:com.dropbox.attributes [416]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\POLAR4.jpg:com.dropbox.attributes [212]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\POLAR5.jpg:com.dropbox.attributes [426]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\POLAR_CALZ1.jpg:com.dropbox.attributes [426]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\POLAR_COMP_1.jpg:com.dropbox.attributes [206]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\POLAR_COMP_2.jpg:com.dropbox.attributes [416]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\POLAR_P1.jpg:com.dropbox.attributes [428]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\POLAR_P2.jpg:com.dropbox.attributes [428]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\POLAR_SHORT.jpg:com.dropbox.attributes [428]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\RAMON_CORBATA_NEGRA.jpg:com.dropbox.attributes [426]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\RAMON_TIRANTES.jpg:com.dropbox.attributes [424]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\ROSENDO1.jpg:com.dropbox.attributes [418]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\ROSENDO2.jpg:com.dropbox.attributes [212]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\ROSENDO3.jpg:com.dropbox.attributes [420]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\ROSENDO4.jpg:com.dropbox.attributes [428]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\ROSENDO5.jpg:com.dropbox.attributes [426]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\ROSENDO6.jpg:com.dropbox.attributes [422]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\ROSENDO_SHORT.jpg:com.dropbox.attributes [211]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\ROSEN_P1.jpg:com.dropbox.attributes [426]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\ROSEN_P2.jpg:com.dropbox.attributes [422]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\SANTIAGO1.jpg:com.dropbox.attributes [424]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\SANTIAGO2.jpg:com.dropbox.attributes [211]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\SANTIAGO3.jpg:com.dropbox.attributes [424]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\SANTIAGO_SHORT.jpg:com.dropbox.attributes [213]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\SANTI_COMP_1.jpg:com.dropbox.attributes [412]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\VICTORIA_CADENAS.jpg:com.dropbox.attributes [424]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\VICTORIA_PANT_AMARILLO.jpg:com.dropbox.attributes [420]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\VICTORIA_PANT_VERDE.jpg:com.dropbox.attributes [416]
      AlternateDataStreams: C:\Users\DLMDSKTP\Documents\VICTORIA_PENDIENTES.jpg:com.dropbox.attributes [426]
      
       
      
      HOSTS:
      REMOVEPROXY:
      EMPTYTEMP:
      CMD: netsh winsock reset
      CMD: ipconfig /renew
      CMD: ipconfig /flushdns
      CMD: bitsadmin /reset /allusers
      END
      Lo guardas bajo el nombre de fixlist.txt en el escritorio <<< Esto es muy importante.<<

      Nota: Es importante que la Hta Frst.exe y fixlist.txt se encuentren en la misma ubicación (escritorio) o si no no trabajara.
      Ejecutas Frst.exe.

      Presionas el botón Fix y aguardas a que termine.
      La Herramienta guardara el reporte en tu escritorio (Fixlog.txt).
      ATENCION!!!! El siguiente Script de reparación fue hecho específicamente por un miembro del staff para este usuario, si tiene un problema similar por favor abra su propio tema para recibir ayuda personalizada. Usar Scripts de otros usuarios puede causar daños a su equipo
      Lo pegas en tu próxima respuesta, yademas:


      Actualizas Firefox a la ultima version >> https://support.mozilla.org/es/kb/ac...ultima-version




      Ejecutas:


      Descarga >> https://www.infospyware.com/antispyware/adwcleaner y colócalo en el escritorio:


      - Ejecútalo con todos los programas cerrados y con el antivirus deshabilitado >>Cómo deshabilitar temporalmente su Antivirus.
      - Si usas Windows Vista/ W 7/W 8, ejecútalo como administrador. (Botón derecho >> Ejecutar como Administrador) , aceptas la licencia (j’acepte) ..


      Presionas y das en Escanear y esperas a que el programa haga lo suyo.
      Ejecutamos Limpiar para realizar la limpieza y si nos pide reiniciar el pc lo hacemos.

      - Al terminar se abrirá un reporte en un archivo de texto, cuyo contenido deberás copiar y pegar en tu próxima respuesta.


      El reporte se encuentra también en C:\AdwCleaner- AdwCleaner[CX].txt


      Paso 1.-: Descarga Malwarebytes Anti-Rootkit Beta >>Malwarebytes Anti-Rootkit | InfoSpyware y descomprima el contenido en su escritorio
      Paso 2.- : Desactiva tu antivirus >> Cómo deshabilitar temporalmente su Antivirus

      Abra la carpeta Mbar. Doble clic en el archivo Mbar.exe
      • En la interfaz del programa haga clic en Next.
      • Haga clic en el botón Update. Terminando clic en Next
      • Para iniciar el análisis clic en el botón Scan
      • Terminando, si hay infección clic en CleanUp, si no hay, clic en Exit.


      Al finalizar abra la carpeta Mbar, los archivos mbar-log.txt , copie y pegue todo su contenido en la siguiente respuesta y comentando los resultados.


      Me pegas logs de Fabar (fixlog..), Adwcleaner y Mbar
      * Síguenos en nuestro Twitter y hazte nuestro amigo en Facebook.
      * Infórmate de las ultimas amenazas de la red desde: InfoSpyware Blog
      * No se resuelven dudas por Privados ni por E-mail, ya que para eso esta el foro.

    Página 2 de 2 PrimeroPrimero 12