Thank you for your prompt response and attention. It follows the malwarebytes log it encountered 116 threats form all quarantined.
Malwarebytes
www.malwarebytes.com-Detalhes de registro-
Data da análise: 21/11/2018
Hora da análise: 17:38
Arquivo de registro: f6750f92-edc4-11e8-ac91-3497f68ea388.json
-Informação do software-
Versão: 3.6.1.2711
Versão de componentes: 1.0.482
Versão do pacote de definições: 1.0.7959
Licença: Versão de Avaliação
-Informação do sistema-
Sistema operacional: Windows 10 (Build 14393.2608)
CPU: x64
Sistema de arquivos: NTFS
Usuário: DESKTOP-7UU2GVM\---------\u00c3\u00a3o
-Resumo da análise-
Tipo de análise: Análise de Ameaças
Análise Iniciada Por: Manual
Resultado: Concluído
Objetos verificados: 373716
Ameaças detectadas: 116
Ameaças em quarentena: 116
Tempo decorrido: 2 min, 30 seg
-Opções da análise-
Memória: Habilitado
Inicialização: Habilitado
Sistema de arquivos: Habilitado
Arquivos compactados: Habilitado
Rootkits: Desabilitado
Heurística: Habilitado
PUP: Detectar
PUM: Detectar
-Detalhes da análise-
Processo: 0
(Nenhum item malicioso detectado)
Módulo: 0
(Nenhum item malicioso detectado)
Chave de registro: 18
Trojan.BitCoinMiner, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{A9A5E827-F7ED-4987-8243-DC3B2A93E37C}_is1, Quarentena, [567], [485109],1.0.7959
Adware.Wajam, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\NLASVC\PARAMETERS\INTERNET\MANUALPROXIES, Quarentena, [475], [-1],0.0.0
PUP.Optional.PSScriptLoad.ACMB3, HKU\S-1-5-21-1100052066-766834226-2942838772-1001\CONSOLE\%SYSTEMROOT%_SYSTEM32_SVCHOST.EXE, Quarentena, [6385], [425124],1.0.7959
PUP.Optional.PSScriptLoad.ACMB3, HKU\S-1-5-21-1100052066-766834226-2942838772-1001\CONSOLE\TASKENG.EXE, Quarentena, [6385], [425125],1.0.7959
PUP.Optional.InstallCore, HKU\S-1-5-21-1100052066-766834226-2942838772-1010\SOFTWARE\CSASTATS\ic, Quarentena, [408], [586068],1.0.7959
Adware.Tuto4PC, HKU\S-1-5-21-1100052066-766834226-2942838772-1001\SOFTWARE\MICROSOFT\EWMON, Quarentena, [2782], [411543],1.0.7959
PUP.Optional.InstallCore, HKU\S-1-5-21-1100052066-766834226-2942838772-1010\SOFTWARE\PRODUCTSETUP, Quarentena, [408], [481004],1.0.7959
Adware.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\XnrW3hoDOzjF Updater, Quarentena, [3159], [494177],1.0.7959
Adware.Tuto4PC, HKLM\SOFTWARE\MICROSOFT\MPrForWeathI, Quarentena, [2782], [572664],1.0.7959
Adware.Tuto4PC, HKLM\SOFTWARE\MICROSOFT\MTPreC_B, Quarentena, [2782], [572665],1.0.7959
Adware.Tuto4PC, HKLM\SOFTWARE\MICROSOFT\MTPreC_Qn, Quarentena, [2782], [572666],1.0.7959
Adware.ICLoader, HKLM\SOFTWARE\MICROSOFT\multitimercampaign84170, Quarentena, [433], [518476],1.0.7959
Adware.Tuto4PC, HKLM\SOFTWARE\MICROSOFT\ShutTPreAm, Quarentena, [2782], [572667],1.0.7959
Adware.Tuto4PC, HKLM\SOFTWARE\MICROSOFT\ShutTPreIc, Quarentena, [2782], [572668],1.0.7959
Adware.Tuto4PC, HKLM\SOFTWARE\MICROSOFT\ShutTPreJ, Quarentena, [2782], [572669],1.0.7959
Adware.Tuto4PC, HKLM\SOFTWARE\MICROSOFT\ShutTPreShM, Quarentena, [2782], [572670],1.0.7959
Adware.Wajam.Generic, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\MjNkYWU, Quarentena, [4874], [580236],1.0.7959
Adware.Wajam, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\YzYwODk5MWEwMDI5N, Quarentena, [475], [488914],1.0.7959
Valor de registro: 16
Adware.Wajam, HKU\S-1-5-18\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, Quarentena, [475], [-1],0.0.0
Adware.Wajam, HKU\S-1-5-19\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, Quarentena, [475], [-1],0.0.0
Adware.Wajam, HKU\S-1-5-20\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, Quarentena, [475], [-1],0.0.0
Adware.Wajam, HKU\S-1-5-21-1100052066-766834226-2942838772-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, Quarentena, [475], [-1],0.0.0
Adware.Wajam, HKU\S-1-5-21-1100052066-766834226-2942838772-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, Quarentena, [475], [-1],0.0.0
Adware.Wajam, HKU\S-1-5-21-1100052066-766834226-2942838772-1010\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, Quarentena, [475], [-1],0.0.0
Adware.Wajam, HKU\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, Quarentena, [475], [-1],0.0.0
PUP.Optional.SLOWPCfighter, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\FILEASSOCIATION\NOSTARTPAGEAPPUSERMODELIDS|FIGHTERS.SLOW-PCFIGHTER.UNINSTALL, Quarentena, [1012], [405390],1.0.7959
PUP.Optional.PSScriptLoad.ACMB3, HKU\S-1-5-21-1100052066-766834226-2942838772-1001\CONSOLE\%SYSTEMROOT%_SYSTEM32_SVCHOST.EXE|WINDOWPOSITION, Quarentena, [6385], [425124],1.0.7959
PUP.Optional.PSScriptLoad.ACMB3, HKU\S-1-5-21-1100052066-766834226-2942838772-1001\CONSOLE\%SYSTEMROOT%_SYSTEM32_WINDOWSPOWERSHELL_V1.0_POWERSHELL.EXE|WINDOWPOSITION, Quarentena, [6385], [425126],1.0.7959
PUP.Optional.PSScriptLoad.ACMB3, HKU\S-1-5-21-1100052066-766834226-2942838772-1001\CONSOLE\TASKENG.EXE|WINDOWPOSITION, Quarentena, [6385], [425125],1.0.7959
Adware.Tuto4PC, HKU\S-1-5-21-1100052066-766834226-2942838772-1001\SOFTWARE\MICROSOFT\EWMON|PARTNER, Quarentena, [2782], [411543],1.0.7959
PUP.Optional.InstallCore, HKU\S-1-5-21-1100052066-766834226-2942838772-1010\SOFTWARE\PRODUCTSETUP|TB, Quarentena, [408], [481004],1.0.7959
Adware.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\XnrW3hoDOzjF Updater|IMAGEPATH, Quarentena, [3159], [494177],1.0.7959
Adware.Wajam.Generic, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\MjNkYWU|IMAGEPATH, Quarentena, [4874], [580236],1.0.7959
Adware.Csdimonetize, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE|ymxx1adg2cd, Quarentena, [2866], [592870],1.0.7959
Dados de registro: 11
Adware.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS|NameServer, Substituído, [3159], [-1],0.0.0
Adware.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS|DhcpNameServer, Substituído, [3159], [-1],0.0.0
Adware.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{07b1e0e9-123e-4939-b98f-7b923fd63848}|NameServer, Substituído, [3159], [-1],0.0.0
Adware.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{07b1e0e9-123e-4939-b98f-7b923fd63848}|DhcpNameServer, Substituído, [3159], [-1],0.0.0
Adware.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{3a5013bf-98c4-413a-911b-3c6287a8a803}|NameServer, Substituído, [3159], [-1],0.0.0
Adware.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{3a5013bf-98c4-413a-911b-3c6287a8a803}|DhcpNameServer, Substituído, [3159], [-1],0.0.0
Adware.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{3b997b47-9d5b-4dc6-b795-a29738e98016}|NameServer, Substituído, [3159], [-1],0.0.0
Adware.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{98e9be1c-19cb-4fb2-add7-5f2ec6d8e1b6}|NameServer, Substituído, [3159], [-1],0.0.0
Adware.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{98ff3d37-ee13-4ab2-82a7-74e5dca09e0e}|NameServer, Substituído, [3159], [-1],0.0.0
Adware.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{9cfc04c1-9c5c-42ac-b7e0-bf0e24133b6f}|NameServer, Substituído, [3159], [-1],0.0.0
Adware.DNSUnlocker.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{efea9dcc-eb35-4e26-a58c-759e97cd1f1a}|NameServer, Substituído, [3159], [-1],0.0.0
Fluxo de dados: 0
(Nenhum item malicioso detectado)
Pasta: 14
PUP.Optional.WinYahoo.TskLnk, C:\Users\-------------------\AppData\Local\{3D4E0B12-19E6-67AA-747E-42425016BEDA}\HowToRemove, Quarentena, [712], [484244],1.0.7959
PUP.Optional.WinYahoo.TskLnk, C:\USERS\-------------------\APPDATA\LOCAL\{3D4E0B12-19E6-67AA-747E-42425016BEDA}, Quarentena, [712], [484244],1.0.7959
Trojan.BitCoinMiner, C:\PROGRAM FILES\SHADOWSOCKS, Quarentena, [567], [485109],1.0.7959
Adware.Tuto4PC, C:\USERS\-------------------\APPDATA\LOCAL\TEMP\D2BNS985I5, Quarentena, [2782], [487472],1.0.7959
Adware.Tuto4PC, C:\USERS\-------------------\APPDATA\LOCAL\TEMP\UINVN0MU49, Quarentena, [2782], [487472],1.0.7959
Adware.Wajam, C:\USERS\-------------------\APPDATA\LOCAL\TEMP\wjm5690.tmp, Quarentena, [475], [511084],1.0.7959
Adware.Wajam, C:\USERS\-------------------\APPDATA\LOCAL\TEMP\wjm6F17.tmp, Quarentena, [475], [511084],1.0.7959
PUP.Optional.MyStart, C:\USERS\-------------------\APPDATA\ROAMING\SEARCH THE WEB, Quarentena, [228], [594135],1.0.7959
Adware.Wajam, C:\USERS\-------------------\APPDATA\LOCAL\TEMP\wjm7C8F.tmp, Quarentena, [475], [511084],1.0.7959
Adware.Wajam, C:\USERS\-------------------\APPDATA\LOCAL\TEMP\wjm9752.tmp, Quarentena, [475], [511084],1.0.7959
Adware.Neoreklami.TskLnk, C:\USERS\-------------------\APPDATA\LOCAL\TEMP\ZJVJYDILXTAAIFNHI, Quarentena, [1224], [597936],1.0.7959
PUP.Optional.Imali.Generic, C:\Users\-------------------\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdfgfncdanfplmkhehijmcenhokbaaik\0.8_0\_metadata, Quarentena, [4618], [443118],1.0.7959
PUP.Optional.Imali.Generic, C:\Users\-------------------\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdfgfncdanfplmkhehijmcenhokbaaik\0.8_0, Quarentena, [4618], [443118],1.0.7959
PUP.Optional.Imali.Generic, C:\USERS\-------------------\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\EXTENSIONS\CDFGFNCDANFPLMKHEHIJMCENHOKBAAIK, Quarentena, [4618], [443118],1.0.7959
Arquivo: 57
PUP.Optional.GoodGame, C:\USERS\-------------------\DESKTOP\GOODGAME EMPIRE.URL, Quarentena, [3884], [261883],1.0.7959
PUP.Optional.SearchManager, C:\USERS\-------------------\APPDATA\LOCAL\CHROMIUM\USER DATA\DEFAULT\LOCAL STORAGE\chrome-extension_pilplloabdedfmialnfchjomjmpjcoej_0.localstorage, Quarentena, [255], [260989],1.0.7959
PUP.Optional.WinYahoo.TskLnk, C:\USERS\-------------------\APPDATA\LOCAL\{3D4E0B12-19E6-67AA-747E-42425016BEDA}\cica, Quarentena, [712], [484244],1.0.7959
PUP.Optional.WinYahoo.TskLnk, C:\Users\-------------------\AppData\Local\{3D4E0B12-19E6-67AA-747E-42425016BEDA}\HowToRemove\HowToRemove.html, Quarentena, [712], [484244],1.0.7959
PUP.Optional.WinYahoo.TskLnk, C:\Users\-------------------\AppData\Local\{3D4E0B12-19E6-67AA-747E-42425016BEDA}\bapi_chmm.dat, Quarentena, [712], [484244],1.0.7959
PUP.Optional.WinYahoo.TskLnk, C:\Users\-------------------\AppData\Local\{3D4E0B12-19E6-67AA-747E-42425016BEDA}\bapi_ff.dat, Quarentena, [712], [484244],1.0.7959
PUP.Optional.WinYahoo.TskLnk, C:\Users\-------------------\AppData\Local\{3D4E0B12-19E6-67AA-747E-42425016BEDA}\bapi_ie.dat, Quarentena, [712], [484244],1.0.7959
PUP.Optional.WinYahoo.TskLnk, C:\Users\-------------------\AppData\Local\{3D4E0B12-19E6-67AA-747E-42425016BEDA}\install.log, Quarentena, [712], [484244],1.0.7959
PUP.Optional.WinYahoo.TskLnk, C:\Users\-------------------\AppData\Local\{3D4E0B12-19E6-67AA-747E-42425016BEDA}\lele, Quarentena, [712], [484244],1.0.7959
PUP.Optional.WinYahoo.TskLnk, C:\Users\-------------------\AppData\Local\{3D4E0B12-19E6-67AA-747E-42425016BEDA}\refe, Quarentena, [712], [484244],1.0.7959
PUP.Optional.WinYahoo.TskLnk, C:\Users\-------------------\AppData\Local\{3D4E0B12-19E6-67AA-747E-42425016BEDA}\sole.dat, Quarentena, [712], [484244],1.0.7959
PUP.Optional.WinYahoo.TskLnk, C:\Users\-------------------\AppData\Local\{3D4E0B12-19E6-67AA-747E-42425016BEDA}\sota, Quarentena, [712], [484244],1.0.7959
PUP.Optional.WinYahoo.TskLnk, C:\Users\-------------------\AppData\Local\{3D4E0B12-19E6-67AA-747E-42425016BEDA}\Sqlite3.dll, Quarentena, [712], [484244],1.0.7959
PUP.Optional.WinYahoo.TskLnk, C:\Users\-------------------\AppData\Local\{3D4E0B12-19E6-67AA-747E-42425016BEDA}\tora.cfg, Quarentena, [712], [484244],1.0.7959
PUP.Optional.WinYahoo.TskLnk, C:\Users\-------------------\AppData\Local\{3D4E0B12-19E6-67AA-747E-42425016BEDA}\uninst.dat, Quarentena, [712], [484244],1.0.7959
PUP.Optional.WinYahoo.TskLnk, C:\Users\-------------------\AppData\Local\{3D4E0B12-19E6-67AA-747E-42425016BEDA}\uninst.exe, Quarentena, [712], [484244],1.0.7959
PUP.Optional.WinYahoo.TskLnk, C:\Users\-------------------\AppData\Local\{3D4E0B12-19E6-67AA-747E-42425016BEDA}\uninstp.dat, Quarentena, [712], [484244],1.0.7959
Trojan.BitCoinMiner, C:\PROGRAM FILES\SHADOWSOCKS\UNINS000.DAT, Quarentena, [567], [485109],1.0.7959
Trojan.BitCoinMiner, C:\Program Files\Shadowsocks\unins000.exe, Quarentena, [567], [485109],1.0.7959
Adware.Tuto4PC, C:\USERS\-------------------\APPDATA\LOCAL\TEMP\D2BNS985I5\up.exe.config, Quarentena, [2782], [487472],1.0.7959
Adware.Tuto4PC, C:\Users\-------------------\AppData\Local\Temp\D2BNS985I5\up.exe, Quarentena, [2782], [487472],1.0.7959
Adware.Tuto4PC, C:\USERS\-------------------\APPDATA\LOCAL\TEMP\UINVN0MU49\up.exe.config, Quarentena, [2782], [487472],1.0.7959
Adware.Tuto4PC, C:\Users\-------------------\AppData\Local\Temp\UINVN0MU49\up.exe, Quarentena, [2782], [487472],1.0.7959
Adware.Wajam, C:\USERS\-------------------\APPDATA\LOCAL\TEMP\wjm5690.tmp\update.exe, Quarentena, [475], [511084],1.0.7959
Adware.Wajam, C:\USERS\-------------------\APPDATA\LOCAL\TEMP\wjm6F17.tmp\update.exe, Quarentena, [475], [511084],1.0.7959
PUP.Optional.MyStart, C:\USERS\-------------------\APPDATA\ROAMING\SEARCH THE WEB\{3BD44F0E-0596-4008-AEE0-45D47E3A8F0E}.ico, Quarentena, [228], [594135],1.0.7959
Adware.Wajam, C:\USERS\-------------------\APPDATA\LOCAL\TEMP\wjm7C8F.tmp\update.exe, Quarentena, [475], [511084],1.0.7959
Adware.Wajam, C:\USERS\-------------------\APPDATA\LOCAL\TEMP\wjm9752.tmp\update.exe, Quarentena, [475], [511084],1.0.7959
Adware.Linkury.Generic, C:\USERS\-------------------\APPDATA\LOCAL\SHAM.DB, Quarentena, [3733], [516191],1.0.7959
Adware.Wajam.Generic, C:\WINDOWS\IXMIXFACA.IXML, Quarentena, [4874], [580236],1.0.7959
MachineLearning/Anomalous.100%, C:\WINDOWS\ACABC898A0EA38066A77971B0E7EC412.EXE, Quarentena,
PUP.Optional.WinYahoo, C:\USERS\-------------------\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\BWM8OJQU.DEFAULT\PREFS.JS, Substituído, [232], [303324],1.0.7959
PUP.Optional.Imali.Generic, C:\USERS\-------------------\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Substituído, [4618], [443118],1.0.7959
PUP.Optional.Imali.Generic, C:\USERS\-------------------\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Preferences, Substituído, [4618], [443118],1.0.7959
PUP.Optional.Imali.Generic, C:\USERS\-------------------\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Sync Data\SyncData.sqlite3, Substituído, [4618], [443118],1.0.7959
PUP.Optional.Imali.Generic, C:\USERS\-------------------\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\EXTENSIONS\CDFGFNCDANFPLMKHEHIJMCENHOKBAAIK\0.8_0\REDIRECT.JS, Quarentena, [4618], [443118],1.0.7959
PUP.Optional.Imali.Generic, C:\Users\-------------------\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdfgfncdanfplmkhehijmcenhokbaaik\0.8_0\_metadata\computed_hashes.json, Quarentena, [4618], [443118],1.0.7959
PUP.Optional.Imali.Generic, C:\Users\-------------------\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdfgfncdanfplmkhehijmcenhokbaaik\0.8_0\_metadata\verified_contents.json, Quarentena, [4618], [443118],1.0.7959
PUP.Optional.Imali.Generic, C:\Users\-------------------\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdfgfncdanfplmkhehijmcenhokbaaik\0.8_0\background.js, Quarentena, [4618], [443118],1.0.7959
PUP.Optional.Imali.Generic, C:\Users\-------------------\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdfgfncdanfplmkhehijmcenhokbaaik\0.8_0\manifest.json, Quarentena, [4618], [443118],1.0.7959
PUP.Optional.Imali.Generic, C:\Users\-------------------\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdfgfncdanfplmkhehijmcenhokbaaik\0.8_0\popup.html, Quarentena, [4618], [443118],1.0.7959
PUP.Optional.Imali.Generic, C:\Users\-------------------\AppData\Local\Google\Chrome\User Data\Default\Extensions\cdfgfncdanfplmkhehijmcenhokbaaik\0.8_0\redirect.html, Quarentena, [4618], [443118],1.0.7959
Adware.Wajam, C:\WINDOWS\SYSTEM32\DRIVERS\YZYWODK5MWEWMDI5N, Quarentena, [475], [488914],1.0.7959
Adware.Csdimonetize, C:\PROGRAM FILES (X86)\XRRX\241267232.EXE, Quarentena, [2866], [592870],1.0.7959
PUP.Optional.InstallCore.Generic, C:\USERS\-------------------\DESKTOP\ATUBE_CATCHER_0656998135.EXE, Quarentena, [6143], [512134],1.0.7959
Trojan.BitCoinMiner, C:\PROGRAM FILES (X86)\CORE\VIDEOCARD.EXE, Quarentena, [567], [475355],1.0.7959
Adware.Csdimonetize, C:\PROGRAM FILES (X86)\XRRX\374534056.EXE, Quarentena, [2866], [592870],1.0.7959
Adware.Csdimonetize, C:\USERS\-------------------\APPDATA\LOCAL\TEMP\IS-TNFA0.TMP\DAZED.EXE, Quarentena, [2866], [592870],1.0.7959
PUP.Optional.BundleInstaller, C:\USERS\-------------------\APPDATA\LOCAL\TEMP\BIT401C.TMP.EXE, Quarentena, [422], [601328],1.0.7959
PUP.Optional.InstallCore.Generic, C:\USERS\ENVIA\DOWNLOADS\ATUBE_CATCHER_0550002805.EXE, Quarentena, [6143], [512134],1.0.7959
Adware.OxyPumper, C:\USERS\-------------------\APPDATA\LOCAL\TEMP\E7E3Y1C0\O8N5Y3V0.EXE, Quarentena, [4230], [601660],1.0.7959
Adware.Agent, C:\USERS\-------------------\APPDATA\LOCAL\TEMP\IS-93C8K.TMP\CRSWGVH.DLL, Quarentena, [101], [594543],1.0.7959
Adware.Csdimonetize, C:\USERS\-------------------\APPDATA\LOCAL\TEMP\IS-NGBU2.TMP\DAZED.EXE, Quarentena, [2866], [592870],1.0.7959
Adware.Tuto4PC, C:\USERS\-------------------\APPDATA\LOCAL\TEMP\IS-TFEQP.TMP\SETUP.EXE, Quarentena, [2782], [601384],1.0.7959
Adware.Zdengo, C:\USERS\-------------------\APPDATA\LOCAL\TEMP\NSUDA27.TMP\KNNUPMGIILB.DLL, Quarentena, [7763], [600697],1.0.7959
PUP.Optional.WinThruster, C:\WINDOWS\INSTALLER\75209.MSI, Quarentena, [1487], [461217],1.0.7959
Generic.Malware/Suspicious, C:\USERS\-------------------\DOWNLOADS\BITCOMET_1.44_SETUP.EXE, Quarentena,
Setor físico: 0
(Nenhum item malicioso detectado)
Instrumentação do Windows (WMI): 0
(Nenhum item malicioso detectado)
(end)
Security Check answer this for me! Image below
What should I do?