Kontrola logu hijack Vyřešeno

Místo pro vaše HiJackThis logy a logy z dalších programů…

Moderátoři: Mods_senior, Security team

Uživatelský avatar
Amurex
Level 2
Level 2
Příspěvky: 204
Registrován: listopad 11
Pohlaví: Muž
Stav:
Offline

Kontrola logu hijack

Příspěvekod Amurex » 18 říj 2017 10:18

Dobrý den, před rokem jsem koupil nový stolní PC. Před nějakou dobou se docela zpomalil a poslední týden mi dokonce blbne například chat na facebooku(při psaní se to lehce seká a nebo odesílá 2 zprávy místo jedné). Používám občasně malwarebytes a CCleaner. Prosím o kontrolu logu :)

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 9:57:30 AM, on 10/18/2017
Platform: Unknown Windows (WinNT 6.02.1008)
MSIE: Internet Explorer v11.0 (11.00.14393.1715)


Boot mode: Normal

Running processes:
C:\Program Files (x86)\NVIDIA Corporation\NvContainer\nvcontainer.exe
C:\Program Files (x86)\ASUS\AI Suite III\Push Notice\PushNotifyServer.exe
C:\Program Files (x86)\ASUS\AI Suite III\EZ Update\EzUpdt.exe
C:\Program Files (x86)\ASUS\AI Suite III\DIP4\DIPAwayMode\DipAwayMode.exe
C:\Program Files (x86)\ASUS\AI Suite III\AISuite3.exe
C:\Program Files (x86)\NVIDIA Corporation\NvNode\NVIDIA Web Helper.exe
C:\Program Files (x86)\ASUS\AI Suite III\Push Notice\PushNoticeMonitor.exe
C:\Program Files (x86)\ASUS\AI Suite III\AsPowerBar\AsPowerBar.exe
C:\Program Files\AVAST Software\Avast\AvastUI.exe
C:\Users\Amurex\AppData\Local\Microsoft\OneDrive\OneDrive.exe
C:\Program Files (x86)\ASUS\ASUS Ai Charger\AiChargerAP.exe
C:\Users\Amurex\Desktop\HijackThis (2).exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/p/?LinkId=255141
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/p/?LinkId=255141
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/p/?LinkId=255141
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =
R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = %11%\blank.htm
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O2 - BHO: Lync Click to Call BHO - {31D09BA0-12F5-4CCE-BE8A-2923E76605DA} - C:\Program Files (x86)\Microsoft Office\Office15\OCHelper.dll
O2 - BHO: URLRedirectionBHO - {B4F3A835-0E21-4959-BA22-42B3008E02FF} - C:\PROGRA~2\MICROS~1\Office15\URLREDIR.DLL
O2 - BHO: Microsoft SkyDrive Pro Browser Helper - {D0498E0A-45B7-42AE-A9AA-ABA463DBD3BF} - C:\PROGRA~2\MICROS~1\Office15\GROOVEEX.DLL
O4 - HKLM\..\Run: [ASUS Ai Charger] C:\Program Files (x86)\ASUS\ASUS Ai Charger\AiChargerAP.exe
O4 - HKCU\..\Run: [OneDrive] "C:\Users\Amurex\AppData\Local\Microsoft\OneDrive\OneDrive.exe" /background
O4 - HKCU\..\Run: [DAEMON Tools Lite Automount] "C:\Program Files\DAEMON Tools Lite\DTAgent.exe" -autorun
O4 - HKCU\..\Run: [CCleaner Monitoring] "C:\Program Files\CCleaner\CCleaner64.exe" /MONITOR
O4 - HKUS\S-1-5-19\..\Run: [OneDriveSetup] C:\Windows\SysWOW64\OneDriveSetup.exe /thfirstsetup (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [OneDriveSetup] C:\Windows\SysWOW64\OneDriveSetup.exe /thfirstsetup (User 'NETWORK SERVICE')
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~1\Office15\EXCEL.EXE/3000
O8 - Extra context menu item: Se&nd to OneNote - res://C:\PROGRA~1\MICROS~1\Office15\ONBttnIE.dll/105
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\Program Files (x86)\Microsoft Office\Office15\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: Se&nd to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\Program Files (x86)\Microsoft Office\Office15\ONBttnIE.dll
O9 - Extra button: Lync Click to Call - {31D09BA0-12F5-4CCE-BE8A-2923E76605DA} - C:\Program Files (x86)\Microsoft Office\Office15\OCHelper.dll
O9 - Extra 'Tools' menuitem: Lync Click to Call - {31D09BA0-12F5-4CCE-BE8A-2923E76605DA} - C:\Program Files (x86)\Microsoft Office\Office15\OCHelper.dll
O9 - Extra button: OneNote Lin&ked Notes - {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} - C:\Program Files (x86)\Microsoft Office\Office15\ONBttnIELinkedNotes.dll
O9 - Extra 'Tools' menuitem: OneNote Lin&ked Notes - {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} - C:\Program Files (x86)\Microsoft Office\Office15\ONBttnIELinkedNotes.dll
O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics
O18 - Protocol: osf - {D924BDC6-C83A-4BD5-90D0-095128A113D1} - C:\Program Files (x86)\Microsoft Office\Office15\MSOSB.DLL
O18 - Protocol: tbauth - {14654CA6-5711-491D-B89A-58E571679951} - C:\Windows\SysWOW64\tbauth.dll
O18 - Protocol: windows.tbauth - {14654CA6-5711-491D-B89A-58E571679951} - C:\Windows\SysWOW64\tbauth.dll
O18 - Filter hijack: text/xml - {807583E5-5146-11D5-A672-00B0D022E945} - C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE15\MSOXMLMF.DLL
O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\WINDOWS\System32\alg.exe (file missing)
O23 - Service: ASUS Com Service (asComSvc) - Unknown owner - C:\Program Files (x86)\ASUS\AXSP\1.02.00\atkexComSvc.exe
O23 - Service: ASUS HM Com Service (asHmComSvc) - ASUSTeK Computer Inc. - C:\Program Files (x86)\ASUS\AAHM\1.00.22\aaHMSvc.exe
O23 - Service: AsusFanControlService - ASUSTeK Computer Inc. - C:\Program Files (x86)\ASUS\AsusFanControlService\1.06.28\AsusFanControlService.exe
O23 - Service: aswbIDSAgent - AVAST Software s.r.o. - C:\Program Files\AVAST Software\Avast\x64\aswidsagenta.exe
O23 - Service: Avast Antivirus (avast! Antivirus) - AVAST Software - C:\Program Files\AVAST Software\Avast\AvastSvc.exe
O23 - Service: @%SystemRoot%\system32\DiagSvcs\DiagnosticsHub.StandardCollector.ServiceRes.dll,-1000 (diagnosticshub.standardcollector.service) - Unknown owner - C:\WINDOWS\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe (file missing)
O23 - Service: Disc Soft Lite Bus Service - Disc Soft Ltd - C:\Program Files\DAEMON Tools Lite\DiscSoftBusServiceLite.exe
O23 - Service: EasyAntiCheat - EasyAntiCheat Ltd - C:\WINDOWS\system32\EasyAntiCheat.exe
O23 - Service: @%SystemRoot%\system32\efssvc.dll,-100 (EFS) - Unknown owner - C:\WINDOWS\System32\lsass.exe (file missing)
O23 - Service: @%systemroot%\system32\fxsresm.dll,-118 (Fax) - Unknown owner - C:\WINDOWS\system32\fxssvc.exe (file missing)
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Google Update Service (gupdatem) (gupdatem) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
O23 - Service: Intel(R) Integrated Clock Controller Service - Intel(R) ICCS (ICCS) - Intel Corporation - C:\Program Files (x86)\Intel\Intel(R) Integrated Clock Controller Service\ICCProxy.exe
O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: Malwarebytes Service (MBAMService) - Malwarebytes - C:\Program Files\Malwarebytes\Anti-Malware\mbamservice.exe
O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\WINDOWS\System32\msdtc.exe (file missing)
O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: NVIDIA LocalSystem Container (NvContainerLocalSystem) - NVIDIA Corporation - C:\Program Files\NVIDIA Corporation\NvContainer\nvcontainer.exe
O23 - Service: NVIDIA NetworkService Container (NvContainerNetworkService) - NVIDIA Corporation - C:\Program Files\NVIDIA Corporation\NvContainer\nvcontainer.exe
O23 - Service: NVIDIA Display Container LS (NVDisplay.ContainerLocalSystem) - NVIDIA Corporation - C:\Program Files\NVIDIA Corporation\Display.NvContainer\NVDisplay.Container.exe
O23 - Service: NVIDIA Wireless Controller Service - NVIDIA Corporation - C:\Program Files\NVIDIA Corporation\GeForce Experience Service\nvwirelesscontroller.exe
O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\WINDOWS\system32\locator.exe (file missing)
O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: @%ProgramFiles%\Windows Defender Advanced Threat Protection\MsSense.exe,-1001 (Sense) - Unknown owner - C:\Program Files (x86)\Windows Defender Advanced Threat Protection\MsSense.exe (file missing)
O23 - Service: @%SystemRoot%\system32\SensorDataService.exe,-101 (SensorDataService) - Unknown owner - C:\WINDOWS\System32\SensorDataService.exe (file missing)
O23 - Service: Service KMSELDI - @ByELDI - C:\Program Files\KMSpico\Service_KMS.exe
O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\WINDOWS\System32\snmptrap.exe (file missing)
O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\WINDOWS\System32\spoolsv.exe (file missing)
O23 - Service: @%SystemRoot%\system32\sppsvc.exe,-101 (sppsvc) - Unknown owner - C:\WINDOWS\system32\sppsvc.exe (file missing)
O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files (x86)\Common Files\Steam\SteamService.exe
O23 - Service: @%SystemRoot%\system32\TieringEngineService.exe,-702 (TieringEngineService) - Unknown owner - C:\WINDOWS\system32\TieringEngineService.exe (file missing)
O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\WINDOWS\system32\UI0Detect.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vaultsvc.dll,-1003 (VaultSvc) - Unknown owner - C:\WINDOWS\system32\lsass.exe (file missing)
O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\WINDOWS\System32\vds.exe (file missing)
O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\WINDOWS\system32\vssvc.exe (file missing)
O23 - Service: @%systemroot%\system32\wbengine.exe,-104 (wbengine) - Unknown owner - C:\WINDOWS\system32\wbengine.exe (file missing)
O23 - Service: @%ProgramFiles%\Windows Defender\MpAsDesc.dll,-320 (WdNisSvc) - Unknown owner - C:\Program Files (x86)\Windows Defender\NisSrv.exe (file missing)
O23 - Service: @%ProgramFiles%\Windows Defender\MpAsDesc.dll,-310 (WinDefend) - Unknown owner - C:\Program Files (x86)\Windows Defender\MsMpEng.exe (file missing)
O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\WINDOWS\system32\wbem\WmiApSrv.exe (file missing)
O23 - Service: @%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing)
O23 - Service: Intel(R) Extreme Tuning Utility Service (XTU3SERVICE) - Intel(R) Corporation - C:\Program Files (x86)\Intel\Intel(R) Extreme Tuning Utility\XtuService.exe

--
End of file - 10727 bytes

Reklama
Uživatelský avatar
Amurex
Level 2
Level 2
Příspěvky: 204
Registrován: listopad 11
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu hijack

Příspěvekod Amurex » 18 říj 2017 14:34

Přidávám log z malwarebytes ... když dám malwares do karanteny a restartuju PC a znovu proscanuju, objeví se znovu kolem 60 malwares.

Malwarebytes
www.malwarebytes.com

-Log Details-
Scan Date: 10/18/17
Scan Time: 2:29 PM
Log File: ef97e1d6-b3ff-11e7-bfa9-708bcd9ef6a4.json
Administrator: Yes

-Software Information-
Version: 3.2.2.2018
Components Version: 1.0.212
Update Package Version: 1.0.3040
License: Free

-System Information-
OS: Windows 10 (Build 14393.1770)
CPU: x64
File System: NTFS
User: DESKTOP-A2KAN9O\Amurex

-Scan Summary-
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 360269
Threats Detected: 58
Threats Quarantined: 0
(No malicious items detected)
Time Elapsed: 0 min, 50 sec

-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Detect
PUM: Detect

-Scan Details-
Process: 0
(No malicious items detected)

Module: 0
(No malicious items detected)

Registry Key: 0
(No malicious items detected)

Registry Value: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Data Stream: 0
(No malicious items detected)

Folder: 9
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\fonts\roboto, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\_metadata, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\images, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\fonts, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\css, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\js, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dgjepfldodmdfmdidhhgamnklbdibndi, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\USERS\AMUREX\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\EXTENSIONS\dgjepfldodmdfmdidhhgamnklbdibndi, No Action By User, [631], [445324],1.0.3040

File: 49
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\css\materialize.min.css, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\css\popup.css, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\css\reset.min.css, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\css\style.css, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\fonts\roboto\Roboto-Bold.woff, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\fonts\roboto\Roboto-Bold.woff2, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\fonts\roboto\Roboto-Light.woff, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\fonts\roboto\Roboto-Light.woff2, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\fonts\roboto\Roboto-Medium.woff, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\fonts\roboto\Roboto-Medium.woff2, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\fonts\roboto\Roboto-Regular.woff, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\fonts\roboto\Roboto-Regular.woff2, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\fonts\roboto\Roboto-Thin.woff, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\fonts\roboto\Roboto-Thin.woff2, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\images\logo.png, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\images\logo@2x.png, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\images\remove.svg, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\images\savetabs_icon-128px.png, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\images\savetabs_icon-16px.png, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\images\savetabs_icon-256px.png, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\images\savetabs_icon-32px.png, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\images\savetabs_icon-48px.png, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\images\savetabs_icon-96px.png, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\images\savetabs_icon-browser-128px.png, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\images\savetabs_icon-browser-16px.png, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\images\savetabs_icon-browser-32px.png, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\images\star-off@2x.png, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\images\star-on@2x.png, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\js\jquery-3.2.1.min.js, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\js\materialize.min.js, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\js\mithril.min.js, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\js\moment.min.js, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\js\popup.js, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\js\save-tabs-ui.js, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\js\save-tabs.js, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\js\sortable.min.js, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\_metadata\computed_hashes.json, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\_metadata\verified_contents.json, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\favicon.ico, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\manifest.json, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\popup.html, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\dgjepfldodmdfmdidhhgamnklbdibndi\0.9.1_0\save-tabs.html, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\USERS\AMUREX\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\Secure Preferences, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\USERS\AMUREX\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\Preferences, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dgjepfldodmdfmdidhhgamnklbdibndi\000003.log, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dgjepfldodmdfmdidhhgamnklbdibndi\CURRENT, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dgjepfldodmdfmdidhhgamnklbdibndi\LOCK, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dgjepfldodmdfmdidhhgamnklbdibndi\LOG, No Action By User, [631], [445324],1.0.3040
Rogue.ForcedExtension, C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dgjepfldodmdfmdidhhgamnklbdibndi\MANIFEST-000001, No Action By User, [631], [445324],1.0.3040

Physical Sector: 0
(No malicious items detected)


(end)

Uživatelský avatar
Amurex
Level 2
Level 2
Příspěvky: 204
Registrován: listopad 11
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu hijack

Příspěvekod Amurex » 18 říj 2017 14:39

Přidávám také log z AdwCleaneru :), použil jsem také ATF a TFC cleanery

# AdwCleaner 7.0.3.1 - Logfile created on Wed Oct 18 12:37:51 2017
# Updated on 2017/29/09 by Malwarebytes
# Database: 10-17-2017.1
# Running on Windows 10 Pro (X64)
# Mode: scan
# Support: https://www.malwarebytes.com/support

***** [ Services ] *****

No malicious services found.

***** [ Folders ] *****

No malicious folders found.

***** [ Files ] *****

No malicious files found.

***** [ DLL ] *****

No malicious DLLs found.

***** [ WMI ] *****

No malicious WMI found.

***** [ Shortcuts ] *****

No malicious shortcuts found.

***** [ Tasks ] *****

No malicious tasks found.

***** [ Registry ] *****

No malicious registry entries found.

***** [ Firefox (and derivatives) ] *****

No malicious Firefox entries.

***** [ Chromium (and derivatives) ] *****

PUP.Optional.SuperCleanSystem, Plugin found: Save Tabs -

/!\ Please Reset the Chrome Synchronization before cleaning the Chrome Preferences: https://support.google.com/chrome/answer/3097271


*************************



########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt ##########

Uživatelský avatar
jaro3
člen Security týmu
Guru Level 15
Guru Level 15
Příspěvky: 43060
Registrován: červen 07
Bydliště: Jižní Čechy
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu hijack

Příspěvekod jaro3 » 18 říj 2017 19:05

Spusť znovu AdwCleaner (u Windows Vista či Windows7, klikni na AdwCleaner pravým a vyber „Spustit jako správce
klikni na „Scan“, po prohledání klikni na „ Clean

Program provede opravu, po automatickém restartu klikni na „Log Manager“ a pak poklepej na odpovídají log, (C:\AdwCleaner [C?].txt) , jeho obsah sem celý vlož.

Stáhni si Junkware Removal Tool by Thisisu
http://www.bleepingcomputer.com/downloa ... oval-tool/
na svojí plochu.

Deaktivuj si svůj antivirový program. Pravým tl. myši klikni na JRT.exe a vyber „spustit jako správce“. Pro pokračování budeš vyzván ke stisknutí jakékoliv klávesy. Na nějakou klikni.
Začne skenování programu. Skenování může trvat dloho , podle množství nákaz. Po ukončení skenu se objeví log (JRT.txt) , který se uloží na ploše.
Zkopíruj sem prosím celý jeho obsah.

Sophos Virus Removal Tool je praktický softwarový nástroj, který by mohl odstranit infekce, které antivirový program nedetekuje .
Stáhněte si ho zde z některého odkazu:
http://www.majorgeeks.com/mg/get/sophos ... ool,1.html
http://www.majorgeeks.com/mg/getmirror/ ... ool,1.html
http://www.majorgeeks.com/mg/getmirror/ ... ool,2.html

Viry mohou zpomalit počítač, nebo se snaží ukrást vaše data, a ani nevíte , že je máte. Co potřebujete, je rychlý a snadný způsob, jak je najít a zbavit se jich, pokud již máte antivirový program v počítači nainstalován , můžete nainstalovat i nástroj Sophos Virus Removal , který identifikuje a vyčistí zbylé infekce, které mohl Váš antivirový program přehlédnout.
K použití Sophos Virus Removal Tool na něj poklepejte a stiskněte tlačítko „Start scanning“ . Pak bude Sophos Virus Removal Tool vyhledávat a odstraňovat viry, které najde. Může být vyžadován restart.


Stáhni si RogueKiller by Adlice Software
32bit.:
http://www.adlice.com/download/roguekil ... HlwZT14ODY
64bit.:
http://www.adlice.com/download/roguekil ... HlwZT14NjQ
na svojí plochu.
- Zavři všechny ostatní programy a prohlížeče.
- Pro OS Vista a win7,8,10 spusť program RogueKiller.exe jako správce , u XP poklepáním.
- klikni na „Start Scan“. V novém okně nic neměň a klikni dole na „Start Scan“
- Program skenuje procesy PC. Po proskenování klikni na „Open Report “ , v okně pak na „Open TXT“ a celý obsah logu sem zkopíruj.
Pokud je program blokován , zkus ho spustit několikrát. Pokud dále program nepůjde spustit a pracovat, přejmenuj ho na winlogon.exe.
-pokud bude mít log více než 60.000 znaků , rozděl ho a vlož do více příspěvků

další odkazy:
http://www.adlice.com/download/roguekiller/
http://www.bleepingcomputer.com/download/roguekiller/
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra

Uživatelský avatar
Amurex
Level 2
Level 2
Příspěvky: 204
Registrován: listopad 11
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu hijack

Příspěvekod Amurex » 19 říj 2017 13:18

# AdwCleaner 7.0.3.1 - Logfile created on Thu Oct 19 11:16:35 2017
# Updated on 2017/29/09 by Malwarebytes
# Running on Windows 10 Pro (X64)
# Mode: clean
# Support: https://www.malwarebytes.com/support

***** [ Services ] *****

No malicious services deleted.

***** [ Folders ] *****

No malicious folders deleted.

***** [ Files ] *****

No malicious files deleted.

***** [ DLL ] *****

No malicious DLLs cleaned.

***** [ WMI ] *****

No malicious WMI cleaned.

***** [ Shortcuts ] *****

No malicious shortcuts cleaned.

***** [ Tasks ] *****

No malicious tasks deleted.

***** [ Registry ] *****

No malicious registry entries deleted.

***** [ Firefox (and derivatives) ] *****

No malicious Firefox entries deleted.

***** [ Chromium (and derivatives) ] *****

Plugin deleted: Save Tabs -


*************************

::Tracing keys deleted
::Winsock settings cleared
::Additional Actions: 0



*************************

C:/AdwCleaner/AdwCleaner[S0].txt - [1110 B] - [2017/10/18 12:37:51]
C:/AdwCleaner/AdwCleaner[S1].txt - [1179 B] - [2017/10/19 11:15:44]


########## EOF - C:\AdwCleaner\AdwCleaner[C0].txt ##########

Uživatelský avatar
Amurex
Level 2
Level 2
Příspěvky: 204
Registrován: listopad 11
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu hijack

Příspěvekod Amurex » 19 říj 2017 13:22

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 8.1.4 (07.09.2017)
Operating System: Windows 10 Pro x64
Ran by Amurex (Administrator) on Thu 10/19/2017 at 13:19:56.20
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




File System: 0




Registry: 0





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Thu 10/19/2017 at 13:21:17.66
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Uživatelský avatar
Amurex
Level 2
Level 2
Příspěvky: 204
Registrován: listopad 11
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu hijack

Příspěvekod Amurex » 19 říj 2017 14:08

RogueKiller V12.11.20.0 (x64) [Oct 16 2017] (Free) by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : https://forum.adlice.com
Website : http://www.adlice.com/download/roguekiller/
Blog : http://www.adlice.com

Operating System : Windows 10 (10.0.14393) 64 bits version
Started in : Normal mode
User : Amurex [Administrator]
Started from : C:\Users\Amurex\Desktop\RogueKiller_portable64.exe
Mode : Scan -- Date : 10/19/2017 13:52:25 (Duration : 00:13:50)

¤¤¤ Processes : 2 ¤¤¤
[PUP.HackTool|VT.HackTool:Win32/AutoKMS] Service_KMS.exe(2256) -- C:\Program Files\KMSpico\Service_KMS.exe[-] -> Found
[PUP.HackTool|VT.HackTool:Win32/AutoKMS] (SVC) Service KMSELDI -- C:\Program Files\KMSpico\Service_KMS.exe[-] -> Found

¤¤¤ Registry : 1 ¤¤¤
[PUP.HackTool|VT.HackTool:Win32/AutoKMS] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Service KMSELDI (C:\Program Files\KMSpico\Service_KMS.exe) -> Found

¤¤¤ Tasks : 1 ¤¤¤
[PUP.HackTool] \AutoPico Daily Restart -- "C:\Program Files\KMSpico\AutoPico.exe" (/silent) -> Found

¤¤¤ Files : 13 ¤¤¤
[PUP.Gen0][File] C:\Windows\SECOH-QAD.exe -> Found
[PUP.uTorrentAds][File] C:\Users\Amurex\AppData\Roaming\uTorrent\updates\3.4.9_42606\utorrentie.exe -> Found
[PUP.uTorrentAds][File] C:\Users\Amurex\AppData\Roaming\uTorrent\updates\3.4.9_42923\utorrentie.exe -> Found
[PUP.uTorrentAds][File] C:\Users\Amurex\AppData\Roaming\uTorrent\updates\3.4.9_42973\utorrentie.exe -> Found
[PUP.uTorrentAds][File] C:\Users\Amurex\AppData\Roaming\uTorrent\updates\3.4.9_43085\utorrentie.exe -> Found
[PUP.uTorrentAds][File] C:\Users\Amurex\AppData\Roaming\uTorrent\updates\3.4.9_43295\utorrentie.exe -> Found
[PUP.uTorrentAds][File] C:\Users\Amurex\AppData\Roaming\uTorrent\updates\3.4.9_43388\utorrentie.exe -> Found
[PUP.uTorrentAds][File] C:\Users\Amurex\AppData\Roaming\uTorrent\updates\3.5.0_43580\utorrentie.exe -> Found
[PUP.uTorrentAds][File] C:\Users\Amurex\AppData\Roaming\uTorrent\updates\3.5.0_43804\utorrentie.exe -> Found
[PUP.uTorrentAds][File] C:\Users\Amurex\AppData\Roaming\uTorrent\updates\3.5.0_43916\utorrentie.exe -> Found
[PUP.uTorrentAds][File] C:\Users\Amurex\AppData\Roaming\uTorrent\updates\3.5.0_44090\utorrentie.exe -> Found
[PUP.HackTool][Folder] C:\ProgramData\Microsoft\Windows\Start Menu\Programs\KMSpico -> Found
[PUP.HackTool][Folder] C:\Program Files\KMSpico -> Found

¤¤¤ WMI : 0 ¤¤¤

¤¤¤ Hosts File : 0 ¤¤¤

¤¤¤ Antirootkit : 0 (Driver: Loaded) ¤¤¤

¤¤¤ Web browsers : 1 ¤¤¤
[PUP.Gen3][Chrome:Addon] Default : Save Tabs [dgjepfldodmdfmdidhhgamnklbdibndi] -> Found

¤¤¤ MBR Check : ¤¤¤
+++++ PhysicalDrive0: Patriot Spark +++++
--- User ---
[MBR] 3c657ca9e1552e8e03502c57d41cd0fa
[BSP] 299a1745ba9e2edfe13132b38a8e8831 : Windows Vista/7/8|VT.Unknown MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 121651 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] ACER (0x27) [VISIBLE] Offset (sectors): 249143296 | Size: 450 MB
User = LL1 ... OK
User = LL2 ... OK

Uživatelský avatar
jaro3
člen Security týmu
Guru Level 15
Guru Level 15
Příspěvky: 43060
Registrován: červen 07
Bydliště: Jižní Čechy
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu hijack

Příspěvekod jaro3 » 19 říj 2017 18:54

Sophos něco našel?

Zavři všechny programy a prohlížeče. Deaktivuj antivir a firewall.
Prosím, odpoj všechny USB (kromě myši s klávesnice) nebo externí disky z počítače před spuštěním tohoto programu.
Spusť znovu RogueKiller ( Pro Windows Vista nebo Windows 7, klepni pravým a vyber "Spustit jako správce", ve Windows XP poklepej ke spuštění).
- klikni na „Start Scan“. V novém okně nic neměň a klikni dole na „Start Scan“,
po jeho skončení - vše zatrhni (dej zatržítka vlevo od nálezů , do bílých políček)
- pak klikni na "Remove Selected"
- Počkej, dokud Status box nezobrazí " Removal finished, please review result "
- Klikni na "Open report " a pak na " Open TXT“ a zkopíruj ten log a vlož obsah té zprávy prosím sem. Log je možno nalézt v C:\ProgramData\RogueKiller\Logs - Zavři RogueKiller.

Vypni antivir i firewall.
Stáhni Zoek.exe
http://download.bleepingcomputer.com/smeenk/zoek.exe
http://leteckaposta.cz/415997425
klik nahoře vpravo na .rar-file a uloz si ho na plochu.
Zavři všechny ostatní programy , okna i prohlížeče.
Spusť Zoek.exe ( u win vista , win7, 8 klikni na něj pravým a vyber : „Spustit jako správce“
-pozor , náběh programu může trvat déle.
Do okna programu vlož skript níže:

Kód: Vybrat vše

autoclean;
emptyclsid;
iedefaults;
FFdefaults;
CHRdefaults;
emptyalltemp;
resethosts;

klikni na Run Script
Program provede sken , opravu, sken i oprava může trvat i více minut ,je třeba posečkat do konce. Do okna neklikej!
Program nabídne restart , potvrď .
Po restartu se může nějaký čas ukázat pouze černá plocha , to je normální. Je třeba počkat až se vytvoří log. Ten si můžeš uložit třeba do dokumentů , jinak se sám ukládá do:
C:\zoek-results.log Zkopíruj sem celý obsah toho logu.
Pokud budou problémy , spusť zoek v nouz. režimu.

Stáhni si Zemana AntiMalware Free z tohoto odkazu:
https://www.zemana.com/Download/AntiMal ... .Setup.exe
a ulož si ho na plochu.
Poklepej na tento soubor na ploše a postupuj podle pokynů k instalaci programu.
Přijmi licenci k používání programu EULA , pokud se nabídne.
Pokud je k dispozici aktualizace programu , klepni na tlačítko „Update now“ ( aktualizovat nyní).
Můžeš si zatrhnout i vytvoření bodu obnovy:
Klikni na ozubené kolečko , poté na „Skenování“ a zatrhni „vytvářet body obnovy“.
Vrať se zpět ( klikni na domeček).
Zavři všechny otevřené soubory, složky a prohlížeče
Neměň žádné nastavení. Klikni na „Skenovat“.
Po skenu lze vidět , zda jsou nějaké nákazy. Klikni na „Další“. Nákazy budou přemístěny do karantény.
Když je skenování dokončeno, objeví se tisková zpráva , zkopíruj sem celý obsah té zprávy.
Jinak můžeš zprávy vidět , když klikneš vpravo nahoře na „ zprávy“.


Vlož nový log z HJT + informuj o problémech
Při práci s programy HJT, ComboFix,MbAM, SDFix aj. zavřete všechny ostatní aplikace a prohlížeče!
Neposílejte logy do soukromých zpráv.Po dobu mé nepřítomnosti mě zastupuje memphisto , Žbeky a Orcus.
Pokud budete spokojeni , můžete podpořit naše forum:Podpora fóra

Uživatelský avatar
Amurex
Level 2
Level 2
Příspěvky: 204
Registrován: listopad 11
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu hijack

Příspěvekod Amurex » 20 říj 2017 15:08

RogueKiller V12.11.20.0 (x64) [Oct 16 2017] (Free) by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : https://forum.adlice.com
Website : http://www.adlice.com/download/roguekiller/
Blog : http://www.adlice.com

Operating System : Windows 10 (10.0.14393) 64 bits version
Started in : Normal mode
User : Amurex [Administrator]
Started from : C:\Users\Amurex\Desktop\RogueKiller_portable64.exe
Mode : Delete -- Date : 10/20/2017 14:51:36 (Duration : 00:13:35)

¤¤¤ Processes : 2 ¤¤¤
[PUP.HackTool|VT.HackTool:Win32/AutoKMS] Service_KMS.exe(2256) -- C:\Program Files\KMSpico\Service_KMS.exe[-] -> Killed [TermProc]
[PUP.HackTool|VT.HackTool:Win32/AutoKMS] (SVC) Service KMSELDI -- C:\Program Files\KMSpico\Service_KMS.exe[-] -> ERROR [6d]

¤¤¤ Registry : 1 ¤¤¤
[PUP.HackTool|VT.HackTool:Win32/AutoKMS] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Service KMSELDI (C:\Program Files\KMSpico\Service_KMS.exe) -> Deleted

¤¤¤ Tasks : 1 ¤¤¤
[PUP.HackTool] \AutoPico Daily Restart -- "C:\Program Files\KMSpico\AutoPico.exe" (/silent) -> Not selected

¤¤¤ Files : 13 ¤¤¤
[PUP.Gen0][File] C:\Windows\SECOH-QAD.exe -> Deleted
[PUP.uTorrentAds][File] C:\Users\Amurex\AppData\Roaming\uTorrent\updates\3.4.9_42606\utorrentie.exe -> Deleted
[PUP.uTorrentAds][File] C:\Users\Amurex\AppData\Roaming\uTorrent\updates\3.4.9_42923\utorrentie.exe -> Deleted
[PUP.uTorrentAds][File] C:\Users\Amurex\AppData\Roaming\uTorrent\updates\3.4.9_42973\utorrentie.exe -> Deleted
[PUP.uTorrentAds][File] C:\Users\Amurex\AppData\Roaming\uTorrent\updates\3.4.9_43085\utorrentie.exe -> Deleted
[PUP.uTorrentAds][File] C:\Users\Amurex\AppData\Roaming\uTorrent\updates\3.4.9_43295\utorrentie.exe -> Deleted
[PUP.uTorrentAds][File] C:\Users\Amurex\AppData\Roaming\uTorrent\updates\3.4.9_43388\utorrentie.exe -> Deleted
[PUP.uTorrentAds][File] C:\Users\Amurex\AppData\Roaming\uTorrent\updates\3.5.0_43580\utorrentie.exe -> Deleted
[PUP.uTorrentAds][File] C:\Users\Amurex\AppData\Roaming\uTorrent\updates\3.5.0_43804\utorrentie.exe -> Deleted
[PUP.uTorrentAds][File] C:\Users\Amurex\AppData\Roaming\uTorrent\updates\3.5.0_43916\utorrentie.exe -> Deleted
[PUP.uTorrentAds][File] C:\Users\Amurex\AppData\Roaming\uTorrent\updates\3.5.0_44090\utorrentie.exe -> Deleted
[PUP.HackTool][Folder] C:\ProgramData\Microsoft\Windows\Start Menu\Programs\KMSpico -> Deleted
[PUP.HackTool][File] C:\ProgramData\Microsoft\Windows\Start Menu\Programs\KMSpico\AutoPico.lnk -> Deleted
[PUP.HackTool][File] C:\ProgramData\Microsoft\Windows\Start Menu\Programs\KMSpico\KMSpico.lnk -> Deleted
[PUP.HackTool][File] C:\ProgramData\Microsoft\Windows\Start Menu\Programs\KMSpico\Log KMSpico.lnk -> Deleted
[PUP.HackTool][File] C:\ProgramData\Microsoft\Windows\Start Menu\Programs\KMSpico\Uninstall KMSpico.lnk -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\installAll.cmd -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Access\AccessVLReg32.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Access\AccessVLReg64.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Access\AccessVLRegWOW.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Access\Access_KMS_Client.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Access\Access_KMS_Client.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Access\Access_KMS_Client.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Access\Access_KMS_Client.RAC_Priv.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Access\Access_KMS_Client.RAC_Pub.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Access\Access_MAK.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Access\Access_MAK.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Access\Access_MAK.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Access\Access_MAK.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2010\Access -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Excel\ExcelVLReg32.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Excel\ExcelVLReg64.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Excel\ExcelVLRegWOW.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Excel\Excel_KMS_Client.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Excel\Excel_KMS_Client.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Excel\Excel_KMS_Client.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Excel\Excel_KMS_Client.RAC_Priv.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Excel\Excel_KMS_Client.RAC_Pub.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Excel\Excel_MAK.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Excel\Excel_MAK.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Excel\Excel_MAK.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Excel\Excel_MAK.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2010\Excel -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Groove\GrooveVLReg32.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Groove\GrooveVLReg64.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Groove\GrooveVLRegWOW.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Groove\Groove_KMS_Client.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Groove\Groove_KMS_Client.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Groove\Groove_KMS_Client.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Groove\Groove_KMS_Client.RAC_Priv.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Groove\Groove_KMS_Client.RAC_Pub.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Groove\Groove_MAK.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Groove\Groove_MAK.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Groove\Groove_MAK.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Groove\Groove_MAK.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2010\Groove -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\InfoPath\InfoPathVLReg32.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\InfoPath\InfoPathVLReg64.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\InfoPath\InfoPathVLRegWOW.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\InfoPath\InfoPath_KMS_Client.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\InfoPath\InfoPath_KMS_Client.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\InfoPath\InfoPath_KMS_Client.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\InfoPath\InfoPath_KMS_Client.RAC_Priv.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\InfoPath\InfoPath_KMS_Client.RAC_Pub.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\InfoPath\InfoPath_MAK.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\InfoPath\InfoPath_MAK.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\InfoPath\InfoPath_MAK.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\InfoPath\InfoPath_MAK.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2010\InfoPath -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\OneNote\OneNoteVLReg32.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\OneNote\OneNoteVLReg64.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\OneNote\OneNoteVLRegWOW.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\OneNote\OneNote_KMS_Client.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\OneNote\OneNote_KMS_Client.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\OneNote\OneNote_KMS_Client.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\OneNote\OneNote_KMS_Client.RAC_Priv.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\OneNote\OneNote_KMS_Client.RAC_Pub.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\OneNote\OneNote_MAK.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\OneNote\OneNote_MAK.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\OneNote\OneNote_MAK.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\OneNote\OneNote_MAK.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2010\OneNote -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Outlook\OutlookVLReg32.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Outlook\OutlookVLReg64.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Outlook\OutlookVLRegWOW.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Outlook\Outlook_KMS_Client.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Outlook\Outlook_KMS_Client.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Outlook\Outlook_KMS_Client.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Outlook\Outlook_KMS_Client.RAC_Priv.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Outlook\Outlook_KMS_Client.RAC_Pub.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Outlook\Outlook_MAK.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Outlook\Outlook_MAK.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Outlook\Outlook_MAK.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Outlook\Outlook_MAK.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2010\Outlook -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\PowerPoint\PowerPointVLReg32.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\PowerPoint\PowerPointVLReg64.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\PowerPoint\PowerPointVLRegWOW.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\PowerPoint\PowerPoint_KMS_Client.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\PowerPoint\PowerPoint_KMS_Client.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\PowerPoint\PowerPoint_KMS_Client.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\PowerPoint\PowerPoint_KMS_Client.RAC_Priv.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\PowerPoint\PowerPoint_KMS_Client.RAC_Pub.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\PowerPoint\PowerPoint_MAK.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\PowerPoint\PowerPoint_MAK.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\PowerPoint\PowerPoint_MAK.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\PowerPoint\PowerPoint_MAK.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2010\PowerPoint -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectPro\ProjectProVLReg32.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectPro\ProjectProVLReg64.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectPro\ProjectProVLRegWOW.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectPro\ProjectPro_KMS_Client.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectPro\ProjectPro_KMS_Client.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectPro\ProjectPro_KMS_Client.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectPro\ProjectPro_KMS_Client.RAC_Priv.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectPro\ProjectPro_KMS_Client.RAC_Pub.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectPro\ProjectPro_MAK.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectPro\ProjectPro_MAK.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectPro\ProjectPro_MAK.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectPro\ProjectPro_MAK.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2010\ProjectPro -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectStd\ProjectStdVLReg32.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectStd\ProjectStdVLReg64.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectStd\ProjectStdVLRegWOW.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectStd\ProjectStd_KMS_Client.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectStd\ProjectStd_KMS_Client.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectStd\ProjectStd_KMS_Client.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectStd\ProjectStd_KMS_Client.RAC_Priv.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectStd\ProjectStd_KMS_Client.RAC_Pub.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectStd\ProjectStd_MAK.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectStd\ProjectStd_MAK.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectStd\ProjectStd_MAK.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectStd\ProjectStd_MAK.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectStd\ProjectStd_MAK2.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectStd\ProjectStd_MAK2.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectStd\ProjectStd_MAK2.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProjectStd\ProjectStd_MAK2.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2010\ProjectStd -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProPlus\ProPlusAcad_MAK.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProPlus\ProPlusAcad_MAK.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProPlus\ProPlusAcad_MAK.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProPlus\ProPlusAcad_MAK.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProPlus\ProPlusVLReg32.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProPlus\ProPlusVLReg64.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProPlus\ProPlusVLRegWOW.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProPlus\ProPlus_KMS_Client.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProPlus\ProPlus_KMS_Client.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProPlus\ProPlus_KMS_Client.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProPlus\ProPlus_KMS_Client.RAC_Priv.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProPlus\ProPlus_KMS_Client.RAC_Pub.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProPlus\ProPlus_MAK.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProPlus\ProPlus_MAK.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProPlus\ProPlus_MAK.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\ProPlus\ProPlus_MAK.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2010\ProPlus -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Publisher\PublisherVLReg32.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Publisher\PublisherVLReg64.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Publisher\PublisherVLRegWOW.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Publisher\Publisher_KMS_Client.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Publisher\Publisher_KMS_Client.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Publisher\Publisher_KMS_Client.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Publisher\Publisher_KMS_Client.RAC_Priv.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Publisher\Publisher_KMS_Client.RAC_Pub.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Publisher\Publisher_MAK.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Publisher\Publisher_MAK.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Publisher\Publisher_MAK.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Publisher\Publisher_MAK.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2010\Publisher -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\SmallBusBasics\SmallBusBasicsVLReg32.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\SmallBusBasics\SmallBusBasicsVLReg64.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\SmallBusBasics\SmallBusBasicsVLRegWOW.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\SmallBusBasics\SmallBusBasics_KMS_Client.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\SmallBusBasics\SmallBusBasics_KMS_Client.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\SmallBusBasics\SmallBusBasics_KMS_Client.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\SmallBusBasics\SmallBusBasics_KMS_Client.RAC_Priv.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\SmallBusBasics\SmallBusBasics_KMS_Client.RAC_Pub.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\SmallBusBasics\SmallBusBasics_MAK.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\SmallBusBasics\SmallBusBasics_MAK.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\SmallBusBasics\SmallBusBasics_MAK.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\SmallBusBasics\SmallBusBasics_MAK.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2010\SmallBusBasics -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Standard\StandardAcad_MAK.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Standard\StandardAcad_MAK.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Standard\StandardAcad_MAK.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Standard\StandardAcad_MAK.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Standard\StandardVLReg32.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Standard\StandardVLReg64.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Standard\StandardVLRegWOW.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Standard\Standard_KMS_Client.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Standard\Standard_KMS_Client.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Standard\Standard_KMS_Client.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Standard\Standard_KMS_Client.RAC_Priv.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Standard\Standard_KMS_Client.RAC_Pub.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Standard\Standard_MAK.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Standard\Standard_MAK.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Standard\Standard_MAK.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Standard\Standard_MAK.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2010\Standard -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioPrem_KMS_Client.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioPrem_KMS_Client.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioPrem_KMS_Client.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioPrem_KMS_Client.RAC_Priv.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioPrem_KMS_Client.RAC_Pub.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioPrem_MAK.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioPrem_MAK.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioPrem_MAK.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioPrem_MAK.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioPro_KMS_Client.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioPro_KMS_Client.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioPro_KMS_Client.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioPro_KMS_Client.RAC_Priv.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioPro_KMS_Client.RAC_Pub.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioPro_MAK.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioPro_MAK.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioPro_MAK.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioPro_MAK.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioStd_KMS_Client.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioStd_KMS_Client.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioStd_KMS_Client.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioStd_KMS_Client.RAC_Priv.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioStd_KMS_Client.RAC_Pub.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioStd_MAK.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioStd_MAK.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioStd_MAK.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioStd_MAK.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioVLReg32.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioVLReg64.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Visio\VisioVLRegWOW.reg -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2010\Visio -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Word\WordVLReg32.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Word\WordVLReg64.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Word\WordVLRegWOW.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Word\Word_KMS_Client.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Word\Word_KMS_Client.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Word\Word_KMS_Client.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Word\Word_KMS_Client.RAC_Priv.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Word\Word_KMS_Client.RAC_Pub.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Word\Word_MAK.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Word\Word_MAK.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Word\Word_MAK.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2010\Word\Word_MAK.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2010\Word -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2010 -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Access\AccessVL_KMS_Client_OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Access\AccessVL_KMS_Client_PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Access\AccessVL_KMS_Client_PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Access\Licenses.sl.ISSUANCE.CLIENT_BRIDGE_OFFICE.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Access\Licenses.sl.ISSUANCE.CLIENT_ROOT.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Access\Licenses.sl.ISSUANCE.CLIENT_ROOT_BRIDGE_TEST.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Access\Licenses.sl.ISSUANCE.CLIENT_STIL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Access\Licenses.sl.ISSUANCE.CLIENT_UL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Access\Licenses.sl.ISSUANCE.CLIENT_UL_OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Access\Licenses.sl.PKEYCONFIG.SIGNED.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Access\LicenseSetData._4374022D_56B8_48C1_9BB7_D8F2FC726343.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Access\LicenseSetData._4374022D_56B8_48C1_9BB7_D8F2FC726343.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Access\LicenseSetData._4374022D_56B8_48C1_9BB7_D8F2FC726343.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Access\LicenseSetData._4374022D_56B8_48C1_9BB7_D8F2FC726343.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Access\LicenseSetData._6EE7622C_18D8_4005_9FB7_92DB644A279B.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Access\LicenseSetData._6EE7622C_18D8_4005_9FB7_92DB644A279B.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Access\LicenseSetData._6EE7622C_18D8_4005_9FB7_92DB644A279B.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2013\Access -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Excel\Licenses.sl.ISSUANCE.CLIENT_BRIDGE_OFFICE.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Excel\Licenses.sl.ISSUANCE.CLIENT_ROOT.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Excel\Licenses.sl.ISSUANCE.CLIENT_ROOT_BRIDGE_TEST.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Excel\Licenses.sl.ISSUANCE.CLIENT_STIL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Excel\Licenses.sl.ISSUANCE.CLIENT_UL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Excel\Licenses.sl.ISSUANCE.CLIENT_UL_OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Excel\Licenses.sl.PKEYCONFIG.SIGNED.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Excel\LicenseSetData._AC1AE7FD_B949_4E04_A330_849BC40638CF.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Excel\LicenseSetData._AC1AE7FD_B949_4E04_A330_849BC40638CF.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Excel\LicenseSetData._AC1AE7FD_B949_4E04_A330_849BC40638CF.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Excel\LicenseSetData._AC1AE7FD_B949_4E04_A330_849BC40638CF.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Excel\LicenseSetData._F7461D52_7C2B_43B2_8744_EA958E0BD09A.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Excel\LicenseSetData._F7461D52_7C2B_43B2_8744_EA958E0BD09A.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Excel\LicenseSetData._F7461D52_7C2B_43B2_8744_EA958E0BD09A.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2013\Excel -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\InfoPath\Licenses.sl.ISSUANCE.CLIENT_BRIDGE_OFFICE.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\InfoPath\Licenses.sl.ISSUANCE.CLIENT_ROOT.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\InfoPath\Licenses.sl.ISSUANCE.CLIENT_ROOT_BRIDGE_TEST.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\InfoPath\Licenses.sl.ISSUANCE.CLIENT_STIL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\InfoPath\Licenses.sl.ISSUANCE.CLIENT_UL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\InfoPath\Licenses.sl.ISSUANCE.CLIENT_UL_OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\InfoPath\Licenses.sl.PKEYCONFIG.SIGNED.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\InfoPath\LicenseSetData._9E016989_4007_42A6_8051_64EB97110CF2.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\InfoPath\LicenseSetData._9E016989_4007_42A6_8051_64EB97110CF2.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\InfoPath\LicenseSetData._9E016989_4007_42A6_8051_64EB97110CF2.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\InfoPath\LicenseSetData._9E016989_4007_42A6_8051_64EB97110CF2.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\InfoPath\LicenseSetData._A30B8040_D68A_423F_B0B5_9CE292EA5A8F.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\InfoPath\LicenseSetData._A30B8040_D68A_423F_B0B5_9CE292EA5A8F.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\InfoPath\LicenseSetData._A30B8040_D68A_423F_B0B5_9CE292EA5A8F.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2013\InfoPath -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Licenses.sl.ISSUANCE.CLIENT_BRIDGE_OFFICE.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Licenses.sl.ISSUANCE.CLIENT_ROOT.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Licenses.sl.ISSUANCE.CLIENT_ROOT_BRIDGE_TEST.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Licenses.sl.ISSUANCE.CLIENT_STIL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Licenses.sl.ISSUANCE.CLIENT_UL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Licenses.sl.ISSUANCE.CLIENT_UL_OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Lync\Licenses.sl.ISSUANCE.CLIENT_BRIDGE_OFFICE.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Lync\Licenses.sl.ISSUANCE.CLIENT_ROOT.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Lync\Licenses.sl.ISSUANCE.CLIENT_ROOT_BRIDGE_TEST.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Lync\Licenses.sl.ISSUANCE.CLIENT_STIL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Lync\Licenses.sl.ISSUANCE.CLIENT_UL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Lync\Licenses.sl.ISSUANCE.CLIENT_UL_OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Lync\Licenses.sl.PKEYCONFIG.SIGNED.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Lync\LicenseSetData._1B9F11E3_C85C_4E1B_BB29_879AD2C909E3.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Lync\LicenseSetData._1B9F11E3_C85C_4E1B_BB29_879AD2C909E3.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Lync\LicenseSetData._1B9F11E3_C85C_4E1B_BB29_879AD2C909E3.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Lync\LicenseSetData._E1264E10_AFAF_4439_A98B_256DF8BB156F.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Lync\LicenseSetData._E1264E10_AFAF_4439_A98B_256DF8BB156F.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Lync\LicenseSetData._E1264E10_AFAF_4439_A98B_256DF8BB156F.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Lync\LicenseSetData._E1264E10_AFAF_4439_A98B_256DF8BB156F.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2013\Lync -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\OneNote\Licenses.sl.ISSUANCE.CLIENT_BRIDGE_OFFICE.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\OneNote\Licenses.sl.ISSUANCE.CLIENT_ROOT.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\OneNote\Licenses.sl.ISSUANCE.CLIENT_ROOT_BRIDGE_TEST.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\OneNote\Licenses.sl.ISSUANCE.CLIENT_STIL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\OneNote\Licenses.sl.ISSUANCE.CLIENT_UL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\OneNote\Licenses.sl.ISSUANCE.CLIENT_UL_OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\OneNote\Licenses.sl.PKEYCONFIG.SIGNED.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\OneNote\LicenseSetData._B067E965_7521_455B_B9F7_C740204578A2.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\OneNote\LicenseSetData._B067E965_7521_455B_B9F7_C740204578A2.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\OneNote\LicenseSetData._B067E965_7521_455B_B9F7_C740204578A2.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\OneNote\LicenseSetData._B067E965_7521_455B_B9F7_C740204578A2.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\OneNote\LicenseSetData._EFE1F3E6_AEA2_4144_A208_32AA872B6545.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\OneNote\LicenseSetData._EFE1F3E6_AEA2_4144_A208_32AA872B6545.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\OneNote\LicenseSetData._EFE1F3E6_AEA2_4144_A208_32AA872B6545.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2013\OneNote -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Outlook\Licenses.sl.ISSUANCE.CLIENT_BRIDGE_OFFICE.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Outlook\Licenses.sl.ISSUANCE.CLIENT_ROOT.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Outlook\Licenses.sl.ISSUANCE.CLIENT_ROOT_BRIDGE_TEST.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Outlook\Licenses.sl.ISSUANCE.CLIENT_STIL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Outlook\Licenses.sl.ISSUANCE.CLIENT_UL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Outlook\Licenses.sl.ISSUANCE.CLIENT_UL_OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Outlook\Licenses.sl.PKEYCONFIG.SIGNED.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Outlook\LicenseSetData._771C3AFA_50C5_443F_B151_FF2546D863A0.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Outlook\LicenseSetData._771C3AFA_50C5_443F_B151_FF2546D863A0.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Outlook\LicenseSetData._771C3AFA_50C5_443F_B151_FF2546D863A0.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Outlook\LicenseSetData._8D577C50_AE5E_47FD_A240_24986F73D503.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Outlook\LicenseSetData._8D577C50_AE5E_47FD_A240_24986F73D503.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Outlook\LicenseSetData._8D577C50_AE5E_47FD_A240_24986F73D503.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Outlook\LicenseSetData._8D577C50_AE5E_47FD_A240_24986F73D503.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2013\Outlook -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\pkeyconfig-office.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\PowerPoint\Licenses.sl.ISSUANCE.CLIENT_BRIDGE_OFFICE.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\PowerPoint\Licenses.sl.ISSUANCE.CLIENT_ROOT.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\PowerPoint\Licenses.sl.ISSUANCE.CLIENT_ROOT_BRIDGE_TEST.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\PowerPoint\Licenses.sl.ISSUANCE.CLIENT_STIL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\PowerPoint\Licenses.sl.ISSUANCE.CLIENT_UL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\PowerPoint\Licenses.sl.ISSUANCE.CLIENT_UL_OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\PowerPoint\Licenses.sl.PKEYCONFIG.SIGNED.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\PowerPoint\LicenseSetData._8C762649_97D1_4953_AD27_B7E2C25B972E.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\PowerPoint\LicenseSetData._8C762649_97D1_4953_AD27_B7E2C25B972E.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\PowerPoint\LicenseSetData._8C762649_97D1_4953_AD27_B7E2C25B972E.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\PowerPoint\LicenseSetData._E40DCB44_1D5C_4085_8E8F_943F33C4F004.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\PowerPoint\LicenseSetData._E40DCB44_1D5C_4085_8E8F_943F33C4F004.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\PowerPoint\LicenseSetData._E40DCB44_1D5C_4085_8E8F_943F33C4F004.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\PowerPoint\LicenseSetData._E40DCB44_1D5C_4085_8E8F_943F33C4F004.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2013\PowerPoint -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectPro\Licenses.sl.ISSUANCE.CLIENT_BRIDGE_OFFICE.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectPro\Licenses.sl.ISSUANCE.CLIENT_ROOT.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectPro\Licenses.sl.ISSUANCE.CLIENT_ROOT_BRIDGE_TEST.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectPro\Licenses.sl.ISSUANCE.CLIENT_STIL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectPro\Licenses.sl.ISSUANCE.CLIENT_UL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectPro\Licenses.sl.ISSUANCE.CLIENT_UL_OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectPro\Licenses.sl.PKEYCONFIG.SIGNED.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectPro\LicenseSetData._4A5D124A_E620_44BA_B6FF_658961B33B9A.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectPro\LicenseSetData._4A5D124A_E620_44BA_B6FF_658961B33B9A.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectPro\LicenseSetData._4A5D124A_E620_44BA_B6FF_658961B33B9A.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectPro\LicenseSetData._ED34DC89_1C27_4ECD_8B2F_63D0F4CEDC32.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectPro\LicenseSetData._ED34DC89_1C27_4ECD_8B2F_63D0F4CEDC32.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectPro\LicenseSetData._ED34DC89_1C27_4ECD_8B2F_63D0F4CEDC32.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectPro\LicenseSetData._ED34DC89_1C27_4ECD_8B2F_63D0F4CEDC32.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2013\ProjectPro -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectStd\Licenses.sl.ISSUANCE.CLIENT_BRIDGE_OFFICE.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectStd\Licenses.sl.ISSUANCE.CLIENT_ROOT.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectStd\Licenses.sl.ISSUANCE.CLIENT_ROOT_BRIDGE_TEST.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectStd\Licenses.sl.ISSUANCE.CLIENT_STIL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectStd\Licenses.sl.ISSUANCE.CLIENT_UL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectStd\Licenses.sl.ISSUANCE.CLIENT_UL_OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectStd\Licenses.sl.PKEYCONFIG.SIGNED.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectStd\LicenseSetData._2B9E4A37_6230_4B42_BEE2_E25CE86C8C7A.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectStd\LicenseSetData._2B9E4A37_6230_4B42_BEE2_E25CE86C8C7A.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectStd\LicenseSetData._2B9E4A37_6230_4B42_BEE2_E25CE86C8C7A.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectStd\LicenseSetData._2B9E4A37_6230_4B42_BEE2_E25CE86C8C7A.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectStd\LicenseSetData._427A28D1_D17C_4ABF_B717_32C780BA6F07.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectStd\LicenseSetData._427A28D1_D17C_4ABF_B717_32C780BA6F07.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProjectStd\LicenseSetData._427A28D1_D17C_4ABF_B717_32C780BA6F07.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2013\ProjectStd -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProPlus\Licenses.sl.ISSUANCE.CLIENT_BRIDGE_OFFICE.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProPlus\Licenses.sl.ISSUANCE.CLIENT_ROOT.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProPlus\Licenses.sl.ISSUANCE.CLIENT_ROOT_BRIDGE_TEST.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProPlus\Licenses.sl.ISSUANCE.CLIENT_STIL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProPlus\Licenses.sl.ISSUANCE.CLIENT_UL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProPlus\Licenses.sl.ISSUANCE.CLIENT_UL_OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProPlus\Licenses.sl.PKEYCONFIG.SIGNED.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProPlus\LicenseSetData._2B88C4F2_EA8F_43CD_805E_4D41346E18A7.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProPlus\LicenseSetData._2B88C4F2_EA8F_43CD_805E_4D41346E18A7.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProPlus\LicenseSetData._2B88C4F2_EA8F_43CD_805E_4D41346E18A7.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProPlus\LicenseSetData._2B88C4F2_EA8F_43CD_805E_4D41346E18A7.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProPlus\LicenseSetData._B322DA9C_A2E2_4058_9E4E_F59A6970BD69.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProPlus\LicenseSetData._B322DA9C_A2E2_4058_9E4E_F59A6970BD69.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProPlus\LicenseSetData._B322DA9C_A2E2_4058_9E4E_F59A6970BD69.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\ProPlus\proplus.reg -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2013\ProPlus -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Publisher\Licenses.sl.ISSUANCE.CLIENT_BRIDGE_OFFICE.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Publisher\Licenses.sl.ISSUANCE.CLIENT_ROOT.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Publisher\Licenses.sl.ISSUANCE.CLIENT_ROOT_BRIDGE_TEST.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Publisher\Licenses.sl.ISSUANCE.CLIENT_STIL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Publisher\Licenses.sl.ISSUANCE.CLIENT_UL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Publisher\Licenses.sl.ISSUANCE.CLIENT_UL_OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Publisher\Licenses.sl.PKEYCONFIG.SIGNED.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Publisher\LicenseSetData._00C79FF1_6850_443D_BF61_71CDE0DE305F.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Publisher\LicenseSetData._00C79FF1_6850_443D_BF61_71CDE0DE305F.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Publisher\LicenseSetData._00C79FF1_6850_443D_BF61_71CDE0DE305F.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Publisher\LicenseSetData._38EA49F6_AD1D_43F1_9888_99A35D7C9409.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Publisher\LicenseSetData._38EA49F6_AD1D_43F1_9888_99A35D7C9409.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Publisher\LicenseSetData._38EA49F6_AD1D_43F1_9888_99A35D7C9409.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Publisher\LicenseSetData._38EA49F6_AD1D_43F1_9888_99A35D7C9409.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2013\Publisher -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Standard\Licenses.sl.ISSUANCE.CLIENT_BRIDGE_OFFICE.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Standard\Licenses.sl.ISSUANCE.CLIENT_ROOT.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Standard\Licenses.sl.ISSUANCE.CLIENT_ROOT_BRIDGE_TEST.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Standard\Licenses.sl.ISSUANCE.CLIENT_STIL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Standard\Licenses.sl.ISSUANCE.CLIENT_UL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Standard\Licenses.sl.ISSUANCE.CLIENT_UL_OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Standard\Licenses.sl.PKEYCONFIG.SIGNED.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Standard\LicenseSetData._A24CCA51_3D54_4C41_8A76_4031F5338CB2.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Standard\LicenseSetData._A24CCA51_3D54_4C41_8A76_4031F5338CB2.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Standard\LicenseSetData._A24CCA51_3D54_4C41_8A76_4031F5338CB2.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Standard\LicenseSetData._A24CCA51_3D54_4C41_8A76_4031F5338CB2.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Standard\LicenseSetData._B13AFB38_CD79_4AE5_9F7F_EED058D750CA.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Standard\LicenseSetData._B13AFB38_CD79_4AE5_9F7F_EED058D750CA.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Standard\LicenseSetData._B13AFB38_CD79_4AE5_9F7F_EED058D750CA.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2013\Standard -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioPro\Licenses.sl.ISSUANCE.CLIENT_BRIDGE_OFFICE.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioPro\Licenses.sl.ISSUANCE.CLIENT_ROOT.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioPro\Licenses.sl.ISSUANCE.CLIENT_ROOT_BRIDGE_TEST.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioPro\Licenses.sl.ISSUANCE.CLIENT_STIL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioPro\Licenses.sl.ISSUANCE.CLIENT_UL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioPro\Licenses.sl.ISSUANCE.CLIENT_UL_OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioPro\Licenses.sl.PKEYCONFIG.SIGNED.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioPro\LicenseSetData._3E4294DD_A765_49BC_8DBD_CF8B62A4BD3D.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioPro\LicenseSetData._3E4294DD_A765_49BC_8DBD_CF8B62A4BD3D.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioPro\LicenseSetData._3E4294DD_A765_49BC_8DBD_CF8B62A4BD3D.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioPro\LicenseSetData._3E4294DD_A765_49BC_8DBD_CF8B62A4BD3D.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioPro\LicenseSetData._E13AC10E_75D0_4AFF_A0CD_764982CF541C.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioPro\LicenseSetData._E13AC10E_75D0_4AFF_A0CD_764982CF541C.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioPro\LicenseSetData._E13AC10E_75D0_4AFF_A0CD_764982CF541C.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioPro\visio.reg -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2013\VisioPro -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioStd\Licenses.sl.ISSUANCE.CLIENT_BRIDGE_OFFICE.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioStd\Licenses.sl.ISSUANCE.CLIENT_ROOT.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioStd\Licenses.sl.ISSUANCE.CLIENT_ROOT_BRIDGE_TEST.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioStd\Licenses.sl.ISSUANCE.CLIENT_STIL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioStd\Licenses.sl.ISSUANCE.CLIENT_UL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioStd\Licenses.sl.ISSUANCE.CLIENT_UL_OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioStd\Licenses.sl.PKEYCONFIG.SIGNED.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioStd\LicenseSetData._44A1F6FF_0876_4EDB_9169_DBB43101EE89.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioStd\LicenseSetData._44A1F6FF_0876_4EDB_9169_DBB43101EE89.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioStd\LicenseSetData._44A1F6FF_0876_4EDB_9169_DBB43101EE89.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioStd\LicenseSetData._44A1F6FF_0876_4EDB_9169_DBB43101EE89.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioStd\LicenseSetData._AC4EFAF0_F81F_4F61_BDF7_EA32B02AB117.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioStd\LicenseSetData._AC4EFAF0_F81F_4F61_BDF7_EA32B02AB117.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\VisioStd\LicenseSetData._AC4EFAF0_F81F_4F61_BDF7_EA32B02AB117.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2013\VisioStd -> Deleted

Uživatelský avatar
Amurex
Level 2
Level 2
Příspěvky: 204
Registrován: listopad 11
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu hijack

Příspěvekod Amurex » 20 říj 2017 15:08

[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Word\Licenses.sl.ISSUANCE.CLIENT_BRIDGE_OFFICE.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Word\Licenses.sl.ISSUANCE.CLIENT_ROOT.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Word\Licenses.sl.ISSUANCE.CLIENT_ROOT_BRIDGE_TEST.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Word\Licenses.sl.ISSUANCE.CLIENT_STIL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Word\Licenses.sl.ISSUANCE.CLIENT_UL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Word\Licenses.sl.ISSUANCE.CLIENT_UL_OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Word\Licenses.sl.PKEYCONFIG.SIGNED.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Word\LicenseSetData._9CEDEF15_BE37_4FF0_A08A_13A045540641.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Word\LicenseSetData._9CEDEF15_BE37_4FF0_A08A_13A045540641.PHN.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Word\LicenseSetData._9CEDEF15_BE37_4FF0_A08A_13A045540641.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Word\LicenseSetData._9CEDEF15_BE37_4FF0_A08A_13A045540641.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Word\LicenseSetData._D9F5B1C6_5386_495A_88F9_9AD6B41AC9B3.OOB.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Word\LicenseSetData._D9F5B1C6_5386_495A_88F9_9AD6B41AC9B3.PL.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2013\Word\LicenseSetData._D9F5B1C6_5386_495A_88F9_9AD6B41AC9B3.PPDLIC.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2013\Word -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2013 -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\Access\AccessVL_KMS_Client-ppd.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\Access\AccessVL_KMS_Client-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\Access\AccessVL_KMS_Client-ul.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2016\Access -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\client-issuance-bridge-office.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\client-issuance-root-bridge-test.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\client-issuance-root.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\client-issuance-stil.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\client-issuance-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\client-issuance-ul.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\Excel\ExcelVL_KMS_Client-ppd.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\Excel\ExcelVL_KMS_Client-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\Excel\ExcelVL_KMS_Client-ul.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2016\Excel -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\Mondo\MondoVL_KMS_Client-ppd.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\Mondo\MondoVL_KMS_Client-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\Mondo\MondoVL_KMS_Client-ul.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2016\Mondo -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\OneNote\OneNoteVL_KMS_Client-ppd.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\OneNote\OneNoteVL_KMS_Client-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\OneNote\OneNoteVL_KMS_Client-ul.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2016\OneNote -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\Outlook\OutlookVL_KMS_Client-ppd.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\Outlook\OutlookVL_KMS_Client-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\Outlook\OutlookVL_KMS_Client-ul.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2016\Outlook -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\pkeyconfig-office.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\PowerPoint\PowerPointVL_KMS_Client-ppd.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\PowerPoint\PowerPointVL_KMS_Client-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\PowerPoint\PowerPointVL_KMS_Client-ul.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2016\PowerPoint -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\ProjectPro\ProjectProVL_KMS_Client-ppd.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\ProjectPro\ProjectProVL_KMS_Client-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\ProjectPro\ProjectProVL_KMS_Client-ul.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2016\ProjectPro -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\ProjectStd\ProjectStdVL_KMS_Client-ppd.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\ProjectStd\ProjectStdVL_KMS_Client-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\ProjectStd\ProjectStdVL_KMS_Client-ul.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2016\ProjectStd -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\ProPlus\ProPlusVL_KMS_Client-ppd.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\ProPlus\ProPlusVL_KMS_Client-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\ProPlus\ProPlusVL_KMS_Client-ul.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2016\ProPlus -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\Publisher\PublisherVL_KMS_Client-ppd.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\Publisher\PublisherVL_KMS_Client-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\Publisher\PublisherVL_KMS_Client-ul.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2016\Publisher -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\SkypeforBusiness\SkypeforBusinessVL_KMS_Client-ppd.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\SkypeforBusiness\SkypeforBusinessVL_KMS_Client-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\SkypeforBusiness\SkypeforBusinessVL_KMS_Client-ul.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2016\SkypeforBusiness -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\Standard\StandardVL_KMS_Client-ppd.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\Standard\StandardVL_KMS_Client-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\Standard\StandardVL_KMS_Client-ul.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2016\Standard -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\VisioPro\VisioProVL_KMS_Client-ppd.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\VisioPro\VisioProVL_KMS_Client-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\VisioPro\VisioProVL_KMS_Client-ul.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2016\VisioPro -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\VisioStd\VisioStdVL_KMS_Client-ppd.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\VisioStd\VisioStdVL_KMS_Client-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\VisioStd\VisioStdVL_KMS_Client-ul.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2016\VisioStd -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\Word\WordVL_KMS_Client-ppd.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\Word\WordVL_KMS_Client-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscert2016\Word\WordVL_KMS_Client-ul.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2016\Word -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscert2016 -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertW10\Core\Core-Volume-GVLK-1-ul-oob-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertW10\Core\Core-Volume-GVLK-1-ul-rtm.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertW10\Core -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertW10\Education\Education-Volume-GVLK-1-ul-oob-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertW10\Education\Education-Volume-GVLK-1-ul-rtm.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertW10\Education -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertW10\Enterprise\Enterprise-Volume-GVLK-1-ul-oob-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertW10\Enterprise\Enterprise-Volume-GVLK-1-ul-rtm.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertW10\Enterprise -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertW10\EnterpriseS\EnterpriseS-Volume-GVLK-1-ul-oob-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertW10\EnterpriseS\EnterpriseS-Volume-GVLK-1-ul-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertW10\EnterpriseS\EnterpriseS-Volume-GVLK-2-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertW10\EnterpriseS\EnterpriseS-Volume-GVLK-2-ul.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertW10\EnterpriseS -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertW10\pkeyconfig.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertW10\Professional\Professional-Volume-GVLK-1-ul-oob-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertW10\Professional\Professional-Volume-GVLK-1-ul-rtm.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertW10\Professional -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertW10 -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Business\Security-Licensing-SLC-Component-SKU-Business-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Business\Security-Licensing-SLC-Component-SKU-Business-ul-phn.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Business\Security-Licensing-SLC-Component-SKU-Business-VL-BYPASS-RAC-private.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Business\Security-Licensing-SLC-Component-SKU-Business-VL-BYPASS-RAC-public.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Business\Security-Licensing-SLC-Component-SKU-Business-VL-BYPASS-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Business\Security-Licensing-SLC-Component-SKU-Business-VL-BYPASS-ul.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Business\Security-Licensing-SLC-Component-SKU-Business-VL-KMS-pl.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Business\Security-Licensing-SLC-Component-SKU-Business-VL-KMS-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Business\Security-Licensing-SLC-Component-SKU-Business-VL-KMS-ul-phn.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Business\Security-Licensing-SLC-Component-SKU-Business-VL-KMS1-pl.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Business\Security-Licensing-SLC-Component-SKU-Business-VL-KMS1-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Business\Security-Licensing-SLC-Component-SKU-Business-VL-KMS1-ul-phn.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw6\Business -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\BusinessN\Security-Licensing-SLC-Component-SKU-BusinessN-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\BusinessN\Security-Licensing-SLC-Component-SKU-BusinessN-ul-phn.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\BusinessN\Security-Licensing-SLC-Component-SKU-BusinessN-VL-BYPASS-RAC-private.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\BusinessN\Security-Licensing-SLC-Component-SKU-BusinessN-VL-BYPASS-RAC-public.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\BusinessN\Security-Licensing-SLC-Component-SKU-BusinessN-VL-BYPASS-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\BusinessN\Security-Licensing-SLC-Component-SKU-BusinessN-VL-BYPASS-ul.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\BusinessN\Security-Licensing-SLC-Component-SKU-BusinessN-VL-KMS-pl.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\BusinessN\Security-Licensing-SLC-Component-SKU-BusinessN-VL-KMS-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\BusinessN\Security-Licensing-SLC-Component-SKU-BusinessN-VL-KMS-ul-phn.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\BusinessN\Security-Licensing-SLC-Component-SKU-BusinessN-VL-KMS1-pl.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\BusinessN\Security-Licensing-SLC-Component-SKU-BusinessN-VL-KMS1-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\BusinessN\Security-Licensing-SLC-Component-SKU-BusinessN-VL-KMS1-ul-phn.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw6\BusinessN -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Enterprise\Security-Licensing-SLC-Component-SKU-Enterprise-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Enterprise\Security-Licensing-SLC-Component-SKU-Enterprise-ul-phn.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Enterprise\Security-Licensing-SLC-Component-SKU-Enterprise-VL-BYPASS-RAC-private.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Enterprise\Security-Licensing-SLC-Component-SKU-Enterprise-VL-BYPASS-RAC-public.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Enterprise\Security-Licensing-SLC-Component-SKU-Enterprise-VL-BYPASS-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Enterprise\Security-Licensing-SLC-Component-SKU-Enterprise-VL-BYPASS-ul.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Enterprise\Security-Licensing-SLC-Component-SKU-Enterprise-VL-KMS-pl.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Enterprise\Security-Licensing-SLC-Component-SKU-Enterprise-VL-KMS-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Enterprise\Security-Licensing-SLC-Component-SKU-Enterprise-VL-KMS-ul-phn.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Enterprise\Security-Licensing-SLC-Component-SKU-Enterprise-VL-KMS1-pl.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Enterprise\Security-Licensing-SLC-Component-SKU-Enterprise-VL-KMS1-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\Enterprise\Security-Licensing-SLC-Component-SKU-Enterprise-VL-KMS1-ul-phn.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw6\Enterprise -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw6\pkeyconfig.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw6 -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw7\Embedded\pkeyconfig-embedded.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw7\Embedded\Security-SPP-Component-SKU-Embedded-pl.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw7\Embedded\Security-SPP-Component-SKU-Embedded-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw7\Embedded\Security-SPP-Component-SKU-Embedded-ul-phn.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw7\Embedded\Security-SPP-Component-SKU-Embedded-VLBA-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw7\Embedded\Security-SPP-Component-SKU-Embedded-VLBA-ul.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw7\Embedded -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw7\Enterprise -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw7\Professional\pkeyconfig.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw7\Professional\Security-SPP-Component-SKU-Professional-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw7\Professional\Security-SPP-Component-SKU-Professional-ul-phn.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw7\Professional\Security-SPP-Component-SKU-Professional-VL-BYPASS-RAC-private.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw7\Professional\Security-SPP-Component-SKU-Professional-VL-BYPASS-RAC-public.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw7\Professional\Security-SPP-Component-SKU-Professional-VL-BYPASS-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw7\Professional\Security-SPP-Component-SKU-Professional-VL-BYPASS-ul.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw7\Professional\Security-SPP-Component-SKU-Professional-VLKMS1-pl.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw7\Professional\Security-SPP-Component-SKU-Professional-VLKMS1-ul-oob.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw7\Professional\Security-SPP-Component-SKU-Professional-VLKMS1-ul-phn.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw7\Professional -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw7 -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw8\Core\Core-Volume-GVLK-1-ul-oob-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw8\Core\Core-Volume-GVLK-1-ul-rtm.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8\Core -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw8\CoreN\CoreN-Volume-GVLK-1-ul-oob-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw8\CoreN\CoreN-Volume-GVLK-1-ul-rtm.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8\CoreN -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw8\CoreSingleLanguage\CoreSingleLanguage-Volume-GVLK-1-ul-oob-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw8\CoreSingleLanguage\CoreSingleLanguage-Volume-GVLK-1-ul-rtm.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8\CoreSingleLanguage -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw8\Enterprise\Enterprise-Volume-GVLK-1-ul-oob-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw8\Enterprise\Enterprise-Volume-GVLK-1-ul-rtm.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8\Enterprise\plugin-manifests-signed -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8\Enterprise\tokens\addons\APPXLOB-Client -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8\Enterprise\tokens\addons\OCUR -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8\Enterprise\tokens\addons -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8\Enterprise\tokens\issuance -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8\Enterprise\tokens\legacy -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8\Enterprise\tokens\pkeyconfig -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8\Enterprise\tokens\ppdlic -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8\Enterprise\tokens\rules -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8\Enterprise\tokens\skus\csvlk-pack -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8\Enterprise\tokens\skus\Enterprise -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8\Enterprise\tokens\skus -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8\Enterprise\tokens -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8\Enterprise -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw8\EnterpriseN\EnterpriseN-Volume-GVLK-1-ul-oob-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw8\EnterpriseN\EnterpriseN-Volume-GVLK-1-ul-rtm.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8\EnterpriseN -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw8\pkeyconfig.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw8\Professional\Professional-Volume-GVLK-1-ul-oob-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw8\Professional\Professional-Volume-GVLK-1-ul-rtm.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8\Professional -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw8\ProfessionalN\ProfessionalN-Volume-GVLK-1-ul-oob-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw8\ProfessionalN\ProfessionalN-Volume-GVLK-1-ul-rtm.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8\ProfessionalN -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw8\ProfessionalWMC\ProfessionalWMC-Volume-GVLK-1-ul-oob-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw8\ProfessionalWMC\ProfessionalWMC-Volume-GVLK-1-ul-rtm.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8\ProfessionalWMC -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw8 -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw81\Core\Core-Volume-GVLK-1-ul-oob-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw81\Core\Core-Volume-GVLK-1-ul-rtm.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw81\Core -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw81\CoreConnectedSingleLanguage\CoreConnectedSingleLanguage-Volume-GVLK-1-ul-oob-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw81\CoreConnectedSingleLanguage\CoreConnectedSingleLanguage-Volume-GVLK-1-ul-rtm.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw81\CoreConnectedSingleLanguage -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw81\EmbeddedIndustry\EmbeddedIndustry-Volume-GVLK-1-ul-oob-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw81\EmbeddedIndustry\EmbeddedIndustry-Volume-GVLK-1-ul-rtm.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw81\EmbeddedIndustry -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw81\Enterprise\Enterprise-Volume-GVLK-1-ul-oob-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw81\Enterprise\Enterprise-Volume-GVLK-1-ul-rtm.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw81\Enterprise -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw81\pkeyconfig.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw81\Professional\Professional-Volume-GVLK-1-ul-oob-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw81\Professional\Professional-Volume-GVLK-1-ul-rtm.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw81\Professional -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw81\ProfessionalWMC\ProfessionalWMC-Volume-GVLK-1-ul-oob-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw81\ProfessionalWMC\ProfessionalWMC-Volume-GVLK-1-ul-rtm.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw81\ProfessionalWMC -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw81\ServerDatacenter\ServerDatacenter-Volume-GVLK-1-ul-oob-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw81\ServerDatacenter\ServerDatacenter-Volume-GVLK-1-ul-rtm.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw81\ServerDatacenter -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw81\ServerStandard\ServerStandard-Volume-GVLK-1-ul-oob-rtm.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\cert\kmscertw81\ServerStandard\ServerStandard-Volume-GVLK-1-ul-rtm.xrm-ms -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw81\ServerStandard -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert\kmscertw81 -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\cert -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\DevComponents.DotNetBar2.dll -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\DM.bin -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\driver\Cert.cmd -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\driver\certELDI.pfx -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\driver\OpenVPN.cer -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\driver\tap-windows-9.21.0.exe -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\driver\UnInstallDriver.cmd -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\driver -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\icons\Error.png -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\icons\Information.png -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\icons\Question.png -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\icons\Warning.png -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\icons -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\KMSELDI.exe -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\logs\AutoPico.log -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\logs\KMSELDI.log -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\logs\Service_KMS.log -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\logs -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\scripts\AddExceptionsWD.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\scripts\AddExceptions_Defender.cmd -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\scripts\DisableSmartScreen.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\scripts\EnableSmartScreen.cmd -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\scripts\EnableSmartScreen.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\scripts\Install_Service.cmd -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\scripts\Install_Task.cmd -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\scripts\Log.cmd -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\scripts\RemoveExceptionsWD.reg -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\scripts\Restore_Watermark.cmd -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\scripts\Silent.cmd -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\scripts\UnInstall_Service.cmd -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\scripts -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\Service_KMS.exe -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\sounds\affirmative.mp3 -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\sounds\begin.mp3 -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\sounds\complete.mp3 -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\sounds\diagnostic.mp3 -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\sounds\enterauthorizationcode.mp3 -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\sounds\incomingtransmission.mp3 -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\sounds\inputfailed.mp3 -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\sounds\inputok.mp3 -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\sounds\processing.mp3 -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\sounds\transfer.mp3 -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\sounds\verified.mp3 -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\sounds\warning.mp3 -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\sounds -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\TokensBackup\Keys.txt -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\TokensBackup\Windows\cache\cache.dat -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\TokensBackup\Windows\cache -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\TokensBackup\Windows\data.dat -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\TokensBackup\Windows\pkeyconfig.xrm-ms -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\TokensBackup\Windows\tokens.dat -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\TokensBackup\Windows -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\TokensBackup -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\unins000.dat -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\unins000.exe -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\UninsHs.exe -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\Vestris.ResourceLib.dll -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\WinDivert.dll -> Deleted
[PUP.HackTool][File] C:\Program Files\KMSpico\WinDivert.sys -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\x64 -> Deleted
[PUP.HackTool][Folder] C:\Program Files\KMSpico\x86 -> Deleted

¤¤¤ WMI : 0 ¤¤¤

¤¤¤ Hosts File : 0 ¤¤¤

¤¤¤ Antirootkit : 0 (Driver: Loaded) ¤¤¤

¤¤¤ Web browsers : 1 ¤¤¤
[PUP.Gen3][Chrome:Addon] Default : Save Tabs [dgjepfldodmdfmdidhhgamnklbdibndi] -> Deleted

¤¤¤ MBR Check : ¤¤¤
+++++ PhysicalDrive0: Patriot Spark +++++
--- User ---
[MBR] 3c657ca9e1552e8e03502c57d41cd0fa
[BSP] 299a1745ba9e2edfe13132b38a8e8831 : Windows Vista/7/8|VT.Unknown MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 121651 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] ACER (0x27) [VISIBLE] Offset (sectors): 249143296 | Size: 450 MB
User = LL1 ... OK
User = LL2 ... OK

Uživatelský avatar
Amurex
Level 2
Level 2
Příspěvky: 204
Registrován: listopad 11
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu hijack

Příspěvekod Amurex » 20 říj 2017 15:26

Zoek.exe v5.0.0.1 Updated 27-09-2015
Tool run by Amurex on Fri 10/20/2017 at 15:12:44.10.
Microsoft Windows 10 Pro 10.0.14393 x64
Running in: Normal Mode No Internet Access Detected
Launched: C:\Users\Amurex\Desktop\zoek.exe [Scan all users] [Script inserted]

==== System Restore Info ======================

10/20/2017 3:13:09 PM Zoek.exe System Restore Point Created Successfully.

==== Reset Hosts File ======================

# Copyright (c) 1993-2006 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host

127.0.0.1 localhost

==== Empty Folders Check ======================

C:\PROGRA~2\PokerStars.CZ deleted successfully
C:\Program Files\Common Files\AV deleted successfully
C:\PROGRA~3\Comms deleted successfully
C:\PROGRA~3\DAEMON Tools Pro deleted successfully
C:\PROGRA~3\SoftwareDistribution deleted successfully
C:\Users\Amurex\AppData\Local\NetworkTiles deleted successfully
C:\Users\Amurex\AppData\Local\PeerDistRepub deleted successfully
C:\Users\Amurex\AppData\Local\Ubisoft Game Launcher deleted successfully
C:\WINDOWS\serviceprofiles\networkservice\AppData\Local\Maps deleted successfully
C:\WINDOWS\serviceprofiles\networkservice\AppData\Local\PeerDistPub deleted successfully
C:\WINDOWS\serviceprofiles\networkservice\AppData\Local\PeerDistRepub deleted successfully
C:\WINDOWS\serviceprofiles\Localservice\AppData\Local\NetworkTiles deleted successfully

==== Deleting CLSID Registry Keys ======================


==== Deleting CLSID Registry Values ======================


==== Deleting Services ======================


==== Deleting Files \ Folders ======================

C:\PROGRA~2\PokerStars.CZ not found
C:\Users\Amurex\AppData\Roaming\HearthstoneDeckTracker deleted
C:\Users\Amurex\AppData\Roaming\Jivaro ehf deleted
C:\PROGRA~3\Package Cache deleted
C:\windows\SysNative\GroupPolicy\Machine deleted
C:\windows\SysNative\GroupPolicy\User deleted
C:\windows\SysNative\GroupPolicy\GPT.INI deleted
C:\WINDOWS\Syswow64\GroupPolicy\gpt.ini deleted

==== Chromium Look ======================

HKEY_LOCAL_MACHINE\SOFTWARE\Google\Chrome\Extensions
eofcbnmajmjmplflapaojjnihcjkigck - No path found[]
gomekmidlodglbbmalcneegieacbdmki - No path found[]

Avast SafePrice - Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\eofcbnmajmjmplflapaojjnihcjkigck
Avast Online Security - Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\gomekmidlodglbbmalcneegieacbdmki
StayFocusd - Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\laankejkbhbdhmipfmgcngdelahlfoji
Chrome Media Router - Amurex\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm

==== Chromium Fix ======================

C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_toolbar.yahoo.com_0.localstorage deleted successfully
C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_toolbar.yahoo.com_0.localstorage-journal deleted successfully
C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_db.lifesaver.cz_0.localstorage deleted successfully
C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_db.lifesaver.cz_0.localstorage-journal deleted successfully
C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_static.bh-cdn.com_0.localstorage deleted successfully
C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_static.bh-cdn.com_0.localstorage-journal deleted successfully
C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_static.olark.com_0.localstorage deleted successfully
C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_static.olark.com_0.localstorage-journal deleted successfully
C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_affinityfind.com_0.localstorage deleted successfully
C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_affinityfind.com_0.localstorage-journal deleted successfully
C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_d10lpsik1i8c69.cloudfront.net_0.localstorage deleted successfully
C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_d10lpsik1i8c69.cloudfront.net_0.localstorage-journal deleted successfully
C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_d16fk4ms6rqz1v.cloudfront.net_0.localstorage deleted successfully
C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_d16fk4ms6rqz1v.cloudfront.net_0.localstorage-journal deleted successfully
C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_d3mwhxgzltpnyp.cloudfront.net_0.localstorage deleted successfully
C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_d3mwhxgzltpnyp.cloudfront.net_0.localstorage-journal deleted successfully

==== Set IE to Default ======================

Old Values:
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Start Page"="http://go.microsoft.com/fwlink/p/?LinkId=255141"

New Values:
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Start Page"="http://go.microsoft.com/fwlink/p/?LinkId=255141"

==== All HKCU SearchScopes ======================

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes
"DefaultScope"="{0633EE93-D776-472f-A0FF-E1416B8B2E3A}"
{012E1000-F331-11DB-8314-0800200C9A66} Google Url="http://www.google.com/search?q={searchTerms}"
{0633EE93-D776-472f-A0FF-E1416B8B2E3A} Bing Url="http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IESR02"

==== Reset Google Chrome ======================

C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Preferences was reset successfully
C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences was reset successfully
C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Web Data was reset successfully
C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Web Data-journal was reset successfully

==== Deleting Registry Keys ======================

HKEY_LOCAL_MACHINE\Software\wow6432node\Policies\Google deleted successfully

==== Empty IE Cache ======================

C:\WINDOWS\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5 emptied successfully
C:\Users\Amurex\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\Users\Amurex\AppData\Local\Microsoft\Windows\INetCache\Low\Content.IE5 emptied successfully
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\WINDOWS\sysWoW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\WINDOWS\sysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\Users\Amurex\AppData\Local\Microsoft\Windows\INetCache\IE emptied successfully
C:\Users\Amurex\AppData\Local\Microsoft\Windows\INetCache\Low\IE emptied successfully
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE emptied successfully
C:\WINDOWS\sysWoW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE emptied successfully

==== Empty FireFox Cache ======================

No FireFox Profiles found

==== Empty Chrome Cache ======================

C:\Users\Amurex\AppData\Local\Google\Chrome\User Data\Default\Cache emptied successfully

==== Empty All Flash Cache ======================

No Flash Cache Found

==== Empty All Java Cache ======================

No Java Cache Found

==== C:\zoek_backup content ======================

C:\zoek_backup (files=204 folders=61 74278432 bytes)

==== Empty Temp Folders ======================

C:\WINDOWS\Temp will be emptied at reboot

==== After Reboot ======================

==== Empty Temp Folders ======================

C:\WINDOWS\Temp successfully emptied
C:\Users\Amurex\AppData\Local\Temp successfully emptied

==== Empty Recycle Bin ======================

C:\$RECYCLE.BIN successfully emptied

==== EOF on Fri 10/20/2017 at 15:26:08.90 ======================

Uživatelský avatar
Amurex
Level 2
Level 2
Příspěvky: 204
Registrován: listopad 11
Pohlaví: Muž
Stav:
Offline

Re: Kontrola logu hijack

Příspěvekod Amurex » 20 říj 2017 15:33

Zemana AntiMalware 2.74.2.150 (Installed)

-------------------------------------------------------
Scan Result : Completed
Scan Date : 2017/10/20
Operating System : Windows 10 64-bit
Processor : 4X Intel(R) Core(TM) i5-6400 CPU @ 2.70GHz
BIOS Mode : Legacy
CUID : 122B1BB040AD2C10971AEA
Scan Type : System Scan
Duration : 1m 8s
Scanned Objects : 60794
Detected Objects : 2
Excluded Objects : 0
Read Level : Normal
Auto Upload : Enabled
Detect All Extensions : Disabled
Scan Documents : Disabled
Domain Info : WORKGROUP,0,2

Detected Objects
-------------------------------------------------------

KMSELDI.exe
Status : Scanned
Object : %userprofile%\desktop\kmspico 10.1.8 final + portable (office and windows 10 activator) [techtools.net]\portable\kmseldi.exe
MD5 : EA4137F439C07464C8094C90FCE47084
Publisher : @ByELDI
Size : 925376
Version : 36.0.0.8
Detection : PUA:Win32/HackTool.IdleKMS
Cleaning Action : Quarantine
Related Objects :
File - %userprofile%\desktop\kmspico 10.1.8 final + portable (office and windows 10 activator) [techtools.net]\portable\kmseldi.exe

KMSpico_setup.exe
Status : Scanned
Object : %userprofile%\desktop\kmspico 10.1.8 final + portable (office and windows 10 activator) [techtools.net]\kmspico install\kmspico_setup.exe
MD5 : BD8CB75CD1D80A311D72DB68B7BDE770
Publisher : @ByELDI
Size : 3210792
Version : 10.1.8.0
Detection : PUA:Win32/HackTool.IdleKMS
Cleaning Action : Quarantine
Related Objects :
File - %userprofile%\desktop\kmspico 10.1.8 final + portable (office and windows 10 activator) [techtools.net]\kmspico install\kmspico_setup.exe


Cleaning Result
-------------------------------------------------------
Cleaned : 2
Reported as safe : 0
Failed : 0


Zpět na “HiJackThis”

Kdo je online

Uživatelé prohlížející si toto fórum: Žádní registrovaní uživatelé a 5 hostů