Guest User

RogueKiller>opentxt

a guest
Apr 9th, 2018
74
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.30 KB | None | 0 0
  1. RogueKiller V12.12.12.0 (x64) [Apr 9 2018] (Free) by Adlice Software
  2. mail : http://www.adlice.com/contact/
  3. Feedback : https://forum.adlice.com
  4. Website : http://www.adlice.com/download/roguekiller/
  5. Blog : http://www.adlice.com
  6.  
  7. Operating System : Windows 10 (10.0.16299) 64 bits version
  8. Started in : Normal mode
  9. User : GrizzlyBear [Administrator]
  10. Started from : C:\Program Files\RogueKiller\RogueKiller64.exe
  11. Mode : Delete -- Date : 04/09/2018 19:11:55 (Duration : 00:30:56)
  12.  
  13. ¤¤¤ Processes : 2 ¤¤¤
  14. [PUP.HackTool|VT.Detected] KMS-R@1n.exe(2528) -- C:\Windows\KMS-R@1n.exe[-] -> Killed [TermProc]
  15. [PUP.HackTool|VT.Detected] (SVC) KMS-R@1n -- C:\Windows\KMS-R@1n.exe[-] -> ERROR [6d]
  16.  
  17. ¤¤¤ Registry : 8 ¤¤¤
  18. [PUP.HackTool|VT.Detected] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\KMS-R@1n (C:\Windows\KMS-R@1n.exe) -> Deleted
  19. [PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{e210ca46-04b2-4afa-99a9-846376f4d637} | DhcpNameServer : 10.14.0.1 ([]) -> Replaced ()
  20. [PUP.HackTool|VT.Detected] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {48813667-18BD-48CE-B881-9F1DB067CE44} : v2.27|Action=Allow|Active=TRUE|Dir=In|Protocol=6|LPort=1688|App=C:\Windows\KMS-R@1n.exe|Name=KMS-R@1n| [-] -> Deleted
  21. [PUP.HackTool|VT.Detected] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | {0DFC64D8-C2EE-40AD-B554-76C73BBED389} : v2.27|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|LPort=1688|App=C:\Windows\KMS-R@1n.exe|Name=KMS-R@1n| [-] -> Deleted
  22. [PUP.HackTool|VT.Detected] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\OSppSvc.exe | Debugger : KMS-R@1nHook.exe [-] -> Deleted
  23. [PUP.HackTool|VT.Detected] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe | Debugger : KMS-R@1nHook.exe [-] -> Deleted
  24. [PUP.HackTool|VT.Detected] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\OSppSvc.exe | Debugger : KMS-R@1nHook.exe [-] -> ERROR [2]
  25. [PUP.HackTool|VT.Detected] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe | Debugger : KMS-R@1nHook.exe [-] -> ERROR [2]
  26.  
  27. ¤¤¤ Tasks : 0 ¤¤¤
  28.  
  29. ¤¤¤ Files : 3 ¤¤¤
  30. [PUP.HackTool][File] C:\Windows\KMS-R@1n.exe -> Deleted
  31. [PUP.HackTool][File] C:\Windows\KMS-R@1nHook.exe -> Removed at reboot [5]
  32. [PUP.uTorrentAds][File] C:\Users\GrizzlyBear\AppData\Roaming\uTorrent\updates\3.5.1_44332\utorrentie.exe -> Deleted
  33.  
  34. ¤¤¤ WMI : 0 ¤¤¤
  35.  
  36. ¤¤¤ Hosts File : 0 ¤¤¤
  37.  
  38. ¤¤¤ Antirootkit : 0 (Driver: Loaded) ¤¤¤
  39.  
  40. ¤¤¤ Web browsers : 0 ¤¤¤
  41.  
  42. ¤¤¤ MBR Check : ¤¤¤
  43. +++++ PhysicalDrive0: TOSHIBA DT01ACA100 +++++
  44. --- User ---
  45. [MBR] f663f8592e20f0b47b5c4c2044846776
  46. [BSP] 05206d34d81c0ce2d57fccd2bc4a3789 : Windows Vista/7/8|VT.Unknown MBR Code
  47. Partition table:
  48. 0 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 100 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
  49. 1 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 206848 | Size: 953767 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
  50. User = LL1 ... OK
  51. User = LL2 ... OK
Add Comment
Please, Sign In to add comment