DeleteKey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SAntivirusSvc DeleteKey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SAntivirusIC DeleteKey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SANTIVIRUSKD DeleteKey: HKEY_LOCAL_MACHINE\SOFTWARE\SAntivirus DeleteKey: HKEY_LOCAL_MACHINE\SOFTWARE\Segurazo DeleteKey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SAntivirus DeleteKey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Segurazo Unlock: C:\Program Files (x86)\SAntivirus\SAntivirusKD.sys Unlock: C:\Program Files (x86)\SAntivirus\SAntivirusIC.exe Unlock: C:\Program Files (x86)\SAntivirus\SAntivirusKD.sys Unlock: C:\Program Files (x86)\SAntivirus Unlock: C:\Program Files (x86)\Segurazo Unlock: C:\ProgramData\Segurazo Unlock: C:\Users\Guy Shahar\AppData\Roaming\segurazoclient Unlock: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Segurazo Unlock: C:\ProgramData\SAntivirus Unlock: C:\Users\Guy Shahar\AppData\Roaming\SAntivirusclient Unlock: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\SAntivirus C:\Program Files (x86)\SAntivirus\SAntivirusKD.sys C:\Program Files (x86)\SAntivirus\SAntivirusIC.exe C:\Program Files (x86)\SAntivirus\SAntivirusKD.sys C:\Program Files (x86)\SAntivirus C:\Program Files (x86)\Segurazo C:\ProgramData\Segurazo C:\Users\Guy Shahar\AppData\Roaming\segurazoclient C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Segurazo C:\ProgramData\SAntivirus C:\Users\Guy Shahar\AppData\Roaming\SAntivirusclient C:\ProgramData\Microsoft\Windows\Start Menu\Programs\SAntivirus S2 SAntivirusSvc; C:\Program Files (x86)\SAntivirus\SAntivirusService.exe [154320 2020-01-22] (Digital Communications Inc -> Digital Com. Incorporated) <==== ATTENTION S2 SAntivirusIC; C:\Program Files (x86)\SAntivirus\SAntivirusIC.exe -service [X] <==== ATTENTION R1 SANTIVIRUSKD; C:\Program Files (x86)\SAntivirus\SAntivirusKD.sys [90096 2020-01-22] (Digital Communications Inc. -> Digital Comm. Inc) <==== ATTENTION C:\Program Files (x86)\SAntivirus CMD: FOR /F "usebackq delims==" %i IN (`wevtutil el`) DO wevtutil cl "%i" Reboot: