[code]
HitmanPro 3.7.14.280
www.hitmanpro.com
Computer name . . . . : DESKTOP-OI6AVG1
Windows . . . . . . . : 10.0.0.14393.X64/2
User name . . . . . . : DESKTOP-OI6AVG1\Gericom Supersonic
UAC . . . . . . . . . : Enabled
License . . . . . . . : Free
Scan date . . . . . . : 2016-10-30 22:26:32
Scan mode . . . . . . : Quick
Scan duration . . . . : 12m 10s
Disk access mode . . : Direct disk access (SRB)
Cloud . . . . . . . . : Internet
Reboot . . . . . . . : No
Threats . . . . . . . : 0
Traces . . . . . . . : 4
Objects scanned . . . : 4.836
Files scanned . . . . : 4.836
Remnants scanned . . : 0 files / 0 keys
Suspicious files ____________________________________________________________
C:\Users\Gericom Supersonic\Downloads\NPE.exe
Size . . . . . . . : 3.423.928 bytes
Age . . . . . . . : 0.0 days (2016-10-30 21:14:39)
Entropy . . . . . : 8.0
SHA-256 . . . . . : 5CF1573700AE6F1EE962A7FBF686B9235BD12D3E1A2B63D25D7634A4141BD943
Product . . . . . : Norton Power Eraser
Publisher . . . . : Symantec Corporation
Description . . . : Norton Power Eraser
Version . . . . . : 5.2.0.9
Copyright . . . . : Copyright (c) 1997-2016 Symantec Corporation
RSA Key Size . . . : 2048
Service . . . . . : NPEService
Desktop . . . . . : Default
LanguageID . . . . : 1033
Authenticode . . . : Valid
Running processes : 4312
Fuzzy . . . . . . : 32.0
The file is completely hidden from view and most antivirus products. It may belong to a rootkit.
Entropy (or randomness) indicates the program is encrypted, compressed or obfuscated. This is not typical for most programs.
The .rsrc (resources) section in this program is set to executable. This is an indication of malware infection.
Program starts automatically without user intervention.
Time indicates that the file appeared recently on this computer.
The file is in use by one or more active processes.
Starts automatically as a service during system bootup.
Program contains PE structure anomalies. This is not typical for most programs.
Program is code signed with a valid Authenticode certificate.
Startup
HKLM\SYSTEM\ControlSet001\Services\NPEService\
[/code]
i slicie od malwerebytes