Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

help removing desktop defender 2010


  • This topic is locked This topic is locked
35 replies to this topic

#1 tsoaf

tsoaf

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:07:48 PM

Posted 06 January 2010 - 10:08 PM

hello. i am having some problems removing this pesky Desktop Defender spyware off of my computer. I have ran 2 Malware removals, one quick and one full but i still am having some problems. I will attach those two logs to see what i have left to do i will also try running another scan in a bit. i hope someone can be of assistance, please! thank you! :D

PS: log file 222654 is the full scan.

Attached Files



BC AdBot (Login to Remove)

 


#2 tsoaf

tsoaf
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:07:48 PM

Posted 09 January 2010 - 04:20 PM

i might also want to add that now my task manager has been infected. i cannot load it from my alt+ctrl+del nor from run as "taskmgr" please help!


===========

Hello

While we understand your frustration at having to wait, please note that Bleeping Computer deals with several hundred requests for assistance such as yours on a daily basis. As a result, our backlog is quite large as are other comparable sites that help others with malware issues. Although our HJT Team members work on hundreds of requests each day, they are all volunteers who work logs when they can and are able to do so. No one is paid by Bleeping Computer for their assistance to our members.

Further, our malware removal staff is comprised of team members with various levels of skill and expertise to deal with thousands of malware variants, some more complex than others. Although we try to take DDS/HJT logs in order (starting with the oldest), it is often the skill level of the particular helper and sometimes the operating system that dictates which logs get selected first. Some infections are more complicated than others and require a higher skill level to remove. Without that skill level attempted removal could result in disastrous results. In other instances, the helper may not be familiar with the operating system that you are using, since they use another. In either case, neither of us want someone to assist you who is not familiar with your issue and attempt to fix it.

We ask that once you have posted your log and are waiting, please DO NOT "bump" your thread or make further replies until it has been responded to by a member of the HJT Team. The reason we ask this or do not respond to your requests is because that would remove you from the active queue that Techs and Staff have access to. The malware staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response, there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

That is why I have made an edit to your last post, instead of a reply. Please do not multiple post here, as that only pushes you further down the queue and causes confusion to the staff.

Please be patient. It may take several days, up to two weeks perhaps less, to get a response but your log will be reviewed and answered as soon as possible. I advise checking your topic once a day for responses as the e-mail notification system is unreliable.

Thank you for understanding.

Elise - forum moderator

Edited by elise025, 10 January 2010 - 08:38 AM.


#3 Blind Faith

Blind Faith

  • Malware Response Team
  • 4,101 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:06:48 AM

Posted 14 January 2010 - 09:40 AM

Hello and welcome to Bleeping Computer! welcome.gif

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

If you have since resolved the original problem you were having, we would appreciate you letting us know. If not please perform the following steps below so we can have a look at the current condition of your machine.

If you have not done so, include a clear description of the problems you're having, along with any steps you may have performed so far.

Upon completing the steps below another staff member will review and take the steps necessary with you to get your machine back in working order clean and free of malware.

If you have already posted a DDS log, please do so again, as your situation may have changed.
Use the 'Add Reply' and add the new log to this thread.


Thanks and again sorry for the delay.

We need to see some information about what is happening in your machine. Please perform the following scan:
  • Download DDS by sUBs from one of the following links. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explaination about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE



Elle
Can you hear it?It's all around!

Tomar ki manè acchè?
Yadi thakè, tahalè
Ki kshama kartè paro
?



If I haven't replied in 48 hours, please feel free to send me a PM.



Posted Image

#4 tsoaf

tsoaf
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:07:48 PM

Posted 14 January 2010 - 11:28 PM

hello i have downloaded the DDS from both links but upon opening them, an error pops up saying "program is infected" and does not allow the program to run. i will keep on trying but that's my problem with that so far.

#5 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:04:48 AM

Posted 15 January 2010 - 01:49 PM

Hello, tsoaf
Welcome to the Bleeping Computer Forums. My name is Thomas (Tom is fine), and I will be helping you fixing your problems.

If you do not make a reply in 5 days, we will have to close your topic.

You may want to keep the link to this topic in your favourites. Alternatively, you can click the button at the top bar of this topic and Track this Topic. The topics you are tracking can be found here.

Please take note of some guidelines for this fix:
  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools. Doing so could cause changes to the directions I have to give you and prolong the time required. Further more, you should not be taking any advice relating to this computer from any other source throughout the course of this fix.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing. I would much rather clarify instructions or explain them differently than have something important broken.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean". We do not want to clean you part-way, only to have the system re-infect itself.
  • Please reply using the button in the lower right hand corner of your screen. Do not start a new topic. The logs that you post should be pasted directly into the reply. Only attach them if requested or if they do not fit into the post.
  • Old topics are closed after 3 days with no reply, and working topics are closed after 5 days. If for any reason you cannot complete instructions within that time, that's fine, just post back here so that we know you're still here.
  • Please set your system to show all files.
    Click Start, open My Computer, select the Tools menu and click Folder Options.
    Select the View Tab. Under the Hidden files and folders heading, select Show hidden files and folders.
    Uncheck: Hide file extensions for known file types
    Uncheck the Hide protected operating system files (recommended) option.
    Click Yes to confirm.



Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.


  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and re-enable all active protection when done.
-- If you encounter any problems, try running GMER in Safe Mode.



regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#6 tsoaf

tsoaf
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:07:48 PM

Posted 15 January 2010 - 05:48 PM

GMER 1.0.15.15281 - http://www.gmer.net
Rootkit scan 2010-01-15 14:47:02
Windows 5.1.2600 Service Pack 3
Running: fyijmt41.exe; Driver: C:\DOCUME~1\Pepe\LOCALS~1\Temp\awxyyaoc.sys


---- System - GMER 1.0.15 ----

Code 821179F0 ZwEnumerateKey
Code 821B3968 ZwFlushInstructionCache
Code \SystemRoot\System32\DRIVERS\klif.sys (spuper-ptor/Kaspersky Lab) FsRtlCheckLockForReadAccess
Code \SystemRoot\System32\DRIVERS\klif.sys (spuper-ptor/Kaspersky Lab) IoIsOperationSynchronous
Code 821B716E IofCallDriver
Code 82101A1E IofCompleteRequest

---- Kernel code sections - GMER 1.0.15 ----

.text ntkrnlpa.exe!IofCallDriver 804EE130 5 Bytes JMP 821B7173
.text ntkrnlpa.exe!IofCompleteRequest 804EE1C0 5 Bytes JMP 82101A23
PAGE ntkrnlpa.exe!ZwFlushInstructionCache 805ABEC6 5 Bytes JMP 821B396C
PAGE ntkrnlpa.exe!ZwEnumerateKey 8061AB72 5 Bytes JMP 821179F4

---- User code sections - GMER 1.0.15 ----

.text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[160] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 00A46215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[160] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 00A46446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[160] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 00A463F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[160] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 00A4625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[160] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 00A4646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[160] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 00A46295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\EvtEng.exe[160] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 00A4636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[192] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[192] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[192] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[192] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[192] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[192] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe[192] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[208] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 00AF6215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[208] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 00AF6446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[208] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 00AF63F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[208] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 00AF625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[208] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 00AF646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[208] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 00AF6295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe[208] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 00AF636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\WLKeeper.exe[248] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 00D26215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\WLKeeper.exe[248] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 00D26446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\WLKeeper.exe[248] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 00D263F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\WLKeeper.exe[248] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 00D2625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\WLKeeper.exe[248] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 00D2646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\WLKeeper.exe[248] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 00D26295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\WLKeeper.exe[248] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 00D2636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\lxcecoms.exe[408] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\lxcecoms.exe[408] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\lxcecoms.exe[408] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\lxcecoms.exe[408] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\lxcecoms.exe[408] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\lxcecoms.exe[408] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\lxcecoms.exe[408] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[472] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[472] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[472] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[472] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[472] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[472] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe[472] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Java\jre6\bin\jusched.exe[600] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Java\jre6\bin\jusched.exe[600] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Java\jre6\bin\jusched.exe[600] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Java\jre6\bin\jusched.exe[600] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Java\jre6\bin\jusched.exe[600] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Java\jre6\bin\jusched.exe[600] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Java\jre6\bin\jusched.exe[600] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Java\jre6\bin\jqs.exe[684] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Java\jre6\bin\jqs.exe[684] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Java\jre6\bin\jqs.exe[684] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Java\jre6\bin\jqs.exe[684] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Java\jre6\bin\jqs.exe[684] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Java\jre6\bin\jqs.exe[684] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Java\jre6\bin\jqs.exe[684] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\spoolsv.exe[780] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\spoolsv.exe[780] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\spoolsv.exe[780] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\spoolsv.exe[780] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\spoolsv.exe[780] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\spoolsv.exe[780] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\spoolsv.exe[780] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\System32\SCardSvr.exe[828] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\System32\SCardSvr.exe[828] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\System32\SCardSvr.exe[828] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\System32\SCardSvr.exe[828] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\System32\SCardSvr.exe[828] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\System32\SCardSvr.exe[828] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\System32\SCardSvr.exe[828] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Zune\ZuneLauncher.exe[856] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Zune\ZuneLauncher.exe[856] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Zune\ZuneLauncher.exe[856] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Zune\ZuneLauncher.exe[856] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Zune\ZuneLauncher.exe[856] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Zune\ZuneLauncher.exe[856] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Zune\ZuneLauncher.exe[856] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe[860] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe[860] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe[860] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe[860] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe[860] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe[860] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe[860] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\lxctcoms.exe[928] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\lxctcoms.exe[928] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\lxctcoms.exe[928] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\lxctcoms.exe[928] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\lxctcoms.exe[928] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\lxctcoms.exe[928] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\lxctcoms.exe[928] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Raxco\PerfectDisk\PDAgent.exe[1040] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 00736215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Raxco\PerfectDisk\PDAgent.exe[1040] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 00736446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Raxco\PerfectDisk\PDAgent.exe[1040] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 007363F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Raxco\PerfectDisk\PDAgent.exe[1040] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 0073625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Raxco\PerfectDisk\PDAgent.exe[1040] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 0073646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Raxco\PerfectDisk\PDAgent.exe[1040] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 00736295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Raxco\PerfectDisk\PDAgent.exe[1040] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 0073636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\explorer.exe[1072] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\explorer.exe[1072] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\explorer.exe[1072] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\explorer.exe[1072] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\explorer.exe[1072] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\explorer.exe[1072] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\explorer.exe[1072] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Apoint\Apoint.exe[1092] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Apoint\Apoint.exe[1092] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Apoint\Apoint.exe[1092] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Apoint\Apoint.exe[1092] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Apoint\Apoint.exe[1092] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Apoint\Apoint.exe[1092] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Apoint\Apoint.exe[1092] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe[1144] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe[1144] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe[1144] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe[1144] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe[1144] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe[1144] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe[1144] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\Dot1XCfg.exe[1172] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 00B46215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\Dot1XCfg.exe[1172] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 00B46446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\Dot1XCfg.exe[1172] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 00B463F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\Dot1XCfg.exe[1172] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 00B4625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\Dot1XCfg.exe[1172] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 00B4646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\Dot1XCfg.exe[1172] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 00B46295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\Dot1XCfg.exe[1172] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 00B4636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[1228] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[1228] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[1228] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[1228] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[1228] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[1228] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[1228] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[1252] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[1252] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[1252] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[1252] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[1252] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[1252] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Windows Live\Messenger\msnmsgr.exe[1252] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\Ati2evxx.exe[1484] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\Ati2evxx.exe[1484] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\Ati2evxx.exe[1484] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\Ati2evxx.exe[1484] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\Ati2evxx.exe[1484] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\Ati2evxx.exe[1484] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\Ati2evxx.exe[1484] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe[1728] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe[1728] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe[1728] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe[1728] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe[1728] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe[1728] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe[1728] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Verizon\Verizon Internet Security Suite\Fws.exe[1836] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Verizon\Verizon Internet Security Suite\Fws.exe[1836] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Verizon\Verizon Internet Security Suite\Fws.exe[1836] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Verizon\Verizon Internet Security Suite\Fws.exe[1836] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Verizon\Verizon Internet Security Suite\Fws.exe[1836] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Verizon\Verizon Internet Security Suite\Fws.exe[1836] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Verizon\Verizon Internet Security Suite\Fws.exe[1836] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text c:\WINDOWS\system32\ZuneBusEnum.exe[1904] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text c:\WINDOWS\system32\ZuneBusEnum.exe[1904] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text c:\WINDOWS\system32\ZuneBusEnum.exe[1904] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text c:\WINDOWS\system32\ZuneBusEnum.exe[1904] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text c:\WINDOWS\system32\ZuneBusEnum.exe[1904] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text c:\WINDOWS\system32\ZuneBusEnum.exe[1904] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text c:\WINDOWS\system32\ZuneBusEnum.exe[1904] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text c:\Program Files\Zune\ZuneNss.exe[1948] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text c:\Program Files\Zune\ZuneNss.exe[1948] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text c:\Program Files\Zune\ZuneNss.exe[1948] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text c:\Program Files\Zune\ZuneNss.exe[1948] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text c:\Program Files\Zune\ZuneNss.exe[1948] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text c:\Program Files\Zune\ZuneNss.exe[1948] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text c:\Program Files\Zune\ZuneNss.exe[1948] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\ctfmon.exe[2016] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\ctfmon.exe[2016] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\ctfmon.exe[2016] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\ctfmon.exe[2016] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\ctfmon.exe[2016] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\ctfmon.exe[2016] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\ctfmon.exe[2016] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Microsoft ActiveSync\wcescomm.exe[2188] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Microsoft ActiveSync\wcescomm.exe[2188] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Microsoft ActiveSync\wcescomm.exe[2188] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Microsoft ActiveSync\wcescomm.exe[2188] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Microsoft ActiveSync\wcescomm.exe[2188] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Microsoft ActiveSync\wcescomm.exe[2188] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Microsoft ActiveSync\wcescomm.exe[2188] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\Ati2evxx.exe[2228] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\Ati2evxx.exe[2228] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\Ati2evxx.exe[2228] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\Ati2evxx.exe[2228] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\Ati2evxx.exe[2228] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\Ati2evxx.exe[2228] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\Ati2evxx.exe[2228] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe[2272] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 00CE6215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe[2272] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 00CE6446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe[2272] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 00CE63F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe[2272] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 00CE625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe[2272] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 00CE646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe[2272] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 00CE6295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe[2272] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 00CE636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[2520] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[2520] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[2520] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[2520] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[2520] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[2520] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[2520] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\PROGRA~1\Yahoo!\browser\ycommon.exe[2700] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\PROGRA~1\Yahoo!\browser\ycommon.exe[2700] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\PROGRA~1\Yahoo!\browser\ycommon.exe[2700] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\PROGRA~1\Yahoo!\browser\ycommon.exe[2700] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\PROGRA~1\Yahoo!\browser\ycommon.exe[2700] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\PROGRA~1\Yahoo!\browser\ycommon.exe[2700] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\PROGRA~1\Yahoo!\browser\ycommon.exe[2700] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe[2824] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe[2824] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe[2824] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe[2824] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe[2824] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe[2824] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe[2824] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Raxco\PerfectDisk\PDEngine.exe[2900] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 003E6215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Raxco\PerfectDisk\PDEngine.exe[2900] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 003E6446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Raxco\PerfectDisk\PDEngine.exe[2900] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 003E63F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Raxco\PerfectDisk\PDEngine.exe[2900] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 003E625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Raxco\PerfectDisk\PDEngine.exe[2900] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 003E646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Raxco\PerfectDisk\PDEngine.exe[2900] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 003E6295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Raxco\PerfectDisk\PDEngine.exe[2900] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 003E636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Apoint\Apntex.exe[3012] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Apoint\Apntex.exe[3012] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Apoint\Apntex.exe[3012] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Apoint\Apntex.exe[3012] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Apoint\Apntex.exe[3012] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Apoint\Apntex.exe[3012] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Apoint\Apntex.exe[3012] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3332] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3332] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3332] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3332] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3332] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3332] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3332] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Documents and Settings\Pepe\Desktop\fyijmt41.exe[3464] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 00386215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Documents and Settings\Pepe\Desktop\fyijmt41.exe[3464] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 00386446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Documents and Settings\Pepe\Desktop\fyijmt41.exe[3464] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 003863F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Documents and Settings\Pepe\Desktop\fyijmt41.exe[3464] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 0038625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Documents and Settings\Pepe\Desktop\fyijmt41.exe[3464] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 0038646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Documents and Settings\Pepe\Desktop\fyijmt41.exe[3464] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 00386295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Documents and Settings\Pepe\Desktop\fyijmt41.exe[3464] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 0038636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Desktop Defender 2010\Desktop Defender 2010.exe[3520] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 003E6215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Desktop Defender 2010\Desktop Defender 2010.exe[3520] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 003E6446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Desktop Defender 2010\Desktop Defender 2010.exe[3520] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 003E63F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Desktop Defender 2010\Desktop Defender 2010.exe[3520] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 003E625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Desktop Defender 2010\Desktop Defender 2010.exe[3520] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 003E646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Desktop Defender 2010\Desktop Defender 2010.exe[3520] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 003E6295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Desktop Defender 2010\Desktop Defender 2010.exe[3520] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 003E636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Desktop Defender 2010\securitycenter.exe[3548] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Desktop Defender 2010\securitycenter.exe[3548] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Desktop Defender 2010\securitycenter.exe[3548] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Desktop Defender 2010\securitycenter.exe[3548] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Desktop Defender 2010\securitycenter.exe[3548] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Desktop Defender 2010\securitycenter.exe[3548] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Desktop Defender 2010\securitycenter.exe[3548] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\PROGRA~1\MI3AA1~1\rapimgr.exe[3560] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\PROGRA~1\MI3AA1~1\rapimgr.exe[3560] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\PROGRA~1\MI3AA1~1\rapimgr.exe[3560] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\PROGRA~1\MI3AA1~1\rapimgr.exe[3560] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\PROGRA~1\MI3AA1~1\rapimgr.exe[3560] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\PROGRA~1\MI3AA1~1\rapimgr.exe[3560] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\PROGRA~1\MI3AA1~1\rapimgr.exe[3560] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\smss32.exe[3616] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\smss32.exe[3616] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\smss32.exe[3616] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\smss32.exe[3616] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\smss32.exe[3616] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\smss32.exe[3616] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\WINDOWS\system32\smss32.exe[3616] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe[3648] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe[3648] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe[3648] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe[3648] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe[3648] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe[3648] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe[3648] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Apoint\HidFind.exe[3732] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Apoint\HidFind.exe[3732] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Apoint\HidFind.exe[3732] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Apoint\HidFind.exe[3732] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Apoint\HidFind.exe[3732] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Apoint\HidFind.exe[3732] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Apoint\HidFind.exe[3732] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe[3744] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 003F6215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe[3744] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 003F6446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe[3744] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 003F63F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe[3744] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 003F625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe[3744] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 003F646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe[3744] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 003F6295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe[3744] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 003F636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Yahoo!\browser\ybrwicon.exe[3808] ntdll.dll!NtCreateKey 7C90D0EE 5 Bytes JMP 10006215 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Yahoo!\browser\ybrwicon.exe[3808] ntdll.dll!NtDeleteKey 7C90D24E 5 Bytes JMP 10006446 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Yahoo!\browser\ybrwicon.exe[3808] ntdll.dll!NtDeleteValueKey 7C90D26E 5 Bytes JMP 100063F7 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Yahoo!\browser\ybrwicon.exe[3808] ntdll.dll!NtOpenKey 7C90D5CE 5 Bytes JMP 1000625B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Yahoo!\browser\ybrwicon.exe[3808] ntdll.dll!NtQueryDirectoryFile 7C90D76E 5 Bytes JMP 1000646D C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Yahoo!\browser\ybrwicon.exe[3808] ntdll.dll!NtQueryValueKey 7C90D96E 5 Bytes JMP 10006295 C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)
.text C:\Program Files\Yahoo!\browser\ybrwicon.exe[3808] ntdll.dll!NtSetValueKey 7C90DDCE 5 Bytes JMP 1000636B C:\WINDOWS\system32\kbdsock.dll (Windows Socket Layer/Microsoft Corporation)

---- User IAT/EAT - GMER 1.0.15 ----

IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\GDI32.dll [KERNEL32.dll!LoadLibraryExW] [63602B3E] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\GDI32.dll [KERNEL32.dll!LoadLibraryA] [63602A5B] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\GDI32.dll [KERNEL32.dll!GetProcAddress] [63602441] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\GDI32.dll [KERNEL32.dll!LoadLibraryW] [63602AA2] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\USER32.dll [KERNEL32.dll!LoadLibraryExW] [63602B3E] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\USER32.dll [KERNEL32.dll!LoadLibraryA] [63602A5B] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\USER32.dll [KERNEL32.dll!GetProcAddress] [63602441] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\USER32.dll [KERNEL32.dll!LoadLibraryW] [63602AA2] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!LoadLibraryExA] [63602AE9] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!LoadLibraryExW] [63602B3E] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!LoadLibraryW] [63602AA2] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!LoadLibraryA] [63602A5B] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\SHLWAPI.dll [KERNEL32.dll!GetProcAddress] [63602441] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!DefWindowProcA] [6360208F] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!DefWindowProcW] [63602065] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!GetSysColor] [63601FC4] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!TrackPopupMenu] [636015C8] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\SHLWAPI.dll [USER32.dll!TrackPopupMenuEx] [636015EF] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\SHELL32.dll [KERNEL32.dll!LoadLibraryA] [63602A5B] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\SHELL32.dll [KERNEL32.dll!LoadLibraryW] [63602AA2] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\SHELL32.dll [KERNEL32.dll!GetProcAddress] [63602441] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\SHELL32.dll [KERNEL32.dll!LoadLibraryExW] [63602B3E] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\SHELL32.dll [KERNEL32.dll!LoadLibraryExA] [63602AE9] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!AnimateWindow] [63601740] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!TrackPopupMenuEx] [636015EF] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!DefWindowProcA] [6360208F] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!GetSysColor] [63601FC4] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!DefWindowProcW] [63602065] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)
IAT C:\Program Files\Yahoo!\browser\ybrowser.exe[1860] @ C:\WINDOWS\system32\SHELL32.dll [USER32.dll!TrackPopupMenu] [636015C8] C:\Program Files\Yahoo!\Shared\ybskin2.dll (Yahoo! Skinning Object/Yahoo! Inc.)

---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Ntfs \Ntfs klif.sys (spuper-ptor/Kaspersky Lab)
AttachedDevice \Driver\Tcpip \Device\Ip rp_skt32.sys (Radialpoint Filter/Radialpoint Inc.)
AttachedDevice \Driver\Tcpip \Device\Tcp rp_skt32.sys (Radialpoint Filter/Radialpoint Inc.)
AttachedDevice \Driver\Tcpip \Device\Udp rp_skt32.sys (Radialpoint Filter/Radialpoint Inc.)
AttachedDevice \Driver\Tcpip \Device\RawIp rp_skt32.sys (Radialpoint Filter/Radialpoint Inc.)

Device \FileSystem\Fastfat \Fat EE6A9D20

AttachedDevice \FileSystem\Fastfat \Fat klif.sys (spuper-ptor/Kaspersky Lab)

---- Modules - GMER 1.0.15 ----

Module \systemroot\system32\drivers\H8SRTujyoultewy.sys (*** hidden *** ) F2C3D000-F2C5A000 (118784 bytes)

---- Services - GMER 1.0.15 ----

Service C:\WINDOWS\system32\drivers\H8SRTujyoultewy.sys (*** hidden *** ) [SYSTEM] H8SRTd.sys <-- ROOTKIT !!!

---- Registry - GMER 1.0.15 ----

Reg HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys@start 1
Reg HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys@type 1
Reg HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys@imagepath \systemroot\system32\drivers\H8SRTujyoultewy.sys
Reg HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys@group file system
Reg HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys\modules@H8SRTd \\?\globalroot\systemroot\system32\drivers\H8SRTujyoultewy.sys
Reg HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys\modules@H8SRTc \\?\globalroot\systemroot\system32\H8SRTglkawkmpsx.dll
Reg HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys\modules@H8SRTsrcr \\?\globalroot\systemroot\system32\H8SRTwbithkvbrp.dat
Reg HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys\modules@h8srtserf \\?\globalroot\systemroot\system32\H8SRTxvdfhcxdjp.dll
Reg HKLM\SYSTEM\ControlSet002\Services\H8SRTd.sys\modules@h8srtbbr \\?\globalroot\systemroot\system32\H8SRTlqtrqtkyeb.dll
Reg HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys
Reg HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys@start 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys@type 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys@imagepath \systemroot\system32\drivers\H8SRTujyoultewy.sys
Reg HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys@group file system
Reg HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys\modules
Reg HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys\modules@H8SRTd \\?\globalroot\systemroot\system32\drivers\H8SRTujyoultewy.sys
Reg HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys\modules@H8SRTc \\?\globalroot\systemroot\system32\H8SRTglkawkmpsx.dll
Reg HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys\modules@H8SRTsrcr \\?\globalroot\systemroot\system32\H8SRTwbithkvbrp.dat
Reg HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys\modules@h8srtserf \\?\globalroot\systemroot\system32\H8SRTxvdfhcxdjp.dll
Reg HKLM\SYSTEM\CurrentControlSet\Services\H8SRTd.sys\modules@h8srtbbr \\?\globalroot\systemroot\system32\H8SRTlqtrqtkyeb.dll

---- Files - GMER 1.0.15 ----

File C:\Documents and Settings\Pepe\Local Settings\temp\H8SRT46ab.tmp 343040 bytes executable
File C:\Documents and Settings\Pepe\Local Settings\temp\h8srtmainqt.dll 680 bytes
File C:\drivers\printer\5400\install\config 0 bytes
File C:\drivers\printer\5400\install\config\aioc.cif 8815 bytes
File C:\drivers\printer\5400\install\config\appinst.cgf 11824 bytes
File C:\drivers\printer\5400\install\config\appinst.cif 404 bytes
File C:\drivers\printer\5400\install\config\appinst.xml 59202 bytes
File C:\drivers\printer\5400\install\config\AppToFEL.cif 689 bytes
File C:\drivers\printer\5400\install\config\bewtasks.cgf 30214 bytes
File C:\drivers\printer\5400\install\config\bewtasks.xml 59202 bytes
File C:\drivers\printer\5400\install\config\ezprint.cif 6312 bytes
File C:\drivers\printer\5400\install\config\Fax4.cif 7057 bytes
File C:\drivers\printer\5400\install\config\image 0 bytes
File C:\drivers\printer\5400\install\config\image\conf_bd.bmp 8856 bytes
File C:\drivers\printer\5400\install\config\image\fi.bmp 512 bytes
File C:\drivers\printer\5400\install\config\image\nav_bup.bmp 4100 bytes
File C:\drivers\printer\5400\install\config\image\agreebd.bmp 4822 bytes
File C:\drivers\printer\5400\install\config\image\agreebdn.bmp 11094 bytes
File C:\drivers\printer\5400\install\config\image\agreebup.bmp 6038 bytes
File C:\drivers\printer\5400\install\config\image\agreeupf.bmp 14686 bytes
File C:\drivers\printer\5400\install\config\image\ar.bmp 510 bytes
File C:\drivers\printer\5400\install\config\image\arrow.bmp 222 bytes
File C:\drivers\printer\5400\install\config\image\back_bd.bmp 3304 bytes
File C:\drivers\printer\5400\install\config\image\back_bdn.bmp 6774 bytes
File C:\drivers\printer\5400\install\config\image\back_bfc.bmp 9106 bytes
File C:\drivers\printer\5400\install\config\image\back_bup.bmp 4100 bytes
File C:\drivers\printer\5400\install\config\image\bg.bmp 9654 bytes
File C:\drivers\printer\5400\install\config\image\bottom.bmp 106962 bytes
File C:\drivers\printer\5400\install\config\image\BtmRTL.bmp 106962 bytes
File C:\drivers\printer\5400\install\config\image\ca.bmp 512 bytes
File C:\drivers\printer\5400\install\config\image\cdpc.bmp 37686 bytes
File C:\drivers\printer\5400\install\config\image\cdpcrtl.bmp 37686 bytes
File C:\drivers\printer\5400\install\config\image\check.bmp 1478 bytes
File C:\drivers\printer\5400\install\config\image\computer.bmp 13246 bytes
File C:\drivers\printer\5400\install\config\image\conf_bdn.bmp 8286 bytes
File C:\drivers\printer\5400\install\config\image\conf_bfc.bmp 8854 bytes
File C:\drivers\printer\5400\install\config\image\conf_bup.bmp 8856 bytes
File C:\drivers\printer\5400\install\config\image\congortl.bmp 30718 bytes
File C:\drivers\printer\5400\install\config\image\congrats.bmp 88454 bytes
File C:\drivers\printer\5400\install\config\image\congrtl.bmp 88454 bytes
File C:\drivers\printer\5400\install\config\image\cong_off.bmp 30716 bytes
File C:\drivers\printer\5400\install\config\image\cont_bd.bmp 8164 bytes
File C:\drivers\printer\5400\install\config\image\cont_bdn.bmp 18822 bytes
File C:\drivers\printer\5400\install\config\image\cont_bfc.bmp 22614 bytes
File C:\drivers\printer\5400\install\config\image\cont_bup.bmp 8508 bytes
File C:\drivers\printer\5400\install\config\image\critical.bmp 1478 bytes
File C:\drivers\printer\5400\install\config\image\cs.bmp 512 bytes
File C:\drivers\printer\5400\install\config\image\da.bmp 512 bytes
File C:\drivers\printer\5400\install\config\image\de.bmp 512 bytes
File C:\drivers\printer\5400\install\config\image\el.bmp 512 bytes
File C:\drivers\printer\5400\install\config\image\en.bmp 512 bytes
File C:\drivers\printer\5400\install\config\image\es.bmp 512 bytes
File C:\drivers\printer\5400\install\config\image\fr.bmp 512 bytes
File C:\drivers\printer\5400\install\config\image\he.bmp 510 bytes
File C:\drivers\printer\5400\install\config\image\hu.bmp 510 bytes
File C:\drivers\printer\5400\install\config\image\id_id.bmp 510 bytes
File C:\drivers\printer\5400\install\config\image\install.bmp 8144 bytes
File C:\drivers\printer\5400\install\config\image\inst_bdn.bmp 19514 bytes
File C:\drivers\printer\5400\install\config\image\inst_bfc.bmp 21182 bytes
File C:\drivers\printer\5400\install\config\image\it.bmp 512 bytes
File C:\drivers\printer\5400\install\config\image\ja.bmp 512 bytes
File C:\drivers\printer\5400\install\config\image\ko.bmp 512 bytes
File C:\drivers\printer\5400\install\config\image\lpa.ico 8478 bytes
File C:\drivers\printer\5400\install\config\image\mback.bmp 193150 bytes
File C:\drivers\printer\5400\install\config\image\mbackrtl.bmp 193150 bytes
File C:\drivers\printer\5400\install\config\image\mbtm.bmp 88842 bytes
File C:\drivers\printer\5400\install\config\image\mbtmrtl.bmp 88842 bytes
File C:\drivers\printer\5400\install\config\image\menulogo.bmp 7966 bytes
File C:\drivers\printer\5400\install\config\image\nav_bd.bmp 3304 bytes
File C:\drivers\printer\5400\install\config\image\nav_bdn.bmp 6774 bytes
File C:\drivers\printer\5400\install\config\image\nav_bfc.bmp 9106 bytes
File C:\drivers\printer\5400\install\config\image\nl.bmp 512 bytes
File C:\drivers\printer\5400\install\config\image\no.bmp 512 bytes
File C:\drivers\printer\5400\install\config\image\offr_bdn.bmp 22238 bytes
File C:\drivers\printer\5400\install\config\image\offr_bfc.bmp 22902 bytes
File C:\drivers\printer\5400\install\config\image\offr_bup.bmp 8758 bytes
File C:\drivers\printer\5400\install\config\image\pl.bmp 512 bytes
File C:\drivers\printer\5400\install\config\image\pt_br.bmp 512 bytes
File C:\drivers\printer\5400\install\config\image\pt_pt.bmp 512 bytes
File C:\drivers\printer\5400\install\config\image\quesrtl.bmp 2646 bytes
File C:\drivers\printer\5400\install\config\image\question.bmp 2646 bytes
File C:\drivers\printer\5400\install\config\image\ques_bfc.bmp 2646 bytes
File C:\drivers\printer\5400\install\config\image\ques_bup.bmp 1944 bytes
File C:\drivers\printer\5400\install\config\image\q_bfcrtl.bmp 1942 bytes
File C:\drivers\printer\5400\install\config\image\q_buprtl.bmp 1942 bytes
File C:\drivers\printer\5400\install\config\image\registr.bmp 24606 bytes
File C:\drivers\printer\5400\install\config\image\ro.bmp 512 bytes
File C:\drivers\printer\5400\install\config\image\ru.bmp 512 bytes
File C:\drivers\printer\5400\install\config\image\sideimg.bmp 199734 bytes
File C:\drivers\printer\5400\install\config\image\sl.bmp 510 bytes
File C:\drivers\printer\5400\install\config\image\sv.bmp 512 bytes
File C:\drivers\printer\5400\install\config\image\test_bdn.bmp 22426 bytes
File C:\drivers\printer\5400\install\config\image\test_bfc.bmp 22710 bytes
File C:\drivers\printer\5400\install\config\image\test_bup.bmp 8758 bytes
File C:\drivers\printer\5400\install\config\image\th.bmp 510 bytes
File C:\drivers\printer\5400\install\config\image\Thumbs.db 139264 bytes
File C:\drivers\printer\5400\install\config\image\toolbar.bmp 9286 bytes
File C:\drivers\printer\5400\install\config\image\top.bmp 143202 bytes
File C:\drivers\printer\5400\install\config\image\tr.bmp 510 bytes
File C:\drivers\printer\5400\install\config\image\trdrp.avi 27648 bytes
File C:\drivers\printer\5400\install\config\image\trdrprtl.avi 27648 bytes
File C:\drivers\printer\5400\install\config\image\warning.bmp 1478 bytes
File C:\drivers\printer\5400\install\config\image\warning2.bmp 1478 bytes
File C:\drivers\printer\5400\install\config\image\zh.bmp 512 bytes
File C:\drivers\printer\5400\install\config\image\zh_tw.bmp 512 bytes
File C:\drivers\printer\5400\install\config\Install.clm 1124 bytes
File C:\drivers\printer\5400\install\config\install.map 568 bytes
File C:\drivers\printer\5400\install\config\launchpd.cif 1990 bytes
File C:\drivers\printer\5400\install\config\leadtool.cif 4155 bytes
File C:\drivers\printer\5400\install\config\main.cgf 58895 bytes
File C:\drivers\printer\5400\install\config\main.xml 59202 bytes
File C:\drivers\printer\5400\install\config\misc.cif 2194 bytes
File C:\drivers\printer\5400\install\config\NetScan.cif 721 bytes
File C:\drivers\printer\5400\install\config\nls 0 bytes
File C:\drivers\printer\5400\install\config\nls\ar.nls 26310 bytes
File C:\drivers\printer\5400\install\config\nls\bg.nls 29855 bytes
File C:\drivers\printer\5400\install\config\nls\ca.nls 30072 bytes
File C:\drivers\printer\5400\install\config\nls\common.nls 7269 bytes
File C:\drivers\printer\5400\install\config\nls\cs.nls 28003 bytes
File C:\drivers\printer\5400\install\config\nls\da.nls 27665 bytes
File C:\drivers\printer\5400\install\config\nls\de.nls 31064 bytes
File C:\drivers\printer\5400\install\config\nls\el.nls 32216 bytes
File C:\drivers\printer\5400\install\config\nls\en.nls 27207 bytes
File C:\drivers\printer\5400\install\config\nls\es.nls 30118 bytes
File C:\drivers\printer\5400\install\config\nls\fi.nls 27496 bytes
File C:\drivers\printer\5400\install\config\nls\fr.nls 31402 bytes
File C:\drivers\printer\5400\install\config\nls\he.nls 24294 bytes
File C:\drivers\printer\5400\install\config\nls\hu.nls 29604 bytes
File C:\drivers\printer\5400\install\config\nls\id_id.nls 28913 bytes
File C:\drivers\printer\5400\install\config\nls\it.nls 30097 bytes
File C:\drivers\printer\5400\install\config\nls\ja.nls 26883 bytes
File C:\drivers\printer\5400\install\config\nls\ko.nls 25292 bytes
File C:\drivers\printer\5400\install\config\nls\langconv.ini 379 bytes
File C:\drivers\printer\5400\install\config\nls\nl.nls 29439 bytes
File C:\drivers\printer\5400\install\config\nls\no.nls 27610 bytes
File C:\drivers\printer\5400\install\config\nls\oem.nls 635 bytes
File C:\drivers\printer\5400\install\config\nls\pl.nls 30516 bytes
File C:\drivers\printer\5400\install\config\nls\pt_br.nls 29744 bytes
File C:\drivers\printer\5400\install\config\nls\pt_pt.nls 29823 bytes
File C:\drivers\printer\5400\install\config\nls\ro.nls 29816 bytes
File C:\drivers\printer\5400\install\config\nls\ru.nls 29045 bytes
File C:\drivers\printer\5400\install\config\nls\sl.nls 28952 bytes
File C:\drivers\printer\5400\install\config\nls\sv.nls 27619 bytes
File C:\drivers\printer\5400\install\config\nls\th.nls 27731 bytes
File C:\drivers\printer\5400\install\config\nls\tr.nls 28176 bytes
File C:\drivers\printer\5400\install\config\nls\zh.nls 22284 bytes
File C:\drivers\printer\5400\install\config\nls\zh_tw.nls 22553 bytes
File C:\drivers\printer\5400\install\config\ocr.cif 4147 bytes
File C:\drivers\printer\5400\install\config\photoed.cif 3370 bytes
File C:\drivers\printer\5400\install\config\Ports.cif 6442 bytes
File C:\drivers\printer\5400\install\config\Product.ini 2274 bytes
File C:\drivers\printer\5400\install\config\uninst.cgf 11763 bytes
File C:\drivers\printer\5400\install\config\Uninst.cif 7649 bytes
File C:\drivers\printer\5400\install\config\uninst.xml 5085 bytes
File C:\drivers\printer\5400\install\config\uninster.cif 7213 bytes
File C:\drivers\printer\5400\install\config\UsersGd.cif 1423 bytes
File C:\drivers\printer\5400\install\config\warsaw.cif 8312 bytes
File C:\Lexmark\lxk4300\Install\config 0 bytes
File C:\Lexmark\lxk4300\Install\config\aioc.cif 8984 bytes
File C:\Lexmark\lxk4300\Install\config\appinst.cif 394 bytes
File C:\Lexmark\lxk4300\Install\config\ezprint.cif 2764 bytes
File C:\Lexmark\lxk4300\Install\config\Image 0 bytes
File C:\Lexmark\lxk4300\Install\config\Image\sideimg.bmp 199734 bytes
File C:\Lexmark\lxk4300\Install\config\install.map 332 bytes
File C:\Lexmark\lxk4300\Install\config\launchpd.cif 2309 bytes
File C:\Lexmark\lxk4300\Install\config\leadtool.cif 3011 bytes
File C:\Lexmark\lxk4300\Install\config\nls 0 bytes
File C:\Lexmark\lxk4300\Install\config\nls\common.nls 397 bytes
File C:\Lexmark\lxk4300\Install\config\nls\en.nls 11611 bytes
File C:\Lexmark\lxk4300\Install\config\nls\langconv.ini 356 bytes
File C:\Lexmark\lxk4300\Install\config\nls\oem.nls 326 bytes
File C:\Lexmark\lxk4300\Install\config\ocr.cif 2051 bytes
File C:\Lexmark\lxk4300\Install\config\photoed.cif 3234 bytes
File C:\Lexmark\lxk4300\Install\config\Product.ini 201 bytes
File C:\Lexmark\lxk4300\Install\config\uninst.cgf 1881 bytes
File C:\Lexmark\lxk4300\Install\config\uninst.cif 4362 bytes
File C:\Lexmark\lxk4300\Install\config\uninst.ini 47 bytes
File C:\Lexmark\lxk4300\Install\config\uninst.xml 3894 bytes
File C:\Lexmark\lxk4300\Install\config\uninstlr.cif 3309 bytes
File C:\WINDOWS\system32\drivers\H8SRTujyoultewy.sys 40448 bytes executable <-- ROOTKIT !!!
File C:\WINDOWS\system32\mshlps.dll 40448 bytes executable
File C:\WINDOWS\system32\H8SRTglkawkmpsx.dll 23552 bytes executable
File C:\WINDOWS\system32\H8SRTlqtrqtkyeb.dll 40960 bytes executable
File C:\WINDOWS\system32\H8SRTwbithkvbrp.dat 160 bytes
File C:\WINDOWS\system32\H8SRTxvdfhcxdjp.dll 40960 bytes executable
File C:\WINDOWS\system32\kbdsock.dll 33280 bytes executable
File C:\WINDOWS\temp\H8SRT5010.tmp 241 bytes
File C:\WINDOWS\temp\H8SRT5e68.tmp 241 bytes
File C:\WINDOWS\temp\H8SRT6790.tmp 40960 bytes executable
File C:\WINDOWS\temp\H8SRT6d4d.tmp 36864 bytes executable

---- EOF - GMER 1.0.15 ----


#7 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:04:48 AM

Posted 16 January 2010 - 12:16 PM

Hi,


Please go here and have a look how you can disable your security software.

Download Combofix from any of the links below but rename it to before saving it to your desktop.

Link 1
Link 2



--------------------------------------------------------------------

Double click on the renamed Combofix.exe & follow the prompts.
    When finished, it will produce a report for you.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.



Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it will produce a log for you. Please include the C:\ComboFix.txt in your next reply.

This tool is not a toy and not for everyday use.
ComboFix SHOULD NOT be used unless requested by a forum helper


If you need help, see this link:
http://www.bleepingcomputer.com/combofix/how-to-use-combofix
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#8 tsoaf

tsoaf
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:07:48 PM

Posted 16 January 2010 - 05:06 PM

i have downloaded combofix from both links and renamed it but it will not run. i have also tried downloading the bootdisk from provided in the help section of installing Combofix but that has not worked either. the only error message i get is 'some files cannot be created. please close all applications, reboot windows and restart this installation.'

#9 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:04:48 AM

Posted 17 January 2010 - 03:40 PM

Hi,
  • Download The Avenger by Swandog46 from here.
  • Unzip/extract it to a folder on your desktop.
  • Double click on avenger.exe to run The Avenger.
  • Click OK.
  • Make sure that the box next to Scan for rootkits has a tick in it and that the box next to Automatically disable any rootkits found does not have a tick in it.
  • Copy all of the text in the below code box to the clipboard by highlighting it and then pressing Ctrl+C.
    [codebox]Drivers to delete:
    H8SRTd.sys
    Files to delete:
    C:\WINDOWS\system32\drivers\H8SRTujyoultewy.sys[/codebox]
  • In the avenger window, click the Paste Script from Clipboard, button.
  • Click the Execute button.
  • You will be asked Are you sure you want to execute the current script?.
  • Click Yes.
  • You will now be asked First step completed --- The Avenger has been successfully set up to run on next boot. Reboot now?.
  • Click Yes.
  • Your PC will now be rebooted.
  • Note: If the above script contains Drivers to delete: or Drivers to disable:, then The Avenger will require two reboots to complete its operation.
  • After your PC has completed the necessary reboots, a log should automatically open. If it does not automatically open, then the log can be found at %systemdrive%\avenger.txt (typically C:\avenger.txt).
  • Please post this log, along with a new HijackThis log in your next reply.


Now please delete your copy of Combofix and download a fresh one and try again.
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#10 tsoaf

tsoaf
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:07:48 PM

Posted 17 January 2010 - 06:13 PM

i have tried downloading combofix 4 different times and got the error message only once. the other 3 i have opened it it does not do anything at all. i have posted the hijackthis and avenger logs

Attached Files



#11 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:04:48 AM

Posted 18 January 2010 - 01:59 PM

Hi,

Please don't attach the logfiles, just post it here in your thread. Please post back with a fresh Gmer logfile.

Edited by schrauber, 18 January 2010 - 02:00 PM.

regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#12 tsoaf

tsoaf
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:07:48 PM

Posted 18 January 2010 - 09:22 PM

i have tried running gmer all day today by downloading from both links (i followed the steps from the first gmer post), but the virus on my computer makes pop ups that cause the gmer program to crash.

#13 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:04:48 AM

Posted 19 January 2010 - 04:40 PM

Are you able to post a fresh OTL logfile?
regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image

#14 tsoaf

tsoaf
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:07:48 PM

Posted 19 January 2010 - 05:26 PM

OTL logfile created on: 1/19/2010 2:13:12 PM - Run 1
OTL by OldTimer - Version 3.1.25.2 Folder = C:\Documents and Settings\Pepe\Desktop
Windows XP Professional Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

511.00 Mb Total Physical Memory | 67.00 Mb Available Physical Memory | 13.00% Memory free
1.00 Gb Paging File | 1.00 Gb Available in Paging File | 64.00% Paging File free
Paging file location(s): c:\pagefile.sys 768 1536 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Program Files
Drive C: | 74.44 Gb Total Space | 0.76 Gb Free Space | 1.02% Space Free | Partition Type: NTFS
D: Drive not present or media not loaded
E: Drive not present or media not loaded
F: Drive not present or media not loaded
G: Drive not present or media not loaded
H: Drive not present or media not loaded
I: Drive not present or media not loaded

Computer Name: PEPE-8E7AE40FA4
Current User Name: Pepe
Logged in as Administrator.

Current Boot Mode: Normal
Scan Mode: Current user
Company Name Whitelist: Off
Skip Microsoft Files: Off
File Age = 30 Days
Output = Standard

========== Processes (SafeList) ==========

PRC - [2099/01/01 12:00:00 | 00,033,792 | -HS- | M] (FBcTSRgugUr) -- C:\WINDOWS\system32\smss32.exe
PRC - [2010/01/19 14:12:08 | 00,547,328 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\Pepe\Desktop\OTL.exe
PRC - [2010/01/08 05:09:46 | 19,869,696 | ---- | M] (Nexton Enterprises Ltd.) -- C:\Program Files\Desktop Defender 2010\Desktop Defender 2010.exe
PRC - [2010/01/08 05:07:52 | 03,665,920 | ---- | M] () -- C:\Program Files\Desktop Defender 2010\securitycenter.exe
PRC - [2009/09/04 12:16:54 | 05,893,360 | ---- | M] (Microsoft Corporation) -- c:\Program Files\Zune\ZuneNss.exe
PRC - [2009/09/04 12:16:54 | 00,158,448 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Zune\ZuneLauncher.exe
PRC - [2009/09/04 12:16:54 | 00,058,592 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\system32\ZuneBusEnum.exe
PRC - [2009/07/25 04:23:12 | 00,149,280 | ---- | M] (Sun Microsystems, Inc.) -- C:\Program Files\Java\jre6\bin\jusched.exe
PRC - [2009/07/25 04:23:10 | 00,153,376 | ---- | M] (Sun Microsystems, Inc.) -- C:\Program Files\Java\jre6\bin\jqs.exe
PRC - [2009/05/19 10:36:18 | 00,240,512 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
PRC - [2008/11/09 12:48:14 | 00,602,392 | ---- | M] (Yahoo! Inc.) -- C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
PRC - [2008/11/07 14:28:16 | 00,132,424 | ---- | M] (Apple Inc.) -- C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
PRC - [2008/10/24 18:48:48 | 00,362,224 | ---- | M] (Verizon) -- C:\Program Files\Verizon\Verizon Internet Security Suite\Fws.exe
PRC - [2008/07/10 01:49:44 | 00,098,840 | ---- | M] (Microsoft Corporation) -- c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
PRC - [2008/05/02 01:44:08 | 00,805,392 | ---- | M] (Logitech, Inc.) -- C:\Program Files\Logitech\SetPoint\SetPoint.exe
PRC - [2008/04/28 07:23:36 | 00,738,568 | ---- | M] (Raxco Software, Inc.) -- C:\Program Files\Raxco\PerfectDisk\PDEngine.exe
PRC - [2008/04/28 07:23:28 | 00,414,984 | ---- | M] (Raxco Software, Inc.) -- C:\Program Files\Raxco\PerfectDisk\PDAgent.exe
PRC - [2008/04/13 16:12:19 | 01,033,728 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\explorer.exe
PRC - [2008/01/29 16:38:31 | 00,583,048 | ---- | M] (Symantec Corporation) -- C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe
PRC - [2007/02/21 11:28:36 | 00,643,072 | ---- | M] (Intel Corporation) -- C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
PRC - [2007/02/21 11:19:58 | 00,819,200 | ---- | M] (Intel Corporation) -- C:\Program Files\Intel\Wireless\Bin\ZCfgSvc.exe
PRC - [2007/02/21 11:19:40 | 00,294,912 | ---- | M] (Intel® Corporation) -- C:\Program Files\Intel\Wireless\Bin\WLKEEPER.exe
PRC - [2007/02/21 11:17:42 | 00,970,752 | ---- | M] (Intel Corporation) -- C:\Program Files\Intel\Wireless\Bin\iFrmewrk.exe
PRC - [2007/02/21 11:16:48 | 00,983,040 | ---- | M] (Intel Corporation ) -- C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
PRC - [2007/02/21 11:13:26 | 00,487,424 | ---- | M] (Intel Corporation) -- C:\Program Files\Intel\Wireless\Bin\Dot1XCfg.exe
PRC - [2007/02/21 11:10:00 | 00,327,680 | ---- | M] (Intel Corporation) -- C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
PRC - [2006/11/13 12:39:52 | 01,289,000 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Microsoft ActiveSync\wcescomm.exe
PRC - [2006/11/13 12:39:34 | 00,199,464 | ---- | M] (Microsoft Corporation) -- C:\Program Files\Microsoft ActiveSync\rapimgr.exe
PRC - [2006/09/20 17:54:40 | 00,668,152 | ---- | M] (Yahoo!, Inc.) -- C:\Program Files\Yahoo!\browser\ybrowser.exe
PRC - [2006/07/21 16:19:46 | 00,129,536 | ---- | M] (Yahoo! Inc.) -- C:\Program Files\Yahoo!\browser\ybrwicon.exe
PRC - [2006/07/13 15:27:16 | 00,528,384 | ---- | M] ( ) -- C:\WINDOWS\system32\lxctcoms.exe
PRC - [2006/03/03 14:18:10 | 00,200,704 | ---- | M] (Yahoo!, Inc.) -- C:\Program Files\Yahoo!\browser\ycommon.exe
PRC - [2005/10/07 14:13:38 | 00,176,128 | R--- | M] (Alps Electric Co., Ltd.) -- C:\Program Files\Apoint\Apoint.exe
PRC - [2005/07/27 16:41:08 | 00,045,056 | R--- | M] (Alps Electric Co., Ltd.) -- C:\Program Files\Apoint\ApntEx.exe
PRC - [2005/07/06 21:59:20 | 00,364,544 | ---- | M] (ATI Technologies Inc.) -- C:\WINDOWS\system32\ati2evxx.exe
PRC - [2005/07/06 21:00:00 | 00,344,064 | ---- | M] (ATI Technologies, Inc.) -- C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe
PRC - [2005/07/06 10:14:12 | 00,471,040 | ---- | M] (Lexmark International, Inc.) -- C:\WINDOWS\system32\lxcecoms.exe
PRC - [2004/06/28 23:56:12 | 00,045,056 | R--- | M] (Alps Electric Co., Ltd.) -- C:\Program Files\Apoint\hidfind.exe


========== Modules (SafeList) ==========

MOD - [2010/01/19 14:12:08 | 00,547,328 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\Pepe\Desktop\OTL.exe
MOD - [2008/07/25 10:17:20 | 00,635,904 | ---- | M] (Microsoft Corporation) -- C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.3053_x-ww_b80fa8ca\msvcr80.dll
MOD - [2008/05/02 01:42:50 | 00,045,584 | ---- | M] (Logitech, Inc.) -- C:\Program Files\Logitech\SetPoint\lgscroll.dll


========== Win32 Services (SafeList) ==========

SRV - File not found [On_Demand | Stopped] -- -- (LiveUpdate)
SRV - File not found [Auto | Stopped] -- -- (LiveUpdate Notice Ex)
SRV - File not found [Auto | Stopped] -- -- (Automatic LiveUpdate Scheduler)
SRV - [2009/09/04 12:17:00 | 00,447,216 | ---- | M] (Microsoft Corporation) [On_Demand | Stopped] -- C:\WINDOWS\system32\ZuneWlanCfgSvc.exe -- (ZuneWlanCfgSvc)
SRV - [2009/09/04 12:16:54 | 05,893,360 | ---- | M] (Microsoft Corporation) [Auto | Running] -- c:\Program Files\Zune\ZuneNss.exe -- (ZuneNetworkSvc)
SRV - [2009/09/04 12:16:54 | 00,058,592 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\WINDOWS\system32\ZuneBusEnum.exe -- (ZuneBusEnum)
SRV - [2009/08/05 22:48:42 | 00,704,864 | ---- | M] (Microsoft Corporation) [On_Demand | Stopped] -- C:\Program Files\Windows Live\Family Safety\fsssvc.exe -- (fsssvc)
SRV - [2009/07/25 04:23:10 | 00,153,376 | ---- | M] (Sun Microsystems, Inc.) [Auto | Running] -- C:\Program Files\Java\jre6\bin\jqs.exe -- (JavaQuickStarterService)
SRV - [2009/05/19 10:36:18 | 00,240,512 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe -- (SeaPort)
SRV - [2008/11/20 13:20:44 | 00,536,872 | ---- | M] (Apple Inc.) [On_Demand | Stopped] -- C:\Program Files\iPod\bin\iPodService.exe -- (iPod Service)
SRV - [2008/11/09 12:48:14 | 00,602,392 | ---- | M] (Yahoo! Inc.) [Auto | Running] -- C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe -- (YahooAUService)
SRV - [2008/11/07 14:28:16 | 00,132,424 | ---- | M] (Apple Inc.) [Auto | Running] -- C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe -- (Apple Mobile Device)
SRV - [2008/10/24 18:49:34 | 00,096,496 | ---- | M] (Verizon) [On_Demand | Stopped] -- C:\Program Files\Verizon\Verizon Internet Security Suite\RpsSecurityAwareR.exe -- (Radialpoint Security Services)
SRV - [2008/10/24 18:48:48 | 00,362,224 | ---- | M] (Verizon) [Auto | Running] -- C:\Program Files\Verizon\Verizon Internet Security Suite\Fws.exe -- (RP_FWS)
SRV - [2008/07/10 16:28:06 | 40,999,448 | ---- | M] (Microsoft Corporation) [Auto | Stopped] -- c:\Program Files\Microsoft SQL Server\MSSQL10.SQLEXPRESS\MSSQL\Binn\sqlservr.exe -- (MSSQL$SQLEXPRESS) SQL Server (SQLEXPRESS)
SRV - [2008/07/10 16:28:06 | 00,369,688 | ---- | M] (Microsoft Corporation) [Disabled | Stopped] -- c:\Program Files\Microsoft SQL Server\MSSQL10.SQLEXPRESS\MSSQL\Binn\SQLAGENT.EXE -- (SQLAgent$SQLEXPRESS) SQL Server Agent (SQLEXPRESS)
SRV - [2008/07/10 16:28:04 | 00,047,128 | ---- | M] (Microsoft Corporation) [Disabled | Stopped] -- c:\Program Files\Microsoft SQL Server\100\Shared\SQLADHLP.EXE -- (MSSQLServerADHelper100)
SRV - [2008/07/10 01:49:44 | 00,098,840 | ---- | M] (Microsoft Corporation) [Auto | Running] -- c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe -- (SQLWriter)
SRV - [2008/07/10 01:49:34 | 00,258,072 | ---- | M] (Microsoft Corporation) [Disabled | Stopped] -- c:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe -- (SQLBrowser)
SRV - [2008/05/02 01:42:06 | 00,121,360 | ---- | M] (Logitech, Inc.) [On_Demand | Stopped] -- C:\Program Files\Common Files\Logishrd\Bluetooth\LBTServ.exe -- (LBTServ)
SRV - [2008/04/28 07:23:36 | 00,738,568 | ---- | M] (Raxco Software, Inc.) [On_Demand | Running] -- C:\Program Files\Raxco\PerfectDisk\PDEngine.exe -- (PDEngine)
SRV - [2008/04/28 07:23:28 | 00,414,984 | ---- | M] (Raxco Software, Inc.) [Auto | Running] -- C:\Program Files\Raxco\PerfectDisk\PDAgent.exe -- (PDAgent)
SRV - [2008/04/13 16:12:02 | 00,065,536 | ---- | M] (Microsoft Corporation) [Auto | Stopped] -- C:\WINDOWS\system32\nwwks.dll -- (NWCWorkstation)
SRV - [2008/01/29 16:38:31 | 00,583,048 | ---- | M] (Symantec Corporation) [Auto | Running] -- C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe -- (LiveUpdate Notice Service)
SRV - [2007/02/21 11:28:36 | 00,643,072 | ---- | M] (Intel Corporation) [Auto | Running] -- C:\Program Files\Intel\Wireless\Bin\EvtEng.exe -- (EvtEng) Intel®
SRV - [2007/02/21 11:19:40 | 00,294,912 | ---- | M] (Intel® Corporation) [Auto | Running] -- C:\Program Files\Intel\Wireless\Bin\WLKEEPER.exe -- (WLANKEEPER) Intel®
SRV - [2007/02/21 11:16:48 | 00,983,040 | ---- | M] (Intel Corporation ) [Auto | Running] -- C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe -- (S24EventMonitor) Intel®
SRV - [2007/02/21 11:10:00 | 00,327,680 | ---- | M] (Intel Corporation) [Auto | Running] -- C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe -- (RegSrvc) Intel®
SRV - [2006/11/03 18:19:58 | 00,013,592 | ---- | M] (Microsoft Corporation) [Disabled | Stopped] -- C:\Program Files\Windows Defender\MsMpEng.exe -- (WinDefend)
SRV - [2006/07/13 15:27:16 | 00,528,384 | ---- | M] ( ) [Auto | Running] -- C:\WINDOWS\System32\lxctcoms.exe -- (lxct_device)
SRV - [2005/07/06 21:59:20 | 00,364,544 | ---- | M] (ATI Technologies Inc.) [Auto | Running] -- C:\WINDOWS\system32\ati2evxx.exe -- (Ati HotKey Poller)
SRV - [2005/07/06 10:14:12 | 00,471,040 | ---- | M] (Lexmark International, Inc.) [On_Demand | Running] -- C:\WINDOWS\System32\lxcecoms.exe -- (lxce_device)
SRV - [2005/04/04 00:41:10 | 00,069,632 | ---- | M] (Macrovision Corporation) [On_Demand | Stopped] -- C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe -- (IDriverT)


========== Driver Services (SafeList) ==========

DRV - [2009/09/01 23:28:46 | 00,040,832 | ---- | M] (Microsoft Corporation) [Kernel | Auto | Running] -- C:\WINDOWS\system32\drivers\zumbus.sys -- (zumbus)
DRV - [2009/08/05 22:48:42 | 00,054,752 | ---- | M] (Microsoft Corporation) [Kernel | Auto | Running] -- C:\WINDOWS\system32\drivers\fssfltr_tdi.sys -- (fssfltr)
DRV - [2009/02/11 19:41:58 | 00,106,792 | ---- | M] (MCCI Corporation) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\sscdmdm.sys -- (sscdmdm)
DRV - [2009/02/11 19:41:58 | 00,086,824 | ---- | M] (MCCI Corporation) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\sscdserd.sys -- (sscdserd) SAMSUNG Mobile Modem Diagnostic Serial Port (WDM)
DRV - [2009/02/11 19:41:58 | 00,080,552 | ---- | M] (MCCI Corporation) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\sscdbus.sys -- (sscdbus) SAMSUNG USB Composite Device driver (WDM)
DRV - [2009/02/11 19:41:58 | 00,011,944 | ---- | M] (MCCI Corporation) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\sscdmdfl.sys -- (sscdmdfl)
DRV - [2008/11/07 14:23:30 | 00,032,000 | ---- | M] (Apple, Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\usbaapl.sys -- (USBAAPL)
DRV - [2008/09/08 13:35:58 | 00,196,368 | ---- | M] (Kaspersky Lab) [Kernel | System | Running] -- C:\WINDOWS\system32\drivers\klif.sys -- (KLIF)
DRV - [2008/07/10 01:49:14 | 00,242,712 | ---- | M] (Microsoft Corporation) [File_System | Disabled | Stopped] -- C:\WINDOWS\system32\drivers\RsFx0102.sys -- (RsFx0102)
DRV - [2008/06/26 14:23:14 | 00,112,144 | ---- | M] (Kaspersky Lab) [Kernel | Boot | Running] -- C:\WINDOWS\System32\DRIVERS\kl1.sys -- (KL1)
DRV - [2008/04/25 06:38:22 | 00,071,184 | ---- | M] (Raxco Software, Inc.) [File_System | Boot | Running] -- C:\WINDOWS\system32\drivers\DefragFs.sys -- (DefragFS)
DRV - [2008/04/24 14:02:36 | 00,053,192 | ---- | M] (Radialpoint Inc.) [Kernel | Auto | Running] -- C:\WINDOWS\system32\drivers\rp_skt32.sys -- (RPSKT) Security Services Driver (x86)
DRV - [2008/04/17 13:12:54 | 00,015,464 | ---- | M] (GEAR Software Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\GEARAspiWDM.sys -- (GEARAspiWDM)
DRV - [2008/04/13 10:56:49 | 00,012,800 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\usb8023x.sys -- (usb_rndisx)
DRV - [2008/04/13 10:56:06 | 00,088,320 | ---- | M] (Microsoft Corporation) [Kernel | Auto | Running] -- C:\WINDOWS\system32\drivers\nwlnkipx.sys -- (NwlnkIpx)
DRV - [2008/04/13 10:45:12 | 00,060,032 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\usbaudio.sys -- (usbaudio) USB Audio Driver (WDM)
DRV - [2008/04/13 10:34:12 | 00,163,584 | ---- | M] (Microsoft Corporation) [File_System | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\nwrdr.sys -- (NWRDR)
DRV - [2008/02/29 02:13:46 | 00,028,944 | ---- | M] (Logitech, Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\LUsbFilt.sys -- (LUsbFilt)
DRV - [2008/02/29 02:13:24 | 00,036,880 | ---- | M] (Logitech, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\LMouFilt.Sys -- (LMouFilt)
DRV - [2008/02/29 02:13:16 | 00,035,344 | ---- | M] (Logitech, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\LHidFilt.Sys -- (LHidFilt)
DRV - [2007/12/07 19:50:01 | 00,021,425 | ---- | M] (Meetinghouse Data Communications) [Kernel | Auto | Running] -- C:\WINDOWS\system32\drivers\AegisP.sys -- (AegisP) AEGIS Protocol (IEEE 802.1x)
DRV - [2007/12/04 17:10:30 | 00,016,640 | R--- | M] (PalmSource, Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\PalmUSBD.sys -- (PalmUSBD)
DRV - [2007/11/13 00:47:45 | 00,020,480 | ---- | M] (Macrovision Corporation, Macrovision Europe Limited, and Macrovision Japan and Asia K.K.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\secdrv.sys -- (Secdrv)
DRV - [2007/04/19 11:36:50 | 00,048,384 | ---- | M] (Radialpoint, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\rp_pkt32.sys -- (RPPKT) Radialpoint Filter (x86)
DRV - [2007/04/09 08:56:22 | 00,021,248 | ---- | M] (LG Electronics Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\lgusbdiag.sys -- (UsbDiag)
DRV - [2007/04/09 08:55:08 | 00,022,912 | ---- | M] (LG Electronics Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\lgusbmodem.sys -- (USBModem)
DRV - [2007/04/09 08:53:24 | 00,012,672 | ---- | M] (LG Electronics Inc.) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\lgusbbus.sys -- (usbbus)
DRV - [2007/02/21 11:16:12 | 00,012,416 | ---- | M] (Intel Corporation) [Kernel | Auto | Running] -- C:\WINDOWS\system32\drivers\s24trans.sys -- (s24trans)
DRV - [2007/02/20 14:07:56 | 00,005,632 | ---- | M] () [File_System | System | Running] -- C:\WINDOWS\system32\drivers\StarOpen.sys -- (StarOpen)
DRV - [2007/02/08 13:51:16 | 02,209,408 | ---- | M] (Intel® Corporation) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\w29n51.sys -- (w29n51) Intel®
DRV - [2006/11/02 06:00:08 | 00,039,368 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\winusb.sys -- (WinUSB)
DRV - [2006/04/06 15:49:00 | 00,088,192 | ---- | M] (Texas Instruments) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\gtipci21.sys -- (GTIPCI21)
DRV - [2005/09/28 20:57:18 | 00,113,847 | R--- | M] (Alps Electric Co., Ltd.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\Apfiltr.sys -- (ApfiltrService)
DRV - [2005/07/06 22:02:18 | 01,132,544 | ---- | M] (ATI Technologies Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\ati2mtag.sys -- (ati2mtag)
DRV - [2005/05/03 15:09:28 | 01,033,728 | ---- | M] (Conexant Systems, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\HSF_DPV.SYS -- (HSF_DPV)
DRV - [2005/05/03 15:08:50 | 00,208,384 | ---- | M] (Conexant Systems, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\HSFHWICH.sys -- (HSFHWICH)
DRV - [2005/05/03 15:08:44 | 00,705,408 | ---- | M] (Conexant Systems, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\HSF_CNXT.sys -- (winachsf)
DRV - [2005/03/21 17:48:30 | 00,039,904 | ---- | M] (Adaptec, Inc.) [Kernel | Boot | Stopped] -- C:\WINDOWS\system32\drivers\cercsr6.sys -- (cercsr6)
DRV - [2005/03/10 16:56:06 | 00,273,168 | ---- | M] (SigmaTel, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\STAC97.sys -- (STAC97)
DRV - [2004/08/23 14:49:30 | 00,121,472 | ---- | M] (Broadcom Corporation) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\b57xp32.sys -- (b57w2k)
DRV - [2004/08/04 04:00:00 | 00,063,232 | ---- | M] (Microsoft Corporation) [Kernel | Auto | Running] -- C:\WINDOWS\system32\drivers\nwlnknb.sys -- (NwlnkNb)
DRV - [2004/08/04 04:00:00 | 00,055,936 | ---- | M] (Microsoft Corporation) [Kernel | Auto | Running] -- C:\WINDOWS\system32\drivers\nwlnkspx.sys -- (NwlnkSpx)
DRV - [2004/08/04 04:00:00 | 00,031,744 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\WINDOWS\system32\drivers\wceusbsh.sys -- (wceusbsh)
DRV - [2004/08/04 04:00:00 | 00,017,792 | ---- | M] (Parallel Technologies, Inc.) [Kernel | On_Demand | Running] -- C:\WINDOWS\system32\drivers\ptilink.sys -- (Ptilink)
DRV - [2004/03/17 12:04:14 | 00,013,059 | ---- | M] (Conexant) [Kernel | Auto | Running] -- C:\WINDOWS\system32\drivers\mdmxsdk.sys -- (mdmxsdk)


========== Standard Registry (SafeList) ==========


========== Internet Explorer ==========

IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Search,CustomSearch = http://red.clientapps.yahoo.com/customize/.../search/ie.html
IE - HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 1
IE - HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = *.local;<local>
IE - HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyServer" = http=localhost:7171

IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Page_URL = http://verizon.my.yahoo.com
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,SearchDefaultBranded = 1
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,SearchMigratedDefaultName = Yahoo! Search
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,SearchMigratedDefaultURL = http://search.yahoo.com/search?p={searchTe...-8&fr=b1ie7
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://verizon.my.yahoo.com
IE - HKCU\..\URLSearchHook: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn1\yt.dll (Yahoo! Inc.)
IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = *.local;<local>
IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyServer" = http=localhost:7171

========== FireFox ==========

FF - prefs.js..browser.search.defaultenginename: "Yahoo"
FF - prefs.js..browser.search.defaulturl: "http://mx.search.yahoo.com/search?ei=UTF-8&fr=ytff-sunm&p="
FF - prefs.js..browser.search.param.yahoo-fr: "moz2-ytff-sunm"
FF - prefs.js..browser.search.param.yahoo-fr-cjkt: "moz2-ytff-sunm"
FF - prefs.js..browser.search.selectedEngine: "Google"
FF - prefs.js..browser.search.useDBForOrder: true
FF - prefs.js..browser.startup.homepage: "http://en-US.start2.mozilla.com/firefox?client=firefox-a&rls=org.mozilla:en-US:official"
FF - prefs.js..extensions.enabledItems: jqs@sun.com:1.0
FF - prefs.js..extensions.enabledItems: moveplayer@movenetworks.com:1.0.0.%(version)s
FF - prefs.js..extensions.enabledItems: {635abd67-4fe9-1b23-4f01-e679fa7484c1}:1.6.5.200812101546
FF - prefs.js..keyword.URL: "http://mx.search.yahoo.com/search?ei=UTF-8&fr=ytff-sunm&p="
FF - prefs.js..network.proxy.http: "localhost"
FF - prefs.js..network.proxy.http_port: 7171


FF - HKLM\software\mozilla\Mozilla Firefox 3.5.7\extensions\\Components: C:\Program Files\Mozilla Firefox\components [2010/01/06 21:16:09 | 00,000,000 | ---D | M]
FF - HKLM\software\mozilla\Mozilla Firefox 3.5.7\extensions\\Plugins: C:\Program Files\Mozilla Firefox\plugins [2010/01/06 21:16:09 | 00,000,000 | ---D | M]

[2009/07/18 14:05:28 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Pepe\Application Data\Mozilla\Extensions
[2009/07/18 14:05:28 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Pepe\Application Data\Mozilla\Extensions\IMVUClientXUL@imvu.com
[2010/01/06 19:07:43 | 00,000,000 | ---D | M] -- C:\Documents and Settings\Pepe\Application Data\Mozilla\Firefox\Profiles\4p30w1dq.default\extensions
[2009/03/21 21:53:46 | 00,000,000 | ---D | M] (Yahoo! Toolbar) -- C:\Documents and Settings\Pepe\Application Data\Mozilla\Firefox\Profiles\4p30w1dq.default\extensions\{635abd67-4fe9-1b23-4f01-e679fa7484c1}
[2009/03/20 21:27:30 | 00,001,632 | ---- | M] () -- C:\Documents and Settings\Pepe\Application Data\Mozilla\Firefox\Profiles\4p30w1dq.default\searchplugins\live-search.xml
[2010/01/06 19:07:43 | 00,000,000 | ---D | M] -- C:\Program Files\Mozilla Firefox\extensions

O1 HOSTS File: ([2009/09/18 12:26:30 | 00,000,027 | ---- | M]) - C:\WINDOWS\system32\drivers\etc\hosts
O1 - Hosts: 127.0.0.1 localhost
O2 - BHO: (&Yahoo! Toolbar Helper) - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Program Files\Yahoo!\Companion\Installs\cpn1\yt.dll (Yahoo! Inc.)
O2 - BHO: (Adobe PDF Reader Link Helper) - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll (Adobe Systems Incorporated)
O2 - BHO: (PopKill Class) - {3C060EA2-E6A9-4E49-A530-D4657B8C449A} - C:\Program Files\Verizon\Verizon Internet Security Suite\pkR.dll (Verizon)
O2 - BHO: (Windows Live Family Safety Browser Helper Class) - {4f3ed5cd-0726-42a9-87f5-d13f3d2976ac} - C:\Program Files\Windows Live\Family Safety\fssbho.dll (Microsoft Corporation)
O2 - BHO: (Yahoo! IE Services Button) - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll (Yahoo! Inc.)
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - No CLSID value found.
O2 - BHO: (Search Helper) - {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} - C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SEPsearchhelperie.dll (Microsoft Corporation)
O2 - BHO: (Java™ Plug-In 2 SSV Helper) - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll (Sun Microsystems, Inc.)
O2 - BHO: (Windows Live Toolbar Helper) - {E15A8DC0-8516-42A1-81EA-DC94EC1ACF10} - C:\Program Files\Windows Live\Toolbar\wltcore.dll (Microsoft Corporation)
O2 - BHO: (JQSIEStartDetectorImpl Class) - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll (Sun Microsystems, Inc.)
O2 - BHO: (SidebarAutoLaunch Class) - {F2AA9440-6328-4933-B7C9-A6CCDF9CBF6D} - C:\Program Files\Yahoo!\browser\YSidebarIEBHO.dll (Yahoo! Inc.)
O2 - BHO: (SingleInstance Class) - {FDAD4DA1-61A2-4FD8-9C17-86F7AC245081} - C:\Program Files\Yahoo!\Companion\Installs\cpn1\YTSingleInstance.dll (Yahoo! Inc)
O3 - HKLM\..\Toolbar: (&Windows Live Toolbar) - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Program Files\Windows Live\Toolbar\wltcore.dll (Microsoft Corporation)
O3 - HKLM\..\Toolbar: (Barra Yahoo!) - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn1\yt.dll (Yahoo! Inc.)
O3 - HKCU\..\Toolbar\WebBrowser: (&Windows Live Toolbar) - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Program Files\Windows Live\Toolbar\wltcore.dll (Microsoft Corporation)
O3 - HKCU\..\Toolbar\WebBrowser: (Barra Yahoo!) - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Program Files\Yahoo!\Companion\Installs\cpn1\yt.dll (Yahoo! Inc.)
O4 - HKLM..\Run: [Adobe Reader Speed Launcher] C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe (Adobe Systems Incorporated)
O4 - HKLM..\Run: [Apoint] C:\Program Files\Apoint\Apoint.exe (Alps Electric Co., Ltd.)
O4 - HKLM..\Run: [ATIPTA] C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe (ATI Technologies, Inc.)
O4 - HKLM..\Run: [Desktop Defender 2010] C:\Program Files\Desktop Defender 2010\Desktop Defender 2010.exe (Nexton Enterprises Ltd.)
O4 - HKLM..\Run: [IntelWireless] C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe (Intel Corporation)
O4 - HKLM..\Run: [IntelZeroConfig] C:\Program Files\Intel\Wireless\bin\ZCfgSvc.exe (Intel Corporation)
O4 - HKLM..\Run: [k4qkn3uqveww] C:\WINDOWS\system32\k4qkn3tqvefw.exe ()
O4 - HKLM..\Run: [k4qkn3vsvefa] C:\WINDOWS\system32\k4qkn3vsvefa.exe ()
O4 - HKLM..\Run: [Kernel and Hardware Abstraction Layer] C:\WINDOWS\KHALMNPR.Exe (Logitech, Inc.)
O4 - HKLM..\Run: [LXCECATS] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\LXCEtime.DLL ()
O4 - HKLM..\Run: [LXCTCATS] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\LXCTtime.DLL (Lexmark International Inc.)
O4 - HKLM..\Run: [QuickTime Task] C:\Program Files\QuickTime\qttask.exe (Apple Inc.)
O4 - HKLM..\Run: [SecurityCenter] C:\WINDOWS\system32\k4qkn3vsvefa.exe ()
O4 - HKLM..\Run: [smss32.exe] C:\WINDOWS\system32\smss32.exe (FBcTSRgugUr)
O4 - HKLM..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre6\bin\jusched.exe (Sun Microsystems, Inc.)
O4 - HKLM..\Run: [Symantec PIF AlertEng] C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe (Symantec Corporation)
O4 - HKLM..\Run: [Zune Launcher] c:\Program Files\Zune\ZuneLauncher.exe (Microsoft Corporation)
O4 - HKCU..\Run: [H/PC Connection Agent] C:\Program Files\Microsoft ActiveSync\wcescomm.exe (Microsoft Corporation)
O4 - HKCU..\Run: [settdebugx.exe] C:\DOCUME~1\Pepe\LOCALS~1\Temp\settdebugx.exe File not found
O4 - HKCU..\RunOnce: [FlashPlayerUpdate] C:\WINDOWS\system32\Macromed\Flash\FlashUtil10b.exe (Adobe Systems, Inc.)
O4 - Startup: C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Logitech SetPoint.lnk = C:\Program Files\Logitech\SetPoint\SetPoint.exe (Logitech, Inc.)
O4 - Startup: C:\Documents and Settings\Pepe\Start Menu\Programs\Startup\IMVU.lnk = C:\Documents and Settings\Pepe\Application Data\IMVUClient\IMVUQualityAgent.exe File not found
O6 - HKLM\Software\Policies\Microsoft\Internet Explorer\Main present
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: HonorAutoRunSetting = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoSetActiveDesktop = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoActiveDesktopChanges = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: EnableLUA = 0
O7 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 323
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveAutoRun = 67108863
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDrives = 0
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoSetActiveDesktop = 1
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoActiveDesktopChanges = 1
O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: DisableTaskMgr = 1
O9 - Extra Button: Agregar entrada - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll (Microsoft Corporation)
O9 - Extra 'Tools' menuitem : &Agregar entrada en Windows Live Writer - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll (Microsoft Corporation)
O9 - Extra Button: Create Mobile Favorite - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\INetRepl.dll (Microsoft Corporation)
O9 - Extra 'Tools' menuitem : Create Mobile Favorite... - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Program Files\Microsoft ActiveSync\INetRepl.dll (Microsoft Corporation)
O9 - Extra Button: Verizon Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - C:\Program Files\Yahoo!\Common\yiesrvc.dll (Yahoo! Inc.)
O9 - Extra Button: Run IMVU - {d9288080-1baa-4bc4-9cf8-a92d743db949} - C:\Documents and Settings\Pepe\Start Menu\Programs\IMVU\Run IMVU.lnk File not found
O10 - NameSpace_Catalog5\Catalog_Entries\000000000001 [] - C:\WINDOWS\system32\nwprovau.dll (Microsoft Corporation)
O15 - HKLM\..Trusted Domains: 1 domain(s) and sub-domain(s) not assigned to a zone.
O15 - HKCU\..Trusted Domains: zune.net ([]https in Trusted sites)
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} C:\Program Files\Yahoo!\Common\Yinsthelper.dll (Installation Support)
O16 - DPF: {48DD0448-9209-4F81-9F6D-D83562940134} http://lads.myspace.com/upload/MySpaceUploader1006.cab (MySpace Uploader Control)
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_15)
O16 - DPF: {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} http://fpdownload.macromedia.com/get/flash...r/ultrashim.cab (Reg Error: Key error.)
O16 - DPF: {CAFEEFAC-0015-0000-0012-ABCDEFFEDCBA} http://java.sun.com/update/1.5.0/jinstall-...indows-i586.cab (Reg Error: Key error.)
O16 - DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Reg Error: Key error.)
O16 - DPF: {CAFEEFAC-0016-0000-0015-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_15)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_15)
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} http://fpdownload.macromedia.com/pub/shock...ash/swflash.cab (Shockwave Flash Object)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 192.168.1.1 192.168.1.1
O18 - Protocol\Handler\ms-help {314111c7-a502-11d2-bbca-00c04f8ec294} - C:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll (Microsoft Corporation)
O18 - Protocol\Handler\wlmailhtml {03C514A3-1EFB-4856-9F99-10D7BE1653C0} - C:\Program Files\Windows Live\Mail\mailcomm.dll (Microsoft Corporation)
O20 - HKLM Winlogon: Shell - (Explorer.exe) - C:\WINDOWS\explorer.exe (Microsoft Corporation)
O20 - HKLM Winlogon: UserInit - (C:\WINDOWS\system32\winlogon32.exe) - C:\WINDOWS\system32\winlogon32.exe (FBcTSRgugUr)
O20 - HKCU Winlogon: Shell - (C:\Program) - File not found
O20 - HKCU Winlogon: Shell - (Files\Desktop) - File not found
O20 - HKCU Winlogon: Shell - (Defender) - File not found
O20 - HKCU Winlogon: Shell - (2010\Desktop) - File not found
O20 - HKCU Winlogon: Shell - (Defender) - File not found
O20 - HKCU Winlogon: Shell - (2010.exe) - File not found
O20 - Winlogon\Notify\AtiExtEvent: DllName - Ati2evxx.dll - C:\WINDOWS\System32\ati2evxx.dll (ATI Technologies Inc.)
O20 - Winlogon\Notify\LBTWlgn: DllName - c:\program files\common files\logishrd\bluetooth\LBTWlgn.dll - c:\Program Files\Common Files\Logishrd\Bluetooth\LBTWLgn.dll (Logitech, Inc.)
O24 - Desktop WallPaper: C:\Documents and Settings\Pepe\Local Settings\Application Data\Microsoft\Wallpaper1.bmp
O24 - Desktop BackupWallPaper: C:\Documents and Settings\Pepe\Local Settings\Application Data\Microsoft\Wallpaper1.bmp
O28 - HKLM ShellExecuteHooks: {091EB208-39DD-417D-A5DD-7E2C2D8FB9CB} - C:\Program Files\Windows Defender\MpShHook.dll (Microsoft Corporation)
O30 - LSA: Authentication Packages - (nwprovau) - C:\WINDOWS\System32\nwprovau.dll (Microsoft Corporation)
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2007/12/07 19:11:15 | 00,000,000 | ---- | M] () - C:\AUTOEXEC.BAT -- [ NTFS ]
O34 - HKLM BootExecute: (PDBoot.exe) - C:\WINDOWS\System32\PDBoot.exe (Raxco Software, Inc.)
O34 - HKLM BootExecute: (autocheck autochk *) - File not found
O35 - comfile [open] -- "%1" %*
O35 - exefile [open] -- "%1" %*
O36 - AppCertDlls: AppSecDll - (C:\WINDOWS\system32\mshlps.dll) - C:\WINDOWS\system32\mshlps.dll (Microsoft Corporation)

========== Files/Folders - Created Within 30 Days ==========

[2099/01/01 12:00:00 | 00,033,792 | -HS- | C] (FBcTSRgugUr) -- C:\WINDOWS\System32\biyuhepe.exe
[2010/01/19 14:12:03 | 00,547,328 | ---- | C] (OldTimer Tools) -- C:\Documents and Settings\Pepe\Desktop\OTL.exe
[2010/01/17 15:03:51 | 00,000,000 | ---D | C] -- C:\32788R22FWJFW
[2010/01/17 14:42:02 | 00,000,000 | ---D | C] -- C:\Avenger
[2010/01/17 14:36:31 | 00,000,000 | ---D | C] -- C:\Documents and Settings\Pepe\Desktop\avenger
[2010/01/17 14:36:06 | 00,401,720 | ---- | C] (Trend Micro Inc.) -- C:\Documents and Settings\Pepe\Desktop\HijackThis.exe
[2010/01/16 13:49:26 | 04,614,888 | ---- | C] (Microsoft Corporation) -- C:\Documents and Settings\Pepe\Desktop\WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[2010/01/16 13:22:13 | 00,000,000 | ---D | C] -- C:\Qoobox
[2010/01/15 16:57:33 | 00,000,000 | ---D | M] -- C:\Documents and Settings\NetworkService\Application Data\Macromedia
[2010/01/15 16:57:31 | 00,000,000 | ---D | M] -- C:\Documents and Settings\NetworkService\Application Data\Adobe
[2010/01/08 23:45:42 | 00,033,792 | -HS- | C] (FBcTSRgugUr) -- C:\WINDOWS\System32\winlogon32.exe
[2010/01/08 23:45:42 | 00,033,792 | -HS- | C] (FBcTSRgugUr) -- C:\WINDOWS\System32\smss32.exe
[2010/01/07 22:14:09 | 00,000,000 | ---D | C] -- C:\Program Files\Desktop Defender 2010
[2010/01/07 18:29:04 | 00,241,664 | ---- | C] (Microsoft Corporation) -- C:\qfhtgw.exe
[2010/01/04 16:33:53 | 00,000,000 | ---D | C] -- C:\Documents and Settings\Pepe\Application Data\Vivox
[2010/01/04 16:33:49 | 00,000,000 | ---D | C] -- C:\Documents and Settings\Pepe\Local Settings\Application Data\Vivox
[2009/09/16 21:44:15 | 00,000,000 | ---D | M] -- C:\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft
[2009/05/12 12:38:07 | 00,409,600 | ---- | C] ( ) -- C:\WINDOWS\System32\lxctinpa.dll
[2009/05/12 12:38:06 | 00,983,040 | ---- | C] ( ) -- C:\WINDOWS\System32\lxctusb1.dll
[2009/05/12 12:38:06 | 00,393,216 | ---- | C] ( ) -- C:\WINDOWS\System32\lxctiesc.dll
[2009/05/12 12:38:05 | 01,187,840 | ---- | C] ( ) -- C:\WINDOWS\System32\lxctserv.dll
[2009/05/12 12:38:05 | 00,163,840 | ---- | C] ( ) -- C:\WINDOWS\System32\lxctprox.dll
[2009/05/12 12:38:04 | 00,643,072 | ---- | C] ( ) -- C:\WINDOWS\System32\lxctpmui.dll
[2009/05/12 12:38:04 | 00,528,384 | ---- | C] ( ) -- C:\WINDOWS\System32\lxctlmpm.dll
[2009/05/12 12:38:04 | 00,094,208 | ---- | C] ( ) -- C:\WINDOWS\System32\lxctpplc.dll
[2009/05/12 12:38:02 | 00,696,320 | ---- | C] ( ) -- C:\WINDOWS\System32\lxcthbn3.dll
[2009/05/12 12:38:01 | 00,421,888 | ---- | C] ( ) -- C:\WINDOWS\System32\lxctcomm.dll
[2009/05/12 12:38:00 | 00,667,648 | ---- | C] ( ) -- C:\WINDOWS\System32\lxctcomc.dll
[2008/09/04 18:43:33 | 00,000,000 | --SD | M] -- C:\Documents and Settings\LocalService\Application Data\Microsoft
[2008/05/04 15:33:47 | 00,000,000 | ---D | M] -- C:\Documents and Settings\LocalService\Application Data\Yahoo!
[2008/03/11 15:17:46 | 00,000,000 | --SD | M] -- C:\Documents and Settings\NetworkService\Application Data\Microsoft
[2007/12/28 16:21:41 | 00,000,000 | ---D | M] -- C:\Documents and Settings\LocalService\Local Settings\Application Data\Microsoft
[2007/12/19 14:14:11 | 00,000,000 | ---D | M] -- C:\Documents and Settings\NetworkService\Local Settings\Application Data\Apple
[2007/12/07 19:50:08 | 00,000,000 | ---D | M] -- C:\Documents and Settings\NetworkService\Application Data\Intel
[2007/12/07 19:50:08 | 00,000,000 | ---D | M] -- C:\Documents and Settings\LocalService\Application Data\Intel
[9 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[1 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]

========== Files - Modified Within 30 Days ==========

[2099/01/01 12:00:00 | 00,033,792 | -HS- | M] (FBcTSRgugUr) -- C:\WINDOWS\System32\winlogon32.exe
[2099/01/01 12:00:00 | 00,033,792 | -HS- | M] (FBcTSRgugUr) -- C:\WINDOWS\System32\smss32.exe
[2099/01/01 12:00:00 | 00,033,792 | -HS- | M] (FBcTSRgugUr) -- C:\WINDOWS\System32\biyuhepe.exe
[2010/01/19 14:19:20 | 36,071,200 | -HS- | M] () -- C:\WINDOWS\System32\drivers\fidbox.dat
[2010/01/19 14:12:09 | 01,464,096 | -HS- | M] () -- C:\WINDOWS\System32\drivers\fidbox2.dat
[2010/01/19 14:12:08 | 00,547,328 | ---- | M] (OldTimer Tools) -- C:\Documents and Settings\Pepe\Desktop\OTL.exe
[2010/01/19 14:07:10 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\41.exe
[2010/01/19 14:07:09 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\IS15.exe
[2010/01/19 14:07:09 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\helper32.dll
[2010/01/19 14:06:44 | 00,002,206 | ---- | M] () -- C:\WINDOWS\System32\wpa.dbl
[2010/01/19 14:06:15 | 00,000,296 | ---- | M] () -- C:\WINDOWS\tasks\wvddqucs.job
[2010/01/19 14:06:15 | 00,000,006 | -H-- | M] () -- C:\WINDOWS\tasks\SA.DAT
[2010/01/19 14:06:10 | 00,002,048 | --S- | M] () -- C:\WINDOWS\bootstat.dat
[2010/01/19 00:13:24 | 00,138,260 | -HS- | M] () -- C:\WINDOWS\System32\drivers\fidbox2.idx
[2010/01/19 00:13:23 | 00,483,884 | -HS- | M] () -- C:\WINDOWS\System32\drivers\fidbox.idx
[2010/01/19 00:12:55 | 06,815,744 | -H-- | M] () -- C:\Documents and Settings\Pepe\NTUSER.DAT
[2010/01/19 00:12:55 | 00,000,178 | -HS- | M] () -- C:\Documents and Settings\Pepe\ntuser.ini
[2010/01/19 00:02:16 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\6334.exe
[2010/01/18 23:42:15 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\18467.exe
[2010/01/18 17:33:40 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\29358.exe
[2010/01/18 17:13:39 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\11478.exe
[2010/01/18 16:53:38 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\15724.exe
[2010/01/18 16:33:37 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\19169.exe
[2010/01/18 16:13:36 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\26500.exe
[2010/01/18 14:42:00 | 00,293,376 | ---- | M] () -- C:\Documents and Settings\Pepe\Desktop\3l0jqnoe.exe
[2010/01/18 03:13:09 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\491.exe
[2010/01/18 02:53:02 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\9961.exe
[2010/01/18 02:32:45 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\16827.exe
[2010/01/18 02:12:41 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\23281.exe
[2010/01/18 01:52:40 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\28145.exe
[2010/01/18 01:32:37 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\5705.exe
[2010/01/18 01:12:33 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\24464.exe
[2010/01/18 00:52:26 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\26962.exe
[2010/01/17 20:50:59 | 00,055,296 | ---- | M] () -- C:\Documents and Settings\Pepe\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2010/01/17 14:38:32 | 00,135,168 | ---- | M] () -- C:\zip.exe
[2010/01/17 14:38:32 | 00,019,286 | ---- | M] () -- C:\cleanup.exe
[2010/01/17 14:38:32 | 00,000,574 | ---- | M] () -- C:\cleanup.bat
[2010/01/17 14:38:32 | 00,000,405 | ---- | M] () -- C:\avexport.bat
[2010/01/17 14:36:09 | 00,401,720 | ---- | M] (Trend Micro Inc.) -- C:\Documents and Settings\Pepe\Desktop\HijackThis.exe
[2010/01/17 14:28:28 | 00,000,238 | ---- | M] () -- C:\WINDOWS\System32\H8SRTwbithkvbrp.dat
[2010/01/16 21:46:45 | 53,631,7952 | ---- | M] () -- C:\WINDOWS\MEMORY.DMP
[2010/01/16 13:49:26 | 04,614,888 | ---- | M] (Microsoft Corporation) -- C:\Documents and Settings\Pepe\Desktop\WindowsXP-KB310994-SP2-Home-BootDisk-ENU.exe
[2010/01/16 13:34:45 | 00,000,911 | ---- | M] () -- C:\Documents and Settings\Pepe\Start Menu\Programs\Startup\IMVU.lnk
[2010/01/16 13:16:44 | 00,040,960 | ---- | M] () -- C:\WINDOWS\System32\H8SRTxvdfhcxdjp.dll
[2010/01/16 13:16:41 | 00,040,960 | ---- | M] () -- C:\WINDOWS\System32\H8SRTlqtrqtkyeb.dll
[2010/01/16 03:29:25 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\19718.exe
[2010/01/16 03:09:24 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\18716.exe
[2010/01/16 02:49:23 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\17421.exe
[2010/01/16 02:29:22 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\12382.exe
[2010/01/16 02:09:21 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\292.exe
[2010/01/16 01:49:20 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\153.exe
[2010/01/16 01:29:18 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\3902.exe
[2010/01/16 01:09:17 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\14604.exe
[2010/01/16 00:49:17 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\32391.exe
[2010/01/16 00:29:16 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\5436.exe
[2010/01/16 00:09:15 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\4827.exe
[2010/01/15 23:49:14 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\11942.exe
[2010/01/15 23:29:13 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\2995.exe
[2010/01/14 19:16:34 | 00,524,288 | ---- | M] () -- C:\Documents and Settings\Pepe\Desktop\dds.pif
[2010/01/14 18:17:02 | 00,524,288 | ---- | M] () -- C:\Documents and Settings\Pepe\Desktop\dds.scr
[2010/01/09 13:40:44 | 00,006,456 | -H-- | M] () -- C:\WINDOWS\System32\kotezizi
[2010/01/08 18:08:39 | 00,000,895 | ---- | M] () -- C:\WINDOWS\System32\uses32.dat
[2010/01/08 18:08:39 | 00,000,100 | ---- | M] () -- C:\WINDOWS\System32\flags.ini
[2010/01/08 05:07:52 | 03,665,920 | ---- | M] () -- C:\WINDOWS\System32\k4qkn3vsvefa.exe
[2010/01/07 18:29:19 | 00,015,000 | ---- | M] () -- C:\WINDOWS\System32\wkkzto.dll
[2010/01/07 18:29:11 | 00,241,664 | ---- | M] (Microsoft Corporation) -- C:\qfhtgw.exe
[2010/01/07 18:29:10 | 00,027,136 | ---- | M] () -- C:\jdmhvwpg.exe
[2010/01/07 18:29:08 | 00,052,224 | ---- | M] () -- C:\eujbmv.exe
[2010/01/07 18:29:03 | 00,029,695 | ---- | M] () -- C:\khkil.exe
[2010/01/06 21:46:06 | 00,000,863 | ---- | M] () -- C:\WINDOWS\System32\krl32mainweq.dll
[2010/01/05 20:20:44 | 00,023,552 | ---- | M] () -- C:\WINDOWS\System32\H8SRTglkawkmpsx.dll
[2010/01/05 20:20:22 | 00,040,448 | ---- | M] () -- C:\WINDOWS\System32\drivers\H8SRTujyoultewy.sys
[2010/01/05 20:16:36 | 00,000,008 | ---- | M] () -- C:\Documents and Settings\All Users\Application Data\sysReserve.ini
[2010/01/05 20:14:37 | 00,124,928 | ---- | M] () -- C:\WINDOWS\System32\lk4qkn3uqvewq.exe
[2010/01/05 12:00:03 | 00,000,330 | -H-- | M] () -- C:\WINDOWS\tasks\MP Scheduled Scan.job
[2010/01/05 05:17:20 | 03,665,920 | ---- | M] () -- C:\WINDOWS\System32\k4qkn3tqvefw.exe
[2010/01/01 17:28:08 | 00,000,284 | ---- | M] () -- C:\WINDOWS\tasks\AppleSoftwareUpdate.job
[2009/12/24 18:54:43 | 00,014,848 | ---- | M] () -- C:\Documents and Settings\Pepe\Desktop\4f24215a46d06244db7a914d243dc5f1_315x147[1].png
[9 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[1 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]

========== Files Created - No Company Name ==========

[2099/01/01 12:00:00 | 00,006,456 | -H-- | C] () -- C:\WINDOWS\System32\kotezizi
[2010/01/18 14:41:54 | 00,293,376 | ---- | C] () -- C:\Documents and Settings\Pepe\Desktop\3l0jqnoe.exe
[2010/01/17 14:38:32 | 00,135,168 | ---- | C] () -- C:\zip.exe
[2010/01/17 14:38:32 | 00,019,286 | ---- | C] () -- C:\cleanup.exe
[2010/01/17 14:38:32 | 00,000,574 | ---- | C] () -- C:\cleanup.bat
[2010/01/17 14:38:32 | 00,000,405 | ---- | C] () -- C:\avexport.bat
[2010/01/17 00:19:19 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\18467.exe
[2010/01/16 03:29:25 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\19718.exe
[2010/01/16 03:09:24 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\18716.exe
[2010/01/16 02:49:23 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\17421.exe
[2010/01/16 02:29:22 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\12382.exe
[2010/01/16 02:09:21 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\292.exe
[2010/01/16 01:49:20 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\153.exe
[2010/01/16 01:29:18 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\3902.exe
[2010/01/16 01:09:17 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\14604.exe
[2010/01/16 00:49:17 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\32391.exe
[2010/01/16 00:29:16 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\5436.exe
[2010/01/16 00:09:15 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\4827.exe
[2010/01/15 23:49:14 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\11942.exe
[2010/01/15 23:29:13 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\2995.exe
[2010/01/15 23:09:12 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\491.exe
[2010/01/15 22:49:11 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\9961.exe
[2010/01/15 18:48:48 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\6334.exe
[2010/01/15 02:53:29 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\16827.exe
[2010/01/15 02:33:28 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\23281.exe
[2010/01/15 02:13:27 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\28145.exe
[2010/01/15 01:53:25 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\5705.exe
[2010/01/15 01:33:23 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\24464.exe
[2010/01/15 01:13:22 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\26962.exe
[2010/01/14 19:16:34 | 00,524,288 | ---- | C] () -- C:\Documents and Settings\Pepe\Desktop\dds.pif
[2010/01/14 18:16:49 | 00,524,288 | ---- | C] () -- C:\Documents and Settings\Pepe\Desktop\dds.scr
[2010/01/13 01:18:12 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\29358.exe
[2010/01/13 00:58:09 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\11478.exe
[2010/01/13 00:38:02 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\15724.exe
[2010/01/13 00:17:59 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\19169.exe
[2010/01/11 23:18:42 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\26500.exe
[2010/01/10 00:59:49 | 03,665,920 | ---- | C] () -- C:\WINDOWS\System32\k4qkn3vsvefa.exe
[2010/01/09 00:05:43 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\41.exe
[2010/01/08 23:45:55 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\IS15.exe
[2010/01/08 23:45:54 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\helper32.dll
[2010/01/08 23:45:40 | 00,000,296 | ---- | C] () -- C:\WINDOWS\tasks\wvddqucs.job
[2010/01/08 18:08:39 | 00,000,895 | ---- | C] () -- C:\WINDOWS\System32\uses32.dat
[2010/01/08 18:08:39 | 00,000,100 | ---- | C] () -- C:\WINDOWS\System32\flags.ini
[2010/01/07 18:29:19 | 00,015,000 | ---- | C] () -- C:\WINDOWS\System32\wkkzto.dll
[2010/01/07 18:29:09 | 00,027,136 | ---- | C] () -- C:\jdmhvwpg.exe
[2010/01/07 18:29:05 | 00,052,224 | ---- | C] () -- C:\eujbmv.exe
[2010/01/07 18:29:02 | 00,029,695 | ---- | C] () -- C:\khkil.exe
[2010/01/05 20:23:07 | 00,000,863 | ---- | C] () -- C:\WINDOWS\System32\krl32mainweq.dll
[2010/01/05 20:21:45 | 00,040,960 | ---- | C] () -- C:\WINDOWS\System32\H8SRTlqtrqtkyeb.dll
[2010/01/05 20:21:35 | 00,040,960 | ---- | C] () -- C:\WINDOWS\System32\H8SRTxvdfhcxdjp.dll
[2010/01/05 20:21:18 | 03,665,920 | ---- | C] () -- C:\WINDOWS\System32\k4qkn3tqvefw.exe
[2010/01/05 20:20:51 | 00,000,238 | ---- | C] () -- C:\WINDOWS\System32\H8SRTwbithkvbrp.dat
[2010/01/05 20:20:44 | 00,023,552 | ---- | C] () -- C:\WINDOWS\System32\H8SRTglkawkmpsx.dll
[2010/01/05 20:20:22 | 00,040,448 | ---- | C] () -- C:\WINDOWS\System32\drivers\H8SRTujyoultewy.sys
[2010/01/05 20:16:36 | 00,000,008 | ---- | C] () -- C:\Documents and Settings\All Users\Application Data\sysReserve.ini
[2010/01/05 20:14:36 | 00,124,928 | ---- | C] () -- C:\WINDOWS\System32\lk4qkn3uqvewq.exe
[2009/12/24 18:54:30 | 00,014,848 | ---- | C] () -- C:\Documents and Settings\Pepe\Desktop\4f24215a46d06244db7a914d243dc5f1_315x147[1].png
[2009/10/20 18:32:56 | 00,002,528 | ---- | C] () -- C:\Documents and Settings\NetworkService\Application Data\$_hpcst$.hpc
[2009/09/13 17:10:37 | 00,000,004 | ---- | C] () -- C:\Documents and Settings\Pepe\Application Data\427CA4
[2009/09/13 17:10:36 | 00,870,128 | ---- | C] () -- C:\Documents and Settings\Pepe\Application Data\mcs.rma
[2009/05/16 21:23:46 | 00,000,760 | ---- | C] () -- C:\Documents and Settings\Pepe\Application Data\setup_ldm.iss
[2009/05/12 12:43:17 | 00,040,960 | ---- | C] () -- C:\WINDOWS\System32\lxctvs.dll
[2009/05/12 12:43:12 | 00,335,872 | ---- | C] () -- C:\WINDOWS\System32\lxctcoin.dll
[2009/05/12 12:42:48 | 00,692,224 | ---- | C] () -- C:\WINDOWS\System32\lxctdrs.dll
[2009/05/12 12:42:48 | 00,065,536 | ---- | C] () -- C:\WINDOWS\System32\lxctcaps.dll
[2009/05/12 12:42:48 | 00,061,440 | ---- | C] () -- C:\WINDOWS\System32\lxctcnv4.dll
[2009/05/12 12:42:02 | 00,040,960 | ---- | C] () -- C:\WINDOWS\System32\lxctpmon.dll
[2009/05/12 12:42:02 | 00,032,768 | ---- | C] () -- C:\WINDOWS\System32\LXCTFXPU.DLL
[2009/05/12 12:38:07 | 00,274,432 | ---- | C] () -- C:\WINDOWS\System32\LXCTinst.dll
[2009/05/12 12:38:02 | 00,204,800 | ---- | C] () -- C:\WINDOWS\System32\lxctgrd.dll
[2009/04/12 19:57:39 | 00,000,094 | ---- | C] () -- C:\WINDOWS\family.ini
[2009/03/03 21:26:49 | 00,000,063 | ---- | C] () -- C:\WINDOWS\mdm.ini
[2009/01/11 15:09:20 | 00,027,648 | ---- | C] () -- C:\WINDOWS\System32\AVSredirect.dll
[2008/12/15 22:00:48 | 00,008,238 | ---- | C] () -- C:\Documents and Settings\All Users\Application Data\LUUnInstall.LiveUpdate
[2008/12/10 20:11:13 | 00,000,376 | ---- | C] () -- C:\WINDOWS\ODBC.INI
[2008/08/25 16:27:08 | 00,000,969 | ---- | C] () -- C:\WINDOWS\hegames.ini
[2008/08/12 21:33:56 | 00,002,528 | ---- | C] () -- C:\Documents and Settings\Pepe\Application Data\$_hpcst$.hpc
[2008/03/02 20:48:21 | 00,055,296 | ---- | C] () -- C:\Documents and Settings\Pepe\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2008/01/31 16:36:52 | 00,000,000 | ---- | C] () -- C:\WINDOWS\iplayer.INI
[2008/01/14 22:10:00 | 00,040,960 | ---- | C] () -- C:\WINDOWS\System32\lxcevs.dll
[2007/12/07 20:15:37 | 00,065,536 | ---- | C] () -- C:\WINDOWS\System32\YCRWin32.dll
[2007/12/07 19:44:37 | 00,192,512 | ---- | C] () -- C:\WINDOWS\System32\stac97co.dll
[2007/02/20 14:07:56 | 00,005,632 | ---- | C] () -- C:\WINDOWS\System32\drivers\StarOpen.sys
[1999/01/22 13:46:58 | 00,065,536 | ---- | C] () -- C:\WINDOWS\System32\MSRTEDIT.DLL

========== Alternate Data Streams ==========

@Alternate Data Stream - 131 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:5A27D490
@Alternate Data Stream - 127 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:0AE6CC6C
@Alternate Data Stream - 123 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:5A823589
@Alternate Data Stream - 114 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:D1B5B4F1
@Alternate Data Stream - 109 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:DFC5A2B2
< End of report >


#15 schrauber

schrauber

    Mr.Mechanic


  • Malware Response Team
  • 24,794 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Munich,Germany
  • Local time:04:48 AM

Posted 20 January 2010 - 01:12 PM

Hi,


Run OTL
  • Under the Custom Scans/Fixes box at the bottom, paste in the following
    CODE
    :OTL
    PRC - [2099/01/01 12:00:00 | 00,033,792 | -HS- | M] (FBcTSRgugUr) -- C:\WINDOWS\system32\smss32.exe
    PRC - [2010/01/08 05:09:46 | 19,869,696 | ---- | M] (Nexton Enterprises Ltd.) -- C:\Program Files\Desktop Defender 2010\Desktop Defender 2010.exe
    PRC - [2010/01/08 05:07:52 | 03,665,920 | ---- | M] () -- C:\Program Files\Desktop Defender 2010\securitycenter.exe
    O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - No CLSID value found.
    O4 - HKLM..\Run: [Desktop Defender 2010] C:\Program Files\Desktop Defender 2010\Desktop Defender 2010.exe (Nexton Enterprises Ltd.)
    O4 - HKLM..\Run: [k4qkn3uqveww] C:\WINDOWS\system32\k4qkn3tqvefw.exe ()
    O4 - HKLM..\Run: [k4qkn3vsvefa] C:\WINDOWS\system32\k4qkn3vsvefa.exe ()
    O4 - HKLM..\Run: [SecurityCenter] C:\WINDOWS\system32\k4qkn3vsvefa.exe ()
    O4 - HKLM..\Run: [smss32.exe] C:\WINDOWS\system32\smss32.exe (FBcTSRgugUr)
    O4 - HKCU..\Run: [settdebugx.exe] C:\DOCUME~1\Pepe\LOCALS~1\Temp\settdebugx.exe File not found
    O9 - Extra Button: Run IMVU - {d9288080-1baa-4bc4-9cf8-a92d743db949} - C:\Documents and Settings\Pepe\Start Menu\Programs\IMVU\Run IMVU.lnk File not found
    O20 - HKLM Winlogon: UserInit - (C:\WINDOWS\system32\winlogon32.exe) - C:\WINDOWS\system32\winlogon32.exe (FBcTSRgugUr)
    O20 - HKCU Winlogon: Shell - (C:\Program) - File not found
    O20 - HKCU Winlogon: Shell - (Files\Desktop) - File not found
    O20 - HKCU Winlogon: Shell - (Defender) - File not found
    O20 - HKCU Winlogon: Shell - (2010\Desktop) - File not found
    O20 - HKCU Winlogon: Shell - (Defender) - File not found
    O20 - HKCU Winlogon: Shell - (2010.exe) - File not found
    [2099/01/01 12:00:00 | 00,033,792 | -HS- | C] (FBcTSRgugUr) -- C:\WINDOWS\System32\biyuhepe.exe
    [2010/01/17 15:03:51 | 00,000,000 | ---D | C] -- C:\32788R22FWJFW
    [2010/01/08 23:45:42 | 00,033,792 | -HS- | C] (FBcTSRgugUr) -- C:\WINDOWS\System32\winlogon32.exe
    [2010/01/08 23:45:42 | 00,033,792 | -HS- | C] (FBcTSRgugUr) -- C:\WINDOWS\System32\smss32.exe
    [2010/01/07 22:14:09 | 00,000,000 | ---D | C] -- C:\Program Files\Desktop Defender 2010
    [2010/01/07 18:29:04 | 00,241,664 | ---- | C] (Microsoft Corporation) -- C:\qfhtgw.exe
    [2010/01/19 14:07:10 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\41.exe
    [2010/01/19 14:07:09 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\IS15.exe
    [2010/01/19 14:07:09 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\helper32.dll
    [2010/01/19 14:06:44 | 00,002,206 | ---- | M] () -- C:\WINDOWS\System32\wpa.dbl
    [2010/01/19 14:06:15 | 00,000,296 | ---- | M] () -- C:\WINDOWS\tasks\wvddqucs.job
    [2010/01/19 00:02:16 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\6334.exe
    [2010/01/18 23:42:15 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\18467.exe
    [2010/01/18 17:33:40 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\29358.exe
    [2010/01/18 17:13:39 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\11478.exe
    [2010/01/18 16:53:38 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\15724.exe
    [2010/01/18 16:33:37 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\19169.exe
    [2010/01/18 16:13:36 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\26500.exe
    [2010/01/18 14:42:00 | 00,293,376 | ---- | M] () -- C:\Documents and Settings\Pepe\Desktop\3l0jqnoe.exe
    [2010/01/18 03:13:09 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\491.exe
    [2010/01/18 02:53:02 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\9961.exe
    [2010/01/18 02:32:45 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\16827.exe
    [2010/01/18 02:12:41 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\23281.exe
    [2010/01/18 01:52:40 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\28145.exe
    [2010/01/18 01:32:37 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\5705.exe
    [2010/01/18 01:12:33 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\24464.exe
    [2010/01/18 00:52:26 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\26962.exe
    [2010/01/17 14:38:32 | 00,135,168 | ---- | M] () -- C:\zip.exe
    [2010/01/17 14:38:32 | 00,019,286 | ---- | M] () -- C:\cleanup.exe
    [2010/01/17 14:38:32 | 00,000,574 | ---- | M] () -- C:\cleanup.bat
    [2010/01/17 14:38:32 | 00,000,405 | ---- | M] () -- C:\avexport.bat
    [2010/01/16 13:16:44 | 00,040,960 | ---- | M] () -- C:\WINDOWS\System32\H8SRTxvdfhcxdjp.dll
    [2010/01/16 13:16:41 | 00,040,960 | ---- | M] () -- C:\WINDOWS\System32\H8SRTlqtrqtkyeb.dll
    [2010/01/16 03:29:25 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\19718.exe
    [2010/01/16 03:09:24 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\18716.exe
    [2010/01/16 02:49:23 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\17421.exe
    [2010/01/16 02:29:22 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\12382.exe
    [2010/01/16 02:09:21 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\292.exe
    [2010/01/16 01:49:20 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\153.exe
    [2010/01/16 01:29:18 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\3902.exe
    [2010/01/16 01:09:17 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\14604.exe
    [2010/01/16 00:49:17 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\32391.exe
    [2010/01/16 00:29:16 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\5436.exe
    [2010/01/16 00:09:15 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\4827.exe
    [2010/01/15 23:49:14 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\11942.exe
    [2010/01/15 23:29:13 | 00,000,000 | ---- | M] () -- C:\WINDOWS\System32\2995.exe
    [2010/01/09 13:40:44 | 00,006,456 | -H-- | M] () -- C:\WINDOWS\System32\kotezizi
    [2010/01/08 18:08:39 | 00,000,895 | ---- | M] () -- C:\WINDOWS\System32\uses32.dat
    [2010/01/08 18:08:39 | 00,000,100 | ---- | M] () -- C:\WINDOWS\System32\flags.ini
    [2010/01/08 05:07:52 | 03,665,920 | ---- | M] () -- C:\WINDOWS\System32\k4qkn3vsvefa.exe
    [2010/01/07 18:29:19 | 00,015,000 | ---- | M] () -- C:\WINDOWS\System32\wkkzto.dll
    [2010/01/07 18:29:11 | 00,241,664 | ---- | M] (Microsoft Corporation) -- C:\qfhtgw.exe
    [2010/01/07 18:29:10 | 00,027,136 | ---- | M] () -- C:\jdmhvwpg.exe
    [2010/01/07 18:29:08 | 00,052,224 | ---- | M] () -- C:\eujbmv.exe
    [2010/01/07 18:29:03 | 00,029,695 | ---- | M] () -- C:\khkil.exe
    [2010/01/06 21:46:06 | 00,000,863 | ---- | M] () -- C:\WINDOWS\System32\krl32mainweq.dll
    [2010/01/05 20:20:44 | 00,023,552 | ---- | M] () -- C:\WINDOWS\System32\H8SRTglkawkmpsx.dll
    [2010/01/05 20:20:22 | 00,040,448 | ---- | M] () -- C:\WINDOWS\System32\drivers\H8SRTujyoultewy.sys
    [2010/01/05 20:16:36 | 00,000,008 | ---- | M] () -- C:\Documents and Settings\All Users\Application Data\sysReserve.ini
    [2010/01/05 20:14:37 | 00,124,928 | ---- | M] () -- C:\WINDOWS\System32\lk4qkn3uqvewq.exe
    [2010/01/05 12:00:03 | 00,000,330 | -H-- | M] () -- C:\WINDOWS\tasks\MP Scheduled Scan.job
    [2010/01/05 05:17:20 | 03,665,920 | ---- | M] () -- C:\WINDOWS\System32\k4qkn3tqvefw.exe
    [2099/01/01 12:00:00 | 00,006,456 | -H-- | C] () -- C:\WINDOWS\System32\kotezizi
    [2010/01/18 14:41:54 | 00,293,376 | ---- | C] () -- C:\Documents and Settings\Pepe\Desktop\3l0jqnoe.exe
    [2010/01/17 00:19:19 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\18467.exe
    [2010/01/16 03:29:25 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\19718.exe
    [2010/01/16 03:09:24 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\18716.exe
    [2010/01/16 02:49:23 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\17421.exe
    [2010/01/16 02:29:22 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\12382.exe
    [2010/01/16 02:09:21 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\292.exe
    [2010/01/16 01:49:20 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\153.exe
    [2010/01/16 01:29:18 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\3902.exe
    [2010/01/16 01:09:17 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\14604.exe
    [2010/01/16 00:49:17 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\32391.exe
    [2010/01/16 00:29:16 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\5436.exe
    [2010/01/16 00:09:15 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\4827.exe
    [2010/01/15 23:49:14 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\11942.exe
    [2010/01/15 23:29:13 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\2995.exe
    [2010/01/15 23:09:12 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\491.exe
    [2010/01/15 22:49:11 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\9961.exe
    [2010/01/15 18:48:48 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\6334.exe
    [2010/01/15 02:53:29 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\16827.exe
    [2010/01/15 02:33:28 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\23281.exe
    [2010/01/15 02:13:27 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\28145.exe
    [2010/01/15 01:53:25 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\5705.exe
    [2010/01/15 01:33:23 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\24464.exe
    [2010/01/15 01:13:22 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\26962.exe
    [2010/01/13 01:18:12 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\29358.exe
    [2010/01/13 00:58:09 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\11478.exe
    [2010/01/13 00:38:02 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\15724.exe
    [2010/01/13 00:17:59 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\19169.exe
    [2010/01/11 23:18:42 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\26500.exe
    [2010/01/10 00:59:49 | 03,665,920 | ---- | C] () -- C:\WINDOWS\System32\k4qkn3vsvefa.exe
    [2010/01/09 00:05:43 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\41.exe
    [2010/01/08 23:45:55 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\IS15.exe
    [2010/01/08 23:45:54 | 00,000,000 | ---- | C] () -- C:\WINDOWS\System32\helper32.dll
    [2010/01/08 23:45:40 | 00,000,296 | ---- | C] () -- C:\WINDOWS\tasks\wvddqucs.job
    [2010/01/08 18:08:39 | 00,000,895 | ---- | C] () -- C:\WINDOWS\System32\uses32.dat
    [2010/01/08 18:08:39 | 00,000,100 | ---- | C] () -- C:\WINDOWS\System32\flags.ini
    [2010/01/07 18:29:19 | 00,015,000 | ---- | C] () -- C:\WINDOWS\System32\wkkzto.dll
    [2010/01/07 18:29:09 | 00,027,136 | ---- | C] () -- C:\jdmhvwpg.exe
    [2010/01/07 18:29:05 | 00,052,224 | ---- | C] () -- C:\eujbmv.exe
    [2010/01/07 18:29:02 | 00,029,695 | ---- | C] () -- C:\khkil.exe
    [2010/01/05 20:23:07 | 00,000,863 | ---- | C] () -- C:\WINDOWS\System32\krl32mainweq.dll
    [2010/01/05 20:21:45 | 00,040,960 | ---- | C] () -- C:\WINDOWS\System32\H8SRTlqtrqtkyeb.dll
    [2010/01/05 20:21:35 | 00,040,960 | ---- | C] () -- C:\WINDOWS\System32\H8SRTxvdfhcxdjp.dll
    [2010/01/05 20:21:18 | 03,665,920 | ---- | C] () -- C:\WINDOWS\System32\k4qkn3tqvefw.exe
    [2010/01/05 20:20:51 | 00,000,238 | ---- | C] () -- C:\WINDOWS\System32\H8SRTwbithkvbrp.dat
    [2010/01/05 20:20:44 | 00,023,552 | ---- | C] () -- C:\WINDOWS\System32\H8SRTglkawkmpsx.dll
    [2010/01/05 20:20:22 | 00,040,448 | ---- | C] () -- C:\WINDOWS\System32\drivers\H8SRTujyoultewy.sys
    [2010/01/05 20:16:36 | 00,000,008 | ---- | C] () -- C:\Documents and Settings\All Users\Application Data\sysReserve.ini
    [2010/01/05 20:14:36 | 00,124,928 | ---- | C] () -- C:\WINDOWS\System32\lk4qkn3uqvewq.exe
    @Alternate Data Stream - 131 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:5A27D490
    @Alternate Data Stream - 127 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:0AE6CC6C
    @Alternate Data Stream - 123 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:5A823589
    @Alternate Data Stream - 114 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:D1B5B4F1
    @Alternate Data Stream - 109 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:DFC5A2B2
    :Commands
    [emptytemp]
    [resethosts]
  • Then click the Run Fix button at the top
  • Let the program run unhindered, when done it will say "Fix Complete press ok to open the log"
  • Please post that log in your next reply. Note: If a file or folder cannot be moved immediately you may be asked to reboot the machine to finish the move process. If you are asked to reboot the machine choose Yes. In this case, after the reboot, open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTL\MovedFiles folder, and open the newest .log file present, and copy/paste the contents of that document back here in your next post.
================================Follow up scan=================================
  • Double click on OTL to run it. Make sure all other windows are closed and to let it run uninterrupted.
  • When the window appears, underneath Output at the top change it to Minimal Output.
  • Under the Standard Registry box change it to All.
  • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
    • When the scan completes, it will open one notepad window. OTL.Txt a This is saved in the same location as OTL.
    • Please copy (Edit->Select All, Edit->Copy) the contents of this file and post it with your next reply.

regards,
schrauber

Posted Image
Posted Image

If I've not posted back within 48 hrs., feel free to send a PM with your topic link. Thank you!

If I have helped you then please consider donating to continue the fight against malware Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users