Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Trojan Horse Agent_r.ats? Unsure if I'm safe.


  • Please log in to reply
9 replies to this topic

#1 BeccaLee

BeccaLee

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:05:18 AM

Posted 28 November 2011 - 10:06 PM

I hope I am posting in the right place, but I am concerned about a trojan message I got earlier this afternoon and I'm not sure if I've taken all the right steps. While I was web browsing earlier, Firefox closed and AVG detected the Trojan-BNK.Win32-Keylogger.gen and trojan horse agent_r.ats. I immediately ran a full scan with AVG which detected but did not delete four items - then I followed most of the instructions on this thread: http://www.bleepingcomputer.com/forums/topic302533.html, dedicated to the Keylogger.gen issue (ran RKill, installed and ran Malwarebytes - which found & removed four items). While I was doing this, AVG kept popping up with with the "trojan horse agent_r.ats" warning. Then I rebooted in safe mode and ran TempFile Cleaner, CCleaner, and SuperAnti Spyware (full scan), which was clean. After this, I restarted as normal and ran MBAM again, which came up clean. I did a deep scan with Symantec's online scanner (also clean). Avast was recommended to me, so I uninstalled AVG, installed Avast, and scanned with that (again, clean). I made sure that all programs were updated before I scanned.

I know this might be overkill, but I'd much rather be safe than sorry. I am especially worried because I couldn't find much info on the r.ats issue anywhere. Do you think I can go back to my normal banking and shopping activities, or are there other steps I should take? I also used a different computer to change my passwords for email, Facebook, etc.

I do have the MBAM log which identified and removed the 3 infected files and one registry value if anyone needs to see it.

Thank you so, so much for any help or advice - I really appreciate it.

BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,756 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:18 AM

Posted 28 November 2011 - 10:36 PM

Welcome aboard Posted Image

Download Security Check from HERE, and save it to your Desktop.

* Double-click SecurityCheck.exe
* Follow the onscreen instructions inside of the black box.
* A Notepad document should open automatically called checkup.txt; please post the contents of that document.

=============================================================================

Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Users, Partitions and Memory size
Click Go and post the result.

=============================================================================

Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

=============================================================================

Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

    Posted Image
  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.

IMPORTANT! If for some reason GMER refuses to run, try again.
If it still fails, try to UN-check "Devices" in right pane.
If still no joy, try to run it from Safe Mode.

My Website

My help doesn't cost a penny, but if you'd like to consider a donation, click DONATE

 


#3 BeccaLee

BeccaLee
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:05:18 AM

Posted 29 November 2011 - 12:20 AM

Thank you so much for the quick reply! :) I hope I've done everything correctly. I went ahead and ran Security Check, Mini Tool Box, and MBAM as you said, restarted the computer, closed all protection, working files, killed the internet, and ran GMER - it promptly crashed because Java picked that exact moment to update, but I tried again and it went fine. The results are as follows:

MiniToolBox by Farbar
Ran by Rebecca (administrator) on 28-11-2011 at 23:03:24
Windows 7 Home Premium Service Pack 1 (X86)

***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

========================= FF Proxy Settings: ==============================

Hosts file not detected in the default directory
========================= IP Configuration: ================================

Realtek RTL8187B Wireless 802.11b/g 54Mbps USB 2.0 Network Adapter = Wireless Network Connection (Connected)
Realtek PCIe FE Family Controller = Local Area Connection (Media disconnected)


# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4

reset
set global icmpredirects=enabled


popd
# End of IPv4 configuration



Windows IP Configuration

Host Name . . . . . . . . . . . . : Rebeccabkup
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : hsd1.ma.comcast.net.

Wireless LAN adapter Wireless Network Connection:

Connection-specific DNS Suffix . : hsd1.ma.comcast.net.
Description . . . . . . . . . . . : Realtek RTL8187B Wireless 802.11b/g 54Mbps USB 2.0 Network Adapter
Physical Address. . . . . . . . . : 70-1A-04-23-E2-CD
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::70a3:4d4a:ee07:49d%12(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.1.100(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Monday, November 28, 2011 6:10:53 PM
Lease Expires . . . . . . . . . . : Tuesday, November 29, 2011 10:13:26 PM
Default Gateway . . . . . . . . . : 192.168.1.1
DHCP Server . . . . . . . . . . . : 192.168.1.1
DHCPv6 IAID . . . . . . . . . . . : 242227716
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-12-55-63-A8-00-26-22-38-EE-9A
DNS Servers . . . . . . . . . . . : 8.8.8.8
8.8.4.4
NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Local Area Connection:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Realtek PCIe FE Family Controller
Physical Address. . . . . . . . . : 00-26-22-38-EE-9A
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter isatap.hsd1.ma.comcast.net.:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 11:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft 6to4 Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter isatap.{2B628043-564D-499C-B681-5AC04A3A786D}:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter #2
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Teredo Tunneling Pseudo-Interface:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Server: google-public-dns-a.google.com
Address: 8.8.8.8

Name: google.com
Addresses: 74.125.226.178
74.125.226.179
74.125.226.177
74.125.226.180
74.125.226.176


Pinging google.com [74.125.226.178] with 32 bytes of data:
Reply from 74.125.226.178: bytes=32 time=42ms TTL=53
Reply from 74.125.226.178: bytes=32 time=39ms TTL=51

Ping statistics for 74.125.226.178:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 39ms, Maximum = 42ms, Average = 40ms
Server: google-public-dns-a.google.com
Address: 8.8.8.8

Name: yahoo.com
Addresses: 98.137.149.56
98.139.180.149
209.191.122.70
72.30.2.43


Pinging yahoo.com [98.137.149.56] with 32 bytes of data:
Reply from 98.137.149.56: bytes=32 time=106ms TTL=51
Reply from 98.137.149.56: bytes=32 time=104ms TTL=51

Ping statistics for 98.137.149.56:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 104ms, Maximum = 106ms, Average = 105ms
Server: google-public-dns-a.google.com
Address: 8.8.8.8

Name: bleepingcomputer.com
Address: 208.43.87.2


Pinging bleepingcomputer.com [208.43.87.2] with 32 bytes of data:
Reply from 208.43.87.2: Destination host unreachable.
Reply from 208.43.87.2: Destination host unreachable.

Ping statistics for 208.43.87.2:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Ping statistics for 127.0.0.1:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
===========================================================================
Interface List
12...70 1a 04 23 e2 cd ......Realtek RTL8187B Wireless 802.11b/g 54Mbps USB 2.0 Network Adapter
10...00 26 22 38 ee 9a ......Realtek PCIe FE Family Controller
1...........................Software Loopback Interface 1
16...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter
11...00 00 00 00 00 00 00 e0 Microsoft 6to4 Adapter
14...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #2
13...00 00 00 00 00 00 00 e0 Teredo Tunneling Pseudo-Interface
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.100 25
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
192.168.1.0 255.255.255.0 On-link 192.168.1.100 281
192.168.1.100 255.255.255.255 On-link 192.168.1.100 281
192.168.1.255 255.255.255.255 On-link 192.168.1.100 281
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 192.168.1.100 281
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 192.168.1.100 281
===========================================================================
Persistent Routes:
None

IPv6 Route Table
===========================================================================
Active Routes:
If Metric Network Destination Gateway
1 306 ::1/128 On-link
12 281 fe80::/64 On-link
12 281 fe80::70a3:4d4a:ee07:49d/128
On-link
1 306 ff00::/8 On-link
12 281 ff00::/8 On-link
===========================================================================
Persistent Routes:
None
========================= Winsock entries =====================================

Catalog5 01 mswsock.dll [File Not found] ()
Catalog5 02 C:\Windows\system32\napinsp.dll [52224] (Microsoft Corporation)
Catalog5 03 C:\Windows\system32\pnrpnsp.dll [65024] (Microsoft Corporation)
Catalog5 04 C:\Windows\system32\pnrpnsp.dll [65024] (Microsoft Corporation)
Catalog5 05 C:\Program Files\Bonjour\mdnsNSP.dll [152864] (Apple Inc.)
Catalog5 06 mswsock.dll [File Not found] ()
Catalog5 07 C:\Windows\System32\winrnr.dll [20992] (Microsoft Corporation)
Catalog5 08 C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL [145280] (Microsoft Corp.)
Catalog5 09 C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL [145280] (Microsoft Corp.)
Catalog9 01 mswsock.dll [File Not found] ()
Catalog9 02 mswsock.dll [File Not found] ()
Catalog9 03 mswsock.dll [File Not found] ()
Catalog9 04 mswsock.dll [File Not found] ()
Catalog9 05 mswsock.dll [File Not found] ()
Catalog9 06 mswsock.dll [File Not found] ()
Catalog9 07 mswsock.dll [File Not found] ()
Catalog9 08 mswsock.dll [File Not found] ()
Catalog9 09 mswsock.dll [File Not found] ()
Catalog9 10 mswsock.dll [File Not found] ()
Catalog9 11 mswsock.dll [File Not found] ()
Catalog9 12 mswsock.dll [File Not found] ()
Catalog9 13 mswsock.dll [File Not found] ()
Catalog9 14 mswsock.dll [File Not found] ()
Catalog9 15 mswsock.dll [File Not found] ()
Catalog9 16 mswsock.dll [File Not found] ()
Catalog9 17 mswsock.dll [File Not found] ()
Catalog9 18 mswsock.dll [File Not found] ()
Catalog9 19 mswsock.dll [File Not found] ()
Catalog9 20 mswsock.dll [File Not found] ()
Catalog9 21 mswsock.dll [File Not found] ()
Catalog9 22 mswsock.dll [File Not found] ()
Catalog9 23 mswsock.dll [File Not found] ()
Catalog9 24 mswsock.dll [File Not found] ()
Catalog9 25 mswsock.dll [File Not found] ()
Catalog9 26 mswsock.dll [File Not found] ()

========================= Event log errors: ===============================

Application errors:
==================
Error: (11/28/2011 10:13:21 PM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 345808

Error: (11/28/2011 10:13:21 PM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 345808

Error: (11/28/2011 10:13:21 PM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (11/28/2011 10:13:19 PM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 343670

Error: (11/28/2011 10:13:19 PM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 343670

Error: (11/28/2011 10:13:19 PM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (11/28/2011 10:13:18 PM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 342672

Error: (11/28/2011 10:13:18 PM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 342672

Error: (11/28/2011 10:13:18 PM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (11/28/2011 10:13:17 PM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 341658


System errors:
=============
Error: (11/28/2011 10:13:27 PM) (Source: Microsoft-Windows-DNS-Client) (User: NETWORK SERVICE)
Description: There was an error while attempting to read the local hosts file.

Error: (11/28/2011 10:13:26 PM) (Source: Microsoft-Windows-DNS-Client) (User: NETWORK SERVICE)
Description: There was an error while attempting to read the local hosts file.

Error: (11/28/2011 10:13:26 PM) (Source: Microsoft-Windows-DNS-Client) (User: NETWORK SERVICE)
Description: There was an error while attempting to read the local hosts file.

Error: (11/28/2011 10:13:15 PM) (Source: Service Control Manager) (User: )
Description: A timeout (30000 milliseconds) was reached while waiting for a transaction response from the Wlansvc service.

Error: (11/28/2011 06:12:37 PM) (Source: Service Control Manager) (User: )
Description: The Service Control Manager tried to take a corrective action (Restart the service) after the unexpected termination of the Windows Search service, but this action failed with the following error:
%%1056

Error: (11/28/2011 06:12:22 PM) (Source: Service Control Manager) (User: )
Description: The HomeGroup Listener service terminated with service-specific error %%-2147023143.

Error: (11/28/2011 06:11:52 PM) (Source: Service Control Manager) (User: )
Description: The Windows Search service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in 30000 milliseconds: Restart the service.

Error: (11/28/2011 06:11:52 PM) (Source: Service Control Manager) (User: )
Description: The Windows Search service terminated with service-specific error %%-1073473535.

Error: (11/28/2011 06:11:52 PM) (Source: Service Control Manager) (User: )
Description: The following boot-start or system-start driver(s) failed to load:
cdrom

Error: (11/28/2011 06:11:30 PM) (Source: Service Control Manager) (User: )
Description: The IPsec Policy Agent service depends the following service: BFE. This service might not be installed.


Microsoft Office Sessions:
=========================

=========================== Installed Programs ============================

Adobe Flash Player 10 ActiveX (Version: 10.0.22.87)
Adobe Flash Player 10 Plugin (Version: 10.3.183.10)
Adobe Reader 9.4.6 (Version: 9.4.6)
Advanced SystemCare 4 (Version: 4.0.1)
AIM 7
AIM Toolbar
aioprnt (Version: 5.3.1.0)
aioscnnr (Version: 5.7.5.30)
aioscnnr (Version: 7.0.5.10)
Amazon MP3 Downloader 1.0.10
Apple Application Support (Version: 1.4.1)
Apple Mobile Device Support (Version: 3.3.1.3)
Apple Software Update (Version: 2.1.1.116)
avast! Pro Antivirus (Version: 6.0.1367.0)
Big Fish Games: Game Manager (Version: 2.0.0.8)
Bonjour (Version: 2.0.4.0)
Bounce Symphony (Version: 2.2.0.95)
C4USelfUpdater (Version: 1.00.0000)
CCleaner (Version: 3.13)
center (Version: 6.2.5.0)
CITY MULTI Design Tool (Version: 3.83.0000)
Committed: The Mystery at Shady Pines Premium Edition (Version: 2.2.0.98)
Compatibility Pack for the 2007 Office system (Version: 12.0.4518.1014)
Crystal Path (Version: 2.2.0.95)
D3DX10 (Version: 15.4.2368.0902)
Dark Tales: Edgar Allan Poe`s Murders in the Rue Morgue
Dark Tales: ™ Edgar Allan Poe's The Black Cat
DivX Setup (Version: 2.5.0.11)
Download Updater (AOL LLC)
essentials (Version: 6.0.14.0)
Farm Frenzy: Viking Heroes (Version: 2.2.0.98)
FileMaker Pro 11 (Version: 11.0.2.0)
Golden Trails: The New Western Rush (Version: 2.2.0.95)
GOM Player (Version: 2.1.28.5039)
Google Toolbar for Internet Explorer (Version: 1.0.0)
House, MD (Version: 2.2.0.97)
Intel® Graphics Media Accelerator Driver (Version: 8.15.10.1883)
Intel® Matrix Storage Manager
iTunes (Version: 10.1.2.17)
Java Auto Updater (Version: 2.0.3.1)
Java™ 6 Update 20 (Version: 6.0.200)
Java™ 6 Update 24 (Version: 6.0.240)
Junk Mail filter update (Version: 15.4.3502.0922)
Kodak AIO Printer (Version: 7.0.3.0)
KODAK AiO Software (Version: 7.1.6.30)
ksDIP (Version: 3.20.0000.0001)
Label@Once 1.0 (Version: 1.0)
Little Folk of Faery (Version: 2.2.0.95)
Maintenance Tools for Windows2000 and XP and Vista (Version: 4.33.0004)
Malwarebytes' Anti-Malware version 1.51.2.1300 (Version: 1.51.2.1300)
Microsoft .NET Framework 4 Client Profile (Version: 4.0.30319)
Microsoft Application Error Reporting (Version: 12.0.6012.5000)
Microsoft Office 2007 Service Pack 2 (SP2)
Microsoft Office Access MUI (English) 2007 (Version: 12.0.4518.1014)
Microsoft Office Access Setup Metadata MUI (English) 2007 (Version: 12.0.4518.1014)
Microsoft Office Excel MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Home and Student 2007 (Version: 12.0.6425.1000)
Microsoft Office InfoPath MUI (English) 2007 (Version: 12.0.4518.1014)
Microsoft Office OneNote MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Outlook MUI (English) 2007 (Version: 12.0.4518.1014)
Microsoft Office PowerPoint MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office PowerPoint Viewer 2007 (English) (Version: 12.0.4518.1014)
Microsoft Office Professional Plus 2007 (Version: 12.0.4518.1014)
Microsoft Office Proof (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proof (French) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proof (Spanish) 2007 (Version: 12.0.6425.1000)
Microsoft Office Proofing (English) 2007 (Version: 12.0.4518.1014)
Microsoft Office Proofing Tools 2007 Service Pack 2 (SP2)
Microsoft Office Publisher MUI (English) 2007 (Version: 12.0.4518.1014)
Microsoft Office Shared MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Shared Setup Metadata MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Office Suite Activation Assistant (Version: 2.9)
Microsoft Office Word MUI (English) 2007 (Version: 12.0.6425.1000)
Microsoft Silverlight (Version: 4.0.50401.0)
Microsoft SQL Server 2005
Microsoft SQL Server 2005 Compact Edition [ENU] (Version: 3.1.0000)
Microsoft SQL Server 2005 Express Edition (MNTTOOL) (Version: 9.2.3042.00)
Microsoft SQL Server Native Client (Version: 9.00.3042.00)
Microsoft SQL Server Setup Support Files (English) (Version: 9.00.3042.00)
Microsoft SQL Server VSS Writer (Version: 9.00.3042.00)
Microsoft VC9 runtime libraries (Version: 1.0.0)
Microsoft Visual C++ 2005 Redistributable (Version: 8.0.59193)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.21022.218 (Version: 9.0.21022.218)
Microsoft Works (Version: 9.7.0621)
Mozilla Firefox (3.6.24) (Version: 3.6.24 (en-US))
MPEG2 Codec(libmpeg2/mad)
MSVCRT (Version: 15.4.2862.0708)
MSXML 4.0 SP2 (KB954430) (Version: 4.20.9870.0)
MSXML 4.0 SP2 (KB973688) (Version: 4.20.9876.0)
Mysteryville 2 (Version: 2.2.0.98)
MyToshiba (Version: 2.2.0.3)
NetZero Launcher (Version: 2.01)
Nightfall Mysteries: Curse of the Opera (Version: 2.2.0.95)
Norton Internet Security (Version: 16.7.0.30)
Obulis (Version: 2.2.0.95)
ocr (Version: 6.2.3.50)
OpenOffice.org 3.2 (Version: 3.2.9483)
PlayReady PC Runtime x86 (Version: 1.3.0)
PreReq (Version: 6.2.2.60)
Quickbooks Financial Center (Version: 2.02)
QuickTime (Version: 7.69.80.9)
RCA Detective™ 3.0.2.0
RCA easyRip 2.5.4.0
RCA Updater 2.1.6.0
RealPlayer
Realtek 8136 8168 8169 Ethernet Driver (Version: 1.00.0005)
Realtek High Definition Audio Driver (Version: 6.0.1.5904)
Realtek USB 2.0 Card Reader (Version: 6.1.7100.30098)
Realtek WLAN Driver (Version: 2.00.0006)
RealUpgrade 1.0 (Version: 1.0.0)
SanDisk ® Media Manager (Version: 1.0.45)
Skype Launcher (Version: 2.01)
Skype Toolbars (Version: 5.2.4170)
Skype™ 5.1 (Version: 5.1.112)
Slingo Deluxe (Version: 2.2.0.95)
Slingo Mystery - Who's Gold (Version: 2.2.0.95)
Slingo Quest (Version: 2.2.0.95)
SUPERAntiSpyware (Version: 5.0.1108)
Switch Sound File Converter
Synaptics Pointing Device Driver (Version: 13.2.6.1)
Temp File Cleaner
Toshiba Application and Driver Installer (Version: 9.0.0.9)
TOSHIBA Assist (Version: 2.01.11)
TOSHIBA ConfigFree (Version: 8.0.21)
TOSHIBA Disc Creator (Version: 2.1.0.1)
TOSHIBA DVD PLAYER (Version: 3.01.0.07-A)
TOSHIBA Extended Tiles for Windows Mobility Center (Version: 1.01.00)
TOSHIBA Flash Cards Support Utility (Version: 1.63.0.4C)
TOSHIBA Hardware Setup (Version: 1.63.0.11C)
TOSHIBA HDD/SSD Alert (Version: 3.1.0.0)
Toshiba Online Backup (Version: 1.2.0.35)
Toshiba Quality Application (Version: 1.001.0000)
TOSHIBA Recovery Media Creator (Version: 2.1.0.2)
TOSHIBA Service Station (Version: 2.1.33)
TOSHIBA Speech System Applications (Version: 1.00.2518)
TOSHIBA Speech System SR Engine(U.S.) Version1.0
TOSHIBA Speech System TTS Engine(U.S.) Version1.0
TOSHIBA Supervisor Password (Version: 1.63.0.6C)
TOSHIBA Value Added Package (Version: 1.2.25)
ToshibaRegistration (Version: 1.0.3)
Update Installer for WildTangent Games App
Utility Common Driver (Version: 1.0.50.26C)
Vampire Brides - Love Over Death (Version: 2.2.0.95)
Vampire Saga - Pandora's Box (Version: 2.2.0.95)
VC80CRTRedist - 8.0.50727.4053 (Version: 1.1.0)
WildTangent Games (Version: 1.0.2.5)
WildTangent Games App (Toshiba Games) (Version: 4.0.5.31)
WildTangent Games App (Version: 4.0.5.31)
Windows Driver Package - FTDI CDM Driver Package (10/22/2009 2.06.00) (Version: 10/22/2009 2.06.00)
Windows Live Communications Platform (Version: 15.4.3502.0922)
Windows Live Essentials (Version: 15.4.3502.0922)
Windows Live Essentials (Version: 15.4.3508.1109)
Windows Live ID Sign-in Assistant (Version: 7.250.4225.0)
Windows Live Installer (Version: 15.4.3502.0922)
Windows Live Mail (Version: 15.4.3502.0922)
Windows Live Messenger (Version: 15.4.3502.0922)
Windows Live MIME IFilter (Version: 15.4.3502.0922)
Windows Live Movie Maker (Version: 15.4.3502.0922)
Windows Live Photo Common (Version: 15.4.3502.0922)
Windows Live Photo Gallery (Version: 15.4.3502.0922)
Windows Live PIMT Platform (Version: 15.4.3508.1109)
Windows Live SOXE (Version: 15.4.3502.0922)
Windows Live SOXE Definitions (Version: 15.4.3502.0922)
Windows Live Sync (Version: 14.0.8089.726)
Windows Live UX Platform (Version: 15.4.3502.0922)
Windows Live UX Platform Language Pack (Version: 15.4.3508.1109)
Windows Live Writer (Version: 15.4.3502.0922)
Windows Live Writer Resources (Version: 15.4.3502.0922)
WinZip 15.0 (Version: 15.0.9411)

========================= Memory info: ===================================

Percentage of memory in use: 58%
Total physical RAM: 1912.89 MB
Available physical RAM: 789.34 MB
Total Pagefile: 3825.77 MB
Available Pagefile: 1912 MB
Total Virtual: 2047.88 MB
Available Virtual: 1927.41 MB

========================= Partitions: =====================================

1 Drive c: (TI102605W0F) (Fixed) (Total:223.27 GB) (Free:111.63 GB) NTFS

========================= Users: ========================================

User accounts for \\REBECCABKUP

Administrator Guest Rebecca


**** End of log ****


Results of screen317's Security Check version 0.99.24
Windows 7 Service Pack 1 x86 (UAC is enabled)
Internet Explorer 8 Out of date!
``````````````````````````````
Antivirus/Firewall Check:

Windows Security Center service is not running! This report may not be accurate!
avast! Pro Antivirus
Norton Internet Security
WMI entry may not exist for antivirus; attempting automatic update.
```````````````````````````````
Anti-malware/Other Utilities Check:

Malwarebytes' Anti-Malware
CCleaner
Temp File Cleaner
Java™ 6 Update 20
Java™ 6 Update 24
Out of date Java installed!
Adobe Flash Player ( 10.3.183.10) Flash Player Out of Date!
Mozilla Firefox (3.6.24) Firefox Out of Date!
````````````````````````````````
Process Check:
objlist.exe by Laurent

Malwarebytes' Anti-Malware mbamservice.exe
Malwarebytes' Anti-Malware mbamgui.exe
AVAST Software Avast AvastSvc.exe
AVAST Software Avast AvastUI.exe
``````````End of Log````````````

Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Database version: 8260

Windows 6.1.7601 Service Pack 1
Internet Explorer 8.0.7601.17514

11/28/2011 11:26:09 PM
mbam-log-2011-11-28 (23-26-09).txt

Scan type: Quick scan
Objects scanned: 161455
Time elapsed: 5 minute(s), 51 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)

GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2011-11-29 00:11:16
Windows 6.1.7601 Service Pack 1 Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1 Hitachi_ rev.FBEO
Running: y4gzkq1z.exe; Driver: C:\Users\Rebecca\AppData\Local\Temp\pwliqaow.sys


---- System - GMER 1.0.15 ----

SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwAddBootEntry [0x8CE40FC4]
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ZwAllocateVirtualMemory [0x8E647510]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateEvent [0x8CE43456]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateEventPair [0x8CE434AE]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateIoCompletion [0x8CE435C4]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateMutant [0x8CE433AC]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateSection [0x8CE434FE]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateSemaphore [0x8CE43400]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateTimer [0x8CE43572]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwDeleteBootEntry [0x8CE40FE8]
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ZwFreeVirtualMemory [0x8E6475C0]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwLoadDriver [0x8CE40DB2]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwModifyBootEntry [0x8CE4100C]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwNotifyChangeKey [0x8CE439BC]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwNotifyChangeMultipleKeys [0x8CE41AA4]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenEvent [0x8CE43486]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenEventPair [0x8CE434D6]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenIoCompletion [0x8CE435EE]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenMutant [0x8CE433D8]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenSection [0x8CE4353E]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenSemaphore [0x8CE4342E]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenTimer [0x8CE4359C]
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ZwProtectVirtualMemory [0x8E647658]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwQueryObject [0x8CE4196A]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwSetBootEntryOrder [0x8CE41030]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwSetBootOptions [0x8CE41054]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwSetSystemInformation [0x8CE40E0C]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwSetSystemPowerState [0x8CE40F48]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwShutdownSystem [0x8CE40F24]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwSystemDebugControl [0x8CE40F6C]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwVdmControl [0x8CE41078]

Code \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ObMakeTemporaryObject

---- Kernel code sections - GMER 1.0.15 ----

.text ntkrnlpa.exe!ZwSaveKey + 13D1 82C86349 1 Byte [06]
.text ntkrnlpa.exe!KiDispatchInterrupt + 5A2 82CBFD52 19 Bytes [E0, 0F, BA, F0, 07, 73, 09, ...] {LOOPNZ 0x11; MOV EDX, 0x97307f0; MOV CR4, EAX; OR AL, 0x80; MOV CR4, EAX; RET ; MOV ECX, CR3}
.text ntkrnlpa.exe!KeRemoveQueueEx + 10CB 82CC6D80 4 Bytes [C4, 0F, E4, 8C] {LES ECX, DWORD [EDI]; IN AL, 0x8c}
.text ntkrnlpa.exe!KeRemoveQueueEx + 10F3 82CC6DA8 4 Bytes [10, 75, 64, 8E]
.text ntkrnlpa.exe!KeRemoveQueueEx + 11A7 82CC6E5C 8 Bytes [56, 34, E4, 8C, AE, 34, E4, ...]
.text ntkrnlpa.exe!KeRemoveQueueEx + 11B3 82CC6E68 4 Bytes [C4, 35, E4, 8C]
.text ntkrnlpa.exe!KeRemoveQueueEx + 11CF 82CC6E84 4 Bytes [AC, 33, E4, 8C]
.text ...
.text C:\windows\system32\DRIVERS\tos_sps32.sys section is writeable [0x88D49000, 0x3C849, 0xE8000020]
.dsrt C:\windows\system32\DRIVERS\tos_sps32.sys unknown last section [0x88D8E000, 0x3DC, 0x48000040]

---- User code sections - GMER 1.0.15 ----

.text C:\windows\system32\Dwm.exe[460] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000A03FC
.text C:\windows\system32\Dwm.exe[460] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000A01F8
.text C:\windows\system32\Dwm.exe[460] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\system32\Dwm.exe[460] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 000C0A08
.text C:\windows\system32\Dwm.exe[460] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 000C03FC
.text C:\windows\system32\Dwm.exe[460] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 000C0804
.text C:\windows\system32\Dwm.exe[460] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 000C01F8
.text C:\windows\system32\Dwm.exe[460] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 000C0600
.text C:\windows\system32\csrss.exe[464] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\system32\wininit.exe[516] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000303FC
.text C:\windows\system32\wininit.exe[516] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000301F8
.text C:\windows\system32\wininit.exe[516] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\system32\wininit.exe[516] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 000C0A08
.text C:\windows\system32\wininit.exe[516] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 000C03FC
.text C:\windows\system32\wininit.exe[516] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 000C0804
.text C:\windows\system32\wininit.exe[516] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 000C01F8
.text C:\windows\system32\wininit.exe[516] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 000C0600
.text C:\windows\system32\csrss.exe[528] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\system32\winlogon.exe[564] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000303FC
.text C:\windows\system32\winlogon.exe[564] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000301F8
.text C:\windows\system32\winlogon.exe[564] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\system32\winlogon.exe[564] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00050A08
.text C:\windows\system32\winlogon.exe[564] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 000503FC
.text C:\windows\system32\winlogon.exe[564] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00050804
.text C:\windows\system32\winlogon.exe[564] USER32.dll!SetWinEventHook 757924DC 3 Bytes JMP 000501F8
.text C:\windows\system32\winlogon.exe[564] USER32.dll!SetWinEventHook + 4 757924E0 1 Byte [8A]
.text C:\windows\system32\winlogon.exe[564] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00050600
.text C:\windows\system32\services.exe[620] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000603FC
.text C:\windows\system32\services.exe[620] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000601F8
.text C:\windows\system32\services.exe[620] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\system32\lsass.exe[636] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000A03FC
.text C:\windows\system32\lsass.exe[636] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000A01F8
.text C:\windows\system32\lsass.exe[636] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\system32\lsass.exe[636] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00A20A08
.text C:\windows\system32\lsass.exe[636] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 00A203FC
.text C:\windows\system32\lsass.exe[636] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00A20804
.text C:\windows\system32\lsass.exe[636] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 00A201F8
.text C:\windows\system32\lsass.exe[636] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00A20600
.text C:\windows\system32\lsm.exe[644] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000603FC
.text C:\windows\system32\lsm.exe[644] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000601F8
.text C:\windows\system32\lsm.exe[644] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\System32\svchost.exe[688] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000603FC
.text C:\windows\System32\svchost.exe[688] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000601F8
.text C:\windows\System32\svchost.exe[688] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\system32\svchost.exe[728] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000A03FC
.text C:\windows\system32\svchost.exe[728] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000A01F8
.text C:\windows\system32\svchost.exe[728] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\system32\svchost.exe[728] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 003E0A08
.text C:\windows\system32\svchost.exe[728] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 003E03FC
.text C:\windows\system32\svchost.exe[728] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 003E0804
.text C:\windows\system32\svchost.exe[728] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 003E01F8
.text C:\windows\system32\svchost.exe[728] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 003E0600
.text C:\windows\system32\svchost.exe[804] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000603FC
.text C:\windows\system32\svchost.exe[804] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000601F8
.text C:\windows\system32\svchost.exe[804] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\system32\svchost.exe[804] user32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00260A08
.text C:\windows\system32\svchost.exe[804] user32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 002603FC
.text C:\windows\system32\svchost.exe[804] user32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00260804
.text C:\windows\system32\svchost.exe[804] user32.dll!SetWinEventHook 757924DC 5 Bytes JMP 002601F8
.text C:\windows\system32\svchost.exe[804] user32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00260600
.text C:\windows\System32\svchost.exe[852] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000603FC
.text C:\windows\System32\svchost.exe[852] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000601F8
.text C:\windows\System32\svchost.exe[852] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\System32\svchost.exe[852] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00220A08
.text C:\windows\System32\svchost.exe[852] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 002203FC
.text C:\windows\System32\svchost.exe[852] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00220804
.text C:\windows\System32\svchost.exe[852] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 002201F8
.text C:\windows\System32\svchost.exe[852] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00220600
.text C:\windows\Explorer.EXE[896] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000603FC
.text C:\windows\Explorer.EXE[896] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000601F8
.text C:\windows\Explorer.EXE[896] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\Explorer.EXE[896] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00110A08
.text C:\windows\Explorer.EXE[896] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001103FC
.text C:\windows\Explorer.EXE[896] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00110804
.text C:\windows\Explorer.EXE[896] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001101F8
.text C:\windows\Explorer.EXE[896] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00110600
.text C:\windows\System32\svchost.exe[960] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000603FC
.text C:\windows\System32\svchost.exe[960] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000601F8
.text C:\windows\System32\svchost.exe[960] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\System32\svchost.exe[960] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 005C0A08
.text C:\windows\System32\svchost.exe[960] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 005C03FC
.text C:\windows\System32\svchost.exe[960] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 005C0804
.text C:\windows\System32\svchost.exe[960] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 005C01F8
.text C:\windows\System32\svchost.exe[960] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 005C0600
.text C:\windows\system32\svchost.exe[1016] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000603FC
.text C:\windows\system32\svchost.exe[1016] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000601F8
.text C:\windows\system32\svchost.exe[1016] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\system32\svchost.exe[1016] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 002B0A08
.text C:\windows\system32\svchost.exe[1016] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 002B03FC
.text C:\windows\system32\svchost.exe[1016] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 002B0804
.text C:\windows\system32\svchost.exe[1016] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 002B01F8
.text C:\windows\system32\svchost.exe[1016] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 002B0600
.text C:\windows\system32\AUDIODG.EXE[1084] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\system32\svchost.exe[1124] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000603FC
.text C:\windows\system32\svchost.exe[1124] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000601F8
.text C:\windows\system32\svchost.exe[1124] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\system32\svchost.exe[1124] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00A90A08
.text C:\windows\system32\svchost.exe[1124] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 00A903FC
.text C:\windows\system32\svchost.exe[1124] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00A90804
.text C:\windows\system32\svchost.exe[1124] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 00A901F8
.text C:\windows\system32\svchost.exe[1124] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00A90600
.text c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe[1168] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000F03FC
.text c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe[1168] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000F01F8
.text c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe[1168] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe[1168] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 001A0A08
.text c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe[1168] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001A03FC
.text c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe[1168] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 001A0804
.text c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe[1168] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001A01F8
.text c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe[1168] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 001A0600
.text C:\windows\system32\svchost.exe[1220] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000603FC
.text C:\windows\system32\svchost.exe[1220] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000601F8
.text C:\windows\system32\svchost.exe[1220] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\AVAST Software\Avast\AvastSvc.exe[1316] kernel32.dll!SetUnhandledExceptionFilter 7565F4FB 4 Bytes [C2, 04, 00, 90] {RET 0x4; NOP }
.text C:\Program Files\AVAST Software\Avast\AvastSvc.exe[1316] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\Kodak\AiO\Center\EKAiOHostService.exe[1328] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001603FC
.text C:\Program Files\Kodak\AiO\Center\EKAiOHostService.exe[1328] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001601F8
.text C:\Program Files\Kodak\AiO\Center\EKAiOHostService.exe[1328] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\Kodak\AiO\Center\EKAiOHostService.exe[1328] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 001F0A08
.text C:\Program Files\Kodak\AiO\Center\EKAiOHostService.exe[1328] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001F03FC
.text C:\Program Files\Kodak\AiO\Center\EKAiOHostService.exe[1328] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 001F0804
.text C:\Program Files\Kodak\AiO\Center\EKAiOHostService.exe[1328] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001F01F8
.text C:\Program Files\Kodak\AiO\Center\EKAiOHostService.exe[1328] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 001F0600
.text C:\Program Files\SanDisk\SanDisk Media Manager\SanDiskMediaManager-Launcher.EXE[1640] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000703FC
.text C:\Program Files\SanDisk\SanDisk Media Manager\SanDiskMediaManager-Launcher.EXE[1640] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000701F8
.text C:\Program Files\SanDisk\SanDisk Media Manager\SanDiskMediaManager-Launcher.EXE[1640] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\SanDisk\SanDisk Media Manager\SanDiskMediaManager-Launcher.EXE[1640] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00190A08
.text C:\Program Files\SanDisk\SanDisk Media Manager\SanDiskMediaManager-Launcher.EXE[1640] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001903FC
.text C:\Program Files\SanDisk\SanDisk Media Manager\SanDiskMediaManager-Launcher.EXE[1640] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00190804
.text C:\Program Files\SanDisk\SanDisk Media Manager\SanDiskMediaManager-Launcher.EXE[1640] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001901F8
.text C:\Program Files\SanDisk\SanDisk Media Manager\SanDiskMediaManager-Launcher.EXE[1640] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00190600
.text C:\windows\System32\spoolsv.exe[1712] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000A03FC
.text C:\windows\System32\spoolsv.exe[1712] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000A01F8
.text C:\windows\System32\spoolsv.exe[1712] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\System32\spoolsv.exe[1712] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00140A08
.text C:\windows\System32\spoolsv.exe[1712] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001403FC
.text C:\windows\System32\spoolsv.exe[1712] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00140804
.text C:\windows\System32\spoolsv.exe[1712] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001401F8
.text C:\windows\System32\spoolsv.exe[1712] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00140600
.text c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[1764] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000E03FC
.text c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[1764] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000E01F8
.text c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[1764] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[1764] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00110A08
.text c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[1764] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001103FC
.text c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[1764] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00110804
.text c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[1764] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001101F8
.text c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[1764] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00110600
.text C:\windows\system32\wuauclt.exe[1784] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\SUPERAntiSpyware\SASCORE.EXE[1868] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000903FC
.text C:\Program Files\SUPERAntiSpyware\SASCORE.EXE[1868] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000901F8
.text C:\Program Files\SUPERAntiSpyware\SASCORE.EXE[1868] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\SUPERAntiSpyware\SASCORE.EXE[1868] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 001B0A08
.text C:\Program Files\SUPERAntiSpyware\SASCORE.EXE[1868] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001B03FC
.text C:\Program Files\SUPERAntiSpyware\SASCORE.EXE[1868] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 001B0804
.text C:\Program Files\SUPERAntiSpyware\SASCORE.EXE[1868] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001B01F8
.text C:\Program Files\SUPERAntiSpyware\SASCORE.EXE[1868] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 001B0600
.text C:\Program Files\IObit\Advanced SystemCare 4\ASCService.exe[1892] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001603FC
.text C:\Program Files\IObit\Advanced SystemCare 4\ASCService.exe[1892] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001601F8
.text C:\Program Files\IObit\Advanced SystemCare 4\ASCService.exe[1892] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\IObit\Advanced SystemCare 4\ASCService.exe[1892] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 001F0A08
.text C:\Program Files\IObit\Advanced SystemCare 4\ASCService.exe[1892] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001F03FC
.text C:\Program Files\IObit\Advanced SystemCare 4\ASCService.exe[1892] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 001F0804
.text C:\Program Files\IObit\Advanced SystemCare 4\ASCService.exe[1892] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001F01F8
.text C:\Program Files\IObit\Advanced SystemCare 4\ASCService.exe[1892] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 001F0600
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1928] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000603FC
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1928] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000601F8
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1928] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1928] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00100A08
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1928] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001003FC
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1928] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00100804
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1928] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001001F8
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1928] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00100600
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[1964] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001603FC
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[1964] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001601F8
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[1964] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[1964] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 001F0A08
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[1964] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001F03FC
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[1964] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 001F0804
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[1964] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001F01F8
.text C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE[1964] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 001F0600
.text C:\windows\system32\taskhost.exe[1992] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000503FC
.text C:\windows\system32\taskhost.exe[1992] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000501F8
.text C:\windows\system32\taskhost.exe[1992] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\system32\taskhost.exe[1992] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00220A08
.text C:\windows\system32\taskhost.exe[1992] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 002203FC
.text C:\windows\system32\taskhost.exe[1992] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00220804
.text C:\windows\system32\taskhost.exe[1992] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 002201F8
.text C:\windows\system32\taskhost.exe[1992] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00220600
.text C:\windows\system32\taskeng.exe[2012] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000603FC
.text C:\windows\system32\taskeng.exe[2012] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000601F8
.text C:\windows\system32\taskeng.exe[2012] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\system32\taskeng.exe[2012] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 000F0A08
.text C:\windows\system32\taskeng.exe[2012] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 000F03FC
.text C:\windows\system32\taskeng.exe[2012] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 000F0804
.text C:\windows\system32\taskeng.exe[2012] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 000F01F8
.text C:\windows\system32\taskeng.exe[2012] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 000F0600
.text C:\Program Files\Bonjour\mDNSResponder.exe[2040] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000603FC
.text C:\Program Files\Bonjour\mDNSResponder.exe[2040] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000601F8
.text C:\Program Files\Bonjour\mDNSResponder.exe[2040] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\Bonjour\mDNSResponder.exe[2040] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00190A08
.text C:\Program Files\Bonjour\mDNSResponder.exe[2040] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001903FC
.text C:\Program Files\Bonjour\mDNSResponder.exe[2040] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00190804
.text C:\Program Files\Bonjour\mDNSResponder.exe[2040] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001901F8
.text C:\Program Files\Bonjour\mDNSResponder.exe[2040] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00190600
.text C:\windows\system32\svchost.exe[2064] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000603FC
.text C:\windows\system32\svchost.exe[2064] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000601F8
.text C:\windows\system32\svchost.exe[2064] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Windows\system32\TODDSrv.exe[2092] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001603FC
.text C:\Windows\system32\TODDSrv.exe[2092] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001601F8
.text C:\Windows\system32\TODDSrv.exe[2092] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Windows\system32\TODDSrv.exe[2092] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 001F0A08
.text C:\Windows\system32\TODDSrv.exe[2092] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001F03FC
.text C:\Windows\system32\TODDSrv.exe[2092] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 001F0804
.text C:\Windows\system32\TODDSrv.exe[2092] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001F01F8
.text C:\Windows\system32\TODDSrv.exe[2092] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 001F0600
.text C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe[2168] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001603FC
.text C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe[2168] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001601F8
.text C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe[2168] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe[2168] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00230A08
.text C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe[2168] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 002303FC
.text C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe[2168] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00230804
.text C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe[2168] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 002301F8
.text C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe[2168] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00230600
.text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2280] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000603FC
.text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2280] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000601F8
.text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2280] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2280] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00100A08
.text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2280] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001003FC
.text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2280] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00100804
.text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2280] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001001F8
.text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2280] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00100600
.text C:\windows\system32\SearchIndexer.exe[2308] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000603FC
.text C:\windows\system32\SearchIndexer.exe[2308] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000601F8
.text C:\windows\system32\SearchIndexer.exe[2308] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\system32\SearchIndexer.exe[2308] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00100A08
.text C:\windows\system32\SearchIndexer.exe[2308] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001003FC
.text C:\windows\system32\SearchIndexer.exe[2308] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00100804
.text C:\windows\system32\SearchIndexer.exe[2308] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001001F8
.text C:\windows\system32\SearchIndexer.exe[2308] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00100600
.text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2348] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000603FC
.text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2348] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000601F8
.text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2348] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2348] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00100A08
.text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2348] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001003FC
.text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2348] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00100804
.text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2348] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001001F8
.text C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2348] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00100600
.text C:\windows\system32\SearchProtocolHost.exe[2500] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000503FC
.text C:\windows\system32\SearchProtocolHost.exe[2500] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000501F8
.text C:\windows\system32\SearchProtocolHost.exe[2500] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\system32\SearchProtocolHost.exe[2500] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00130A08
.text C:\windows\system32\SearchProtocolHost.exe[2500] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001303FC
.text C:\windows\system32\SearchProtocolHost.exe[2500] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00130804
.text C:\windows\system32\SearchProtocolHost.exe[2500] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001301F8
.text C:\windows\system32\SearchProtocolHost.exe[2500] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00130600
.text C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe[2884] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001603FC
.text C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe[2884] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001601F8
.text C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe[2884] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe[2884] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 002A0A08
.text C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe[2884] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 002A03FC
.text C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe[2884] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 002A0804
.text C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe[2884] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 002A01F8
.text C:\Program Files\TOSHIBA\ConfigFree\NDSTray.exe[2884] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 002A0600
.text C:\Windows\System32\igfxtray.exe[2912] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001603FC
.text C:\Windows\System32\igfxtray.exe[2912] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001601F8
.text C:\Windows\System32\igfxtray.exe[2912] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Windows\System32\igfxtray.exe[2912] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00190A08
.text C:\Windows\System32\igfxtray.exe[2912] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001903FC
.text C:\Windows\System32\igfxtray.exe[2912] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00190804
.text C:\Windows\System32\igfxtray.exe[2912] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001901F8
.text C:\Windows\System32\igfxtray.exe[2912] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00190600
.text C:\Windows\System32\hkcmd.exe[2920] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001603FC
.text C:\Windows\System32\hkcmd.exe[2920] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001601F8
.text C:\Windows\System32\hkcmd.exe[2920] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Windows\System32\hkcmd.exe[2920] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00190A08
.text C:\Windows\System32\hkcmd.exe[2920] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001903FC
.text C:\Windows\System32\hkcmd.exe[2920] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00190804
.text C:\Windows\System32\hkcmd.exe[2920] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001901F8
.text C:\Windows\System32\hkcmd.exe[2920] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00190600
.text C:\Windows\System32\igfxpers.exe[2928] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001603FC
.text C:\Windows\System32\igfxpers.exe[2928] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001601F8
.text C:\Windows\System32\igfxpers.exe[2928] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Windows\System32\igfxpers.exe[2928] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00300A08
.text C:\Windows\System32\igfxpers.exe[2928] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 003003FC
.text C:\Windows\System32\igfxpers.exe[2928] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00300804
.text C:\Windows\System32\igfxpers.exe[2928] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 003001F8
.text C:\Windows\System32\igfxpers.exe[2928] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00300600
.text C:\windows\system32\igfxsrvc.exe[3020] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001603FC
.text C:\windows\system32\igfxsrvc.exe[3020] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001601F8
.text C:\windows\system32\igfxsrvc.exe[3020] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\system32\igfxsrvc.exe[3020] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 002F0A08
.text C:\windows\system32\igfxsrvc.exe[3020] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 002F03FC
.text C:\windows\system32\igfxsrvc.exe[3020] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 002F0804
.text C:\windows\system32\igfxsrvc.exe[3020] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 002F01F8
.text C:\windows\system32\igfxsrvc.exe[3020] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 002F0600
.text C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe[3164] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001603FC
.text C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe[3164] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001601F8
.text C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe[3164] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe[3164] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00200A08
.text C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe[3164] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 002003FC
.text C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe[3164] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00200804
.text C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe[3164] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 002001F8
.text C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe[3164] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00200600
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3172] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001603FC
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3172] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001601F8
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3172] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3172] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 001F0A08
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3172] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001F03FC
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3172] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 001F0804
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3172] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001F01F8
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3172] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 001F0600
.text C:\Program Files\Windows Media Player\wmpnetwk.exe[3296] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000603FC
.text C:\Program Files\Windows Media Player\wmpnetwk.exe[3296] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000601F8
.text C:\Program Files\Windows Media Player\wmpnetwk.exe[3296] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\Windows Media Player\wmpnetwk.exe[3296] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00100A08
.text C:\Program Files\Windows Media Player\wmpnetwk.exe[3296] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001003FC
.text C:\Program Files\Windows Media Player\wmpnetwk.exe[3296] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00100804
.text C:\Program Files\Windows Media Player\wmpnetwk.exe[3296] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001001F8
.text C:\Program Files\Windows Media Player\wmpnetwk.exe[3296] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00100600
.text C:\windows\system32\igfxext.exe[3436] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001603FC
.text C:\windows\system32\igfxext.exe[3436] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001601F8
.text C:\windows\system32\igfxext.exe[3436] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\system32\igfxext.exe[3436] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 001F0A08
.text C:\windows\system32\igfxext.exe[3436] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001F03FC
.text C:\windows\system32\igfxext.exe[3436] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 001F0804
.text C:\windows\system32\igfxext.exe[3436] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001F01F8
.text C:\windows\system32\igfxext.exe[3436] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 001F0600
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[3576] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001603FC
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[3576] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001601F8
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[3576] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[3576] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 001F0A08
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[3576] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001F03FC
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[3576] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 001F0804
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[3576] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001F01F8
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[3576] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 001F0600
.text C:\Program Files\TOSHIBA\Utilities\KeNotify.exe[3584] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001603FC
.text C:\Program Files\TOSHIBA\Utilities\KeNotify.exe[3584] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001601F8
.text C:\Program Files\TOSHIBA\Utilities\KeNotify.exe[3584] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\TOSHIBA\Utilities\KeNotify.exe[3584] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 001F0A08
.text C:\Program Files\TOSHIBA\Utilities\KeNotify.exe[3584] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001F03FC
.text C:\Program Files\TOSHIBA\Utilities\KeNotify.exe[3584] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 001F0804
.text C:\Program Files\TOSHIBA\Utilities\KeNotify.exe[3584] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001F01F8
.text C:\Program Files\TOSHIBA\Utilities\KeNotify.exe[3584] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 001F0600
.text C:\Program Files\TOSHIBA\ConfigFree\CFSwMgr.exe[3596] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001603FC
.text C:\Program Files\TOSHIBA\ConfigFree\CFSwMgr.exe[3596] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001601F8
.text C:\Program Files\TOSHIBA\ConfigFree\CFSwMgr.exe[3596] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\TOSHIBA\ConfigFree\CFSwMgr.exe[3596] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00370A08
.text C:\Program Files\TOSHIBA\ConfigFree\CFSwMgr.exe[3596] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 003703FC
.text C:\Program Files\TOSHIBA\ConfigFree\CFSwMgr.exe[3596] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00370804
.text C:\Program Files\TOSHIBA\ConfigFree\CFSwMgr.exe[3596] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 003701F8
.text C:\Program Files\TOSHIBA\ConfigFree\CFSwMgr.exe[3596] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00370600
.text C:\Program Files\TOSHIBA\Power Saver\TPwrMain.exe[3604] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001603FC
.text C:\Program Files\TOSHIBA\Power Saver\TPwrMain.exe[3604] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001601F8
.text C:\Program Files\TOSHIBA\Power Saver\TPwrMain.exe[3604] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\TOSHIBA\Power Saver\TPwrMain.exe[3604] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00330A08
.text C:\Program Files\TOSHIBA\Power Saver\TPwrMain.exe[3604] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 003303FC
.text C:\Program Files\TOSHIBA\Power Saver\TPwrMain.exe[3604] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00330804
.text C:\Program Files\TOSHIBA\Power Saver\TPwrMain.exe[3604] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 003301F8
.text C:\Program Files\TOSHIBA\Power Saver\TPwrMain.exe[3604] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00330600
.text C:\Program Files\TOSHIBA\SmoothView\SmoothView.exe[3612] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001603FC
.text C:\Program Files\TOSHIBA\SmoothView\SmoothView.exe[3612] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001601F8
.text C:\Program Files\TOSHIBA\SmoothView\SmoothView.exe[3612] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\TOSHIBA\SmoothView\SmoothView.exe[3612] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 001F0A08
.text C:\Program Files\TOSHIBA\SmoothView\SmoothView.exe[3612] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001F03FC
.text C:\Program Files\TOSHIBA\SmoothView\SmoothView.exe[3612] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 001F0804
.text C:\Program Files\TOSHIBA\SmoothView\SmoothView.exe[3612] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001F01F8
.text C:\Program Files\TOSHIBA\SmoothView\SmoothView.exe[3612] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 001F0600
.text C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe[3624] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001603FC
.text C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe[3624] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001601F8
.text C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe[3624] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe[3624] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 001F0A08
.text C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe[3624] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001F03FC
.text C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe[3624] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 001F0804
.text C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe[3624] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001F01F8
.text C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe[3624] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 001F0600
.text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[3696] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001503FC
.text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[3696] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001501F8
.text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[3696] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[3696] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00280A08
.text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[3696] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 002803FC
.text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[3696] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00280804
.text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[3696] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 002801F8
.text C:\Program Files\Common Files\Real\Update_OB\realsched.exe[3696] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00280600
.text C:\windows\system32\SearchFilterHost.exe[3716] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\System32\svchost.exe[3732] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000A03FC
.text C:\windows\System32\svchost.exe[3732] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000A01F8
.text C:\windows\System32\svchost.exe[3732] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\System32\svchost.exe[3732] user32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00300A08
.text C:\windows\System32\svchost.exe[3732] user32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 003003FC
.text C:\windows\System32\svchost.exe[3732] user32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00300804
.text C:\windows\System32\svchost.exe[3732] user32.dll!SetWinEventHook 757924DC 5 Bytes JMP 003001F8
.text C:\windows\System32\svchost.exe[3732] user32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00300600
.text C:\Program Files\iTunes\iTunesHelper.exe[3740] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000603FC
.text C:\Program Files\iTunes\iTunesHelper.exe[3740] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000601F8
.text C:\Program Files\iTunes\iTunesHelper.exe[3740] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\iTunes\iTunesHelper.exe[3740] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00100A08
.text C:\Program Files\iTunes\iTunesHelper.exe[3740] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001003FC
.text C:\Program Files\iTunes\iTunesHelper.exe[3740] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00100804
.text C:\Program Files\iTunes\iTunesHelper.exe[3740] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001001F8
.text C:\Program Files\iTunes\iTunesHelper.exe[3740] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00100600
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3748] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001703FC
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3748] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001701F8
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3748] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3748] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00210A08
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3748] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 002103FC
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3748] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00210804
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3748] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 002101F8
.text C:\Program Files\Common Files\Java\Java Update\jusched.exe[3748] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00210600
.text C:\Program Files\DivX\DivX Update\DivXUpdate.exe[3756] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001703FC
.text C:\Program Files\DivX\DivX Update\DivXUpdate.exe[3756] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001701F8
.text C:\Program Files\DivX\DivX Update\DivXUpdate.exe[3756] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\DivX\DivX Update\DivXUpdate.exe[3756] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 00200A08
.text C:\Program Files\DivX\DivX Update\DivXUpdate.exe[3756] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 002003FC
.text C:\Program Files\DivX\DivX Update\DivXUpdate.exe[3756] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 00200804
.text C:\Program Files\DivX\DivX Update\DivXUpdate.exe[3756] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 002001F8
.text C:\Program Files\DivX\DivX Update\DivXUpdate.exe[3756] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 00200600
.text C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe[3768] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001603FC
.text C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe[3768] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001601F8
.text C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe[3768] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe[3768] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 001F0A08
.text C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe[3768] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001F03FC
.text C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe[3768] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 001F0804
.text C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe[3768] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001F01F8
.text C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe[3768] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 001F0600
.text C:\Program Files\AVAST Software\Avast\AvastUI.exe[3824] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3864] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 001603FC
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3864] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 001601F8
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3864] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3864] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 003E0A08
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3864] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 003E03FC
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3864] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 003E0804
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3864] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 003E01F8
.text C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe[3864] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 003E0600
.text C:\windows\system32\svchost.exe[3884] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000603FC
.text C:\windows\system32\svchost.exe[3884] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000601F8
.text C:\windows\system32\svchost.exe[3884] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\system32\svchost.exe[3884] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 005D0A08
.text C:\windows\system32\svchost.exe[3884] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 005D03FC
.text C:\windows\system32\svchost.exe[3884] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 005D0804
.text C:\windows\system32\svchost.exe[3884] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 005D01F8
.text C:\windows\system32\svchost.exe[3884] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 005D0600
.text C:\Program Files\iPod\bin\iPodService.exe[4012] ntdll.dll!LdrUnloadDll 7713C8DE 5 Bytes JMP 000603FC
.text C:\Program Files\iPod\bin\iPodService.exe[4012] ntdll.dll!LdrLoadDll 771422B8 5 Bytes JMP 000601F8
.text C:\Program Files\iPod\bin\iPodService.exe[4012] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\iPod\bin\iPodService.exe[4012] USER32.dll!UnhookWindowsHookEx 7578ADF9 5 Bytes JMP 001D0A08
.text C:\Program Files\iPod\bin\iPodService.exe[4012] USER32.dll!UnhookWinEvent 7578B750 5 Bytes JMP 001D03FC
.text C:\Program Files\iPod\bin\iPodService.exe[4012] USER32.dll!SetWindowsHookExW 7578E30C 5 Bytes JMP 001D0804
.text C:\Program Files\iPod\bin\iPodService.exe[4012] USER32.dll!SetWinEventHook 757924DC 5 Bytes JMP 001D01F8
.text C:\Program Files\iPod\bin\iPodService.exe[4012] USER32.dll!SetWindowsHookExA 757B6D0C 5 Bytes JMP 001D0600
.text C:\Program Files\TOSHIBA\TOSHIBA Service Station\TMachInfo.exe[4736] KERNEL32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\windows\system32\ctfmon.exe[4748] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Users\Rebecca\Desktop\y4gzkq1z.exe[5308] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\TOSHIBA\ConfigFree\CFIWmxSvcs.exe[5380] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe[5432] kernel32.dll!GetBinaryTypeW + 70 756769F4 1 Byte [62]
.text ...

---- User IAT/EAT - GMER 1.0.15 ----

IAT c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe[1168] @ C:\windows\system32\ADVAPI32.dll [KERNEL32.dll!GetProcAddress] [750FFFF6] C:\windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe[1168] @ C:\windows\system32\USER32.dll [KERNEL32.dll!GetProcAddress] [750FFFF6] C:\windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe[1168] @ C:\windows\system32\GDI32.dll [KERNEL32.dll!GetProcAddress] [750FFFF6] C:\windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe[1168] @ C:\windows\system32\CRYPT32.dll [KERNEL32.dll!GetProcAddress] [750FFFF6] C:\windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe[1168] @ C:\windows\system32\Secur32.dll [KERNEL32.dll!GetProcAddress] [750FFFF6] C:\windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe[1168] @ C:\windows\system32\SHLWAPI.dll [KERNEL32.dll!GetProcAddress] [750FFFF6] C:\windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT c:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe[1168] @ C:\windows\system32\ole32.dll [ntdll.dll!EtwRegisterTraceGuidsW] [6DE7B0C6] C:\windows\AppPatch\AcXtrnal.dll (Windows Compatibility DLL/Microsoft Corporation)
IAT C:\Program Files\SanDisk\SanDisk Media Manager\SanDiskMediaManager-Launcher.EXE[1640] @ C:\windows\system32\USER32.dll [KERNEL32.dll!GetProcAddress] [750FFFF6] C:\windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Program Files\SanDisk\SanDisk Media Manager\SanDiskMediaManager-Launcher.EXE[1640] @ C:\windows\system32\GDI32.dll [KERNEL32.dll!GetProcAddress] [750FFFF6] C:\windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Program Files\SanDisk\SanDisk Media Manager\SanDiskMediaManager-Launcher.EXE[1640] @ C:\windows\system32\ADVAPI32.dll [KERNEL32.dll!GetProcAddress] [750FFFF6] C:\windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Program Files\SanDisk\SanDisk Media Manager\SanDiskMediaManager-Launcher.EXE[1640] @ C:\windows\system32\SHLWAPI.dll [KERNEL32.dll!GetProcAddress] [750FFFF6] C:\windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe[3768] @ C:\windows\system32\USER32.dll [KERNEL32.dll!GetProcAddress] [750FFFF6] C:\windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe[3768] @ C:\windows\system32\GDI32.dll [KERNEL32.dll!GetProcAddress] [750FFFF6] C:\windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe[3768] @ C:\windows\system32\ADVAPI32.dll [KERNEL32.dll!GetProcAddress] [750FFFF6] C:\windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)
IAT C:\Program Files\Common Files\InstallShield\UpdateService\issch.exe[3768] @ C:\windows\system32\SHLWAPI.dll [KERNEL32.dll!GetProcAddress] [750FFFF6] C:\windows\system32\apphelp.dll (Application Compatibility Client Library/Microsoft Corporation)

---- Devices - GMER 1.0.15 ----

Device \FileSystem\Ntfs \Ntfs aswSP.SYS (avast! self protection module/AVAST Software)

AttachedDevice \Driver\kbdclass \Device\KeyboardClass0 Wdf01000.sys (Kernel Mode Driver Framework Runtime/Microsoft Corporation)
AttachedDevice \Driver\kbdclass \Device\KeyboardClass1 Wdf01000.sys (Kernel Mode Driver Framework Runtime/Microsoft Corporation)
AttachedDevice \Driver\tdx \Device\Tcp aswTdi.SYS (avast! TDI Filter Driver/AVAST Software)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume1 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume2 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice \Driver\volmgr \Device\HarddiskVolume3 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)

Device \Driver\ACPI_HAL \Device\0000004b halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation)

AttachedDevice \Driver\tdx \Device\Udp aswTdi.SYS (avast! TDI Filter Driver/AVAST Software)

---- Registry - GMER 1.0.15 ----

Reg HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{442B1232-D5FA-A70D-86C4-CA1423821DEF}
Reg HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{442B1232-D5FA-A70D-86C4-CA1423821DEF}@habjibanlikepnlj 0x69 0x61 0x6F 0x63 ...

---- Files - GMER 1.0.15 ----

File C:\Windows\$NtUninstallKB10486$\3420769641 0 bytes
File C:\Windows\$NtUninstallKB10486$\3775646205 0 bytes
File C:\Windows\$NtUninstallKB10486$\3775646205\@ 2048 bytes
File C:\Windows\$NtUninstallKB10486$\3775646205\bckfg.tmp 764 bytes
File C:\Windows\$NtUninstallKB10486$\3775646205\cfg.ini 199 bytes
File C:\Windows\$NtUninstallKB10486$\3775646205\Desktop.ini 4608 bytes
File C:\Windows\$NtUninstallKB10486$\3775646205\keywords 189 bytes
File C:\Windows\$NtUninstallKB10486$\3775646205\kwrd.dll 223744 bytes
File C:\Windows\$NtUninstallKB10486$\3775646205\L 0 bytes
File C:\Windows\$NtUninstallKB10486$\3775646205\L\xadqgnnk 108544 bytes
File C:\Windows\$NtUninstallKB10486$\3775646205\lsflt7.ver 5176 bytes
File C:\Windows\$NtUninstallKB10486$\3775646205\U 0 bytes
File C:\Windows\$NtUninstallKB10486$\3775646205\U\00000001.@ 1536 bytes
File C:\Windows\$NtUninstallKB10486$\3775646205\U\00000002.@ 224768 bytes
File C:\Windows\$NtUninstallKB10486$\3775646205\U\00000004.@ 1024 bytes
File C:\Windows\$NtUninstallKB10486$\3775646205\U\80000000.@ 1024 bytes
File C:\Windows\$NtUninstallKB10486$\3775646205\U\80000004.@ 12800 bytes
File C:\Windows\$NtUninstallKB10486$\3775646205\U\80000032.@ 98304 bytes

---- EOF - GMER 1.0.15 ----

#4 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,756 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:18 AM

Posted 29 November 2011 - 12:27 AM

Download aswMBR to your desktop.
Double click the aswMBR.exe to run it.
If you see this question: Would you like to download latest Avast! virus definitions?" say "Yes".
Click the "Scan" button to start scan:
Posted Image

On completion of the scan click "Save log", save it to your desktop and post in your next reply:
Posted Image

NOTE. aswMBR will create MBR.dat file on your desktop. This is a copy of your MBR. Do NOT delete it.

My Website

My help doesn't cost a penny, but if you'd like to consider a donation, click DONATE

 


#5 BeccaLee

BeccaLee
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:05:18 AM

Posted 29 November 2011 - 11:02 PM

Sorry to reply to you so late - I pulled a long shift today. I'm pasting in the C scan of aswMBR - once again, thank you so much for all of your help.

aswMBR version 0.9.8.986 Copyright© 2011 AVAST Software
Run date: 2011-11-29 21:06:30
-----------------------------
21:06:30.465 OS Version: Windows 6.1.7601 Service Pack 1
21:06:30.465 Number of processors: 1 586 0x170A
21:06:30.468 ComputerName: REBECCABKUP UserName: Rebecca
21:06:39.371 Initialize success
21:06:39.556 AVAST engine defs: 11112902
21:07:18.204 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1
21:07:18.207 Disk 0 Vendor: Hitachi_ FBEO Size: 238475MB BusType: 3
21:07:18.222 Disk 0 MBR read successfully
21:07:18.227 Disk 0 MBR scan
21:07:18.259 Disk 0 Windows VISTA default MBR code
21:07:18.264 Disk 0 scanning sectors +488396800
21:07:18.386 Disk 0 scanning C:\windows\system32\drivers
21:07:29.357 Service scanning
21:07:30.670 Modules scanning
21:07:50.434 Disk 0 trace - called modules:
21:07:50.466 ntkrnlpa.exe CLASSPNP.SYS disk.sys iaStor.sys halmacpi.dll
21:07:50.470 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x851c2460]
21:07:50.475 3 CLASSPNP.SYS[88dc459e] -> nt!IofCallDriver -> \Device\Ide\IAAStorageDevice-1[0x85aa1028]
21:07:51.916 AVAST engine scan C:\
22:59:46.667 Scan finished successfully
23:01:05.278 Disk 0 MBR has been saved successfully to "C:\Users\Rebecca\Desktop\MBR.dat"
23:01:05.300 The log file has been saved successfully to "C:\Users\Rebecca\Desktop\aswMBR.txt"

#6 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,756 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:18 AM

Posted 29 November 2011 - 11:06 PM

That looks good.

You have "hosts" file missing and we need to recreate it.

Open Notepad.
Paste the following text into it:

# Copyright © 1993-2006 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host

# localhost name resolution is handle within DNS itself.
# 127.0.0.1 localhost
# ::1 localhost

Go File>Save As and...

1. Name the file hosts. (no extension; make sure there is just a "dot" at the end <--- VERY IMPORTANT!)
2. Make sure, "Save as type:" is set to "All Files (*.*)
3. File is saved to C:\WINDOWS\SYSTEM32\DRIVERS\ETC folder

Posted Image


=================================================================

Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2

64-bit users go HERE
  • Double-click SystemLook.exe to run it.
  • Vista\Win 7 users:: Right click on SystemLook.exe, click Run As Administrator
  • Copy the content of the following box into the main textfield:
    :dir
    C:\WINDOWS\SYSTEM32\DRIVERS\ETC
    
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.
Note: The log can also be found on your Desktop entitled SystemLook.txt

My Website

My help doesn't cost a penny, but if you'd like to consider a donation, click DONATE

 


#7 BeccaLee

BeccaLee
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:05:18 AM

Posted 30 November 2011 - 08:49 PM

I think I did everything correctly. Had a little trouble getting the hosts file in, but I think it went okay. :) Here's the log:

SystemLook 30.07.11 by jpshortstuff
Log created at 20:47 on 30/11/2011 by Rebecca
Administrator - Elevation successful

========== dir ==========

C:\WINDOWS\SYSTEM32\DRIVERS\ETC - Parameters: "(none)"

---Files---
hosts --a---- 762 bytes [01:40 01/12/2011] [01:40 01/12/2011]
lmhosts.sam --a---- 3683 bytes [02:05 14/07/2009] [21:39 10/06/2009]
networks --a---- 407 bytes [02:04 14/07/2009] [21:39 10/06/2009]
protocol --a---- 1358 bytes [02:04 14/07/2009] [21:39 10/06/2009]
services --a---- 17463 bytes [02:04 14/07/2009] [21:39 10/06/2009]

---Folders---
None found.

-= EOF =-

#8 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,756 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:18 AM

Posted 30 November 2011 - 09:15 PM

Good job :)

How is computer doing?

Download Temp File Cleaner (TFC)
Double click on TFC.exe to run the program.
Click on Start button to begin cleaning process.
TFC will close all running programs, and it may ask you to restart computer.

=============================================================================

Please run a free online scan with the ESET Online Scanner

  • Disable your antivirus program
  • Tick the box next to YES, I accept the Terms of Use
  • Click Start
  • Accept any security warnings from your browser.
  • Check Scan archives
  • Click Start
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click on List of found threats
  • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
    NOTE. If Eset doesn't find any threats it'll NOT produce any log.

My Website

My help doesn't cost a penny, but if you'd like to consider a donation, click DONATE

 


#9 BeccaLee

BeccaLee
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:05:18 AM

Posted 01 December 2011 - 12:01 AM

The computer has been doing pretty good - I think it's only been a bit slow because I haven't really stopped running scans since this whole thing began! LOL

I ran the Temp File Cleaner you linked just fine, but ESET found one threat (I had previously downloaded Temp File Cleaner from Cnet):

C:\Users\Rebecca\Downloads\cnet_TempFileCleaner_3_1_1_Setup_exe.exe a variant of Win32/InstallCore.D application

Once again - I really appreciate all the time you're taking with me! I was pretty concerned about the system after warnings like that.

#10 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,756 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:18 AM

Posted 01 December 2011 - 12:09 AM

Update Adobe Flash Player
Download the Latest Adobe Flash for Firefox and IE Without Any Extras: http://www.404techsupport.com/2010/04/27/download-the-latest-adobe-flash-for-firefox-and-ie-without-any-extras/

=====================================================

1. Update your Java version here: http://www.java.com/en/download/installed.jsp

Note 1: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update.

Note 2: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. If you don't want to run another extra service, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and restart your computer.

2. Now, we need to remove old Java version and its remnants...

Download JavaRa to your desktop and unzip it to its own folder
  • Run JavaRa.exe (Vista users! Right click on JavaRa.exe, click Run As Administrator), pick the language of your choice and click Select. Then click Remove Older Versions.
  • Accept any prompts.

=====================================================================

Your computer is clean Posted Image

1. We need to reset system restore to prevent your computer from being accidentally reinfected by using some old restore point(s). We'll remove all old restore points and create fresh, clean restore point.

Turn system restore off.
Restart computer.
Turn system restore back on.

If you don't know how to do it...
Windows XP: http://support.microsoft.com/kb/310405
Vista and Windows 7: http://www.howtogeek.com/howto/windows-vista/disable-system-restore-in-windows-vista/

2. Make sure, Windows Updates are current.

3. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

4. Run Malwarebytes "Quick scan" once in a while to assure safety of your computer.

5. Run Temporary File Cleaner (TFC) weekly.

6. Download and install Secunia Personal Software Inspector (PSI): http://secunia.com/vulnerability_scanning/personal/. The Secunia PSI is a FREE security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Run it weekly.

7. (optional) If you want to keep all your programs up to date, download and install FileHippo Update Checker.
The Update Checker will scan your computer for installed software, check the versions and then send this information to FileHippo.com to see if there are any newer releases.

8. When installing\updating ANY program, make sure you always select "Custom " installation, so you can UN-check any possible "drive-by-install" (foistware), like toolbars etc., which may try to install along with the legitimate program. Do NOT click "Next" button without looking at any given page.

9. Read How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html

10. Except for MBAM and TFC, which are keepers you can simply delete all other tools we used as they don't install.

My Website

My help doesn't cost a penny, but if you'd like to consider a donation, click DONATE

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users