Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Google Keeps Redirecting; "Most Likely A Torrent Infection"


  • This topic is locked This topic is locked
17 replies to this topic

#1 ~Polky

~Polky

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Behind the screen
  • Local time:02:09 PM

Posted 27 June 2012 - 09:29 PM

Original Post
Hello there. I'm not crazy, it really is real. Boopme believes me, and he told me to come over here and give you all DDS and GMER logs.


DDS (Ver_2011-08-26.01) - NTFSx86
Internet Explorer: 9.0.8112.16421
Run by Elizabeth at 20:54:18 on 2012-06-27
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.1976.714 [GMT -4:00]
.
AV: avast! Antivirus *Disabled/Updated* {2B2D1395-420B-D5C9-657E-930FE358FC3C}
SP: avast! Antivirus *Disabled/Updated* {904CF271-6431-DA47-5FCE-A87D98DFB681}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ===============
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\PROGRA~1\ENIGMA~1\SPYHUN~1\SH4SER~1.EXE
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k secsvcs
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Program Files\AVAST Software\Avast\AvastSvc.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe
C:\Program Files\Belkin\Router Setup and Monitor\BelkinService.exe
C:\Windows\system32\agrsmsvc.exe
C:\Program Files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe
C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe
C:\Program Files\Acer\Empowering Technology\Service\ETService.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe
C:\Acer\Mobility Center\MobilityService.exe
C:\Program Files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe
C:\Program Files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe
C:\Windows\system32\svchost.exe -k imgsvc
C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesService32.exe
C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe
C:\Program Files\Western Digital\WD SmartWare\Front Parlor\WDFME\WDFME.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesApp32.exe
C:\Program Files\Western Digital\WD SmartWare\Front Parlor\WDSC.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\System32\Drivers\WTSRV.EXE
C:\Windows\system32\taskeng.exe
C:\Windows\system32\WTClient.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\wbem\unsecapp.exe
C:\Program Files\Windows Defender\MSASCui.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Windows\RtHDVCpl.exe
C:\Windows\PLFSetI.exe
C:\Windows\system32\igfxsrvc.exe
C:\Program Files\Launch Manager\LManager.exe
C:\Program Files\Acer\Empowering Technology\ePower\ePower_DMC.exe
C:\Program Files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe
C:\Windows\System32\hkcmd.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files\AVAST Software\Avast\AvastUI.exe
C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe
C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe
C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe
C:\Program Files\Logitech\SetPoint\SetPoint.exe
C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe
C:\Windows\system32\RunDll32.exe
C:\Windows\system32\igfxext.exe
C:\Windows\system32\igfxsrvc.exe
C:\Users\Elizabeth\AppData\Local\Digsby\App\lib\digsby-app.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Windows\system32\wbem\unsecapp.exe
C:\Program Files\HP\HP Deskjet 3050A J611 series\bin\HPNetworkCommunicator.exe
C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe
C:\Users\ELIZAB~1\AppData\Local\Temp\RtkBtMnt.exe
C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
C:\Program Files\Belkin\Router Setup and Monitor\BelkinSetup.exe
C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\HPNetworkCommunicator.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe
C:\Program Files\Common Files\Microsoft Shared\Ink\InputPersonalization.exe
C:\Windows\system32\Macromed\Flash\FlashUtil32_11_3_300_257_ActiveX.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Users\Elizabeth\Desktop\Defogger.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Windows\system32\ctfmon.exe
C:\Windows\system32\NOTEPAD.EXE
C:\Windows\system32\NOTEPAD.EXE
C:\Windows\system32\DllHost.exe
C:\Windows\system32\DllHost.exe
C:\Windows\system32\wbem\wmiprvse.exe
.
============== Pseudo HJT Report ===============
.
uSearch Bar = Preserve
uStart Page = about:blank
mStart Page = hxxp://homepage.acer.com/rdr.aspx?b=ACAW&l=0409&s=2&o=vp32&d=0109&m=aspire_5335
mDefault_Page_URL = hxxp://homepage.acer.com/rdr.aspx?b=ACAW&l=0409&s=2&o=vp32&d=0109&m=aspire_5335
uInternet Settings,ProxyOverride = 127.0.0.1:9421;<local>
mSearchAssistant =
BHO: Adobe PDF Link Helper: {18df081c-e8ad-4283-a596-fa578c2ebdc3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Groove GFS Browser Helper: {72853161-30c5-4d22-b7f9-0bbc1d38a37e} - c:\progra~1\micros~2\office12\GRA8E1~1.DLL
BHO: ShowBarObj Class: {83a2f9b1-01a2-4aa5-87d1-45b6b8505e96} - c:\program files\acer\empowering technology\edatasecurity\x86\ActiveToolBand.dll
BHO: avast! WebRep: {8e5e2654-ad2d-48bf-ac2d-d17f00898d06} - c:\program files\avast software\avast\aswWebRepIE.dll
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
TB: Acer eDataSecurity Management: {5cbe3b7c-1e47-477e-a7dd-396db0476e29} - c:\program files\acer\empowering technology\edatasecurity\x86\eDStoolbar.dll
TB: {CCC7A320-B3CA-4199-B1A6-9F516DD69829} - No File
TB: {9D425283-D487-4337-BAB6-AB8354A81457} - No File
TB: avast! WebRep: {8e5e2654-ad2d-48bf-ac2d-d17f00898d06} - c:\program files\avast software\avast\aswWebRepIE.dll
uRun: [Akamai NetSession Interface] "c:\users\elizabeth\appdata\local\akamai\netsession_win.exe"
uRun: [HP Deskjet 3050A J611 series (NET)] "c:\program files\hp\hp deskjet 3050a j611 series\bin\ScanToPCActivationApp.exe" -deviceID "CN2225401P05PJ:NW" -scfn "HP

Deskjet 3050A J611 series (NET)" -AutoStart 1
uRun: [Messenger (Yahoo!)] "c:\progra~1\yahoo!\messenger\YahooMessenger.exe" -quiet
mRun: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide
mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
mRun: [RtHDVCpl] RtHDVCpl.exe
mRun: [Skytel] Skytel.exe
mRun: [PLFSetI] c:\windows\PLFSetI.exe
mRun: [LManager] c:\progra~1\launch~1\LManager.exe
mRun: [ePower_DMC] c:\program files\acer\empowering technology\epower\ePower_DMC.exe
mRun: [Acer Assist Launcher] c:\program files\acer\acer assist\launcher.exe
mRun: [InstaLAN] "c:\program files\belkin\router setup and monitor\BelkinRouterMonitor.exe" startup
mRun: [WTClient] WTClient.exe
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
mRun: [SwitchBoard] c:\program files\common files\adobe\switchboard\SwitchBoard.exe
mRun: [avast] "c:\program files\avast software\avast\avastUI.exe" /nogui
mRun: [<NO NAME>]
mRun: [LogitechQuickCamRibbon] "c:\program files\logitech\logitech webcam software\LWS.exe" /hide
mRunOnce: [AvgUninstallURL] cmd.exe /c start http://www.avg.com/ww.special-uninstallation-feedback-appf?

lic=NFVWSzItQUxZTUYtU0xLTFUtQVoyVUItNkdPS0ItSkhGTkg"&"inst=NzctNjA3MTkwNTg3LUZQOSs2LU4xRisxLVRCOSsyLUZMKzktRjEwTSs1LVFJWDErNC1YMjAxMCsyLUYxME0xMEQrMS1MSUMrNzctRkwxMCsxL

VNQMSsxLVNVRCsxLVMxSSsxLVNVMysxLVRVRysz"&"prod=90"&"ver=10.0.1375
StartupFolder: c:\users\elizab~1\appdata\roaming\micros~1\windows\startm~1\programs\startup\digsby.lnk - c:\users\elizabeth\appdata\local\digsby\app\digsby.exe
StartupFolder: c:\users\elizab~1\appdata\roaming\micros~1\windows\startm~1\programs\startup\monito~1.lnk - c:\windows\system32\RunDll32.exe
StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\logite~1.lnk - c:\program files\logitech\setpoint\SetPoint.exe
StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\wddmst~1.lnk - c:\program files\western digital\wd smartware\wd drive manager\WDDMStatus.exe
mPolicies-explorer: BindDirectlyToPropertySetStorage = 0 (0x0)
mPolicies-system: EnableUIADesktopToggle = 0 (0x0)
IE: {76c5fb99-dd0a-4186-9e75-65d1bf3da283} - c:\program files\amazon\add to wish list ie extension\run.htm
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\progra~1\micros~2\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~2\office12\REFIEBAR.DLL
DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} - hxxp://appldnld.apple.com.edgesuite.net/content.info.apple.com/QuickTime/qtactivex/qtplugin.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
TCP: DhcpNameServer = 192.168.2.1
TCP: Interfaces\{3FFC07D0-A938-4E03-BC99-10A5A8340DCC} : DhcpNameServer = 192.168.2.1
TCP: Interfaces\{EDCAE727-03C4-4396-BEC4-4F28B8CD0EE9} : DhcpNameServer = 192.168.2.1
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\progra~1\micros~2\office12\GR99D3~1.DLL
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\progra~1\common~1\skype\SKYPE4~1.DLL
Notify: igfxcui - igfxdev.dll
SEH: Groove GFS Stub Execution Hook: {b5a7f190-dda6-4420-b3ba-52453494e6cd} - c:\progra~1\micros~2\office12\GRA8E1~1.DLL
Hosts: 127.0.0.1 www.spywareinfo.com
.
============= SERVICES / DRIVERS ===============
.
R1 aswSnx;aswSnx;c:\windows\system32\drivers\aswSnx.sys [2011-6-2 612184]
R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [2011-6-2 337880]
R2 AdobeARMservice;Adobe Acrobat Update Service;c:\program files\common files\adobe\arm\1.0\armsvc.exe [2012-4-4 63928]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2011-6-2 20696]
R2 aswMonFlt;aswMonFlt;c:\windows\system32\drivers\aswMonFlt.sys [2011-6-2 57688]
R2 avast! Antivirus;avast! Antivirus;c:\program files\avast software\avast\AvastSvc.exe [2011-6-2 44768]
R2 BUNAgentSvc;NTI Backup Now 5 Agent Service;c:\program files\newtech infosystems\nti backup now 5\client\Agentsvc.exe [2008-3-3 16384]
R2 ETService;Empowering Technology Service;c:\program files\acer\empowering technology\service\ETService.exe [2008-4-30 24576]
R2 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-1-20 21504]
R2 NTIBackupSvc;NTI Backup Now 5 Backup Service;c:\program files\newtech infosystems\nti backup now 5\BackupSvc.exe [2008-4-7 50424]
R2 NTISchedulerSvc;NTI Backup Now 5 Scheduler Service;c:\program files\newtech infosystems\nti backup now 5\SchedulerSvc.exe [2008-4-4 131072]
R2 SpyHunter 4 Service;SpyHunter 4 Service;c:\progra~1\enigma~1\spyhun~1\SH4SER~1.EXE [2012-6-2 763840]
R2 TuneUp.UtilitiesSvc;TuneUp Utilities Service;c:\program files\tuneup utilities 2010\TuneUpUtilitiesService32.exe [2011-11-15 1052480]
R2 WDDMService;WDDMService;c:\program files\western digital\wd smartware\wd drive manager\WDDMService.exe [2011-3-9 238592]
R2 WDFME;WD File Management Engine;c:\program files\western digital\wd smartware\front parlor\wdfme\WDFME.exe [2011-3-9 1060864]
R2 WDSC;WD File Management Shadow Engine;c:\program files\western digital\wd smartware\front parlor\WDSC.exe [2011-3-9 484352]
R3 netr28;Ralink 802.11n Wireless Driver for Windows Vista;c:\windows\system32\drivers\netr28.sys [2009-8-3 569856]
R3 PTSimBus;PenTablet Bus Enumerator;c:\windows\system32\drivers\PTSimBus.sys [2007-6-7 18944]
R3 TuneUpUtilitiesDrv;TuneUpUtilitiesDrv;c:\program files\tuneup utilities 2010\TuneUpUtilitiesDriver32.sys [2009-10-14 10064]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 gupdate1ca2f89daf62d40;Google Update Service (gupdate1ca2f89daf62d40);c:\program files\google\update\GoogleUpdate.exe [2009-9-7 133104]
S2 SkypeUpdate;Skype Updater;c:\program files\skype\updater\Updater.exe [2012-2-29 158856]
S3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\b57nd60x.sys [2008-1-20 179712]
S3 esgiguard;esgiguard;c:\program files\enigma software group\spyhunter\esgiguard.sys [2011-5-6 13904]
S3 gupdatem;Google Update Service (gupdatem);c:\program files\google\update\GoogleUpdate.exe [2009-9-7 133104]
S3 npggsvc;nProtect GameGuard Service;c:\windows\system32\gamemon.des -service --> c:\windows\system32\GameMon.des -service [?]
S3 PTSimHid;PenTablet Simulated HID MiniDriver;c:\windows\system32\drivers\PTSimHid.sys [2007-4-23 10752]
S3 SCREAMINGBDRIVER;Screaming Bee Audio;c:\windows\system32\drivers\ScreamingBAudio.sys [2009-12-1 34384]
S3 SwitchBoard;Adobe SwitchBoard;c:\program files\common files\adobe\switchboard\SwitchBoard.exe [2010-2-19 517096]
S3 WDC_SAM;WD SCSI Pass Thru driver;c:\windows\system32\drivers\wdcsam.sys [2011-2-16 11520]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2010-3-18 753504]
.
=============== Created Last 30 ================
.
2012-06-27 05:18:25 -------- d-----w- c:\program files\ESET
2012-06-27 04:16:05 -------- dc----w- C:\TDSSKiller_Quarantine
2012-06-27 00:12:00 6762896 ----a-w- c:\programdata\microsoft\windows defender\definition updates\{0e30e822-b181-4352-b0fa-a8259f95641c}\mpengine.dll
2012-06-24 21:18:44 110080 ----a-r- c:\users\elizabeth\appdata\roaming\microsoft\installer\{9e897d0f-f804-41a3-966c-7bb6eb5b6be8}\IconF7A21AF7.exe
2012-06-24 21:18:44 110080 ----a-r- c:\users\elizabeth\appdata\roaming\microsoft\installer\{9e897d0f-f804-41a3-966c-7bb6eb5b6be8}\IconD7F16134.exe
2012-06-24 21:18:44 110080 ----a-r- c:\users\elizabeth\appdata\roaming\microsoft\installer\{9e897d0f-f804-41a3-966c-7bb6eb5b6be8}\IconCF33A0CE.exe
2012-06-24 21:18:40 -------- dc----w- C:\sh4ldr
2012-06-24 21:18:40 -------- d-----w- c:\program files\Enigma Software Group
2012-06-24 21:00:06 -------- d-----w- c:\program files\HitmanPro
2012-06-24 20:58:48 -------- d-----w- c:\programdata\HitmanPro
2012-06-23 04:35:12 -------- d-----w- c:\users\elizabeth\.thumbnails
2012-06-23 04:30:00 -------- d-----w- c:\users\elizabeth\appdata\local\fontconfig
2012-06-23 04:29:55 -------- d-----w- c:\users\elizabeth\appdata\local\gegl-0.2
2012-06-23 04:29:55 -------- d-----w- c:\users\elizabeth\.gimp-2.8
2012-06-23 04:22:52 -------- d-----w- c:\program files\GIMP 2
2012-06-22 01:51:22 -------- d-----w- c:\users\elizabeth\appdata\local\AutoWikiBrowser
2012-06-21 23:08:59 2422272 ----a-w- c:\windows\system32\wucltux.dll
2012-06-21 23:08:27 88576 ----a-w- c:\windows\system32\wudriver.dll
2012-06-21 23:08:06 33792 ----a-w- c:\windows\system32\wuapp.exe
2012-06-21 23:08:06 171904 ----a-w- c:\windows\system32\wuwebv.dll
2012-06-13 03:19:59 984064 ----a-w- c:\windows\system32\crypt32.dll
2012-06-13 03:19:59 133120 ----a-w- c:\windows\system32\cryptsvc.dll
2012-06-13 03:19:58 98304 ----a-w- c:\windows\system32\cryptnet.dll
2012-06-13 03:19:31 180736 ----a-w- c:\windows\system32\drivers\rdpwd.sys
2012-06-13 03:19:28 2045440 ----a-w- c:\windows\system32\win32k.sys
2012-06-11 23:50:50 -------- d-----w- c:\program files\Outspark
2012-06-09 02:32:10 -------- d-----w- c:\program files\Amazon
.
==================== Find3M ====================
.
2012-06-12 02:54:15 70344 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2012-06-12 02:54:15 426184 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2012-05-17 22:45:37 1800192 ----a-w- c:\windows\system32\jscript9.dll
2012-05-17 22:35:47 1129472 ----a-w- c:\windows\system32\wininet.dll
2012-05-17 22:35:39 1427968 ----a-w- c:\windows\system32\inetcpl.cpl
2012-05-17 22:29:45 142848 ----a-w- c:\windows\system32\ieUnatt.exe
2012-05-17 22:24:45 2382848 ----a-w- c:\windows\system32\mshtml.tlb
2012-04-03 08:16:12 3602816 ----a-w- c:\windows\system32\ntkrnlpa.exe
2012-04-03 08:16:11 3550080 ----a-w- c:\windows\system32\ntoskrnl.exe
2012-03-30 12:39:11 905600 ----a-w- c:\windows\system32\drivers\tcpip.sys
.
============= FINISH: 20:54:41.74 ===============

Attached Files


Edited by ~Polky, 27 June 2012 - 09:32 PM.


BC AdBot (Login to Remove)

 


#2 ~Polky

~Polky
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Behind the screen
  • Local time:02:09 PM

Posted 27 June 2012 - 09:31 PM

GMER 1.0.15.15641 - http://www.gmer.net
Rootkit scan 2012-06-27 22:26:02
Windows 6.0.6002 Service Pack 2 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-0 Hitachi_HTS543216L9A300 rev.FB2OC40C
Running: gmer.exe; Driver: C:\Users\ELIZAB~1\AppData\Local\Temp\pxlirfow.sys


---- System - GMER 1.0.15 ----

SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwAddBootEntry [0x9DC6ADF8]
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ZwAllocateVirtualMemory [0x9E73BA5A]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwAssignProcessToJobObject [0x9DC6B85E]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateEvent [0x9DC702E4]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateEventPair [0x9DC70330]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateIoCompletion [0x9DC70422]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateMutant [0x9DC70252]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateSection [0x9DC70374]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateSemaphore [0x9DC7029A]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateTimer [0x9DC703DC]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwDeleteBootEntry [0x9DC6AE44]
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ZwFreeVirtualMemory [0x9E73BB34]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwLoadDriver [0x9DC6AAD6]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwModifyBootEntry [0x9DC6AE90]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwNotifyChangeKey [0x9DC6DD1C]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwNotifyChangeMultipleKeys [0x9DC6BB02]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenEvent [0x9DC7030E]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenEventPair [0x9DC70352]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenIoCompletion [0x9DC70446]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenMutant [0x9DC70278]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenSection [0x9DC703AE]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenSemaphore [0x9DC702C2]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenTimer [0x9DC70400]
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ZwProtectVirtualMemory [0x9E73BCA0]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwQueryObject [0x9DC6B9CE]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwSetBootEntryOrder [0x9DC6AEDC]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwSetBootOptions [0x9DC6AF28]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwSetSystemInformation [0x9DC6AB46]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwSetSystemPowerState [0x9DC6ACEA]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwShutdownSystem [0x9DC6AC92]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwSystemDebugControl [0x9DC6AD5A]
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ZwTerminateProcess [0x9E73BD60]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwVdmControl [0x9DC6AF74]
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ZwWriteVirtualMemory [0x9E73BBE0]

Code \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ZwCreateProcessEx [0x9E751D92]
Code \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ObInsertObject
Code \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ObMakeTemporaryObject

---- Kernel code sections - GMER 1.0.15 ----

.text ntkrnlpa.exe!KeSetEvent + 10D 836B07D0 4 Bytes [F8, AD, C6, 9D]
.text ntkrnlpa.exe!KeSetEvent + 131 836B07F4 4 Bytes [5A, BA, 73, 9E]
.text ntkrnlpa.exe!KeSetEvent + 191 836B0854 4 Bytes [5E, B8, C6, 9D]
.text ntkrnlpa.exe!KeSetEvent + 1D1 836B0894 8 Bytes [E4, 02, C7, 9D, 30, 03, C7, ...]
.text ntkrnlpa.exe!KeSetEvent + 1DD 836B08A0 4 Bytes [22, 04, C7, 9D] {AND AL, [EDI+EAX*8]; POPF }
.text ...
PAGE ntkrnlpa.exe!ObMakeTemporaryObject 837DB62F 5 Bytes JMP 9E74EC8C \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)
PAGE ntkrnlpa.exe!ObInsertObject 83834543 5 Bytes JMP 9E75074C \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)
PAGE ntkrnlpa.exe!ZwReplyWaitReceivePortEx + 110 8383DE68 4 Bytes CALL 9DC6C1B5 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
PAGE ntkrnlpa.exe!ZwAlpcSendWaitReceivePort + 121 83841ADC 4 Bytes CALL 9DC6C1CB \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
PAGE ntkrnlpa.exe!ZwCreateProcessEx 83895DF6 7 Bytes JMP 9E751D96 \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)
? C:\Users\ELIZAB~1\AppData\Local\Temp\mbr.sys The system cannot find the file specified. !

---- User code sections - GMER 1.0.15 ----

.text C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe[220] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe[220] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe[220] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe[220] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001803FC
.text C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe[220] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00180600
.text C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe[220] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00181014
.text C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe[220] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00180804
.text C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe[220] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00180A08
.text C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe[220] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00180C0C
.text C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe[220] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00180E10
.text C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe[220] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001801F8
.text C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe[220] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00190600
.text C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe[220] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00190804
.text C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe[220] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00190A08
.text C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe[220] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001901F8
.text C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe[220] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001903FC
.text C:\Program Files\Acer\Empowering Technology\Service\ETService.exe[496] KERNEL32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\csrss.exe[556] KERNEL32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Common Files\LightScribe\LSSrvc.exe[592] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Program Files\Common Files\LightScribe\LSSrvc.exe[592] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Program Files\Common Files\LightScribe\LSSrvc.exe[592] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Common Files\LightScribe\LSSrvc.exe[592] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00190600
.text C:\Program Files\Common Files\LightScribe\LSSrvc.exe[592] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00190804
.text C:\Program Files\Common Files\LightScribe\LSSrvc.exe[592] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00190A08
.text C:\Program Files\Common Files\LightScribe\LSSrvc.exe[592] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001901F8
.text C:\Program Files\Common Files\LightScribe\LSSrvc.exe[592] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001903FC
.text C:\Program Files\Common Files\LightScribe\LSSrvc.exe[592] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001A03FC
.text C:\Program Files\Common Files\LightScribe\LSSrvc.exe[592] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 001A0600
.text C:\Program Files\Common Files\LightScribe\LSSrvc.exe[592] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 001A1014
.text C:\Program Files\Common Files\LightScribe\LSSrvc.exe[592] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 001A0804
.text C:\Program Files\Common Files\LightScribe\LSSrvc.exe[592] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 001A0A08
.text C:\Program Files\Common Files\LightScribe\LSSrvc.exe[592] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 001A0C0C
.text C:\Program Files\Common Files\LightScribe\LSSrvc.exe[592] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 001A0E10
.text C:\Program Files\Common Files\LightScribe\LSSrvc.exe[592] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001A01F8
.text C:\Windows\system32\wininit.exe[596] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000301F8
.text C:\Windows\system32\wininit.exe[596] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000303FC
.text C:\Windows\system32\wininit.exe[596] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\wininit.exe[596] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000503FC
.text C:\Windows\system32\wininit.exe[596] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00050600
.text C:\Windows\system32\wininit.exe[596] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00051014
.text C:\Windows\system32\wininit.exe[596] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00050804
.text C:\Windows\system32\wininit.exe[596] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00050A08
.text C:\Windows\system32\wininit.exe[596] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00050C0C
.text C:\Windows\system32\wininit.exe[596] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00050E10
.text C:\Windows\system32\wininit.exe[596] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000501F8
.text C:\Windows\system32\wininit.exe[596] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00060600
.text C:\Windows\system32\wininit.exe[596] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00060804
.text C:\Windows\system32\wininit.exe[596] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00060A08
.text C:\Windows\system32\wininit.exe[596] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000601F8
.text C:\Windows\system32\wininit.exe[596] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000603FC
.text C:\Windows\system32\csrss.exe[604] KERNEL32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\winlogon.exe[636] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000301F8
.text C:\Windows\system32\winlogon.exe[636] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000303FC
.text C:\Windows\system32\winlogon.exe[636] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\winlogon.exe[636] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000503FC
.text C:\Windows\system32\winlogon.exe[636] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00050600
.text C:\Windows\system32\winlogon.exe[636] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00051014
.text C:\Windows\system32\winlogon.exe[636] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00050804
.text C:\Windows\system32\winlogon.exe[636] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00050A08
.text C:\Windows\system32\winlogon.exe[636] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00050C0C
.text C:\Windows\system32\winlogon.exe[636] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00050E10
.text C:\Windows\system32\winlogon.exe[636] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000501F8
.text C:\Windows\system32\winlogon.exe[636] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00060600
.text C:\Windows\system32\winlogon.exe[636] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00060804
.text C:\Windows\system32\winlogon.exe[636] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00060A08
.text C:\Windows\system32\winlogon.exe[636] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000601F8
.text C:\Windows\system32\winlogon.exe[636] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000603FC
.text C:\Windows\system32\services.exe[684] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\system32\services.exe[684] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\system32\services.exe[684] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\services.exe[684] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\services.exe[684] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\services.exe[684] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\services.exe[684] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\services.exe[684] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\services.exe[684] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\services.exe[684] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\services.exe[684] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\services.exe[684] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00080600
.text C:\Windows\system32\services.exe[684] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00080804
.text C:\Windows\system32\services.exe[684] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00080A08
.text C:\Windows\system32\services.exe[684] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000801F8
.text C:\Windows\system32\services.exe[684] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000803FC
.text C:\Windows\system32\lsass.exe[700] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\system32\lsass.exe[700] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\system32\lsass.exe[700] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\lsass.exe[700] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\lsass.exe[700] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\lsass.exe[700] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\lsass.exe[700] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\lsass.exe[700] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\lsass.exe[700] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\lsass.exe[700] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\lsass.exe[700] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\lsass.exe[700] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00080600
.text C:\Windows\system32\lsass.exe[700] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00080804
.text C:\Windows\system32\lsass.exe[700] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00080A08
.text C:\Windows\system32\lsass.exe[700] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000801F8
.text C:\Windows\system32\lsass.exe[700] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000803FC
.text C:\Windows\system32\lsm.exe[708] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\system32\lsm.exe[708] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\system32\lsm.exe[708] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\lsm.exe[708] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\lsm.exe[708] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\lsm.exe[708] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\lsm.exe[708] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\lsm.exe[708] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\lsm.exe[708] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\lsm.exe[708] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\lsm.exe[708] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Program Files\AVAST Software\Avast\AvastUI.exe[748] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe[816] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe[816] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe[816] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe[816] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001703FC
.text C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe[816] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00170600
.text C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe[816] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00171014
.text C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe[816] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00170804
.text C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe[816] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00170A08
.text C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe[816] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00170C0C
.text C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe[816] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00170E10
.text C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe[816] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001701F8
.text C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe[816] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00190600
.text C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe[816] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00190804
.text C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe[816] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00190A08
.text C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe[816] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001901F8
.text C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe[816] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001903FC
.text C:\Windows\system32\svchost.exe[872] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\system32\svchost.exe[872] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\system32\svchost.exe[872] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\svchost.exe[872] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\svchost.exe[872] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\svchost.exe[872] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\svchost.exe[872] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\svchost.exe[872] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\svchost.exe[872] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\svchost.exe[872] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\svchost.exe[872] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\svchost.exe[872] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00110600
.text C:\Windows\system32\svchost.exe[872] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00110804
.text C:\Windows\system32\svchost.exe[872] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00110A08
.text C:\Windows\system32\svchost.exe[872] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001101F8
.text C:\Windows\system32\svchost.exe[872] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001103FC
.text C:\PROGRA~1\ENIGMA~1\SPYHUN~1\SH4SER~1.EXE[956] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\PROGRA~1\ENIGMA~1\SPYHUN~1\SH4SER~1.EXE[956] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\PROGRA~1\ENIGMA~1\SPYHUN~1\SH4SER~1.EXE[956] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\PROGRA~1\ENIGMA~1\SPYHUN~1\SH4SER~1.EXE[956] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\PROGRA~1\ENIGMA~1\SPYHUN~1\SH4SER~1.EXE[956] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\PROGRA~1\ENIGMA~1\SPYHUN~1\SH4SER~1.EXE[956] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\PROGRA~1\ENIGMA~1\SPYHUN~1\SH4SER~1.EXE[956] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\PROGRA~1\ENIGMA~1\SPYHUN~1\SH4SER~1.EXE[956] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\PROGRA~1\ENIGMA~1\SPYHUN~1\SH4SER~1.EXE[956] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\PROGRA~1\ENIGMA~1\SPYHUN~1\SH4SER~1.EXE[956] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\PROGRA~1\ENIGMA~1\SPYHUN~1\SH4SER~1.EXE[956] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\PROGRA~1\ENIGMA~1\SPYHUN~1\SH4SER~1.EXE[956] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00180600
.text C:\PROGRA~1\ENIGMA~1\SPYHUN~1\SH4SER~1.EXE[956] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00180804
.text C:\PROGRA~1\ENIGMA~1\SPYHUN~1\SH4SER~1.EXE[956] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00180A08
.text C:\PROGRA~1\ENIGMA~1\SPYHUN~1\SH4SER~1.EXE[956] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001801F8
.text C:\PROGRA~1\ENIGMA~1\SPYHUN~1\SH4SER~1.EXE[956] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001803FC
.text C:\Windows\system32\svchost.exe[980] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\system32\svchost.exe[980] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\system32\svchost.exe[980] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\svchost.exe[980] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\svchost.exe[980] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\svchost.exe[980] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\svchost.exe[980] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\svchost.exe[980] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\svchost.exe[980] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\svchost.exe[980] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\svchost.exe[980] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\svchost.exe[980] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00140600
.text C:\Windows\system32\svchost.exe[980] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00140804
.text C:\Windows\system32\svchost.exe[980] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00140A08
.text C:\Windows\system32\svchost.exe[980] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001401F8
.text C:\Windows\system32\svchost.exe[980] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001403FC
.text C:\Windows\System32\svchost.exe[1016] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\System32\svchost.exe[1016] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\System32\svchost.exe[1016] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\System32\svchost.exe[1016] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\System32\svchost.exe[1016] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\System32\svchost.exe[1016] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\System32\svchost.exe[1016] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\System32\svchost.exe[1016] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\System32\svchost.exe[1016] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\System32\svchost.exe[1016] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\System32\svchost.exe[1016] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Windows\System32\svchost.exe[1016] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00120600
.text C:\Windows\System32\svchost.exe[1016] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00120804
.text C:\Windows\System32\svchost.exe[1016] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00120A08
.text C:\Windows\System32\svchost.exe[1016] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001201F8
.text C:\Windows\System32\svchost.exe[1016] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001203FC
.text C:\Windows\System32\svchost.exe[1136] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\System32\svchost.exe[1136] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\System32\svchost.exe[1136] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\System32\svchost.exe[1136] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\System32\svchost.exe[1136] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\System32\svchost.exe[1136] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\System32\svchost.exe[1136] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\System32\svchost.exe[1136] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\System32\svchost.exe[1136] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\System32\svchost.exe[1136] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\System32\svchost.exe[1136] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Windows\System32\svchost.exe[1136] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00150600
.text C:\Windows\System32\svchost.exe[1136] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00150804
.text C:\Windows\System32\svchost.exe[1136] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00150A08
.text C:\Windows\System32\svchost.exe[1136] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001501F8
.text C:\Windows\System32\svchost.exe[1136] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001503FC
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe[1152] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe[1152] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe[1152] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe[1152] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00070600
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe[1152] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00070804
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe[1152] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00070A08
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe[1152] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000701F8
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe[1152] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000703FC
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe[1152] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000903FC
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe[1152] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00090600
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe[1152] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00091014
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe[1152] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00090804
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe[1152] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00090A08
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe[1152] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00090C0C
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe[1152] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00090E10
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe[1152] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000901F8
.text C:\Acer\Mobility Center\MobilityService.exe[1160] KERNEL32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\System32\svchost.exe[1172] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\System32\svchost.exe[1172] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\System32\svchost.exe[1172] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\System32\svchost.exe[1172] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\System32\svchost.exe[1172] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\System32\svchost.exe[1172] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\System32\svchost.exe[1172] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\System32\svchost.exe[1172] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\System32\svchost.exe[1172] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\System32\svchost.exe[1172] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\System32\svchost.exe[1172] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Windows\System32\svchost.exe[1172] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00530600
.text C:\Windows\System32\svchost.exe[1172] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00530804
.text C:\Windows\System32\svchost.exe[1172] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00530A08
.text C:\Windows\System32\svchost.exe[1172] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 005301F8
.text C:\Windows\System32\svchost.exe[1172] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 005303FC
.text C:\Windows\system32\svchost.exe[1184] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\system32\svchost.exe[1184] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\system32\svchost.exe[1184] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\svchost.exe[1184] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\svchost.exe[1184] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\svchost.exe[1184] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\svchost.exe[1184] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\svchost.exe[1184] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\svchost.exe[1184] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\svchost.exe[1184] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\svchost.exe[1184] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\svchost.exe[1184] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00150600
.text C:\Windows\system32\svchost.exe[1184] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00150804
.text C:\Windows\system32\svchost.exe[1184] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00150A08
.text C:\Windows\system32\svchost.exe[1184] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001501F8
.text C:\Windows\system32\svchost.exe[1184] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001503FC
.text C:\Windows\system32\AUDIODG.EXE[1248] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\svchost.exe[1284] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\system32\svchost.exe[1284] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\system32\svchost.exe[1284] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\svchost.exe[1284] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\svchost.exe[1284] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\svchost.exe[1284] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\svchost.exe[1284] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\svchost.exe[1284] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\svchost.exe[1284] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\svchost.exe[1284] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\svchost.exe[1284] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\svchost.exe[1328] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\system32\svchost.exe[1328] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\system32\svchost.exe[1328] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\svchost.exe[1328] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\svchost.exe[1328] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\svchost.exe[1328] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\svchost.exe[1328] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\svchost.exe[1328] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\svchost.exe[1328] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\svchost.exe[1328] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\svchost.exe[1328] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\svchost.exe[1328] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 004E0600
.text C:\Windows\system32\svchost.exe[1328] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 004E0804
.text C:\Windows\system32\svchost.exe[1328] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 004E0A08
.text C:\Windows\system32\svchost.exe[1328] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 004E01F8
.text C:\Windows\system32\svchost.exe[1328] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 004E03FC
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe[1404] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe[1404] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe[1404] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe[1404] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001703FC
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe[1404] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00170600
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe[1404] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00171014
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe[1404] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00170804
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe[1404] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00170A08
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe[1404] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00170C0C
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe[1404] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00170E10
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe[1404] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001701F8
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe[1404] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00180600
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe[1404] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00180804
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe[1404] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00180A08
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe[1404] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001801F8
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe[1404] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001803FC
.text C:\Windows\system32\svchost.exe[1452] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\system32\svchost.exe[1452] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\system32\svchost.exe[1452] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\svchost.exe[1452] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\svchost.exe[1452] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\svchost.exe[1452] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\svchost.exe[1452] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\svchost.exe[1452] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\svchost.exe[1452] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\svchost.exe[1452] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\svchost.exe[1452] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\svchost.exe[1452] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 000B0600
.text C:\Windows\system32\svchost.exe[1452] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 000B0804
.text C:\Windows\system32\svchost.exe[1452] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 000B0A08
.text C:\Windows\system32\svchost.exe[1452] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000B01F8
.text C:\Windows\system32\svchost.exe[1452] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000B03FC
.text C:\Program Files\AVAST Software\Avast\AvastSvc.exe[1656] kernel32.dll!SetUnhandledExceptionFilter 76DEA8C5 4 Bytes [C2, 04, 00, 90] {RET 0x4; NOP }
.text C:\Program Files\AVAST Software\Avast\AvastSvc.exe[1656] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\System32\spoolsv.exe[1740] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\System32\spoolsv.exe[1740] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\System32\spoolsv.exe[1740] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\System32\spoolsv.exe[1740] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\System32\spoolsv.exe[1740] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\System32\spoolsv.exe[1740] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\System32\spoolsv.exe[1740] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\System32\spoolsv.exe[1740] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\System32\spoolsv.exe[1740] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\System32\spoolsv.exe[1740] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\System32\spoolsv.exe[1740] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Windows\System32\spoolsv.exe[1740] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 000E0600
.text C:\Windows\System32\spoolsv.exe[1740] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 000E0804
.text C:\Windows\System32\spoolsv.exe[1740] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 000E0A08
.text C:\Windows\System32\spoolsv.exe[1740] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000E01F8
.text C:\Windows\System32\spoolsv.exe[1740] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000E03FC
.text C:\Windows\system32\svchost.exe[1776] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\system32\svchost.exe[1776] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\system32\svchost.exe[1776] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\svchost.exe[1776] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\svchost.exe[1776] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\svchost.exe[1776] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\svchost.exe[1776] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\svchost.exe[1776] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\svchost.exe[1776] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\svchost.exe[1776] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\svchost.exe[1776] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\svchost.exe[1776] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 000F0600
.text C:\Windows\system32\svchost.exe[1776] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 000F0804
.text C:\Windows\system32\svchost.exe[1776] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 000F0A08
.text C:\Windows\system32\svchost.exe[1776] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000F01F8
.text C:\Windows\system32\svchost.exe[1776] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000F03FC
.text C:\Windows\system32\svchost.exe[1800] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\system32\svchost.exe[1800] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\system32\svchost.exe[1800] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\svchost.exe[1800] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\svchost.exe[1800] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\svchost.exe[1800] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\svchost.exe[1800] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\svchost.exe[1800] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\svchost.exe[1800] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\svchost.exe[1800] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\svchost.exe[1800] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[1824] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001401F8
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[1824] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001403FC
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[1824] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[1824] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00160600
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[1824] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00160804
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[1824] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00160A08
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[1824] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001601F8
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[1824] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001603FC
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[1824] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001703FC
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[1824] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00170600
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[1824] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00171014
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[1824] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00170804
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[1824] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00170A08
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[1824] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00170C0C
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[1824] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00170E10
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[1824] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001701F8
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[1868] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[1868] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[1868] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[1868] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 001E0600
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[1868] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 001E0804
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[1868] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 001E0A08
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[1868] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001E01F8
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[1868] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001E03FC
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[1868] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001F03FC
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[1868] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 001F0600
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[1868] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 001F1014
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[1868] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 001F0804
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[1868] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 001F0A08
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[1868] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 001F0C0C
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[1868] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 001F0E10
.text C:\Program Files\Logitech\SetPoint\SetPoint.exe[1868] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001F01F8
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe[1900] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001401F8
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe[1900] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001403FC
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe[1900] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe[1900] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00280600
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe[1900] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00280804
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe[1900] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00280A08
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe[1900] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 002801F8
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe[1900] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 002803FC
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe[1900] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 002903FC
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe[1900] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00290600
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe[1900] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00291014
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe[1900] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00290804
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe[1900] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00290A08
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe[1900] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00290C0C
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe[1900] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00290E10
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe[1900] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 002901F8
.text C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe[1944] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000601F8
.text C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe[1944] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000603FC
.text C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe[1944] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe[1944] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00070600
.text C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe[1944] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00070804
.text C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe[1944] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00070A08
.text C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe[1944] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000701F8
.text C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe[1944] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000703FC
.text C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe[1944] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000803FC
.text C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe[1944] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00080600
.text C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe[1944] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00081014
.text C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe[1944] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00080804
.text C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe[1944] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00080A08
.text C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe[1944] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00080C0C
.text C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe[1944] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00080E10
.text C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe[1944] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000801F8
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinService.exe[1968] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinService.exe[1968] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinService.exe[1968] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinService.exe[1968] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001C03FC
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinService.exe[1968] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 001C0600
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinService.exe[1968] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 001C1014
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinService.exe[1968] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 001C0804
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinService.exe[1968] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 001C0A08
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinService.exe[1968] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 001C0C0C
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinService.exe[1968] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 001C0E10
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinService.exe[1968] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001C01F8
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinService.exe[1968] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 001D0600
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinService.exe[1968] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 001D0804
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinService.exe[1968] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 001D0A08
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinService.exe[1968] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001D01F8
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinService.exe[1968] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001D03FC
.text C:\Windows\system32\agrsmsvc.exe[1992] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000801F8
.text C:\Windows\system32\agrsmsvc.exe[1992] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000803FC
.text C:\Windows\system32\agrsmsvc.exe[1992] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\agrsmsvc.exe[1992] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000A03FC
.text C:\Windows\system32\agrsmsvc.exe[1992] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 000A0600
.text C:\Windows\system32\agrsmsvc.exe[1992] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 000A1014
.text C:\Windows\system32\agrsmsvc.exe[1992] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 000A0804
.text C:\Windows\system32\agrsmsvc.exe[1992] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 000A0A08
.text C:\Windows\system32\agrsmsvc.exe[1992] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 000A0C0C
.text C:\Windows\system32\agrsmsvc.exe[1992] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 000A0E10
.text C:\Windows\system32\agrsmsvc.exe[1992] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000A01F8
.text C:\Windows\system32\agrsmsvc.exe[1992] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 000B0600
.text C:\Windows\system32\agrsmsvc.exe[1992] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 000B0804
.text C:\Windows\system32\agrsmsvc.exe[1992] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 000B0A08
.text C:\Windows\system32\agrsmsvc.exe[1992] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000B01F8
.text C:\Windows\system32\agrsmsvc.exe[1992] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000B03FC
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe[2032] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001401F8
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe[2032] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001403FC
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe[2032] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe[2032] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 002603FC
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe[2032] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00260600
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe[2032] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00261014
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe[2032] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00260804
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe[2032] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00260A08
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe[2032] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00260C0C
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe[2032] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00260E10
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe[2032] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 002601F8
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe[2032] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00270600
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe[2032] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00270804
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe[2032] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00270A08
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe[2032] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 002701F8
.text C:\Program Files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe[2032] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 002703FC
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesService32.exe[2080] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesService32.exe[2080] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesService32.exe[2080] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesService32.exe[2080] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00070600
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesService32.exe[2080] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00070804
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesService32.exe[2080] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00070A08
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesService32.exe[2080] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000701F8
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesService32.exe[2080] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000703FC
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesService32.exe[2080] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000803FC
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesService32.exe[2080] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00080600
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesService32.exe[2080] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00081014
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesService32.exe[2080] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00080804
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesService32.exe[2080] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00080A08
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesService32.exe[2080] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00080C0C
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesService32.exe[2080] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00080E10
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesService32.exe[2080] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000801F8
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[2108] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001401F8
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[2108] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001403FC
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[2108] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[2108] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00160600
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[2108] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00160804
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[2108] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00160A08
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[2108] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001601F8
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[2108] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001603FC
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[2108] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001703FC
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[2108] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00170600
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[2108] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00171014
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[2108] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00170804
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[2108] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00170A08
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[2108] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00170C0C
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[2108] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00170E10
.text C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe[2108] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001701F8
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe[2128] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe[2128] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe[2128] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe[2128] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00070600
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe[2128] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00070804
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe[2128] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00070A08
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe[2128] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000701F8
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe[2128] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000703FC
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe[2128] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000803FC
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe[2128] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00080600
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe[2128] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00081014
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe[2128] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00080804
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe[2128] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00080A08
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe[2128] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00080C0C
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe[2128] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00080E10
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe[2128] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000801F8
.text C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe[2168] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe[2168] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe[2168] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe[2168] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00180600
.text C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe[2168] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00180804
.text C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe[2168] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00180A08
.text C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe[2168] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001801F8
.text C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe[2168] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001803FC
.text C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe[2168] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001903FC
.text C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe[2168] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00190600
.text C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe[2168] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00191014
.text C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe[2168] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00190804
.text C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe[2168] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00190A08
.text C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe[2168] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00190C0C
.text C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe[2168] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00190E10
.text C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe[2168] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001901F8
.text C:\Program Files\Western Digital\WD SmartWare\Front Parlor\WDFME\WDFME.exe[2180] KERNEL32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\Macromed\Flash\FlashUtil32_11_3_300_257_ActiveX.exe[2388] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000601F8
.text C:\Windows\system32\Macromed\Flash\FlashUtil32_11_3_300_257_ActiveX.exe[2388] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000603FC
.text C:\Windows\system32\Macromed\Flash\FlashUtil32_11_3_300_257_ActiveX.exe[2388] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\Macromed\Flash\FlashUtil32_11_3_300_257_ActiveX.exe[2388] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00070600
.text C:\Windows\system32\Macromed\Flash\FlashUtil32_11_3_300_257_ActiveX.exe[2388] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00070804
.text C:\Windows\system32\Macromed\Flash\FlashUtil32_11_3_300_257_ActiveX.exe[2388] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00070A08
.text C:\Windows\system32\Macromed\Flash\FlashUtil32_11_3_300_257_ActiveX.exe[2388] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000701F8
.text C:\Windows\system32\Macromed\Flash\FlashUtil32_11_3_300_257_ActiveX.exe[2388] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000703FC
.text C:\Windows\system32\Macromed\Flash\FlashUtil32_11_3_300_257_ActiveX.exe[2388] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000803FC
.text C:\Windows\system32\Macromed\Flash\FlashUtil32_11_3_300_257_ActiveX.exe[2388] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00080600
.text C:\Windows\system32\Macromed\Flash\FlashUtil32_11_3_300_257_ActiveX.exe[2388] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00081014
.text C:\Windows\system32\Macromed\Flash\FlashUtil32_11_3_300_257_ActiveX.exe[2388] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00080804
.text C:\Windows\system32\Macromed\Flash\FlashUtil32_11_3_300_257_ActiveX.exe[2388] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00080A08
.text C:\Windows\system32\Macromed\Flash\FlashUtil32_11_3_300_257_ActiveX.exe[2388] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00080C0C
.text C:\Windows\system32\Macromed\Flash\FlashUtil32_11_3_300_257_ActiveX.exe[2388] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00080E10
.text C:\Windows\system32\Macromed\Flash\FlashUtil32_11_3_300_257_ActiveX.exe[2388] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000801F8
.text C:\Windows\system32\RunDll32.exe[2408] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000601F8
.text C:\Windows\system32\RunDll32.exe[2408] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000603FC
.text C:\Windows\system32\RunDll32.exe[2408] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\RunDll32.exe[2408] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00070600
.text C:\Windows\system32\RunDll32.exe[2408] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00070804
.text C:\Windows\system32\RunDll32.exe[2408] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00070A08
.text C:\Windows\system32\RunDll32.exe[2408] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000701F8
.text C:\Windows\system32\RunDll32.exe[2408] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000703FC
.text C:\Windows\system32\RunDll32.exe[2408] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000803FC
.text C:\Windows\system32\RunDll32.exe[2408] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00080600
.text C:\Windows\system32\RunDll32.exe[2408] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00081014
.text C:\Windows\system32\RunDll32.exe[2408] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00080804
.text C:\Windows\system32\RunDll32.exe[2408] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00080A08
.text C:\Windows\system32\RunDll32.exe[2408] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00080C0C
.text C:\Windows\system32\RunDll32.exe[2408] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00080E10
.text C:\Windows\system32\RunDll32.exe[2408] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000801F8
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe[2472] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe[2472] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe[2472] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe[2472] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001803FC
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe[2472] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00180600
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe[2472] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00181014
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe[2472] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00180804
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe[2472] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00180A08
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe[2472] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00180C0C
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe[2472] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00180E10
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe[2472] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001801F8
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe[2472] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00190600
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe[2472] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00190804
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe[2472] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00190A08
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe[2472] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001901F8
.text C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe[2472] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001903FC
.text C:\Windows\system32\taskeng.exe[2476] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\system32\taskeng.exe[2476] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\system32\taskeng.exe[2476] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\taskeng.exe[2476] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\taskeng.exe[2476] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\taskeng.exe[2476] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\taskeng.exe[2476] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\taskeng.exe[2476] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\taskeng.exe[2476] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\taskeng.exe[2476] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\taskeng.exe[2476] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\taskeng.exe[2476] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00080600
.text C:\Windows\system32\taskeng.exe[2476] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00080804
.text C:\Windows\system32\taskeng.exe[2476] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00080A08
.text C:\Windows\system32\taskeng.exe[2476] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000801F8
.text C:\Windows\system32\taskeng.exe[2476] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000803FC
.text C:\Windows\system32\wbem\unsecapp.exe[2496] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\system32\wbem\unsecapp.exe[2496] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\system32\wbem\unsecapp.exe[2496] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\wbem\unsecapp.exe[2496] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\wbem\unsecapp.exe[2496] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\wbem\unsecapp.exe[2496] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\wbem\unsecapp.exe[2496] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\wbem\unsecapp.exe[2496] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\wbem\unsecapp.exe[2496] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\wbem\unsecapp.exe[2496] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\wbem\unsecapp.exe[2496] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\wbem\unsecapp.exe[2496] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00080600
.text C:\Windows\system32\wbem\unsecapp.exe[2496] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00080804
.text C:\Windows\system32\wbem\unsecapp.exe[2496] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00080A08
.text C:\Windows\system32\wbem\unsecapp.exe[2496] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000801F8
.text C:\Windows\system32\wbem\unsecapp.exe[2496] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000803FC
.text C:\Windows\system32\Dwm.exe[2544] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\system32\Dwm.exe[2544] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\system32\Dwm.exe[2544] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\Dwm.exe[2544] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\Dwm.exe[2544] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\Dwm.exe[2544] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\Dwm.exe[2544] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\Dwm.exe[2544] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\Dwm.exe[2544] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\Dwm.exe[2544] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\Dwm.exe[2544] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\Dwm.exe[2544] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00080600
.text C:\Windows\system32\Dwm.exe[2544] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00080804
.text C:\Windows\system32\Dwm.exe[2544] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00080A08
.text C:\Windows\system32\Dwm.exe[2544] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000801F8
.text C:\Windows\system32\Dwm.exe[2544] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000803FC
.text C:\Windows\Explorer.EXE[2552] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\Explorer.EXE[2552] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\Explorer.EXE[2552] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\Explorer.EXE[2552] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\Explorer.EXE[2552] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\Explorer.EXE[2552] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\Explorer.EXE[2552] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\Explorer.EXE[2552] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\Explorer.EXE[2552] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\Explorer.EXE[2552] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\Explorer.EXE[2552] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Windows\Explorer.EXE[2552] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00080600
.text C:\Windows\Explorer.EXE[2552] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00080804
.text C:\Windows\Explorer.EXE[2552] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00080A08
.text C:\Windows\Explorer.EXE[2552] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000801F8
.text C:\Windows\Explorer.EXE[2552] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000803FC
.text C:\Windows\Explorer.EXE[2552] SHELL32.dll!SHGetFolderPathAndSubDirW + 81C5 75CCB37C 4 Bytes [00, 26, 00, 10] {ADD [ESI], AH; ADD [EAX], DL}
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000401F8
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000403FC
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] kernel32.dll!CreateThread 76E0CB2E 5 Bytes JMP 6A6675CB C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 009603FC
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00960600
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00961014
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00960804
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00960A08
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00960C0C
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00960E10
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 009601F8
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00970600
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!CreateDialogParamW 772272A2 5 Bytes JMP 6A7F90F0 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!GetAsyncKeyState 7722863C 5 Bytes JMP 6A64DEAD C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 6A6A25AC C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!CallNextHookEx 77228E3B 5 Bytes JMP 6A6C7FDF C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 6A6EECE0 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 009701F8
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 009703FC
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!EnableWindow 7722CD8B 5 Bytes JMP 6A6A9EAC C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!DefWindowProcA 7722DB88 7 Bytes JMP 6A6697F5 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!CreateWindowExA 7722DC2A 5 Bytes JMP 6A67362B C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!CreateWindowExW 77231305 5 Bytes JMP 6A6D03B7 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!GetKeyState 77238CB1 5 Bytes JMP 6A64DD87 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!DefWindowProcW 772403B4 7 Bytes JMP 6A6C8042 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!IsDialogMessageW 77240745 5 Bytes JMP 6A7F9855 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!CreateDialogParamA 772417AA 5 Bytes JMP 6A7F90B8 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!IsDialogMessage 77241847 5 Bytes JMP 6A7F982D C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!CreateDialogIndirectParamA 772426F1 5 Bytes JMP 6A7F9128 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!CreateDialogIndirectParamW 77249A62 5 Bytes JMP 6A7F9160 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!SetKeyboardState 77250987 5 Bytes JMP 6A7FA11D C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!DialogBoxParamW 772510B0 5 Bytes JMP 6A60187B C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!DialogBoxIndirectParamW 77252EF5 5 Bytes JMP 6A7F8D86 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!SendInput 77252F75 5 Bytes JMP 6A7FA0C5 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!EndDialog 7725326E 5 Bytes JMP 6A7F9B01 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!SetCursorPos 77266FB2 5 Bytes JMP 6A7FA19E C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!DialogBoxParamA 77268152 5 Bytes JMP 6A7F8D21 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!DialogBoxIndirectParamA 7726847D 5 Bytes JMP 6A7F8DEB C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!MessageBoxIndirectA 7727D4D9 5 Bytes JMP 6A7F8CA8 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!MessageBoxIndirectW 7727D5D3 5 Bytes JMP 6A7F8C2F C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!MessageBoxExA 7727D639 5 Bytes JMP 6A7F8BCB C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!MessageBoxExW 7727D65D 5 Bytes JMP 6A7F8B67 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] USER32.dll!keybd_event 7727D972 5 Bytes JMP 6A7FA082 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] SHELL32.dll!SHRestricted + D95 75D189A8 4 Bytes [CF, 01, 3B, 65]
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] SHELL32.dll!SHRestricted + D9D 75D189B0 8 Bytes [E0, 61, 3A, 65, 79, F7, 3A, ...]
.text C:\Program Files\Internet Explorer\iexplore.exe[2572] ole32.dll!OleLoadFromStream 75B61E80 5 Bytes JMP 6A7F955F C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesApp32.exe[2576] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesApp32.exe[2576] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesApp32.exe[2576] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesApp32.exe[2576] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00070600
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesApp32.exe[2576] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00070804
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesApp32.exe[2576] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00070A08
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesApp32.exe[2576] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000701F8
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesApp32.exe[2576] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000703FC
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesApp32.exe[2576] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000803FC
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesApp32.exe[2576] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00080600
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesApp32.exe[2576] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00081014
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesApp32.exe[2576] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00080804
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesApp32.exe[2576] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00080A08
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesApp32.exe[2576] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00080C0C
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesApp32.exe[2576] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00080E10
.text C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesApp32.exe[2576] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000801F8
.text C:\Windows\system32\igfxext.exe[2692] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Windows\system32\igfxext.exe[2692] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Windows\system32\igfxext.exe[2692] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\igfxext.exe[2692] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00170600
.text C:\Windows\system32\igfxext.exe[2692] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00170804
.text C:\Windows\system32\igfxext.exe[2692] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00170A08
.text C:\Windows\system32\igfxext.exe[2692] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001701F8
.text C:\Windows\system32\igfxext.exe[2692] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001703FC
.text C:\Windows\system32\igfxext.exe[2692] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001803FC
.text C:\Windows\system32\igfxext.exe[2692] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00180600
.text C:\Windows\system32\igfxext.exe[2692] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00181014
.text C:\Windows\system32\igfxext.exe[2692] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00180804
.text C:\Windows\system32\igfxext.exe[2692] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00180A08
.text C:\Windows\system32\igfxext.exe[2692] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00180C0C
.text C:\Windows\system32\igfxext.exe[2692] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00180E10
.text C:\Windows\system32\igfxext.exe[2692] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001801F8
.text C:\Program Files\Western Digital\WD SmartWare\Front Parlor\WDSC.exe[2712] KERNEL32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\System32\svchost.exe[2736] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\System32\svchost.exe[2736] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\System32\svchost.exe[2736] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\System32\svchost.exe[2736] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\System32\svchost.exe[2736] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\System32\svchost.exe[2736] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\System32\svchost.exe[2736] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\System32\svchost.exe[2736] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\System32\svchost.exe[2736] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\System32\svchost.exe[2736] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\System32\svchost.exe[2736] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Windows\System32\Drivers\WTSRV.EXE[2772] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Windows\System32\Drivers\WTSRV.EXE[2772] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Windows\System32\Drivers\WTSRV.EXE[2772] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\System32\Drivers\WTSRV.EXE[2772] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001703FC
.text C:\Windows\System32\Drivers\WTSRV.EXE[2772] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00170600
.text C:\Windows\System32\Drivers\WTSRV.EXE[2772] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00171014
.text C:\Windows\System32\Drivers\WTSRV.EXE[2772] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00170804
.text C:\Windows\System32\Drivers\WTSRV.EXE[2772] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00170A08
.text C:\Windows\System32\Drivers\WTSRV.EXE[2772] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00170C0C
.text C:\Windows\System32\Drivers\WTSRV.EXE[2772] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00170E10
.text C:\Windows\System32\Drivers\WTSRV.EXE[2772] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001701F8
.text C:\Windows\System32\Drivers\WTSRV.EXE[2772] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00180600
.text C:\Windows\System32\Drivers\WTSRV.EXE[2772] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00180804
.text C:\Windows\System32\Drivers\WTSRV.EXE[2772] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00180A08
.text C:\Windows\System32\Drivers\WTSRV.EXE[2772] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001801F8
.text C:\Windows\System32\Drivers\WTSRV.EXE[2772] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001803FC
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\bin\HPNetworkCommunicator.exe[2900] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\bin\HPNetworkCommunicator.exe[2900] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\bin\HPNetworkCommunicator.exe[2900] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\bin\HPNetworkCommunicator.exe[2900] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00080600
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\bin\HPNetworkCommunicator.exe[2900] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00080804
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\bin\HPNetworkCommunicator.exe[2900] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00080A08
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\bin\HPNetworkCommunicator.exe[2900] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000801F8
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\bin\HPNetworkCommunicator.exe[2900] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000803FC
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\bin\HPNetworkCommunicator.exe[2900] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000903FC
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\bin\HPNetworkCommunicator.exe[2900] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00090600
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\bin\HPNetworkCommunicator.exe[2900] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00091014
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\bin\HPNetworkCommunicator.exe[2900] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00090804
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\bin\HPNetworkCommunicator.exe[2900] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00090A08
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\bin\HPNetworkCommunicator.exe[2900] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00090C0C
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\bin\HPNetworkCommunicator.exe[2900] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00090E10
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\bin\HPNetworkCommunicator.exe[2900] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000901F8
.text C:\Windows\system32\taskeng.exe[2908] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\system32\taskeng.exe[2908] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\system32\taskeng.exe[2908] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\taskeng.exe[2908] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\taskeng.exe[2908] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\taskeng.exe[2908] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\taskeng.exe[2908] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\taskeng.exe[2908] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\taskeng.exe[2908] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\taskeng.exe[2908] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\taskeng.exe[2908] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\taskeng.exe[2908] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00080600
.text C:\Windows\system32\taskeng.exe[2908] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00080804
.text C:\Windows\system32\taskeng.exe[2908] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00080A08
.text C:\Windows\system32\taskeng.exe[2908] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000801F8
.text C:\Windows\system32\taskeng.exe[2908] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000803FC
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000401F8
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000403FC
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000603FC
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00060600
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00061014
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00060804
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00060A08
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00060C0C
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00060E10
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000601F8
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00070600
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00070804
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00070A08
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000701F8
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000703FC
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] USER32.dll!EnableWindow 7722CD8B 5 Bytes JMP 6A6A9EAC C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] USER32.dll!DialogBoxParamW 772510B0 5 Bytes JMP 6A60187B C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] USER32.dll!DialogBoxIndirectParamW 77252EF5 5 Bytes JMP 6A7F8D86 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] USER32.dll!DialogBoxParamA 77268152 5 Bytes JMP 6A7F8D21 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] USER32.dll!DialogBoxIndirectParamA 7726847D 5 Bytes JMP 6A7F8DEB C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] USER32.dll!MessageBoxIndirectA 7727D4D9 5 Bytes JMP 6A7F8CA8 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] USER32.dll!MessageBoxIndirectW 7727D5D3 5 Bytes JMP 6A7F8C2F C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] USER32.dll!MessageBoxExA 7727D639 5 Bytes JMP 6A7F8BCB C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[3024] USER32.dll!MessageBoxExW 7727D65D 5 Bytes JMP 6A7F8B67 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3068] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3068] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3068] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3068] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00170600
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3068] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00170804
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3068] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00170A08
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3068] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001701F8
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3068] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001703FC
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3068] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001803FC
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3068] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00180600
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3068] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00181014
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3068] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00180804
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3068] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00180A08
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3068] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00180C0C
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3068] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00180E10
.text C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE[3068] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001801F8
.text C:\Windows\system32\WTClient.exe[3076] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001401F8
.text C:\Windows\system32\WTClient.exe[3076] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001403FC
.text C:\Windows\system32\WTClient.exe[3076] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\WTClient.exe[3076] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00160600
.text C:\Windows\system32\WTClient.exe[3076] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00160804
.text C:\Windows\system32\WTClient.exe[3076] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00160A08
.text C:\Windows\system32\WTClient.exe[3076] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001601F8
.text C:\Windows\system32\WTClient.exe[3076] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001603FC
.text C:\Windows\system32\WTClient.exe[3076] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001703FC
.text C:\Windows\system32\WTClient.exe[3076] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00170600
.text C:\Windows\system32\WTClient.exe[3076] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00171014
.text C:\Windows\system32\WTClient.exe[3076] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00170804
.text C:\Windows\system32\WTClient.exe[3076] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00170A08
.text C:\Windows\system32\WTClient.exe[3076] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00170C0C
.text C:\Windows\system32\WTClient.exe[3076] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00170E10
.text C:\Windows\system32\WTClient.exe[3076] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001701F8
.text C:\Windows\system32\wbem\wmiprvse.exe[3136] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\system32\wbem\wmiprvse.exe[3136] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\system32\wbem\wmiprvse.exe[3136] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\wbem\wmiprvse.exe[3136] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\wbem\wmiprvse.exe[3136] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\wbem\wmiprvse.exe[3136] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\wbem\wmiprvse.exe[3136] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\wbem\wmiprvse.exe[3136] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\wbem\wmiprvse.exe[3136] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\wbem\wmiprvse.exe[3136] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\wbem\wmiprvse.exe[3136] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\wbem\wmiprvse.exe[3136] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00080600
.text C:\Windows\system32\wbem\wmiprvse.exe[3136] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00080804
.text C:\Windows\system32\wbem\wmiprvse.exe[3136] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00080A08
.text C:\Windows\system32\wbem\wmiprvse.exe[3136] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000801F8
.text C:\Windows\system32\wbem\wmiprvse.exe[3136] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000803FC
.text C:\Windows\system32\wbem\unsecapp.exe[3188] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\system32\wbem\unsecapp.exe[3188] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\system32\wbem\unsecapp.exe[3188] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\wbem\unsecapp.exe[3188] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\wbem\unsecapp.exe[3188] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\wbem\unsecapp.exe[3188] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\wbem\unsecapp.exe[3188] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\wbem\unsecapp.exe[3188] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\wbem\unsecapp.exe[3188] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\wbem\unsecapp.exe[3188] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\wbem\unsecapp.exe[3188] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Windows\system32\wbem\unsecapp.exe[3188] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00080600
.text C:\Windows\system32\wbem\unsecapp.exe[3188] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00080804
.text C:\Windows\system32\wbem\unsecapp.exe[3188] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00080A08
.text C:\Windows\system32\wbem\unsecapp.exe[3188] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000801F8
.text C:\Windows\system32\wbem\unsecapp.exe[3188] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000803FC

.text C:\Users\Elizabeth\AppData\Local\Digsby\App\lib\digsby-app.exe[3244] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Users\Elizabeth\AppData\Local\Digsby\App\lib\digsby-app.exe[3244] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Users\Elizabeth\AppData\Local\Digsby\App\lib\digsby-app.exe[3244] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Users\Elizabeth\AppData\Local\Digsby\App\lib\digsby-app.exe[3244] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00170600
.text C:\Users\Elizabeth\AppData\Local\Digsby\App\lib\digsby-app.exe[3244] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00170804
.text C:\Users\Elizabeth\AppData\Local\Digsby\App\lib\digsby-app.exe[3244] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00170A08
.text C:\Users\Elizabeth\AppData\Local\Digsby\App\lib\digsby-app.exe[3244] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001701F8
.text C:\Users\Elizabeth\AppData\Local\Digsby\App\lib\digsby-app.exe[3244] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001703FC
.text C:\Users\Elizabeth\AppData\Local\Digsby\App\lib\digsby-app.exe[3244] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001803FC
.text C:\Users\Elizabeth\AppData\Local\Digsby\App\lib\digsby-app.exe[3244] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00180600
.text C:\Users\Elizabeth\AppData\Local\Digsby\App\lib\digsby-app.exe[3244] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00181014
.text C:\Users\Elizabeth\AppData\Local\Digsby\App\lib\digsby-app.exe[3244] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00180804
.text C:\Users\Elizabeth\AppData\Local\Digsby\App\lib\digsby-app.exe[3244] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00180A08
.text C:\Users\Elizabeth\AppData\Local\Digsby\App\lib\digsby-app.exe[3244] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00180C0C
.text C:\Users\Elizabeth\AppData\Local\Digsby\App\lib\digsby-app.exe[3244] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00180E10
.text C:\Users\Elizabeth\AppData\Local\Digsby\App\lib\digsby-app.exe[3244] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001801F8
.text C:\Windows\system32\igfxsrvc.exe[3408] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Windows\system32\igfxsrvc.exe[3408] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Windows\system32\igfxsrvc.exe[3408] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\igfxsrvc.exe[3408] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00170600
.text C:\Windows\system32\igfxsrvc.exe[3408] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00170804
.text C:\Windows\system32\igfxsrvc.exe[3408] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00170A08
.text C:\Windows\system32\igfxsrvc.exe[3408] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001701F8
.text C:\Windows\system32\igfxsrvc.exe[3408] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001703FC
.text C:\Windows\system32\igfxsrvc.exe[3408] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001803FC
.text C:\Windows\system32\igfxsrvc.exe[3408] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00180600
.text C:\Windows\system32\igfxsrvc.exe[3408] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00181014
.text C:\Windows\system32\igfxsrvc.exe[3408] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00180804
.text C:\Windows\system32\igfxsrvc.exe[3408] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00180A08
.text C:\Windows\system32\igfxsrvc.exe[3408] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00180C0C
.text C:\Windows\system32\igfxsrvc.exe[3408] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00180E10
.text C:\Windows\system32\igfxsrvc.exe[3408] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001801F8
.text C:\Program Files\Windows Defender\MSASCui.exe[3560] ntdll.dll!LdrLoadDll 77089378 3 Bytes JMP 000901F8
.text C:\Program Files\Windows Defender\MSASCui.exe[3560] ntdll.dll!LdrLoadDll + 4 7708937C 1 Byte [89]
.text C:\Program Files\Windows Defender\MSASCui.exe[3560] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000903FC
.text C:\Program Files\Windows Defender\MSASCui.exe[3560] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Windows Defender\MSASCui.exe[3560] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000B03FC
.text C:\Program Files\Windows Defender\MSASCui.exe[3560] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 000B0600
.text C:\Program Files\Windows Defender\MSASCui.exe[3560] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 000B1014
.text C:\Program Files\Windows Defender\MSASCui.exe[3560] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 000B0804
.text C:\Program Files\Windows Defender\MSASCui.exe[3560] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 000B0A08
.text C:\Program Files\Windows Defender\MSASCui.exe[3560] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 000B0C0C
.text C:\Program Files\Windows Defender\MSASCui.exe[3560] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 000B0E10
.text C:\Program Files\Windows Defender\MSASCui.exe[3560] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000B01F8
.text C:\Program Files\Windows Defender\MSASCui.exe[3560] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 000C0600
.text C:\Program Files\Windows Defender\MSASCui.exe[3560] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 000C0804
.text C:\Program Files\Windows Defender\MSASCui.exe[3560] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 000C0A08
.text C:\Program Files\Windows Defender\MSASCui.exe[3560] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000C01F8
.text C:\Program Files\Windows Defender\MSASCui.exe[3560] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000C03FC
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3604] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001401F8
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3604] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001403FC
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3604] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3604] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00160600
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3604] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00160804
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3604] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00160A08
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3604] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001601F8
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3604] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001603FC
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3604] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001703FC
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3604] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00170600
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3604] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00171014
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3604] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00170804
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3604] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00170A08
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3604] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00170C0C
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3604] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00170E10
.text C:\Program Files\Synaptics\SynTP\SynTPEnh.exe[3604] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001701F8
.text C:\Windows\RtHDVCpl.exe[3624] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Windows\RtHDVCpl.exe[3624] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Windows\RtHDVCpl.exe[3624] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\RtHDVCpl.exe[3624] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001703FC
.text C:\Windows\RtHDVCpl.exe[3624] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00170600
.text C:\Windows\RtHDVCpl.exe[3624] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00171014
.text C:\Windows\RtHDVCpl.exe[3624] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00170804
.text C:\Windows\RtHDVCpl.exe[3624] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00170A08
.text C:\Windows\RtHDVCpl.exe[3624] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00170C0C
.text C:\Windows\RtHDVCpl.exe[3624] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00170E10
.text C:\Windows\RtHDVCpl.exe[3624] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001701F8
.text C:\Windows\RtHDVCpl.exe[3624] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00180600
.text C:\Windows\RtHDVCpl.exe[3624] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00180804
.text C:\Windows\RtHDVCpl.exe[3624] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00180A08
.text C:\Windows\RtHDVCpl.exe[3624] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001801F8
.text C:\Windows\RtHDVCpl.exe[3624] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001803FC
.text C:\Windows\PLFSetI.exe[3668] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001401F8
.text C:\Windows\PLFSetI.exe[3668] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001403FC
.text C:\Windows\PLFSetI.exe[3668] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\PLFSetI.exe[3668] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00160600
.text C:\Windows\PLFSetI.exe[3668] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00160804
.text C:\Windows\PLFSetI.exe[3668] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00160A08
.text C:\Windows\PLFSetI.exe[3668] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001601F8
.text C:\Windows\PLFSetI.exe[3668] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001603FC
.text C:\Windows\PLFSetI.exe[3668] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001703FC
.text C:\Windows\PLFSetI.exe[3668] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00170600
.text C:\Windows\PLFSetI.exe[3668] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00171014
.text C:\Windows\PLFSetI.exe[3668] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00170804
.text C:\Windows\PLFSetI.exe[3668] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00170A08
.text C:\Windows\PLFSetI.exe[3668] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00170C0C
.text C:\Windows\PLFSetI.exe[3668] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00170E10
.text C:\Windows\PLFSetI.exe[3668] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001701F8
.text C:\Windows\system32\NOTEPAD.EXE[3696] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Users\ELIZAB~1\AppData\Local\Temp\RtkBtMnt.exe[3728] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Users\ELIZAB~1\AppData\Local\Temp\RtkBtMnt.exe[3728] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Users\ELIZAB~1\AppData\Local\Temp\RtkBtMnt.exe[3728] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Users\ELIZAB~1\AppData\Local\Temp\RtkBtMnt.exe[3728] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001703FC
.text C:\Users\ELIZAB~1\AppData\Local\Temp\RtkBtMnt.exe[3728] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00170600
.text C:\Users\ELIZAB~1\AppData\Local\Temp\RtkBtMnt.exe[3728] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00171014
.text C:\Users\ELIZAB~1\AppData\Local\Temp\RtkBtMnt.exe[3728] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00170804
.text C:\Users\ELIZAB~1\AppData\Local\Temp\RtkBtMnt.exe[3728] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00170A08
.text C:\Users\ELIZAB~1\AppData\Local\Temp\RtkBtMnt.exe[3728] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00170C0C
.text C:\Users\ELIZAB~1\AppData\Local\Temp\RtkBtMnt.exe[3728] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00170E10
.text C:\Users\ELIZAB~1\AppData\Local\Temp\RtkBtMnt.exe[3728] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001701F8
.text C:\Users\ELIZAB~1\AppData\Local\Temp\RtkBtMnt.exe[3728] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00180600
.text C:\Users\ELIZAB~1\AppData\Local\Temp\RtkBtMnt.exe[3728] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00180804
.text C:\Users\ELIZAB~1\AppData\Local\Temp\RtkBtMnt.exe[3728] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00180A08
.text C:\Users\ELIZAB~1\AppData\Local\Temp\RtkBtMnt.exe[3728] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001801F8
.text C:\Users\ELIZAB~1\AppData\Local\Temp\RtkBtMnt.exe[3728] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001803FC
.text C:\Windows\system32\igfxsrvc.exe[3876] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Windows\system32\igfxsrvc.exe[3876] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Windows\system32\igfxsrvc.exe[3876] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\igfxsrvc.exe[3876] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00170600
.text C:\Windows\system32\igfxsrvc.exe[3876] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00170804
.text C:\Windows\system32\igfxsrvc.exe[3876] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00170A08
.text C:\Windows\system32\igfxsrvc.exe[3876] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001701F8
.text C:\Windows\system32\igfxsrvc.exe[3876] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001703FC
.text C:\Windows\system32\igfxsrvc.exe[3876] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001803FC
.text C:\Windows\system32\igfxsrvc.exe[3876] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00180600
.text C:\Windows\system32\igfxsrvc.exe[3876] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00181014
.text C:\Windows\system32\igfxsrvc.exe[3876] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00180804
.text C:\Windows\system32\igfxsrvc.exe[3876] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00180A08
.text C:\Windows\system32\igfxsrvc.exe[3876] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00180C0C
.text C:\Windows\system32\igfxsrvc.exe[3876] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00180E10
.text C:\Windows\system32\igfxsrvc.exe[3876] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001801F8
.text C:\Program Files\Launch Manager\LManager.exe[3964] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Program Files\Launch Manager\LManager.exe[3964] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Program Files\Launch Manager\LManager.exe[3964] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Launch Manager\LManager.exe[3964] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00A20600
.text C:\Program Files\Launch Manager\LManager.exe[3964] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00A20804
.text C:\Program Files\Launch Manager\LManager.exe[3964] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00A20A08
.text C:\Program Files\Launch Manager\LManager.exe[3964] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 00A201F8
.text C:\Program Files\Launch Manager\LManager.exe[3964] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 00A203FC
.text C:\Program Files\Launch Manager\LManager.exe[3964] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 00A303FC
.text C:\Program Files\Launch Manager\LManager.exe[3964] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00A30600
.text C:\Program Files\Launch Manager\LManager.exe[3964] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00A31014
.text C:\Program Files\Launch Manager\LManager.exe[3964] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00A30804
.text C:\Program Files\Launch Manager\LManager.exe[3964] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00A30A08
.text C:\Program Files\Launch Manager\LManager.exe[3964] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00A30C0C
.text C:\Program Files\Launch Manager\LManager.exe[3964] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00A30E10
.text C:\Program Files\Launch Manager\LManager.exe[3964] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 00A301F8
.text C:\Program Files\Acer\Empowering Technology\ePower\ePower_DMC.exe[3976] KERNEL32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe[4032] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe[4032] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe[4032] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe[4032] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 001C0600
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe[4032] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 001C0804
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe[4032] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 001C0A08
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe[4032] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001C01F8
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe[4032] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001C03FC
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe[4032] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001D03FC
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe[4032] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 001D0600
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe[4032] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 001D1014
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe[4032] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 001D0804
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe[4032] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 001D0A08
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe[4032] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 001D0C0C
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe[4032] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 001D0E10
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe[4032] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001D01F8
.text C:\Windows\System32\hkcmd.exe[4068] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Windows\System32\hkcmd.exe[4068] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Windows\System32\hkcmd.exe[4068] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\System32\hkcmd.exe[4068] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00180600
.text C:\Windows\System32\hkcmd.exe[4068] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00180804
.text C:\Windows\System32\hkcmd.exe[4068] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00180A08
.text C:\Windows\System32\hkcmd.exe[4068] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001801F8
.text C:\Windows\System32\hkcmd.exe[4068] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001803FC
.text C:\Windows\System32\hkcmd.exe[4068] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001903FC
.text C:\Windows\System32\hkcmd.exe[4068] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00190600
.text C:\Windows\System32\hkcmd.exe[4068] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00191014
.text C:\Windows\System32\hkcmd.exe[4068] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00190804
.text C:\Windows\System32\hkcmd.exe[4068] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00190A08
.text C:\Windows\System32\hkcmd.exe[4068] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00190C0C
.text C:\Windows\System32\hkcmd.exe[4068] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00190E10
.text C:\Windows\System32\hkcmd.exe[4068] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001901F8
.text C:\Windows\System32\igfxpers.exe[4080] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Windows\System32\igfxpers.exe[4080] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Windows\System32\igfxpers.exe[4080] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\System32\igfxpers.exe[4080] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00180600
.text C:\Windows\System32\igfxpers.exe[4080] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00180804
.text C:\Windows\System32\igfxpers.exe[4080] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00180A08
.text C:\Windows\System32\igfxpers.exe[4080] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001801F8
.text C:\Windows\System32\igfxpers.exe[4080] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001803FC
.text C:\Windows\System32\igfxpers.exe[4080] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001903FC
.text C:\Windows\System32\igfxpers.exe[4080] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00190600
.text C:\Windows\System32\igfxpers.exe[4080] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00191014
.text C:\Windows\System32\igfxpers.exe[4080] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00190804
.text C:\Windows\System32\igfxpers.exe[4080] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00190A08
.text C:\Windows\System32\igfxpers.exe[4080] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00190C0C
.text C:\Windows\System32\igfxpers.exe[4080] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00190E10
.text C:\Windows\System32\igfxpers.exe[4080] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001901F8
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000401F8
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000403FC
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] kernel32.dll!CreateThread 76E0CB2E 5 Bytes JMP 6A6675CB C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000603FC
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00060600
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00061014
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00060804
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00060A08
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00060C0C
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00060E10
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000601F8
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00070600
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!CreateDialogParamW 772272A2 5 Bytes JMP 6A7F90F0 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!GetAsyncKeyState 7722863C 5 Bytes JMP 6A64DEAD C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 6A6A25AC C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!CallNextHookEx 77228E3B 5 Bytes JMP 6A6C7FDF C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 6A6EECE0 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000701F8
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000703FC
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!EnableWindow 7722CD8B 5 Bytes JMP 6A6A9EAC C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!DefWindowProcA 7722DB88 7 Bytes JMP 6A6697F5 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!CreateWindowExA 7722DC2A 5 Bytes JMP 6A67362B C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!CreateWindowExW 77231305 5 Bytes JMP 6A6D03B7 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!GetKeyState 77238CB1 5 Bytes JMP 6A64DD87 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!DefWindowProcW 772403B4 7 Bytes JMP 6A6C8042 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!IsDialogMessageW 77240745 5 Bytes JMP 6A7F9855 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!CreateDialogParamA 772417AA 5 Bytes JMP 6A7F90B8 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!IsDialogMessage 77241847 5 Bytes JMP 6A7F982D C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!CreateDialogIndirectParamA 772426F1 5 Bytes JMP 6A7F9128 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!CreateDialogIndirectParamW 77249A62 5 Bytes JMP 6A7F9160 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!SetKeyboardState 77250987 5 Bytes JMP 6A7FA11D C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!DialogBoxParamW 772510B0 5 Bytes JMP 6A60187B C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!DialogBoxIndirectParamW 77252EF5 5 Bytes JMP 6A7F8D86 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!SendInput 77252F75 5 Bytes JMP 6A7FA0C5 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!EndDialog 7725326E 5 Bytes JMP 6A7F9B01 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!SetCursorPos 77266FB2 5 Bytes JMP 6A7FA19E C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!DialogBoxParamA 77268152 5 Bytes JMP 6A7F8D21 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!DialogBoxIndirectParamA 7726847D 5 Bytes JMP 6A7F8DEB C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!MessageBoxIndirectA 7727D4D9 5 Bytes JMP 6A7F8CA8 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!MessageBoxIndirectW 7727D5D3 5 Bytes JMP 6A7F8C2F C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!MessageBoxExA 7727D639 5 Bytes JMP 6A7F8BCB C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!MessageBoxExW 7727D65D 5 Bytes JMP 6A7F8B67 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] USER32.dll!keybd_event 7727D972 5 Bytes JMP 6A7FA082 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] SHELL32.dll!SHRestricted + D95 75D189A8 4 Bytes [CF, 01, 3B, 65]
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] SHELL32.dll!SHRestricted + D9D 75D189B0 8 Bytes [E0, 61, 3A, 65, 79, F7, 3A, ...]
.text C:\Program Files\Internet Explorer\iexplore.exe[4412] ole32.dll!OleLoadFromStream 75B61E80 5 Bytes JMP 6A7F955F C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinSetup.exe[4456] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001601F8
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinSetup.exe[4456] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001603FC
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinSetup.exe[4456] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinSetup.exe[4456] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 003D0600
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinSetup.exe[4456] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 003D0804
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinSetup.exe[4456] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 003D0A08
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinSetup.exe[4456] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 003D01F8
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinSetup.exe[4456] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 003D03FC
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinSetup.exe[4456] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 003E03FC
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinSetup.exe[4456] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 003E0600
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinSetup.exe[4456] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 003E1014
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinSetup.exe[4456] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 003E0804
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinSetup.exe[4456] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 003E0A08
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinSetup.exe[4456] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 003E0C0C
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinSetup.exe[4456] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 003E0E10
.text C:\Program Files\Belkin\Router Setup and Monitor\BelkinSetup.exe[4456] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 003E01F8
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[4700] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[4700] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[4700] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[4700] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00170600
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[4700] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00170804
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[4700] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00170A08
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[4700] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001701F8
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[4700] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001703FC
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[4700] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001803FC
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[4700] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00180600
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[4700] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00181014
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[4700] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00180804
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[4700] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00180A08
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[4700] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00180C0C
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[4700] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00180E10
.text C:\Program Files\Synaptics\SynTP\SynTPHelper.exe[4700] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001801F8
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000401F8
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000403FC
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] kernel32.dll!CreateThread 76E0CB2E 5 Bytes JMP 6A6675CB C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000603FC
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00060600
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00061014
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00060804
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00060A08
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00060C0C
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00060E10
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000601F8
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00070600
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!CreateDialogParamW 772272A2 5 Bytes JMP 6A7F90F0 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!GetAsyncKeyState 7722863C 5 Bytes JMP 6A64DEAD C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 6A6A25AC C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!CallNextHookEx 77228E3B 5 Bytes JMP 6A6C7FDF C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 6A6EECE0 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000701F8
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000703FC
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!EnableWindow 7722CD8B 5 Bytes JMP 6A6A9EAC C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!DefWindowProcA 7722DB88 7 Bytes JMP 6A6697F5 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!CreateWindowExA 7722DC2A 5 Bytes JMP 6A67362B C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!CreateWindowExW 77231305 5 Bytes JMP 6A6D03B7 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!GetKeyState 77238CB1 5 Bytes JMP 6A64DD87 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!DefWindowProcW 772403B4 7 Bytes JMP 6A6C8042 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!IsDialogMessageW 77240745 5 Bytes JMP 6A7F9855 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!CreateDialogParamA 772417AA 5 Bytes JMP 6A7F90B8 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!IsDialogMessage 77241847 5 Bytes JMP 6A7F982D C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!CreateDialogIndirectParamA 772426F1 5 Bytes JMP 6A7F9128 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!CreateDialogIndirectParamW 77249A62 5 Bytes JMP 6A7F9160 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!SetKeyboardState 77250987 5 Bytes JMP 6A7FA11D C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!DialogBoxParamW 772510B0 5 Bytes JMP 6A60187B C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!DialogBoxIndirectParamW 77252EF5 5 Bytes JMP 6A7F8D86 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!SendInput 77252F75 5 Bytes JMP 6A7FA0C5 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!EndDialog 7725326E 5 Bytes JMP 6A7F9B01 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!SetCursorPos 77266FB2 5 Bytes JMP 6A7FA19E C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!DialogBoxParamA 77268152 5 Bytes JMP 6A7F8D21 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!DialogBoxIndirectParamA 7726847D 5 Bytes JMP 6A7F8DEB C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!MessageBoxIndirectA 7727D4D9 5 Bytes JMP 6A7F8CA8 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!MessageBoxIndirectW 7727D5D3 5 Bytes JMP 6A7F8C2F C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!MessageBoxExA 7727D639 5 Bytes JMP 6A7F8BCB C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!MessageBoxExW 7727D65D 5 Bytes JMP 6A7F8B67 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] USER32.dll!keybd_event 7727D972 5 Bytes JMP 6A7FA082 C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] SHELL32.dll!SHRestricted + D95 75D189A8 4 Bytes [CF, 01, 3B, 65]
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] SHELL32.dll!SHRestricted + D9D 75D189B0 8 Bytes [E0, 61, 3A, 65, 79, F7, 3A, ...]
.text C:\Program Files\Internet Explorer\iexplore.exe[4732] ole32.dll!OleLoadFromStream 75B61E80 5 Bytes JMP 6A7F955F C:\Windows\system32\IEFRAME.dll (Internet Browser/Microsoft Corporation)
.text C:\Windows\system32\svchost.exe[4812] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Windows\system32\svchost.exe[4812] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Windows\system32\svchost.exe[4812] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Windows\system32\svchost.exe[4812] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000703FC
.text C:\Windows\system32\svchost.exe[4812] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00070600
.text C:\Windows\system32\svchost.exe[4812] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00071014
.text C:\Windows\system32\svchost.exe[4812] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00070804
.text C:\Windows\system32\svchost.exe[4812] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00070A08
.text C:\Windows\system32\svchost.exe[4812] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00070C0C
.text C:\Windows\system32\svchost.exe[4812] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00070E10
.text C:\Windows\system32\svchost.exe[4812] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000701F8
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\HPNetworkCommunicator.exe[4856] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\HPNetworkCommunicator.exe[4856] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\HPNetworkCommunicator.exe[4856] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\HPNetworkCommunicator.exe[4856] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00080600
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\HPNetworkCommunicator.exe[4856] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00080804
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\HPNetworkCommunicator.exe[4856] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00080A08
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\HPNetworkCommunicator.exe[4856] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000801F8
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\HPNetworkCommunicator.exe[4856] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000803FC
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\HPNetworkCommunicator.exe[4856] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000903FC
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\HPNetworkCommunicator.exe[4856] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00090600
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\HPNetworkCommunicator.exe[4856] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00091014
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\HPNetworkCommunicator.exe[4856] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00090804
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\HPNetworkCommunicator.exe[4856] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00090A08
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\HPNetworkCommunicator.exe[4856] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00090C0C
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\HPNetworkCommunicator.exe[4856] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00090E10
.text C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\HPNetworkCommunicator.exe[4856] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000901F8
.text C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe[4948] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe[4948] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe[4948] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe[4948] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001903FC
.text C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe[4948] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00190600
.text C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe[4948] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00191014
.text C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe[4948] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00190804
.text C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe[4948] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00190A08
.text C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe[4948] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00190C0C
.text C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe[4948] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00190E10
.text C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe[4948] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001901F8
.text C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe[4948] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 002A0600
.text C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe[4948] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 002A0804
.text C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe[4948] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 002A0A08
.text C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe[4948] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 002A01F8
.text C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe[4948] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 002A03FC
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[5056] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 001501F8
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[5056] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 001503FC
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[5056] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[5056] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00170600
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[5056] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00170804
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[5056] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00170A08
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[5056] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 001701F8
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[5056] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 001703FC
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[5056] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 001803FC
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[5056] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 00180600
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[5056] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00181014
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[5056] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00180804
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[5056] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00180A08
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[5056] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00180C0C
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[5056] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00180E10
.text C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe[5056] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 001801F8
.text C:\Program Files\Common Files\Microsoft Shared\Ink\InputPersonalization.exe[5456] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 000501F8
.text C:\Program Files\Common Files\Microsoft Shared\Ink\InputPersonalization.exe[5456] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 000503FC
.text C:\Program Files\Common Files\Microsoft Shared\Ink\InputPersonalization.exe[5456] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Program Files\Common Files\Microsoft Shared\Ink\InputPersonalization.exe[5456] ADVAPI32.dll!CreateServiceW 76D39EB4 5 Bytes JMP 000B03FC
.text C:\Program Files\Common Files\Microsoft Shared\Ink\InputPersonalization.exe[5456] ADVAPI32.dll!DeleteService 76D3A07E 5 Bytes JMP 000B0600
.text C:\Program Files\Common Files\Microsoft Shared\Ink\InputPersonalization.exe[5456] ADVAPI32.dll!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 000B1014
.text C:\Program Files\Common Files\Microsoft Shared\Ink\InputPersonalization.exe[5456] ADVAPI32.dll!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 000B0804
.text C:\Program Files\Common Files\Microsoft Shared\Ink\InputPersonalization.exe[5456] ADVAPI32.dll!ChangeServiceConfigW 76D76F81 5 Bytes JMP 000B0A08
.text C:\Program Files\Common Files\Microsoft Shared\Ink\InputPersonalization.exe[5456] ADVAPI32.dll!ChangeServiceConfig2A 76D77099 5 Bytes JMP 000B0C0C
.text C:\Program Files\Common Files\Microsoft Shared\Ink\InputPersonalization.exe[5456] ADVAPI32.dll!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 000B0E10
.text C:\Program Files\Common Files\Microsoft Shared\Ink\InputPersonalization.exe[5456] ADVAPI32.dll!CreateServiceA 76D772A1 5 Bytes JMP 000B01F8
.text C:\Program Files\Common Files\Microsoft Shared\Ink\InputPersonalization.exe[5456] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 000C0600
.text C:\Program Files\Common Files\Microsoft Shared\Ink\InputPersonalization.exe[5456] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 000C0804
.text C:\Program Files\Common Files\Microsoft Shared\Ink\InputPersonalization.exe[5456] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 000C0A08
.text C:\Program Files\Common Files\Microsoft Shared\Ink\InputPersonalization.exe[5456] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 000C01F8
.text C:\Program Files\Common Files\Microsoft Shared\Ink\InputPersonalization.exe[5456] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 000C03FC
.text C:\Windows\system32\ctfmon.exe[5904] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Users\Elizabeth\Desktop\Defogger.exe[5976] ntdll.dll!LdrLoadDll 77089378 5 Bytes JMP 002501F8
.text C:\Users\Elizabeth\Desktop\Defogger.exe[5976] ntdll.dll!LdrUnloadDll 7709B680 5 Bytes JMP 002503FC
.text C:\Users\Elizabeth\Desktop\Defogger.exe[5976] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]
.text C:\Users\Elizabeth\Desktop\Defogger.exe[5976] ADVAPI32.DLL!CreateServiceW 76D39EB4 5 Bytes JMP 002703FC
.text C:\Users\Elizabeth\Desktop\Defogger.exe[5976] ADVAPI32.DLL!DeleteService 76D3A07E 5 Bytes JMP 00270600
.text C:\Users\Elizabeth\Desktop\Defogger.exe[5976] ADVAPI32.DLL!SetServiceObjectSecurity 76D76CD9 5 Bytes JMP 00271014
.text C:\Users\Elizabeth\Desktop\Defogger.exe[5976] ADVAPI32.DLL!ChangeServiceConfigA 76D76DD9 5 Bytes JMP 00270804
.text C:\Users\Elizabeth\Desktop\Defogger.exe[5976] ADVAPI32.DLL!ChangeServiceConfigW 76D76F81 5 Bytes JMP 00270A08
.text C:\Users\Elizabeth\Desktop\Defogger.exe[5976] ADVAPI32.DLL!ChangeServiceConfig2A 76D77099 5 Bytes JMP 00270C0C
.text C:\Users\Elizabeth\Desktop\Defogger.exe[5976] ADVAPI32.DLL!ChangeServiceConfig2W 76D771E1 5 Bytes JMP 00270E10
.text C:\Users\Elizabeth\Desktop\Defogger.exe[5976] ADVAPI32.DLL!CreateServiceA 76D772A1 5 Bytes JMP 002701F8
.text C:\Users\Elizabeth\Desktop\Defogger.exe[5976] USER32.dll!SetWindowsHookExA 77226322 5 Bytes JMP 00280600
.text C:\Users\Elizabeth\Desktop\Defogger.exe[5976] USER32.dll!SetWindowsHookExW 772287AD 5 Bytes JMP 00280804
.text C:\Users\Elizabeth\Desktop\Defogger.exe[5976] USER32.dll!UnhookWindowsHookEx 772298DB 5 Bytes JMP 00280A08
.text C:\Users\Elizabeth\Desktop\Defogger.exe[5976] USER32.dll!SetWinEventHook 77229F3A 5 Bytes JMP 002801F8
.text C:\Users\Elizabeth\Desktop\Defogger.exe[5976] USER32.dll!UnhookWinEvent 7722C06F 5 Bytes JMP 002803FC
.text C:\Users\Elizabeth\Desktop\gmer\gmer.exe[7872] kernel32.dll!GetBinaryTypeW + 70 76E12467 1 Byte [62]

---- Devices - GMER 1.0.15 ----

Device \FileSystem\Ntfs \Ntfs aswSP.SYS (avast! self protection module/AVAST Software)
Device \FileSystem\fastfat \FatCdrom aswSP.SYS (avast! self protection module/AVAST Software)

AttachedDevice \Driver\kbdclass \Device\KeyboardClass0 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
AttachedDevice \Driver\kbdclass \Device\KeyboardClass1 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
AttachedDevice \Driver\tdx \Device\Tcp aswTdi.SYS (avast! TDI Filter Driver/AVAST Software)
AttachedDevice \Driver\tdx \Device\Udp aswTdi.SYS (avast! TDI Filter Driver/AVAST Software)

Device \FileSystem\fastfat \Fat aswSP.SYS (avast! self protection module/AVAST Software)

AttachedDevice \FileSystem\fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)

---- Files - GMER 1.0.15 ----

File C:\avast! sandbox 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294\PEV.DAT_{871da643-c0b8-11e1-be3c-001d72f0ef22} 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294\dds.scr_{871da621-c0b8-11e1-be3c-001d72f0ef22} 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294\PEV.DAT_{871da62f-c0b8-11e1-be3c-001d72f0ef22} 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294\PEV.DAT_{871da634-c0b8-11e1-be3c-001d72f0ef22} 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294\PEV.DAT_{871da639-c0b8-11e1-be3c-001d72f0ef22} 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294\PEV.DAT_{871da63e-c0b8-11e1-be3c-001d72f0ef22} 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294\PEV.DAT_{871da648-c0b8-11e1-be3c-001d72f0ef22} 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294\PEV.DAT_{871da64d-c0b8-11e1-be3c-001d72f0ef22} 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294\PEV.DAT_{871da652-c0b8-11e1-be3c-001d72f0ef22} 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294\PEV.DAT_{871da657-c0b8-11e1-be3c-001d72f0ef22} 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294\PEV.DAT_{871da65c-c0b8-11e1-be3c-001d72f0ef22} 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294\PEV.DAT_{871da661-c0b8-11e1-be3c-001d72f0ef22} 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294\PEV.DAT_{871da666-c0b8-11e1-be3c-001d72f0ef22} 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294\PEV.DAT_{871da668-c0b8-11e1-be3c-001d72f0ef22} 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294\PEV.DAT_{871da66d-c0b8-11e1-be3c-001d72f0ef22} 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294\PEV.DAT_{871da672-c0b8-11e1-be3c-001d72f0ef22} 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294\PEV.DAT_{871da677-c0b8-11e1-be3c-001d72f0ef22} 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294\PEV.DAT_{871da67c-c0b8-11e1-be3c-001d72f0ef22} 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294\PEV.DAT_{871da681-c0b8-11e1-be3c-001d72f0ef22} 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294\PEV.DAT_{871da683-c0b8-11e1-be3c-001d72f0ef22} 0 bytes
File C:\avast! sandbox\S-1-5-21-1240495907-1012746745-2182913292-1000\r294\PEV.DAT_{871da688-c0b8-11e1-be3c-001d72f0ef22} 0 bytes
File C:\avast! sandbox\snx_rhive 262144 bytes
File C:\avast! sandbox\snx_rhive.LOG1 13312 bytes
File C:\avast! sandbox\snx_rhive.LOG2 0 bytes
File C:\avast! sandbox\snx_rhive{871da623-c0b8-11e1-be3c-001d72f0ef22}.TM.blf 65536 bytes
File C:\avast! sandbox\snx_rhive{871da623-c0b8-11e1-be3c-001d72f0ef22}.TMContainer00000000000000000001.regtrans-ms 524288 bytes
File C:\avast! sandbox\snx_rhive{871da623-c0b8-11e1-be3c-001d72f0ef22}.TMContainer00000000000000000002.regtrans-ms 524288 bytes
File C:\Users\Elizabeth\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\3TKKO4RK\369291_762914487_218030253_q[1].jpg 0 bytes
File C:\Users\Elizabeth\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\3TKKO4RK\565091_1802468561_388387886_q[1].jpg 0 bytes

---- EOF - GMER 1.0.15 ----

#3 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:09 PM

Posted 28 June 2012 - 12:06 AM

Greetings and Welcome to The Forums!!

My name is Gringo and I'll be glad to help you with your computer problems.

I have put together somethings for you to keep in mind while I am helping you to make things go easier and faster for both of us

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the Watch Topic Button, select Immediate Notification, and click on Proceed. This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of hartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

Security Check

  • Download Security Check by screen317 from here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.



Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links.
Link 1
Link 2
Link 3
1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#4 ~Polky

~Polky
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Behind the screen
  • Local time:02:09 PM

Posted 28 June 2012 - 08:13 PM

My computer did do the "Illegal operation attempted on a registery key that has been marked for deletion" error.
Otherwise, the programs ran without a hitch.

Now when I use IE9, it shows this type of windows:
Posted Image
I can't remember the last time it has shown me these windows.

Searches on IE9 seem to not redirect anymore. Same with Google Chrome.
However, I have said that before and it came back, and it is sporadic in nature to begin with.

Results of screen317's Security Check version 0.99.42
Windows Vista Service Pack 2 x86 (UAC is enabled)
Internet Explorer 9
``````````````Antivirus/Firewall Check:``````````````
Windows Firewall Enabled!
avast! Antivirus
Antivirus up to date!
`````````Anti-malware/Other Utilities Check:`````````
SpyHunter
TuneUp Utilities
TuneUp Utilities Language Pack (en-US)
CCleaner
Java™ 6 Update 29
Java version out of Date!
Adobe Flash Player 10 Flash Player out of Date!
Adobe Flash Player 10.2.159.1 Flash Player out of Date!
Adobe Reader X (10.1.3)
Google Chrome 13.0.782(17).112
Google Chrome 19.0.1084.52
Google Chrome 19.0.1084.56
````````Process Check: objlist.exe by Laurent````````
Windows Defender MSASCui.exe
Windows Defender MSASCui.exe
AVAST Software Avast AvastSvc.exe
AVAST Software Avast AvastUI.exe
`````````````````System Health check`````````````````
Total Fragmentation on Drive C: 1 %
````````````````````End of Log``````````````````````


ComboFix 12-06-28.03 - Elizabeth 06/28/2012 20:10:15.1.1 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.1976.869 [GMT -4:00]
Running from: c:\users\Elizabeth\Desktop\ComboFix.exe
AV: avast! Antivirus *Disabled/Updated* {2B2D1395-420B-D5C9-657E-930FE358FC3C}
SP: avast! Antivirus *Disabled/Updated* {904CF271-6431-DA47-5FCE-A87D98DFB681}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\ELIZAB~1\AppData\Local\Temp\1.tmp\F_IN_BOX.dll
c:\users\Elizabeth\AppData\Local\Temp\1.tmp\F_IN_BOX.dll
c:\users\Elizabeth\AppData\Roaming\.#
c:\users\Elizabeth\AppData\Roaming\.#\MBX@1190@352990.###
c:\users\Elizabeth\AppData\Roaming\.#\MBX@1190@3529C0.###
c:\users\Elizabeth\AppData\Roaming\.#\MBX@1190@3529F0.###
c:\users\Elizabeth\AppData\Roaming\.#\MBX@E24@172990.###
c:\users\Elizabeth\AppData\Roaming\.#\MBX@E24@1729C0.###
c:\users\Elizabeth\AppData\Roaming\.#\MBX@E24@1729F0.###
c:\windows\system32\drivers\etc\lmhosts
c:\windows\TEMP\logishrd\LVPrcInj01.dll
D:\install.exe
.
.
((((((((((((((((((((((((( Files Created from 2012-05-28 to 2012-06-29 )))))))))))))))))))))))))))))))
.
.
2012-06-29 00:20 . 2012-06-29 00:20 -------- d-----w- c:\users\Default\AppData\Local\temp
2012-06-27 05:18 . 2012-06-27 05:18 -------- d-----w- c:\program files\ESET
2012-06-27 04:16 . 2012-06-27 04:16 -------- dc----w- C:\TDSSKiller_Quarantine
2012-06-27 00:12 . 2012-05-31 03:41 6762896 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{0E30E822-B181-4352-B0FA-A8259F95641C}\mpengine.dll
2012-06-24 21:18 . 2012-06-24 21:18 110080 ----a-r- c:\users\Elizabeth\AppData\Roaming\Microsoft\Installer\{9E897D0F-F804-41A3-966C-7BB6EB5B6BE8}\IconCF33A0CE.exe
2012-06-24 21:18 . 2012-06-24 21:18 110080 ----a-r- c:\users\Elizabeth\AppData\Roaming\Microsoft\Installer\{9E897D0F-F804-41A3-966C-7BB6EB5B6BE8}\IconF7A21AF7.exe
2012-06-24 21:18 . 2012-06-24 21:18 110080 ----a-r- c:\users\Elizabeth\AppData\Roaming\Microsoft\Installer\{9E897D0F-F804-41A3-966C-7BB6EB5B6BE8}\IconD7F16134.exe
2012-06-24 21:18 . 2012-06-24 21:19 -------- dc----w- C:\sh4ldr
2012-06-24 21:18 . 2012-06-24 21:18 -------- d-----w- c:\program files\Enigma Software Group
2012-06-24 21:00 . 2012-06-24 21:00 -------- d-----w- c:\program files\HitmanPro
2012-06-24 20:58 . 2012-06-24 21:00 -------- d-----w- c:\programdata\HitmanPro
2012-06-23 21:19 . 2012-06-23 21:19 -------- d-----w- c:\program files\QuickTime
2012-06-23 04:35 . 2012-06-23 04:35 -------- d-----w- c:\users\Elizabeth\.thumbnails
2012-06-23 04:30 . 2012-06-23 04:30 -------- d-----w- c:\users\Elizabeth\AppData\Local\fontconfig
2012-06-23 04:29 . 2012-06-23 05:47 -------- d-----w- c:\users\Elizabeth\.gimp-2.8
2012-06-23 04:29 . 2012-06-23 04:29 -------- d-----w- c:\users\Elizabeth\AppData\Local\gegl-0.2
2012-06-23 04:22 . 2012-06-23 04:27 -------- d-----w- c:\program files\GIMP 2
2012-06-22 01:51 . 2012-06-22 03:25 -------- d-----w- c:\users\Elizabeth\AppData\Local\AutoWikiBrowser
2012-06-21 23:09 . 2012-06-02 22:19 53784 ----a-w- c:\windows\system32\wuauclt.exe
2012-06-21 23:09 . 2012-06-02 22:19 45080 ----a-w- c:\windows\system32\wups2.dll
2012-06-21 23:08 . 2012-06-02 22:19 1933848 ----a-w- c:\windows\system32\wuaueng.dll
2012-06-21 23:08 . 2012-06-02 22:12 2422272 ----a-w- c:\windows\system32\wucltux.dll
2012-06-21 23:08 . 2012-06-02 22:19 35864 ----a-w- c:\windows\system32\wups.dll
2012-06-21 23:08 . 2012-06-02 22:19 577048 ----a-w- c:\windows\system32\wuapi.dll
2012-06-21 23:08 . 2012-06-02 22:12 88576 ----a-w- c:\windows\system32\wudriver.dll
2012-06-21 23:08 . 2012-06-02 19:19 171904 ----a-w- c:\windows\system32\wuwebv.dll
2012-06-21 23:08 . 2012-06-02 19:12 33792 ----a-w- c:\windows\system32\wuapp.exe
2012-06-13 03:19 . 2012-04-23 16:00 984064 ----a-w- c:\windows\system32\crypt32.dll
2012-06-13 03:19 . 2012-04-23 16:00 133120 ----a-w- c:\windows\system32\cryptsvc.dll
2012-06-13 03:19 . 2012-04-23 16:00 98304 ----a-w- c:\windows\system32\cryptnet.dll
2012-06-13 03:19 . 2012-05-01 14:03 180736 ----a-w- c:\windows\system32\drivers\rdpwd.sys
2012-06-13 03:19 . 2012-05-15 19:51 2045440 ----a-w- c:\windows\system32\win32k.sys
2012-06-12 00:12 . 2012-06-12 00:12 -------- d-----w- c:\programdata\Yahoo!
2012-06-11 23:50 . 2012-06-11 23:59 -------- d-----w- c:\program files\Outspark
2012-06-09 02:32 . 2012-06-09 02:32 -------- d-----w- c:\program files\Amazon
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-06-12 02:54 . 2012-04-30 04:51 426184 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2012-06-12 02:54 . 2011-10-08 10:47 70344 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2012-04-03 08:16 . 2012-05-08 20:41 3602816 ----a-w- c:\windows\system32\ntkrnlpa.exe
2012-04-03 08:16 . 2012-05-08 20:41 3550080 ----a-w- c:\windows\system32\ntoskrnl.exe
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\00avast]
@="{472083B0-C522-11CF-8763-00608CC02F24}"
[HKEY_CLASSES_ROOT\CLSID\{472083B0-C522-11CF-8763-00608CC02F24}]
2012-03-06 23:15 123536 ----a-w- c:\program files\AVAST Software\Avast\ashShell.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\egisPSDP]
@="{30A0A3F6-38AC-4C53-BB8B-0D95238E25BA}"
[HKEY_CLASSES_ROOT\CLSID\{30A0A3F6-38AC-4C53-BB8B-0D95238E25BA}]
2008-05-15 01:05 121392 ----a-w- c:\program files\Acer\Empowering Technology\eDataSecurity\x86\PSDProtect.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Akamai NetSession Interface"="c:\users\Elizabeth\AppData\Local\Akamai\netsession_win.exe" [2012-05-26 4327744]
"HP Deskjet 3050A J611 series (NET)"="c:\program files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe" [2011-06-08 1804648]
"Messenger (Yahoo!)"="c:\progra~1\Yahoo!\Messenger\YahooMessenger.exe" [2012-05-25 6595928]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2008-04-25 1049896]
"RtHDVCpl"="RtHDVCpl.exe" [2008-06-13 6183456]
"Skytel"="Skytel.exe" [2007-11-21 1826816]
"PLFSetI"="c:\windows\PLFSetI.exe" [2008-07-30 200704]
"LManager"="c:\progra~1\LAUNCH~1\LManager.exe" [2008-09-10 809480]
"ePower_DMC"="c:\program files\Acer\Empowering Technology\ePower\ePower_DMC.exe" [2008-06-11 409600]
"Acer Assist Launcher"="c:\program files\Acer\Acer Assist\launcher.exe" [2007-11-19 1261568]
"InstaLAN"="c:\program files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe" [2010-03-02 1134488]
"WTClient"="WTClient.exe" [2007-04-11 40960]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2010-08-26 136216]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2010-08-26 171032]
"Persistence"="c:\windows\system32\igfxpers.exe" [2010-08-26 170520]
"Kernel and Hardware Abstraction Layer"="KHALMNPR.EXE" [2009-06-17 55824]
"SwitchBoard"="c:\program files\Common Files\Adobe\SwitchBoard\SwitchBoard.exe" [2010-02-19 517096]
"avast"="c:\program files\AVAST Software\Avast\avastUI.exe" [2012-03-06 4241512]
"LogitechQuickCamRibbon"="c:\program files\Logitech\Logitech WebCam Software\LWS.exe" [2009-10-14 2793304]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"AvgUninstallURL"="start http://www.avg.com/ww.special-uninstallation-feedback-appf?lic=NFVWSzItQUxZTUYtU0xLTFUtQVoyVUItNkdPS0ItSkhGTkg&inst=NzctNjA3MTkwNTg3LUZQOSs2LU4xRisxLVRCOSsyLUZMKzktRjEwTSs1LVFJWDErNC1YMjAxMCsyLUYxME0xMEQrMS1MSUMrNzctRkwxMCsxLVNQMSsxLVNVRCsxLVMxSSsxLVNVMysxLVRVRysz&prod=90&ver=10.0.1375" [?]
.
c:\users\Elizabeth\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
Digsby.lnk - c:\users\Elizabeth\AppData\Local\Digsby\App\digsby.exe [2010-3-3 141488]
Monitor Ink Alerts - HP Deskjet 3050A J611 series (Network).lnk - c:\windows\system32\RunDll32.exe [2006-11-2 44544]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Logitech SetPoint.lnk - c:\program files\Logitech\SetPoint\SetPoint.exe [2011-1-6 813584]
WDDMStatus.lnk - c:\program files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe [2011-3-9 3986944]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"aux1"=wdmaud.drv
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro36]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro36.sys]
@=""
.
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run-]
"Google Update"="c:\users\Elizabeth\AppData\Local\Google\Update\GoogleUpdate.exe" /c
"ehTray.exe"=c:\windows\ehome\ehTray.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
"Acer Product Registration"="c:\program files\Acer\Acer Registration\ACE1.exe" /startup
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 10.0\Reader\Reader_sl.exe"
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe"
"eDataSecurity Loader"=c:\program files\Acer\Empowering Technology\eDataSecurity\x86\eDSloader.exe
"BkupTray"="c:\program files\NewTech Infosystems\NTI Backup Now 5\BkupTray.exe"
"AdobeCS5ServiceManager"="c:\program files\Common Files\Adobe\CS5ServiceManager\CS5ServiceManager.exe" -launchedbylogin
"AdobeAAMUpdater-1.0"="c:\program files\Common Files\Adobe\OOBE\PDApp\UWA\UpdaterStartupUtility.exe"
"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe"
"HP Software Update"=c:\program files\Hp\HP Software Update\HPWuSchd2.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001
.
R3 1394hub;1394 Enabled Hub;c:\windows\System32\svchost.exe [x]
S2 AdobeARMservice;Adobe Acrobat Update Service;c:\program files\Common Files\Adobe\ARM\1.0\armsvc.exe [x]
.
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - WS2IFSL
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
Akamai REG_MULTI_SZ Akamai
.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost - NetSvcs
UxTuneUp
.
Contents of the 'Scheduled Tasks' folder
.
2012-06-29 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-09-07 07:06]
.
2012-06-28 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-09-07 07:06]
.
2012-06-28 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1240495907-1012746745-2182913292-1000Core.job
- c:\users\Elizabeth\AppData\Local\Google\Update\GoogleUpdate.exe [2010-12-04 16:41]
.
2012-06-28 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1240495907-1012746745-2182913292-1000UA.job
- c:\users\Elizabeth\AppData\Local\Google\Update\GoogleUpdate.exe [2010-12-04 16:41]
.
.
------- Supplementary Scan -------
.
uStart Page = about:blank
mStart Page = hxxp://homepage.acer.com/rdr.aspx?b=ACAW&l=0409&s=2&o=vp32&d=0109&m=aspire_5335
uInternet Settings,ProxyOverride = 127.0.0.1:9421;<local>
TCP: DhcpNameServer = 192.168.2.1
.
- - - - ORPHANS REMOVED - - - -
.
Toolbar-{CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)
WebBrowser-{CCC7A320-B3CA-4199-B1A6-9F516DD69829} - (no file)
SafeBoot-39186595.sys
SafeBoot-mcmscsvc
SafeBoot-MCODS
MSConfigStartUp-PC SpeedScan Pro - c:\program files\Ascentive\PC SpeedScan Pro\PCSpeedScan.exe
MSConfigStartUp-Performance Center - c:\program files\Ascentive\Performance Center\APCMain.exe
.
.
.
**************************************************************************
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files:
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Services\npggsvc]
"ImagePath"="c:\windows\system32\GameMon.des -service"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\Approved Extensions]
@Denied: (2) (LocalSystem)
"{5CBE3B7C-1E47-477E-A7DD-396DB0476E29}"=hex:51,66,7a,6c,4c,1d,38,12,12,38,ad,
58,75,50,10,02,d8,cb,7a,2d,b5,19,2a,3d
"{18DF081C-E8AD-4283-A596-FA578C2EBDC3}"=hex:51,66,7a,6c,4c,1d,38,12,72,0b,cc,
1c,9f,a6,ed,07,da,80,b9,17,89,70,f9,d7
"{72853161-30C5-4D22-B7F9-0BBC1D38A37E}"=hex:51,66,7a,6c,4c,1d,38,12,0f,32,96,
76,f7,7e,4c,08,c8,ef,48,fc,18,66,e7,6a
"{83A2F9B1-01A2-4AA5-87D1-45B6B8505E96}"=hex:51,66,7a,6c,4c,1d,38,12,df,fa,b1,
87,90,4f,cb,0f,f8,c7,06,f6,bd,0e,1a,82
"{DBC80044-A445-435B-BC74-9C25C1C588A9}"=hex:51,66,7a,6c,4c,1d,38,12,2a,03,db,
df,77,ea,35,06,c3,62,df,65,c4,9b,cc,bd
"{2A541AE1-5BF6-4665-A8A3-CFA9672E4291}"=hex:51,66,7a,6c,4c,1d,38,12,8f,19,47,
2e,c4,15,0b,03,d7,b5,8c,e9,62,70,06,85
"{32004B8A-44A9-43E7-84E9-808838809519}"=hex:51,66,7a,6c,4c,1d,38,12,e4,48,13,
36,9b,0a,89,06,fb,ff,c3,c8,3d,de,d1,0d
"{FF059E31-CC5A-4E2E-BF3B-96E929D65503}"=hex:51,66,7a,6c,4c,1d,38,12,5f,9d,16,
fb,68,82,40,0b,c0,2d,d5,a9,2c,88,11,17
"{BDEADE7F-C265-11D0-BCED-00A0C90AB50F}"=hex:51,66,7a,6c,4c,1d,38,12,11,dd,f9,
b9,57,8c,be,54,c3,fb,43,e0,cc,54,f1,1b
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration]
@Denied: (2) (LocalSystem)
"Timestamp"=hex:20,a8,7a,81,4f,09,cc,01
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (LocalSystem)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,e9,5d,e3,1b,0c,a0,94,4c,b5,30,2f,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,e9,5d,e3,1b,0c,a0,94,4c,b5,30,2f,\
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'Explorer.exe'(916)
c:\program files\Acer\Empowering Technology\eDataSecurity\x86\PSDProtect.dll
c:\program files\Acer\Empowering Technology\eDataSecurity\x86\sysenv.dll
c:\windows\system32\authui.dll
c:\windows\ehome\ehSSO.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\System32\QAgent.dll
.
------------------------ Other Running Processes ------------------------
.
c:\progra~1\ENIGMA~1\SPYHUN~1\SH4SER~1.EXE
c:\program files\AVAST Software\Avast\AvastSvc.exe
c:\program files\Belkin\Router Setup and Monitor\BelkinService.exe
c:\windows\system32\agrsmsvc.exe
c:\program files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe
c:\program files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe
c:\program files\Acer\Empowering Technology\Service\ETService.exe
c:\program files\Common Files\LightScribe\LSSrvc.exe
c:\program files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe
c:\acer\Mobility Center\MobilityService.exe
c:\program files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe
c:\program files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe
c:\program files\TuneUp Utilities 2010\TuneUpUtilitiesService32.exe
c:\program files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe
c:\program files\Western Digital\WD SmartWare\Front Parlor\WDFME\WDFME.exe
c:\program files\Western Digital\WD SmartWare\Front Parlor\WDSC.exe
c:\windows\System32\Drivers\WTSRV.EXE
c:\windows\system32\wbem\unsecapp.exe
c:\program files\TuneUp Utilities 2010\TuneUpUtilitiesApp32.exe
c:\windows\system32\WTClient.exe
c:\windows\system32\igfxsrvc.exe
c:\program files\Common Files\Microsoft Shared\Ink\InputPersonalization.exe
.
**************************************************************************
.
Completion time: 2012-06-28 20:44:20 - machine was rebooted
ComboFix-quarantined-files.txt 2012-06-29 00:44
.
Pre-Run: 25,928,896,512 bytes free
Post-Run: 26,139,537,408 bytes free
.
- - End Of File - - 158EBDFBF1B90C7B2C56A6A1AB6DB9D6

Thank you for your assistance this far. It is much appreciated.

#5 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:09 PM

Posted 28 June 2012 - 09:55 PM

Greetings

I want you to run these next,

tdsskiller:

Please read carefully and follow these steps.
  • Download TDSSKiller and save it to your Desktop.
  • doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.

Please download aswMBR to your desktop.
  • Double click the aswMBR.exe icon to run it
  • it will ask to download extra definitions - ALLOW IT
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.

If you have any problems running either one come back and let me know

please reply with the reports from TDSSKiller and aswMBR

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:09 PM

Posted 01 July 2012 - 12:04 AM

Greetings


I have not heard from you in a couple of days so I am coming by to check on you to see if you are having problems or you just need some more time.

Also to remind you that it is very important that we finish the process completely so as to not get reinfected. I will let you know when we are complete and I will ask to remove our tools




Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 ~Polky

~Polky
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Behind the screen
  • Local time:02:09 PM

Posted 03 July 2012 - 11:54 AM

Ah, sorry for the delay. I was assaulted by the sun and have been spending all of my free time trying to nap the pain away.
I'm starting the TDSSKiller and aswMBR now.

#8 ~Polky

~Polky
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Behind the screen
  • Local time:02:09 PM

Posted 03 July 2012 - 01:18 PM

12:56:57.0336 6096 TDSS rootkit removing tool 2.7.44.0 Jul 2 2012 20:01:08
12:56:59.0348 6096 ============================================================
12:56:59.0348 6096 Current date / time: 2012/07/03 12:56:59.0348
12:56:59.0348 6096 SystemInfo:
12:56:59.0348 6096
12:56:59.0348 6096 OS Version: 6.0.6002 ServicePack: 2.0
12:56:59.0348 6096 Product type: Workstation
12:56:59.0348 6096 ComputerName: SCIENCE-PC
12:56:59.0348 6096 UserName: Elizabeth
12:56:59.0348 6096 Windows directory: C:\Windows
12:56:59.0348 6096 System windows directory: C:\Windows
12:56:59.0348 6096 Processor architecture: Intel x86
12:56:59.0348 6096 Number of processors: 1
12:56:59.0348 6096 Page size: 0x1000
12:56:59.0348 6096 Boot type: Normal boot
12:56:59.0348 6096 ============================================================
12:57:01.0438 6096 Drive \Device\Harddisk0\DR0 - Size: 0x25433D6000 (149.05 Gb), SectorSize: 0x200, Cylinders: 0x4C01, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000050
12:57:01.0438 6096 ============================================================
12:57:01.0438 6096 \Device\Harddisk0\DR0:
12:57:01.0485 6096 MBR partitions:
12:57:01.0485 6096 \Device\Harddisk0\DR0\Partition0: MBR, Type 0x7, StartLBA 0x1388800, BlocksNum 0x8B4A800
12:57:01.0485 6096 \Device\Harddisk0\DR0\Partition1: MBR, Type 0x7, StartLBA 0x9ED3000, BlocksNum 0x8B46000
12:57:01.0485 6096 ============================================================
12:57:01.0782 6096 C: <-> \Device\Harddisk0\DR0\Partition0
12:57:01.0906 6096 D: <-> \Device\Harddisk0\DR0\Partition1
12:57:01.0906 6096 ============================================================
12:57:01.0906 6096 Initialize success
12:57:01.0906 6096 ============================================================
12:57:04.0231 3944 ============================================================
12:57:04.0231 3944 Scan started
12:57:04.0231 3944 Mode: Manual;
12:57:04.0231 3944 ============================================================
12:57:07.0554 3944 1394hub - ok
12:57:07.0741 3944 ACPI (82b296ae1892fe3dbee00c9cf92f8ac7) C:\Windows\system32\drivers\acpi.sys
12:57:07.0741 3944 ACPI - ok
12:57:07.0928 3944 AdobeARMservice (62b7936f9036dd6ed36e6a7efa805dc0) C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe
12:57:07.0928 3944 AdobeARMservice - ok
12:57:08.0037 3944 adp94xx (04f0fcac69c7c71a3ac4eb97fafc8303) C:\Windows\system32\drivers\adp94xx.sys
12:57:08.0037 3944 adp94xx - ok
12:57:08.0162 3944 adpahci (60505e0041f7751bdbb80f88bf45c2ce) C:\Windows\system32\drivers\adpahci.sys
12:57:08.0162 3944 adpahci - ok
12:57:08.0334 3944 adpu160m (8a42779b02aec986eab64ecfc98f8bd7) C:\Windows\system32\drivers\adpu160m.sys
12:57:08.0334 3944 adpu160m - ok
12:57:08.0396 3944 adpu320 (241c9e37f8ce45ef51c3de27515ca4e5) C:\Windows\system32\drivers\adpu320.sys
12:57:08.0396 3944 adpu320 - ok
12:57:08.0443 3944 AeLookupSvc (9d1fda9e086ba64e3c93c9de32461bcf) C:\Windows\System32\aelupsvc.dll
12:57:08.0443 3944 AeLookupSvc - ok
12:57:08.0521 3944 AFD (3911b972b55fea0478476b2e777b29fa) C:\Windows\system32\drivers\afd.sys
12:57:08.0521 3944 AFD - ok
12:57:08.0817 3944 AffinegyService (1f350a64215497122c4c48c615230c8e) C:\Program Files\Belkin\Router Setup and Monitor\BelkinService.exe
12:57:08.0833 3944 AffinegyService - ok
12:57:08.0864 3944 AgereModemAudio (efbc44fbd75e4f80bd927aebf6e7eade) C:\Windows\system32\agrsmsvc.exe
12:57:08.0864 3944 AgereModemAudio - ok
12:57:09.0223 3944 AgereSoftModem (38325c6aa8eae011897d61ce48ec6435) C:\Windows\system32\DRIVERS\AGRSM.sys
12:57:09.0238 3944 AgereSoftModem - ok
12:57:09.0831 3944 agp440 (13f9e33747e6b41a3ff305c37db0d360) C:\Windows\system32\drivers\agp440.sys
12:57:09.0831 3944 agp440 - ok
12:57:09.0847 3944 aic78xx (ae1fdf7bf7bb6c6a70f67699d880592a) C:\Windows\system32\drivers\djsvs.sys
12:57:09.0847 3944 aic78xx - ok
12:57:09.0909 3944 ALG (a1545b731579895d8cc44fc0481c1192) C:\Windows\System32\alg.exe
12:57:09.0909 3944 ALG - ok
12:57:09.0956 3944 aliide (9eaef5fc9b8e351afa7e78a6fae91f91) C:\Windows\system32\drivers\aliide.sys
12:57:09.0956 3944 aliide - ok
12:57:09.0972 3944 amdagp (c47344bc706e5f0b9dce369516661578) C:\Windows\system32\drivers\amdagp.sys
12:57:09.0987 3944 amdagp - ok
12:57:10.0003 3944 amdide (9b78a39a4c173fdbc1321e0dd659b34c) C:\Windows\system32\drivers\amdide.sys
12:57:10.0018 3944 amdide - ok
12:57:10.0034 3944 AmdK7 (18f29b49ad23ecee3d2a826c725c8d48) C:\Windows\system32\drivers\amdk7.sys
12:57:10.0034 3944 AmdK7 - ok
12:57:10.0065 3944 AmdK8 (93ae7f7dd54ab986a6f1a1b37be7442d) C:\Windows\system32\drivers\amdk8.sys
12:57:10.0065 3944 AmdK8 - ok
12:57:10.0112 3944 Appinfo (c6d704c7f0434dc791aac37cac4b6e14) C:\Windows\System32\appinfo.dll
12:57:10.0112 3944 Appinfo - ok
12:57:10.0206 3944 arc (5d2888182fb46632511acee92fdad522) C:\Windows\system32\drivers\arc.sys
12:57:10.0206 3944 arc - ok
12:57:10.0221 3944 arcsas (5e2a321bd7c8b3624e41fdec3e244945) C:\Windows\system32\drivers\arcsas.sys
12:57:10.0237 3944 arcsas - ok
12:57:10.0315 3944 aswFsBlk (0ae43c6c411254049279c2ee55630f95) C:\Windows\system32\drivers\aswFsBlk.sys
12:57:10.0315 3944 aswFsBlk - ok
12:57:10.0330 3944 aswMonFlt (6693141560b1615d8dccf0d8eb00087e) C:\Windows\system32\drivers\aswMonFlt.sys
12:57:10.0330 3944 aswMonFlt - ok
12:57:10.0393 3944 aswRdr (da12626fd9a67f4e917e2f2fbe1e1764) C:\Windows\system32\drivers\aswRdr.sys
12:57:10.0408 3944 aswRdr - ok
12:57:10.0596 3944 aswSnx (dcb199b967375753b5019ec15f008f53) C:\Windows\system32\drivers\aswSnx.sys
12:57:10.0627 3944 aswSnx - ok
12:57:10.0720 3944 aswSP (b32873e5a1443c0a1e322266e203bf10) C:\Windows\system32\drivers\aswSP.sys
12:57:10.0720 3944 aswSP - ok
12:57:10.0752 3944 aswTdi (6ff544175a9180c5d88534d3d9c9a9f7) C:\Windows\system32\drivers\aswTdi.sys
12:57:10.0752 3944 aswTdi - ok
12:57:10.0814 3944 AsyncMac (53b202abee6455406254444303e87be1) C:\Windows\system32\DRIVERS\asyncmac.sys
12:57:10.0814 3944 AsyncMac - ok
12:57:10.0908 3944 atapi (1f05b78ab91c9075565a9d8a4b880bc4) C:\Windows\system32\drivers\atapi.sys
12:57:10.0923 3944 atapi - ok
12:57:10.0970 3944 AudioEndpointBuilder (68e2a1a0407a66cf50da0300852424ab) C:\Windows\System32\Audiosrv.dll
12:57:10.0970 3944 AudioEndpointBuilder - ok
12:57:10.0986 3944 Audiosrv (68e2a1a0407a66cf50da0300852424ab) C:\Windows\System32\Audiosrv.dll
12:57:10.0986 3944 Audiosrv - ok
12:57:11.0204 3944 avast! Antivirus (4041d31508a2a084dfb42c595854090f) C:\Program Files\AVAST Software\Avast\AvastSvc.exe
12:57:11.0204 3944 avast! Antivirus - ok
12:57:11.0266 3944 avast! Firewall - ok
12:57:11.0313 3944 b57nd60x (502f1c30bd50b32d00ce4dcaecc3d3c7) C:\Windows\system32\DRIVERS\b57nd60x.sys
12:57:11.0313 3944 b57nd60x - ok
12:57:11.0391 3944 Beep (67e506b75bd5326a3ec7b70bd014dfb6) C:\Windows\system32\drivers\Beep.sys
12:57:11.0391 3944 Beep - ok
12:57:11.0547 3944 BFE (c789af0f724fda5852fb9a7d3a432381) C:\Windows\System32\bfe.dll
12:57:11.0547 3944 BFE - ok
12:57:11.0719 3944 BITS (93952506c6d67330367f7e7934b6a02f) C:\Windows\system32\qmgr.dll
12:57:11.0734 3944 BITS - ok
12:57:11.0812 3944 blbdrive (d4df28447741fd3d953526e33a617397) C:\Windows\system32\drivers\blbdrive.sys
12:57:11.0828 3944 blbdrive - ok
12:57:11.0859 3944 bowser (35f376253f687bde63976ccb3f2108ca) C:\Windows\system32\DRIVERS\bowser.sys
12:57:11.0859 3944 bowser - ok
12:57:11.0890 3944 BrFiltLo (9f9acc7f7ccde8a15c282d3f88b43309) C:\Windows\system32\drivers\brfiltlo.sys
12:57:11.0906 3944 BrFiltLo - ok
12:57:11.0922 3944 BrFiltUp (56801ad62213a41f6497f96dee83755a) C:\Windows\system32\drivers\brfiltup.sys
12:57:11.0922 3944 BrFiltUp - ok
12:57:11.0984 3944 Browser (a3629a0c4226f9e9c72faaeebc3ad33c) C:\Windows\System32\browser.dll
12:57:11.0984 3944 Browser - ok
12:57:12.0109 3944 Brserid (b304e75cff293029eddf094246747113) C:\Windows\system32\drivers\brserid.sys
12:57:12.0109 3944 Brserid - ok
12:57:12.0140 3944 BrSerWdm (203f0b1e73adadbbb7b7b1fabd901f6b) C:\Windows\system32\drivers\brserwdm.sys
12:57:12.0140 3944 BrSerWdm - ok
12:57:12.0171 3944 BrUsbMdm (bd456606156ba17e60a04e18016ae54b) C:\Windows\system32\drivers\brusbmdm.sys
12:57:12.0171 3944 BrUsbMdm - ok
12:57:12.0202 3944 BrUsbSer (af72ed54503f717a43268b3cc5faec2e) C:\Windows\system32\drivers\brusbser.sys
12:57:12.0202 3944 BrUsbSer - ok
12:57:12.0374 3944 BTHMODEM (ad07c1ec6665b8b35741ab91200c6b68) C:\Windows\system32\drivers\bthmodem.sys
12:57:12.0390 3944 BTHMODEM - ok
12:57:12.0764 3944 BUNAgentSvc (09e6affae6c0e9158bf05c7d08d0107a) C:\Program Files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe
12:57:12.0764 3944 BUNAgentSvc - ok
12:57:12.0920 3944 catchme - ok
12:57:12.0982 3944 cdfs (7add03e75beb9e6dd102c3081d29840a) C:\Windows\system32\DRIVERS\cdfs.sys
12:57:12.0982 3944 cdfs - ok
12:57:13.0014 3944 cdrom (6b4bffb9becd728097024276430db314) C:\Windows\system32\DRIVERS\cdrom.sys
12:57:13.0029 3944 cdrom - ok
12:57:13.0060 3944 CertPropSvc (312ec3e37a0a1f2006534913e37b4423) C:\Windows\System32\certprop.dll
12:57:13.0060 3944 CertPropSvc - ok
12:57:13.0107 3944 circlass (e5d4133f37219dbcfe102bc61072589d) C:\Windows\system32\drivers\circlass.sys
12:57:13.0107 3944 circlass - ok
12:57:13.0201 3944 CLFS (d7659d3b5b92c31e84e53c1431f35132) C:\Windows\system32\CLFS.sys
12:57:13.0201 3944 CLFS - ok
12:57:13.0279 3944 clr_optimization_v2.0.50727_32 (8ee772032e2fe80a924f3b8dd5082194) C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
12:57:13.0294 3944 clr_optimization_v2.0.50727_32 - ok
12:57:13.0404 3944 clr_optimization_v4.0.30319_32 (c5a75eb48e2344abdc162bda79e16841) C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
12:57:13.0450 3944 clr_optimization_v4.0.30319_32 - ok
12:57:13.0482 3944 CmBatt (99afc3795b58cc478fbbbcdc658fcb56) C:\Windows\system32\DRIVERS\CmBatt.sys
12:57:13.0482 3944 CmBatt - ok
12:57:13.0513 3944 cmdide (0ca25e686a4928484e9fdabd168ab629) C:\Windows\system32\drivers\cmdide.sys
12:57:13.0513 3944 cmdide - ok
12:57:13.0544 3944 Compbatt (6afef0b60fa25de07c0968983ee4f60a) C:\Windows\system32\DRIVERS\compbatt.sys
12:57:13.0544 3944 Compbatt - ok
12:57:13.0544 3944 COMSysApp - ok
12:57:13.0591 3944 crcdisk (741e9dff4f42d2d8477d0fc1dc0df871) C:\Windows\system32\drivers\crcdisk.sys
12:57:13.0591 3944 crcdisk - ok
12:57:13.0653 3944 Crusoe (1f07becdca750766a96cda811ba86410) C:\Windows\system32\drivers\crusoe.sys
12:57:13.0669 3944 Crusoe - ok
12:57:13.0716 3944 CryptSvc (75c6a297e364014840b48eccd7525e30) C:\Windows\system32\cryptsvc.dll
12:57:13.0731 3944 CryptSvc - ok
12:57:13.0809 3944 DcomLaunch (3b5b4d53fec14f7476ca29a20cc31ac9) C:\Windows\system32\rpcss.dll
12:57:13.0825 3944 DcomLaunch - ok
12:57:13.0872 3944 DfsC (622c41a07ca7e6dd91770f50d532cb6c) C:\Windows\system32\Drivers\dfsc.sys
12:57:13.0872 3944 DfsC - ok
12:57:14.0184 3944 DFSR (2cc3dcfb533a1035b13dcab6160ab38b) C:\Windows\system32\DFSR.exe
12:57:14.0293 3944 DFSR - ok
12:57:14.0574 3944 Dhcp (9028559c132146fb75eb7acf384b086a) C:\Windows\System32\dhcpcsvc.dll
12:57:14.0574 3944 Dhcp - ok
12:57:14.0620 3944 disk (5d4aefc3386920236a548271f8f1af6a) C:\Windows\system32\drivers\disk.sys
12:57:14.0620 3944 disk - ok
12:57:14.0652 3944 DKbFltr (73baf270d24fe726b9cd7f80bb17a23d) C:\Windows\system32\DRIVERS\DKbFltr.sys
12:57:14.0652 3944 DKbFltr - ok
12:57:14.0730 3944 Dnscache (57d762f6f5974af0da2be88a3349baaa) C:\Windows\System32\dnsrslvr.dll
12:57:14.0730 3944 Dnscache - ok
12:57:14.0839 3944 dot3svc (324fd74686b1ef5e7c19a8af49e748f6) C:\Windows\System32\dot3svc.dll
12:57:14.0839 3944 dot3svc - ok
12:57:14.0870 3944 DPS (a622e888f8aa2f6b49e9bc466f0e5def) C:\Windows\system32\dps.dll
12:57:14.0870 3944 DPS - ok
12:57:14.0901 3944 drmkaud (97fef831ab90bee128c9af390e243f80) C:\Windows\system32\drivers\drmkaud.sys
12:57:14.0901 3944 drmkaud - ok
12:57:14.0901 3944 dump_wmimmc - ok
12:57:15.0010 3944 DXGKrnl (c68ac676b0ef30cfbb1080adce49eb1f) C:\Windows\System32\drivers\dxgkrnl.sys
12:57:15.0026 3944 DXGKrnl - ok
12:57:15.0104 3944 E1G60 (5425f74ac0c1dbd96a1e04f17d63f94c) C:\Windows\system32\DRIVERS\E1G60I32.sys
12:57:15.0104 3944 E1G60 - ok
12:57:15.0135 3944 EapHost (c0b95e40d85cd807d614e264248a45b9) C:\Windows\System32\eapsvc.dll
12:57:15.0151 3944 EapHost - ok
12:57:15.0198 3944 Ecache (7f64ea048dcfac7acf8b4d7b4e6fe371) C:\Windows\system32\drivers\ecache.sys
12:57:15.0198 3944 Ecache - ok
12:57:15.0634 3944 eDataSecurity Service (2ce2ddcb1a41ed4488a2a8b98d286b3d) C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe
12:57:15.0634 3944 eDataSecurity Service - ok
12:57:15.0775 3944 ehRecvr (9be3744d295a7701eb425332014f0797) C:\Windows\ehome\ehRecvr.exe
12:57:15.0775 3944 ehRecvr - ok
12:57:15.0790 3944 ehSched (ad1870c8e5d6dd340c829e6074bf3c3f) C:\Windows\ehome\ehsched.exe
12:57:15.0790 3944 ehSched - ok
12:57:15.0853 3944 ehstart (c27c4ee8926e74aa72efcab24c5242c3) C:\Windows\ehome\ehstart.dll
12:57:15.0853 3944 ehstart - ok
12:57:16.0180 3944 elxstor (23b62471681a124889978f6295b3f4c6) C:\Windows\system32\drivers\elxstor.sys
12:57:16.0196 3944 elxstor - ok
12:57:16.0336 3944 EMDMgmt (4e6b23dfc917ea39306b529b773950f4) C:\Windows\system32\emdmgmt.dll
12:57:16.0383 3944 EMDMgmt - ok
12:57:16.0414 3944 ErrDev (3db974f3935483555d7148663f726c61) C:\Windows\system32\drivers\errdev.sys
12:57:16.0414 3944 ErrDev - ok
12:57:16.0508 3944 esgiguard (2407b8164e966755bc6a4242fc9de31e) C:\Program Files\Enigma Software Group\SpyHunter\esgiguard.sys
12:57:16.0508 3944 esgiguard - ok
12:57:16.0617 3944 ETService (a51fd9df23720485991f56741bbefcfb) C:\Program Files\Acer\Empowering Technology\Service\ETService.exe
12:57:16.0617 3944 ETService - ok
12:57:16.0695 3944 EventSystem (67058c46504bc12d821f38cf99b7b28f) C:\Windows\system32\es.dll
12:57:16.0711 3944 EventSystem - ok
12:57:16.0789 3944 exfat (22b408651f9123527bcee54b4f6c5cae) C:\Windows\system32\drivers\exfat.sys
12:57:16.0804 3944 exfat - ok
12:57:16.0851 3944 fastfat (1e9b9a70d332103c52995e957dc09ef8) C:\Windows\system32\drivers\fastfat.sys
12:57:16.0851 3944 fastfat - ok
12:57:16.0882 3944 fdc (afe1e8b9782a0dd7fb46bbd88e43f89a) C:\Windows\system32\DRIVERS\fdc.sys
12:57:16.0882 3944 fdc - ok
12:57:16.0914 3944 fdPHost (6629b5f0e98151f4afdd87567ea32ba3) C:\Windows\system32\fdPHost.dll
12:57:16.0929 3944 fdPHost - ok
12:57:17.0038 3944 FDResPub (89ed56dce8e47af40892778a5bd31fd2) C:\Windows\system32\fdrespub.dll
12:57:17.0038 3944 FDResPub - ok
12:57:17.0210 3944 FileInfo (a8c0139a884861e3aae9cfe73b208a9f) C:\Windows\system32\drivers\fileinfo.sys
12:57:17.0226 3944 FileInfo - ok
12:57:17.0257 3944 Filetrace (0ae429a696aecbc5970e3cf2c62635ae) C:\Windows\system32\drivers\filetrace.sys
12:57:17.0257 3944 Filetrace - ok
12:57:17.0304 3944 flpydisk (85b7cf99d532820495d68d747fda9ebd) C:\Windows\system32\DRIVERS\flpydisk.sys
12:57:17.0304 3944 flpydisk - ok
12:57:17.0382 3944 FltMgr (01334f9ea68e6877c4ef05d3ea8abb05) C:\Windows\system32\drivers\fltmgr.sys
12:57:17.0382 3944 FltMgr - ok
12:57:17.0584 3944 FontCache (8ce364388c8eca59b14b539179276d44) C:\Windows\system32\FntCache.dll
12:57:17.0600 3944 FontCache - ok
12:57:17.0678 3944 FontCache3.0.0.0 (c7fbdd1ed42f82bfa35167a5c9803ea3) C:\Windows\Microsoft.Net\Framework\v3.0\WPF\PresentationFontCache.exe
12:57:17.0678 3944 FontCache3.0.0.0 - ok
12:57:17.0725 3944 Fs_Rec (b972a66758577e0bfd1de0f91aaa27b5) C:\Windows\system32\drivers\Fs_Rec.sys
12:57:17.0756 3944 Fs_Rec - ok
12:57:17.0818 3944 gagp30kx (34582a6e6573d54a07ece5fe24a126b5) C:\Windows\system32\drivers\gagp30kx.sys
12:57:17.0818 3944 gagp30kx - ok
12:57:17.0928 3944 gpsvc (cd5d0aeee35dfd4e986a5aa1500a6e66) C:\Windows\System32\gpsvc.dll
12:57:17.0959 3944 gpsvc - ok
12:57:18.0052 3944 gupdate1ca2f89daf62d40 (626a24ed1228580b9518c01930936df9) C:\Program Files\Google\Update\GoogleUpdate.exe
12:57:18.0052 3944 gupdate1ca2f89daf62d40 - ok
12:57:18.0068 3944 gupdatem (626a24ed1228580b9518c01930936df9) C:\Program Files\Google\Update\GoogleUpdate.exe
12:57:18.0068 3944 gupdatem - ok
12:57:18.0240 3944 HdAudAddService (cb04c744be0a61b1d648faed182c3b59) C:\Windows\system32\drivers\HdAudio.sys
12:57:18.0240 3944 HdAudAddService - ok
12:57:18.0380 3944 HDAudBus (062452b7ffd68c8c042a6261fe8dff4a) C:\Windows\system32\DRIVERS\HDAudBus.sys
12:57:18.0396 3944 HDAudBus - ok
12:57:18.0489 3944 HidBth (1338520e78d90154ed6be8f84de5fceb) C:\Windows\system32\drivers\hidbth.sys
12:57:18.0489 3944 HidBth - ok
12:57:18.0505 3944 HidIr (ff3160c3a2445128c5a6d9b076da519e) C:\Windows\system32\drivers\hidir.sys
12:57:18.0505 3944 HidIr - ok
12:57:18.0567 3944 hidserv (84067081f3318162797385e11a8f0582) C:\Windows\System32\hidserv.dll
12:57:18.0583 3944 hidserv - ok
12:57:18.0630 3944 HidUsb (cca4b519b17e23a00b826c55716809cc) C:\Windows\system32\DRIVERS\hidusb.sys
12:57:18.0630 3944 HidUsb - ok
12:57:18.0676 3944 hkmsvc (d8ad255b37da92434c26e4876db7d418) C:\Windows\system32\kmsvc.dll
12:57:18.0676 3944 hkmsvc - ok
12:57:18.0708 3944 HpCISSs (16ee7b23a009e00d835cdb79574a91a6) C:\Windows\system32\drivers\hpcisss.sys
12:57:18.0708 3944 HpCISSs - ok
12:57:18.0754 3944 HSFHWAZL (46d67209550973257601a533e2ac5785) C:\Windows\system32\DRIVERS\VSTAZL3.SYS
12:57:18.0754 3944 HSFHWAZL - ok
12:57:18.0926 3944 HSF_DPV (ec36f1d542ed4252390d446bf6d4dfd0) C:\Windows\system32\DRIVERS\VSTDPV3.SYS
12:57:18.0942 3944 HSF_DPV - ok
12:57:19.0051 3944 HTTP (f870aa3e254628ebeafe754108d664de) C:\Windows\system32\drivers\HTTP.sys
12:57:19.0066 3944 HTTP - ok
12:57:19.0082 3944 i2omp (c6b032d69650985468160fc9937cf5b4) C:\Windows\system32\drivers\i2omp.sys
12:57:19.0082 3944 i2omp - ok
12:57:19.0098 3944 i8042prt (22d56c8184586b7a1f6fa60be5f5a2bd) C:\Windows\system32\DRIVERS\i8042prt.sys
12:57:19.0098 3944 i8042prt - ok
12:57:19.0160 3944 iaStorV (54155ea1b0df185878e0fc9ec3ac3a14) C:\Windows\system32\drivers\iastorv.sys
12:57:19.0160 3944 iaStorV - ok
12:57:19.0347 3944 idsvc (98477b08e61945f974ed9fdc4cb6bdab) C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe
12:57:19.0363 3944 idsvc - ok
12:57:21.0126 3944 igfx (8266ae06df974e5ba047b3e9e9e70b3f) C:\Windows\system32\DRIVERS\igdkmd32.sys
12:57:21.0375 3944 igfx - ok
12:57:21.0703 3944 iirsp (2d077bf86e843f901d8db709c95b49a5) C:\Windows\system32\drivers\iirsp.sys
12:57:21.0703 3944 iirsp - ok
12:57:21.0781 3944 IKEEXT (9908d8a397b76cd8d31d0d383c5773c9) C:\Windows\System32\ikeext.dll
12:57:21.0796 3944 IKEEXT - ok
12:57:21.0843 3944 int15 (c6e5276c00ebdeb096bb5ef4b797d1b6) C:\Windows\system32\drivers\int15.sys
12:57:21.0843 3944 int15 - ok
12:57:22.0249 3944 IntcAzAudAddService (23ebcee9aaa4d6c88728791fab462456) C:\Windows\system32\drivers\RTKVHDA.sys
12:57:22.0311 3944 IntcAzAudAddService - ok
12:57:22.0530 3944 intelide (83aa759f3189e6370c30de5dc5590718) C:\Windows\system32\drivers\intelide.sys
12:57:22.0530 3944 intelide - ok
12:57:22.0561 3944 intelppm (224191001e78c89dfa78924c3ea595ff) C:\Windows\system32\DRIVERS\intelppm.sys
12:57:22.0561 3944 intelppm - ok
12:57:22.0592 3944 IPBusEnum (9ac218c6e6105477484c6fdbe7d409a4) C:\Windows\system32\ipbusenum.dll
12:57:22.0592 3944 IPBusEnum - ok
12:57:22.0623 3944 IpFilterDriver (62c265c38769b864cb25b4bcf62df6c3) C:\Windows\system32\DRIVERS\ipfltdrv.sys
12:57:22.0623 3944 IpFilterDriver - ok
12:57:22.0717 3944 iphlpsvc (1998bd97f950680bb55f55a7244679c2) C:\Windows\System32\iphlpsvc.dll
12:57:22.0717 3944 iphlpsvc - ok
12:57:22.0732 3944 IpInIp - ok
12:57:22.0748 3944 IPMIDRV (b25aaf203552b7b3491139d582b39ad1) C:\Windows\system32\drivers\ipmidrv.sys
12:57:22.0764 3944 IPMIDRV - ok
12:57:22.0795 3944 IPNAT (8793643a67b42cec66490b2a0cf92d68) C:\Windows\system32\DRIVERS\ipnat.sys
12:57:22.0795 3944 IPNAT - ok
12:57:22.0826 3944 irda (e50a95179211b12946f7e035d60af560) C:\Windows\system32\DRIVERS\irda.sys
12:57:22.0826 3944 irda - ok
12:57:22.0857 3944 IRENUM (109c0dfb82c3632fbd11949b73aeeac9) C:\Windows\system32\drivers\irenum.sys
12:57:22.0857 3944 IRENUM - ok
12:57:22.0935 3944 Irmon (cbb0d940221a281bcfeaea695bd1cda5) C:\Windows\System32\irmon.dll
12:57:22.0935 3944 Irmon - ok
12:57:22.0966 3944 isapnp (6c70698a3e5c4376c6ab5c7c17fb0614) C:\Windows\system32\drivers\isapnp.sys
12:57:22.0966 3944 isapnp - ok
12:57:23.0029 3944 iScsiPrt (232fa340531d940aac623b121a595034) C:\Windows\system32\DRIVERS\msiscsi.sys
12:57:23.0029 3944 iScsiPrt - ok
12:57:23.0060 3944 iteatapi (bced60d16156e428f8df8cf27b0df150) C:\Windows\system32\drivers\iteatapi.sys
12:57:23.0060 3944 iteatapi - ok
12:57:23.0076 3944 iteraid (06fa654504a498c30adca8bec4e87e7e) C:\Windows\system32\drivers\iteraid.sys
12:57:23.0076 3944 iteraid - ok
12:57:23.0107 3944 kbdclass (37605e0a8cf00cbba538e753e4344c6e) C:\Windows\system32\DRIVERS\kbdclass.sys
12:57:23.0107 3944 kbdclass - ok
12:57:23.0122 3944 kbdhid (ede59ec70e25c24581add1fbec7325f7) C:\Windows\system32\DRIVERS\kbdhid.sys
12:57:23.0122 3944 kbdhid - ok
12:57:23.0154 3944 KeyIso (a3e186b4b935905b829219502557314e) C:\Windows\system32\lsass.exe
12:57:23.0169 3944 KeyIso - ok
12:57:23.0263 3944 KSecDD (2b2f1638466e8cb091400c9019cc730e) C:\Windows\system32\Drivers\ksecdd.sys
12:57:23.0263 3944 KSecDD - ok
12:57:23.0356 3944 KtmRm (8078f8f8f7a79e2e6b494523a828c585) C:\Windows\system32\msdtckrm.dll
12:57:23.0372 3944 KtmRm - ok
12:57:23.0466 3944 LanmanServer (1bf5eebfd518dd7298434d8c862f825d) C:\Windows\System32\srvsvc.dll
12:57:23.0481 3944 LanmanServer - ok
12:57:23.0528 3944 LanmanWorkstation (1db69705b695b987082c8baec0c6b34f) C:\Windows\System32\wkssvc.dll
12:57:23.0528 3944 LanmanWorkstation - ok
12:57:23.0684 3944 LBTServ (3af6b73a3ad1fc37c5933441f66ceb91) C:\Program Files\Common Files\Logishrd\Bluetooth\LBTServ.exe
12:57:23.0684 3944 LBTServ - ok
12:57:23.0746 3944 LHidFilt (7f9c7b28cf1c859e1c42619eea946dc8) C:\Windows\system32\DRIVERS\LHidFilt.Sys
12:57:23.0746 3944 LHidFilt - ok
12:57:23.0793 3944 LightScribeService (793ff718477345cd5d232c50bed1e452) C:\Program Files\Common Files\LightScribe\LSSrvc.exe
12:57:23.0840 3944 LightScribeService - ok
12:57:23.0871 3944 lltdio (d1c5883087a0c3f1344d9d55a44901f6) C:\Windows\system32\DRIVERS\lltdio.sys
12:57:23.0871 3944 lltdio - ok
12:57:23.0934 3944 lltdsvc (2d5a428872f1442631d0959a34abff63) C:\Windows\System32\lltdsvc.dll
12:57:23.0934 3944 lltdsvc - ok
12:57:23.0949 3944 lmhosts (35d40113e4a5b961b6ce5c5857702518) C:\Windows\System32\lmhsvc.dll
12:57:23.0949 3944 lmhosts - ok
12:57:24.0012 3944 LMouFilt (ab33792a87285344f43b5ce23421bab0) C:\Windows\system32\DRIVERS\LMouFilt.Sys
12:57:24.0012 3944 LMouFilt - ok
12:57:24.0043 3944 LSI_FC (c7e15e82879bf3235b559563d4185365) C:\Windows\system32\drivers\lsi_fc.sys
12:57:24.0043 3944 LSI_FC - ok
12:57:24.0074 3944 LSI_SAS (ee01ebae8c9bf0fa072e0ff68718920a) C:\Windows\system32\drivers\lsi_sas.sys
12:57:24.0090 3944 LSI_SAS - ok
12:57:24.0105 3944 LSI_SCSI (912a04696e9ca30146a62afa1463dd5c) C:\Windows\system32\drivers\lsi_scsi.sys
12:57:24.0105 3944 LSI_SCSI - ok
12:57:24.0136 3944 luafv (8f5c7426567798e62a3b3614965d62cc) C:\Windows\system32\drivers\luafv.sys
12:57:24.0136 3944 luafv - ok
12:57:24.0277 3944 lvpopflt (9fb982de1c8dd769f8ed681dd878b12f) C:\Windows\system32\DRIVERS\lvpopflt.sys
12:57:24.0292 3944 lvpopflt - ok
12:57:24.0339 3944 LVPr2Mon (1a7db7a00a4b0d8da24cd691a4547291) C:\Windows\system32\DRIVERS\LVPr2Mon.sys
12:57:24.0339 3944 LVPr2Mon - ok
12:57:24.0386 3944 LVPrcSrv (0ddfdcaa92c7f553328db06ba599bea9) C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe
12:57:24.0386 3944 LVPrcSrv - ok
12:57:24.0526 3944 LVRS (37072ec9299e825f4335cc554b6fac6a) C:\Windows\system32\DRIVERS\lvrs.sys
12:57:24.0526 3944 LVRS - ok
12:57:25.0743 3944 LVUVC (a240e42a7402e927a71b6e8aa4629b13) C:\Windows\system32\DRIVERS\lvuvc.sys
12:57:25.0899 3944 LVUVC - ok
12:57:26.0164 3944 Mcx2Svc (aef9babb8a506bc4ce0451a64aaded46) C:\Windows\system32\Mcx2Svc.dll
12:57:26.0164 3944 Mcx2Svc - ok
12:57:26.0196 3944 megasas (0001ce609d66632fa17b84705f658879) C:\Windows\system32\drivers\megasas.sys
12:57:26.0196 3944 megasas - ok
12:57:26.0274 3944 MegaSR (c252f32cd9a49dbfc25ecf26ebd51a99) C:\Windows\system32\drivers\megasr.sys
12:57:26.0274 3944 MegaSR - ok
12:57:26.0508 3944 Microsoft Office Groove Audit Service (fafe367d032ed82e9332b4c741a20216) C:\Program Files\Microsoft Office\Office12\GrooveAuditService.exe
12:57:26.0508 3944 Microsoft Office Groove Audit Service - ok
12:57:26.0554 3944 MMCSS (1076ffcffaae8385fd62dfcb25ac4708) C:\Windows\system32\mmcss.dll
12:57:26.0570 3944 MMCSS - ok
12:57:26.0617 3944 MobilityService - ok
12:57:26.0632 3944 Modem (e13b5ea0f51ba5b1512ec671393d09ba) C:\Windows\system32\drivers\modem.sys
12:57:26.0632 3944 Modem - ok
12:57:26.0648 3944 monitor (0a9bb33b56e294f686abb7c1e4e2d8a8) C:\Windows\system32\DRIVERS\monitor.sys
12:57:26.0648 3944 monitor - ok
12:57:26.0695 3944 mouclass (5bf6a1326a335c5298477754a506d263) C:\Windows\system32\DRIVERS\mouclass.sys
12:57:26.0695 3944 mouclass - ok
12:57:26.0710 3944 mouhid (93b8d4869e12cfbe663915502900876f) C:\Windows\system32\DRIVERS\mouhid.sys
12:57:26.0710 3944 mouhid - ok
12:57:26.0788 3944 MountMgr (bdafc88aa6b92f7842416ea6a48e1600) C:\Windows\system32\drivers\mountmgr.sys
12:57:26.0788 3944 MountMgr - ok
12:57:26.0835 3944 mpio (511d011289755dd9f9a7579fb0b064e6) C:\Windows\system32\drivers\mpio.sys
12:57:26.0835 3944 mpio - ok
12:57:26.0866 3944 mpsdrv (22241feba9b2defa669c8cb0a8dd7d2e) C:\Windows\system32\drivers\mpsdrv.sys
12:57:26.0866 3944 mpsdrv - ok
12:57:26.0960 3944 MpsSvc (5de62c6e9108f14f6794060a9bdecaec) C:\Windows\system32\mpssvc.dll
12:57:26.0960 3944 MpsSvc - ok
12:57:26.0991 3944 Mraid35x (4fbbb70d30fd20ec51f80061703b001e) C:\Windows\system32\drivers\mraid35x.sys
12:57:26.0991 3944 Mraid35x - ok
12:57:27.0038 3944 MRxDAV (82cea0395524aacfeb58ba1448e8325c) C:\Windows\system32\drivers\mrxdav.sys
12:57:27.0038 3944 MRxDAV - ok
12:57:27.0100 3944 mrxsmb (1e94971c4b446ab2290deb71d01cf0c2) C:\Windows\system32\DRIVERS\mrxsmb.sys
12:57:27.0100 3944 mrxsmb - ok
12:57:27.0210 3944 mrxsmb10 (4fccb34d793b116423209c0f8b7a3b03) C:\Windows\system32\DRIVERS\mrxsmb10.sys
12:57:27.0210 3944 mrxsmb10 - ok
12:57:27.0225 3944 mrxsmb20 (c3cb1b40ad4a0124d617a1199b0b9d7c) C:\Windows\system32\DRIVERS\mrxsmb20.sys
12:57:27.0241 3944 mrxsmb20 - ok
12:57:27.0272 3944 msahci (5457dcfa7c0da43522f4d9d4049c1472) C:\Windows\system32\drivers\msahci.sys
12:57:27.0272 3944 msahci - ok
12:57:27.0303 3944 msdsm (4468b0f385a86ecddaf8d3ca662ec0e7) C:\Windows\system32\drivers\msdsm.sys
12:57:27.0303 3944 msdsm - ok
12:57:27.0381 3944 MSDTC (fd7520cc3a80c5fc8c48852bb24c6ded) C:\Windows\System32\msdtc.exe
12:57:27.0397 3944 MSDTC - ok
12:57:27.0412 3944 Msfs (a9927f4a46b816c92f461acb90cf8515) C:\Windows\system32\drivers\Msfs.sys
12:57:27.0412 3944 Msfs - ok
12:57:27.0428 3944 msisadrv (0f400e306f385c56317357d6dea56f62) C:\Windows\system32\drivers\msisadrv.sys
12:57:27.0428 3944 msisadrv - ok
12:57:27.0459 3944 MSiSCSI (85466c0757a23d9a9aecdc0755203cb2) C:\Windows\system32\iscsiexe.dll
12:57:27.0490 3944 MSiSCSI - ok
12:57:27.0490 3944 msiserver - ok
12:57:27.0522 3944 MSKSSRV (d8c63d34d9c9e56c059e24ec7185cc07) C:\Windows\system32\drivers\MSKSSRV.sys
12:57:27.0522 3944 MSKSSRV - ok
12:57:27.0553 3944 MSPCLOCK (1d373c90d62ddb641d50e55b9e78d65e) C:\Windows\system32\drivers\MSPCLOCK.sys
12:57:27.0553 3944 MSPCLOCK - ok
12:57:27.0568 3944 MSPQM (b572da05bf4e098d4bba3a4734fb505b) C:\Windows\system32\drivers\MSPQM.sys
12:57:27.0568 3944 MSPQM - ok
12:57:27.0600 3944 MsRPC (b49456d70555de905c311bcda6ec6adb) C:\Windows\system32\drivers\MsRPC.sys
12:57:27.0615 3944 MsRPC - ok
12:57:27.0678 3944 mssmbios (e384487cb84be41d09711c30ca79646c) C:\Windows\system32\DRIVERS\mssmbios.sys
12:57:27.0678 3944 mssmbios - ok
12:57:27.0709 3944 MSTEE (7199c1eec1e4993caf96b8c0a26bd58a) C:\Windows\system32\drivers\MSTEE.sys
12:57:27.0709 3944 MSTEE - ok
12:57:27.0724 3944 Mup (6a57b5733d4cb702c8ea4542e836b96c) C:\Windows\system32\Drivers\mup.sys
12:57:27.0724 3944 Mup - ok
12:57:27.0834 3944 napagent (e4eaf0c5c1b41b5c83386cf212ca9584) C:\Windows\system32\qagentRT.dll
12:57:27.0849 3944 napagent - ok
12:57:27.0896 3944 NativeWifiP (85c44fdff9cf7e72a40dcb7ec06a4416) C:\Windows\system32\DRIVERS\nwifi.sys
12:57:27.0896 3944 NativeWifiP - ok
12:57:28.0021 3944 NDIS (1357274d1883f68300aeadd15d7bbb42) C:\Windows\system32\drivers\ndis.sys
12:57:28.0021 3944 NDIS - ok
12:57:28.0083 3944 NdisTapi (0e186e90404980569fb449ba7519ae61) C:\Windows\system32\DRIVERS\ndistapi.sys
12:57:28.0083 3944 NdisTapi - ok
12:57:28.0099 3944 Ndisuio (d6973aa34c4d5d76c0430b181c3cd389) C:\Windows\system32\DRIVERS\ndisuio.sys
12:57:28.0099 3944 Ndisuio - ok
12:57:28.0130 3944 NdisWan (818f648618ae34f729fdb47ec68345c3) C:\Windows\system32\DRIVERS\ndiswan.sys
12:57:28.0146 3944 NdisWan - ok
12:57:28.0177 3944 NDProxy (71dab552b41936358f3b541ae5997fb3) C:\Windows\system32\drivers\NDProxy.sys
12:57:28.0177 3944 NDProxy - ok
12:57:28.0208 3944 NetBIOS (bcd093a5a6777cf626434568dc7dba78) C:\Windows\system32\DRIVERS\netbios.sys
12:57:28.0208 3944 NetBIOS - ok
12:57:28.0286 3944 netbt (ecd64230a59cbd93c85f1cd1cab9f3f6) C:\Windows\system32\DRIVERS\netbt.sys
12:57:28.0302 3944 netbt - ok
12:57:28.0348 3944 Netlogon (a3e186b4b935905b829219502557314e) C:\Windows\system32\lsass.exe
12:57:28.0364 3944 Netlogon - ok
12:57:28.0473 3944 Netman (c8052711daecc48b982434c5116ca401) C:\Windows\System32\netman.dll
12:57:28.0473 3944 Netman - ok
12:57:28.0536 3944 netprofm (2ef3bbe22e5a5acd1428ee387a0d0172) C:\Windows\System32\netprofm.dll
12:57:28.0536 3944 netprofm - ok
12:57:28.0660 3944 netr28 (e9f451618e9c56865fbd94f7a72cd9b2) C:\Windows\system32\DRIVERS\netr28.sys
12:57:28.0676 3944 netr28 - ok
12:57:28.0754 3944 NetTcpPortSharing (d6c4e4a39a36029ac0813d476fbd0248) C:\Windows\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMSvcHost.exe
12:57:28.0754 3944 NetTcpPortSharing - ok
12:57:28.0785 3944 nfrd960 (2e7fb731d4790a1bc6270accefacb36e) C:\Windows\system32\drivers\nfrd960.sys
12:57:28.0785 3944 nfrd960 - ok
12:57:28.0863 3944 NlaSvc (2997b15415f9bbe05b5a4c1c85e0c6a2) C:\Windows\System32\nlasvc.dll
12:57:28.0879 3944 NlaSvc - ok
12:57:28.0988 3944 Npfs (d36f239d7cce1931598e8fb90a0dbc26) C:\Windows\system32\drivers\Npfs.sys
12:57:28.0988 3944 Npfs - ok
12:57:28.0988 3944 npggsvc - ok
12:57:29.0035 3944 NPPTNT2 (9131fe60adfab595c8da53ad6a06aa31) C:\Windows\system32\npptNT2.sys
12:57:29.0035 3944 NPPTNT2 - ok
12:57:29.0066 3944 NSCIRDA (6d8d2e5652fc2442c810c5d8be784148) C:\Windows\system32\DRIVERS\nscirda.sys
12:57:29.0082 3944 NSCIRDA - ok
12:57:29.0097 3944 nsi (8bb86f0c7eea2bded6fe095d0b4ca9bd) C:\Windows\system32\nsisvc.dll
12:57:29.0113 3944 nsi - ok
12:57:29.0128 3944 nsiproxy (609773e344a97410ce4ebf74a8914fcf) C:\Windows\system32\drivers\nsiproxy.sys
12:57:29.0128 3944 nsiproxy - ok
12:57:29.0316 3944 Ntfs (6a4a98cee84cf9e99564510dda4baa47) C:\Windows\system32\drivers\Ntfs.sys
12:57:29.0362 3944 Ntfs - ok
12:57:29.0472 3944 NTIBackupSvc (cb76f68ba0d57c5d25b538981b1c611c) C:\Program Files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe
12:57:29.0472 3944 NTIBackupSvc - ok
12:57:29.0518 3944 NTIDrvr (2757d2ba59aee155209e24942ab127c9) C:\Windows\system32\DRIVERS\NTIDrvr.sys
12:57:29.0518 3944 NTIDrvr - ok
12:57:29.0550 3944 NTISchedulerSvc (df1c10a75df7e50195fc417f88a33227) C:\Program Files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe
12:57:29.0565 3944 NTISchedulerSvc - ok
12:57:29.0628 3944 ntrigdigi (e875c093aec0c978a90f30c9e0dfbb72) C:\Windows\system32\drivers\ntrigdigi.sys
12:57:29.0643 3944 ntrigdigi - ok
12:57:29.0659 3944 Null (c5dbbcda07d780bda9b685df333bb41e) C:\Windows\system32\drivers\Null.sys
12:57:29.0659 3944 Null - ok
12:57:29.0706 3944 nvraid (2edf9e7751554b42cbb60116de727101) C:\Windows\system32\drivers\nvraid.sys
12:57:29.0706 3944 nvraid - ok
12:57:29.0737 3944 nvstor (abed0c09758d1d97db0042dbb2688177) C:\Windows\system32\drivers\nvstor.sys
12:57:29.0737 3944 nvstor - ok
12:57:29.0768 3944 nv_agp (18bbdf913916b71bd54575bdb6eeac0b) C:\Windows\system32\drivers\nv_agp.sys
12:57:29.0768 3944 nv_agp - ok
12:57:29.0784 3944 NwlnkFlt - ok
12:57:29.0784 3944 NwlnkFwd - ok
12:57:29.0971 3944 odserv (e54aa592a65f317390eee386a8821692) C:\Program Files\Common Files\Microsoft Shared\OFFICE12\ODSERV.EXE
12:57:29.0971 3944 odserv - ok
12:57:30.0002 3944 ohci1394 (790e27c3db53410b40ff9ef2fd10a1d9) C:\Windows\system32\DRIVERS\ohci1394.sys
12:57:30.0002 3944 ohci1394 - ok
12:57:30.0033 3944 ose (5a432a042dae460abe7199b758e8606c) C:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
12:57:30.0033 3944 ose - ok
12:57:30.0142 3944 p2pimsvc (0c8e8e61ad1eb0b250b846712c917506) C:\Windows\system32\p2psvc.dll
12:57:30.0158 3944 p2pimsvc - ok
12:57:30.0174 3944 p2psvc (0c8e8e61ad1eb0b250b846712c917506) C:\Windows\system32\p2psvc.dll
12:57:30.0174 3944 p2psvc - ok
12:57:30.0267 3944 Parport (0fa9b5055484649d63c303fe404e5f4d) C:\Windows\system32\drivers\parport.sys
12:57:30.0283 3944 Parport - ok
12:57:30.0330 3944 partmgr (b9c2b89f08670e159f7181891e449cd9) C:\Windows\system32\drivers\partmgr.sys
12:57:30.0330 3944 partmgr - ok
12:57:30.0361 3944 Parvdm (4f9a6a8a31413180d0fcb279ad5d8112) C:\Windows\system32\drivers\parvdm.sys
12:57:30.0361 3944 Parvdm - ok
12:57:30.0454 3944 PcaSvc (c6276ad11f4bb49b58aa1ed88537f14a) C:\Windows\System32\pcasvc.dll
12:57:30.0454 3944 PcaSvc - ok
12:57:30.0501 3944 pci (941dc1d19e7e8620f40bbc206981efdb) C:\Windows\system32\drivers\pci.sys
12:57:30.0501 3944 pci - ok
12:57:30.0564 3944 pciide (fc175f5ddab666d7f4d17449a547626f) C:\Windows\system32\drivers\pciide.sys
12:57:30.0564 3944 pciide - ok
12:57:30.0626 3944 pcmcia (b7c5a8769541900f6dfa6fe0c5e4d513) C:\Windows\system32\DRIVERS\pcmcia.sys
12:57:30.0626 3944 pcmcia - ok
12:57:30.0891 3944 PEAUTH (6349f6ed9c623b44b52ea3c63c831a92) C:\Windows\system32\drivers\peauth.sys
12:57:30.0907 3944 PEAUTH - ok
12:57:31.0266 3944 pla (b1689df169143f57053f795390c99db3) C:\Windows\system32\pla.dll
12:57:31.0390 3944 pla - ok
12:57:31.0671 3944 PlugPlay (c5e7f8a996ec0a82d508fd9064a5569e) C:\Windows\system32\umpnpmgr.dll
12:57:31.0687 3944 PlugPlay - ok
12:57:31.0812 3944 PNRPAutoReg (0c8e8e61ad1eb0b250b846712c917506) C:\Windows\system32\p2psvc.dll
12:57:31.0827 3944 PNRPAutoReg - ok
12:57:31.0827 3944 PNRPsvc (0c8e8e61ad1eb0b250b846712c917506) C:\Windows\system32\p2psvc.dll
12:57:31.0843 3944 PNRPsvc - ok
12:57:31.0921 3944 PolicyAgent (d0494460421a03cd5225cca0059aa146) C:\Windows\System32\ipsecsvc.dll
12:57:31.0936 3944 PolicyAgent - ok
12:57:31.0983 3944 PptpMiniport (ecfffaec0c1ecd8dbc77f39070ea1db1) C:\Windows\system32\DRIVERS\raspptp.sys
12:57:31.0999 3944 PptpMiniport - ok
12:57:32.0046 3944 Processor (2027293619dd0f047c584cf2e7df4ffd) C:\Windows\system32\drivers\processr.sys
12:57:32.0046 3944 Processor - ok
12:57:32.0092 3944 ProfSvc (0508faa222d28835310b7bfca7a77346) C:\Windows\system32\profsvc.dll
12:57:32.0108 3944 ProfSvc - ok
12:57:32.0155 3944 ProtectedStorage (a3e186b4b935905b829219502557314e) C:\Windows\system32\lsass.exe
12:57:32.0155 3944 ProtectedStorage - ok
12:57:32.0326 3944 PSched (99514faa8df93d34b5589187db3aa0ba) C:\Windows\system32\DRIVERS\pacer.sys
12:57:32.0326 3944 PSched - ok
12:57:32.0373 3944 PSDFilter (1dcbb35090cc4b2bd3d661e6089523c6) C:\Windows\system32\DRIVERS\psdfilter.sys
12:57:32.0373 3944 PSDFilter - ok
12:57:32.0404 3944 PSDNServ (e26e46d619469964ac3609620f443867) C:\Windows\system32\DRIVERS\PSDNServ.sys
12:57:32.0404 3944 PSDNServ - ok
12:57:32.0451 3944 psdvdisk (3e1d134af2806867d06047c4cc33cc65) C:\Windows\system32\DRIVERS\PSDVdisk.sys
12:57:32.0451 3944 psdvdisk - ok
12:57:32.0545 3944 PTSimBus (688983e03c0d82b2efa1db89792c4c6c) C:\Windows\system32\DRIVERS\PTSimBus.sys
12:57:32.0560 3944 PTSimBus - ok
12:57:32.0592 3944 PTSimHid (fdc1a2e536b5cbce1c2245cd5ad910eb) C:\Windows\system32\DRIVERS\PTSimHid.sys
12:57:32.0592 3944 PTSimHid - ok
12:57:32.0779 3944 ql2300 (0a6db55afb7820c99aa1f3a1d270f4f6) C:\Windows\system32\drivers\ql2300.sys
12:57:32.0888 3944 ql2300 - ok
12:57:32.0935 3944 ql40xx (81a7e5c076e59995d54bc1ed3a16e60b) C:\Windows\system32\drivers\ql40xx.sys
12:57:32.0935 3944 ql40xx - ok
12:57:32.0997 3944 QWAVE (e9ecae663f47e6cb43962d18ab18890f) C:\Windows\system32\qwave.dll
12:57:32.0997 3944 QWAVE - ok
12:57:33.0028 3944 QWAVEdrv (9f5e0e1926014d17486901c88eca2db7) C:\Windows\system32\drivers\qwavedrv.sys
12:57:33.0028 3944 QWAVEdrv - ok
12:57:33.0044 3944 RasAcd (147d7f9c556d259924351feb0de606c3) C:\Windows\system32\DRIVERS\rasacd.sys
12:57:33.0060 3944 RasAcd - ok
12:57:33.0075 3944 RasAuto (f6a452eb4ceadbb51c9e0ee6b3ecef0f) C:\Windows\System32\rasauto.dll
12:57:33.0075 3944 RasAuto - ok
12:57:33.0153 3944 Rasl2tp (a214adbaf4cb47dd2728859ef31f26b0) C:\Windows\system32\DRIVERS\rasl2tp.sys
12:57:33.0153 3944 Rasl2tp - ok
12:57:33.0247 3944 RasMan (75d47445d70ca6f9f894b032fbc64fcf) C:\Windows\System32\rasmans.dll
12:57:33.0247 3944 RasMan - ok
12:57:33.0309 3944 RasPppoe (509a98dd18af4375e1fc40bc175f1def) C:\Windows\system32\DRIVERS\raspppoe.sys
12:57:33.0309 3944 RasPppoe - ok
12:57:33.0403 3944 RasSstp (2005f4a1e05fa09389ac85840f0a9e4d) C:\Windows\system32\DRIVERS\rassstp.sys
12:57:33.0418 3944 RasSstp - ok
12:57:33.0496 3944 rdbss (b14c9d5b9add2f84f70570bbbfaa7935) C:\Windows\system32\DRIVERS\rdbss.sys
12:57:33.0496 3944 rdbss - ok
12:57:33.0528 3944 RDPCDD (89e59be9a564262a3fb6c4f4f1cd9899) C:\Windows\system32\DRIVERS\RDPCDD.sys
12:57:33.0528 3944 RDPCDD - ok
12:57:33.0606 3944 rdpdr (fbc0bacd9c3d7f6956853f64a66e252d) C:\Windows\system32\drivers\rdpdr.sys
12:57:33.0606 3944 rdpdr - ok
12:57:33.0637 3944 RDPENCDD (9d91fe5286f748862ecffa05f8a0710c) C:\Windows\system32\drivers\rdpencdd.sys
12:57:33.0637 3944 RDPENCDD - ok
12:57:33.0684 3944 RDPWD (c127ebd5afab31524662c48dfceb773a) C:\Windows\system32\drivers\RDPWD.sys
12:57:33.0684 3944 RDPWD - ok
12:57:33.0793 3944 RemoteAccess (bcdd6b4804d06b1f7ebf29e53a57ece9) C:\Windows\System32\mprdim.dll
12:57:33.0808 3944 RemoteAccess - ok
12:57:33.0996 3944 RemoteRegistry (9e6894ea18daff37b63e1005f83ae4ab) C:\Windows\system32\regsvc.dll
12:57:33.0996 3944 RemoteRegistry - ok
12:57:34.0042 3944 RpcLocator (5123f83cbc4349d065534eeb6bbdc42b) C:\Windows\system32\locator.exe
12:57:34.0042 3944 RpcLocator - ok
12:57:34.0120 3944 RpcSs (3b5b4d53fec14f7476ca29a20cc31ac9) C:\Windows\system32\rpcss.dll
12:57:34.0136 3944 RpcSs - ok
12:57:34.0245 3944 rspndr (9c508f4074a39e8b4b31d27198146fad) C:\Windows\system32\DRIVERS\rspndr.sys
12:57:34.0261 3944 rspndr - ok
12:57:34.0292 3944 RTSTOR (9ea88492b1dab90dce43a6f2c0e133bd) C:\Windows\system32\drivers\RTSTOR.SYS
12:57:34.0308 3944 RTSTOR - ok
12:57:34.0339 3944 SamSs (a3e186b4b935905b829219502557314e) C:\Windows\system32\lsass.exe
12:57:34.0339 3944 SamSs - ok
12:57:34.0370 3944 sbp2port (3ce8f073a557e172b330109436984e30) C:\Windows\system32\drivers\sbp2port.sys
12:57:34.0370 3944 sbp2port - ok
12:57:34.0448 3944 SCardSvr (77b7a11a0c3d78d3386398fbbea1b632) C:\Windows\System32\SCardSvr.dll
12:57:34.0464 3944 SCardSvr - ok
12:57:34.0542 3944 Schedule (1a58069db21d05eb2ab58ee5753ebe8d) C:\Windows\system32\schedsvc.dll
12:57:34.0557 3944 Schedule - ok
12:57:34.0573 3944 SCPolicySvc (312ec3e37a0a1f2006534913e37b4423) C:\Windows\System32\certprop.dll
12:57:34.0588 3944 SCPolicySvc - ok
12:57:34.0635 3944 SCREAMINGBDRIVER (a643d6df1b7546256b11fb5d6b5d1375) C:\Windows\system32\drivers\ScreamingBAudio.sys
12:57:34.0635 3944 SCREAMINGBDRIVER - ok
12:57:34.0666 3944 sdbus (126ea89bcc413ee45e3004fb0764888f) C:\Windows\system32\DRIVERS\sdbus.sys
12:57:34.0666 3944 sdbus - ok
12:57:34.0760 3944 SDRSVC (716313d9f6b0529d03f726d5aaf6f191) C:\Windows\System32\SDRSVC.dll
12:57:34.0776 3944 SDRSVC - ok
12:57:34.0807 3944 secdrv (90a3935d05b494a5a39d37e71f09a677) C:\Windows\system32\drivers\secdrv.sys
12:57:34.0807 3944 secdrv - ok
12:57:34.0822 3944 seclogon (fd5199d4d8a521005e4b5ee7fe00fa9b) C:\Windows\system32\seclogon.dll
12:57:34.0838 3944 seclogon - ok
12:57:34.0854 3944 SENS (a9bbab5759771e523f55563d6cbe140f) C:\Windows\system32\sens.dll
12:57:34.0869 3944 SENS - ok
12:57:34.0900 3944 Serenum (68e44e331d46f0fb38f0863a84cd1a31) C:\Windows\system32\drivers\serenum.sys
12:57:34.0900 3944 Serenum - ok
12:57:34.0947 3944 Serial (c70d69a918b178d3c3b06339b40c2e1b) C:\Windows\system32\drivers\serial.sys
12:57:34.0947 3944 Serial - ok
12:57:34.0963 3944 sermouse (8af3d28a879bf75db53a0ee7a4289624) C:\Windows\system32\drivers\sermouse.sys
12:57:34.0978 3944 sermouse - ok
12:57:35.0056 3944 SessionEnv (d2193326f729b163125610dbf3e17d57) C:\Windows\system32\sessenv.dll
12:57:35.0056 3944 SessionEnv - ok
12:57:35.0072 3944 sffdisk (3efa810bdca87f6ecc24f9832243fe86) C:\Windows\system32\drivers\sffdisk.sys
12:57:35.0072 3944 sffdisk - ok
12:57:35.0103 3944 sffp_mmc (e95d451f7ea3e583aec75f3b3ee42dc5) C:\Windows\system32\drivers\sffp_mmc.sys
12:57:35.0103 3944 sffp_mmc - ok
12:57:35.0134 3944 sffp_sd (3d0ea348784b7ac9ea9bd9f317980979) C:\Windows\system32\drivers\sffp_sd.sys
12:57:35.0134 3944 sffp_sd - ok
12:57:35.0150 3944 sfloppy (46ed8e91793b2e6f848015445a0ac188) C:\Windows\system32\drivers\sfloppy.sys
12:57:35.0166 3944 sfloppy - ok
12:57:35.0244 3944 SharedAccess (e1499bd0ff76b1b2fbbf1af339d91165) C:\Windows\System32\ipnathlp.dll
12:57:35.0259 3944 SharedAccess - ok
12:57:35.0353 3944 ShellHWDetection (c7230fbee14437716701c15be02c27b8) C:\Windows\System32\shsvcs.dll
12:57:35.0368 3944 ShellHWDetection - ok
12:57:35.0431 3944 sisagp (1d76624a09a054f682d746b924e2dbc3) C:\Windows\system32\drivers\sisagp.sys
12:57:35.0431 3944 sisagp - ok
12:57:35.0478 3944 SiSRaid2 (43cb7aa756c7db280d01da9b676cfde2) C:\Windows\system32\drivers\sisraid2.sys
12:57:35.0478 3944 SiSRaid2 - ok
12:57:35.0509 3944 SiSRaid4 (a99c6c8b0baa970d8aa59ddc50b57f94) C:\Windows\system32\drivers\sisraid4.sys
12:57:35.0524 3944 SiSRaid4 - ok
12:57:35.0665 3944 SkypeUpdate (6128e98eaaed364ed1a32708d2fd22cb) C:\Program Files\Skype\Updater\Updater.exe
12:57:35.0665 3944 SkypeUpdate - ok
12:57:36.0133 3944 slsvc (862bb4cbc05d80c5b45be430e5ef872f) C:\Windows\system32\SLsvc.exe
12:57:36.0242 3944 slsvc - ok
12:57:36.0414 3944 SLUINotify (6edc422215cd78aa8a9cde6b30abbd35) C:\Windows\system32\SLUINotify.dll
12:57:36.0414 3944 SLUINotify - ok
12:57:36.0476 3944 Smb (7b75299a4d201d6a6533603d6914ab04) C:\Windows\system32\DRIVERS\smb.sys
12:57:36.0476 3944 Smb - ok
12:57:36.0523 3944 SNMPTRAP (2a146a055b4401c16ee62d18b8e2a032) C:\Windows\System32\snmptrap.exe
12:57:36.0554 3944 SNMPTRAP - ok
12:57:36.0601 3944 spldr (7aebdeef071fe28b0eef2cdd69102bff) C:\Windows\system32\drivers\spldr.sys
12:57:36.0601 3944 spldr - ok
12:57:36.0663 3944 Spooler (8554097e5136c3bf9f69fe578a1b35f4) C:\Windows\System32\spoolsv.exe
12:57:36.0679 3944 Spooler - ok
12:57:36.0819 3944 SpyHunter 4 Service (05580ac1c1cd96d04ef74ebd18dc81c3) C:\PROGRA~1\ENIGMA~1\SPYHUN~1\SH4SER~1.EXE
12:57:36.0835 3944 SpyHunter 4 Service - ok
12:57:36.0897 3944 srv (41987f9fc0e61adf54f581e15029ad91) C:\Windows\system32\DRIVERS\srv.sys
12:57:36.0897 3944 srv - ok
12:57:36.0928 3944 srv2 (ff33aff99564b1aa534f58868cbe41ef) C:\Windows\system32\DRIVERS\srv2.sys
12:57:36.0944 3944 srv2 - ok
12:57:36.0975 3944 srvnet (7605c0e1d01a08f3ecd743f38b834a44) C:\Windows\system32\DRIVERS\srvnet.sys
12:57:36.0991 3944 srvnet - ok
12:57:37.0038 3944 SSDPSRV (03d50b37234967433a5ea5ba72bc0b62) C:\Windows\System32\ssdpsrv.dll
12:57:37.0053 3944 SSDPSRV - ok
12:57:37.0084 3944 SstpSvc (6f1a32e7b7b30f004d9a20afadb14944) C:\Windows\system32\sstpsvc.dll
12:57:37.0084 3944 SstpSvc - ok
12:57:37.0162 3944 StillCam (ef70b3d22b4bffda6ea851ecb063efaa) C:\Windows\system32\DRIVERS\serscan.sys
12:57:37.0162 3944 StillCam - ok
12:57:37.0240 3944 stisvc (5de7d67e49b88f5f07f3e53c4b92a352) C:\Windows\System32\wiaservc.dll
12:57:37.0240 3944 stisvc - ok
12:57:37.0318 3944 swenum (7ba58ecf0c0a9a69d44b3dca62becf56) C:\Windows\system32\DRIVERS\swenum.sys
12:57:37.0318 3944 swenum - ok
12:57:37.0459 3944 SwitchBoard (f577910a133a592234ebaad3f3afa258) C:\Program Files\Common Files\Adobe\SwitchBoard\SwitchBoard.exe
12:57:37.0459 3944 SwitchBoard - ok
12:57:37.0552 3944 swprv (f21fd248040681cca1fb6c9a03aaa93d) C:\Windows\System32\swprv.dll
12:57:37.0568 3944 swprv - ok
12:57:37.0630 3944 Symc8xx (192aa3ac01df071b541094f251deed10) C:\Windows\system32\drivers\symc8xx.sys
12:57:37.0630 3944 Symc8xx - ok
12:57:37.0646 3944 Sym_hi (8c8eb8c76736ebaf3b13b633b2e64125) C:\Windows\system32\drivers\sym_hi.sys
12:57:37.0646 3944 Sym_hi - ok
12:57:37.0662 3944 Sym_u3 (8072af52b5fd103bbba387a1e49f62cb) C:\Windows\system32\drivers\sym_u3.sys
12:57:37.0662 3944 Sym_u3 - ok
12:57:37.0724 3944 SynTP (4c9bb4b3b9eac26211484c30b914c6dc) C:\Windows\system32\DRIVERS\SynTP.sys
12:57:37.0724 3944 SynTP - ok
12:57:37.0802 3944 SysMain (9a51b04e9886aa4ee90093586b0ba88d) C:\Windows\system32\sysmain.dll
12:57:37.0818 3944 SysMain - ok
12:57:37.0833 3944 Tablet2k - ok
12:57:37.0864 3944 TabletInputService (2dca225eae15f42c0933e998ee0231c3) C:\Windows\System32\TabSvc.dll
12:57:37.0864 3944 TabletInputService - ok
12:57:37.0927 3944 TapiSrv (d7673e4b38ce21ee54c59eeeb65e2483) C:\Windows\System32\tapisrv.dll
12:57:37.0942 3944 TapiSrv - ok
12:57:37.0974 3944 TBS (cb05822cd9cc6c688168e113c603dbe7) C:\Windows\System32\tbssvc.dll
12:57:37.0974 3944 TBS - ok
12:57:38.0005 3944 TClass2k (1b3c28d36e669deeb39331255a3feeeb) C:\Windows\system32\DRIVERS\TClass2k.sys
12:57:38.0020 3944 TClass2k - ok
12:57:38.0161 3944 Tcpip (27d470dabc77bc60d0a3b0e4deb6cb91) C:\Windows\system32\drivers\tcpip.sys
12:57:38.0176 3944 Tcpip - ok
12:57:38.0192 3944 Tcpip6 (27d470dabc77bc60d0a3b0e4deb6cb91) C:\Windows\system32\DRIVERS\tcpip.sys
12:57:38.0208 3944 Tcpip6 - ok
12:57:38.0239 3944 tcpipreg (608c345a255d82a6289c2d468eb41fd7) C:\Windows\system32\drivers\tcpipreg.sys
12:57:38.0239 3944 tcpipreg - ok
12:57:38.0270 3944 TDPIPE (5dcf5e267be67a1ae926f2df77fbcc56) C:\Windows\system32\drivers\tdpipe.sys
12:57:38.0270 3944 TDPIPE - ok
12:57:38.0301 3944 TDTCP (389c63e32b3cefed425b61ed92d3f021) C:\Windows\system32\drivers\tdtcp.sys
12:57:38.0301 3944 TDTCP - ok
12:57:38.0348 3944 tdx (76b06eb8a01fc8624d699e7045303e54) C:\Windows\system32\DRIVERS\tdx.sys
12:57:38.0348 3944 tdx - ok
12:57:38.0379 3944 TermDD (3cad38910468eab9a6479e2f01db43c7) C:\Windows\system32\DRIVERS\termdd.sys
12:57:38.0379 3944 TermDD - ok
12:57:38.0457 3944 TermService (bb95da09bef6e7a131bff3ba5032090d) C:\Windows\System32\termsrv.dll
12:57:38.0457 3944 TermService - ok
12:57:38.0535 3944 Themes (c7230fbee14437716701c15be02c27b8) C:\Windows\system32\shsvcs.dll
12:57:38.0535 3944 Themes - ok
12:57:38.0613 3944 THREADORDER (1076ffcffaae8385fd62dfcb25ac4708) C:\Windows\system32\mmcss.dll
12:57:38.0613 3944 THREADORDER - ok
12:57:38.0691 3944 TrkWks (ec74e77d0eb004bd3a809b5f8fb8c2ce) C:\Windows\System32\trkwks.dll
12:57:38.0691 3944 TrkWks - ok
12:57:38.0769 3944 TrustedInstaller (97d9d6a04e3ad9b6c626b9931db78dba) C:\Windows\servicing\TrustedInstaller.exe
12:57:38.0769 3944 TrustedInstaller - ok
12:57:38.0816 3944 tssecsrv (dcf0f056a2e4f52287264f5ab29cf206) C:\Windows\system32\DRIVERS\tssecsrv.sys
12:57:38.0816 3944 tssecsrv - ok
12:57:39.0034 3944 TuneUp.Defrag (701b4c5bfc9a5cc973614fe3901b6b8a) C:\Program Files\TuneUp Utilities 2010\TuneUpDefragService.exe
12:57:39.0050 3944 TuneUp.Defrag - ok
12:57:39.0159 3944 TuneUp.UtilitiesSvc (ae479a80dc4faaa24fb0455f4d634cac) C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesService32.exe
12:57:39.0190 3944 TuneUp.UtilitiesSvc - ok
12:57:39.0222 3944 TuneUpUtilitiesDrv (f2107c9d85ec0df116939ccce06ae697) C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesDriver32.sys
12:57:39.0222 3944 TuneUpUtilitiesDrv - ok
12:57:39.0456 3944 tunmp (caecc0120ac49e3d2f758b9169872d38) C:\Windows\system32\DRIVERS\tunmp.sys
12:57:39.0456 3944 tunmp - ok
12:57:39.0471 3944 tunnel (300db877ac094feab0be7688c3454a9c) C:\Windows\system32\DRIVERS\tunnel.sys
12:57:39.0471 3944 tunnel - ok
12:57:39.0502 3944 uagp35 (7d33c4db2ce363c8518d2dfcf533941f) C:\Windows\system32\drivers\uagp35.sys
12:57:39.0502 3944 uagp35 - ok
12:57:39.0549 3944 UBHelper (f763e070843ee2803de1395002b42938) C:\Windows\system32\drivers\UBHelper.sys
12:57:39.0549 3944 UBHelper - ok
12:57:39.0580 3944 UCTblHid (051aa2bb2bd20c55a8be41b10765b621) C:\Windows\system32\DRIVERS\UCTblHid.sys
12:57:39.0580 3944 UCTblHid - ok
12:57:39.0627 3944 udfs (d9728af68c4c7693cb100b8441cbdec6) C:\Windows\system32\DRIVERS\udfs.sys
12:57:39.0643 3944 udfs - ok
12:57:39.0674 3944 UI0Detect (ecef404f62863755951e09c802c94ad5) C:\Windows\system32\UI0Detect.exe
12:57:39.0674 3944 UI0Detect - ok
12:57:39.0721 3944 uliagpkx (b0acfdc9e4af279e9116c03e014b2b27) C:\Windows\system32\drivers\uliagpkx.sys
12:57:39.0721 3944 uliagpkx - ok
12:57:39.0768 3944 uliahci (9224bb254f591de4ca8d572a5f0d635c) C:\Windows\system32\drivers\uliahci.sys
12:57:39.0768 3944 uliahci - ok
12:57:39.0783 3944 UlSata (8514d0e5cd0534467c5fc61be94a569f) C:\Windows\system32\drivers\ulsata.sys
12:57:39.0783 3944 UlSata - ok
12:57:39.0830 3944 ulsata2 (38c3c6e62b157a6bc46594fada45c62b) C:\Windows\system32\drivers\ulsata2.sys
12:57:39.0830 3944 ulsata2 - ok
12:57:39.0861 3944 umbus (32cff9f809ae9aed85464492bf3e32d2) C:\Windows\system32\DRIVERS\umbus.sys
12:57:39.0861 3944 umbus - ok
12:57:39.0908 3944 upnphost (68308183f4ae0be7bf8ecd07cb297999) C:\Windows\System32\upnphost.dll
12:57:39.0908 3944 upnphost - ok
12:57:40.0002 3944 usbaudio (32db9517628ff0d070682aab61e688f0) C:\Windows\system32\drivers\usbaudio.sys
12:57:40.0002 3944 usbaudio - ok
12:57:40.0080 3944 usbccgp (caf811ae4c147ffcd5b51750c7f09142) C:\Windows\system32\DRIVERS\usbccgp.sys
12:57:40.0080 3944 usbccgp - ok
12:57:40.0111 3944 usbcir (e9476e6c486e76bc4898074768fb7131) C:\Windows\system32\drivers\usbcir.sys
12:57:40.0111 3944 usbcir - ok
12:57:40.0142 3944 usbehci (79e96c23a97ce7b8f14d310da2db0c9b) C:\Windows\system32\DRIVERS\usbehci.sys
12:57:40.0142 3944 usbehci - ok
12:57:40.0189 3944 usbhub (4673bbcb006af60e7abddbe7a130ba42) C:\Windows\system32\DRIVERS\usbhub.sys
12:57:40.0204 3944 usbhub - ok
12:57:40.0220 3944 usbohci (38dbc7dd6cc5a72011f187425384388b) C:\Windows\system32\drivers\usbohci.sys
12:57:40.0220 3944 usbohci - ok
12:57:40.0267 3944 usbprint (e75c4b5269091d15a2e7dc0b6d35f2f5) C:\Windows\system32\DRIVERS\usbprint.sys
12:57:40.0267 3944 usbprint - ok
12:57:40.0298 3944 USBSTOR (be3da31c191bc222d9ad503c5224f2ad) C:\Windows\system32\DRIVERS\USBSTOR.SYS
12:57:40.0298 3944 USBSTOR - ok
12:57:40.0329 3944 usbuhci (814d653efc4d48be3b04a307eceff56f) C:\Windows\system32\DRIVERS\usbuhci.sys
12:57:40.0329 3944 usbuhci - ok
12:57:40.0360 3944 usbvideo (e67998e8f14cb0627a769f6530bcb352) C:\Windows\system32\Drivers\usbvideo.sys
12:57:40.0376 3944 usbvideo - ok
12:57:40.0392 3944 UxSms (1509e705f3ac1d474c92454a5c2dd81f) C:\Windows\System32\uxsms.dll
12:57:40.0407 3944 UxSms - ok
12:57:40.0438 3944 UxTuneUp (43020456a5f079e164f9757c1e74f792) C:\Windows\System32\uxtuneup.dll
12:57:40.0438 3944 UxTuneUp - ok
12:57:40.0516 3944 vds (cd88d1b7776dc17a119049742ec07eb4) C:\Windows\System32\vds.exe
12:57:40.0532 3944 vds - ok
12:57:40.0563 3944 vga (87b06e1f30b749a114f74622d013f8d4) C:\Windows\system32\DRIVERS\vgapnp.sys
12:57:40.0563 3944 vga - ok
12:57:40.0594 3944 VgaSave (2e93ac0a1d8c79d019db6c51f036636c) C:\Windows\System32\drivers\vga.sys
12:57:40.0594 3944 VgaSave - ok
12:57:40.0626 3944 viaagp (5d7159def58a800d5781ba3a879627bc) C:\Windows\system32\drivers\viaagp.sys
12:57:40.0626 3944 viaagp - ok
12:57:40.0657 3944 ViaC7 (c4f3a691b5bad343e6249bd8c2d45dee) C:\Windows\system32\drivers\viac7.sys
12:57:40.0657 3944 ViaC7 - ok
12:57:40.0672 3944 viaide (aadf5587a4063f52c2c3fed7887426fc) C:\Windows\system32\drivers\viaide.sys
12:57:40.0672 3944 viaide - ok
12:57:40.0719 3944 volmgr (69503668ac66c77c6cd7af86fbdf8c43) C:\Windows\system32\drivers\volmgr.sys
12:57:40.0719 3944 volmgr - ok
12:57:40.0766 3944 volmgrx (23e41b834759917bfd6b9a0d625d0c28) C:\Windows\system32\drivers\volmgrx.sys
12:57:40.0766 3944 volmgrx - ok
12:57:40.0828 3944 volsnap (147281c01fcb1df9252de2a10d5e7093) C:\Windows\system32\drivers\volsnap.sys
12:57:40.0844 3944 volsnap - ok
12:57:40.0875 3944 vsmraid (587253e09325e6bf226b299774b728a9) C:\Windows\system32\drivers\vsmraid.sys
12:57:40.0875 3944 vsmraid - ok
12:57:41.0016 3944 VSS (db3d19f850c6eb32bdcb9bc0836acddb) C:\Windows\system32\vssvc.exe
12:57:41.0047 3944 VSS - ok
12:57:41.0109 3944 W32Time (96ea68b9eb310a69c25ebb0282b2b9de) C:\Windows\system32\w32time.dll
12:57:41.0125 3944 W32Time - ok
12:57:41.0218 3944 WacomPen (48dfee8f1af7c8235d4e626f0c4fe031) C:\Windows\system32\drivers\wacompen.sys
12:57:41.0218 3944 WacomPen - ok
12:57:41.0234 3944 Wanarp (55201897378cca7af8b5efd874374a26) C:\Windows\system32\DRIVERS\wanarp.sys
12:57:41.0250 3944 Wanarp - ok
12:57:41.0250 3944 Wanarpv6 (55201897378cca7af8b5efd874374a26) C:\Windows\system32\DRIVERS\wanarp.sys
12:57:41.0250 3944 Wanarpv6 - ok
12:57:41.0312 3944 wcncsvc (a3cd60fd826381b49f03832590e069af) C:\Windows\System32\wcncsvc.dll
12:57:41.0312 3944 wcncsvc - ok
12:57:41.0343 3944 WcsPlugInService (11bcb7afcdd7aadacb5746f544d3a9c7) C:\Windows\System32\WcsPlugInService.dll
12:57:41.0359 3944 WcsPlugInService - ok
12:57:41.0374 3944 Wd (78fe9542363f297b18c027b2d7e7c07f) C:\Windows\system32\drivers\wd.sys
12:57:41.0374 3944 Wd - ok
12:57:41.0437 3944 WDC_SAM (d6efaf429fd30c5df613d220e344cce7) C:\Windows\system32\DRIVERS\wdcsam.sys
12:57:41.0437 3944 WDC_SAM - ok
12:57:41.0608 3944 WDDMService (bf847a3972cc6b5ce26e0ea742dd52d9) C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe
12:57:41.0624 3944 WDDMService - ok
12:57:41.0702 3944 Wdf01000 (b6f0a7ad6d4bd325fbcd8bac96cd8d96) C:\Windows\system32\drivers\Wdf01000.sys
12:57:41.0702 3944 Wdf01000 - ok
12:57:41.0889 3944 WDFME (b5966f1dff6e20576f3c8c2d93d129fd) C:\Program Files\Western Digital\WD SmartWare\Front Parlor\WDFME\WDFME.exe
12:57:41.0905 3944 WDFME - ok
12:57:42.0061 3944 WdiServiceHost (abfc76b48bb6c96e3338d8943c5d93b5) C:\Windows\system32\wdi.dll
12:57:42.0076 3944 WdiServiceHost - ok
12:57:42.0076 3944 WdiSystemHost (abfc76b48bb6c96e3338d8943c5d93b5) C:\Windows\system32\wdi.dll
12:57:42.0076 3944 WdiSystemHost - ok
12:57:42.0154 3944 WDSC (92f0088ca18bb08bb596ef2608256f8a) C:\Program Files\Western Digital\WD SmartWare\Front Parlor\WDSC.exe
12:57:42.0170 3944 WDSC - ok
12:57:42.0217 3944 WebClient (04c37d8107320312fbae09926103d5e2) C:\Windows\System32\webclnt.dll
12:57:42.0232 3944 WebClient - ok
12:57:42.0264 3944 Wecsvc (ae3736e7e8892241c23e4ebbb7453b60) C:\Windows\system32\wecsvc.dll
12:57:42.0279 3944 Wecsvc - ok
12:57:42.0310 3944 wercplsupport (670ff720071ed741206d69bd995ea453) C:\Windows\System32\wercplsupport.dll
12:57:42.0310 3944 wercplsupport - ok
12:57:42.0388 3944 WerSvc (32b88481d3b326da6deb07b1d03481e7) C:\Windows\System32\WerSvc.dll
12:57:42.0404 3944 WerSvc - ok
12:57:42.0513 3944 winachsf (5c7bdcf5864db00323fe2d90fa26a8a2) C:\Windows\system32\DRIVERS\VSTCNXT3.SYS
12:57:42.0529 3944 winachsf - ok
12:57:42.0607 3944 WinDefend (4575aa12561c5648483403541d0d7f2b) C:\Program Files\Windows Defender\mpsvc.dll
12:57:42.0622 3944 WinDefend - ok
12:57:42.0638 3944 WinHttpAutoProxySvc - ok
12:57:42.0716 3944 Winmgmt (6b2a1d0e80110e3d04e6863c6e62fd8a) C:\Windows\system32\wbem\WMIsvc.dll
12:57:42.0732 3944 Winmgmt - ok
12:57:42.0888 3944 WinRM (7cfe68bdc065e55aa5e8421607037511) C:\Windows\system32\WsmSvc.dll
12:57:42.0919 3944 WinRM - ok
12:57:43.0028 3944 WinTabService (0e563ee48d39a2f6d7dfe3ffede03e7e) C:\Windows\System32\Drivers\WTSRV.EXE
12:57:43.0028 3944 WinTabService - ok
12:57:43.0106 3944 Wlansvc (c008405e4feeb069e30da1d823910234) C:\Windows\System32\wlansvc.dll
12:57:43.0122 3944 Wlansvc - ok
12:57:43.0137 3944 WmiAcpi (2e7255d172df0b8283cdfb7b433b864e) C:\Windows\system32\DRIVERS\wmiacpi.sys
12:57:43.0153 3944 WmiAcpi - ok
12:57:43.0246 3944 wmiApSrv (43be3875207dcb62a85c8c49970b66cc) C:\Windows\system32\wbem\WmiApSrv.exe
12:57:43.0246 3944 wmiApSrv - ok
12:57:43.0387 3944 WMPNetworkSvc (3978704576a121a9204f8cc49a301a9b) C:\Program Files\Windows Media Player\wmpnetwk.exe
12:57:43.0402 3944 WMPNetworkSvc - ok
12:57:43.0449 3944 WPCSvc (cfc5a04558f5070cee3e3a7809f3ff52) C:\Windows\System32\wpcsvc.dll
12:57:43.0449 3944 WPCSvc - ok
12:57:43.0480 3944 WPDBusEnum (801fbdb89d472b3c467eb112a0fc9246) C:\Windows\system32\wpdbusenum.dll
12:57:43.0496 3944 WPDBusEnum - ok
12:57:43.0652 3944 WPFFontCache_v0400 (dcf3e3edf5109ee8bc02fe6e1f045795) C:\Windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe
12:57:43.0668 3944 WPFFontCache_v0400 - ok
12:57:43.0730 3944 ws2ifsl (e3a3cb253c0ec2494d4a61f5e43a389c) C:\Windows\system32\drivers\ws2ifsl.sys
12:57:43.0730 3944 ws2ifsl - ok
12:57:43.0777 3944 wscsvc (1ca6c40261ddc0425987980d0cd2aaab) C:\Windows\system32\wscsvc.dll
12:57:43.0777 3944 wscsvc - ok
12:57:43.0792 3944 WSearch - ok
12:57:43.0995 3944 wuauserv (fc3ec24fce372c89423e015a2ac1a31e) C:\Windows\system32\wuaueng.dll
12:57:44.0042 3944 wuauserv - ok
12:57:44.0229 3944 WUDFRd (ac13cb789d93412106b0fb6c7eb2bcb6) C:\Windows\system32\DRIVERS\WUDFRd.sys
12:57:44.0229 3944 WUDFRd - ok
12:57:44.0260 3944 wudfsvc (575a4190d989f64732119e4114045a4f) C:\Windows\System32\WUDFSvc.dll
12:57:44.0260 3944 wudfsvc - ok
12:57:44.0276 3944 XDva385 - ok
12:57:44.0323 3944 yukonwlh (3e1c915c6291ab5d1cfca680e1bd6bad) C:\Windows\system32\DRIVERS\yk60x86.sys
12:57:44.0338 3944 yukonwlh - ok
12:57:44.0354 3944 MBR (0x1B8) (a863475757cc50891aa8458c415e4b25) \Device\Harddisk0\DR0
12:57:47.0115 3944 \Device\Harddisk0\DR0 - ok
12:57:47.0131 3944 Boot (0x1200) (dd7135c8c40ba84eeecd3600268e932e) \Device\Harddisk0\DR0\Partition0
12:57:47.0131 3944 \Device\Harddisk0\DR0\Partition0 - ok
12:57:47.0193 3944 Boot (0x1200) (1e6c0ac1662ca0aa88d0467340e3e3c1) \Device\Harddisk0\DR0\Partition1
12:57:47.0193 3944 \Device\Harddisk0\DR0\Partition1 - ok
12:57:47.0193 3944 ============================================================
12:57:47.0193 3944 Scan finished
12:57:47.0193 3944 ============================================================
12:57:47.0209 4340 Detected object count: 0
12:57:47.0209 4340 Actual detected object count: 0


aswMBR version 0.9.9.1665 Copyright© 2011 AVAST Software
Run date: 2012-07-03 13:01:44
-----------------------------
13:01:44.974 OS Version: Windows 6.0.6002 Service Pack 2
13:01:44.974 Number of processors: 1 586 0xF0D
13:01:44.974 ComputerName: SCIENCE-PC UserName: Elizabeth
13:01:47.751 Initialize success
13:01:48.453 AVAST engine defs: 12070300
13:02:00.215 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-0
13:02:00.231 Disk 0 Vendor: Hitachi_HTS543216L9A300 FB2OC40C Size: 152627MB BusType: 3
13:02:00.247 Disk 0 MBR read successfully
13:02:00.247 Disk 0 MBR scan
13:02:00.247 Disk 0 unknown MBR code
13:02:00.262 Disk 0 Partition 1 00 27 Hidden NTFS WinRE MSDOS5.0 10000 MB offset 2048
13:02:00.278 Disk 0 Partition 2 80 (A) 07 HPFS/NTFS NTFS 71317 MB offset 20482048
13:02:00.293 Disk 0 Partition 3 00 07 HPFS/NTFS NTFS 71308 MB offset 166539264
13:02:00.293 Disk 0 scanning sectors +312578048
13:02:00.356 Disk 0 scanning C:\Windows\system32\drivers
13:02:08.936 Service scanning
13:02:28.701 Service Tablet2k C:\Windows\"%SystemRoot%\System32\Drivers\Tablet2k.sys" **LOCKED** 123
13:02:34.691 Modules scanning
13:02:42.601 Disk 0 trace - called modules:
13:02:42.632 ntkrnlpa.exe CLASSPNP.SYS disk.sys ataport.SYS hal.dll PCIIDEX.SYS msahci.sys
13:02:42.632 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x85ef2968]
13:02:42.647 3 CLASSPNP.SYS[88ba78b3] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-0[0x84fe6338]
13:02:43.209 AVAST engine scan C:\Windows
13:02:47.031 AVAST engine scan C:\Windows\system32
13:05:21.908 AVAST engine scan C:\Windows\system32\drivers
13:05:32.797 AVAST engine scan C:\Users\Elizabeth
13:20:22.948 AVAST engine scan C:\ProgramData
13:25:03.826 Scan finished successfully
14:17:45.884 Disk 0 MBR has been saved successfully to "C:\Users\Elizabeth\Desktop\MBR.dat"
14:17:45.899 The log file has been saved successfully to "C:\Users\Elizabeth\Desktop\aswMBR.txt"

#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:09 PM

Posted 03 July 2012 - 01:50 PM

Greetings

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Open Notepad and copy/paste the text in the box into the window:

ClearJavaCache::

Save it to your desktop as CFScript.txt

Refering to the picture above, drag CFScript.txt into ComboFix.exe
Posted Image
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you recieve an error "Illegal operation attempted on a registery key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following

  • report from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now after running the script?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 ~Polky

~Polky
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Behind the screen
  • Local time:02:09 PM

Posted 03 July 2012 - 11:13 PM

The computer seems to be running normally. I think it's been long enough to say that either what was causing the redirects has gone away on it's own or one of the programs has deleted and has chosen not to tell anyone it did so.

After ComboFix started, my computer produced a two beep noise I have never heard before and a pop-up marked "Warning ‼"
It said: ComboFix has detected the following real time scanner(s) to be active:

antivirus: avast! Antivirus
antispyware: avast! Antivirus

Antivirus and intrusion prevention programs are known to interfere with ComboFix's running. This may lead to unpredictable results or possible machine damage.

Please disable these scanners before clicking 'OK'.


I turned off all avast! sheilds and continued.

It then shut down my Internet explorer after the blue command prompt-like window opened.

My computer restarted itself, and showed the registry marked for deletion error, which went away after another restart.

ComboFix 12-06-28.03 - Elizabeth 07/03/2012 21:09:25.2.1 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.1976.937 [GMT -4:00]
Running from: c:\users\Elizabeth\Desktop\ComboFix.exe
Command switches used :: c:\users\Elizabeth\Desktop\CFScript.txt
AV: avast! Antivirus *Disabled/Updated* {2B2D1395-420B-D5C9-657E-930FE358FC3C}
SP: avast! Antivirus *Disabled/Updated* {904CF271-6431-DA47-5FCE-A87D98DFB681}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\ELIZAB~1\AppData\Local\Temp\1.tmp\F_IN_BOX.dll
c:\users\Elizabeth\AppData\Local\Temp\1.tmp\F_IN_BOX.dll
c:\windows\TEMP\logishrd\LVPrcInj01.dll
.
.
((((((((((((((((((((((((( Files Created from 2012-06-04 to 2012-07-04 )))))))))))))))))))))))))))))))
.
.
2012-07-04 01:19 . 2012-07-04 01:19 -------- d-----w- c:\users\Default\AppData\Local\temp
2012-07-03 19:50 . 2012-05-31 03:41 6762896 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{642D014C-53EE-42A5-A8F8-8578B7C2FAFC}\mpengine.dll
2012-07-03 18:22 . 2012-07-03 18:22 476936 ----a-w- c:\windows\system32\npdeployJava1.dll
2012-07-03 18:21 . 2012-07-03 18:21 -------- d-----w- c:\program files\Java
2012-06-29 00:44 . 2012-07-04 03:45 -------- d-----w- c:\users\Elizabeth\AppData\Local\temp
2012-06-27 05:18 . 2012-06-27 05:18 -------- d-----w- c:\program files\ESET
2012-06-27 04:16 . 2012-06-27 04:16 -------- dc----w- C:\TDSSKiller_Quarantine
2012-06-24 21:18 . 2012-06-24 21:18 110080 ----a-r- c:\users\Elizabeth\AppData\Roaming\Microsoft\Installer\{9E897D0F-F804-41A3-966C-7BB6EB5B6BE8}\IconCF33A0CE.exe
2012-06-24 21:18 . 2012-06-24 21:18 110080 ----a-r- c:\users\Elizabeth\AppData\Roaming\Microsoft\Installer\{9E897D0F-F804-41A3-966C-7BB6EB5B6BE8}\IconF7A21AF7.exe
2012-06-24 21:18 . 2012-06-24 21:18 110080 ----a-r- c:\users\Elizabeth\AppData\Roaming\Microsoft\Installer\{9E897D0F-F804-41A3-966C-7BB6EB5B6BE8}\IconD7F16134.exe
2012-06-24 21:18 . 2012-06-24 21:19 -------- dc----w- C:\sh4ldr
2012-06-24 21:18 . 2012-06-24 21:18 -------- d-----w- c:\program files\Enigma Software Group
2012-06-24 21:00 . 2012-06-24 21:00 -------- d-----w- c:\program files\HitmanPro
2012-06-24 20:58 . 2012-06-24 21:00 -------- d-----w- c:\programdata\HitmanPro
2012-06-23 21:19 . 2012-06-23 21:19 -------- d-----w- c:\program files\QuickTime
2012-06-23 04:35 . 2012-06-23 04:35 -------- d-----w- c:\users\Elizabeth\.thumbnails
2012-06-23 04:30 . 2012-06-23 04:30 -------- d-----w- c:\users\Elizabeth\AppData\Local\fontconfig
2012-06-23 04:29 . 2012-06-23 05:47 -------- d-----w- c:\users\Elizabeth\.gimp-2.8
2012-06-23 04:29 . 2012-06-23 04:29 -------- d-----w- c:\users\Elizabeth\AppData\Local\gegl-0.2
2012-06-23 04:22 . 2012-06-23 04:27 -------- d-----w- c:\program files\GIMP 2
2012-06-22 01:51 . 2012-06-22 03:25 -------- d-----w- c:\users\Elizabeth\AppData\Local\AutoWikiBrowser
2012-06-21 23:09 . 2012-06-02 22:19 53784 ----a-w- c:\windows\system32\wuauclt.exe
2012-06-21 23:09 . 2012-06-02 22:19 45080 ----a-w- c:\windows\system32\wups2.dll
2012-06-21 23:08 . 2012-06-02 22:19 1933848 ----a-w- c:\windows\system32\wuaueng.dll
2012-06-21 23:08 . 2012-06-02 22:12 2422272 ----a-w- c:\windows\system32\wucltux.dll
2012-06-21 23:08 . 2012-06-02 22:19 35864 ----a-w- c:\windows\system32\wups.dll
2012-06-21 23:08 . 2012-06-02 22:19 577048 ----a-w- c:\windows\system32\wuapi.dll
2012-06-21 23:08 . 2012-06-02 22:12 88576 ----a-w- c:\windows\system32\wudriver.dll
2012-06-21 23:08 . 2012-06-02 19:19 171904 ----a-w- c:\windows\system32\wuwebv.dll
2012-06-21 23:08 . 2012-06-02 19:12 33792 ----a-w- c:\windows\system32\wuapp.exe
2012-06-13 03:19 . 2012-04-23 16:00 984064 ----a-w- c:\windows\system32\crypt32.dll
2012-06-13 03:19 . 2012-04-23 16:00 133120 ----a-w- c:\windows\system32\cryptsvc.dll
2012-06-13 03:19 . 2012-04-23 16:00 98304 ----a-w- c:\windows\system32\cryptnet.dll
2012-06-13 03:19 . 2012-05-01 14:03 180736 ----a-w- c:\windows\system32\drivers\rdpwd.sys
2012-06-13 03:19 . 2012-05-15 19:51 2045440 ----a-w- c:\windows\system32\win32k.sys
2012-06-12 00:12 . 2012-06-12 00:12 -------- d-----w- c:\programdata\Yahoo!
2012-06-11 23:50 . 2012-06-11 23:59 -------- d-----w- c:\program files\Outspark
2012-06-09 02:32 . 2012-06-09 02:32 -------- d-----w- c:\program files\Amazon
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-07-03 18:22 . 2010-08-11 18:17 472840 ----a-w- c:\windows\system32\deployJava1.dll
2012-06-12 02:54 . 2012-04-30 04:51 426184 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2012-06-12 02:54 . 2011-10-08 10:47 70344 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
.
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\00avast]
@="{472083B0-C522-11CF-8763-00608CC02F24}"
[HKEY_CLASSES_ROOT\CLSID\{472083B0-C522-11CF-8763-00608CC02F24}]
2012-03-06 23:15 123536 ----a-w- c:\program files\AVAST Software\Avast\ashShell.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\egisPSDP]
@="{30A0A3F6-38AC-4C53-BB8B-0D95238E25BA}"
[HKEY_CLASSES_ROOT\CLSID\{30A0A3F6-38AC-4C53-BB8B-0D95238E25BA}]
2008-05-15 01:05 121392 ----a-w- c:\program files\Acer\Empowering Technology\eDataSecurity\x86\PSDProtect.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Akamai NetSession Interface"="c:\users\Elizabeth\AppData\Local\Akamai\netsession_win.exe" [2012-05-26 4327744]
"HP Deskjet 3050A J611 series (NET)"="c:\program files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe" [2011-06-08 1804648]
"Messenger (Yahoo!)"="c:\progra~1\Yahoo!\Messenger\YahooMessenger.exe" [2012-05-25 6595928]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2008-04-25 1049896]
"RtHDVCpl"="RtHDVCpl.exe" [2008-06-13 6183456]
"Skytel"="Skytel.exe" [2007-11-21 1826816]
"PLFSetI"="c:\windows\PLFSetI.exe" [2008-07-30 200704]
"LManager"="c:\progra~1\LAUNCH~1\LManager.exe" [2008-09-10 809480]
"ePower_DMC"="c:\program files\Acer\Empowering Technology\ePower\ePower_DMC.exe" [2008-06-11 409600]
"Acer Assist Launcher"="c:\program files\Acer\Acer Assist\launcher.exe" [2007-11-19 1261568]
"InstaLAN"="c:\program files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe" [2010-03-02 1134488]
"WTClient"="WTClient.exe" [2007-04-11 40960]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2010-08-26 136216]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2010-08-26 171032]
"Persistence"="c:\windows\system32\igfxpers.exe" [2010-08-26 170520]
"Kernel and Hardware Abstraction Layer"="KHALMNPR.EXE" [2009-06-17 55824]
"SwitchBoard"="c:\program files\Common Files\Adobe\SwitchBoard\SwitchBoard.exe" [2010-02-19 517096]
"avast"="c:\program files\AVAST Software\Avast\avastUI.exe" [2012-03-06 4241512]
"LogitechQuickCamRibbon"="c:\program files\Logitech\Logitech WebCam Software\LWS.exe" [2009-10-14 2793304]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2012-01-18 254696]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"AvgUninstallURL"="start http://www.avg.com/ww.special-uninstallation-feedback-appf?lic=NFVWSzItQUxZTUYtU0xLTFUtQVoyVUItNkdPS0ItSkhGTkg&inst=NzctNjA3MTkwNTg3LUZQOSs2LU4xRisxLVRCOSsyLUZMKzktRjEwTSs1LVFJWDErNC1YMjAxMCsyLUYxME0xMEQrMS1MSUMrNzctRkwxMCsxLVNQMSsxLVNVRCsxLVMxSSsxLVNVMysxLVRVRysz&prod=90&ver=10.0.1375" [?]
.
c:\users\Elizabeth\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
Digsby.lnk - c:\users\Elizabeth\AppData\Local\Digsby\App\digsby.exe [2010-3-3 141488]
Monitor Ink Alerts - HP Deskjet 3050A J611 series (Network).lnk - c:\windows\system32\RunDll32.exe [2006-11-2 44544]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Logitech SetPoint.lnk - c:\program files\Logitech\SetPoint\SetPoint.exe [2011-1-6 813584]
WDDMStatus.lnk - c:\program files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe [2011-3-9 3986944]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"aux1"=wdmaud.drv
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro36]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro36.sys]
@=""
.
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run-]
"Google Update"="c:\users\Elizabeth\AppData\Local\Google\Update\GoogleUpdate.exe" /c
"ehTray.exe"=c:\windows\ehome\ehTray.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
"Acer Product Registration"="c:\program files\Acer\Acer Registration\ACE1.exe" /startup
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 10.0\Reader\Reader_sl.exe"
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe"
"eDataSecurity Loader"=c:\program files\Acer\Empowering Technology\eDataSecurity\x86\eDSloader.exe
"BkupTray"="c:\program files\NewTech Infosystems\NTI Backup Now 5\BkupTray.exe"
"AdobeCS5ServiceManager"="c:\program files\Common Files\Adobe\CS5ServiceManager\CS5ServiceManager.exe" -launchedbylogin
"AdobeAAMUpdater-1.0"="c:\program files\Common Files\Adobe\OOBE\PDApp\UWA\UpdaterStartupUtility.exe"
"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe"
"HP Software Update"=c:\program files\Hp\HP Software Update\HPWuSchd2.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001
.
R3 1394hub;1394 Enabled Hub;c:\windows\System32\svchost.exe [x]
S2 AdobeARMservice;Adobe Acrobat Update Service;c:\program files\Common Files\Adobe\ARM\1.0\armsvc.exe [x]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
Akamai REG_MULTI_SZ Akamai
.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost - NetSvcs
UxTuneUp
.
Contents of the 'Scheduled Tasks' folder
.
2012-07-04 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-09-07 07:06]
.
2012-07-04 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-09-07 07:06]
.
2012-07-03 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1240495907-1012746745-2182913292-1000Core.job
- c:\users\Elizabeth\AppData\Local\Google\Update\GoogleUpdate.exe [2010-12-04 16:41]
.
2012-07-04 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-1240495907-1012746745-2182913292-1000UA.job
- c:\users\Elizabeth\AppData\Local\Google\Update\GoogleUpdate.exe [2010-12-04 16:41]
.
.
------- Supplementary Scan -------
.
uStart Page = about:blank
mStart Page = hxxp://homepage.acer.com/rdr.aspx?b=ACAW&l=0409&s=2&o=vp32&d=0109&m=aspire_5335
uInternet Settings,ProxyOverride = 127.0.0.1:9421;<local>
TCP: DhcpNameServer = 192.168.2.1
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2012-07-03 23:44
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ...
.
scanning hidden autostart entries ...
.
scanning hidden files ...
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Services\npggsvc]
"ImagePath"="c:\windows\system32\GameMon.des -service"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\Approved Extensions]
@Denied: (2) (LocalSystem)
"{5CBE3B7C-1E47-477E-A7DD-396DB0476E29}"=hex:51,66,7a,6c,4c,1d,38,12,12,38,ad,
58,75,50,10,02,d8,cb,7a,2d,b5,19,2a,3d
"{18DF081C-E8AD-4283-A596-FA578C2EBDC3}"=hex:51,66,7a,6c,4c,1d,38,12,72,0b,cc,
1c,9f,a6,ed,07,da,80,b9,17,89,70,f9,d7
"{72853161-30C5-4D22-B7F9-0BBC1D38A37E}"=hex:51,66,7a,6c,4c,1d,38,12,0f,32,96,
76,f7,7e,4c,08,c8,ef,48,fc,18,66,e7,6a
"{83A2F9B1-01A2-4AA5-87D1-45B6B8505E96}"=hex:51,66,7a,6c,4c,1d,38,12,df,fa,b1,
87,90,4f,cb,0f,f8,c7,06,f6,bd,0e,1a,82
"{DBC80044-A445-435B-BC74-9C25C1C588A9}"=hex:51,66,7a,6c,4c,1d,38,12,2a,03,db,
df,77,ea,35,06,c3,62,df,65,c4,9b,cc,bd
"{2A541AE1-5BF6-4665-A8A3-CFA9672E4291}"=hex:51,66,7a,6c,4c,1d,38,12,8f,19,47,
2e,c4,15,0b,03,d7,b5,8c,e9,62,70,06,85
"{32004B8A-44A9-43E7-84E9-808838809519}"=hex:51,66,7a,6c,4c,1d,38,12,e4,48,13,
36,9b,0a,89,06,fb,ff,c3,c8,3d,de,d1,0d
"{FF059E31-CC5A-4E2E-BF3B-96E929D65503}"=hex:51,66,7a,6c,4c,1d,38,12,5f,9d,16,
fb,68,82,40,0b,c0,2d,d5,a9,2c,88,11,17
"{BDEADE7F-C265-11D0-BCED-00A0C90AB50F}"=hex:51,66,7a,6c,4c,1d,38,12,11,dd,f9,
b9,57,8c,be,54,c3,fb,43,e0,cc,54,f1,1b
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration]
@Denied: (2) (LocalSystem)
"Timestamp"=hex:20,a8,7a,81,4f,09,cc,01
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (LocalSystem)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,e9,5d,e3,1b,0c,a0,94,4c,b5,30,2f,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,e9,5d,e3,1b,0c,a0,94,4c,b5,30,2f,\
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'Explorer.exe'(4976)
c:\program files\Acer\Empowering Technology\eDataSecurity\x86\PSDProtect.dll
c:\program files\Acer\Empowering Technology\eDataSecurity\x86\sysenv.dll
c:\windows\System32\NLSData0009.dll
c:\windows\system32\pnidui.dll
.
------------------------ Other Running Processes ------------------------
.
c:\progra~1\ENIGMA~1\SPYHUN~1\SH4SER~1.EXE
c:\program files\AVAST Software\Avast\AvastSvc.exe
c:\program files\Belkin\Router Setup and Monitor\BelkinService.exe
c:\windows\system32\agrsmsvc.exe
c:\program files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe
c:\program files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe
c:\program files\Acer\Empowering Technology\Service\ETService.exe
c:\program files\Common Files\LightScribe\LSSrvc.exe
c:\program files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe
c:\acer\Mobility Center\MobilityService.exe
c:\program files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe
c:\program files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe
c:\program files\TuneUp Utilities 2010\TuneUpUtilitiesService32.exe
c:\program files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe
c:\program files\Western Digital\WD SmartWare\Front Parlor\WDFME\WDFME.exe
c:\program files\Western Digital\WD SmartWare\Front Parlor\WDSC.exe
c:\windows\System32\Drivers\WTSRV.EXE
c:\windows\system32\wbem\unsecapp.exe
c:\program files\TuneUp Utilities 2010\TuneUpUtilitiesApp32.exe
c:\windows\system32\WTClient.exe
c:\windows\system32\igfxsrvc.exe
c:\program files\Common Files\Microsoft Shared\Ink\InputPersonalization.exe
.
**************************************************************************
.
Completion time: 2012-07-03 23:51:57 - machine was rebooted
ComboFix-quarantined-files.txt 2012-07-04 03:51
ComboFix2.txt 2012-06-29 00:44
.
Pre-Run: 21,784,870,912 bytes free
Post-Run: 21,510,676,480 bytes free
.
- - End Of File - - 7101DC38706D324FA521F231D87B3505

#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:09 PM

Posted 03 July 2012 - 11:23 PM

Hello

:P2P Warning!:

IMPORTANT I notice there are signs of one or more P2P (Person to Person) File Sharing Programs on your computer.

Please note that as long as you are using any form of Peer-to-Peer networking and downloading files from non-documented sources, you can expect infestations of malware to occur
Once upon a time, P2P file sharing was fairly safe. That is no longer true. P2P programs form a direct conduit on to your computer, their security measures are easily circumvented and malware writers are increasingly exploiting them to spread their wares on to your computer. Further to that, if your P2P program is not configured correctly, your computer may be sharing more files than you realize. There have been cases where people's passwords, address books and other personal, private, and financial details have been exposed to a file sharing network by a badly configured program.

Please read these short reports on the dangers of peer-2-peer programs and file sharing.

FBI Cyber Education Letter
File sharing infects 500,000 computers
USAToday
infoworld


These logs are looking allot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

uninstall some programs

NOTE** Because of the cleanup process some of the programs I have listed may not be in add/remove anymore this is fine just move to the next item on the list.

You can remove these programs using add/remove or you can use the free uninstaller from Revo (it does allot better of a job

Programs to remove

µTorrent
iMesh
Java™ 6 Update 29
[/list]


  • Please download and install Revo Uninstaller Free
  • Double click Revo Uninstaller to run it.
  • From the list of programs double click on The Program to remove
  • When prompted if you want to uninstall click Yes.
  • Be sure the Moderate option is selected then click Next.
  • The program will run, If prompted again click Yes
  • when the built-in uninstaller is finished click on Next.
  • Once the program has searched for leftovers click Next.
  • Check/tick the bolded items only on the list then click Delete
  • when prompted click on Yes and then on next.
  • put a check on any folders that are found and select delete
  • when prompted select yes then on next
  • Once done click Finish.
.


Install Java:

Please go here to install Java

  • click on the Free Java Download Button
  • click on Agree and start Free download
  • click on Run
  • click on run again
  • click on install
  • when install is complete click on close

Clean Out Temp Files

  • This small application you may want to keep and use once a week to keep the computer clean.

    Download CCleaner from here http://www.ccleaner.com/

  • Run the installer to install the application.
  • When it gives you the option to install Yahoo toolbar uncheck the box next to it.
  • Run CCleaner. (make sure under Windows tab all the boxes of Internet Explorer and Windows explorer are checked. Under System check Empty Recycle Bin and Temporary Files. Under Application tab all the boxes should be checked).
  • Click Run Cleaner.
  • Close CCleaner.

: Malwarebytes' Anti-Malware :

  • Please download Malwarebytes' Anti-Malware to your desktop.
  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to
    • Update Malwarebytes' Anti-Malware
    • and Launch Malwarebytes' Anti-Malware
  • then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidently close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


Download HijackThis

If you have any problems running Hijackthis see NOTE** below (Host file not read, blank notepad ...)

  • Go Here to download HijackThis Installer
  • Save HijackThis Installer to your desktop.
  • Double-click on the HijackThis Installer icon on your desktop. (Vista and Win 7 right click and run as admin)
  • By default it will install to C:\Program Files\Trend Micro\HijackThis .
  • Click on Install.
  • It will create a HijackThis icon on the desktop.
  • Once installed it will launch Hijackthis.
  • Click on the Do a system scan and save a logfile button. It will scan and the log should open in notepad.
  • Click on Edit > Select All then click on Edit > Copy to copy the entire contents of the log.
  • Come back here to this thread and Paste the log in your next reply.
  • DO NOT use the AnalyseThis button its findings are dangerous if misinterpreted.
  • DO NOT have Hijackthis fix anything yet. Most of what it finds will be harmless or even required.


NOTE**
sometimes we have to run it like this To run HijackThis as an administrator, right-click HijackThis.exe
(located: C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe)<--32bit
(located: C:\Program Files(86)\Trend Micro\HiJackThis\HiJackThis.exe)<--64bit
and select to run as administrator

"information and logs"

  • In your next post I need the following

  • Log From MBAM
  • report from Hijackthis
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 ~Polky

~Polky
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Behind the screen
  • Local time:02:09 PM

Posted 05 July 2012 - 12:14 AM

I removed utorrent with the add/remove function.
I have no idea what iMesh is, and therefore probably never downloaded it. If anything, it might have been a preinstall I got rid of when I got the computer. So it was not in the add/remove.
The Java listed in the add/remove programs was Java™ 6 Update 33.

Since you pointed out these particular programs, and I(couldn't find two of them I ran Revo Uninstaller Free.
I couldn't find µTorrent, iMesh, or Java™ 6 Update 29 in Revo.

I installed Java, and when I checked, the old version had not been removed...so I removed it with Revo.
It also downloaded JavaFX 2.1.1. I guess you meant for it to do that.

I already had ccleaner and when I opened my version, I was asked to download the new version. Empty Recycle Bin and Temporary Files were already checked, so I left them checked.

Malwarebytes had no problem getting rid of the one thing it found.

Hijack this didn't ask to install, it just opened the program. I had to hit Menu to get to the right screen. It popped up a window saying,
For some reason your system denied write access to the

Hosts file. If any hijacked domains are in this file,

HijackThis may not be able to fix this.
If that happens, you need to edit the file yourself.

To do this, click Start, Run and type:
notepad C:\Windows\System32\drivers\etc\hosts
and press Enter. Find the line(s) HijackThis reports

and delete them. Save the file as 'hosts.' (with quotes), and reboot.
For Vista: simply, exit HijackThis, right click on the HijackThis icon, choose 'Run as adminstrator'.

The computer seems to be operating normally.

Malwarebytes Anti-Malware 1.61.0.1400
www.malwarebytes.org

Database version: v2012.07.05.01

Windows Vista Service Pack 2 x86 NTFS
Internet Explorer 9.0.8112.16421
Elizabeth :: SCIENCE-PC [administrator]

7/5/2012 12:56:28 AM
mbam-log-2012-07-05 (00-56-28).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry |

File System | Heuristics/Extra | Heuristics/Shuriken |

PUP | PUM
Scan options disabled: P2P
Objects scanned: 204350
Time elapsed: 8 minute(s), 16 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 1
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer

\Browser Helper Objects\{66D8FBA6-D90F-40A9-AC55-

84896F79CA69} (Trojan.BHO) -> Quarantined and deleted

successfully.

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)


Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 1:13:57 AM, on 7/5/2012
Platform: Windows Vista SP2 (WinNT 6.00.1906)
MSIE: Internet Explorer v9.00 (9.00.8112.16446)
Boot mode: Normal

Running processes:
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesApp32.exe
C:\Windows\system32\WTClient.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Windows\RtHDVCpl.exe
C:\Windows\PLFSetI.exe
C:\Windows\system32\igfxsrvc.exe
C:\Users\ELIZAB~1\AppData\Local\Temp\RtkBtMnt.exe
C:\Program Files\Acer\Empowering Technology\ePower\ePower_DMC.exe
C:\Program Files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe
C:\Windows\System32\hkcmd.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files\AVAST Software\Avast\AvastUI.exe
C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe
C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe
C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe
C:\Program Files\Logitech\SetPoint\SetPoint.exe
C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe
C:\Windows\system32\RunDll32.exe
C:\Windows\system32\wbem\unsecapp.exe
C:\Users\Elizabeth\AppData\Local\Digsby\App\lib\digsby-app.exe
C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE
C:\Program Files\HP\HP Deskjet 3050A J611 series\bin\HPNetworkCommunicator.exe
C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe
C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\HPNetworkCommunicator.exe
C:\Program Files\Belkin\Router Setup and Monitor\BelkinSetup.exe
C:\Program Files\Common Files\Logishrd\LQCVFX\COCIManager.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\Program Files\Common Files\Microsoft Shared\Ink\InputPersonalization.exe
C:\Windows\system32\Macromed\Flash\FlashUtil32_11_3_300_257_ActiveX.exe
C:\Users\Elizabeth\AppData\Local\Digsby\App\lib\aspell\bin\aspell.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Windows\System32\notepad.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Users\Elizabeth\Desktop\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://homepage.acer.com/rdr.aspx?b=ACAW&l=0409&s=2&o=vp32&d=0109&m=aspire_5335
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://homepage.acer.com/rdr.aspx?b=ACAW&l=0409&s=2&o=vp32&d=0109&m=aspire_5335
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = 127.0.0.1:9421;<local>
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\PROGRA~1\MICROS~2\Office12\GRA8E1~1.DLL
O2 - BHO: Java™ Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Oracle\JavaFX 2.1 Runtime\bin\ssv.dll
O2 - BHO: ShowBarObj Class - {83A2F9B1-01A2-4AA5-87D1-45B6B8505E96} - C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\ActiveToolBand.dll
O2 - BHO: avast! WebRep - {8E5E2654-AD2D-48bf-AC2D-D17F00898D06} - C:\Program Files\AVAST Software\Avast\aswWebRepIE.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Oracle\JavaFX 2.1 Runtime\bin\jp2ssv.dll
O3 - Toolbar: Acer eDataSecurity Management - {5CBE3B7C-1E47-477e-A7DD-396DB0476E29} - C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDStoolbar.dll
O3 - Toolbar: avast! WebRep - {8E5E2654-AD2D-48bf-AC2D-D17F00898D06} - C:\Program Files\AVAST Software\Avast\aswWebRepIE.dll
O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe
O4 - HKLM\..\Run: [Skytel] Skytel.exe
O4 - HKLM\..\Run: [PLFSetI] C:\Windows\PLFSetI.exe
O4 - HKLM\..\Run: [LManager] C:\PROGRA~1\LAUNCH~1\LManager.exe
O4 - HKLM\..\Run: [ePower_DMC] C:\Program Files\Acer\Empowering Technology\ePower\ePower_DMC.exe
O4 - HKLM\..\Run: [Acer Assist Launcher] C:\Program Files\Acer\Acer Assist\launcher.exe
O4 - HKLM\..\Run: [InstaLAN] "C:\Program Files\Belkin\Router Setup and Monitor\BelkinRouterMonitor.exe" startup
O4 - HKLM\..\Run: [WTClient] WTClient.exe
O4 - HKLM\..\Run: [IgfxTray] C:\Windows\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe
O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe
O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE
O4 - HKLM\..\Run: [SwitchBoard] C:\Program Files\Common Files\Adobe\SwitchBoard\SwitchBoard.exe
O4 - HKLM\..\Run: [avast] "C:\Program Files\AVAST Software\Avast\avastUI.exe" /nogui
O4 - HKLM\..\Run: [LogitechQuickCamRibbon] "C:\Program Files\Logitech\Logitech WebCam Software\LWS.exe" /hide
O4 - HKLM\..\RunOnce: [AvgUninstallURL] cmd.exe /c start http://www.avg.com/ww.special-uninstallation-feedback-appf?lic=NFVWSzItQUxZTUYtU0xLTFUtQVoyVUItNkdPS0ItSkhGTkg"&"inst=NzctNjA3MTkwNTg3LUZQOSs2LU4xRisxLVRCOSsyLUZMKzktRjEwTSs1LVFJWDErNC1YMjAxMCsyLUYxME0xMEQrMS1MSUMrNzctRkwxMCsxLVNQMSsxLVNVRCsxLVMxSSsxLVNVMysxLVRVRysz"&"prod=90"&"ver=10.0.1375
O4 - HKLM\..\RunOnce: [Malwarebytes Anti-Malware] C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent
O4 - HKCU\..\Run: [Akamai NetSession Interface] "C:\Users\Elizabeth\AppData\Local\Akamai\netsession_win.exe"
O4 - HKCU\..\Run: [HP Deskjet 3050A J611 series (NET)] "C:\Program Files\HP\HP Deskjet 3050A J611 series\Bin\ScanToPCActivationApp.exe" -deviceID "CN2225401P05PJ:NW" -scfn "HP Deskjet 3050A J611 series (NET)" -AutoStart 1
O4 - HKCU\..\Run: [Messenger (Yahoo!)] "C:\PROGRA~1\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - Startup: Digsby.lnk = C:\Users\Elizabeth\AppData\Local\Digsby\App\digsby.exe
O4 - Startup: Monitor Ink Alerts - HP Deskjet 3050A J611 series (Network).lnk = ?
O4 - Global Startup: Logitech SetPoint.lnk = C:\Program Files\Logitech\SetPoint\SetPoint.exe
O4 - Global Startup: WDDMStatus.lnk = C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra button: Add to Wish List - {76c5fb99-dd0a-4186-9e75-65d1bf3da283} - C:\Program Files\Amazon\Add to Wish List IE Extension\run.htm
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics
O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} (QuickTime Plugin Control) - http://appldnld.apple.com.edgesuite.net/content.info.apple.com/QuickTime/qtactivex/qtplugin.cab
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\PROGRA~1\MICROS~2\Office12\GR99D3~1.DLL
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\Windows\system32\browseui.dll
O23 - Service: Adobe Acrobat Update Service (AdobeARMservice) - Adobe Systems Incorporated - C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe
O23 - Service: AffinegyService - Affinegy, Inc. - C:\Program Files\Belkin\Router Setup and Monitor\BelkinService.exe
O23 - Service: Agere Modem Call Progress Audio (AgereModemAudio) - Agere Systems - C:\Windows\system32\agrsmsvc.exe
O23 - Service: avast! Antivirus - AVAST Software - C:\Program Files\AVAST Software\Avast\AvastSvc.exe
O23 - Service: NTI Backup Now 5 Agent Service (BUNAgentSvc) - NewTech Infosystems, Inc. - C:\Program Files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe
O23 - Service: eDataSecurity Service - Egis Incorporated - C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe
O23 - Service: Empowering Technology Service (ETService) - Unknown owner - C:\Program Files\Acer\Empowering Technology\Service\ETService.exe
O23 - Service: Google Update Service (gupdate1ca2f89daf62d40) (gupdate1ca2f89daf62d40) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Update Service (gupdatem) (gupdatem) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Logitech Bluetooth Service (LBTServ) - Logitech, Inc. - C:\Program Files\Common Files\Logishrd\Bluetooth\LBTServ.exe
O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
O23 - Service: Process Monitor (LVPrcSrv) - Logitech Inc. - C:\Program Files\Common Files\LogiShrd\LVMVFM\LVPrcSrv.exe
O23 - Service: MobilityService - Unknown owner - C:\Acer\Mobility Center\MobilityService.exe
O23 - Service: nProtect GameGuard Service (npggsvc) - Unknown owner - C:\Windows\system32\GameMon.des.exe (file missing)
O23 - Service: NTI Backup Now 5 Backup Service (NTIBackupSvc) - NewTech InfoSystems, Inc. - C:\Program Files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe
O23 - Service: NTI Backup Now 5 Scheduler Service (NTISchedulerSvc) - Unknown owner - C:\Program Files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe
O23 - Service: Skype Updater (SkypeUpdate) - Skype Technologies - C:\Program Files\Skype\Updater\Updater.exe
O23 - Service: SpyHunter 4 Service - Enigma Software Group USA, LLC. - C:\PROGRA~1\ENIGMA~1\SPYHUN~1\SH4SER~1.EXE
O23 - Service: Adobe SwitchBoard (SwitchBoard) - Adobe Systems Incorporated - C:\Program Files\Common Files\Adobe\SwitchBoard\SwitchBoard.exe
O23 - Service: @C:\Program Files\TuneUp Utilities 2010\TuneUpDefragService.exe,-1 (TuneUp.Defrag) - TuneUp Software - C:\Program Files\TuneUp Utilities 2010\TuneUpDefragService.exe
O23 - Service: TuneUp Utilities Service (TuneUp.UtilitiesSvc) - TuneUp Software - C:\Program Files\TuneUp Utilities 2010\TuneUpUtilitiesService32.exe
O23 - Service: WDDMService - WDC - C:\Program Files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe
O23 - Service: WD File Management Engine (WDFME) - Unknown owner - C:\Program Files\Western Digital\WD SmartWare\Front Parlor\WDFME\WDFME.exe
O23 - Service: WD File Management Shadow Engine (WDSC) - Unknown owner - C:\Program Files\Western Digital\WD SmartWare\Front Parlor\WDSC.exe
O23 - Service: WinTab Service (WinTabService) - Tablet Driver - C:\Windows\System32\Drivers\WTSRV.EXE

--
End of file - 11195 bytes

Edited by ~Polky, 05 July 2012 - 12:17 AM.


#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:09 PM

Posted 05 July 2012 - 09:54 AM

Greetings

These logs are looking very good, we are almost done!!! Just one more scan to go.

:Remove unneeded start-up entries:

This part of the fix is purely optional
These are programs that start up when you turn on your computer but don't need to be, any of these programs you can click on their icons (or start from the control panel) and start the program when you need it. By stopping these programs you will boot up faster and your computer will work faster.

If you have any problems running Hijackthis see NOTE** below (Host file not read, blank notepad ...)

  • Run HijackThis
  • Click on the Scan button
  • Put a check beside all of the items listed below (if present):

  • Close all open windows and browsers/email, etc...
  • Click on the "Fix Checked" button
  • When completed, close the application.

    NOTE**You can research each of those lines >here< and see if you want to keep them or not
    just copy the name between the brackets and paste into the search space
    O4 - HKLM\..\Run: [IntelliPoint]


NOTE**
sometimes we have to run it like this To run HijackThis as an administrator, right-click HijackThis.exe
(located: C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe)<--32bit
(located: C:\Program Files(86)\Trend Micro\HiJackThis\HiJackThis.exe)<--64bit
and select to run as administrator

Eset Online Scanner

**Note** You will need to use Internet explorer for this scan - Vista and win 7 right click on IE shortcut and run as admin

Go Eset web page to run an online scanner from ESET.

  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • click on the Run ESET Online Scanner button
  • Tick the box next to YES, I accept the Terms of Use.
    • Click Start
  • When asked, allow the add/on to be installed
    • Click Start
  • Make sure that the option Remove found threats is unticked
  • Click on Advanced Settings, ensure the options
    Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.
  • Click Scan
  • wait for the virus definitions to be downloaded
  • Wait for the scan to finish

When the scan is complete

  • If no threats were found
  • put a checkmark in "Uninstall application on close"
  • close program
  • report to me that nothing was found

  • If threats were found
  • click on "list of threats found"
  • click on "export to text file" and save it as ESET SCAN and save to the desktop
  • Click on back
  • put a checkmark in "Uninstall application on close"
  • click on finish
  • close program
  • copy and paste the report here


Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#14 ~Polky

~Polky
  • Topic Starter

  • Members
  • 31 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:Behind the screen
  • Local time:02:09 PM

Posted 05 July 2012 - 10:09 PM

I removed all of the suggested entries with HijackThis as an administrator and double checked that they were gone.

The ESET Online Scanne didn't find anything.

#15 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:09 PM

Posted 05 July 2012 - 10:35 PM

Very well done!! This is my general post for when your logs show no more signs of malware - Please let me know if you still are having problems with your computer and what these problems are.


:Why we need to remove some of our tools:

Some of the tools we have used to clean your computer were made by fellow malware fighters and are very powerful and if used incorrectly or at the wrong time can make the computer an expensive paper weight.
They are updated all the time and some of them more than once a day so by the time you are ready to use them again they will already be outdated.

The following procedures will implement some cleanup procedures to remove these tools. It will also reset your System Restore by flushing out previous restore points and create a new restore point. It will also remove all the backups our tools may have made.
:DeFogger:

Note** Defogger only needs to be run if it was run when we first started. If you have not already run it then skip this.

  • To re-enable your Emulation drivers, double click DeFogger to run the tool.
  • The application window will appear
  • Click the Re-enable button to re-enable your CD Emulation drivers
  • Click Yes to continue
  • A 'Finished!' message will appear
  • Click OK
  • DeFogger will now ask to reboot the machine - click OK.
Your Emulation drivers are now re-enabled.

:Uninstall ComboFix:

  • turn off all active protection software
  • push the "windows key" + "R" (between the "Ctrl" button and "Alt" Button)
  • please copy and past the following into the box ComboFix /Uninstall and click OK.
  • Note the space between the X and the /Uninstall, it needs to be there.
  • Posted Image

:Remove the rest of our tools:

Please download OTCleanIt and save it to desktop. This tool will remove all the tools we used to clean your pc.
  • Double-click OTCleanIt.exe.
  • Click the CleanUp! button.
  • Select Yes when the "Begin cleanup Process?" prompt appears.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes, if not delete it by yourself.
  • If asked to restart the computer, please do so
Note: If you receive a warning from your firewall or other security programs regarding OTCleanIt attempting to contact the internet, please allow it to do so.

:The programs you can keep:

Some of the programs that we have used would be a good idea to keep and used often in helping to keep the computer clean. I use these programs on my computer.

Revo Uninstaller Free - this is the uninstaller that I had you download and works allot better than add/remove in windows and has saved me more than once from corrupted installs and uninstalls

CCleaner - This is a good program to clean out temp files, I would use this once a week or before any malware scan to remove unwanted temp files - It has a built in registry cleaner but I would leave that alone and not use any registry cleaner

Malwarebytes' Anti-Malware The Gold standard today in antimalware scanners

:Security programs:

One of the questions I am asked all the time is "What programs do you use" I have at this time 4 computers in my home and I have this setup on all 4 of them.


  • Microsoft Security Essentials - provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software.
  • WinPatrol As a robust security monitor, WinPatrol will alert you to hijackings, malware attacks and critical changes made to your computer without your permission. WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge.
  • Malwarebytes' Anti-Malware Malwarebytes' Anti-Malware is a new and powerful anti-malware tool. It is
    totally free but for real-time protection you will have to pay a small one-time fee. We used this to help clean your computer and recomend keeping it and using often. (I have upgraded to the paid version of MBAM and I am glad I did)

    Note** If you decide to install MSE you will need to uninstall your present Antivirus

:Security awareness:

The other question I am asked all the time is "How can I prevent this from happening again." and the short answer to that is to be aware of what is out there and how to start spotting dangers.

Here are some articles that are must reads and should be read by everybody in your household that uses the internet

internetsafety

Internet Safety for Kids

Here is some more reading for you from some of my colleges

PC Safety and Security - What Do I Need? from my friends at Tech Support Forum

COMPUTER SECURITY - a short guide to staying safer online from my friends at Malware Removal

quoted from Tech Support Forum

Conclusion

There is no such thing as ‘perfect security’. This applies to many things, not just computer systems. Using the above guide you should be able to take all the reasonable steps you can to prevent infection. However, the most important part of all this is you, the user. Surf sensibly and think before you download a file or click on a link. Take a few moments to assess the possible risks and you should be able to enjoy all the internet has to offer.


I'd be grateful if you could reply to this post so that I know you have read it and, if you've no other questions, the thread can then be closed.

I Will Keep This Open For About Three Days, If Anything Comes Up - Just Come Back And Let Me Know, after that time you will have to send me a PM

My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->Posted Image<-- Don't worry every little bit helps.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users