Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

W32 Blaster Worm - Used Combofix and now have a White Screen


  • This topic is locked This topic is locked
31 replies to this topic

#1 portergm

portergm

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:10:35 PM

Posted 10 July 2013 - 12:22 PM

On July 7, 2013, my HP laptop displayed a warning that the computer was infected with the W32 Blaster Worm. A pop up screen appeared and started scanning the computer. At the end of the scan I was directed to register the software to delete several files with "child porn" in the title. I conducted an Internet search on the W32 Blaster Worm and found several free software downloads to remove the fake worm. I tried three of them, neither one worked. I came across "Combofix" and tried it also. Now when I turn on my computer, it boots up, displays my desktop briefly, and then converts to an all white screen. Only the cursor is displayed. The computer is unresponsive to any keystrokes.

After reading further, I realize that I have committed several mortal sins. I installed multiple programs designed to do the same thing and possibly created several conflicts. I also installed Combofix without authorization. Is there any hope for me at this juncture in my misguided attempt to fix my computer?

Is it possible to restore use of my laptop without losing files on the hard drive?

BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:12:35 AM

Posted 10 July 2013 - 03:23 PM


Hello portergm

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

For x32 (x86) bit systems download Farbar Recovery Scan Tool and save it to a flash drive.

For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

How to tell > 32 or 64 bit

Plug the flashdrive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:
  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.
To enter System Recovery Options by using Windows installation disc:
  • Insert the installation disc.
  • Restart your computer.
  • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
  • Click Repair your computer.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account and click Next.
On the System Recovery Options menu you will get the following options:

    • Startup Repair
      System Restore
      Windows Complete PC Restore
      Windows Memory Diagnostic Tool
      Command Prompt
  • Select Command Prompt
  • In the command window type in notepad and press Enter.
  • The notepad opens. Under File menu select Open.
  • Select "Computer" and find your flash drive letter and close the notepad.
  • In the command window type e:\frst64.exe or e:\frst.exe and press Enter
    Note: Replace letter e with the drive letter of your flash drive.
  • The tool will start to run.
  • When the tool opens click Yes to disclaimer.
  • First Press the Scan button.
  • It will make a log (FRST.txt)
I want you to poste the FRST.txt report into your reply to me

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 portergm

portergm
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:10:35 PM

Posted 10 July 2013 - 06:35 PM

Gringo,

 

Thanks for the instructions. They were clear and easy to follow, especially for a novice.  I have pasted below the FRST.txt report.

 

Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 10-07-2013 03
Ran by SYSTEM on 10-07-2013 17:39:55
Running from F:\
Windows Vista ™ Home Premium (X64) OS Language: English(US)
Internet Explorer Version 9
Boot Mode: Recovery

The current controlset is ControlSet001
ATTENTION!:=====> FRST is updated to run from normal or Safe mode to produce a full FRST.txt log and an extra Addition.txt log.

==================== Registry (Whitelisted) ==================

HKLM\...\Run: [SynTPEnh] - C:\Program Files\Synaptics\SynTP\SynTPEnh.exe [1220392 2008-01-18] (Synaptics, Inc.)
HKLM\...\Run: [SMSERIAL] - C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe [833536 2007-01-17] (Motorola Inc.)
HKLM\...\Run: [RtHDVCpl] - RAVCpl64.exe [x]
HKLM\...\Run: [IAAnotif] - "C:\Program Files (x86)\Intel\Intel Matrix Storage Manager\iaanotif.exe" [178712 2008-04-15] (Intel Corporation)
HKLM\...\Run: [OnScreenDisplay] - C:\Program Files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe [701440 2007-09-04] ( Hewlett-Packard Development Company, L.P.)
HKLM\...\Run: [HP Health Check Scheduler] - [ProgramFilesFolder]Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe [x]
HKLM\...\Run: [NvCplDaemon] - RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup [16395880 2009-10-03] (NVIDIA Corporation)
HKLM-x32\...\Run: [QPService] - "C:\Program Files (x86)\HP\QuickPlay\QPService.exe" [468264 2007-12-19] (CyberLink Corp.)
HKLM-x32\...\Run: [QlbCtrl] - %ProgramFiles(x86)%\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe /Start [x]
HKLM-x32\...\Run: [UCam_Menu] - "C:\Program Files (x86)\CyberLink\YouCam\MUITransfer\MUIStartMenu.exe" "C:\Program Files (x86)\CyberLink\YouCam" update "Software\CyberLink\YouCam\1.0" [218408 2007-08-16] (CyberLink Corp.)
HKLM-x32\...\Run: [hpqSRMon] -  [x]
HKLM-x32\...\Run: [hpWirelessAssistant] - C:\Program Files (x86)\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe [480560 2007-09-13] (Hewlett-Packard Development Company, L.P.)
HKLM-x32\...\Run: [WAWifiMessage] - C:\Program Files (x86)\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe [311296 2007-01-08] (Hewlett-Packard Development Company, L.P.)
HKLM-x32\...\Run: [GrooveMonitor] - "C:\Program Files (x86)\Microsoft Office\Office12\GrooveMonitor.exe" [30040 2009-02-26] (Microsoft Corporation)
HKLM-x32\...\Run: [HP Software Update] - C:\Program Files (x86)\HP\HP Software Update\HPWuSchd2.exe [49152 2006-12-10] (Hewlett-Packard Co.)
HKLM-x32\...\Run: [] -  [x]
HKLM-x32\...\Run: [HP Health Check Scheduler] - c:\Program Files (x86)\Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe [75008 2008-06-16] (Hewlett-Packard)
HKLM-x32\...\Run: [CarboniteSetupLite] - "C:\Program Files (x86)\Carbonite\CarbonitePreinstaller.exe" /preinstalled /showonfirst /reshowat=1800 [283792 2010-05-27] (Carbonite, Inc.)
HKLM-x32\...\Run: [mcui_exe] - "C:\Program Files\McAfee.com\Agent\mcagent.exe" /runkey [1484856 2010-11-22] (McAfee, Inc.)
HKLM-x32\...\Run: [PCPowerSpeed] - "C:\Program Files (x86)\PCPowerSpeed\PCPowerTray.exe" /startup [385664 2011-09-26] (Crawler.com)
HKLM-x32\...\Run: [APSDaemon] - "C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [59720 2013-04-21] (Apple Inc.)
HKLM-x32\...\Run: [Adobe ARM] - "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [958576 2013-04-04] (Adobe Systems Incorporated)
HKLM-x32\...\Run: [SunJavaUpdateSched] - "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe" [254696 2012-01-18] (Sun Microsystems, Inc.)
HKLM-x32\...\Run: [ApnUpdater] - "C:\Program Files (x86)\Ask.com\Updater\Updater.exe" [1391272 2012-01-03] (Ask)
HKLM-x32\...\Run: [RegWork] - "C:\Program Files (x86)\RegWork\RegWork.exe" [x]
HKLM-x32\...\Run: [BackupDutyLite] - "C:\Program Files (x86)\BackUpDutyLite\BackUpDutyLite.exe" [485376 2012-01-04] ()
HKLM-x32\...\Run: [iTunesHelper] - "C:\Program Files (x86)\iTunes\iTunesHelper.exe" [152392 2013-05-15] (Apple Inc.)
HKLM-x32\...\Run: [QuickTime Task] - "C:\Program Files (x86)\QuickTime\QTTask.exe" -atboottime [421888 2013-05-01] (Apple Inc.)
HKLM-x32\...\Run: [vProt] - "C:\Program Files (x86)\AVG SafeGuard toolbar\vprot.exe" [2236080 2013-07-08] ()
HKLM-x32\...\Run: [PSUAMain] - "C:\Program Files (x86)\Panda Security\Panda Cloud Antivirus\PSUAMain.exe" /LaunchSysTray [32736 2013-05-28] (Panda Security, S.L.)
HKLM-x32\...\Run: [8ed1d9a4-02ff-0000-f65e-000067f5af7d] - C:\ProgramData\8ed1d9a4-02ff-0000-f65e-000067f5af7d\8ed1d9a4-02ff-0000-f65e-000067f5af7d.exe [353792 2013-07-10] ()
HKU\Admin\...\Run: [LightScribe Control Panel] - C:\Program Files (x86)\Common Files\LightScribe\LightScribeControlPanel.exe -hidden [455968 2007-08-23] (Hewlett-Packard Company)
HKU\Admin\...\Run: [ehTray.exe] - C:\Windows\ehome\ehTray.exe [138240 2008-01-20] (Microsoft Corporation)
HKU\Admin\...\Run: [Skype] - "C:\Program Files (x86)\Skype\\Phone\Skype.exe" /nosplash /minimized [17418928 2012-07-13] (Skype Technologies S.A.)
HKU\Admin\...\Run: [FreeScreenSharing] - "C:\Users\Admin\AppData\Local\FreeScreenSharing\FreeScreenSharing.exe" [2204488 2011-11-22] ()
HKU\Admin\...\Run: [MobileDocuments] - C:\Program Files (x86)\Common Files\Apple\Internet Services\ubd.exe [x]
HKU\Admin\...\Run: [GoogleDriveSync] - "C:\Program Files (x86)\Google\Drive\googledrivesync.exe" /autostart [19676256 2013-06-06] (Google)
HKU\Admin\...\Run: [KB01163623.exe] - "C:\Users\Admin\AppData\Roaming\KB01163623.exe" [x]
HKU\Admin\...\Run: [VidSoft] - RUNDLL32.EXE C:\Users\Admin\AppData\Local\VidSoft\lqyflcvl.dll,vQZcaclBZIhJmZOvjkdYfXlsacs [891904 2013-07-06] (Autodesk, Inc.) <===== ATTENTION
HKU\Admin\...\Run: [cardsMainkit24] - rundll32.exe "C:\Users\Admin\AppData\Roaming\cardsMainkit24\cardsMainkit24.dll",MotorolaMobile3d libdrvPlan64 [x]
HKU\Admin\...\Run: [Internet Security] - C:\Users\Admin\AppData\Roaming\mxdefender.exe [x]
HKU\Admin\...\Run: [Adobe CSS5.1 Manager] - C:\Users\Admin\AppData\Local\225d61b6-bef7-4845-84aa-57413efd6783ad\dbbefaaefdad.exe [219648 2013-07-09] () <===== ATTENTION
HKU\Admin\...\Run: [8ed1d9a4-02ff-0000-f65e-000067f5af7d] - C:\ProgramData\8ed1d9a4-02ff-0000-f65e-000067f5af7d\8ed1d9a4-02ff-0000-f65e-000067f5af7d.exe [353792 2013-07-10] ()
HKU\Admin\...\RunOnce: [Adobe CSS5.1 Manager] - C:\Users\Admin\AppData\Local\225d61b6-bef7-4845-84aa-57413efd6783ad\dbbefaaefdad.exe [219648 2013-07-09] () <===== ATTENTION
HKU\Admin\...\Winlogon: [Shell] explorer.exe,C:\Users\Admin\AppData\Roaming\skype.dat [133120 2011-11-18] (Intro-Software Lab.) <==== ATTENTION
HKU\Default\...\Run: [WindowsWelcomeCenter] - rundll32.exe oobefldr.dll,ShowWelcomeCenter [2438656 2009-04-10] (Microsoft Corporation)
HKU\Default User\...\Run: [WindowsWelcomeCenter] - rundll32.exe oobefldr.dll,ShowWelcomeCenter [2438656 2009-04-10] (Microsoft Corporation)
AppInit_DLLs-x32: c:\PROGRA~3\BROWSE~1\261339~1.144\{C16C1~1\BrowserDefender.dll [2521040 2013-05-23] ()
Startup: C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPC Backup.lnk
ShortcutTarget: MyPC Backup.lnk -> C:\Program Files (x86)\MyPC Backup\MyPC Backup.exe (MyPCBackup.com)
Startup: C:\ProgramData\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
ShortcutTarget: HP Digital Imaging Monitor.lnk -> C:\Program Files (x86)\HP\Digital Imaging\bin\hpqtra08.exe (Hewlett-Packard Co.)
Startup: C:\ProgramData\Start Menu\Programs\Startup\McAfee Security Scan Plus.lnk
ShortcutTarget: McAfee Security Scan Plus.lnk -> C:\Program Files (x86)\McAfee Security Scan\3.0.318\SSScheduler.exe (McAfee, Inc.)
SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - C:\Windows\System32\webcheck.dll (Microsoft Corporation)

==================== Services (Whitelisted) =================

S2 BackupStack; C:\Program Files (x86)\MyPC Backup\BackupStack.exe [32808 2013-07-01] (Just Develop It)
S3 Com4Qlb; C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch Buttons\Com4Qlb.exe [110592 2007-03-05] (Hewlett-Packard Development Company, L.P.)
S2 McAfee SiteAdvisor Service; C:\Program Files (x86)\McAfee\SiteAdvisor\McSACore.exe [120592 2013-05-22] (McAfee, Inc.)
S3 McComponentHostService; C:\Program Files (x86)\McAfee Security Scan\3.0.318\McCHSvc.exe [235216 2013-02-05] (McAfee, Inc.)
S2 McMPFSvc; C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe [355440 2010-03-10] (McAfee, Inc.)
S2 mcmscsvc; C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe [355440 2010-03-10] (McAfee, Inc.)
S2 McNaiAnn; C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe [355440 2010-03-10] (McAfee, Inc.)
S2 McNASvc; C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe [355440 2010-03-10] (McAfee, Inc.)
S3 McODS; C:\Program Files\McAfee\VirusScan\mcods.exe [509416 2010-10-07] (McAfee, Inc.)
S2 McProxy; C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe [355440 2010-03-10] (McAfee, Inc.)
S2 McShield; C:\Program Files\Common Files\McAfee\SystemCore\\mcshield.exe [200056 2010-10-13] (McAfee, Inc.)
S2 mfefire; C:\Program Files\Common Files\McAfee\SystemCore\\mfefire.exe [245352 2010-10-13] (McAfee, Inc.)
S2 mfevtp; C:\Windows\system32\mfevtps.exe [149032 2010-10-13] (McAfee, Inc.)
S2 NanoServiceMain; C:\Program Files (x86)\Panda Security\Panda Cloud Antivirus\PSANHost.exe [140768 2013-05-28] (Panda Security, S.L.)
S2 PSUAService; C:\Program Files (x86)\Panda Security\Panda Cloud Antivirus\PSUAService.exe [37344 2013-05-28] (Panda Security, S.L.)
S4 QPCapSvc; C:\Program Files (x86)\HP\QuickPlay\Kernel\TV\QPCapSvc.exe [271760 2007-12-19] ()
S4 QPSched; C:\Program Files (x86)\HP\QuickPlay\Kernel\TV\QPSched.exe [112016 2007-12-19] ()
S4 ReimageRealTimeProtection; C:\Program Files\Reimage\Reimage Repair\ReiGuard.exe [4246888 2013-06-26] (Reimage®)
S4 RichVideo; C:\Program Files (x86)\CyberLink\Shared Files\RichVideo.exe [272024 2007-01-09] ()
S2 WajamUpdater; C:\Program Files (x86)\Wajam\Updater\WajamUpdater.exe [109064 2013-05-02] (Wajam)
S2 0125141373386708mcinstcleanup; C:\Windows\TEMP\012514~1.EXE -cleanup -nolog [x]

==================== Drivers (Whitelisted) ====================

S1 avgtp; C:\Windows\system32\drivers\avgtpx64.sys [45856 2013-07-08] (AVG Technologies)
S3 cfwids; C:\Windows\System32\drivers\cfwids.sys [62800 2010-10-13] (McAfee, Inc.)
S3 HpqRemHid; C:\Windows\System32\DRIVERS\HpqRemHid.sys [9088 2007-07-11] (Hewlett-Packard Development Company, L.P.)
S3 mfeapfk; C:\Windows\System32\drivers\mfeapfk.sys [121248 2010-10-13] (McAfee, Inc.)
S3 mfeavfk; C:\Windows\System32\drivers\mfeavfk.sys [190136 2010-10-13] (McAfee, Inc.)
S3 mfefirek; C:\Windows\System32\drivers\mfefirek.sys [441328 2010-10-13] (McAfee, Inc.)
S0 mfehidk; C:\Windows\System32\drivers\mfehidk.sys [529128 2010-10-13] (McAfee, Inc.)
S1 mfenlfk; C:\Windows\System32\DRIVERS\mfenlfk.sys [75032 2010-10-13] (McAfee, Inc.)
S3 mferkdet; C:\Windows\System32\drivers\mferkdet.sys [94864 2010-10-13] (McAfee, Inc.)
S1 mfewfpk; C:\Windows\System32\drivers\mfewfpk.sys [283360 2010-10-13] (McAfee, Inc.)
S1 NNSALPC; C:\Windows\System32\DRIVERS\NNSAlpc.sys [91368 2013-05-29] (Panda Security, S.L.)
S1 NNSHTTP; C:\Windows\System32\DRIVERS\NNSHttp.sys [122088 2013-05-29] (Panda Security, S.L.)
S1 NNSHTTPS; C:\Windows\System32\DRIVERS\NNSHttps.sys [109288 2013-05-29] (Panda Security, S.L.)
S1 NNSIDS; C:\Windows\System32\DRIVERS\NNSIds.sys [114920 2013-05-29] (Panda Security, S.L.)
S1 NNSPICC; C:\Windows\System32\DRIVERS\NNSPicc.sys [95464 2013-05-29] (Panda Security, S.L.)
S4 NNSPIHSW; C:\Windows\System32\DRIVERS\NNSPihsw.sys [69864 2013-05-29] (Panda Security, S.L.)
S1 NNSPOP3; C:\Windows\System32\DRIVERS\NNSPop3.sys [119016 2013-05-29] (Panda Security, S.L.)
S1 NNSPROT; C:\Windows\System32\DRIVERS\NNSProt.sys [305896 2013-05-29] (Panda Security, S.L.)
S1 NNSPRV; C:\Windows\System32\DRIVERS\NNSPrv.sys [118504 2013-05-29] (Panda Security, S.L.)
S1 NNSSMTP; C:\Windows\System32\DRIVERS\NNSSmtp.sys [114920 2013-05-29] (Panda Security, S.L.)
S1 NNSSTRM; C:\Windows\System32\DRIVERS\NNSStrm.sys [246504 2013-05-29] (Panda Security, S.L.)
S1 NNSTLSC; C:\Windows\System32\DRIVERS\NNSTlsc.sys [106216 2013-05-29] (Panda Security, S.L.)
S3 NVENETFD; C:\Windows\System32\DRIVERS\nvm60x64.sys [742696 2006-10-09] (NVIDIA Corporation)
S2 PSINAflt; C:\Windows\System32\DRIVERS\PSINAflt.sys [168680 2013-05-28] (Panda Security, S.L.)
S2 PSINFile; C:\Windows\System32\DRIVERS\PSINFile.sys [122088 2013-05-28] (Panda Security, S.L.)
S1 PSINKNC; C:\Windows\System32\DRIVERS\psinknc.sys [205544 2013-05-28] (Panda Security, S.L.)
S2 PSINProc; C:\Windows\System32\DRIVERS\PSINProc.sys [124648 2013-05-28] (Panda Security, S.L.)
S2 PSINProt; C:\Windows\System32\DRIVERS\PSINProt.sys [137448 2013-05-29] (Panda Security, S.L.)
S3 PSINReg; C:\Windows\System32\DRIVERS\PSINReg.sys [105704 2013-05-28] (Panda Security, S.L.)
S3 smserial; C:\Windows\System32\DRIVERS\smserial.sys [1455616 2007-01-17] (Motorola Inc.)
S3 ssrangdr; C:\Windows\System32\DRIVERS\ssrangdr.sys [4608 2008-11-11] (SupportSoft Inc.)
S3 SymIM; C:\Windows\System32\DRIVERS\SymIM.sys [41520 2007-08-09] (Symantec Corporation)
S3 SymIMMP; C:\Windows\System32\DRIVERS\SymIM.sys [41520 2007-08-09] (Symantec Corporation)
S1 Beep; No ImagePath
S3 catchme; \??\C:\ComboFix\catchme.sys [x]
S1 eabfiltr;
S3 IpInIp; system32\DRIVERS\ipinip.sys [x]
S3 mfeavfk01; No ImagePath
S3 NwlnkFlt; system32\DRIVERS\nwlnkflt.sys [x]
S3 NwlnkFwd; system32\DRIVERS\nwlnkfwd.sys [x]

==================== NetSvcs (Whitelisted) ===================



#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:12:35 AM

Posted 10 July 2013 - 08:52 PM

Hello portergm


You only sent me half the report

I need to see the whole report


gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 portergm

portergm
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:10:35 PM

Posted 11 July 2013 - 09:06 AM

Gringo,

 

So sorry about that.  I thought I had captured the entire document.  Here is the other half.  Let me know if you prefer it all together in one post.

 

Thanks!

 

==================== One Month Created Files and Folders ========

2013-07-10 17:39 - 2013-07-10 17:39 - 00000000 ____D C:\FRST
2013-07-10 08:58 - 2013-07-10 14:28 - 00002062 ____A C:\Users\Admin\Desktop\System Care Antivirus.lnk
2013-07-10 08:58 - 2013-07-10 08:58 - 00000000 ____D C:\ProgramData\8ed1d9a4-02ff-0000-f65e-000067f5af7d
2013-07-09 18:34 - 2013-07-10 11:49 - 00001735 ____A C:\Users\Public\Desktop\McAfee AntiVirus Plus.lnk
2013-07-09 18:34 - 2013-07-10 11:49 - 00001735 ____A C:\ProgramData\Desktop\McAfee AntiVirus Plus.lnk
2013-07-09 15:30 - 2013-07-10 14:32 - 00000004 ____A C:\Users\Admin\AppData\Roaming\skype.ini
2013-07-09 15:28 - 2013-07-09 15:28 - 00002980 ____A C:\Windows\System32\Tasks\{AF2D1ACB-8A1E-4285-A87B-C4548A0AF894}
2013-07-09 15:27 - 2013-07-10 09:00 - 00000324 ___AH C:\Windows\Tasks\{AF2D1ACB-8A1E-4285-A87B-C4548A0AF894}.job
2013-07-09 15:27 - 2013-07-09 15:28 - 00000000 ____D C:\Users\Admin\AppData\Local\225d61b6-bef7-4845-84aa-57413efd6783ad
2013-07-09 15:27 - 2013-07-09 15:27 - 00855552 ____A (Dexpot GbR) C:\Users\Admin\AppData\Roaming\mwdefender.exe
2013-07-09 15:27 - 2013-07-09 15:27 - 00855552 ____A (Dexpot GbR) C:\Users\Admin\AppData\Roaming\8094.tmp
2013-07-09 15:27 - 2013-07-09 15:27 - 00219648 ____A C:\Users\Admin\teamviewer.exe
2013-07-09 15:27 - 2013-07-09 15:27 - 00133120 ____A (Intro-Software Lab.) C:\Users\Admin\notepad.exe
2013-07-09 15:27 - 2013-07-09 15:27 - 00133120 ____A (Intro-Software Lab.) C:\Users\Admin\mstsc.exe
2013-07-09 15:27 - 2013-07-09 15:27 - 00000702 ____A C:\Users\Admin\Desktop\Internet Security PRO.lnk
2013-07-09 15:27 - 2013-07-09 15:27 - 00000000 ____A C:\Users\Admin\spoolsv.exe
2013-07-09 15:27 - 2013-07-09 15:27 - 00000000 ____A C:\Users\Admin\skype.exe
2013-07-09 15:27 - 2013-07-09 15:27 - 00000000 ____A C:\Users\Admin\jqs.exe
2013-07-09 15:27 - 2013-07-09 15:27 - 00000000 ____A C:\Users\Admin\iexplore.exe
2013-07-09 15:14 - 2013-07-09 15:14 - 00000000 ____D C:\Users\Admin\AppData\Local\AVG SafeGuard toolbar
2013-07-09 14:51 - 2013-07-09 15:26 - 00000000 ____D C:\ComboFix
2013-07-09 14:50 - 2013-07-09 14:50 - 05087643 ____R (Swearware) C:\Users\Admin\Downloads\ComboFix.exe
2013-07-09 14:04 - 2013-07-09 14:04 - 00000996 ____A C:\Users\Admin\Desktop\SpeedyPC Pro.lnk
2013-07-09 14:04 - 2013-07-09 14:04 - 00000516 ____A C:\Windows\Tasks\SpeedyPC Update Version3 Startup Task.job
2013-07-09 14:04 - 2013-07-09 14:04 - 00000464 ____A C:\Windows\Tasks\SpeedyPC Update Version3.job
2013-07-09 14:04 - 2013-07-09 14:04 - 00000444 ____A C:\Windows\Tasks\SpeedyPC Registration3.job
2013-07-09 14:04 - 2013-07-09 14:04 - 00000420 ____A C:\Windows\Tasks\SpeedyPC Pro.job
2013-07-09 14:04 - 2013-07-09 14:04 - 00000000 ____D C:\Users\Admin\AppData\Roaming\SpeedyPC Software
2013-07-09 14:04 - 2013-07-09 14:04 - 00000000 ____D C:\Users\Admin\AppData\Roaming\DriverCure
2013-07-09 14:04 - 2013-07-09 14:04 - 00000000 ____D C:\ProgramData\SpeedyPC Software
2013-07-09 14:04 - 2013-07-09 14:04 - 00000000 ____D C:\Program Files (x86)\SpeedyPC Software
2013-07-09 10:48 - 2011-06-25 22:45 - 00256000 ____A C:\Windows\PEV.exe
2013-07-09 10:48 - 2010-11-07 09:20 - 00208896 ____A C:\Windows\MBR.exe
2013-07-09 10:48 - 2009-04-19 20:56 - 00060416 ____A (NirSoft) C:\Windows\NIRCMD.exe
2013-07-09 10:48 - 2000-08-30 16:00 - 00518144 ____A (SteelWerX) C:\Windows\SWREG.exe
2013-07-09 10:48 - 2000-08-30 16:00 - 00406528 ____A (SteelWerX) C:\Windows\SWSC.exe
2013-07-09 10:48 - 2000-08-30 16:00 - 00098816 ____A C:\Windows\sed.exe
2013-07-09 10:48 - 2000-08-30 16:00 - 00080412 ____A C:\Windows\grep.exe
2013-07-09 10:48 - 2000-08-30 16:00 - 00068096 ____A C:\Windows\zip.exe
2013-07-09 10:40 - 2013-07-09 15:25 - 00000000 ____D C:\Qoobox
2013-07-09 10:40 - 2013-07-09 15:21 - 00000000 ____D C:\Windows\erdnt
2013-07-09 10:40 - 2013-07-09 10:40 - 00000000 ____D C:\Program Files (x86)\LessTabs
2013-07-09 10:39 - 2013-07-09 10:39 - 00000408 ____A C:\Windows\Tasks\LyricsContainer Update.job
2013-07-09 10:39 - 2013-07-09 10:39 - 00000000 ____D C:\Users\Admin\AppData\Local\Wajam
2013-07-09 10:39 - 2013-07-09 10:39 - 00000000 ____D C:\Program Files (x86)\Wajam
2013-07-09 10:39 - 2013-07-09 10:39 - 00000000 ____D C:\Program Files (x86)\LyricsContainer
2013-07-09 10:37 - 2013-07-09 10:37 - 00000000 ____D C:\Users\Admin\AppData\Roaming\Delta
2013-07-09 10:37 - 2013-07-09 10:37 - 00000000 ____D C:\Users\Admin\AppData\Roaming\Babylon
2013-07-09 10:37 - 2013-07-09 10:37 - 00000000 ____D C:\Users\Admin\AppData\Roaming\BabSolution
2013-07-09 10:37 - 2013-07-09 10:37 - 00000000 ____D C:\ProgramData\BrowserDefender
2013-07-09 10:37 - 2013-07-09 10:37 - 00000000 ____D C:\ProgramData\Babylon
2013-07-09 10:37 - 2013-07-09 10:37 - 00000000 ____D C:\Program Files (x86)\Mozilla Firefox
2013-07-09 10:37 - 2013-07-09 10:37 - 00000000 ____D C:\Program Files (x86)\Delta
2013-07-09 09:01 - 2013-07-09 09:01 - 00000000 ____D C:\ProgramData\Panda Security
2013-07-09 09:01 - 2013-07-09 09:01 - 00000000 ____D C:\Program Files (x86)\Panda Security
2013-07-09 08:27 - 2013-07-09 08:27 - 00000448 ____A C:\Windows\Tasks\PCHB_Admin_PCHealthBoost_LG.job
2013-07-09 08:27 - 2013-07-09 08:27 - 00000400 ____A C:\Windows\Tasks\PCHB_Admin_PCHealthBoost_UP.job
2013-07-09 08:27 - 2013-07-09 08:27 - 00000400 ____A C:\Windows\Tasks\PCHB_Admin_PCHealthBoost_RS.job
2013-07-09 08:27 - 2013-07-09 08:27 - 00000400 ____A C:\Windows\Tasks\PCHB_Admin_PCHealthBoost_RN.job
2013-07-09 08:27 - 2013-07-09 08:27 - 00000400 ____A C:\Windows\Tasks\PCHB_Admin_PCHealthBoost_RM.job
2013-07-09 08:26 - 2013-07-09 18:34 - 00000000 ____D C:\Program Files (x86)\MyPC Backup
2013-07-09 08:26 - 2013-07-09 08:27 - 00000000 ____D C:\ProgramData\PCHealthBoost
2013-07-09 08:26 - 2013-07-09 08:26 - 00011388 ____A C:\Users\Admin\AppData\Local\dd_vcredistUI3736.txt
2013-07-09 08:26 - 2013-07-09 08:26 - 00001800 ____A C:\Users\Admin\AppData\Local\dd_vcredistMSI3736.txt
2013-07-09 08:26 - 2013-07-09 08:26 - 00001773 ____A C:\Users\Public\Desktop\PC HealthBoost.lnk
2013-07-09 08:26 - 2013-07-09 08:26 - 00001773 ____A C:\ProgramData\Desktop\PC HealthBoost.lnk
2013-07-09 08:26 - 2013-07-09 08:26 - 00000886 ____A C:\Users\Admin\Desktop\MyPC Backup.lnk
2013-07-09 08:26 - 2013-07-09 08:26 - 00000000 ____D C:\Program Files (x86)\PC HealthBoost
2013-07-09 05:13 - 2013-07-09 05:13 - 00002300 ____N C:\Users\Public\Desktop\WildTangent Games App - hp.lnk
2013-07-09 05:13 - 2013-07-09 05:13 - 00002300 ____N C:\ProgramData\Desktop\WildTangent Games App - hp.lnk
2013-07-09 05:12 - 2013-07-09 05:13 - 00000000 ____D C:\Program Files (x86)\WildTangent Games
2013-07-08 20:23 - 2013-07-08 20:23 - 00000060 ____A C:\Users\Admin\AppData\Roaming\mbam.context.scan
2013-07-08 20:15 - 2013-07-08 20:15 - 00000258 _RASH C:\Users\Admin\ntuser.pol
2013-07-08 20:03 - 2013-07-08 20:03 - 00000000 ____D C:\Program Files (x86)\Zoom Downloader
2013-07-08 20:02 - 2013-07-09 15:03 - 00000000 ____D C:\Users\Admin\AppData\Roaming\DefaultTab
2013-07-08 20:02 - 2013-07-08 20:02 - 00000802 ____A C:\Users\Public\Desktop\Optimize Your PC.lnk
2013-07-08 20:02 - 2013-07-08 20:02 - 00000802 ____A C:\ProgramData\Desktop\Optimize Your PC.lnk
2013-07-08 20:02 - 2013-07-08 20:02 - 00000000 ____D C:\Users\Admin\AppData\Roaming\PCFixSpeed
2013-07-08 20:02 - 2013-07-08 20:02 - 00000000 ____D C:\ProgramData\PCFixSpeed
2013-07-08 20:02 - 2013-07-08 20:02 - 00000000 ____D C:\Program Files (x86)\PCFixSpeed
2013-07-08 20:02 - 2013-07-08 20:02 - 00000000 ____D C:\Program Files (x86)\Conduit
2013-07-08 20:01 - 2013-07-08 20:01 - 00000356 ____A C:\Windows\Tasks\AmiUpdXp.job
2013-07-08 20:01 - 2013-07-08 20:01 - 00000000 ____D C:\Users\Admin\AppData\Local\SwvUpdater
2013-07-08 20:01 - 2013-07-08 20:01 - 00000000 ____D C:\Users\Admin\AppData\Local\CRE
2013-07-08 20:01 - 2013-07-08 20:01 - 00000000 ____D C:\Users\Admin\AppData\Local\Conduit
2013-07-08 20:01 - 2013-07-08 20:01 - 00000000 ____D C:\Program Files (x86)\WhiteSmoke_New
2013-07-08 20:00 - 2013-07-08 20:00 - 01062184 ____A C:\Users\Admin\Downloads\Setup.exe
2013-07-08 15:53 - 2013-07-08 15:53 - 00000000 ____D C:\ProgramData\Malwarebytes
2013-07-08 15:53 - 2013-07-08 15:53 - 00000000 ____D C:\Program Files (x86)\Malwarebytes' Anti-Malware
2013-07-08 15:53 - 2013-04-04 11:50 - 00025928 ____A (Malwarebytes Corporation) C:\Windows\System32\Drivers\mbam.sys
2013-07-08 15:44 - 2013-07-08 15:48 - 00003044 ____A C:\Users\Admin\Desktop\Rkill.txt
2013-07-08 15:44 - 2013-07-08 15:44 - 00000000 ____D C:\Users\Admin\Desktop\rkill
2013-07-08 15:29 - 2013-07-08 15:29 - 00000000 ____D C:\Users\Public\Documents\Downloaded Installers
2013-07-08 15:29 - 2013-07-08 15:29 - 00000000 ____D C:\ProgramData\Documents\Downloaded Installers
2013-07-08 15:22 - 2013-07-08 15:22 - 00000552 ____A C:\Windows\Tasks\SparkTrust AntiVirus Startup.job
2013-07-08 15:22 - 2013-07-08 15:22 - 00000474 ____A C:\Windows\Tasks\SparkTrust Update Version3 Startup Task.job
2013-07-08 15:22 - 2013-07-08 15:22 - 00000422 ____A C:\Windows\Tasks\SparkTrust Update Version3.job
2013-07-08 15:22 - 2013-07-08 15:22 - 00000000 ____D C:\ProgramData\SparkTrust
2013-07-08 15:22 - 2013-07-08 15:22 - 00000000 ____D C:\Program Files (x86)\SparkTrust
2013-07-08 15:01 - 2013-07-09 06:02 - 00000000 ____D C:\rei
2013-07-08 15:01 - 2013-07-08 15:01 - 00000000 ____D C:\Program Files\Reimage
2013-07-08 15:00 - 2013-07-08 15:01 - 00000000 ____D C:\ProgramData\AVG SafeGuard toolbar
2013-07-08 15:00 - 2013-07-08 15:00 - 00045856 ____A (AVG Technologies) C:\Windows\System32\Drivers\avgtpx64.sys
2013-07-08 15:00 - 2013-07-08 15:00 - 00000000 ____D C:\Program Files (x86)\AVG SafeGuard toolbar
2013-07-08 14:58 - 2013-07-09 06:02 - 00000151 ____A C:\Windows\Reimage.ini
2013-07-07 14:17 - 2013-07-09 15:03 - 00000000 ____D C:\Users\Admin\AppData\Roaming\cardsMainkit24
2013-07-06 14:15 - 2013-07-07 14:58 - 00000000 ____D C:\Users\Admin\AppData\Local\VidSoft
2013-06-14 10:34 - 2013-06-25 09:45 - 00019110 ____A C:\Users\Admin\Documents\Family Investments.xlsx
2013-06-13 08:12 - 2013-05-16 18:58 - 00085504 ____A (Microsoft Corporation) C:\Windows\System32\jsproxy.dll
2013-06-13 08:12 - 2013-05-16 18:56 - 00173056 ____A (Microsoft Corporation) C:\Windows\System32\ieUnatt.exe
2013-06-13 08:12 - 2013-05-16 18:51 - 02382848 ____A (Microsoft Corporation) C:\Windows\System32\mshtml.tlb
2013-06-13 08:12 - 2013-05-16 18:51 - 00096768 ____A (Microsoft Corporation) C:\Windows\System32\mshtmled.dll
2013-06-13 08:12 - 2013-05-16 18:46 - 00248320 ____A (Microsoft Corporation) C:\Windows\System32\ieui.dll
2013-06-13 08:12 - 2013-05-16 14:21 - 00142848 ____A (Microsoft Corporation) C:\Windows\SysWOW64\ieUnatt.exe
2013-06-13 08:12 - 2013-05-16 14:20 - 00420864 ____A (Microsoft Corporation) C:\Windows\SysWOW64\vbscript.dll
2013-06-13 08:12 - 2013-05-16 14:17 - 00073216 ____A (Microsoft Corporation) C:\Windows\SysWOW64\mshtmled.dll
2013-06-13 08:12 - 2013-05-16 14:16 - 02382848 ____A (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2013-06-13 08:12 - 2013-05-16 14:12 - 00176640 ____A (Microsoft Corporation) C:\Windows\SysWOW64\ieui.dll
2013-06-13 08:11 - 2013-05-16 20:05 - 17824768 ____A (Microsoft Corporation) C:\Windows\System32\mshtml.dll
2013-06-13 08:11 - 2013-05-16 19:27 - 10926080 ____A (Microsoft Corporation) C:\Windows\System32\ieframe.dll
2013-06-13 08:11 - 2013-05-16 19:09 - 02312704 ____A (Microsoft Corporation) C:\Windows\System32\jscript9.dll
2013-06-13 08:11 - 2013-05-16 19:02 - 01392128 ____A (Microsoft Corporation) C:\Windows\System32\wininet.dll
2013-06-13 08:11 - 2013-05-16 19:02 - 01346560 ____A (Microsoft Corporation) C:\Windows\System32\urlmon.dll
2013-06-13 08:11 - 2013-05-16 19:01 - 01494528 ____A (Microsoft Corporation) C:\Windows\System32\inetcpl.cpl
2013-06-13 08:11 - 2013-05-16 19:00 - 00237056 ____A (Microsoft Corporation) C:\Windows\System32\url.dll
2013-06-13 08:11 - 2013-05-16 18:56 - 00599040 ____A (Microsoft Corporation) C:\Windows\System32\vbscript.dll
2013-06-13 08:11 - 2013-05-16 18:55 - 00816640 ____A (Microsoft Corporation) C:\Windows\System32\jscript.dll
2013-06-13 08:11 - 2013-05-16 18:54 - 00729088 ____A (Microsoft Corporation) C:\Windows\System32\msfeeds.dll
2013-06-13 08:11 - 2013-05-16 18:53 - 02147840 ____A (Microsoft Corporation) C:\Windows\System32\iertutil.dll
2013-06-13 08:11 - 2013-05-16 15:08 - 12329984 ____A (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2013-06-13 08:11 - 2013-05-16 14:49 - 09738752 ____A (Microsoft Corporation) C:\Windows\SysWOW64\ieframe.dll
2013-06-13 08:11 - 2013-05-16 14:39 - 01800704 ____A (Microsoft Corporation) C:\Windows\SysWOW64\jscript9.dll
2013-06-13 08:11 - 2013-05-16 14:28 - 01129472 ____A (Microsoft Corporation) C:\Windows\SysWOW64\wininet.dll
2013-06-13 08:11 - 2013-05-16 14:28 - 01104384 ____A (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll
2013-06-13 08:11 - 2013-05-16 14:27 - 01427968 ____A (Microsoft Corporation) C:\Windows\SysWOW64\inetcpl.cpl
2013-06-13 08:11 - 2013-05-16 14:26 - 00231936 ____A (Microsoft Corporation) C:\Windows\SysWOW64\url.dll
2013-06-13 08:11 - 2013-05-16 14:23 - 00065024 ____A (Microsoft Corporation) C:\Windows\SysWOW64\jsproxy.dll
2013-06-13 08:11 - 2013-05-16 14:21 - 00717824 ____A (Microsoft Corporation) C:\Windows\SysWOW64\jscript.dll
2013-06-13 08:11 - 2013-05-16 14:19 - 00607744 ____A (Microsoft Corporation) C:\Windows\SysWOW64\msfeeds.dll
2013-06-13 08:11 - 2013-05-16 14:17 - 01796096 ____A (Microsoft Corporation) C:\Windows\SysWOW64\iertutil.dll
2013-06-12 15:40 - 2013-04-23 20:09 - 01269248 ____A (Microsoft Corporation) C:\Windows\System32\crypt32.dll
2013-06-12 15:40 - 2013-04-23 20:09 - 00174592 ____A (Microsoft Corporation) C:\Windows\System32\cryptsvc.dll
2013-06-12 15:40 - 2013-04-23 20:09 - 00132096 ____A (Microsoft Corporation) C:\Windows\System32\cryptnet.dll
2013-06-12 15:40 - 2013-04-23 20:09 - 00050688 ____A (Microsoft Corporation) C:\Windows\System32\certenc.dll
2013-06-12 15:40 - 2013-04-23 20:00 - 00985600 ____A (Microsoft Corporation) C:\Windows\SysWOW64\crypt32.dll
2013-06-12 15:40 - 2013-04-23 20:00 - 00133120 ____A (Microsoft Corporation) C:\Windows\SysWOW64\cryptsvc.dll
2013-06-12 15:40 - 2013-04-23 20:00 - 00098304 ____A (Microsoft Corporation) C:\Windows\SysWOW64\cryptnet.dll
2013-06-12 15:40 - 2013-04-23 20:00 - 00041984 ____A (Microsoft Corporation) C:\Windows\SysWOW64\certenc.dll
2013-06-12 15:40 - 2013-04-23 18:10 - 01078272 ____A (Microsoft Corporation) C:\Windows\System32\certutil.exe
2013-06-12 15:40 - 2013-04-23 17:46 - 00812544 ____A (Microsoft Corporation) C:\Windows\SysWOW64\certutil.exe
2013-06-12 15:38 - 2013-04-17 05:04 - 00030720 ____A (Microsoft Corporation) C:\Windows\System32\cryptdlg.dll
2013-06-12 15:38 - 2013-04-17 04:30 - 00024576 ____A (Microsoft Corporation) C:\Windows\SysWOW64\cryptdlg.dll
2013-06-12 15:37 - 2013-05-07 20:50 - 01423720 ____A (Microsoft Corporation) C:\Windows\System32\Drivers\tcpip.sys
2013-06-12 15:32 - 2013-05-01 20:16 - 00686080 ____A (Microsoft Corporation) C:\Windows\System32\win32spl.dll
2013-06-12 15:32 - 2013-05-01 20:04 - 00443904 ____A (Microsoft Corporation) C:\Windows\SysWOW64\win32spl.dll
2013-06-12 15:32 - 2013-05-01 20:03 - 00037376 ____A (Microsoft Corporation) C:\Windows\SysWOW64\printcom.dll

==================== One Month Modified Files and Folders =======

2013-07-10 17:39 - 2013-07-10 17:39 - 00000000 ____D C:\FRST
2013-07-10 14:32 - 2013-07-09 15:30 - 00000004 ____A C:\Users\Admin\AppData\Roaming\skype.ini
2013-07-10 14:28 - 2013-07-10 08:58 - 00002062 ____A C:\Users\Admin\Desktop\System Care Antivirus.lnk
2013-07-10 14:28 - 2012-12-11 06:43 - 00002944 ____A C:\Windows\System32\Tasks\BackupDutyLite
2013-07-10 14:28 - 2012-12-11 06:43 - 00000382 ____A C:\Windows\Tasks\BackupDutyLite.job
2013-07-10 14:28 - 2011-03-19 15:32 - 00000404 ____A C:\Windows\Tasks\FileCure Startup.job
2013-07-10 14:28 - 2009-12-05 10:59 - 00763930 ____A C:\ProgramData\nvModes.001
2013-07-10 14:27 - 2012-11-03 05:31 - 00000048 ____A C:\RB.rdat
2013-07-10 14:27 - 2012-11-03 05:31 - 00000048 ____A C:\License_Time.rdat
2013-07-10 14:27 - 2012-07-31 21:30 - 00000494 ____A C:\Windows\Tasks\ParetoLogic Update Version3 Startup Task.job
2013-07-10 14:27 - 2012-03-06 12:37 - 00000892 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2013-07-10 14:27 - 2009-08-14 16:46 - 00007808 ____A C:\Users\Admin\AppData\Local\d3d9caps.dat
2013-07-10 14:27 - 2008-06-06 19:06 - 00000729 ____A C:\Users\Public\Documents\hpqp.ini
2013-07-10 14:27 - 2008-06-06 19:06 - 00000729 ____A C:\ProgramData\Documents\hpqp.ini
2013-07-10 14:26 - 2006-11-02 07:42 - 00000006 ___AH C:\Windows\Tasks\SA.DAT
2013-07-10 14:26 - 2006-11-02 07:22 - 00003216 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
2013-07-10 14:26 - 2006-11-02 07:22 - 00003216 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
2013-07-10 11:49 - 2013-07-09 18:34 - 00001735 ____A C:\Users\Public\Desktop\McAfee AntiVirus Plus.lnk
2013-07-10 11:49 - 2013-07-09 18:34 - 00001735 ____A C:\ProgramData\Desktop\McAfee AntiVirus Plus.lnk
2013-07-10 11:49 - 2008-06-06 18:49 - 01245388 ____A C:\Windows\WindowsUpdate.log
2013-07-10 11:47 - 2009-12-05 10:59 - 00763930 ____A C:\ProgramData\nvModes.dat
2013-07-10 09:00 - 2013-07-09 15:27 - 00000324 ___AH C:\Windows\Tasks\{AF2D1ACB-8A1E-4285-A87B-C4548A0AF894}.job
2013-07-10 08:58 - 2013-07-10 08:58 - 00000000 ____D C:\ProgramData\8ed1d9a4-02ff-0000-f65e-000067f5af7d
2013-07-10 08:50 - 2012-03-06 12:37 - 00000896 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2013-07-10 08:14 - 2012-06-03 16:36 - 00000830 ____A C:\Windows\Tasks\Adobe Flash Player Updater.job
2013-07-10 07:53 - 2012-12-18 01:56 - 00000000 ___SD C:\Users\Admin\Google Drive
2013-07-09 18:34 - 2013-07-09 08:26 - 00000000 ____D C:\Program Files (x86)\MyPC Backup
2013-07-09 15:45 - 2012-03-06 12:37 - 00003892 ____A C:\Windows\System32\Tasks\GoogleUpdateTaskMachineUA
2013-07-09 15:45 - 2012-03-06 12:37 - 00003640 ____A C:\Windows\System32\Tasks\GoogleUpdateTaskMachineCore
2013-07-09 15:28 - 2013-07-09 15:28 - 00002980 ____A C:\Windows\System32\Tasks\{AF2D1ACB-8A1E-4285-A87B-C4548A0AF894}
2013-07-09 15:28 - 2013-07-09 15:27 - 00000000 ____D C:\Users\Admin\AppData\Local\225d61b6-bef7-4845-84aa-57413efd6783ad
2013-07-09 15:28 - 2008-12-04 12:05 - 00000000 ____D C:\users\Admin
2013-07-09 15:27 - 2013-07-09 15:27 - 00855552 ____A (Dexpot GbR) C:\Users\Admin\AppData\Roaming\mwdefender.exe
2013-07-09 15:27 - 2013-07-09 15:27 - 00855552 ____A (Dexpot GbR) C:\Users\Admin\AppData\Roaming\8094.tmp
2013-07-09 15:27 - 2013-07-09 15:27 - 00219648 ____A C:\Users\Admin\teamviewer.exe
2013-07-09 15:27 - 2013-07-09 15:27 - 00133120 ____A (Intro-Software Lab.) C:\Users\Admin\notepad.exe
2013-07-09 15:27 - 2013-07-09 15:27 - 00133120 ____A (Intro-Software Lab.) C:\Users\Admin\mstsc.exe
2013-07-09 15:27 - 2013-07-09 15:27 - 00000702 ____A C:\Users\Admin\Desktop\Internet Security PRO.lnk
2013-07-09 15:27 - 2013-07-09 15:27 - 00000000 ____A C:\Users\Admin\spoolsv.exe
2013-07-09 15:27 - 2013-07-09 15:27 - 00000000 ____A C:\Users\Admin\skype.exe
2013-07-09 15:27 - 2013-07-09 15:27 - 00000000 ____A C:\Users\Admin\jqs.exe
2013-07-09 15:27 - 2013-07-09 15:27 - 00000000 ____A C:\Users\Admin\iexplore.exe
2013-07-09 15:26 - 2013-07-09 14:51 - 00000000 ____D C:\ComboFix
2013-07-09 15:25 - 2013-07-09 10:40 - 00000000 ____D C:\Qoobox
2013-07-09 15:21 - 2013-07-09 10:40 - 00000000 ____D C:\Windows\erdnt
2013-07-09 15:16 - 2010-05-16 09:00 - 00003574 ____A C:\Windows\System32\Tasks\HP Health Check
2013-07-09 15:14 - 2013-07-09 15:14 - 00000000 ____D C:\Users\Admin\AppData\Local\AVG SafeGuard toolbar
2013-07-09 15:12 - 2006-11-02 04:34 - 00000215 ____A C:\Windows\system.ini
2013-07-09 15:08 - 2006-11-02 07:21 - 00440584 ____A C:\Windows\System32\FNTCACHE.DAT
2013-07-09 15:06 - 2008-01-20 19:26 - 00119390 ____A C:\Windows\PFRO.log
2013-07-09 15:03 - 2013-07-08 20:02 - 00000000 ____D C:\Users\Admin\AppData\Roaming\DefaultTab
2013-07-09 15:03 - 2013-07-07 14:17 - 00000000 ____D C:\Users\Admin\AppData\Roaming\cardsMainkit24
2013-07-09 14:50 - 2013-07-09 14:50 - 05087643 ____R (Swearware) C:\Users\Admin\Downloads\ComboFix.exe
2013-07-09 14:04 - 2013-07-09 14:04 - 00000996 ____A C:\Users\Admin\Desktop\SpeedyPC Pro.lnk
2013-07-09 14:04 - 2013-07-09 14:04 - 00000516 ____A C:\Windows\Tasks\SpeedyPC Update Version3 Startup Task.job
2013-07-09 14:04 - 2013-07-09 14:04 - 00000464 ____A C:\Windows\Tasks\SpeedyPC Update Version3.job
2013-07-09 14:04 - 2013-07-09 14:04 - 00000444 ____A C:\Windows\Tasks\SpeedyPC Registration3.job
2013-07-09 14:04 - 2013-07-09 14:04 - 00000420 ____A C:\Windows\Tasks\SpeedyPC Pro.job
2013-07-09 14:04 - 2013-07-09 14:04 - 00000000 ____D C:\Users\Admin\AppData\Roaming\SpeedyPC Software
2013-07-09 14:04 - 2013-07-09 14:04 - 00000000 ____D C:\Users\Admin\AppData\Roaming\DriverCure
2013-07-09 14:04 - 2013-07-09 14:04 - 00000000 ____D C:\ProgramData\SpeedyPC Software
2013-07-09 14:04 - 2013-07-09 14:04 - 00000000 ____D C:\Program Files (x86)\SpeedyPC Software
2013-07-09 10:46 - 2011-09-30 13:46 - 00001460 ____A C:\Users\Admin\AppData\Local\d3d9caps64.dat
2013-07-09 10:40 - 2013-07-09 10:40 - 00000000 ____D C:\Program Files (x86)\LessTabs
2013-07-09 10:39 - 2013-07-09 10:39 - 00000408 ____A C:\Windows\Tasks\LyricsContainer Update.job
2013-07-09 10:39 - 2013-07-09 10:39 - 00000000 ____D C:\Users\Admin\AppData\Local\Wajam
2013-07-09 10:39 - 2013-07-09 10:39 - 00000000 ____D C:\Program Files (x86)\Wajam
2013-07-09 10:39 - 2013-07-09 10:39 - 00000000 ____D C:\Program Files (x86)\LyricsContainer
2013-07-09 10:37 - 2013-07-09 10:37 - 00000000 ____D C:\Users\Admin\AppData\Roaming\Delta
2013-07-09 10:37 - 2013-07-09 10:37 - 00000000 ____D C:\Users\Admin\AppData\Roaming\Babylon
2013-07-09 10:37 - 2013-07-09 10:37 - 00000000 ____D C:\Users\Admin\AppData\Roaming\BabSolution
2013-07-09 10:37 - 2013-07-09 10:37 - 00000000 ____D C:\ProgramData\BrowserDefender
2013-07-09 10:37 - 2013-07-09 10:37 - 00000000 ____D C:\ProgramData\Babylon
2013-07-09 10:37 - 2013-07-09 10:37 - 00000000 ____D C:\Program Files (x86)\Mozilla Firefox
2013-07-09 10:37 - 2013-07-09 10:37 - 00000000 ____D C:\Program Files (x86)\Delta
2013-07-09 09:02 - 2008-12-04 12:19 - 00108832 ____A C:\Users\Admin\AppData\Local\GDIPFONTCACHEV1.DAT
2013-07-09 09:01 - 2013-07-09 09:01 - 00000000 ____D C:\ProgramData\Panda Security
2013-07-09 09:01 - 2013-07-09 09:01 - 00000000 ____D C:\Program Files (x86)\Panda Security
2013-07-09 08:27 - 2013-07-09 08:27 - 00000448 ____A C:\Windows\Tasks\PCHB_Admin_PCHealthBoost_LG.job
2013-07-09 08:27 - 2013-07-09 08:27 - 00000400 ____A C:\Windows\Tasks\PCHB_Admin_PCHealthBoost_UP.job
2013-07-09 08:27 - 2013-07-09 08:27 - 00000400 ____A C:\Windows\Tasks\PCHB_Admin_PCHealthBoost_RS.job
2013-07-09 08:27 - 2013-07-09 08:27 - 00000400 ____A C:\Windows\Tasks\PCHB_Admin_PCHealthBoost_RN.job
2013-07-09 08:27 - 2013-07-09 08:27 - 00000400 ____A C:\Windows\Tasks\PCHB_Admin_PCHealthBoost_RM.job
2013-07-09 08:27 - 2013-07-09 08:26 - 00000000 ____D C:\ProgramData\PCHealthBoost
2013-07-09 08:26 - 2013-07-09 08:26 - 00011388 ____A C:\Users\Admin\AppData\Local\dd_vcredistUI3736.txt
2013-07-09 08:26 - 2013-07-09 08:26 - 00001800 ____A C:\Users\Admin\AppData\Local\dd_vcredistMSI3736.txt
2013-07-09 08:26 - 2013-07-09 08:26 - 00001773 ____A C:\Users\Public\Desktop\PC HealthBoost.lnk
2013-07-09 08:26 - 2013-07-09 08:26 - 00001773 ____A C:\ProgramData\Desktop\PC HealthBoost.lnk
2013-07-09 08:26 - 2013-07-09 08:26 - 00000886 ____A C:\Users\Admin\Desktop\MyPC Backup.lnk
2013-07-09 08:26 - 2013-07-09 08:26 - 00000000 ____D C:\Program Files (x86)\PC HealthBoost
2013-07-09 08:20 - 2006-11-02 07:42 - 00032542 ____A C:\Windows\Tasks\SCHEDLGU.TXT
2013-07-09 08:16 - 2010-08-13 16:22 - 00000000 ____D C:\Program Files\McAfee
2013-07-09 06:02 - 2013-07-08 15:01 - 00000000 ____D C:\rei
2013-07-09 06:02 - 2013-07-08 14:58 - 00000151 ____A C:\Windows\Reimage.ini
2013-07-09 05:13 - 2013-07-09 05:13 - 00002300 ____N C:\Users\Public\Desktop\WildTangent Games App - hp.lnk
2013-07-09 05:13 - 2013-07-09 05:13 - 00002300 ____N C:\ProgramData\Desktop\WildTangent Games App - hp.lnk
2013-07-09 05:13 - 2013-07-09 05:12 - 00000000 ____D C:\Program Files (x86)\WildTangent Games
2013-07-09 05:13 - 2009-03-02 17:13 - 00000000 ____D C:\Users\Admin\AppData\Roaming\WildTangent
2013-07-09 05:13 - 2008-06-06 19:10 - 00000000 ____D C:\ProgramData\WildTangent
2013-07-09 05:13 - 2008-06-06 19:10 - 00000000 ____D C:\Program Files (x86)\HP Games
2013-07-08 20:23 - 2013-07-08 20:23 - 00000060 ____A C:\Users\Admin\AppData\Roaming\mbam.context.scan
2013-07-08 20:15 - 2013-07-08 20:15 - 00000258 _RASH C:\Users\Admin\ntuser.pol
2013-07-08 20:03 - 2013-07-08 20:03 - 00000000 ____D C:\Program Files (x86)\Zoom Downloader
2013-07-08 20:02 - 2013-07-08 20:02 - 00000802 ____A C:\Users\Public\Desktop\Optimize Your PC.lnk
2013-07-08 20:02 - 2013-07-08 20:02 - 00000802 ____A C:\ProgramData\Desktop\Optimize Your PC.lnk
2013-07-08 20:02 - 2013-07-08 20:02 - 00000000 ____D C:\Users\Admin\AppData\Roaming\PCFixSpeed
2013-07-08 20:02 - 2013-07-08 20:02 - 00000000 ____D C:\ProgramData\PCFixSpeed
2013-07-08 20:02 - 2013-07-08 20:02 - 00000000 ____D C:\Program Files (x86)\PCFixSpeed
2013-07-08 20:02 - 2013-07-08 20:02 - 00000000 ____D C:\Program Files (x86)\Conduit
2013-07-08 20:02 - 2006-11-02 05:34 - 00000000 ___HD C:\Windows\System32\GroupPolicy
2013-07-08 20:02 - 2006-11-02 05:34 - 00000000 ____D C:\Windows\SysWOW64\GroupPolicy
2013-07-08 20:01 - 2013-07-08 20:01 - 00000356 ____A C:\Windows\Tasks\AmiUpdXp.job
2013-07-08 20:01 - 2013-07-08 20:01 - 00000000 ____D C:\Users\Admin\AppData\Local\SwvUpdater
2013-07-08 20:01 - 2013-07-08 20:01 - 00000000 ____D C:\Users\Admin\AppData\Local\CRE
2013-07-08 20:01 - 2013-07-08 20:01 - 00000000 ____D C:\Users\Admin\AppData\Local\Conduit
2013-07-08 20:01 - 2013-07-08 20:01 - 00000000 ____D C:\Program Files (x86)\WhiteSmoke_New
2013-07-08 20:00 - 2013-07-08 20:00 - 01062184 ____A C:\Users\Admin\Downloads\Setup.exe
2013-07-08 15:53 - 2013-07-08 15:53 - 00000000 ____D C:\ProgramData\Malwarebytes
2013-07-08 15:53 - 2013-07-08 15:53 - 00000000 ____D C:\Program Files (x86)\Malwarebytes' Anti-Malware
2013-07-08 15:48 - 2013-07-08 15:44 - 00003044 ____A C:\Users\Admin\Desktop\Rkill.txt
2013-07-08 15:44 - 2013-07-08 15:44 - 00000000 ____D C:\Users\Admin\Desktop\rkill
2013-07-08 15:29 - 2013-07-08 15:29 - 00000000 ____D C:\Users\Public\Documents\Downloaded Installers
2013-07-08 15:29 - 2013-07-08 15:29 - 00000000 ____D C:\ProgramData\Documents\Downloaded Installers
2013-07-08 15:22 - 2013-07-08 15:22 - 00000552 ____A C:\Windows\Tasks\SparkTrust AntiVirus Startup.job
2013-07-08 15:22 - 2013-07-08 15:22 - 00000474 ____A C:\Windows\Tasks\SparkTrust Update Version3 Startup Task.job
2013-07-08 15:22 - 2013-07-08 15:22 - 00000422 ____A C:\Windows\Tasks\SparkTrust Update Version3.job
2013-07-08 15:22 - 2013-07-08 15:22 - 00000000 ____D C:\ProgramData\SparkTrust
2013-07-08 15:22 - 2013-07-08 15:22 - 00000000 ____D C:\Program Files (x86)\SparkTrust
2013-07-08 15:01 - 2013-07-08 15:01 - 00000000 ____D C:\Program Files\Reimage
2013-07-08 15:01 - 2013-07-08 15:00 - 00000000 ____D C:\ProgramData\AVG SafeGuard toolbar
2013-07-08 15:00 - 2013-07-08 15:00 - 00045856 ____A (AVG Technologies) C:\Windows\System32\Drivers\avgtpx64.sys
2013-07-08 15:00 - 2013-07-08 15:00 - 00000000 ____D C:\Program Files (x86)\AVG SafeGuard toolbar
2013-07-07 15:00 - 2012-08-01 03:33 - 00000468 ____A C:\Windows\Tasks\ParetoLogic Registration3.job
2013-07-07 14:58 - 2013-07-06 14:15 - 00000000 ____D C:\Users\Admin\AppData\Local\VidSoft
2013-07-05 20:36 - 2009-08-14 14:18 - 00000000 ____A C:\Users\Admin\AppData\Local\FnF4.txt
2013-07-05 20:30 - 2011-08-30 03:17 - 00000000 ____D C:\Users\Admin\AppData\Roaming\PCPowerSpeed
2013-07-02 09:47 - 2012-06-27 10:17 - 00000000 ____D C:\Users\Admin\Documents\Louisiana Political Action Committee
2013-06-25 09:45 - 2013-06-14 10:34 - 00019110 ____A C:\Users\Admin\Documents\Family Investments.xlsx
2013-06-24 16:25 - 2011-12-08 08:30 - 00027457 ____A C:\Users\Admin\Documents\Investments.xlsx
2013-06-22 05:00 - 2012-03-06 12:38 - 00002025 ____A C:\Users\Public\Desktop\Google Chrome.lnk
2013-06-22 05:00 - 2012-03-06 12:38 - 00002025 ____A C:\ProgramData\Desktop\Google Chrome.lnk
2013-06-14 07:08 - 2010-09-26 09:47 - 00000052 ____A C:\Windows\SysWOW64\DOErrors.log
2013-06-14 05:52 - 2006-11-02 05:33 - 00000000 ____D C:\Windows\rescache
2013-06-13 08:19 - 2008-02-23 15:50 - 00000000 ____D C:\ProgramData\Microsoft Help
2013-06-13 08:17 - 2012-04-06 05:43 - 00000000 ____D C:\Users\Admin\Documents\7531 Vincent Rd
2013-06-13 08:14 - 2006-11-02 04:35 - 75825640 ____A (Microsoft Corporation) C:\Windows\System32\mrt.exe
2013-06-12 16:15 - 2012-06-03 16:36 - 00692104 ____A (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2013-06-12 16:15 - 2012-06-03 16:36 - 00003682 ____A C:\Windows\System32\Tasks\Adobe Flash Player Updater
2013-06-12 16:15 - 2011-10-25 14:04 - 00071048 ____A (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl

ZeroAccess:
C:\$Recycle.Bin\S-1-5-21-553043089-3181346576-219937205-1000\$ff24043d55f85ce9a20a8337d9b4b888
C:\$Recycle.Bin\S-1-5-21-553043089-3181346576-219937205-1000\$ff24043d55f85ce9a20a8337d9b4b888\@
C:\$Recycle.Bin\S-1-5-21-553043089-3181346576-219937205-1000\$ff24043d55f85ce9a20a8337d9b4b888\L
C:\$Recycle.Bin\S-1-5-21-553043089-3181346576-219937205-1000\$ff24043d55f85ce9a20a8337d9b4b888\o
C:\$Recycle.Bin\S-1-5-21-553043089-3181346576-219937205-1000\$ff24043d55f85ce9a20a8337d9b4b888\U
C:\$Recycle.Bin\S-1-5-21-553043089-3181346576-219937205-1000\$ff24043d55f85ce9a20a8337d9b4b888\U\00000001.@
C:\$Recycle.Bin\S-1-5-21-553043089-3181346576-219937205-1000\$ff24043d55f85ce9a20a8337d9b4b888\U\80000000.@
C:\$Recycle.Bin\S-1-5-21-553043089-3181346576-219937205-1000\$ff24043d55f85ce9a20a8337d9b4b888\U\800000cb.@

Files to move or delete:
====================
C:\Users\Admin\iexplore.exe
C:\Users\Admin\jqs.exe
C:\Users\Admin\mstsc.exe
C:\Users\Admin\notepad.exe
C:\Users\Admin\skype.exe
C:\Users\Admin\spoolsv.exe
C:\Users\Admin\teamviewer.exe
C:\Users\Admin\AppData\Roaming\skype.dat
C:\Users\Admin\AppData\Roaming\skype.ini
C:\ProgramData\nvModes.dat
C:\Windows\Tasks\{AF2D1ACB-8A1E-4285-A87B-C4548A0AF894}.job

==================== Known DLLs (Whitelisted) ================

==================== Bamital & volsnap Check =================

C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\SysWOW64\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit

==================== EXE ASSOCIATION =====================

HKLM\...\.exe: exefile => OK
HKLM\...\exefile\DefaultIcon: %1 => OK
HKLM\...\exefile\open\command: "%1" %* => OK

==================== Restore Points  =========================

Restore point made on: 2013-01-16 04:08:50
Restore point made on: 2013-01-19 05:55:07
Restore point made on: 2013-01-20 01:01:16
Restore point made on: 2013-01-21 01:01:00
Restore point made on: 2013-02-17 08:31:42
Restore point made on: 2013-02-28 11:34:48
Restore point made on: 2013-02-28 11:35:40
Restore point made on: 2013-02-28 11:38:44
Restore point made on: 2013-03-19 08:33:54
Restore point made on: 2013-03-19 09:18:41
Restore point made on: 2013-03-26 20:13:26
Restore point made on: 2013-04-04 11:21:53
Restore point made on: 2013-04-26 07:59:14
Restore point made on: 2013-05-05 16:16:26
Restore point made on: 2013-05-16 00:01:12
Restore point made on: 2013-06-13 08:10:50
Restore point made on: 2013-07-10 08:15:00

==================== Memory info ===========================

Percentage of memory in use: 17%
Total physical RAM: 4093.63 MB
Available physical RAM: 3361.76 MB
Total Pagefile: 3764.2 MB
Available Pagefile: 3458.56 MB
Total Virtual: 8192 MB
Available Virtual: 8191.89 MB

==================== Drives ================================

Drive c: () (Fixed) (Total:219.91 GB) (Free:121.24 GB) NTFS (Disk=0 Partition=1) ==>[Drive with boot components (obtained from BCD)]
Drive d: (HP_RECOVERY) (Fixed) (Total:12.98 GB) (Free:2.45 GB) NTFS (Disk=0 Partition=2) ==>[System with boot components (obtained from reading drive)]
Drive f: () (Removable) (Total:0.97 GB) (Free:0.97 GB) FAT32 (Disk=1 Partition=1)
Drive x: (Boot) (Fixed) (Total:0.03 GB) (Free:0.03 GB) NTFS

==================== MBR & Partition Table ==================

========================================================
Disk: 0 (Size: 233 GB) (Disk ID: 2CB52AEE)
Partition 00: (Not Active) - (Size=0) - (Type=00) ATTENTION ===> 0 byte partition bootkit.
Partition 1: (Active) - (Size=220 GB) - (Type=07 NTFS)
Partition 2: (Not Active) - (Size=13 GB) - (Type=07 NTFS)

========================================================
Disk: 1 (Size: 999 MB) (Disk ID: 6F20736B)
Partition 1: (Not Active) - (Size=544 GB) - (Type=72)
Partition 2: (Not Active) - (Size=923 GB) - (Type=65)
Partition 3: (Not Active) - (Size=923 GB) - (Type=79)
Partition 4: (Not Active) - (Size=27 MB) - (Type=0D)

LastRegBack: 2013-07-10 09:17

==================== End Of Log ============================



#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:12:35 AM

Posted 11 July 2013 - 12:58 PM



Hello portergm



Open notepad. Please copy the contents of the code box below. To do this highlight the contents of the box and right click on it. Paste this into the open notepad. Save it on the flash drive as fixlist.txt

 
HKLM-x32\...\Run: [8ed1d9a4-02ff-0000-f65e-000067f5af7d] - C:\ProgramData\8ed1d9a4-02ff-0000-f65e-000067f5af7d\8ed1d9a4-02ff-0000-f65e-000067f5af7d.exe [353792 2013-07-10] ()
HKU\Admin\...\Run: [KB01163623.exe] - "C:\Users\Admin\AppData\Roaming\KB01163623.exe" [x]
HKU\Admin\...\Run: [VidSoft] - RUNDLL32.EXE C:\Users\Admin\AppData\Local\VidSoft\lqyflcvl.dll,vQZcaclBZIhJmZOvjkdYfXlsacs [891904 2013-07-06] (Autodesk, Inc.) <===== ATTENTION
HKU\Admin\...\Run: [Internet Security] - C:\Users\Admin\AppData\Roaming\mxdefender.exe [x]
HKU\Admin\...\Run: [Adobe CSS5.1 Manager] - C:\Users\Admin\AppData\Local\225d61b6-bef7-4845-84aa-57413efd6783ad\dbbefaaefdad.exe [219648 2013-07-09] () <===== ATTENTION
HKU\Admin\...\Run: [8ed1d9a4-02ff-0000-f65e-000067f5af7d] - C:\ProgramData\8ed1d9a4-02ff-0000-f65e-000067f5af7d\8ed1d9a4-02ff-0000-f65e-000067f5af7d.exe [353792 2013-07-10] ()
HKU\Admin\...\RunOnce: [Adobe CSS5.1 Manager] - C:\Users\Admin\AppData\Local\225d61b6-bef7-4845-84aa-57413efd6783ad\dbbefaaefdad.exe [219648 2013-07-09] () <===== ATTENTION
HKU\Admin\...\Winlogon: [Shell] explorer.exe,C:\Users\Admin\AppData\Roaming\skype.dat [133120 2011-11-18] (Intro-Software Lab.) <==== ATTENTION
2013-07-10 08:58 - 2013-07-10 14:28 - 00002062 ____A C:\Users\Admin\Desktop\System Care Antivirus.lnk
2013-07-09 15:30 - 2013-07-10 14:32 - 00000004 ____A C:\Users\Admin\AppData\Roaming\skype.ini
2013-07-09 15:28 - 2013-07-09 15:28 - 00002980 ____A C:\Windows\System32\Tasks\{AF2D1ACB-8A1E-4285-A87B-C4548A0AF894}
2013-07-09 15:27 - 2013-07-10 09:00 - 00000324 ___AH C:\Windows\Tasks\{AF2D1ACB-8A1E-4285-A87B-C4548A0AF894}.job
2013-07-09 15:27 - 2013-07-09 15:28 - 00000000 ____D C:\Users\Admin\AppData\Local\225d61b6-bef7-4845-84aa-57413efd6783ad
2013-07-09 15:27 - 2013-07-09 15:27 - 00855552 ____A (Dexpot GbR) C:\Users\Admin\AppData\Roaming\mwdefender.exe
2013-07-09 15:27 - 2013-07-09 15:27 - 00855552 ____A (Dexpot GbR) C:\Users\Admin\AppData\Roaming\8094.tmp
2013-07-09 15:27 - 2013-07-09 15:27 - 00219648 ____A C:\Users\Admin\teamviewer.exe
2013-07-09 15:27 - 2013-07-09 15:27 - 00133120 ____A (Intro-Software Lab.) C:\Users\Admin\notepad.exe
2013-07-09 15:27 - 2013-07-09 15:27 - 00133120 ____A (Intro-Software Lab.) C:\Users\Admin\mstsc.exe
2013-07-09 15:27 - 2013-07-09 15:27 - 00000702 ____A C:\Users\Admin\Desktop\Internet Security PRO.lnk
2013-07-09 15:27 - 2013-07-09 15:27 - 00000000 ____A C:\Users\Admin\spoolsv.exe
2013-07-09 15:27 - 2013-07-09 15:27 - 00000000 ____A C:\Users\Admin\skype.exe
2013-07-09 15:27 - 2013-07-09 15:27 - 00000000 ____A C:\Users\Admin\jqs.exe
2013-07-09 15:27 - 2013-07-09 15:27 - 00000000 ____A C:\Users\Admin\iexplore.exe
2013-07-09 14:04 - 2013-07-09 14:04 - 00000996 ____A C:\Users\Admin\Desktop\SpeedyPC Pro.lnk
2013-07-09 14:04 - 2013-07-09 14:04 - 00000516 ____A C:\Windows\Tasks\SpeedyPC Update Version3 Startup Task.job
2013-07-09 14:04 - 2013-07-09 14:04 - 00000464 ____A C:\Windows\Tasks\SpeedyPC Update Version3.job
2013-07-09 14:04 - 2013-07-09 14:04 - 00000444 ____A C:\Windows\Tasks\SpeedyPC Registration3.job
2013-07-09 14:04 - 2013-07-09 14:04 - 00000420 ____A C:\Windows\Tasks\SpeedyPC Pro.job
2013-07-09 14:04 - 2013-07-09 14:04 - 00000000 ____D C:\Users\Admin\AppData\Roaming\SpeedyPC Software
2013-07-09 14:04 - 2013-07-09 14:04 - 00000000 ____D C:\Users\Admin\AppData\Roaming\DriverCure
2013-07-09 14:04 - 2013-07-09 14:04 - 00000000 ____D C:\ProgramData\SpeedyPC Software
2013-07-09 14:04 - 2013-07-09 14:04 - 00000000 ____D C:\Program Files (x86)\SpeedyPC Software
C:\$Recycle.Bin\S-1-5-21-553043089-3181346576-219937205-1000\$ff24043d55f85ce9a20a8337d9b4b888
C:\Users\Admin\iexplore.exe
C:\Users\Admin\jqs.exe
C:\Users\Admin\mstsc.exe
C:\Users\Admin\notepad.exe
C:\Users\Admin\skype.exe
C:\Users\Admin\spoolsv.exe
C:\Users\Admin\teamviewer.exe
C:\Users\Admin\AppData\Roaming\skype.dat
C:\Users\Admin\AppData\Roaming\skype.ini
C:\ProgramData\nvModes.dat
C:\Windows\Tasks\{AF2D1ACB-8A1E-4285-A87B-C4548A0AF894}.job

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options.

Run FRST again like we did before but this time press the Fix button just once and wait.
The tool will make a log on the flash drive (Fixlog.txt) please post it to your reply.

Also boot the computer into normal mode and let me know how things are looking.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 portergm

portergm
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:10:35 PM

Posted 11 July 2013 - 02:38 PM

Gringo,

 

Thank you so much!  My laptop is functional once again.  It seems slower than before, but I am not sure.  There are several new tool bars displayed on my internet page. Also, there are numerus pop up screens for various different things. I am able to access my files and programs.  That is a big relief!  You guys are the BEST!  I will apply to become one of you.

 

I have attached the Fixlog.txt.

 

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 10-07-2013 03
Ran by SYSTEM at 2013-07-11 13:57:36 Run:1
Running from F:\
Boot Mode: Recovery
==============================================

HKLM\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\\8ed1d9a4-02ff-0000-f65e-000067f5af7d => Value deleted successfully.
HKU\Admin\Software\Microsoft\Windows\CurrentVersion\Run\\KB01163623.exe => Value deleted successfully.
HKU\Admin\Software\Microsoft\Windows\CurrentVersion\Run\\VidSoft => Value deleted successfully.
HKU\Admin\Software\Microsoft\Windows\CurrentVersion\Run\\Internet Security => Value deleted successfully.
HKU\Admin\Software\Microsoft\Windows\CurrentVersion\Run\\Adobe CSS5.1 Manager => Value deleted successfully.
HKU\Admin\Software\Microsoft\Windows\CurrentVersion\Run\\8ed1d9a4-02ff-0000-f65e-000067f5af7d => Value deleted successfully.
HKU\Admin\Software\Microsoft\Windows\CurrentVersion\RunOnce\\Adobe CSS5.1 Manager => Value deleted successfully.
HKU\Admin\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell => Value deleted successfully.
C:\Users\Admin\Desktop\System Care Antivirus.lnk => Moved successfully.
C:\Users\Admin\AppData\Roaming\skype.ini => Moved successfully.
C:\Windows\System32\Tasks\{AF2D1ACB-8A1E-4285-A87B-C4548A0AF894} => Moved successfully.
C:\Windows\Tasks\{AF2D1ACB-8A1E-4285-A87B-C4548A0AF894}.job => Moved successfully.
C:\Users\Admin\AppData\Local\225d61b6-bef7-4845-84aa-57413efd6783ad => Moved successfully.
C:\Users\Admin\AppData\Roaming\mwdefender.exe => Moved successfully.
C:\Users\Admin\AppData\Roaming\8094.tmp => Moved successfully.
C:\Users\Admin\teamviewer.exe => Moved successfully.
C:\Users\Admin\notepad.exe => Moved successfully.
C:\Users\Admin\mstsc.exe => Moved successfully.
C:\Users\Admin\Desktop\Internet Security PRO.lnk => Moved successfully.
C:\Users\Admin\spoolsv.exe => Moved successfully.
C:\Users\Admin\skype.exe => Moved successfully.
C:\Users\Admin\jqs.exe => Moved successfully.
C:\Users\Admin\iexplore.exe => Moved successfully.
C:\Users\Admin\Desktop\SpeedyPC Pro.lnk => Moved successfully.
C:\Windows\Tasks\SpeedyPC Update Version3 Startup Task.job => Moved successfully.
C:\Windows\Tasks\SpeedyPC Update Version3.job => Moved successfully.
C:\Windows\Tasks\SpeedyPC Registration3.job => Moved successfully.
C:\Windows\Tasks\SpeedyPC Pro.job => Moved successfully.
C:\Users\Admin\AppData\Roaming\SpeedyPC Software => Moved successfully.
C:\Users\Admin\AppData\Roaming\DriverCure => Moved successfully.
C:\ProgramData\SpeedyPC Software => Moved successfully.
C:\Program Files (x86)\SpeedyPC Software => Moved successfully.
C:\$Recycle.Bin\S-1-5-21-553043089-3181346576-219937205-1000\$ff24043d55f85ce9a20a8337d9b4b888 => Moved successfully.
"C:\Users\Admin\iexplore.exe" => File/Directory not found.
"C:\Users\Admin\jqs.exe" => File/Directory not found.
"C:\Users\Admin\mstsc.exe" => File/Directory not found.
"C:\Users\Admin\notepad.exe" => File/Directory not found.
"C:\Users\Admin\skype.exe" => File/Directory not found.
"C:\Users\Admin\spoolsv.exe" => File/Directory not found.
"C:\Users\Admin\teamviewer.exe" => File/Directory not found.
C:\Users\Admin\AppData\Roaming\skype.dat => Moved successfully.
"C:\Users\Admin\AppData\Roaming\skype.ini" => File/Directory not found.
C:\ProgramData\nvModes.dat => Moved successfully.
"C:\Windows\Tasks\{AF2D1ACB-8A1E-4285-A87B-C4548A0AF894}.job" => File/Directory not found.

==== End of Fixlog ====



#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:12:35 AM

Posted 12 July 2013 - 09:47 AM



Hello portergm

we will get everything back to normal soon.

These are the programs I would like you to run next, if you have any problems with one of these just skip it and move on to the next one.

-AdwCleaner-

Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Delete.
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
-Junkware-Removal-Tool-

Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
When they are complete let me have the two reports and let me know how things are running.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 portergm

portergm
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:10:35 PM

Posted 12 July 2013 - 06:02 PM

Gringo,

 

I have encounter a problem since my last post.  My cursor freezes after starting up in "normal mode".  This may be the result of something I did.  After running FRST, my computer was functioning once again. I went into my computer and started uninstalling the numerous programs I downloaded before I contacted you. I uninstalled PC Speed, PC Health, PC Fix, and RLL Kill. So I may have brought this problem upon myself.

 

I was able to boot up in "safe mode with networking" and downloaded the Adwcleaner and Junkware Removal Tool.  I ran the tools and the respective reports are posted below. I will not do anything else to the computer until instructed.

 

# AdwCleaner v2.305 - Logfile created 07/12/2013 at 16:37:05
# Updated 11/07/2013 by Xplode
# Operating system : Windows ™ Vista Home Premium Service Pack 2 (64 bits)
# User : Admin - ADMIN-PC
# Boot Mode : Safe mode with networking
# Running from : C:\Users\Admin\Downloads\AdwCleaner.exe
# Option [Delete]

***** [Services] *****

***** [Files / Folders] *****

Deleted on reboot : C:\Program Files (x86)\AppGraffiti
Deleted on reboot : C:\Program Files (x86)\Common Files\AVG Secure Search
Deleted on reboot : C:\Program Files (x86)\Common Files\ParetoLogic
Deleted on reboot : C:\Program Files (x86)\Conduit
Deleted on reboot : C:\Program Files (x86)\OApps
Deleted on reboot : C:\Program Files (x86)\ParetoLogic
Deleted on reboot : C:\Program Files (x86)\Viewpoint
Deleted on reboot : C:\Program Files (x86)\Zoom Downloader
Deleted on reboot : C:\ProgramData\Ask
Deleted on reboot : C:\ProgramData\Babylon
Deleted on reboot : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AppGraffiti
Deleted on reboot : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Zoom Downloader
Deleted on reboot : C:\ProgramData\ParetoLogic
Deleted on reboot : C:\ProgramData\Viewpoint
Deleted on reboot : C:\Users\Admin\AppData\Local\Conduit
Deleted on reboot : C:\Users\Admin\AppData\Local\SwvUpdater
Deleted on reboot : C:\Users\Admin\AppData\LocalLow\AppGraffiti
Deleted on reboot : C:\Users\Admin\AppData\LocalLow\Conduit
Deleted on reboot : C:\Users\Admin\AppData\LocalLow\delta
Deleted on reboot : C:\Users\Admin\AppData\LocalLow\PriceGong
Deleted on reboot : C:\Users\Admin\AppData\LocalLow\searchresultstb
Deleted on reboot : C:\Users\Admin\AppData\Roaming\Babylon
Deleted on reboot : C:\Users\Admin\AppData\Roaming\DefaultTab
File Deleted : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\eBay.lnk

***** [Registry] *****

Key Deleted : HKCU\Software\APN DTX
Key Deleted : HKCU\Software\AppDataLow\Software\Conduit
Key Deleted : HKCU\Software\AppDataLow\Software\ConduitSearchScopes
Key Deleted : HKCU\Software\AppDataLow\Software\DefaultTab
Key Deleted : HKCU\Software\AppDataLow\Software\LyricsContainer
Key Deleted : HKCU\Software\AppDataLow\Software\PriceGong
Key Deleted : HKCU\Software\AppDataLow\Software\SmartBar
Key Deleted : HKCU\Software\AppGraffiti
Key Deleted : HKCU\Software\BabSolution
Key Deleted : HKCU\Software\DataMngr_Toolbar
Key Deleted : HKCU\Software\Default Tab
Key Deleted : HKCU\Software\DefaultTab
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{6F6A5334-78E9-4D9B-8182-8B41EA8C39EF}_is1
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\DefaultTab
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\ViewpointMediaPlayer
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7F6AFBF1-E065-4627-A2FD-810366367D01}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{6F6A5334-78E9-4D9B-8182-8B41EA8C39EF}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{7F6AFBF1-E065-4627-A2FD-810366367D01}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{95B7759C-8C7F-4BF1-B163-73684A933233}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{E5C66DD8-308B-4A4F-AF0A-3D04F25B5343}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{03F998B2-0E00-11D3-A498-00104B6EB52E}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{6F6A5334-78E9-4D9B-8182-8B41EA8C39EF}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{7F6AFBF1-E065-4627-A2FD-810366367D01}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{8736C681-37A0-40C6-A0F0-4C083409151C}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{95B7759C-8C7F-4BF1-B163-73684A933233}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{CC99A798-FD3D-4AB4-969E-6071612524F9}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{E5C66DD8-308B-4A4F-AF0A-3D04F25B5343}
Key Deleted : HKCU\Software\YahooPartnerToolbar
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4D79-A620-CCE0C0A66CC9}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{B9C7CE32-DA91-43C2-B7E9-0E9AAFC675CD}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{C04B7D22-5AEC-4561-8F49-27F6269208F6}
Key Deleted : HKLM\Software\AppGraffiti
Key Deleted : HKLM\Software\AVG Security Toolbar
Key Deleted : HKLM\SOFTWARE\Classes\AppGraffiti.AppGraffitiJS
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{1FDFF5A2-7BB1-48E1-8081-7236812B12B2}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{4E1E9D45-8BF9-4139-915C-9F83CC3D5921}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{9B0CB95C-933A-4B8C-B6D4-EDCD19A43874}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{BB711CB0-C70B-482E-9852-EC05EBD71DBB}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{C26644C4-2A12-4CA6-8F2E-0EDE6CF018F3}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{D616A4A2-7B38-4DBC-9093-6FE7A4A21B17}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\DefaultTabBHO.DLL
Key Deleted : HKLM\SOFTWARE\Classes\AppID\escorTlbr.DLL
Key Deleted : HKLM\SOFTWARE\Classes\AppID\GenericAskToolbar.DLL
Key Deleted : HKLM\SOFTWARE\Classes\AppID\ScriptHelper.EXE
Key Deleted : HKLM\SOFTWARE\Classes\AppID\ViProtocol.DLL
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl.1
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary
Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary.1
Key Deleted : HKLM\SOFTWARE\Classes\DefaultTabBHO.DefaultTabBrowserActiveX
Key Deleted : HKLM\SOFTWARE\Classes\DefaultTabBHO.DefaultTabBrowserActiveX.1
Key Deleted : HKLM\SOFTWARE\Classes\Prod.cap
Key Deleted : HKLM\SOFTWARE\Classes\PROTOCOLS\Handler\viprotocol
Key Deleted : HKLM\SOFTWARE\Classes\ScriptHelper.ScriptHelperApi
Key Deleted : HKLM\SOFTWARE\Classes\ScriptHelper.ScriptHelperApi.1
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.CT3289847
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{74FB6AFD-DD77-4CEB-83BD-AB2B63E63C93}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{9C049BA6-EA47-4AC3-AED6-A66D8DC9E1D8}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{C2AC8A0E-E48E-484B-A71C-C7A937FAAB94}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{DB02BC6B-B0F0-4074-99E6-884B70FCB6AE}
Key Deleted : HKLM\SOFTWARE\Classes\ViProtocol.ViProtocolOLE
Key Deleted : HKLM\SOFTWARE\Classes\ViProtocol.ViProtocolOLE.1
Key Deleted : HKLM\Software\Conduit
Key Deleted : HKLM\Software\DataMngr
Key Deleted : HKLM\Software\Default Tab
Key Deleted : HKLM\Software\DefaultTab
Key Deleted : HKLM\Software\MetaStream
Key Deleted : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{03F998B2-0E00-11D3-A498-00104B6EB52E}
Key Deleted : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{7F6AFBF1-E065-4627-A2FD-810366367D01}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{C6FDD0C3-266A-4DC3-B459-28C697C44CDC}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{F25AF245-4A81-40DC-92F9-E9021F207706}
Key Deleted : HKLM\SOFTWARE\MozillaPlugins\@avg.com/AVG SiteSafety plugin,version=11.0.0.1,application/x-avg-sitesafety-plugin
Key Deleted : HKLM\SOFTWARE\MozillaPlugins\@viewpoint.com/VMP
Key Deleted : HKLM\Software\Viewpoint
Key Deleted : HKLM\SOFTWARE\Wow6432Node\5c528f8fe239ea46
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{03F998B2-0E00-11D3-A498-00104B6EB52E}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{3C471948-F874-49F5-B338-4F214A2EE0B1}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{4E92DB5F-AAD9-49D3-8EAB-B40CBE5B1FF7}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{6F6A5334-78E9-4D9B-8182-8B41EA8C39EF}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{761F6A83-F007-49E4-8EAC-CDB6808EF06F}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{76C45B18-A29E-43EA-AAF8-AF55C2E1AE17}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{7F6AFBF1-E065-4627-A2FD-810366367D01}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{933B95E2-E7B7-4AD9-B952-7AC336682AE3}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{95B7759C-8C7F-4BF1-B163-73684A933233}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{96EF404C-24C7-43D0-9096-4CCC8BB7CCAC}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{97720195-206A-42AE-8E65-260B9BA5589F}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{97D69524-BB57-4185-9C7F-5F05593B771A}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{986F7A5A-9676-47E1-8642-F41F8C3FCF82}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{B18788A4-92BD-440E-A4D1-380C36531119}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{B658800C-F66E-4EF3-AB85-6C0C227862A9}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{CC99A798-FD3D-4AB4-969E-6071612524F9}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{DE9028D0-5FFA-4E69-94E3-89EE8741F468}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{E5C66DD8-308B-4A4F-AF0A-3D04F25B5343}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{F25AF245-4A81-40DC-92F9-E9021F207706}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\kdidombaedgpfiiedeimiebkmbilgmlc
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\ndibdjnfmopecpmkdieinmbadjfpblof
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{250BECD2-5C43-48CF-A3C6-666338526D67}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F25AF245-4A81-40DC-92F9-E9021F207706}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6F6A5334-78E9-4D9B-8182-8B41EA8C39EF}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7F6AFBF1-E065-4627-A2FD-810366367D01}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{95B7759C-8C7F-4BF1-B163-73684A933233}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E5C66DD8-308B-4A4F-AF0A-3D04F25B5343}
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{6F6A5334-78E9-4D9B-8182-8B41EA8C39EF}_is1
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DefaultTab
Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\ViewpointMediaPlayer
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{933B95E2-E7B7-4AD9-B952-7AC336682AE3}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{F25AF245-4A81-40DC-92F9-E9021F207706}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{022C9F90-2E96-47D6-A971-107650154563}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{03E2A1F3-4402-4121-8B35-733216D61217}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{4E92DB5F-AAD9-49D3-8EAB-B40CBE5B1FF7}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{6C434537-053E-486D-B62A-160059D9D456}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{91CF619A-4686-4CA4-9232-3B2E6B63AA92}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{9E3B11F6-4179-4603-A71B-A55F4BCB0BEC}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{AC71B60E-94C9-4EDE-BA46-E146747BB67E}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{C401D2CE-DC27-45C7-BC0C-8E6EA7F085D6}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F25AF245-4A81-40DC-92F9-E9021F207706}
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{D4027C7F-154A-4066-A1AD-4243D8127440}]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{D7E97865-918F-41E4-9CD0-25AB1C574CE8}]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks [{D3D233D5-9F6D-436C-B6C7-E63F77503B30}]
Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [vProt]
Value Deleted : HKLM\SOFTWARE\Mozilla\Firefox\Extensions [Avg@toolbar]
Value Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar [{95B7759C-8C7F-4BF1-B163-73684A933233}]

***** [Internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16496

[OK] Registry is clean.

-\\ Google Chrome v27.0.1453.116

File : C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

[OK] File is clean.

*************************

AdwCleaner[S1].txt - [14448 octets] - [12/07/2013 16:37:05]

########## EOF - C:\AdwCleaner[S1].txt - [14509 octets] ##########

 

 

 

 

 

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 5.0.8 (07.12.2013:1)
OS: Windows ™ Vista Home Premium x64
Ran by Admin on Fri 07/12/2013 at 17:35:16.53
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

~~~ Services

 

~~~ Registry Values

Successfully repaired: [Registry Value] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows\\AppInit_DLLs
Successfully repaired: [Registry Value] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\\Start Page
Successfully repaired: [Registry Value] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\\DisplayName
Successfully repaired: [Registry Value] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\\URL
Successfully repaired: [Registry Value] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\\Default_Page_URL
Suspicious HKCU\..\Run entries found. Trojan:JS/Medfos.B?

    Value Name          Type                             Value Data                    
========================================================================================
    cardsMainkit24    REG_SZ    rundll32.exe "C:\Users\Admin\AppData\Roaming\cardsMainkit24\cardsMainkit24.dll",MotorolaMobile3d libdrvPlan64

 

~~~ Registry Keys

Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\sparktrust
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\sparktrust
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{3883AF1C-DF17-494F-9290-D8DFD3F61FBE}
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{45F93180-DB65-49E0-8ED9-B773C67EC8BE}
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{25D48CEB-F4D0-4601-BB0E-149A9DBB7B5B}

 

~~~ Files

Successfully deleted: [File] "C:\Windows\tasks\filecure startup.job"

 

~~~ Folders

Successfully deleted: [Folder] "C:\ProgramData\regwork"
Successfully deleted: [Folder] "C:\ProgramData\sparktrust"
Successfully deleted: [Folder] "C:\Program Files (x86)\regwork"
Successfully deleted: [Folder] "C:\Program Files (x86)\sparktrust"
Successfully deleted: [Folder] "C:\Program Files (x86)\Common Files\speedypc software"
Successfully deleted: [Folder] "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\sparktrust"
Successfully deleted: [Folder] "C:\Users\Admin\AppData\Roaming\microsoft\windows\start menu\programs\speedypc software"

 

~~~ Chrome

Dumping contents of C:\Users\Admin\appdata\local\Google\Chrome\User Data\Default\Default
C:\Users\Admin\appdata\local\Google\Chrome\User Data\Default\Default\aagededggfdigfgfgedadfdadedegddc
C:\Users\Admin\appdata\local\Google\Chrome\User Data\Default\Default\aagededggfdigfgfgedadfdadedegddc\background.js
C:\Users\Admin\appdata\local\Google\Chrome\User Data\Default\Default\aagededggfdigfgfgedadfdadedegddc\ContentScript.js
C:\Users\Admin\appdata\local\Google\Chrome\User Data\Default\Default\aagededggfdigfgfgedadfdadedegddc\manifest.json

Successfully deleted: [Folder] C:\Users\Admin\appdata\local\Google\Chrome\User Data\Default\Default [Default Extension 1.0]

 

~~~ Event Viewer Logs were cleared

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Fri 07/12/2013 at 17:41:02.22
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:12:35 AM

Posted 12 July 2013 - 06:31 PM


Hello portergm

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 portergm

portergm
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:10:35 PM

Posted 13 July 2013 - 12:28 AM

Gringo,

 

I was unable to access the internet in "normal mode". The cursor continues to freeze up.  I am able to access the internet in the "safe mode with networking". So I downloaded Combofix on a flash drive and ran it on the affected computer (in normal mode) from the flashdrive rather than the desktop. It took three attempts to get Combofix to run. The program displayed a message "McAffee Virus Scan is enabled" even though the scan was off. The ComboFix log is posted below.

 

ComboFix 13-07-12.01 - Admin 07/12/2013  22:28:38.2.2 - x64
Microsoft® Windows Vista™ Home Premium   6.0.6002.2.1252.1.1033.18.4093.2853 [GMT -5:00]
Running from: c:\users\Admin\AppData\Local\Temp\DIQM\Combofix_139\Software\Combofix.exe
AV: McAfee Anti-Virus and Anti-Spyware *Disabled/Updated* {86355677-4064-3EA7-ABB3-1B136EB04637}
FW: McAfee Firewall *Disabled* {BE0ED752-0A0B-3FFF-80EC-B2269063014C}
SP: McAfee Anti-Virus and Anti-Spyware *Disabled/Updated* {3D54B793-665E-3129-9103-206115370C8A}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\program files (x86)\DefaultTab
c:\program files (x86)\DefaultTab\DefaultTab.crx
c:\program files (x86)\DefaultTab\DefaultTabSearch.exe
c:\program files (x86)\DefaultTab\uid
c:\users\Admin\AppData\Local\Temp\DIQM\Combofix_139\Combofix_V.178510241a.exe
c:\users\Admin\AppData\Roaming\DefaultTab\DefaultTab
c:\users\Admin\AppData\Roaming\DefaultTab\DefaultTab\addon.ico
c:\users\Admin\AppData\Roaming\DefaultTab\DefaultTab\DefaultTabBHO.cfg
c:\users\Admin\AppData\Roaming\DefaultTab\DefaultTab\DefaultTabBHO.dll
c:\users\Admin\AppData\Roaming\DefaultTab\DefaultTab\DefaultTabStart.exe
c:\users\Admin\AppData\Roaming\DefaultTab\DefaultTab\DefaultTabStart64.exe
c:\users\Admin\AppData\Roaming\DefaultTab\DefaultTab\DefaultTabUninstaller.exe
c:\users\Admin\AppData\Roaming\DefaultTab\DefaultTab\DefaultTabWrap.dll
c:\users\Admin\AppData\Roaming\DefaultTab\DefaultTab\DefaultTabWrap64.dll
c:\users\Admin\AppData\Roaming\DefaultTab\DefaultTab\DT.ico
c:\users\Admin\AppData\Roaming\DefaultTab\DefaultTab\DTUpdate.exe
c:\users\Admin\AppData\Roaming\DefaultTab\DefaultTab\searchhere.ico
c:\users\Admin\AppData\Roaming\DefaultTab\DefaultTab\uninstalldt.exe
.
---- Previous Run -------
.
c:\programdata\8ed1d9a4-02ff-0000-f65e-000067f5af7d\8ed1d9a4-02ff-0000-f65e-000067f5af7d.exe
c:\users\Admin\AppData\Roaming\result.db
.
-- Previous Run --
.
c:\windows\SysWow64\userinit.exe . . . is infected!!
.
--------
.
.
(((((((((((((((((((((((((((((((((((((((   Drivers/Services   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Service_BrowserDefendert
-------\Service_DefaultTabSearch
-------\Service_DefaultTabUpdate
-------\Service_DefaultTabUpdate
-------\Service_DefaultTabSearch
-------\Service_DefaultTabUpdate
-------\Service_DefaultTabUpdate
.
.
(((((((((((((((((((((((((   Files Created from 2013-06-13 to 2013-07-13  )))))))))))))))))))))))))))))))
.
.
2013-07-13 03:55 . 2013-07-13 03:55 -------- d-----w- c:\users\Default\AppData\Local\temp
2013-07-13 03:22 . 2013-07-13 03:22 -------- d-----w- c:\users\Admin\AppData\Local\Conduit
2013-07-13 03:22 . 2013-07-13 03:22 -------- d-----w- c:\program files (x86)\MixiDJ_V34
2013-07-13 01:26 . 2013-07-13 04:00 -------- d-----w- c:\users\Admin\AppData\Local\temp
2013-07-12 22:35 . 2013-07-12 22:35 -------- d-----w- c:\windows\ERUNT
2013-07-12 16:52 . 2013-06-17 07:10 9552976 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{579A34A2-981B-48DE-801D-2A1178E98887}\mpengine.dll
2013-07-11 21:44 . 2013-07-11 21:44 3682 ----a-w- c:\windows\SysWow64\ealregsnapshot1.reg
2013-07-11 21:16 . 2013-07-11 21:17 -------- d-----w- c:\programdata\AOL
2013-07-11 01:39 . 2013-07-11 01:39 -------- d-----w- C:\FRST
2013-07-10 16:58 . 2013-07-13 01:25 -------- d-----w- c:\programdata\8ed1d9a4-02ff-0000-f65e-000067f5af7d
2013-07-10 16:14 . 2013-06-01 04:19 619008 ----a-w- c:\windows\system32\qedit.dll
2013-07-10 16:14 . 2013-06-01 04:06 505344 ----a-w- c:\windows\SysWow64\qedit.dll
2013-07-09 23:14 . 2013-07-09 23:14 -------- d-----w- c:\users\Admin\AppData\Local\AVG SafeGuard toolbar
2013-07-09 17:01 . 2013-07-09 17:01 -------- d-----w- c:\programdata\Panda Security
2013-07-09 17:01 . 2013-07-09 17:01 -------- d-----w- c:\program files (x86)\Panda Security
2013-07-09 16:26 . 2013-07-10 02:34 -------- d-----w- c:\program files (x86)\MyPC Backup
2013-07-09 04:02 . 2013-07-09 04:02 -------- d-----w- c:\users\AppData
2013-07-09 04:01 . 2013-07-13 03:21 -------- d-----w- c:\users\Admin\AppData\Local\CRE
2013-07-08 23:53 . 2013-07-08 23:53 -------- d-----w- c:\programdata\Malwarebytes
2013-07-08 23:53 . 2013-07-08 23:53 -------- d-----w- c:\program files (x86)\Malwarebytes' Anti-Malware
2013-07-08 23:53 . 2013-04-04 19:50 25928 ----a-w- c:\windows\system32\drivers\mbam.sys
2013-07-08 23:22 . 2013-07-08 23:22 -------- d-----w- c:\program files (x86)\Common Files\SparkTrust
2013-07-08 23:01 . 2013-07-09 14:02 -------- d-----w- C:\rei
2013-07-08 23:01 . 2013-07-08 23:01 -------- d-----w- c:\program files\Reimage
2013-07-08 23:00 . 2013-07-08 23:00 45856 ----a-w- c:\windows\system32\drivers\avgtpx64.sys
2013-07-08 23:00 . 2013-07-08 23:01 -------- d-----w- c:\programdata\AVG SafeGuard toolbar
2013-07-08 23:00 . 2013-07-08 23:00 -------- d-----w- c:\program files (x86)\AVG SafeGuard toolbar
2013-07-08 23:00 . 2013-07-08 23:00 -------- d--h--w- c:\programdata\Common Files
2013-07-07 22:17 . 2013-07-09 23:03 -------- d-----w- c:\users\Admin\AppData\Roaming\cardsMainkit24
2013-07-06 22:15 . 2013-07-07 22:58 -------- d-----w- c:\users\Admin\AppData\Local\VidSoft
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-07-11 20:10 . 2006-11-02 12:35 78185248 ----a-w- c:\windows\system32\mrt.exe
2013-06-13 00:15 . 2012-06-04 00:36 692104 ----a-w- c:\windows\SysWow64\FlashPlayerApp.exe
2013-06-13 00:15 . 2011-10-25 22:04 71048 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl
2013-05-29 22:16 . 2013-05-29 22:16 137448 ----a-w- c:\windows\system32\drivers\PSINProt.sys
2013-05-29 10:55 . 2013-05-29 10:55 246504 ----a-w- c:\windows\system32\drivers\NNSStrm.sys
2013-05-29 10:55 . 2013-05-29 10:55 106216 ----a-w- c:\windows\system32\drivers\NNStlsc.sys
2013-05-29 10:55 . 2013-05-29 10:55 118504 ----a-w- c:\windows\system32\drivers\NNSPrv.sys
2013-05-29 10:55 . 2013-05-29 10:55 114920 ----a-w- c:\windows\system32\drivers\NNSSmtp.sys
2013-05-29 10:55 . 2013-05-29 10:55 69864 ----a-w- c:\windows\system32\drivers\NNSPihsw.sys
2013-05-29 10:55 . 2013-05-29 10:55 305896 ----a-w- c:\windows\system32\drivers\NNSProt.sys
2013-05-29 10:55 . 2013-05-29 10:55 119016 ----a-w- c:\windows\system32\drivers\NNSPop3.sys
2013-05-29 10:55 . 2013-05-29 10:55 95464 ----a-w- c:\windows\system32\drivers\NNSpicc.sys
2013-05-29 10:55 . 2013-05-29 10:55 114920 ----a-w- c:\windows\system32\drivers\NNSIds.sys
2013-05-29 10:55 . 2013-05-29 10:55 109288 ----a-w- c:\windows\system32\drivers\NNSHttps.sys
2013-05-29 10:55 . 2013-05-29 10:55 91368 ----a-w- c:\windows\system32\drivers\NNSAlpc.sys
2013-05-29 10:55 . 2013-05-29 10:55 122088 ----a-w- c:\windows\system32\drivers\NNSHttp.sys
2013-05-28 16:25 . 2013-05-28 16:25 105704 ----a-w- c:\windows\system32\drivers\PSINReg.sys
2013-05-28 16:24 . 2013-05-28 16:24 124648 ----a-w- c:\windows\system32\drivers\PSINProc.sys
2013-05-28 16:24 . 2013-05-28 16:24 205544 ----a-w- c:\windows\system32\drivers\PSINKNC.sys
2013-05-28 16:24 . 2013-05-28 16:24 168680 ----a-w- c:\windows\system32\drivers\PSINAflt.sys
2013-05-28 16:24 . 2013-05-28 16:24 122088 ----a-w- c:\windows\system32\drivers\PSINFile.sys
2013-05-08 04:50 . 2013-06-12 23:37 1423720 ----a-w- c:\windows\system32\drivers\tcpip.sys
2013-05-02 07:06 . 2009-10-02 19:17 278800 ------w- c:\windows\system32\MpSigStub.exe
2013-05-02 04:16 . 2013-06-12 23:32 686080 ----a-w- c:\windows\system32\win32spl.dll
2013-05-02 04:04 . 2013-06-12 23:32 443904 ----a-w- c:\windows\SysWow64\win32spl.dll
2013-05-02 04:03 . 2013-06-12 23:32 37376 ----a-w- c:\windows\SysWow64\printcom.dll
2013-05-01 08:59 . 2013-05-01 08:59 94208 ----a-w- c:\windows\SysWow64\QuickTimeVR.qtx
2013-05-01 08:59 . 2013-05-01 08:59 69632 ----a-w- c:\windows\SysWow64\QuickTime.qts
2013-04-24 04:09 . 2013-06-12 23:40 1269248 ----a-w- c:\windows\system32\crypt32.dll
2013-04-24 04:09 . 2013-06-12 23:40 174592 ----a-w- c:\windows\system32\cryptsvc.dll
2013-04-24 04:09 . 2013-06-12 23:40 132096 ----a-w- c:\windows\system32\cryptnet.dll
2013-04-24 04:09 . 2013-06-12 23:40 50688 ----a-w- c:\windows\system32\certenc.dll
2013-04-24 04:00 . 2013-06-12 23:40 985600 ----a-w- c:\windows\SysWow64\crypt32.dll
2013-04-24 04:00 . 2013-06-12 23:40 98304 ----a-w- c:\windows\SysWow64\cryptnet.dll
2013-04-24 04:00 . 2013-06-12 23:40 133120 ----a-w- c:\windows\SysWow64\cryptsvc.dll
2013-04-24 04:00 . 2013-06-12 23:40 41984 ----a-w- c:\windows\SysWow64\certenc.dll
2013-04-24 02:10 . 2013-06-12 23:40 1078272 ----a-w- c:\windows\system32\certutil.exe
2013-04-24 01:46 . 2013-06-12 23:40 812544 ----a-w- c:\windows\SysWow64\certutil.exe
2013-04-17 13:04 . 2013-06-12 23:38 30720 ----a-w- c:\windows\system32\cryptdlg.dll
2013-04-17 12:30 . 2013-06-12 23:38 24576 ----a-w- c:\windows\SysWow64\cryptdlg.dll
2013-04-15 14:17 . 2013-05-15 13:23 901496 ----a-w- c:\windows\system32\drivers\dxgkrnl.sys
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\URLSearchHooks]
"{55b95864-3251-45e9-bb30-1a82589aaff1}"= "c:\program files (x86)\MixiDJ_V34\prxtbMixi.dll" [2013-07-09 226592]
.
[HKEY_CLASSES_ROOT\clsid\{55b95864-3251-45e9-bb30-1a82589aaff1}]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\~\Browser Helper Objects\{55b95864-3251-45e9-bb30-1a82589aaff1}]
2013-07-09 08:57 226592 ----a-w- c:\program files (x86)\MixiDJ_V34\prxtbMixi.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\~\Browser Helper Objects\{7F6AFBF1-E065-4627-A2FD-810366367D01}]
c:\users\Admin\AppData\Roaming\DefaultTab\DefaultTab\DefaultTabBHO.dll [BU]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\~\Browser Helper Objects\{A7A9D7E7-E0C0-4202-9F13-6A06BD073CDA}]
2013-07-13 03:21 153432 ----a-w- c:\users\Admin\AppData\Local\TopArcadeHits\Toparcadehits.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar]
"{55b95864-3251-45e9-bb30-1a82589aaff1}"= "c:\program files (x86)\MixiDJ_V34\prxtbMixi.dll" [2013-07-09 226592]
.
[HKEY_CLASSES_ROOT\clsid\{55b95864-3251-45e9-bb30-1a82589aaff1}]
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"LightScribe Control Panel"="c:\program files (x86)\Common Files\LightScribe\LightScribeControlPanel.exe" [2007-08-23 455968]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-21 138240]
"Skype"="c:\program files (x86)\Skype\\Phone\Skype.exe" [2012-07-13 17418928]
"FreeScreenSharing"="c:\users\Admin\AppData\Local\FreeScreenSharing\FreeScreenSharing.exe" [2011-11-22 2204488]
"MobileDocuments"="c:\program files (x86)\Common Files\Apple\Internet Services\ubd.exe" [BU]
"GoogleDriveSync"="c:\program files (x86)\Google\Drive\googledrivesync.exe" [2013-06-07 19676256]
"cardsMainkit24"="c:\users\Admin\AppData\Roaming\cardsMainkit24\cardsMainkit24.dll" [BU]
"WebCake Desktop"="c:\users\Admin\AppData\Roaming\WebCake\WebCakeDesktop.exe" [2013-06-21 47896]
"SearchProtect"="c:\users\Admin\AppData\Roaming\SearchProtect\bin\cltmng.exe" [2013-05-08 2852640]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"QPService"="c:\program files (x86)\HP\QuickPlay\QPService.exe" [2007-12-20 468264]
"QlbCtrl"="%ProgramFiles(x86)%\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe" [BU]
"UCam_Menu"="c:\program files (x86)\CyberLink\YouCam\MUITransfer\MUIStartMenu.exe" [2007-08-17 218408]
"hpqSRMon"="" [BU]
"hpWirelessAssistant"="c:\program files (x86)\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe" [2007-09-13 480560]
"WAWifiMessage"="c:\program files (x86)\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe" [2007-01-08 311296]
"GrooveMonitor"="c:\program files (x86)\Microsoft Office\Office12\GrooveMonitor.exe" [2009-02-27 30040]
"HP Software Update"="c:\program files (x86)\HP\HP Software Update\HPWuSchd2.exe" [2006-12-11 49152]
"HP Health Check Scheduler"="c:\program files (x86)\Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe" [2008-06-16 75008]
"CarboniteSetupLite"="c:\program files (x86)\Carbonite\CarbonitePreinstaller.exe" [2010-05-27 283792]
"mcui_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2010-11-23 1484856]
"APSDaemon"="c:\program files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2013-04-22 59720]
"Adobe ARM"="c:\program files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2013-04-04 958576]
"SunJavaUpdateSched"="c:\program files (x86)\Common Files\Java\Java Update\jusched.exe" [2012-01-18 254696]
"RegWork"="c:\program files (x86)\RegWork\RegWork.exe" [BU]
"BackupDutyLite"="c:\program files (x86)\BackUpDutyLite\BackUpDutyLite.exe" [2012-01-04 485376]
"iTunesHelper"="c:\program files (x86)\iTunes\iTunesHelper.exe" [2013-05-15 152392]
"QuickTime Task"="c:\program files (x86)\QuickTime\QTTask.exe" [2013-05-01 421888]
"PSUAMain"="c:\program files (x86)\Panda Security\Panda Cloud Antivirus\PSUAMain.exe" [2013-05-28 32736]
"SearchProtectAll"="c:\program files (x86)\SearchProtect\bin\cltmng.exe" [2013-05-08 2852640]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"Microsoft"="c:\users\Admin\AppData\Local\Microsoft Games\Microsoft\lfpdsqbz.dll" [BU]
.
c:\users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
MyPC Backup.lnk - c:\program files (x86)\MyPC Backup\MyPC Backup.exe [2013-7-1 1945128]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files (x86)\HP\Digital Imaging\bin\hpqtra08.exe [2007-1-2 210520]
McAfee Security Scan Plus.lnk - c:\program files (x86)\McAfee Security Scan\3.0.318\SSScheduler.exe [2013-2-5 272248]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 0 (0x0)
"ConsentPromptBehaviorUser"= 0 (0x0)
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\windows]
"LoadAppInit_DLLs"=1 (0x1)
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\a.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\aAvgApi.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\AAWTray.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\About.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ackwin32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\Ad-Aware.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\adaware.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\advxdwin.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\AdwarePrj.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\agent.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\agentsvr.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\agentw.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\alertsvc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\alevir.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\alogserv.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\AlphaAV]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\AlphaAV.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\AluSchedulerSvc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\amon9x.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\anti-trojan.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\Anti-Virus Professional.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\AntispywarXP2009.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\antivirus.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\AntivirusPlus]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\AntivirusPlus.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\AntivirusPro_2010.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\AntivirusXP]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\AntivirusXP.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\antivirusxppro2009.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\AntiVirus_Pro.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ants.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\apimonitor.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\aplica32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\apvxdwin.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\arr.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ashAvast.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ashBug.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ashChest.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ashCnsnt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ashDisp.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ashLogV.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ashMaiSv.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ashPopWz.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ashQuick.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ashServ.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ashSimp2.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ashSimpl.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ashSkPcc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ashSkPck.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ashUpd.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ashWebSv.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\aswChLic.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\aswRegSvr.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\aswRunDll.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\aswUpdSv.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\atcon.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\atguard.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\atro55en.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\atupdater.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\atwatch.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\au.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\aupdate.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\auto-protect.nav80try.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\autodown.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\autotrace.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\autoupdate.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\av360.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avadmin.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avastSvc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avastUI.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\AVCare.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avcenter.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avciman.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avconfig.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avconsol.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ave32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\AVENGINE.EXE]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avgcc32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avgchk.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avgcmgr.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avgcsrvx.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avgctrl.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avgdumpx.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avgemc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avgiproxy.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avgnsx.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avgnt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avgrsx.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avgscanx.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avgserv.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avgserv9.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avgsrmax.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avgtray.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avguard.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avgui.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avgupd.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avgw.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avgwdsvc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avkpop.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avkserv.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avkservice.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avkwctl9.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avltmain.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avmailc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avmcdlg.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avnotify.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avnt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avp32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avpcc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avpdos32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avpm.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avptc32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avpupd.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avsched32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avshadow.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avsynmgr.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avupgsvc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\AVWEBGRD.EXE]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avwin.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avwin95.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avwinnt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avwsc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avwupd.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avwupd32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avwupsrv.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avxmonitor9x.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avxmonitornt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\avxquar.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\b.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\backweb.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\bargains.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\bdfvcl.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\bdfvwiz.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\BDInProcPatch.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\bdmcon.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\BDMsnScan.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\BDSurvey.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\bd_professional.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\beagle.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\belt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\bidef.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\bidserver.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\bipcp.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\bipcpevalsetup.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\bisp.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\blackd.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\blackice.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\blink.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\blss.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\bootconf.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\bootwarn.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\borg2.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\bpc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\brasil.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\brastk.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\brw.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\bs120.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\bspatch.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\bundle.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\bvt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\c.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cavscan.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ccapp.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ccevtmgr.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ccpxysvc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ccSvcHst.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cdp.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cfd.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cfgwiz.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cfiadmin.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cfiaudit.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cfinet.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cfinet32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cfp.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cfpconfg.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cfplogvw.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cfpupdat.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\claw95.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\claw95cf.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\clean.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cleaner.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cleaner3.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cleanIELow.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cleanpc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\click.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cmd32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cmdagent.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cmesys.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cmgrdian.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cmon016.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\connectionmonitor.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\control]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cpd.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cpf9x206.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cpfnt206.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\crashrep.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\csc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cssconfg.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cssupdat.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cssurf.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ctrl.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cv.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cwnb181.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\cwntdwmo.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\d.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\datemanager.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\dcomx.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\defalert.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\defscangui.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\defwatch.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\deloeminfs.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\deputy.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\divx.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\dllcache.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\dllreg.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\doors.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\dop.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\dpf.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\dpfsetup.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\dpps2.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\driverctrl.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\drwatson.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\drweb32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\drwebupw.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\dssagent.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\dvp95.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\dvp95_0.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ecengine.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\efpeadm.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\emsw.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ent.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\esafe.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\escanhnt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\escanv95.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\espwatch.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ethereal.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\etrustcipe.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\evpn.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\exantivirus-cnet.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\exe.avxw.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\expert.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\explore.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\f-agnt95.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\f-prot.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\f-prot95.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\f-stopw.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\fact.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\fameh32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\fast.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\fch32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\fih32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\findviru.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\firewall.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\fixcfg.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\fixfp.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\fnrb32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\fp-win.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\fp-win_trial.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\fprot.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\frmwrk32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\frw.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\fsaa.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\fsav.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\fsav32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\fsav530stbyb.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\fsav530wtbyb.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\fsav95.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\fsgk32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\fsm32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\fsma32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\fsmb32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\gator.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\gav.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\gbmenu.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\gbn976rl.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\gbpoll.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\generics.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\gmt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\guard.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\guarddog.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\guardgui.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\hacktracersetup.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\hbinst.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\hbsrv.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\History.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\homeav2010.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\hotactio.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\hotpatch.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\htlog.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\htpatch.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\hwpe.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\hxdl.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\hxiul.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\iamapp.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\iamserv.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\iamstats.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ibmasn.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ibmavsp.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\icload95.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\icloadnt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\icmon.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\icsupp95.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\icsuppnt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\Identity.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\idle.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\iedll.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\iedriver.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\IEShow.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\iface.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ifw2000.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\inetlnfo.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\infus.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\infwin.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\init.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\init32.exe ]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\install[1].exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\install[2].exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\install[3].exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\install[4].exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\install[5].exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\intdel.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\intren.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\iomon98.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\istsvc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\jammer.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\jdbgmrg.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\jedi.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\JsRcGen.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\kavlite40eng.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\kavpers40eng.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\kavpf.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\kazza.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\keenvalue.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\kerio-pf-213-en-win.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\kerio-wrl-421-en-win.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\kerio-wrp-421-en-win.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\killprocesssetup161.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ldnetmon.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ldpro.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ldpromenu.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ldscan.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\licmgr.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\lnetinfo.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\loader.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\localnet.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\lockdown.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\lockdown2000.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\lookout.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\lordpe.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\lsetup.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\luall.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\luau.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\lucomserver.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\luinit.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\luspt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\MalwareRemoval.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mapisvc32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mbam.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mbamgui.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mbamservice.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mcagent.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mcmnhdlr.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mcmpeng.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mcmscsvc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mcnasvc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mcproxy.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\McSACore.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mcshell.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mcshield.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mcsysmon.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mctool.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mcupdate.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mcvsrte.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mcvsshld.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\md.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mfin32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mfw2en.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mfweng3.02d30.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mgavrtcl.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mgavrte.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mghtml.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mgui.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\minilog.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mmod.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\monitor.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\moolive.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mostat.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mpfagent.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mpfservice.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\MPFSrv.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mpftray.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mrflux.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mrt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\msa.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\msapp.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\MSASCui.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\msbb.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\msblast.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mscache.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\msccn32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mscman.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\msconfig]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\msdm.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\msdos.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\msiexec16.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mslaugh.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\msmgt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\msmsgri32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\msseces.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mssmmc32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mssys.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\msvxd.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mu0311ad.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\mwatch.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\n32scanw.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\nav.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\navap.navapsvc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\navapsvc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\navapw32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\navdx.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\navlu32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\navnt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\navstub.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\navw32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\navwnt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\nc2000.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ncinst4.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ndd32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\neomonitor.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\neowatchlog.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\netarmor.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\netd32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\netinfo.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\netmon.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\netscanpro.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\netspyhunter-1.2.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\netutils.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\nisserv.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\nisum.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\nmain.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\nod32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\normist.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\norton_internet_secu_3.0_407.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\notstart.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\npf40_tw_98_nt_me_2k.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\npfmessenger.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\nprotect.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\npscheck.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\npssvc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\nsched32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\nssys32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\nstask32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\nsupdate.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\nt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ntrtscan.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ntvdm.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ntxconfig.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\nui.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\nupgrade.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\nvarch16.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\nvc95.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\nvsvc32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\nwinst4.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\nwservice.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\nwtool16.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\OAcat.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\OAhlp.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\OAReg.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\oasrv.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\oaui.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\oaview.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ODSW.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ollydbg.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\onsrvr.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\optimize.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ostronet.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\otfix.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\outpost.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\outpostinstall.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\outpostproinstall.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ozn695m5.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\padmin.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\panixk.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\patch.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pav.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pavcl.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\PavFnSvr.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pavproxy.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pavprsrv.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pavsched.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pavsrv51.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pavw.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pccwin98.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pcfwallicon.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pcip10117_0.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pcscan.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pctsAuxs.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pctsGui.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pctsSvc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pctsTray.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\PC_Antispyware2010.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pdfndr.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pdsetup.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\PerAvir.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\periscope.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\persfw.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\personalguard]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\personalguard.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\perswf.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pf2.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pfwadmin.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pgmonitr.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pingscan.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\platin.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pop3trap.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\poproxy.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\popscan.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\portdetective.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\portmonitor.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\powerscan.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ppinupdt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pptbc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ppvstop.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\prizesurfer.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\prmt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\prmvr.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\procdump.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\processmonitor.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\procexplorerv1.0.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\programauditor.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\proport.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\protector.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\protectx.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\PSANCU.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\PSANHost.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\PSANToManager.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\PsCtrls.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\PsImSvc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\PskSvc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\pspf.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\PSUNMain.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\purge.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\qconsole.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\qh.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\qserver.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\Quick Heal.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\QuickHealCleaner.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\rapapp.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\rav7.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\rav7win.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\rav8win32eng.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ray.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\rb32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\rcsync.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\realmon.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\reged.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\regedt32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\rescue.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\rescue32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\rrguard.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\rscdwld.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\rshell.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\rtvscan.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\rtvscn95.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\rulaunch.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\rwg]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\rwg.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\SafetyKeeper.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\safeweb.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\sahagent.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\Save.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\SaveArmor.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\SaveDefense.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\SaveKeep.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\savenow.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\sbserv.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\sc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\scam32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\scan32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\scan95.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\scanpm.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\scrscan.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\Secure Veteran.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\secureveteran.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\Security Center.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\SecurityFighter.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\securitysoldier.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\serv95.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\setloadorder.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\setupvameeval.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\setup_flowprotector_us.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\sgssfw32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\sh.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\shellspyinstall.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\shield.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\shn.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\showbehind.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\signcheck.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\smart.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\smartprotector.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\smc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\smrtdefp.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\sms.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\smss32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\snetcfg.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\soap.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\sofi.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\SoftSafeness.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\sperm.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\spf.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\sphinx.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\spoler.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\spoolcv.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\spoolsv32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\spywarexpguard.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\spyxx.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\srexe.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\srng.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ss3edit.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ssgrate.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\ssg_4104.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\st2.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\start.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\stcloader.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\supftrl.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\support.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\supporter5.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\svc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\svchostc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\svchosts.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\svshost.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\sweep95.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\sweepnet.sweepsrv.sys.swnetsup.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\symlcsvc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\symproxysvc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\symtray.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\system.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\system32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\sysupd.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\tapinstall.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\taumon.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\tbscan.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\tc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\tca.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\tcm.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\tds-3.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\tds2-98.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\tds2-nt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\teekids.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\tfak.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\tfak5.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\tgbob.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\titanin.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\titaninxp.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\TPSrv.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\trickler.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\trjscan.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\trjsetup.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\trojantrap3.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\TrustWarrior.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\tsadbot.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\tsc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\tvmd.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\tvtmd.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\undoboot.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\updat.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\upgrad.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\utpost.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vbcmserv.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vbcons.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vbust.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vbwin9x.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vbwinntw.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vcsetup.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vet32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vet95.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vettray.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vfsetup.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vir-help.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\virusmdpersonalfirewall.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\VisthAux.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\VisthLic.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\VisthUpd.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vnlan300.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vnpc3000.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vpc32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vpc42.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vpfw30s.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vptray.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vscan40.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vscenu6.02d30.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vsched.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vsecomr.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vshwin32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vsisetup.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vsmain.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vsmon.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vsstat.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vswin9xe.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vswinntse.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\vswinperse.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\w32dsm89.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\W3asbas.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\w9x.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\watchdog.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\webdav.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\WebProxy.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\webscanx.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\webtrap.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\wfindv32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\whoswatchingme.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\wimmun32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\win-bugsfix.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\win32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\win32us.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\winactive.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\winav.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\windll32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\window.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\windows Police Pro.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\windows.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\wininetd.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\wininitx.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\winlogin.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\winmain.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\winppr32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\winrecon.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\winservn.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\winssk32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\winstart.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\winstart001.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\wintsk32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\winupdate.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\wkufind.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\wnad.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\wnt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\wradmin.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\wrctrl.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\wsbgate.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\wscfxas.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\wscfxav.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\wscfxfw.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\wsctool.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\wupdater.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\wupdt.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\wyvernworksfirewall.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\xpdeluxe.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\xpf202en.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\xp_antispyware.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\zapro.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\zapsetup3001.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\zatutor.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\zonalm2601.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\zonealarm.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\_avp32.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\_avpcc.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\_avpm.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\~1.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\image file execution options\~2.exe]
"Debugger"=svchost.exe
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcmscsvc]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NanoServiceMain]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\PSUAService]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WudfSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001
"AntiVirusOverride"=dword:00000001
"FirewallDisableNotify"=dword:00000001
"FirewallOverride"=dword:00000001
"UpdatesDisableNotify"=dword:00000001
.
R2 0125141373386708mcinstcleanup;McAfee Application Installer Cleanup (0125141373386708);c:\windows\TEMP\012514~1.EXE;c:\windows\TEMP\012514~1.EXE [x]
.
.
--- Other Services/Drivers In Memory ---
.
*Deregistered* - mfeavfk01
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\svchost]
hpdevmgmt REG_MULTI_SZ    hpqcxs08 hpqddsvc
.
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Svchost  - NetSvcs
Themes
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\active setup\installed components\{10880D85-AAD9-4558-ABDC-2AB1552D831F}]
2007-08-23 23:34 451872 ----a-w- c:\program files (x86)\Common Files\LightScribe\LSRunOnce.exe
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2013-06-22 12:59 1165776 ----a-w- c:\program files (x86)\Google\Chrome\Application\27.0.1453.116\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2013-07-13 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-06-04 00:15]
.
2013-07-13 c:\windows\Tasks\BackupDutyLite.job
- c:\program files (x86)\BackUpDutyLite\BackUpDutyLite.exe [2012-01-04 16:53]
.
2013-01-20 c:\windows\Tasks\FileCure Default.job
- c:\program files (x86)\ParetoLogic\FileCure\FileCure.exe [2012-10-15 21:33]
.
2013-07-13 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-03-06 20:37]
.
2013-07-13 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-03-06 20:37]
.
2013-07-11 c:\windows\Tasks\ParetoLogic Registration3.job
- c:\windows\system32\rundll32.exe [2006-11-02 09:45]
.
2013-07-08 c:\windows\Tasks\SparkTrust Update Version3 Startup Task.job
- c:\program files (x86)\Common Files\SparkTrust\UUS3\Update3.exe [2013-06-25 23:04]
.
2013-07-08 c:\windows\Tasks\SparkTrust Update Version3.job
- c:\program files (x86)\Common Files\SparkTrust\UUS3\Update3.exe [2013-06-25 23:04]
.
2013-07-13 c:\windows\Tasks\TopArcadeHits.job
- c:\users\Admin\AppData\Local\TopArcadeHits\updater.exe [2013-07-13 03:21]
.
.
--------- X64 Entries -----------
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\GDriveBlacklistedOverlay]
@="{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D42}"
[HKEY_CLASSES_ROOT\CLSID\{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D42}]
2013-06-07 04:57 778192 ----a-w- c:\program files (x86)\Google\Drive\googledrivesync64.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\GDriveSharedEditOverlay]
@="{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D44}"
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\GDriveSharedOverlay]
@="{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D44}"
[HKEY_CLASSES_ROOT\CLSID\{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D44}]
2013-06-07 04:57 778192 ----a-w- c:\program files (x86)\Google\Drive\googledrivesync64.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\GDriveSharedEditOverlay]
@="{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D44}"
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\GDriveSharedOverlay]
@="{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D44}"
[HKEY_CLASSES_ROOT\CLSID\{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D44}]
2013-06-07 04:57 778192 ----a-w- c:\program files (x86)\Google\Drive\googledrivesync64.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\GDriveSharedViewOverlay]
@="{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D43}"
[HKEY_CLASSES_ROOT\CLSID\{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D43}]
2013-06-07 04:57 778192 ----a-w- c:\program files (x86)\Google\Drive\googledrivesync64.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\GDriveSyncedOverlay]
@="{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D40}"
[HKEY_CLASSES_ROOT\CLSID\{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D40}]
2013-06-07 04:57 778192 ----a-w- c:\program files (x86)\Google\Drive\googledrivesync64.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\GDriveSyncingOverlay]
@="{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D41}"
[HKEY_CLASSES_ROOT\CLSID\{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D41}]
2013-06-07 04:57 778192 ----a-w- c:\program files (x86)\Google\Drive\googledrivesync64.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2008-01-18 1220392]
"SMSERIAL"="c:\program files\Motorola\SMSERIAL\sm56hlpr.exe" [2007-01-17 833536]
"RtHDVCpl"="RAVCpl64.exe" [2007-03-09 5021696]
"IAAnotif"="c:\program files (x86)\Intel\Intel Matrix Storage Manager\iaanotif.exe" [2008-04-15 178712]
"OnScreenDisplay"="c:\program files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe" [2007-09-04 701440]
"HP Health Check Scheduler"="[ProgramFilesFolder]Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe" [BU]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2009-10-03 16395880]
.
------- Supplementary Scan -------
.
uStart Page = hxxp://search.conduit.com?SearchSource=10&CUI=UN46037587071843179&UM=2&ctid=CT3298570
uLocal Page = c:\windows\system32\blank.htm
mStart Page = hxxp://www.google.com
mDefault_Page_URL = hxxp://www.google.com
mLocal Page = c:\windows\SysWOW64\blank.htm
uSearchURL,(Default) = hxxp://search.yahoo.com/search?fr=mcafee&p=%s
IE: E&xport to Microsoft Excel - c:\progra~2\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.0.1
.
- - - - ORPHANS REMOVED - - - -
.
BHO-{878B8524-AED5-4870-9A96-A515440DAC75} - (no file)
AddRemove-Adobe Shockwave Player - c:\windows\system32\Adobe\Shockwave 11\uninstaller.exe
AddRemove-DefaultTab - c:\users\Admin\AppData\Roaming\DefaultTab\DefaultTab\uninstalldt.exe
AddRemove-Move Networks Player - IE - c:\users\Admin\AppData\Roaming\Move Networks\ie_bin\Uninst.exe
AddRemove-Zoom Downloader - c:\program files (x86)\Zoom Downloader\uninstall.exe
AddRemove-{9F817F09-5E09-4F08-907B-F1BB74801733} - c:\program files (x86)\SparkTrust\SparkTrust AntiVirus\uninstall.exe
AddRemove-{C1C441C4-57FA-4950-BDBA-BABFBAA2AA39} - c:\program files (x86)\ParetoLogic\FileCure\uninstall.exe
AddRemove-Applet - c:\windows\system32\javaws.exe
AddRemove-System Care Antivirus - c:\programdata\8ed1d9a4-02ff-0000-f65e-000067f5af7d\8ed1d9a4-02ff-0000-f65e-000067f5af7d.exe
.
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\Approved Extensions]
@Denied: (2) (LocalSystem)
"{EF99BD32-C1FB-11D2-892F-0090271D4F88}"=hex:51,66,7a,6c,4c,1d,38,12,5c,be,8a,
   eb,c9,8f,bc,54,f6,39,43,d0,22,43,0b,9c
"{0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064}"=hex:51,66,7a,6c,4c,1d,38,12,26,bd,a8,
   0a,e6,f4,22,0e,f1,4c,12,2a,bb,94,a4,70
"{8DCB7100-DF86-4384-8842-8FA844297B3F}"=hex:51,66,7a,6c,4c,1d,38,12,6e,72,d8,
   89,b4,91,ea,06,f7,54,cc,e8,41,77,3f,2b
"{D7E97865-918F-41E4-9CD0-25AB1C574CE8}"=hex:51,66,7a,6c,4c,1d,38,12,0b,7b,fa,
   d3,bd,df,8a,04,e3,c6,66,eb,19,09,08,fc
"{D4027C7F-154A-4066-A1AD-4243D8127440}"=hex:51,66,7a,6c,4c,1d,38,12,11,7f,11,
   d0,78,5b,08,05,de,bb,01,03,dd,4c,30,54
"{2318C2B1-4965-11D4-9B18-009027A5CD4F}"=hex:51,66,7a,6c,4c,1d,38,12,df,c1,0b,
   27,57,07,ba,54,e4,0e,43,d0,22,fb,89,5b
"{FA63398E-322B-4833-9AF3-15837AD12138}"=hex:51,66,7a,6c,4c,1d,38,12,e0,3a,70,
   fe,19,7c,5d,0d,e5,e5,56,c3,7f,8f,65,2c
"{02478D38-C3F9-4EFB-9B51-7695ECA05670}"=hex:51,66,7a,6c,4c,1d,38,12,56,8e,54,
   06,cb,8d,95,0b,e4,47,35,d5,e9,fe,12,64
"{0347C33E-8762-4905-BF09-768834316C61}"=hex:51,66,7a,6c,4c,1d,38,12,50,c0,54,
   07,50,c9,6b,0c,c0,1f,35,c8,31,6f,28,75
"{18DF081C-E8AD-4283-A596-FA578C2EBDC3}"=hex:51,66,7a,6c,4c,1d,38,12,72,0b,cc,
   1c,9f,a6,ed,07,da,80,b9,17,89,70,f9,d7
"{22BF413B-C6D2-4D91-82A9-A0F997BA588C}"=hex:51,66,7a,6c,4c,1d,38,12,55,42,ac,
   26,e0,88,ff,08,fd,bf,e3,b9,92,e4,1c,98
"{6F6A5334-78E9-4D9B-8182-8B41EA8C39EF}"=hex:51,66,7a,6c,4c,1d,38,12,5a,50,79,
   6b,db,36,f5,08,fe,94,c8,01,ef,d2,7d,fb
"{72853161-30C5-4D22-B7F9-0BBC1D38A37E}"=hex:51,66,7a,6c,4c,1d,38,12,0f,32,96,
   76,f7,7e,4c,08,c8,ef,48,fc,18,66,e7,6a
"{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}"=hex:51,66,7a,6c,4c,1d,38,12,d5,94,07,
   72,c2,98,42,03,c9,fd,97,9a,f4,87,69,57
"{7DB2D5A0-7241-4E79-B68D-6309F01C5231}"=hex:51,66,7a,6c,4c,1d,38,12,ce,d6,a1,
   79,73,3c,17,0b,c9,9b,20,49,f5,42,16,25
"{AA58ED58-01DD-4D91-8333-CF10577473F7}"=hex:51,66,7a,6c,4c,1d,38,12,36,ee,4b,
   ae,ef,4f,ff,08,fc,25,8c,50,52,2a,37,e3
"{B164E929-A1B6-4A06-B104-2CD0E90A88FF}"=hex:51,66,7a,6c,4c,1d,38,12,47,ea,77,
   b5,84,ef,68,0f,ce,12,6f,90,ec,54,cc,eb
"{D2CE3E00-F94A-4740-988E-03DC2F38C34F}"=hex:51,66,7a,6c,4c,1d,38,12,6e,3d,dd,
   d6,78,b7,2e,02,e7,98,40,9c,2a,66,87,5b
"{D3D233D5-9F6D-436C-B6C7-E63F77503B30}"=hex:51,66,7a,6c,4c,1d,38,12,bb,30,c1,
   d7,5f,d1,02,06,c9,d1,a5,7f,72,0e,7f,24
"{DBC80044-A445-435B-BC74-9C25C1C588A9}"=hex:51,66,7a,6c,4c,1d,38,12,2a,03,db,
   df,77,ea,35,06,c3,62,df,65,c4,9b,cc,bd
"{FFFFFFFF-CF4E-4F2B-BDC2-0E72E116A856}"=hex:51,66,7a,6c,4c,1d,38,12,91,fc,ec,
   fb,7c,81,45,0a,c2,d4,4d,32,e4,48,ec,42
"{2A541AE1-5BF6-4665-A8A3-CFA9672E4291}"=hex:51,66,7a,6c,4c,1d,38,12,8f,19,47,
   2e,c4,15,0b,03,d7,b5,8c,e9,62,70,06,85
"{555D4D79-4BD2-4094-A395-CFC534424A05}"=hex:51,66,7a,6c,4c,1d,38,12,17,4e,4e,
   51,e0,05,fa,05,dc,83,8c,85,31,1c,0e,11
"{FF059E31-CC5A-4E2E-BF3B-96E929D65503}"=hex:51,66,7a,6c,4c,1d,38,12,5f,9d,16,
   fb,68,82,40,0b,c0,2d,d5,a9,2c,88,11,17
"{BDEADE7F-C265-11D0-BCED-00A0C90AB50F}"=hex:51,66,7a,6c,4c,1d,38,12,11,dd,f9,
   b9,57,8c,be,54,c3,fb,43,e0,cc,54,f1,1b
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration]
@Denied: (2) (LocalSystem)
"Timestamp"=hex:1b,b0,cd,23,61,dd,cd,01
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_7_700_224_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_7_700_224_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_7_700_224_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_7_700_224_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Shockwave Flash Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_7_700_224.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
@="0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
@="ShockwaveFlash.ShockwaveFlash.11"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_7_700_224.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="ShockwaveFlash.ShockwaveFlash"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Macromedia Flash Factory Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_7_700_224.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
@="FlashFactory.FlashFactory.1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_7_700_224.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="FlashFactory.FlashFactory"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}]
@Denied: (A 2) (Everyone)
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\TypeLib\{D27CDB6B-AE6D-11CF-96B8-444553540000}\1.0]
@="Shockwave Flash"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}]
@Denied: (A 2) (Everyone)
@=""
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}\1.0]
@="FlashBroker"
.
[HKEY_LOCAL_MACHINE\software\McAfee]
"SymbolicLinkValue"=hex(6):5c,00,72,00,65,00,67,00,69,00,73,00,74,00,72,00,79,
   00,5c,00,6d,00,61,00,63,00,68,00,69,00,6e,00,65,00,5c,00,53,00,6f,00,66,00,\
.
[HKEY_LOCAL_MACHINE\software\Wow6432Node\Classes]
"SymbolicLinkValue"=hex(6):5c,00,52,00,45,00,47,00,49,00,53,00,54,00,52,00,59,
   00,5c,00,4d,00,41,00,43,00,48,00,49,00,4e,00,45,00,5c,00,53,00,4f,00,46,00,\
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
------------------------ Other Running Processes ------------------------
.
c:\program files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
c:\program files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
c:\program files (x86)\SearchProtect\bin\CltMngSvc.exe
c:\program files (x86)\Intel\Intel Matrix Storage Manager\IAANTMon.exe
c:\program files (x86)\Common Files\LightScribe\LSSrvc.exe
c:\program files (x86)\Panda Security\Panda Cloud Antivirus\PSUAService.exe
c:\program files (x86)\Hewlett-Packard\Shared\hpqwmiex.exe
c:\windows\SysWOW64\rundll32.exe
c:\program files (x86)\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe
c:\program files (x86)\Hewlett-Packard\Shared\HpqToaster.exe
c:\program files (x86)\HP\Digital Imaging\bin\hpqSTE08.exe
c:\program files (x86)\Common Files\Java\Java Update\jucheck.exe
.

**************************************************************************
.
Completion time: 2013-07-12  23:12:07 - machine was rebooted
ComboFix-quarantined-files.txt  2013-07-13 04:12
.
Pre-Run: 132,883,046,400 bytes free
Post-Run: 132,536,406,016 bytes free
.
- - End Of File - - 71FABC437D6B71032666DA5249B47962
1A1A06F62E891045814007163C1C76C3



#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:12:35 AM

Posted 13 July 2013 - 06:39 AM


Hello portergm

I would like you to try and run these next.

TDSSKiller

Please download the latest version of TDSSKiller from here and save it to your Desktop.
  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
  • Put a checkmark beside loaded modules.
  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.
  • Click the Start Scan button.
  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
  • If malicious objects are found, they will show in the Scan results
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
  • more than one report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". The one that I need is the larger one. Please copy and paste the contents of that file here.

    Note** this report can be very long - so if the website gives you an error saying it is to long you may attache it

    If the forum still complains about it being to long send me everything that is at the end of the report after where it says

    ==================
    Scan finished
    ==================
and I will see if I want to see the whole report

--RogueKiller--

Download & SAVE to your Desktop RogueKiller for 32bit or Roguekiller for 64bit
  • Quit all programs that you may have started.
  • Please disconnect any external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select "Run as Administrator to start"
  • For Windows XP, double-click to start.
  • Wait until Prescan has finished ...
  • Then Click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • click on "delete"
  • Wait until the Status box shows "Deleting Finished"
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • the scan will make two reports the one I would like to see is called RKreport[2].txt on your Desktop
  • Exit/Close RogueKiller+
send me the reports made from TDSSKiller and Roguekiller and also let me know how the computer is doing at this time.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 portergm

portergm
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:10:35 PM

Posted 14 July 2013 - 03:29 PM

Gringo,

 

I am having some problems trying to run TDSSKiller.exe.  When I startup in "normal mode", the cursor and keyboard on my infected computer freezes up.  This happens right after the desktop icons are displayed on the screen. I am also getting multiple error boxes stacked on top each other.  

 

The cursor problem has prevented me from loading TDSSKiller.exe to the desktop of the infected computer.  I downloaded the program to a flashdrive and tried running it on the infected computer in the "safe mode with networking'.  I am able to get through the first phase, but when the computer reboots it comes up in the "normal mode" and the TDSSKiller scan screen is displayed. However, the cursor is frozen and I am unable to click on "change perameters" or the "start scan" buttons. So I do not know if the full program scan was executed. However, there are four TDSSKiller reports on my C drive.  I have posted the largest one.

 

I will attempt to run the RougeKiller program and post its report in a subsequent post.

 

 

14:05:03.0154 1696  TDSS rootkit removing tool 2.8.16.0 Feb 11 2013 18:50:42
14:05:03.0668 1696  ============================================================
14:05:03.0668 1696  Current date / time: 2013/07/14 14:05:03.0668
14:05:03.0668 1696  SystemInfo:
14:05:03.0668 1696 
14:05:03.0668 1696  OS Version: 6.0.6002 ServicePack: 2.0
14:05:03.0668 1696  Product type: Workstation
14:05:03.0668 1696  ComputerName: ADMIN-PC
14:05:03.0684 1696  UserName: Admin
14:05:03.0684 1696  Windows directory: C:\Windows
14:05:03.0684 1696  System windows directory: C:\Windows
14:05:03.0684 1696  Running under WOW64
14:05:03.0684 1696  Processor architecture: Intel x64
14:05:03.0684 1696  Number of processors: 2
14:05:03.0684 1696  Page size: 0x1000
14:05:03.0684 1696  Boot type: Safe boot with network
14:05:03.0684 1696  ============================================================
14:05:04.0339 1696  Drive \Device\Harddisk0\DR0 - Size: 0x3A38B2E000 (232.89 Gb), SectorSize: 0x200, Cylinders: 0x76C1, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000040
14:05:04.0339 1696  Drive \Device\Harddisk1\DR1 - Size: 0x76D00000 (1.86 Gb), SectorSize: 0x200, Cylinders: 0xF2, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'W'
14:05:04.0339 1696  ============================================================
14:05:04.0339 1696  \Device\Harddisk0\DR0:
14:05:04.0339 1696  MBR partitions:
14:05:04.0339 1696  \Device\Harddisk0\DR0\Partition1: MBR, Type 0x7, StartLBA 0x3F, BlocksNum 0x1B7D0424
14:05:04.0339 1696  \Device\Harddisk0\DR0\Partition2: MBR, Type 0x7, StartLBA 0x1B7D0463, BlocksNum 0x19F411E
14:05:04.0339 1696  \Device\Harddisk1\DR1:
14:05:04.0339 1696  MBR partitions:
14:05:04.0339 1696  \Device\Harddisk1\DR1\Partition1: MBR, Type 0x6, StartLBA 0x3E0, BlocksNum 0x3B6420
14:05:04.0339 1696  ============================================================
14:05:04.0355 1696  C: <-> \Device\Harddisk0\DR0\Partition1
14:05:04.0402 1696  D: <-> \Device\Harddisk0\DR0\Partition2
14:05:04.0402 1696  ============================================================
14:05:04.0402 1696  Initialize success
14:05:04.0402 1696  ============================================================
14:05:22.0076 1392  ============================================================
14:05:22.0076 1392  Scan started
14:05:22.0076 1392  Mode: Manual;
14:05:22.0076 1392  ============================================================
14:05:22.0638 1392  ================ Scan system memory ========================
14:05:22.0638 1392  System memory - ok
14:05:22.0638 1392  ================ Scan services =============================
14:05:22.0810 1392  0125141373386708mcinstcleanup - ok
14:05:22.0966 1392  [ 1965AAFFAB07E3FB03C77F81BEBA3547 ] ACPI            C:\Windows\system32\drivers\acpi.sys
14:05:22.0966 1392  ACPI - ok
14:05:23.0122 1392  [ ADDA5E1951B90D3D23C56D3CF0622ADC ] AdobeARMservice C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
14:05:23.0122 1392  AdobeARMservice - ok
14:05:23.0262 1392  [ 9915504F602D277EE47FD843A677FD15 ] AdobeFlashPlayerUpdateSvc C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe
14:05:23.0340 1392  AdobeFlashPlayerUpdateSvc - ok
14:05:23.0434 1392  [ F14215E37CF124104575073F782111D2 ] adp94xx         C:\Windows\system32\drivers\adp94xx.sys
14:05:23.0434 1392  adp94xx - ok
14:05:23.0496 1392  [ 7D05A75E3066861A6610F7EE04FF085C ] adpahci         C:\Windows\system32\drivers\adpahci.sys
14:05:23.0496 1392  adpahci - ok
14:05:23.0527 1392  [ 820A201FE08A0C345B3BEDBC30E1A77C ] adpu160m        C:\Windows\system32\drivers\adpu160m.sys
14:05:23.0527 1392  adpu160m - ok
14:05:23.0574 1392  [ 9B4AB6854559DC168FBB4C24FC52E794 ] adpu320         C:\Windows\system32\drivers\adpu320.sys
14:05:23.0605 1392  adpu320 - ok
14:05:23.0668 1392  [ 0F421175574BFE0BF2F4D8E910A253BB ] AeLookupSvc     C:\Windows\System32\aelupsvc.dll
14:05:23.0668 1392  AeLookupSvc - ok
14:05:23.0746 1392  [ C4F6CE6087760AD70960C9EB130E7943 ] AFD             C:\Windows\system32\drivers\afd.sys
14:05:23.0761 1392  AFD - ok
14:05:23.0839 1392  [ F6F6793B7F17B550ECFDBD3B229173F7 ] agp440          C:\Windows\system32\drivers\agp440.sys
14:05:23.0839 1392  agp440 - ok
14:05:23.0886 1392  [ 222CB641B4B8A1D1126F8033F9FD6A00 ] aic78xx         C:\Windows\system32\drivers\djsvs.sys
14:05:23.0886 1392  aic78xx - ok
14:05:23.0917 1392  [ 5922F4F59B7868F3D74BBBBEB7B825A3 ] ALG             C:\Windows\System32\alg.exe
14:05:23.0917 1392  ALG - ok
14:05:23.0964 1392  [ 157D0898D4B73F075CE9FA26B482DF98 ] aliide          C:\Windows\system32\drivers\aliide.sys
14:05:23.0964 1392  aliide - ok
14:05:23.0980 1392  [ 970FA5059E61E30D25307B99903E991E ] amdide          C:\Windows\system32\drivers\amdide.sys
14:05:23.0980 1392  amdide - ok
14:05:24.0026 1392  [ CDC3632A3A5EA4DBB83E46076A3165A1 ] AmdK8           C:\Windows\system32\DRIVERS\amdk8.sys
14:05:24.0026 1392  AmdK8 - ok
14:05:24.0104 1392  [ 9C37B3FD5615477CB9A0CD116CF43F5C ] Appinfo         C:\Windows\System32\appinfo.dll
14:05:24.0104 1392  Appinfo - ok
14:05:24.0229 1392  [ 4FE5C6D40664AE07BE5105874357D2ED ] Apple Mobile Device C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
14:05:24.0229 1392  Apple Mobile Device - ok
14:05:24.0323 1392  [ BA8417D4765F3988FF921F30F630E303 ] arc             C:\Windows\system32\drivers\arc.sys
14:05:24.0323 1392  arc - ok
14:05:24.0370 1392  [ 9D41C435619733B34CC16A511E644B11 ] arcsas          C:\Windows\system32\drivers\arcsas.sys
14:05:24.0370 1392  arcsas - ok
14:05:24.0416 1392  [ 22D13FF3DAFEC2A80634752B1EAA2DE6 ] AsyncMac        C:\Windows\system32\DRIVERS\asyncmac.sys
14:05:24.0416 1392  AsyncMac - ok
14:05:24.0448 1392  [ E68D9B3A3905619732F7FE039466A623 ] atapi           C:\Windows\system32\drivers\atapi.sys
14:05:24.0448 1392  atapi - ok
14:05:24.0526 1392  [ 79318C744693EC983D20E9337A2F8196 ] AudioEndpointBuilder C:\Windows\System32\Audiosrv.dll
14:05:24.0526 1392  AudioEndpointBuilder - ok
14:05:24.0541 1392  [ 79318C744693EC983D20E9337A2F8196 ] AudioSrv        C:\Windows\System32\Audiosrv.dll
14:05:24.0541 1392  AudioSrv - ok
14:05:24.0619 1392  [ A2DC9FEB5466F8EAD9C06527EF464A05 ] avgtp           C:\Windows\system32\drivers\avgtpx64.sys
14:05:24.0619 1392  avgtp - ok
14:05:24.0713 1392  [ A2160C5D70F3517FC7356B689ABD6FCD ] BCM43XV         C:\Windows\system32\DRIVERS\bcmwl664.sys
14:05:24.0728 1392  BCM43XV - ok
14:05:24.0760 1392  Beep - ok
14:05:24.0853 1392  [ FFB96C2589FFA60473EAD78B39FBDE29 ] BFE             C:\Windows\System32\bfe.dll
14:05:24.0853 1392  BFE - ok
14:05:24.0962 1392  [ 6D316F4859634071CC25C4FD4589AD2C ] BITS            C:\Windows\system32\qmgr.dll
14:05:25.0040 1392  BITS - ok
14:05:25.0103 1392  [ 79FEEB40056683F8F61398D81DDA65D2 ] blbdrive        C:\Windows\system32\drivers\blbdrive.sys
14:05:25.0103 1392  blbdrive - ok
14:05:25.0150 1392  [ 2348447A80920B2493A9B582A23E81E1 ] bowser          C:\Windows\system32\DRIVERS\bowser.sys
14:05:25.0150 1392  bowser - ok
14:05:25.0212 1392  [ F09EEE9EDC320B5E1501F749FDE686C8 ] BrFiltLo        C:\Windows\system32\drivers\brfiltlo.sys
14:05:25.0212 1392  BrFiltLo - ok
14:05:25.0274 1392  [ B114D3098E9BDB8BEA8B053685831BE6 ] BrFiltUp        C:\Windows\system32\drivers\brfiltup.sys
14:05:25.0274 1392  BrFiltUp - ok
14:05:25.0352 1392  [ A1B39DE453433B115B4EA69EE0343816 ] Browser         C:\Windows\System32\browser.dll
14:05:25.0352 1392  Browser - ok
14:05:25.0399 1392  [ F0F0BA4D815BE446AA6A4583CA3BCA9B ] Brserid         C:\Windows\system32\drivers\brserid.sys
14:05:25.0415 1392  Brserid - ok
14:05:25.0446 1392  [ A6ECA2151B08A09CACECA35C07F05B42 ] BrSerWdm        C:\Windows\system32\drivers\brserwdm.sys
14:05:25.0446 1392  BrSerWdm - ok
14:05:25.0493 1392  [ B79968002C277E869CF38BD22CD61524 ] BrUsbMdm        C:\Windows\system32\drivers\brusbmdm.sys
14:05:25.0493 1392  BrUsbMdm - ok
14:05:25.0493 1392  [ A87528880231C54E75EA7A44943B38BF ] BrUsbSer        C:\Windows\system32\drivers\brusbser.sys
14:05:25.0493 1392  BrUsbSer - ok
14:05:25.0540 1392  [ E0777B34E05F8A82A21856EFC900C29F ] BTHMODEM        C:\Windows\system32\drivers\bthmodem.sys
14:05:25.0540 1392  BTHMODEM - ok
14:05:25.0586 1392  catchme - ok
14:05:25.0633 1392  [ B4D787DB8D30793A4D4DF9FEED18F136 ] cdfs            C:\Windows\system32\DRIVERS\cdfs.sys
14:05:25.0633 1392  cdfs - ok
14:05:25.0696 1392  [ C025AA69BE3D0D25C7A2E746EF6F94FC ] cdrom           C:\Windows\system32\DRIVERS\cdrom.sys
14:05:25.0696 1392  cdrom - ok
14:05:25.0758 1392  [ 5A268127633C7EE2A7FB87F39D748D56 ] CertPropSvc     C:\Windows\System32\certprop.dll
14:05:25.0758 1392  CertPropSvc - ok
14:05:25.0820 1392  [ E02C9CDB15F13DE4EB2FF67660E62317 ] cfwids          C:\Windows\system32\drivers\cfwids.sys
14:05:25.0852 1392  cfwids - ok
14:05:25.0883 1392  [ 02EA568D498BBDD4BA55BF3FCE34D456 ] circlass        C:\Windows\system32\drivers\circlass.sys
14:05:25.0898 1392  circlass - ok
14:05:25.0945 1392  [ 3DCA9A18B204939CFB24BEA53E31EB48 ] CLFS            C:\Windows\system32\CLFS.sys
14:05:25.0945 1392  CLFS - ok
14:05:26.0023 1392  [ 8EE772032E2FE80A924F3B8DD5082194 ] clr_optimization_v2.0.50727_32 C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
14:05:26.0023 1392  clr_optimization_v2.0.50727_32 - ok
14:05:26.0101 1392  [ CE07A466201096F021CD09D631B21540 ] clr_optimization_v2.0.50727_64 C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
14:05:26.0117 1392  clr_optimization_v2.0.50727_64 - ok
14:05:26.0288 1392  [ C5A75EB48E2344ABDC162BDA79E16841 ] clr_optimization_v4.0.30319_32 C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
14:05:26.0335 1392  clr_optimization_v4.0.30319_32 - ok
14:05:26.0413 1392  [ C6F9AF94DCD58122A4D7E89DB6BED29D ] clr_optimization_v4.0.30319_64 C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
14:05:26.0413 1392  clr_optimization_v4.0.30319_64 - ok
14:05:26.0476 1392  [ B52D9A14CE4101577900A364BA86F3DF ] CmBatt          C:\Windows\system32\DRIVERS\CmBatt.sys
14:05:26.0476 1392  CmBatt - ok
14:05:26.0522 1392  [ E5D5499A1C50A54B5161296B6AFE6192 ] cmdide          C:\Windows\system32\drivers\cmdide.sys
14:05:26.0522 1392  cmdide - ok
14:05:26.0632 1392  [ D8774ACE03B46C9B01A49818055F9AD4 ] Com4Qlb         C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch Buttons\Com4Qlb.exe
14:05:26.0632 1392  Com4Qlb - ok
14:05:26.0678 1392  [ 7FB8AD01DB0EABE60C8A861531A8F431 ] Compbatt        C:\Windows\system32\DRIVERS\compbatt.sys
14:05:26.0678 1392  Compbatt - ok
14:05:26.0678 1392  COMSysApp - ok
14:05:26.0725 1392  [ A8585B6412253803CE8EFCBD6D6DC15C ] crcdisk         C:\Windows\system32\drivers\crcdisk.sys
14:05:26.0725 1392  crcdisk - ok
14:05:26.0788 1392  [ 1B22BC0B71F65001479DAB792C3F626C ] CryptSvc        C:\Windows\system32\cryptsvc.dll
14:05:26.0803 1392  CryptSvc - ok
14:05:26.0866 1392  [ CF8B9A3A5E7DC57724A89D0C3E8CF9EF ] DcomLaunch      C:\Windows\system32\rpcss.dll
14:05:26.0881 1392  DcomLaunch - ok
14:05:26.0944 1392  [ 8B722BA35205C71E7951CDC4CDBADE19 ] DfsC            C:\Windows\system32\Drivers\dfsc.sys
14:05:26.0944 1392  DfsC - ok
14:05:27.0084 1392  [ C647F468F7DE343DF8C143655C5557D4 ] DFSR            C:\Windows\system32\DFSR.exe
14:05:27.0178 1392  DFSR - ok
14:05:27.0256 1392  [ 3ED0321127CE70ACDAABBF77E157C2A7 ] Dhcp            C:\Windows\System32\dhcpcsvc.dll
14:05:27.0256 1392  Dhcp - ok
14:05:27.0287 1392  [ B0107E40ECDB5FA692EBF832F295D905 ] disk            C:\Windows\system32\drivers\disk.sys
14:05:27.0287 1392  disk - ok
14:05:27.0349 1392  [ 06230F1B721494A6DF8D47FD395BB1B0 ] Dnscache        C:\Windows\System32\dnsrslvr.dll
14:05:27.0349 1392  Dnscache - ok
14:05:27.0380 1392  [ 1A7156DD1E850E9914E5E991E3225B94 ] dot3svc         C:\Windows\System32\dot3svc.dll
14:05:27.0380 1392  dot3svc - ok
14:05:27.0443 1392  [ 74C02B1717740C3B8039539E23E4B53F ] Dot4            C:\Windows\system32\DRIVERS\Dot4.sys
14:05:27.0443 1392  Dot4 - ok
14:05:27.0474 1392  [ 08321D1860235BF42CF2854234337AEA ] Dot4Print       C:\Windows\system32\DRIVERS\Dot4Prt.sys
14:05:27.0474 1392  Dot4Print - ok
14:05:27.0490 1392  [ 4ADCCF0124F2B6911D3786A5D0E779E5 ] dot4usb         C:\Windows\system32\DRIVERS\dot4usb.sys
14:05:27.0490 1392  dot4usb - ok
14:05:27.0552 1392  [ 1583B39790DB3EAEC7EDB0CB0140C708 ] DPS             C:\Windows\system32\dps.dll
14:05:27.0552 1392  DPS - ok
14:05:27.0614 1392  [ F1A78A98CFC2EE02144C6BEC945447E6 ] drmkaud         C:\Windows\system32\drivers\drmkaud.sys
14:05:27.0614 1392  drmkaud - ok
14:05:27.0677 1392  [ F3932288EEECD776FF1F9F653AD878F3 ] DXGKrnl         C:\Windows\System32\drivers\dxgkrnl.sys
14:05:27.0692 1392  DXGKrnl - ok
14:05:27.0739 1392  [ 264CEE7B031A9D6C827F3D0CB031F2FE ] E1G60           C:\Windows\system32\DRIVERS\E1G6032E.sys
14:05:27.0739 1392  E1G60 - ok
14:05:27.0802 1392  [ C2303883FD9BE49DC36A6400643002EA ] EapHost         C:\Windows\System32\eapsvc.dll
14:05:27.0802 1392  EapHost - ok
14:05:27.0864 1392  [ 5F94962BE5A62DB6E447FF6470C4F48A ] Ecache          C:\Windows\system32\drivers\ecache.sys
14:05:27.0880 1392  Ecache - ok
14:05:27.0958 1392  [ 14CE384D2E27B64C256BDA4DC39C312D ] ehRecvr         C:\Windows\ehome\ehRecvr.exe
14:05:27.0958 1392  ehRecvr - ok
14:05:27.0973 1392  [ B93159C1313D66FDFBBE876F5189CD52 ] ehSched         C:\Windows\ehome\ehsched.exe
14:05:27.0973 1392  ehSched - ok
14:05:27.0989 1392  [ F5EE2527D74449868E3C3227A59BCD28 ] ehstart         C:\Windows\ehome\ehstart.dll
14:05:27.0989 1392  ehstart - ok
14:05:28.0036 1392  [ C4636D6E10469404AB5308D9FD45ED07 ] elxstor         C:\Windows\system32\drivers\elxstor.sys
14:05:28.0036 1392  elxstor - ok
14:05:28.0082 1392  [ A9B18B63A4FD6BAAB83326706D857FAB ] EMDMgmt         C:\Windows\system32\emdmgmt.dll
14:05:28.0082 1392  EMDMgmt - ok
14:05:28.0129 1392  [ BC3A58E938BB277E46BF4B3003B01ABD ] ErrDev          C:\Windows\system32\drivers\errdev.sys
14:05:28.0129 1392  ErrDev - ok
14:05:28.0176 1392  [ E12F22B73F153DECE721CD45EC05B4AF ] EventSystem     C:\Windows\system32\es.dll
14:05:28.0192 1392  EventSystem - ok
14:05:28.0223 1392  [ 486844F47B6636044A42454614ED4523 ] exfat           C:\Windows\system32\drivers\exfat.sys
14:05:28.0238 1392  exfat - ok
14:05:28.0270 1392  [ 1A4BEE34277784619DDAF0422C0C6E23 ] fastfat         C:\Windows\system32\drivers\fastfat.sys
14:05:28.0270 1392  fastfat - ok
14:05:28.0301 1392  [ 81B79B6DF71FA1D2C6D688D830616E39 ] fdc             C:\Windows\system32\DRIVERS\fdc.sys
14:05:28.0316 1392  fdc - ok
14:05:28.0332 1392  [ BB9267ACACD8B7533DD936C34A0CBA5E ] fdPHost         C:\Windows\system32\fdPHost.dll
14:05:28.0332 1392  fdPHost - ok
14:05:28.0348 1392  [ 300C80931EABBE1DB7591C516EFE8D0F ] FDResPub        C:\Windows\system32\fdrespub.dll
14:05:28.0348 1392  FDResPub - ok
14:05:28.0363 1392  [ 457B7D1D533E4BD62A99AED9C7BB4C59 ] FileInfo        C:\Windows\system32\drivers\fileinfo.sys
14:05:28.0363 1392  FileInfo - ok
14:05:28.0379 1392  [ D421327FD6EFCCAF884A54C58E1B0D7F ] Filetrace       C:\Windows\system32\drivers\filetrace.sys
14:05:28.0394 1392  Filetrace - ok
14:05:28.0410 1392  [ 230923EA2B80F79B0F88D90F87B87EBD ] flpydisk        C:\Windows\system32\DRIVERS\flpydisk.sys
14:05:28.0410 1392  flpydisk - ok
14:05:28.0441 1392  [ E3041BC26D6930D61F42AEDB79C91720 ] FltMgr          C:\Windows\system32\drivers\fltmgr.sys
14:05:28.0441 1392  FltMgr - ok
14:05:28.0566 1392  [ F20A97F51C104DD0A163251325460747 ] FontCache       C:\Windows\system32\FntCache.dll
14:05:28.0582 1392  FontCache - ok
14:05:28.0644 1392  [ BC5B0BE5AF3510B0FD8C140EE42C6D3E ] FontCache3.0.0.0 C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe
14:05:28.0644 1392  FontCache3.0.0.0 - ok
14:05:28.0691 1392  [ 5779B86CD8B32519FBECB136394D946A ] Fs_Rec          C:\Windows\system32\drivers\Fs_Rec.sys
14:05:28.0691 1392  Fs_Rec - ok
14:05:28.0738 1392  [ C8E416668D3DC2BE3D4FE4C79224997F ] gagp30kx        C:\Windows\system32\drivers\gagp30kx.sys
14:05:28.0738 1392  gagp30kx - ok
14:05:28.0800 1392  [ 8E98D21EE06192492A5671A6144D092F ] GEARAspiWDM     C:\Windows\system32\DRIVERS\GEARAspiWDM.sys
14:05:28.0800 1392  GEARAspiWDM - ok
14:05:28.0847 1392  [ A0E1B575BA8F504968CD40C0FAEB2384 ] gpsvc           C:\Windows\System32\gpsvc.dll
14:05:28.0862 1392  gpsvc - ok
14:05:28.0909 1392  [ F02A533F517EB38333CB12A9E8963773 ] gupdate         C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
14:05:28.0909 1392  gupdate - ok
14:05:28.0909 1392  [ F02A533F517EB38333CB12A9E8963773 ] gupdatem        C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
14:05:28.0909 1392  gupdatem - ok
14:05:28.0987 1392  [ 5D4BC124FAAE6730AC002CDB67BF1A1C ] gusvc           C:\Program Files (x86)\Google\Common\Google Updater\GoogleUpdaterService.exe
14:05:28.0987 1392  gusvc - ok
14:05:29.0065 1392  [ DF45F8142DC6DF9D18C39B3EFFBD0409 ] HdAudAddService C:\Windows\system32\drivers\HdAudio.sys
14:05:29.0081 1392  HdAudAddService - ok
14:05:29.0128 1392  [ F942C5820205F2FB453243EDFEC82A3D ] HDAudBus        C:\Windows\system32\DRIVERS\HDAudBus.sys
14:05:29.0143 1392  HDAudBus - ok
14:05:29.0174 1392  [ B4881C84A180E75B8C25DC1D726C375F ] HidBth          C:\Windows\system32\drivers\hidbth.sys
14:05:29.0174 1392  HidBth - ok
14:05:29.0190 1392  [ 4E77A77E2C986E8F88F996BB3E1AD829 ] HidIr           C:\Windows\system32\drivers\hidir.sys
14:05:29.0190 1392  HidIr - ok
14:05:29.0221 1392  [ 59361D38A297755D46A540E450202B2A ] hidserv         C:\Windows\System32\hidserv.dll
14:05:29.0221 1392  hidserv - ok
14:05:29.0237 1392  [ 443BDD2D30BB4F00795C797E2CF99EDF ] HidUsb          C:\Windows\system32\DRIVERS\hidusb.sys
14:05:29.0237 1392  HidUsb - ok
14:05:29.0284 1392  [ B12F367EA39C0795FD57E31242CE1A5A ] hkmsvc          C:\Windows\system32\kmsvc.dll
14:05:29.0284 1392  hkmsvc - ok
14:05:29.0377 1392  [ 89F9E1984C1CD9E5F4FE39642D886E11 ] HP Health Check Service c:\Program Files (x86)\Hewlett-Packard\HP Health Check\hphc_service.exe
14:05:29.0377 1392  HP Health Check Service - ok
14:05:29.0440 1392  [ D7109A1E6BD2DFDBCBA72A6BC626A13B ] HpCISSs         C:\Windows\system32\drivers\hpcisss.sys
14:05:29.0440 1392  HpCISSs - ok
14:05:29.0518 1392  [ AF81F7BA6A09119006FE041A2F2F3ECE ] hpqcxs08        C:\Program Files (x86)\HP\Digital Imaging\bin\hpqcxs08.dll
14:05:29.0518 1392  hpqcxs08 - ok
14:05:29.0549 1392  [ 7244F63DB8EA883B3DC8E730C645D073 ] hpqddsvc        C:\Program Files (x86)\HP\Digital Imaging\bin\hpqddsvc.dll
14:05:29.0549 1392  hpqddsvc - ok
14:05:29.0580 1392  [ 0ECC54FD34D6A089C300846B011E81D6 ] HpqKbFiltr      C:\Windows\system32\DRIVERS\HpqKbFiltr.sys
14:05:29.0580 1392  HpqKbFiltr - ok
14:05:29.0611 1392  [ E53D53D66D61794AF8160741946D0B43 ] HpqRemHid       C:\Windows\system32\DRIVERS\HpqRemHid.sys
14:05:29.0611 1392  HpqRemHid - ok
14:05:29.0642 1392  [ 04C1DCBB226C6AE647B794833CE3CEB6 ] hpqwmiex        C:\Program Files (x86)\Hewlett-Packard\Shared\hpqwmiex.exe
14:05:29.0642 1392  hpqwmiex - ok
14:05:29.0720 1392  [ 57BA73B5B321291E5114CB21350E1EA0 ] HSFHWAZL        C:\Windows\system32\DRIVERS\VSTAZL6.SYS
14:05:29.0736 1392  HSFHWAZL - ok
14:05:29.0798 1392  [ E6CD7F641916484B0141D191A390D866 ] HSF_DPV         C:\Windows\system32\DRIVERS\VSTDPV6.SYS
14:05:29.0814 1392  HSF_DPV - ok
14:05:29.0861 1392  [ 098F1E4E5C9CB5B0063A959063631610 ] HTTP            C:\Windows\system32\drivers\HTTP.sys
14:05:29.0876 1392  HTTP - ok
14:05:29.0908 1392  [ DA94C854CEA5FAC549D4E1F6E88349E8 ] i2omp           C:\Windows\system32\drivers\i2omp.sys
14:05:29.0908 1392  i2omp - ok
14:05:29.0954 1392  [ CBB597659A2713CE0C9CC20C88C7591F ] i8042prt        C:\Windows\system32\DRIVERS\i8042prt.sys
14:05:29.0954 1392  i8042prt - ok
14:05:30.0017 1392  [ CB686F44BF955EA02520710A56874FA4 ] IAANTMON        C:\Program Files (x86)\Intel\Intel Matrix Storage Manager\IAANTMon.exe
14:05:30.0017 1392  IAANTMON - ok
14:05:30.0048 1392  [ 8D58627FEF3F8767665D9F4DC91CBD97 ] iaStor          C:\Windows\system32\DRIVERS\iaStor.sys
14:05:30.0064 1392  iaStor - ok
14:05:30.0079 1392  [ 3E3BF3627D886736D0B4E90054F929F6 ] iaStorV         C:\Windows\system32\drivers\iastorv.sys
14:05:30.0079 1392  iaStorV - ok
14:05:30.0142 1392  [ 1CF03C69B49ACB70C722DF92755C0C8C ] IDriverT        C:\Program Files (x86)\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
14:05:30.0142 1392  IDriverT - ok
14:05:30.0235 1392  [ 749F5F8CEDCA70F2A512945325FC489D ] idsvc           C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\infocard.exe
14:05:30.0235 1392  idsvc - ok
14:05:30.0282 1392  [ 8C3951AD2FE886EF76C7B5027C3125D3 ] iirsp           C:\Windows\system32\drivers\iirsp.sys
14:05:30.0282 1392  iirsp - ok
14:05:30.0329 1392  [ 0C9EA6E654E7B0471741E343A6C671AF ] IKEEXT          C:\Windows\System32\ikeext.dll
14:05:30.0329 1392  IKEEXT - ok
14:05:30.0422 1392  [ 0EBB3E69DFF70FAF80C4BC83ADCB9D5F ] IntcAzAudAddService C:\Windows\system32\drivers\RTKVHD64.sys
14:05:30.0438 1392  IntcAzAudAddService - ok
14:05:30.0454 1392  [ DF797A12176F11B2D301C5B234BB200E ] intelide        C:\Windows\system32\drivers\intelide.sys
14:05:30.0469 1392  intelide - ok
14:05:30.0485 1392  [ BFD84AF32FA1BAD6231C4585CB469630 ] intelppm        C:\Windows\system32\DRIVERS\intelppm.sys
14:05:30.0485 1392  intelppm - ok
14:05:30.0516 1392  [ 5624BC1BC5EEB49C0AB76A8114F05EA3 ] IPBusEnum       C:\Windows\system32\ipbusenum.dll
14:05:30.0516 1392  IPBusEnum - ok
14:05:30.0563 1392  [ D8AABC341311E4780D6FCE8C73C0AD81 ] IpFilterDriver  C:\Windows\system32\DRIVERS\ipfltdrv.sys
14:05:30.0563 1392  IpFilterDriver - ok
14:05:30.0610 1392  [ BF0DBFA9792C5C14FA00F61C75116C1B ] iphlpsvc        C:\Windows\System32\iphlpsvc.dll
14:05:30.0610 1392  iphlpsvc - ok
14:05:30.0625 1392  IpInIp - ok
14:05:30.0641 1392  [ 9C2EE2E6E5A7203BFAE15C299475EC67 ] IPMIDRV         C:\Windows\system32\drivers\ipmidrv.sys
14:05:30.0641 1392  IPMIDRV - ok
14:05:30.0672 1392  [ B7E6212F581EA5F6AB0C3A6CEEEB89BE ] IPNAT           C:\Windows\system32\DRIVERS\ipnat.sys
14:05:30.0688 1392  IPNAT - ok
14:05:30.0781 1392  [ 2872B90D57C8310194A78A9787406467 ] iPod Service    C:\Program Files\iPod\bin\iPodService.exe
14:05:30.0781 1392  iPod Service - ok
14:05:30.0797 1392  [ 8C42CA155343A2F11D29FECA67FAA88D ] IRENUM          C:\Windows\system32\drivers\irenum.sys
14:05:30.0812 1392  IRENUM - ok
14:05:30.0859 1392  [ 0672BFCEDC6FC468A2B0500D81437F4F ] isapnp          C:\Windows\system32\drivers\isapnp.sys
14:05:30.0859 1392  isapnp - ok
14:05:30.0937 1392  [ E4FDF99599F27EC25D2CF6D754243520 ] iScsiPrt        C:\Windows\system32\DRIVERS\msiscsi.sys
14:05:30.0937 1392  iScsiPrt - ok
14:05:30.0968 1392  [ 63C766CDC609FF8206CB447A65ABBA4A ] iteatapi        C:\Windows\system32\drivers\iteatapi.sys
14:05:30.0968 1392  iteatapi - ok
14:05:31.0015 1392  [ 1281FE73B17664631D12F643CBEA3F59 ] iteraid         C:\Windows\system32\drivers\iteraid.sys
14:05:31.0015 1392  iteraid - ok
14:05:31.0031 1392  [ 423696F3BA6472DD17699209B933BC26 ] kbdclass        C:\Windows\system32\DRIVERS\kbdclass.sys
14:05:31.0031 1392  kbdclass - ok
14:05:31.0062 1392  [ DBDF75D51464FBC47D0104EC3D572C05 ] kbdhid          C:\Windows\system32\DRIVERS\kbdhid.sys
14:05:31.0062 1392  kbdhid - ok
14:05:31.0093 1392  [ 260BF9C43EE12C6898A9F5AAB0FB0E5D ] KeyIso          C:\Windows\system32\lsass.exe
14:05:31.0093 1392  KeyIso - ok
14:05:31.0140 1392  [ 88956AD9FA510848AD176777A6C6C1F5 ] KSecDD          C:\Windows\system32\Drivers\ksecdd.sys
14:05:31.0156 1392  KSecDD - ok
14:05:31.0202 1392  [ 1D419CF43DB29396ECD7113D129D94EB ] ksthunk         C:\Windows\system32\drivers\ksthunk.sys
14:05:31.0202 1392  ksthunk - ok
14:05:31.0265 1392  [ 1FAF6926F3416D3DA05C5B265491BDAE ] KtmRm           C:\Windows\system32\msdtckrm.dll
14:05:31.0280 1392  KtmRm - ok
14:05:31.0343 1392  [ 50C7A3CB427E9BB5ED0708A669956AB5 ] LanmanServer    C:\Windows\System32\srvsvc.dll
14:05:31.0374 1392  LanmanServer - ok
14:05:31.0436 1392  [ CAF86FC1388BE1E470F1A7B43E348ADB ] LanmanWorkstation C:\Windows\System32\wkssvc.dll
14:05:31.0452 1392  LanmanWorkstation - ok
14:05:31.0530 1392  [ 53710476495886D9961BE46983A6A33F ] LightScribeService C:\Program Files (x86)\Common Files\LightScribe\LSSrvc.exe
14:05:31.0530 1392  LightScribeService - ok
14:05:31.0546 1392  [ 96ECE2659B6654C10A0C310AE3A6D02C ] lltdio          C:\Windows\system32\DRIVERS\lltdio.sys
14:05:31.0546 1392  lltdio - ok
14:05:31.0592 1392  [ 961CCBD0B1CCB5675D64976FAE37D092 ] lltdsvc         C:\Windows\System32\lltdsvc.dll
14:05:31.0592 1392  lltdsvc - ok
14:05:31.0608 1392  [ A47F8080CACC23C91FE823AD19AA5612 ] lmhosts         C:\Windows\System32\lmhsvc.dll
14:05:31.0608 1392  lmhosts - ok
14:05:31.0655 1392  [ ACBE1AF32D3123E330A07BFBC5EC4A9B ] LSI_FC          C:\Windows\system32\drivers\lsi_fc.sys
14:05:31.0655 1392  LSI_FC - ok
14:05:31.0670 1392  [ 799FFB2FC4729FA46D2157C0065B3525 ] LSI_SAS         C:\Windows\system32\drivers\lsi_sas.sys
14:05:31.0686 1392  LSI_SAS - ok
14:05:31.0702 1392  [ F445FF1DAAD8A226366BFAF42551226B ] LSI_SCSI        C:\Windows\system32\drivers\lsi_scsi.sys
14:05:31.0702 1392  LSI_SCSI - ok
14:05:31.0748 1392  [ 52F87B9CC8932C2A7375C3B2A9BE5E3E ] luafv           C:\Windows\system32\drivers\luafv.sys
14:05:31.0748 1392  luafv - ok
14:05:31.0858 1392  [ 0F8FE97E6B8F4566518469A1A9738C6D ] McAfee SiteAdvisor Service C:\Program Files (x86)\McAfee\SiteAdvisor\McSACore.exe
14:05:31.0858 1392  McAfee SiteAdvisor Service - ok
14:05:32.0014 1392  [ DDCC236009C707761D60E5C76D639176 ] McComponentHostService C:\Program Files (x86)\McAfee Security Scan\3.0.318\McCHSvc.exe
14:05:32.0014 1392  McComponentHostService - ok
14:05:32.0107 1392  [ 458A013DF72EAAB91877FA03533E2C8B ] McMPFSvc        C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe
14:05:32.0123 1392  McMPFSvc - ok
14:05:32.0138 1392  [ 458A013DF72EAAB91877FA03533E2C8B ] mcmscsvc        C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe
14:05:32.0154 1392  mcmscsvc - ok
14:05:32.0154 1392  [ 458A013DF72EAAB91877FA03533E2C8B ] McNaiAnn        C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe
14:05:32.0154 1392  McNaiAnn - ok
14:05:32.0170 1392  [ 458A013DF72EAAB91877FA03533E2C8B ] McNASvc         C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe
14:05:32.0170 1392  McNASvc - ok
14:05:32.0248 1392  [ 3809B77EB1734CD5FB317425F188ABC1 ] McODS           C:\Program Files\McAfee\VirusScan\mcods.exe
14:05:32.0248 1392  McODS - ok
14:05:32.0263 1392  [ 458A013DF72EAAB91877FA03533E2C8B ] McProxy         C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe
14:05:32.0263 1392  McProxy - ok
14:05:32.0294 1392  [ 461EABB62F1827B965F508092160EDDC ] McShield        C:\Program Files\Common Files\McAfee\SystemCore\\mcshield.exe
14:05:32.0294 1392  McShield - ok
14:05:32.0310 1392  [ 76A58DF02BD4EA29F189B82D0BEF17F8 ] Mcx2Svc         C:\Windows\system32\Mcx2Svc.dll
14:05:32.0326 1392  Mcx2Svc - ok
14:05:32.0388 1392  [ 5C5CD6AACED32FB26C3FB34B3DCF972F ] megasas         C:\Windows\system32\drivers\megasas.sys
14:05:32.0388 1392  megasas - ok
14:05:32.0435 1392  [ 859BC2436B076C77C159ED694ACFE8F8 ] MegaSR          C:\Windows\system32\drivers\megasr.sys
14:05:32.0435 1392  MegaSR - ok
14:05:32.0497 1392  [ C1556CA9695FCD6BBD23D75D402FD43D ] mfeapfk         C:\Windows\system32\drivers\mfeapfk.sys
14:05:32.0497 1392  mfeapfk - ok
14:05:32.0513 1392  [ 8857EE8B49F3338FC1FAD476BFCCA146 ] mfeavfk         C:\Windows\system32\drivers\mfeavfk.sys
14:05:32.0513 1392  mfeavfk - ok
14:05:32.0544 1392  [ DD92E94E265864306377F091B100D0D0 ] mfefire         C:\Program Files\Common Files\McAfee\SystemCore\\mfefire.exe
14:05:32.0544 1392  mfefire - ok
14:05:32.0622 1392  [ 19C44295F6BF085C83352D48397F7870 ] mfefirek        C:\Windows\system32\drivers\mfefirek.sys
14:05:32.0622 1392  mfefirek - ok
14:05:32.0669 1392  [ 5F915E20AB56121C41C6BF9A91A83BDA ] mfehidk         C:\Windows\system32\drivers\mfehidk.sys
14:05:32.0669 1392  mfehidk - ok
14:05:32.0700 1392  [ 23AE332E32FF615CA5E5224C8D91AF11 ] mfenlfk         C:\Windows\system32\DRIVERS\mfenlfk.sys
14:05:32.0700 1392  mfenlfk - ok
14:05:32.0731 1392  [ 9C7A9273E345F8D653394B5C542BF86A ] mferkdet        C:\Windows\system32\drivers\mferkdet.sys
14:05:32.0731 1392  mferkdet - ok
14:05:32.0762 1392  [ AECD0C9ABDFDC61BE31163B624C4170F ] mfevtp          C:\Windows\system32\mfevtps.exe
14:05:32.0762 1392  mfevtp - ok
14:05:32.0794 1392  [ 3140B2C56D7119BA314F68FC785683F0 ] mfewfpk         C:\Windows\system32\drivers\mfewfpk.sys
14:05:32.0794 1392  mfewfpk - ok
14:05:32.0918 1392  [ 123271BD5237AB991DC5C21FDF8835EB ] Microsoft Office Groove Audit Service C:\Program Files (x86)\Microsoft Office\Office12\GrooveAuditService.exe
14:05:32.0934 1392  Microsoft Office Groove Audit Service - ok
14:05:32.0965 1392  [ 3CBE4995E80E13CCFBC42E5DCF3AC81A ] MMCSS           C:\Windows\system32\mmcss.dll
14:05:32.0965 1392  MMCSS - ok
14:05:32.0965 1392  [ 59848D5CC74606F0EE7557983BB73C2E ] Modem           C:\Windows\system32\drivers\modem.sys
14:05:32.0965 1392  Modem - ok
14:05:32.0996 1392  [ C247CC2A57E0A0C8C6DCCF7807B3E9E5 ] monitor         C:\Windows\system32\DRIVERS\monitor.sys
14:05:32.0996 1392  monitor - ok
14:05:33.0028 1392  [ 9367304E5E412B120CF5F4EA14E4E4F1 ] mouclass        C:\Windows\system32\DRIVERS\mouclass.sys
14:05:33.0028 1392  mouclass - ok
14:05:33.0074 1392  [ C2C2BD5C5CE5AAF786DDD74B75D2AC69 ] mouhid          C:\Windows\system32\DRIVERS\mouhid.sys
14:05:33.0074 1392  mouhid - ok
14:05:33.0090 1392  [ 11BC9B1E8801B01F7F6ADB9EAD30019B ] MountMgr        C:\Windows\system32\drivers\mountmgr.sys
14:05:33.0090 1392  MountMgr - ok
14:05:33.0121 1392  [ F8276EB8698142884498A528DFEA8478 ] mpio            C:\Windows\system32\drivers\mpio.sys
14:05:33.0121 1392  mpio - ok
14:05:33.0152 1392  [ C92B9ABDB65A5991E00C28F13491DBA2 ] mpsdrv          C:\Windows\system32\drivers\mpsdrv.sys
14:05:33.0152 1392  mpsdrv - ok
14:05:33.0230 1392  [ 897E3BAF68BA406A61682AE39C83900C ] MpsSvc          C:\Windows\system32\mpssvc.dll
14:05:33.0246 1392  MpsSvc - ok
14:05:33.0277 1392  [ 3C200630A89EF2C0864D515B7A75802E ] Mraid35x        C:\Windows\system32\drivers\mraid35x.sys
14:05:33.0277 1392  Mraid35x - ok
14:05:33.0308 1392  [ 7C1DE4AA96DC0C071611F9E7DE02A68D ] MRxDAV          C:\Windows\system32\drivers\mrxdav.sys
14:05:33.0308 1392  MRxDAV - ok
14:05:33.0371 1392  [ 1485811B320FF8C7EDAD1CAEBB1C6C2B ] mrxsmb          C:\Windows\system32\DRIVERS\mrxsmb.sys
14:05:33.0371 1392  mrxsmb - ok
14:05:33.0433 1392  [ 3B929A60C833FC615FD97FBA82BC7632 ] mrxsmb10        C:\Windows\system32\DRIVERS\mrxsmb10.sys
14:05:33.0449 1392  mrxsmb10 - ok
14:05:33.0464 1392  [ C64AB3E1F53B4F5B5BB6D796B2D7BEC3 ] mrxsmb20        C:\Windows\system32\DRIVERS\mrxsmb20.sys
14:05:33.0464 1392  mrxsmb20 - ok
14:05:33.0527 1392  [ 1AC860612B85D8E85EE257D372E39F4D ] msahci          C:\Windows\system32\drivers\msahci.sys
14:05:33.0527 1392  msahci - ok
14:05:33.0542 1392  [ 264BBB4AAF312A485F0E44B65A6B7202 ] msdsm           C:\Windows\system32\drivers\msdsm.sys
14:05:33.0558 1392  msdsm - ok
14:05:33.0574 1392  [ 7EC02CE772F068ED0BEAFA3DA341A9BC ] MSDTC           C:\Windows\System32\msdtc.exe
14:05:33.0574 1392  MSDTC - ok
14:05:33.0589 1392  [ 704F59BFC4512D2BB0146AEC31B10A7C ] Msfs            C:\Windows\system32\drivers\Msfs.sys
14:05:33.0589 1392  Msfs - ok
14:05:33.0605 1392  [ 00EBC952961664780D43DCA157E79B27 ] msisadrv        C:\Windows\system32\drivers\msisadrv.sys
14:05:33.0620 1392  msisadrv - ok
14:05:33.0667 1392  [ 366B0C1F4478B519C181E37D43DCDA32 ] MSiSCSI         C:\Windows\system32\iscsiexe.dll
14:05:33.0667 1392  MSiSCSI - ok
14:05:33.0683 1392  msiserver - ok
14:05:33.0745 1392  [ 0EA73E498F53B96D83DBFCA074AD4CF8 ] MSKSSRV         C:\Windows\system32\drivers\MSKSSRV.sys
14:05:33.0745 1392  MSKSSRV - ok
14:05:33.0761 1392  [ 52E59B7E992A58E740AA63F57EDBAE8B ] MSPCLOCK        C:\Windows\system32\drivers\MSPCLOCK.sys
14:05:33.0761 1392  MSPCLOCK - ok
14:05:33.0776 1392  [ 49084A75BAE043AE02D5B44D02991BB2 ] MSPQM           C:\Windows\system32\drivers\MSPQM.sys
14:05:33.0776 1392  MSPQM - ok
14:05:33.0823 1392  [ DC6CCF440CDEDE4293DB41C37A5060A5 ] MsRPC           C:\Windows\system32\drivers\MsRPC.sys
14:05:33.0823 1392  MsRPC - ok
14:05:33.0839 1392  [ 855796E59DF77EA93AF46F20155BF55B ] mssmbios        C:\Windows\system32\DRIVERS\mssmbios.sys
14:05:33.0839 1392  mssmbios - ok
14:05:33.0854 1392  [ 86D632D75D05D5B7C7C043FA3564AE86 ] MSTEE           C:\Windows\system32\drivers\MSTEE.sys
14:05:33.0854 1392  MSTEE - ok
14:05:33.0870 1392  [ 0CC49F78D8ACA0877D885F149084E543 ] Mup             C:\Windows\system32\Drivers\mup.sys
14:05:33.0870 1392  Mup - ok
14:05:33.0917 1392  [ A5B10C845E7538C60C0F5D87A57CB3F5 ] napagent        C:\Windows\system32\qagentRT.dll
14:05:33.0917 1392  napagent - ok
14:05:33.0979 1392  [ 2007B826C4ACD94AE32232B41F0842B9 ] NativeWifiP     C:\Windows\system32\DRIVERS\nwifi.sys
14:05:33.0995 1392  NativeWifiP - ok
14:05:34.0026 1392  [ 65950E07329FCEE8E6516B17C8D0ABB6 ] NDIS            C:\Windows\system32\drivers\ndis.sys
14:05:34.0042 1392  NDIS - ok
14:05:34.0073 1392  [ 64DF698A425478E321981431AC171334 ] NdisTapi        C:\Windows\system32\DRIVERS\ndistapi.sys
14:05:34.0073 1392  NdisTapi - ok
14:05:34.0120 1392  [ 8BAA43196D7B5BB972C9A6B2BBF61A19 ] Ndisuio         C:\Windows\system32\DRIVERS\ndisuio.sys
14:05:34.0120 1392  Ndisuio - ok
14:05:34.0151 1392  [ F8158771905260982CE724076419EF19 ] NdisWan         C:\Windows\system32\DRIVERS\ndiswan.sys
14:05:34.0151 1392  NdisWan - ok
14:05:34.0166 1392  [ 9CB77ED7CB72850253E973A2D6AFDF49 ] NDProxy         C:\Windows\system32\drivers\NDProxy.sys
14:05:34.0166 1392  NDProxy - ok
14:05:34.0244 1392  [ 2334DC48997BA203B794DF3EE70521DB ] Net Driver HPZ12 C:\Windows\system32\HPZinw12.dll
14:05:34.0244 1392  Net Driver HPZ12 - ok
14:05:34.0276 1392  [ A499294F5029A7862ADC115BDA7371CE ] NetBIOS         C:\Windows\system32\DRIVERS\netbios.sys
14:05:34.0276 1392  NetBIOS - ok
14:05:34.0322 1392  [ FC2C792EBDDC8E28DF939D6A92C83D61 ] netbt           C:\Windows\system32\DRIVERS\netbt.sys
14:05:34.0322 1392  netbt - ok
14:05:34.0338 1392  [ 260BF9C43EE12C6898A9F5AAB0FB0E5D ] Netlogon        C:\Windows\system32\lsass.exe
14:05:34.0338 1392  Netlogon - ok
14:05:34.0369 1392  [ 9B63B29DEFC0F3115A559D2597BF5D75 ] Netman          C:\Windows\System32\netman.dll
14:05:34.0369 1392  Netman - ok
14:05:34.0416 1392  [ 7846D0136CC2B264926A73047BA7688A ] netprofm        C:\Windows\System32\netprofm.dll
14:05:34.0416 1392  netprofm - ok
14:05:34.0447 1392  [ 74751DDA198165947FD7454D83F49825 ] NetTcpPortSharing C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\SMSvcHost.exe
14:05:34.0447 1392  NetTcpPortSharing - ok
14:05:34.0588 1392  [ DAE4178CF30CF07DF3C53837EE5E96A7 ] NETw4v64        C:\Windows\system32\DRIVERS\NETw4v64.sys
14:05:34.0634 1392  NETw4v64 - ok
14:05:34.0666 1392  [ 4AC08BD6AF2DF42E0C3196D826C8AEA7 ] nfrd960         C:\Windows\system32\drivers\nfrd960.sys
14:05:34.0681 1392  nfrd960 - ok
14:05:34.0712 1392  [ F145BF4C4668E7E312069F81EF847CFC ] NlaSvc          C:\Windows\System32\nlasvc.dll
14:05:34.0712 1392  NlaSvc - ok
14:05:34.0744 1392  [ B298874F8E0EA93F06EC40AA8D146478 ] Npfs            C:\Windows\system32\drivers\Npfs.sys
14:05:34.0744 1392  Npfs - ok
14:05:34.0759 1392  [ ACB62BAA1C319B17752553DF3026EEEB ] nsi             C:\Windows\system32\nsisvc.dll
14:05:34.0759 1392  nsi - ok
14:05:34.0775 1392  [ 1523AF19EE8B030BA682F7A53537EAEB ] nsiproxy        C:\Windows\system32\drivers\nsiproxy.sys
14:05:34.0775 1392  nsiproxy - ok
14:05:34.0868 1392  [ 2ACCAA3C3C55370A32F17B3595E1A217 ] Ntfs            C:\Windows\system32\drivers\Ntfs.sys
14:05:34.0884 1392  Ntfs - ok
14:05:34.0915 1392  [ DD5D684975352B85B52E3FD5347C20CB ] Null            C:\Windows\system32\drivers\Null.sys
14:05:34.0915 1392  Null - ok
14:05:34.0993 1392  [ 9733F305FA84AAF84E7FB09C0B345ADB ] NVENETFD        C:\Windows\system32\DRIVERS\nvm60x64.sys
14:05:34.0993 1392  NVENETFD - ok
14:05:35.0321 1392  [ FD39B98FF1BB8ED3848781497E9D02E0 ] nvlddmkm        C:\Windows\system32\DRIVERS\nvlddmkm.sys
14:05:35.0633 1392  nvlddmkm - ok
14:05:35.0680 1392  [ 2C040B7ADA5B06F6FACADAC8514AA034 ] nvraid          C:\Windows\system32\drivers\nvraid.sys
14:05:35.0680 1392  nvraid - ok
14:05:35.0726 1392  [ F7EA0FE82842D05EDA3EFDD376DBFDBA ] nvstor          C:\Windows\system32\drivers\nvstor.sys
14:05:35.0726 1392  nvstor - ok
14:05:35.0836 1392  [ C1668D58547DD0C4A0FBD6AFA20D5890 ] nvsvc           C:\Windows\system32\nvvsvc.exe
14:05:35.0882 1392  nvsvc - ok
14:05:35.0945 1392  [ 19067CA93075EF4823E3938A686F532F ] nv_agp          C:\Windows\system32\drivers\nv_agp.sys
14:05:35.0945 1392  nv_agp - ok
14:05:35.0945 1392  NwlnkFlt - ok
14:05:35.0960 1392  NwlnkFwd - ok
14:05:36.0054 1392  [ 785F487A64950F3CB8E9F16253BA3B7B ] odserv          C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE12\ODSERV.EXE
14:05:36.0070 1392  odserv - ok
14:05:36.0148 1392  [ B5B1CE65AC15BBD11C0619E3EF7CFC28 ] ohci1394        C:\Windows\system32\DRIVERS\ohci1394.sys
14:05:36.0148 1392  ohci1394 - ok
14:05:36.0210 1392  [ 5A432A042DAE460ABE7199B758E8606C ] ose             C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
14:05:36.0210 1392  ose - ok
14:05:36.0288 1392  [ 9AE31D2E1D15C10D91318E0EC149CEAC ] p2pimsvc        C:\Windows\system32\p2psvc.dll
14:05:36.0304 1392  p2pimsvc - ok
14:05:36.0319 1392  [ 9AE31D2E1D15C10D91318E0EC149CEAC ] p2psvc          C:\Windows\system32\p2psvc.dll
14:05:36.0335 1392  p2psvc - ok
14:05:36.0366 1392  [ AECD57F94C887F58919F307C35498EA0 ] Parport         C:\Windows\system32\drivers\parport.sys
14:05:36.0366 1392  Parport - ok
14:05:36.0413 1392  [ B43751085E2ABE389DA466BC62A4B987 ] partmgr         C:\Windows\system32\drivers\partmgr.sys
14:05:36.0413 1392  partmgr - ok
14:05:36.0444 1392  [ 9AB157B374192FF276C1628FBDBA2B0E ] PcaSvc          C:\Windows\System32\pcasvc.dll
14:05:36.0444 1392  PcaSvc - ok
14:05:36.0460 1392  [ 47AB1E0FC9D0E12BB53BA246E3A0906D ] pci             C:\Windows\system32\drivers\pci.sys
14:05:36.0475 1392  pci - ok
14:05:36.0506 1392  [ 8D618C829034479985A9ED56106CC732 ] pciide          C:\Windows\system32\drivers\pciide.sys
14:05:36.0506 1392  pciide - ok
14:05:36.0538 1392  [ 037661F3D7C507C9993B7010CEEE6288 ] pcmcia          C:\Windows\system32\drivers\pcmcia.sys
14:05:36.0553 1392  pcmcia - ok
14:05:36.0584 1392  [ 58865916F53592A61549B04941BFD80D ] PEAUTH          C:\Windows\system32\drivers\peauth.sys
14:05:36.0584 1392  PEAUTH - ok
14:05:36.0662 1392  [ 0ED8727EA0172860F47258456C06CAEA ] PerfHost        C:\Windows\SysWow64\perfhost.exe
14:05:36.0694 1392  PerfHost - ok
14:05:36.0787 1392  [ E9E68C1A0F25CF4A7AC966EEA74EE89E ] pla             C:\Windows\system32\pla.dll
14:05:36.0818 1392  pla - ok
14:05:36.0850 1392  [ FE6B0F59215C9FD9F9D26539C58C8B82 ] PlugPlay        C:\Windows\system32\umpnpmgr.dll
14:05:36.0865 1392  PlugPlay - ok
14:05:36.0928 1392  [ AC78DF349F0E4CFB8B667C0CFFF83CCE ] Pml Driver HPZ12 C:\Windows\system32\HPZipm12.dll
14:05:36.0928 1392  Pml Driver HPZ12 - ok
14:05:36.0959 1392  [ 9AE31D2E1D15C10D91318E0EC149CEAC ] PNRPAutoReg     C:\Windows\system32\p2psvc.dll
14:05:36.0974 1392  PNRPAutoReg - ok
14:05:36.0974 1392  [ 9AE31D2E1D15C10D91318E0EC149CEAC ] PNRPsvc         C:\Windows\system32\p2psvc.dll
14:05:36.0990 1392  PNRPsvc - ok
14:05:37.0037 1392  [ 89A5560671C2D8B4A4B51F3E1AA069D8 ] PolicyAgent     C:\Windows\System32\ipsecsvc.dll
14:05:37.0037 1392  PolicyAgent - ok
14:05:37.0068 1392  [ 23386E9952025F5F21C368971E2E7301 ] PptpMiniport    C:\Windows\system32\DRIVERS\raspptp.sys
14:05:37.0068 1392  PptpMiniport - ok
14:05:37.0099 1392  [ 5080E59ECEE0BC923F14018803AA7A01 ] Processor       C:\Windows\system32\drivers\processr.sys
14:05:37.0099 1392  Processor - ok
14:05:37.0146 1392  [ E058CE4FC2449D8BFA14739C83B7FF2A ] ProfSvc         C:\Windows\system32\profsvc.dll
14:05:37.0146 1392  ProfSvc - ok
14:05:37.0162 1392  [ 260BF9C43EE12C6898A9F5AAB0FB0E5D ] ProtectedStorage C:\Windows\system32\lsass.exe
14:05:37.0162 1392  ProtectedStorage - ok
14:05:37.0177 1392  [ C5AB7F0809392D0DA027F4A2A81BFA31 ] PSched          C:\Windows\system32\DRIVERS\pacer.sys
14:05:37.0177 1392  PSched - ok
14:05:37.0255 1392  [ 0B83F4E681062F3839BE2EC1D98FD94A ] ql2300          C:\Windows\system32\drivers\ql2300.sys
14:05:37.0271 1392  ql2300 - ok
14:05:37.0302 1392  [ E1C80F8D4D1E39EF9595809C1369BF2A ] ql40xx          C:\Windows\system32\drivers\ql40xx.sys
14:05:37.0318 1392  ql40xx - ok
14:05:37.0411 1392  [ BA396D1C71934E22679D3F4DAC17E7AB ] QPCapSvc        C:\Program Files (x86)\HP\QuickPlay\Kernel\TV\QPCapSvc.exe
14:05:37.0411 1392  QPCapSvc - ok
14:05:37.0427 1392  [ 4B455E8C41CAD3219CCF53024DCAD604 ] QPSched         C:\Program Files (x86)\HP\QuickPlay\Kernel\TV\QPSched.exe
14:05:37.0427 1392  QPSched - ok
14:05:37.0474 1392  [ 90574842C3DA781E279061A3EFF91F07 ] QWAVE           C:\Windows\system32\qwave.dll
14:05:37.0474 1392  QWAVE - ok
14:05:37.0489 1392  [ E8D76EDAB77EC9C634C27B8EAC33ADC5 ] QWAVEdrv        C:\Windows\system32\drivers\qwavedrv.sys
14:05:37.0505 1392  QWAVEdrv - ok
14:05:37.0520 1392  [ 1013B3B663A56D3DDD784F581C1BD005 ] RasAcd          C:\Windows\system32\DRIVERS\rasacd.sys
14:05:37.0520 1392  RasAcd - ok
14:05:37.0567 1392  [ B2AE18F847D07F0044404DDF7CB04497 ] RasAuto         C:\Windows\System32\rasauto.dll
14:05:37.0567 1392  RasAuto - ok
14:05:37.0583 1392  [ AC7BC4D42A7E558718DFDEC599BBFC2C ] Rasl2tp         C:\Windows\system32\DRIVERS\rasl2tp.sys
14:05:37.0598 1392  Rasl2tp - ok
14:05:37.0598 1392  [ 3AD83E4046C43BE510DE681588ACB8AF ] RasMan          C:\Windows\System32\rasmans.dll
14:05:37.0614 1392  RasMan - ok
14:05:37.0645 1392  [ 4517FBF8B42524AFE4EDE1DE102AAE3E ] RasPppoe        C:\Windows\system32\DRIVERS\raspppoe.sys
14:05:37.0645 1392  RasPppoe - ok
14:05:37.0676 1392  [ C6A593B51F34C33E5474539544072527 ] RasSstp         C:\Windows\system32\DRIVERS\rassstp.sys
14:05:37.0676 1392  RasSstp - ok
14:05:37.0723 1392  [ 322DB5C6B55E8D8EE8D6F358B2AAABB1 ] rdbss           C:\Windows\system32\DRIVERS\rdbss.sys
14:05:37.0723 1392  rdbss - ok
14:05:37.0739 1392  [ 603900CC05F6BE65CCBF373800AF3716 ] RDPCDD          C:\Windows\system32\DRIVERS\RDPCDD.sys
14:05:37.0739 1392  RDPCDD - ok
14:05:37.0786 1392  [ C045D1FB111C28DF0D1BE8D4BDA22C06 ] rdpdr           C:\Windows\system32\drivers\rdpdr.sys
14:05:37.0786 1392  rdpdr - ok
14:05:37.0801 1392  [ CAB9421DAF3D97B33D0D055858E2C3AB ] RDPENCDD        C:\Windows\system32\drivers\rdpencdd.sys
14:05:37.0801 1392  RDPENCDD - ok
14:05:37.0848 1392  [ AE4BD9E1C33D351D8E607FC81F15160C ] RDPWD           C:\Windows\system32\drivers\RDPWD.sys
14:05:37.0848 1392  RDPWD - ok
14:05:37.0879 1392  [ C612B9557DA73F70D41F8A6FBC8E5344 ] RemoteAccess    C:\Windows\System32\mprdim.dll
14:05:37.0879 1392  RemoteAccess - ok
14:05:37.0926 1392  [ 44B9D8EC2F3EF3A0EFB00857AF70D861 ] RemoteRegistry  C:\Windows\system32\regsvc.dll
14:05:37.0926 1392  RemoteRegistry - ok
14:05:37.0942 1392  [ E31960692CBB3A8BCDF300BC1D889E1F ] rimmptsk        C:\Windows\system32\DRIVERS\rimmpx64.sys
14:05:37.0942 1392  rimmptsk - ok
14:05:37.0957 1392  [ 82356915157AB59064A24993AE5BE8AA ] rimsptsk        C:\Windows\system32\DRIVERS\rimspx64.sys
14:05:37.0957 1392  rimsptsk - ok
14:05:37.0973 1392  [ C01A92A546854A3E34103B642F0F94A1 ] rismxdp         C:\Windows\system32\DRIVERS\rixdpx64.sys
14:05:37.0973 1392  rismxdp - ok
14:05:38.0004 1392  [ F46C457840D4B7A4DAAFEE739CE04102 ] RpcLocator      C:\Windows\system32\locator.exe
14:05:38.0004 1392  RpcLocator - ok
14:05:38.0051 1392  [ CF8B9A3A5E7DC57724A89D0C3E8CF9EF ] RpcSs           C:\Windows\system32\rpcss.dll
14:05:38.0051 1392  RpcSs - ok
14:05:38.0098 1392  [ 22A9CB08B1A6707C1550C6BF099AAE73 ] rspndr          C:\Windows\system32\DRIVERS\rspndr.sys
14:05:38.0098 1392  rspndr - ok
14:05:38.0144 1392  [ D60882145DDF5C03F5357D1E3755E5F2 ] RTL8169         C:\Windows\system32\DRIVERS\Rtlh64.sys
14:05:38.0144 1392  RTL8169 - ok
14:05:38.0160 1392  [ 260BF9C43EE12C6898A9F5AAB0FB0E5D ] SamSs           C:\Windows\system32\lsass.exe
14:05:38.0160 1392  SamSs - ok
14:05:38.0191 1392  [ CD9C693589C60AD59BBBCFB0E524E01B ] sbp2port        C:\Windows\system32\drivers\sbp2port.sys
14:05:38.0191 1392  sbp2port - ok
14:05:38.0222 1392  [ FD1CDCF108D5EF3366F00D18B70FB89B ] SCardSvr        C:\Windows\System32\SCardSvr.dll
14:05:38.0238 1392  SCardSvr - ok
14:05:38.0300 1392  [ 0F838C811AD295D2A4489B9993096C63 ] Schedule        C:\Windows\system32\schedsvc.dll
14:05:38.0316 1392  Schedule - ok
14:05:38.0347 1392  [ 5A268127633C7EE2A7FB87F39D748D56 ] SCPolicySvc     C:\Windows\System32\certprop.dll
14:05:38.0347 1392  SCPolicySvc - ok
14:05:38.0394 1392  [ BE100BC2BE2513314C717BB2C4CFFF10 ] sdbus           C:\Windows\system32\DRIVERS\sdbus.sys
14:05:38.0394 1392  sdbus - ok
14:05:38.0425 1392  [ 4FF71B076A7760FE75EA5AE2D0EE0018 ] SDRSVC          C:\Windows\System32\SDRSVC.dll
14:05:38.0425 1392  SDRSVC - ok
14:05:38.0456 1392  [ 3EA8A16169C26AFBEB544E0E48421186 ] secdrv          C:\Windows\system32\drivers\secdrv.sys
14:05:38.0456 1392  secdrv - ok
14:05:38.0472 1392  [ 5ACDCBC67FCF894A1815B9F96D704490 ] seclogon        C:\Windows\system32\seclogon.dll
14:05:38.0472 1392  seclogon - ok
14:05:38.0488 1392  [ 90973A64B96CD647FF81C79443618EED ] SENS            C:\Windows\system32\sens.dll
14:05:38.0488 1392  SENS - ok
14:05:38.0519 1392  [ F71BFE7AC6C52273B7C82CBF1BB2A222 ] Serenum         C:\Windows\system32\drivers\serenum.sys
14:05:38.0519 1392  Serenum - ok
14:05:38.0550 1392  [ E62FAC91EE288DB29A9696A9D279929C ] Serial          C:\Windows\system32\drivers\serial.sys
14:05:38.0550 1392  Serial - ok
14:05:38.0566 1392  [ A842F04833684BCEEA7336211BE478DF ] sermouse        C:\Windows\system32\drivers\sermouse.sys
14:05:38.0566 1392  sermouse - ok
14:05:38.0612 1392  [ A8E4A4407A09F35DCCC3771AF590B0C4 ] SessionEnv      C:\Windows\system32\sessenv.dll
14:05:38.0612 1392  SessionEnv - ok
14:05:38.0628 1392  [ 14D4B4465193A87C127933978E8C4106 ] sffdisk         C:\Windows\system32\drivers\sffdisk.sys
14:05:38.0628 1392  sffdisk - ok
14:05:38.0644 1392  [ 7073AEE3F82F3D598E3825962AA98AB2 ] sffp_mmc        C:\Windows\system32\drivers\sffp_mmc.sys
14:05:38.0644 1392  sffp_mmc - ok
14:05:38.0659 1392  [ 35E59EBE4A01A0532ED67975161C7B82 ] sffp_sd         C:\Windows\system32\drivers\sffp_sd.sys
14:05:38.0675 1392  sffp_sd - ok
14:05:38.0706 1392  [ 6B7838C94135768BD455CBDC23E39E5F ] sfloppy         C:\Windows\system32\drivers\sfloppy.sys
14:05:38.0706 1392  sfloppy - ok
14:05:38.0784 1392  [ 4C5AEE179DA7E1EE9A9CCB9DA289AF34 ] SharedAccess    C:\Windows\System32\ipnathlp.dll
14:05:38.0800 1392  SharedAccess - ok
14:05:38.0846 1392  [ 56793271ECDEDD350C5ADD305603E963 ] ShellHWDetection C:\Windows\System32\shsvcs.dll
14:05:38.0862 1392  ShellHWDetection - ok
14:05:38.0878 1392  [ 7A5DE502AEB719D4594C6471060A78B3 ] SiSRaid2        C:\Windows\system32\drivers\sisraid2.sys
14:05:38.0878 1392  SiSRaid2 - ok
14:05:38.0909 1392  [ 3A2F769FAB9582BC720E11EA1DFB184D ] SiSRaid4        C:\Windows\system32\drivers\sisraid4.sys
14:05:38.0924 1392  SiSRaid4 - ok
14:05:38.0987 1392  [ F07AF60B152221472FBDB2FECEC4896D ] SkypeUpdate     C:\Program Files (x86)\Skype\Updater\Updater.exe
14:05:39.0002 1392  SkypeUpdate - ok
14:05:39.0080 1392  [ A9A27A8E257B45A604FDAD4F26FE7241 ] slsvc           C:\Windows\system32\SLsvc.exe
14:05:39.0127 1392  slsvc - ok
14:05:39.0158 1392  [ FD74B4B7C2088E390A30C85A896FC3AF ] SLUINotify      C:\Windows\system32\SLUINotify.dll
14:05:39.0158 1392  SLUINotify - ok
14:05:39.0190 1392  [ 290B6F6A0EC4FCDFC90F5CB6D7020473 ] Smb             C:\Windows\system32\DRIVERS\smb.sys
14:05:39.0190 1392  Smb - ok
14:05:39.0252 1392  [ 5F1767B8281EEEA159D8A37E33EB04AE ] smserial        C:\Windows\system32\DRIVERS\smserial.sys
14:05:39.0268 1392  smserial - ok
14:05:39.0330 1392  [ F8F47F38909823B1AF28D60B96340CFF ] SNMPTRAP        C:\Windows\System32\snmptrap.exe
14:05:39.0330 1392  SNMPTRAP - ok
14:05:39.0377 1392  [ 386C3C63F00A7040C7EC5E384217E89D ] spldr           C:\Windows\system32\drivers\spldr.sys
14:05:39.0377 1392  spldr - ok
14:05:39.0408 1392  [ F66FF751E7EFC816D266977939EF5DC3 ] Spooler         C:\Windows\System32\spoolsv.exe
14:05:39.0424 1392  Spooler - ok
14:05:39.0486 1392  [ 880A57FCCB571EBD063D4DD50E93E46D ] srv             C:\Windows\system32\DRIVERS\srv.sys
14:05:39.0486 1392  srv - ok
14:05:39.0533 1392  [ A1AD14A6D7A37891FFFECA35EBBB0730 ] srv2            C:\Windows\system32\DRIVERS\srv2.sys
14:05:39.0548 1392  srv2 - ok
14:05:39.0564 1392  [ 4BED62F4FA4D8300973F1151F4C4D8A7 ] srvnet          C:\Windows\system32\DRIVERS\srvnet.sys
14:05:39.0564 1392  srvnet - ok
14:05:39.0611 1392  [ 192C74646EC5725AEF3F80D19FF75F6A ] SSDPSRV         C:\Windows\System32\ssdpsrv.dll
14:05:39.0611 1392  SSDPSRV - ok
14:05:39.0673 1392  [ 9777AEF5A3DC86B0825AC12DE37F8E2E ] ssrangdr        C:\Windows\system32\DRIVERS\ssrangdr.sys
14:05:39.0673 1392  ssrangdr - ok
14:05:39.0736 1392  [ 2EE3FA0308E6185BA64A9A7F2E74332B ] SstpSvc         C:\Windows\system32\sstpsvc.dll
14:05:39.0736 1392  SstpSvc - ok
14:05:39.0814 1392  [ 15825C1FBFB8779992CB65087F316AF5 ] stisvc          C:\Windows\System32\wiaservc.dll
14:05:39.0829 1392  stisvc - ok
14:05:39.0845 1392  [ 8A851CA908B8B974F89C50D2E18D4F0C ] swenum          C:\Windows\system32\DRIVERS\swenum.sys
14:05:39.0845 1392  swenum - ok
14:05:39.0892 1392  [ 6DE37F4DE19D4EFD9C48C43ADDBC949A ] swprv           C:\Windows\System32\swprv.dll
14:05:39.0892 1392  swprv - ok
14:05:39.0923 1392  [ 2F26A2C6FC96B29BEFF5D8ED74E6625B ] Symc8xx         C:\Windows\system32\drivers\symc8xx.sys
14:05:39.0923 1392  Symc8xx - ok
14:05:39.0970 1392  [ BA4AAC19CD8A61F22761D028D7E8030A ] SymIM           C:\Windows\system32\DRIVERS\SymIM.sys
14:05:39.0970 1392  SymIM - ok
14:05:39.0985 1392  [ BA4AAC19CD8A61F22761D028D7E8030A ] SymIMMP         C:\Windows\system32\DRIVERS\SymIM.sys
14:05:39.0985 1392  SymIMMP - ok
14:05:40.0001 1392  [ A909667976D3BCCD1DF813FED517D837 ] Sym_hi          C:\Windows\system32\drivers\sym_hi.sys
14:05:40.0001 1392  Sym_hi - ok
14:05:40.0016 1392  [ 36887B56EC2D98B9C362F6AE4DE5B7B0 ] Sym_u3          C:\Windows\system32\drivers\sym_u3.sys
14:05:40.0016 1392  Sym_u3 - ok
14:05:40.0063 1392  [ B432C6063D4C621241C2B6E05CA0C3E3 ] SynTP           C:\Windows\system32\DRIVERS\SynTP.sys
14:05:40.0063 1392  SynTP - ok
14:05:40.0110 1392  [ 92D7A8B0F87B036F17D25885937897A6 ] SysMain         C:\Windows\system32\sysmain.dll
14:05:40.0126 1392  SysMain - ok
14:05:40.0157 1392  [ 005CE42567F9113A3BCCB3B20073B029 ] TabletInputService C:\Windows\System32\TabSvc.dll
14:05:40.0157 1392  TabletInputService - ok
14:05:40.0204 1392  [ CC2562B4D55E0B6A4758C65407F63B79 ] TapiSrv         C:\Windows\System32\tapisrv.dll
14:05:40.0204 1392  TapiSrv - ok
14:05:40.0219 1392  [ CDBE8D7C1E201B911CDC346D06617FB5 ] TBS             C:\Windows\System32\tbssvc.dll
14:05:40.0219 1392  TBS - ok
14:05:40.0313 1392  [ C7C60777592EEF169A11647AAE7A91C3 ] Tcpip           C:\Windows\system32\drivers\tcpip.sys
14:05:40.0313 1392  Tcpip - ok
14:05:40.0344 1392  [ C7C60777592EEF169A11647AAE7A91C3 ] Tcpip6          C:\Windows\system32\DRIVERS\tcpip.sys
14:05:40.0344 1392  Tcpip6 - ok
14:05:40.0391 1392  [ C7E72A4071EE0200E3C075DACFB2B334 ] tcpipreg        C:\Windows\system32\drivers\tcpipreg.sys
14:05:40.0391 1392  tcpipreg - ok
14:05:40.0422 1392  [ 1D8BF4AAA5FB7A2761475781DC1195BC ] TDPIPE          C:\Windows\system32\drivers\tdpipe.sys
14:05:40.0422 1392  TDPIPE - ok
14:05:40.0438 1392  [ 7F7E00CDF609DF657F4CDA02DD1C9BB1 ] TDTCP           C:\Windows\system32\drivers\tdtcp.sys
14:05:40.0438 1392  TDTCP - ok
14:05:40.0469 1392  [ 458919C8C42E398DC4802178D5FFEE27 ] tdx             C:\Windows\system32\DRIVERS\tdx.sys
14:05:40.0469 1392  tdx - ok
14:05:40.0516 1392  [ 8C19678D22649EC002EF2282EAE92F98 ] TermDD          C:\Windows\system32\DRIVERS\termdd.sys
14:05:40.0516 1392  TermDD - ok
14:05:40.0547 1392  [ 5CDD30BC217082DAC71A9878D9BFD566 ] TermService     C:\Windows\System32\termsrv.dll
14:05:40.0562 1392  TermService - ok
14:05:40.0578 1392  [ 56793271ECDEDD350C5ADD305603E963 ] Themes          C:\Windows\system32\shsvcs.dll
14:05:40.0594 1392  Themes - ok
14:05:40.0609 1392  [ 3CBE4995E80E13CCFBC42E5DCF3AC81A ] THREADORDER     C:\Windows\system32\mmcss.dll
14:05:40.0609 1392  THREADORDER - ok
14:05:40.0640 1392  [ F4689F05AF472A651A7B1B7B02D200E7 ] TrkWks          C:\Windows\System32\trkwks.dll
14:05:40.0640 1392  TrkWks - ok
14:05:40.0687 1392  [ 66328B08EF5A9305D8EDE36B93930369 ] TrustedInstaller C:\Windows\servicing\TrustedInstaller.exe
14:05:40.0687 1392  TrustedInstaller - ok
14:05:40.0718 1392  [ 9E5409CD17C8BEF193AAD498F3BC2CB8 ] tssecsrv        C:\Windows\system32\DRIVERS\tssecsrv.sys
14:05:40.0718 1392  tssecsrv - ok
14:05:40.0750 1392  [ 89EC74A9E602D16A75A4170511029B3C ] tunmp           C:\Windows\system32\DRIVERS\tunmp.sys
14:05:40.0750 1392  tunmp - ok
14:05:40.0828 1392  [ 30A9B3F45AD081BFFC3BCAA9C812B609 ] tunnel          C:\Windows\system32\DRIVERS\tunnel.sys
14:05:40.0828 1392  tunnel - ok
14:05:40.0843 1392  [ FEC266EF401966311744BD0F359F7F56 ] uagp35          C:\Windows\system32\drivers\uagp35.sys
14:05:40.0843 1392  uagp35 - ok
14:05:40.0890 1392  [ FAF2640A2A76ED03D449E443194C4C34 ] udfs            C:\Windows\system32\DRIVERS\udfs.sys
14:05:40.0890 1392  udfs - ok
14:05:40.0937 1392  [ 060507C4113391394478F6953A79EEDC ] UI0Detect       C:\Windows\system32\UI0Detect.exe
14:05:40.0937 1392  UI0Detect - ok
14:05:40.0968 1392  [ 4EC9447AC3AB462647F60E547208CA00 ] uliagpkx        C:\Windows\system32\drivers\uliagpkx.sys
14:05:40.0999 1392  uliagpkx - ok
14:05:41.0030 1392  [ 697F0446134CDC8F99E69306184FBBB4 ] uliahci         C:\Windows\system32\drivers\uliahci.sys
14:05:41.0030 1392  uliahci - ok
14:05:41.0046 1392  [ 31707F09846056651EA2C37858F5DDB0 ] UlSata          C:\Windows\system32\drivers\ulsata.sys
14:05:41.0062 1392  UlSata - ok
14:05:41.0077 1392  [ 85E5E43ED5B48C8376281BAB519271B7 ] ulsata2         C:\Windows\system32\drivers\ulsata2.sys
14:05:41.0077 1392  ulsata2 - ok
14:05:41.0108 1392  [ 46E9A994C4FED537DD951F60B86AD3F4 ] umbus           C:\Windows\system32\DRIVERS\umbus.sys
14:05:41.0108 1392  umbus - ok
14:05:41.0140 1392  [ 7093799FF80E9DECA0680D2E3535BE60 ] upnphost        C:\Windows\System32\upnphost.dll
14:05:41.0140 1392  upnphost - ok
14:05:41.0233 1392  [ C6BA890DE6E41857FBE84175519CAE7D ] usbaudio        C:\Windows\system32\drivers\usbaudio.sys
14:05:41.0233 1392  usbaudio - ok
14:05:41.0280 1392  [ 07E3498FC60834219D2356293DA0FECC ] usbccgp         C:\Windows\system32\DRIVERS\usbccgp.sys
14:05:41.0280 1392  usbccgp - ok
14:05:41.0311 1392  [ 9247F7E0B65852C1F6631480984D6ED2 ] usbcir          C:\Windows\system32\drivers\usbcir.sys
14:05:41.0311 1392  usbcir - ok
14:05:41.0342 1392  [ 827E44DE934A736EA31E91D353EB126F ] usbehci         C:\Windows\system32\DRIVERS\usbehci.sys
14:05:41.0342 1392  usbehci - ok
14:05:41.0358 1392  [ BB35CD80A2ECECFADC73569B3D70C7D1 ] usbhub          C:\Windows\system32\DRIVERS\usbhub.sys
14:05:41.0358 1392  usbhub - ok
14:05:41.0389 1392  [ 540B622DA0949695C40CDC9D5D497A8B ] usbohci         C:\Windows\system32\DRIVERS\usbohci.sys
14:05:41.0389 1392  usbohci - ok
14:05:41.0420 1392  [ 28B693B6D31E7B9332C1BDCEFEF228C1 ] usbprint        C:\Windows\system32\DRIVERS\usbprint.sys
14:05:41.0420 1392  usbprint - ok
14:05:41.0467 1392  [ EA0BF666868964FBE8CB10E50C97B9F1 ] usbscan         C:\Windows\system32\DRIVERS\usbscan.sys
14:05:41.0467 1392  usbscan - ok
14:05:41.0483 1392  [ B854C1558FCA0C269A38663E8B59B581 ] USBSTOR         C:\Windows\system32\DRIVERS\USBSTOR.SYS
14:05:41.0483 1392  USBSTOR - ok
14:05:41.0514 1392  [ B2872CBF9F47316ABD0E0C74A1ABA507 ] usbuhci         C:\Windows\system32\DRIVERS\usbuhci.sys
14:05:41.0514 1392  usbuhci - ok
14:05:41.0576 1392  [ FC33099877790D51B0927B7039059855 ] usbvideo        C:\Windows\system32\Drivers\usbvideo.sys
14:05:41.0576 1392  usbvideo - ok
14:05:41.0608 1392  [ D76E231E4850BB3F88A3D9A78DF191E3 ] UxSms           C:\Windows\System32\uxsms.dll
14:05:41.0608 1392  UxSms - ok
14:05:41.0654 1392  [ 294945381DFA7CE58CECF0A9896AF327 ] vds             C:\Windows\System32\vds.exe
14:05:41.0654 1392  vds - ok
14:05:41.0670 1392  [ 916B94BCF1E09873FFF2D5FB11767BBC ] vga             C:\Windows\system32\DRIVERS\vgapnp.sys
14:05:41.0686 1392  vga - ok
14:05:41.0701 1392  [ B83AB16B51FEDA65DD81B8C59D114D63 ] VgaSave         C:\Windows\System32\drivers\vga.sys
14:05:41.0701 1392  VgaSave - ok
14:05:41.0748 1392  [ 8294B6C3FDB6C33F24E150DE647ECDAA ] viaide          C:\Windows\system32\drivers\viaide.sys
14:05:41.0748 1392  viaide - ok
14:05:41.0779 1392  [ 2B7E885ED951519A12C450D24535DFCA ] volmgr          C:\Windows\system32\drivers\volmgr.sys
14:05:41.0779 1392  volmgr - ok
14:05:41.0826 1392  [ CEC5AC15277D75D9E5DEC2E1C6EAF877 ] volmgrx         C:\Windows\system32\drivers\volmgrx.sys
14:05:41.0826 1392  volmgrx - ok
14:05:41.0873 1392  [ 582F710097B46140F5A89A19A6573D4B ] volsnap         C:\Windows\system32\drivers\volsnap.sys
14:05:41.0888 1392  volsnap - ok
14:05:41.0904 1392  [ A68F455ED2673835209318DD61BFBB0E ] vsmraid         C:\Windows\system32\drivers\vsmraid.sys
14:05:41.0935 1392  vsmraid - ok
14:05:42.0029 1392  [ B75232DAD33BFD95BF6F0A3E6BFF51E1 ] VSS             C:\Windows\system32\vssvc.exe
14:05:42.0044 1392  VSS - ok
14:05:42.0076 1392  [ F14A7DE2EA41883E250892E1E5230A9A ] W32Time         C:\Windows\system32\w32time.dll
14:05:42.0091 1392  W32Time - ok
14:05:42.0107 1392  [ FEF8FE5923FEAD2CEE4DFABFCE3393A7 ] WacomPen        C:\Windows\system32\drivers\wacompen.sys
14:05:42.0122 1392  WacomPen - ok
14:05:42.0185 1392  [ B8E7049622300D20BA6D8BE0C47C0CFD ] Wanarp          C:\Windows\system32\DRIVERS\wanarp.sys
14:05:42.0185 1392  Wanarp - ok
14:05:42.0185 1392  [ B8E7049622300D20BA6D8BE0C47C0CFD ] Wanarpv6        C:\Windows\system32\DRIVERS\wanarp.sys
14:05:42.0185 1392  Wanarpv6 - ok
14:05:42.0216 1392  [ B4E4C37D0AA6100090A53213EE2BF1C1 ] wcncsvc         C:\Windows\System32\wcncsvc.dll
14:05:42.0232 1392  wcncsvc - ok
14:05:42.0263 1392  [ EA4B369560E986F19D93F45A881484AC ] WcsPlugInService C:\Windows\System32\WcsPlugInService.dll
14:05:42.0263 1392  WcsPlugInService - ok
14:05:42.0278 1392  [ 0C17A0816F65B89E362E682AD5E7266E ] Wd              C:\Windows\system32\drivers\wd.sys
14:05:42.0278 1392  Wd - ok
14:05:42.0341 1392  [ 442783E2CB0DA19873B7A63833FF4CB4 ] Wdf01000        C:\Windows\system32\drivers\Wdf01000.sys
14:05:42.0356 1392  Wdf01000 - ok
14:05:42.0372 1392  [ C5EFDA73EBFCA8B02A094898DE0A9276 ] WdiServiceHost  C:\Windows\system32\wdi.dll
14:05:42.0372 1392  WdiServiceHost - ok
14:05:42.0372 1392  [ C5EFDA73EBFCA8B02A094898DE0A9276 ] WdiSystemHost   C:\Windows\system32\wdi.dll
14:05:42.0388 1392  WdiSystemHost - ok
14:05:42.0419 1392  [ 3E6D05381CF35F75EBB055544A8ED9AC ] WebClient       C:\Windows\System32\webclnt.dll
14:05:42.0419 1392  WebClient - ok
14:05:42.0481 1392  [ 8D40BC587993F876658BF9FB0F7D3462 ] Wecsvc          C:\Windows\system32\wecsvc.dll
14:05:42.0481 1392  Wecsvc - ok
14:05:42.0512 1392  [ 9C980351D7E96288EA0C23AE232BD065 ] wercplsupport   C:\Windows\System32\wercplsupport.dll
14:05:42.0512 1392  wercplsupport - ok
14:05:42.0544 1392  [ 66B9ECEBC46683F47EDC06333C075FEF ] WerSvc          C:\Windows\System32\WerSvc.dll
14:05:42.0544 1392  WerSvc - ok
14:05:42.0590 1392  [ B5C348B265178FB9EE55ADDB3929485D ] winachsf        C:\Windows\system32\DRIVERS\VSTCNXT6.SYS
14:05:42.0606 1392  winachsf - ok
14:05:42.0622 1392  WinDefend - ok
14:05:42.0637 1392  WinHttpAutoProxySvc - ok
14:05:42.0668 1392  [ D2E7296ED1BD26D8DB2799770C077A02 ] Winmgmt         C:\Windows\system32\wbem\WMIsvc.dll
14:05:42.0684 1392  Winmgmt - ok
14:05:42.0778 1392  [ 6CBB0C68F13B9C2EC1B16F5FA5E7C869 ] WinRM           C:\Windows\system32\WsmSvc.dll
14:05:42.0809 1392  WinRM - ok
14:05:42.0856 1392  [ EC339C8115E91BAED835957E9A677F16 ] Wlansvc         C:\Windows\System32\wlansvc.dll
14:05:42.0871 1392  Wlansvc - ok
14:05:42.0887 1392  [ E18AEBAAA5A773FE11AA2C70F65320F5 ] WmiAcpi         C:\Windows\system32\DRIVERS\wmiacpi.sys
14:05:42.0887 1392  WmiAcpi - ok
14:05:42.0934 1392  [ 21FA389E65A852698B6A1341F36EE02D ] wmiApSrv        C:\Windows\system32\wbem\WmiApSrv.exe
14:05:42.0934 1392  wmiApSrv - ok
14:05:42.0965 1392  WMPNetworkSvc - ok
14:05:42.0996 1392  [ CBC156C913F099E6680D1DF9307DB7A8 ] WPCSvc          C:\Windows\System32\wpcsvc.dll
14:05:42.0996 1392  WPCSvc - ok
14:05:43.0027 1392  [ 490A18B4E4D53DC10879DEAA8E8B70D9 ] WPDBusEnum      C:\Windows\system32\wpdbusenum.dll
14:05:43.0027 1392  WPDBusEnum - ok
14:05:43.0105 1392  [ 5E2401B3FC1089C90E081291357371A9 ] WpdUsb          C:\Windows\system32\DRIVERS\wpdusb.sys
14:05:43.0105 1392  WpdUsb - ok
14:05:43.0230 1392  [ 8E344C1B4FE7EDE0E9055405B9987862 ] WPFFontCache_v0400 C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WPF\WPFFontCache_v0400.exe
14:05:43.0246 1392  WPFFontCache_v0400 - ok
14:05:43.0292 1392  [ 8A900348370E359B6BFF6A550E4649E1 ] ws2ifsl         C:\Windows\system32\drivers\ws2ifsl.sys
14:05:43.0292 1392  ws2ifsl - ok
14:05:43.0324 1392  [ 9EA3E6D0EF7A5C2B9181961052A4B01A ] wscsvc          C:\Windows\system32\wscsvc.dll
14:05:43.0324 1392  wscsvc - ok
14:05:43.0324 1392  WSearch - ok
14:05:43.0448 1392  [ D9EF901DCA379CFE914E9FA13B73B4C4 ] wuauserv        C:\Windows\system32\wuaueng.dll
14:05:43.0464 1392  wuauserv - ok
14:05:43.0526 1392  [ AB886378EEB55C6C75B4F2D14B6C869F ] WudfPf          C:\Windows\system32\drivers\WudfPf.sys
14:05:43.0526 1392  WudfPf - ok
14:05:43.0558 1392  [ DDA4CAF29D8C0A297F886BFE561E6659 ] WUDFRd          C:\Windows\system32\DRIVERS\WUDFRd.sys
14:05:43.0558 1392  WUDFRd - ok
14:05:43.0604 1392  [ B20F051B03A966392364C83F009F7D17 ] wudfsvc         C:\Windows\System32\WUDFSvc.dll
14:05:43.0604 1392  wudfsvc - ok
14:05:43.0620 1392  ================ Scan global ===============================
14:05:43.0682 1392  [ 060DC3A7A9A2626031EB23D90151428D ] C:\Windows\system32\basesrv.dll
14:05:43.0729 1392  [ D665D594B7E11133D29D726BDDC7A5B0 ] C:\Windows\system32\winsrv.dll
14:05:43.0745 1392  [ D665D594B7E11133D29D726BDDC7A5B0 ] C:\Windows\system32\winsrv.dll
14:05:43.0792 1392  [ 934E0B7D77FF78C18D9F8891221B6DE3 ] C:\Windows\system32\services.exe
14:05:43.0807 1392  [Global] - ok
14:05:43.0807 1392  ================ Scan MBR ==================================
14:05:43.0823 1392  [ 1A1A06F62E891045814007163C1C76C3 ] \Device\Harddisk0\DR0
14:05:44.0010 1392  \Device\Harddisk0\DR0 - ok
14:05:44.0010 1392  [ DDAE9D649DB12F6AFF24483F2C298989 ] \Device\Harddisk1\DR1
14:05:44.0026 1392  \Device\Harddisk1\DR1 - ok
14:05:44.0026 1392  ================ Scan VBR ==================================
14:05:44.0026 1392  [ E2D5310EF4B7FDAAB9FAED35688A6E05 ] \Device\Harddisk0\DR0\Partition1
14:05:44.0026 1392  \Device\Harddisk0\DR0\Partition1 - ok
14:05:44.0041 1392  [ 6EF1F7E780F845ECDAB0B1D9070690D6 ] \Device\Harddisk0\DR0\Partition2
14:05:44.0041 1392  \Device\Harddisk0\DR0\Partition2 - ok
14:05:44.0041 1392  [ EA76A278C75D48956BEEE7743723E425 ] \Device\Harddisk1\DR1\Partition1
14:05:44.0041 1392  \Device\Harddisk1\DR1\Partition1 - ok
14:05:44.0041 1392  ============================================================
14:05:44.0041 1392  Scan finished
14:05:44.0041 1392  ============================================================
14:05:44.0072 1440  Detected object count: 0
14:05:44.0072 1440  Actual detected object count: 0
14:06:13.0447 1404  Deinitialize success



#14 portergm

portergm
  • Topic Starter

  • Members
  • 16 posts
  • OFFLINE
  •  
  • Local time:10:35 PM

Posted 14 July 2013 - 04:49 PM


Gringo,

I copied the programs (TDSSKiller and RogueKiller onto a flashdrive and then copied and pasted them onto the infected computer. I ran the programs from the C:\ of the infected computer.

After running RogueKiller, there were two reports; but neither report was named RKreport[2]. Both of the reports were RKreport[0]. I did not know which one you wanted, so I have posted both of them.

I rebooted the computer in the normal mode. The cursor still freezes up when the desktop screen appears. The Filecure program displays a message box "There appears to be an error with your installation. Please reinstall the application."

=======================================================================================================
RogueKiller V8.6.2 _x64_ [Jul 2 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : hxxp://www.adlice.com/forum/
Website : hxxp://www.adlice.com/softwares/roguekiller/
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows Vista (6.0.6002 Service Pack 2) 64 bits version
Started in : Safe mode with network support
User : Admin [Admin rights]
Mode : Remove -- Date : 07/14/2013 15:50:28
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 19 ¤¤¤
[RUN][SUSP PATH] HKCU\[...]\Run : FreeScreenSharing ("C:\Users\Admin\AppData\Local\FreeScreenSharing\FreeScreenSharing.exe" [-]) -> DELETED
[RUN][SUSP PATH] HKCU\[...]\Run : cardsMainkit24 (rundll32.exe "C:\Users\Admin\AppData\Roaming\cardsMainkit24\cardsMainkit24.dll",MotorolaMobile3d libdrvPlan64 [x][x][x][x]) -> DELETED
[RUN][SUSP PATH] HKUS\.DEFAULT\[...]\Run : Microsoft (rundll32.exe "C:\Users\Admin\AppData\Local\Microsoft Games\Microsoft\lfpdsqbz.dll",CreateTzanShellW [x][x][x]) -> DELETED
[RUN][SUSP PATH] HKUS\S-1-5-21-553043089-3181346576-219937205-1000\[...]\Run : FreeScreenSharing ("C:\Users\Admin\AppData\Local\FreeScreenSharing\FreeScreenSharing.exe" [-]) -> [0x2] The system cannot find the file specified.
[RUN][SUSP PATH] HKUS\S-1-5-21-553043089-3181346576-219937205-1000\[...]\Run : cardsMainkit24 (rundll32.exe "C:\Users\Admin\AppData\Roaming\cardsMainkit24\cardsMainkit24.dll",MotorolaMobile3d libdrvPlan64 [x][x][x][x]) -> [0x2] The system cannot find the file specified.
[RUN][SUSP PATH] HKUS\S-1-5-18\[...]\Run : Microsoft (rundll32.exe "C:\Users\Admin\AppData\Local\Microsoft Games\Microsoft\lfpdsqbz.dll",CreateTzanShellW [x][x][x]) -> [0x2] The system cannot find the file specified.
[HJ POL] HKLM\[...]\System : DisableRegistryTools (0) -> DELETED
[HJ POL] HKLM\[...]\System : ConsentPromptBehaviorAdmin (0) -> REPLACED (2)
[HJ POL] HKLM\[...]\System : ConsentPromptBehaviorUser (0) -> REPLACED (1)
[HJ POL] HKLM\[...]\System : EnableLUA (0) -> REPLACED (1)
[HJ POL] HKLM\[...]\Wow6432Node\[...]\System : DisableRegistryTools (0) -> [0x2] The system cannot find the file specified.
[HJ POL] HKLM\[...]\Wow6432Node\[...]\System : ConsentPromptBehaviorAdmin (0) -> REPLACED (2)
[HJ POL] HKLM\[...]\Wow6432Node\[...]\System : ConsentPromptBehaviorUser (0) -> REPLACED (1)
[HJ POL] HKLM\[...]\Wow6432Node\[...]\System : EnableLUA (0) -> REPLACED (1)
[HJ SECU] HKLM\[...]\Wow6432Node\[...]\Security Center : AntiVirusDisableNotify (1) -> REPLACED (0)
[HJ SECU] HKLM\[...]\Wow6432Node\[...]\Security Center : FirewallDisableNotify (1) -> REPLACED (0)
[HJ SECU] HKLM\[...]\Wow6432Node\[...]\Security Center : UpdatesDisableNotify (1) -> REPLACED (0)
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

¤¤¤ Scheduled tasks : 0 ¤¤¤

¤¤¤ Startup Entries : 0 ¤¤¤

¤¤¤ Web browsers : 0 ¤¤¤

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [NOT LOADED 0x0] ¤¤¤

¤¤¤ External Hives: ¤¤¤

¤¤¤ Infection : ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts


127.0.0.1 localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: TOSHIBA MK2546GSX +++++
--- User ---
[MBR] 24cff352f535f7120509bb40449ef23f
[BSP] afd523729e3722ee5cde6a84aaeef429 : MBR Code unknown
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 225184 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 461177955 | Size: 13288 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[0]_D_07142013_155028.txt >>
RKreport[0]_S_07142013_154919.txt
=======================================================================================================

RogueKiller V8.6.2 _x64_ [Jul 2 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : hxxp://www.adlice.com/forum/
Website : hxxp://www.adlice.com/softwares/roguekiller/
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows Vista (6.0.6002 Service Pack 2) 64 bits version
Started in : Safe mode with network support
User : Admin [Admin rights]
Mode : Scan -- Date : 07/14/2013 15:49:19
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 19 ¤¤¤
[RUN][SUSP PATH] HKCU\[...]\Run : FreeScreenSharing ("C:\Users\Admin\AppData\Local\FreeScreenSharing\FreeScreenSharing.exe" [-]) -> FOUND
[RUN][SUSP PATH] HKCU\[...]\Run : cardsMainkit24 (rundll32.exe "C:\Users\Admin\AppData\Roaming\cardsMainkit24\cardsMainkit24.dll",MotorolaMobile3d libdrvPlan64 [x][x][x][x]) -> FOUND
[RUN][SUSP PATH] HKUS\.DEFAULT\[...]\Run : Microsoft (rundll32.exe "C:\Users\Admin\AppData\Local\Microsoft Games\Microsoft\lfpdsqbz.dll",CreateTzanShellW [x][x][x]) -> FOUND
[RUN][SUSP PATH] HKUS\S-1-5-21-553043089-3181346576-219937205-1000\[...]\Run : FreeScreenSharing ("C:\Users\Admin\AppData\Local\FreeScreenSharing\FreeScreenSharing.exe" [-]) -> FOUND
[RUN][SUSP PATH] HKUS\S-1-5-21-553043089-3181346576-219937205-1000\[...]\Run : cardsMainkit24 (rundll32.exe "C:\Users\Admin\AppData\Roaming\cardsMainkit24\cardsMainkit24.dll",MotorolaMobile3d libdrvPlan64 [x][x][x][x]) -> FOUND
[RUN][SUSP PATH] HKUS\S-1-5-18\[...]\Run : Microsoft (rundll32.exe "C:\Users\Admin\AppData\Local\Microsoft Games\Microsoft\lfpdsqbz.dll",CreateTzanShellW [x][x][x]) -> FOUND
[HJ POL] HKLM\[...]\System : DisableRegistryTools (0) -> FOUND
[HJ POL] HKLM\[...]\System : ConsentPromptBehaviorAdmin (0) -> FOUND
[HJ POL] HKLM\[...]\System : ConsentPromptBehaviorUser (0) -> FOUND
[HJ POL] HKLM\[...]\System : EnableLUA (0) -> FOUND
[HJ POL] HKLM\[...]\Wow6432Node\[...]\System : DisableRegistryTools (0) -> FOUND
[HJ POL] HKLM\[...]\Wow6432Node\[...]\System : ConsentPromptBehaviorAdmin (0) -> FOUND
[HJ POL] HKLM\[...]\Wow6432Node\[...]\System : ConsentPromptBehaviorUser (0) -> FOUND
[HJ POL] HKLM\[...]\Wow6432Node\[...]\System : EnableLUA (0) -> FOUND
[HJ SECU] HKLM\[...]\Wow6432Node\[...]\Security Center : AntiVirusDisableNotify (1) -> FOUND
[HJ SECU] HKLM\[...]\Wow6432Node\[...]\Security Center : FirewallDisableNotify (1) -> FOUND
[HJ SECU] HKLM\[...]\Wow6432Node\[...]\Security Center : UpdatesDisableNotify (1) -> FOUND
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

¤¤¤ Scheduled tasks : 0 ¤¤¤

¤¤¤ Startup Entries : 0 ¤¤¤

¤¤¤ Web browsers : 0 ¤¤¤

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [NOT LOADED 0x0] ¤¤¤

¤¤¤ External Hives: ¤¤¤

¤¤¤ Infection : ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts


127.0.0.1 localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: TOSHIBA MK2546GSX +++++
--- User ---
[MBR] 24cff352f535f7120509bb40449ef23f
[BSP] afd523729e3722ee5cde6a84aaeef429 : MBR Code unknown
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 225184 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 461177955 | Size: 13288 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[0]_S_07142013_154919.txt >>

#15 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:12:35 AM

Posted 14 July 2013 - 08:41 PM




Hello portergm

Malwarebytes Anti-Rootkit

1.Download Malwarebytes Anti-Rootkit
2.Unzip the contents to a folder in a convenient location.
3.Open the folder where the contents were unzipped and run mbar.exe
4.Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
5.Click on the Cleanup button to remove any threats and reboot if prompted to do so.
6.Wait while the system shuts down and the cleanup process is performed.
7.Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
8.If no additional threats were found, verify that your system is now running normally, making sure that the following items are functional:
  • •Internet access
    •Windows Update
    •Windows Firewall
9.If there are additional problems with your system, such as any of those listed above or other system issues, then run the 'fixdamage' tool included with Malwarebytes Anti-Rootkit and reboot.
10.Verify that your system is now functioning normally.

Please download aswMBR to your desktop.
  • Double click the aswMBR.exe icon to run it
  • it will ask to download extra definitions - ALLOW IT
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.
When you are complete please send me both reports

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users