Hi SweetTech,
thanks for looking into this.
GMER scan:
GMER 1.0.15.15641 -
http://www.gmer.netRootkit scan 2011-10-23 15:34:53
Windows 6.0.6001 Service Pack 1 Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1 WDC_WD25 rev.01.0
Running: gmer.exe; Driver: C:\Users\eSteve\AppData\Local\Temp\fxliypow.sys
---- System - GMER 1.0.15 ----
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwCreateFile [0x8E82698E]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwCreateProcess [0x8E826928]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwCreateProcessEx [0x8E82693C]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwMapViewOfSection [0x8E8269CC]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwNotifyChangeKey [0x8E826A0F]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwOpenProcess [0x8E826900]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwOpenThread [0x8E826914]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwProtectVirtualMemory [0x8E8269A2]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwReplaceKey [0x8E826A37]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwRestoreKey [0x8E826A23]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwSetContextThread [0x8E82697A]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwSetInformationProcess [0x8E826966]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwTerminateProcess [0x8E8269FB]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwUnmapViewOfSection [0x8E8269E2]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwYieldExecution [0x8E8269B8]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) ZwCreateUserProcess [0x8E826952]
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) NtCreateFile
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) NtMapViewOfSection
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) NtOpenProcess
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) NtOpenThread
Code \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.) NtSetInformationProcess
---- Kernel code sections - GMER 1.0.15 ----
.text ntkrnlpa.exe!ZwYieldExecution 81C3119C 5 Bytes JMP 8E8269BC \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwNotifyChangeKey 81DCB17C 5 Bytes JMP 8E826A13 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwCreateUserProcess 81DD2DCA 5 Bytes JMP 8E826956 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwTerminateProcess 81DECF80 5 Bytes JMP 8E8269FF \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!NtOpenThread 81E0C1DC 5 Bytes JMP 8E826918 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!NtOpenProcess 81E1BB18 5 Bytes JMP 8E826904 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!NtMapViewOfSection 81E2E722 7 Bytes JMP 8E8269D0 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwUnmapViewOfSection 81E2ED79 5 Bytes JMP 8E8269E6 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!NtCreateFile 81E30F8A 5 Bytes JMP 8E826992 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!NtSetInformationProcess 81E3E648 5 Bytes JMP 8E82696A \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwProtectVirtualMemory 81E408A2 7 Bytes JMP 8E8269A6 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwRestoreKey 81E5F402 5 Bytes JMP 8E826A27 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwReplaceKey 81E6044E 5 Bytes JMP 8E826A3B \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwCreateProcess 81E9E16D 5 Bytes JMP 8E82692C \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwCreateProcessEx 81E9E1B8 7 Bytes JMP 8E826940 \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
PAGE ntkrnlpa.exe!ZwSetContextThread 81E9EC77 5 Bytes JMP 8E82697E \SystemRoot\system32\drivers\mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
.text kdcom.dll!KdSendPacket 80610041 37 Bytes [0B, B8, FF, FF, 00, 00, 66, ...]
.text kdcom.dll!KdSendPacket 80610067 230 Bytes [81, EC, 6C, 01, 00, 00, 53, ...]
.text kdcom.dll!KdSave + 2 8061014E 62 Bytes [C7, 8D, 50, 02, 66, 8B, 08, ...]
.text kdcom.dll!KdRestore + 31 8061018D 17 Bytes [00, 8B, B4, 1E, E0, 00, 00, ...]
.text kdcom.dll!KdRestore + 43 8061019F 253 Bytes [FC, 50, FF, 75, 0C, 56, E8, ...]
.text kdcom.dll!KdRestore + 141 8061029D 67 Bytes [55, 8B, EC, 83, EC, 14, 83, ...]
.text kdcom.dll!KdRestore + 185 806102E1 36 Bytes [59, 59, 85, C0, 75, 09, 8B, ...]
.text kdcom.dll!KdRestore + 1AA 80610306 33 Bytes [7D, FF, 00, 74, A9, 83, 7B, ...]
.text ...
PAGEKD kdcom.dll!KdReceivePacket + 25 80612199 6 Bytes [00, 00, 00, 00, 00, 00] {ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL}
PAGEKD kdcom.dll!KdReceivePacket + 2D 806121A1 40 Bytes [00, 00, 00, 00, 00, 00, 00, ...]
PAGEKD kdcom.dll!KdReceivePacket + 56 806121CA 9 Bytes [00, 00, 00, 00, 00, 00, 00, ...]
PAGEKD kdcom.dll!KdReceivePacket + 61 806121D5 20 Bytes [00, 00, 00, 00, 00, 00, 00, ...]
PAGEKD kdcom.dll!KdReceivePacket + 77 806121EB 16 Bytes [00, 00, 00, 00, 00, 00, 00, ...] {ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL}
PAGEKD ...
PAGEKD kdcom.dll!KdSendPacket + 58 80612444 5 Bytes [00, 00, 00, 00, 00]
PAGEKD kdcom.dll!KdSendPacket + 5E 8061244A 3 Bytes [00, 00, 00]
PAGEKD kdcom.dll!KdSendPacket + 62 8061244E 14 Bytes [00, 00, 00, 00, 00, 00, 00, ...] {ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL}
PAGEKD kdcom.dll!KdSendPacket + 72 8061245E 14 Bytes [00, 00, 00, 00, 00, 00, 00, ...] {ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL}
PAGEKD kdcom.dll!KdSendPacket + 82 8061246E 14 Bytes [00, 00, 00, 00, 00, 00, 00, ...] {ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL; ADD [EAX], AL}
PAGEKD ...
.text C:\Windows\system32\DRIVERS\tos_sps32.sys section is writeable [0x89D59480, 0x3C939, 0xE8000020]
.dsrt C:\Windows\system32\DRIVERS\tos_sps32.sys unknown last section [0x89D9A900, 0x3CA, 0x48000040]
---- User code sections - GMER 1.0.15 ----
.text c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe[404] kernel32.dll!LoadLibraryW 7782382D 5 Bytes JMP 0041C3C0 c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe (McAfee Proxy Service Module/McAfee, Inc.)
.text c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe[404] kernel32.dll!LoadLibraryA 77829671 5 Bytes JMP 0041C340 c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe (McAfee Proxy Service Module/McAfee, Inc.)
.text C:\Windows\system32\services.exe[708] kernel32.dll!GetStartupInfoW 77801929 5 Bytes JMP 001900AB
.text C:\Windows\system32\services.exe[708] kernel32.dll!GetStartupInfoA 778019C9 5 Bytes JMP 00190F65
.text C:\Windows\system32\services.exe[708] kernel32.dll!CreateProcessW 77801C01 5 Bytes JMP 00190F2F
.text C:\Windows\system32\services.exe[708] kernel32.dll!CreateProcessA 77801C36 5 Bytes JMP 00190F4A
.text C:\Windows\system32\services.exe[708] kernel32.dll!VirtualProtect 77801DD1 5 Bytes JMP 00190075
.text C:\Windows\system32\services.exe[708] kernel32.dll!CreateNamedPipeW 77805C44 5 Bytes JMP 00190022
.text C:\Windows\system32\services.exe[708] kernel32.dll!LoadLibraryExW 7782374A 5 Bytes JMP 00190F9B
.text C:\Windows\system32\services.exe[708] kernel32.dll!LoadLibraryW 7782382D 5 Bytes JMP 0019003D
.text C:\Windows\system32\services.exe[708] kernel32.dll!VirtualProtectEx 77828F5E 5 Bytes JMP 00190F80
.text C:\Windows\system32\services.exe[708] kernel32.dll!LoadLibraryExA 77829649 5 Bytes JMP 0019004E
.text C:\Windows\system32\services.exe[708] kernel32.dll!LoadLibraryA 77829671 5 Bytes JMP 00190FB6
.text C:\Windows\system32\services.exe[708] kernel32.dll!CreatePipe 77830474 5 Bytes JMP 00190090
.text C:\Windows\system32\services.exe[708] kernel32.dll!GetProcAddress 7784BAC6 5 Bytes JMP 001900E1
.text C:\Windows\system32\services.exe[708] kernel32.dll!CreateFileW 7784CE4E 5 Bytes JMP 00190011
.text C:\Windows\system32\services.exe[708] kernel32.dll!CreateFileA 7784D171 5 Bytes JMP 00190000
.text C:\Windows\system32\services.exe[708] kernel32.dll!CreateNamedPipeA 7789462E 5 Bytes JMP 00190FD1
.text C:\Windows\system32\services.exe[708] kernel32.dll!WinExec 7789580B 5 Bytes JMP 001900BC
.text C:\Windows\system32\services.exe[708] ADVAPI32.dll!RegCreateKeyExA 77B3B5E7 5 Bytes JMP 006F0040
.text C:\Windows\system32\services.exe[708] ADVAPI32.dll!RegCreateKeyA 77B3B8AE 5 Bytes JMP 006F0FB9
.text C:\Windows\system32\services.exe[708] ADVAPI32.dll!RegOpenKeyA 77B40BF5 5 Bytes JMP 006F0000
.text C:\Windows\system32\services.exe[708] ADVAPI32.dll!RegCreateKeyW 77B4B83D 5 Bytes JMP 006F0FA8
.text C:\Windows\system32\services.exe[708] ADVAPI32.dll!RegCreateKeyExW 77B4BCE1 5 Bytes JMP 006F0F79
.text C:\Windows\system32\services.exe[708] ADVAPI32.dll!RegOpenKeyExA 77B4D4E8 5 Bytes JMP 006F0025
.text C:\Windows\system32\services.exe[708] ADVAPI32.dll!RegOpenKeyW 77B53CB0 5 Bytes JMP 006F0FEF
.text C:\Windows\system32\services.exe[708] ADVAPI32.dll!RegOpenKeyExW 77B5F09D 5 Bytes JMP 006F0FD4
.text C:\Windows\system32\services.exe[708] msvcrt.dll!_wsystem 77938A47 5 Bytes JMP 006E003D
.text C:\Windows\system32\services.exe[708] msvcrt.dll!system 77938B63 5 Bytes JMP 006E0FB2
.text C:\Windows\system32\services.exe[708] msvcrt.dll!_creat 7793C6F1 5 Bytes JMP 006E0FCD
.text C:\Windows\system32\services.exe[708] msvcrt.dll!_open 7793DA7E 5 Bytes JMP 006E0000
.text C:\Windows\system32\services.exe[708] msvcrt.dll!_wcreat 7793DC9E 5 Bytes JMP 006E0022
.text C:\Windows\system32\services.exe[708] msvcrt.dll!_wopen 7793DE79 5 Bytes JMP 006E0011
.text C:\Windows\system32\services.exe[708] WS2_32.dll!socket 777036D1 5 Bytes JMP 0018000A
.text C:\Windows\system32\lsass.exe[792] kernel32.dll!GetStartupInfoW 77801929 5 Bytes JMP 001D00B3
.text C:\Windows\system32\lsass.exe[792] kernel32.dll!GetStartupInfoA 778019C9 5 Bytes JMP 001D0F63
.text C:\Windows\system32\lsass.exe[792] kernel32.dll!CreateProcessW 77801C01 5 Bytes JMP 001D00D5
.text C:\Windows\system32\lsass.exe[792] kernel32.dll!CreateProcessA 77801C36 5 Bytes JMP 001D0F3E
.text C:\Windows\system32\lsass.exe[792] kernel32.dll!VirtualProtect 77801DD1 5 Bytes JMP 001D007D
.text C:\Windows\system32\lsass.exe[792] kernel32.dll!CreateNamedPipeW 77805C44 5 Bytes JMP 001D0FD1
.text C:\Windows\system32\lsass.exe[792] kernel32.dll!LoadLibraryExW 7782374A 5 Bytes JMP 001D006C
.text C:\Windows\system32\lsass.exe[792] kernel32.dll!LoadLibraryW 7782382D 5 Bytes JMP 001D0FAF
.text C:\Windows\system32\lsass.exe[792] kernel32.dll!VirtualProtectEx 77828F5E 5 Bytes JMP 001D0F88
.text C:\Windows\system32\lsass.exe[792] kernel32.dll!LoadLibraryExA 77829649 5 Bytes JMP 001D0051
.text C:\Windows\system32\lsass.exe[792] kernel32.dll!LoadLibraryA 77829671 5 Bytes JMP 001D0FC0
.text C:\Windows\system32\lsass.exe[792] kernel32.dll!CreatePipe 77830474 5 Bytes JMP 001D008E
.text C:\Windows\system32\lsass.exe[792] kernel32.dll!GetProcAddress 7784BAC6 5 Bytes JMP 001D0F23
.text C:\Windows\system32\lsass.exe[792] kernel32.dll!CreateFileW 7784CE4E 5 Bytes JMP 001D0011
.text C:\Windows\system32\lsass.exe[792] kernel32.dll!CreateFileA 7784D171 5 Bytes JMP 001D0000
.text C:\Windows\system32\lsass.exe[792] kernel32.dll!CreateNamedPipeA 7789462E 5 Bytes JMP 001D002C
.text C:\Windows\system32\lsass.exe[792] kernel32.dll!WinExec 7789580B 5 Bytes JMP 001D00C4
.text C:\Windows\system32\lsass.exe[792] ADVAPI32.dll!RegCreateKeyExA 77B3B5E7 5 Bytes JMP 004E0FA8
.text C:\Windows\system32\lsass.exe[792] ADVAPI32.dll!RegCreateKeyA 77B3B8AE 5 Bytes JMP 004E0040
.text C:\Windows\system32\lsass.exe[792] ADVAPI32.dll!RegOpenKeyA 77B40BF5 5 Bytes JMP 004E0000
.text C:\Windows\system32\lsass.exe[792] ADVAPI32.dll!RegCreateKeyW 77B4B83D 5 Bytes JMP 004E0FB9
.text C:\Windows\system32\lsass.exe[792] ADVAPI32.dll!RegCreateKeyExW 77B4BCE1 5 Bytes JMP 004E0065
.text C:\Windows\system32\lsass.exe[792] ADVAPI32.dll!RegOpenKeyExA 77B4D4E8 5 Bytes JMP 004E0FD4
.text C:\Windows\system32\lsass.exe[792] ADVAPI32.dll!RegOpenKeyW 77B53CB0 5 Bytes JMP 004E0FE5
.text C:\Windows\system32\lsass.exe[792] ADVAPI32.dll!RegOpenKeyExW 77B5F09D 5 Bytes JMP 004E001B
.text C:\Windows\system32\lsass.exe[792] msvcrt.dll!_wsystem 77938A47 5 Bytes JMP 001E0F90
.text C:\Windows\system32\lsass.exe[792] msvcrt.dll!system 77938B63 5 Bytes JMP 001E0025
.text C:\Windows\system32\lsass.exe[792] msvcrt.dll!_creat 7793C6F1 5 Bytes JMP 001E0FC6
.text C:\Windows\system32\lsass.exe[792] msvcrt.dll!_open 7793DA7E 5 Bytes JMP 001E0000
.text C:\Windows\system32\lsass.exe[792] msvcrt.dll!_wcreat 7793DC9E 5 Bytes JMP 001E0FB5
.text C:\Windows\system32\lsass.exe[792] msvcrt.dll!_wopen 7793DE79 5 Bytes JMP 001E0FD7
.text C:\Windows\system32\lsass.exe[792] WS2_32.dll!socket 777036D1 5 Bytes JMP 001C0000
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!GetStartupInfoW 77801929 5 Bytes JMP 00370F79
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!GetStartupInfoA 778019C9 5 Bytes JMP 003700BF
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!CreateProcessW 77801C01 5 Bytes JMP 00370F32
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!CreateProcessA 77801C36 5 Bytes JMP 00370F4D
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!VirtualProtect 77801DD1 5 Bytes JMP 00370F94
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!CreateNamedPipeW 77805C44 5 Bytes JMP 0037002C
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!LoadLibraryExW 7782374A 5 Bytes JMP 00370062
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!LoadLibraryW 7782382D 5 Bytes JMP 00370047
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!VirtualProtectEx 77828F5E 5 Bytes JMP 00370089
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!LoadLibraryExA 77829649 5 Bytes JMP 00370FA5
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!LoadLibraryA 77829671 5 Bytes JMP 00370FC0
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!CreatePipe 77830474 5 Bytes JMP 003700AE
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!GetProcAddress 7784BAC6 5 Bytes JMP 00370F17
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!CreateFileW 7784CE4E 5 Bytes JMP 00370FE5
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!CreateFileA 7784D171 5 Bytes JMP 00370000
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!CreateNamedPipeA 7789462E 5 Bytes JMP 0037001B
.text C:\Windows\system32\svchost.exe[936] kernel32.dll!WinExec 7789580B 5 Bytes JMP 00370F68
.text C:\Windows\system32\svchost.exe[936] msvcrt.dll!_wsystem 77938A47 5 Bytes JMP 00380031
.text C:\Windows\system32\svchost.exe[936] msvcrt.dll!system 77938B63 5 Bytes JMP 00380FA6
.text C:\Windows\system32\svchost.exe[936] msvcrt.dll!_creat 7793C6F1 5 Bytes JMP 00380FC8
.text C:\Windows\system32\svchost.exe[936] msvcrt.dll!_open 7793DA7E 5 Bytes JMP 00380000
.text C:\Windows\system32\svchost.exe[936] msvcrt.dll!_wcreat 7793DC9E 5 Bytes JMP 00380FB7
.text C:\Windows\system32\svchost.exe[936] msvcrt.dll!_wopen 7793DE79 5 Bytes JMP 00380FE3
.text C:\Windows\system32\svchost.exe[936] ADVAPI32.dll!RegCreateKeyExA 77B3B5E7 5 Bytes JMP 003A0F90
.text C:\Windows\system32\svchost.exe[936] ADVAPI32.dll!RegCreateKeyA 77B3B8AE 1 Byte [E9]
.text C:\Windows\system32\svchost.exe[936] ADVAPI32.dll!RegCreateKeyA 77B3B8AE 5 Bytes JMP 003A0FB2
.text C:\Windows\system32\svchost.exe[936] ADVAPI32.dll!RegOpenKeyA 77B40BF5 5 Bytes JMP 003A0FEF
.text C:\Windows\system32\svchost.exe[936] ADVAPI32.dll!RegCreateKeyW 77B4B83D 5 Bytes JMP 003A0FA1
.text C:\Windows\system32\svchost.exe[936] ADVAPI32.dll!RegCreateKeyExW 77B4BCE1 5 Bytes JMP 003A0043
.text C:\Windows\system32\svchost.exe[936] ADVAPI32.dll!RegOpenKeyExA 77B4D4E8 5 Bytes JMP 003A0FC3
.text C:\Windows\system32\svchost.exe[936] ADVAPI32.dll!RegOpenKeyW 77B53CB0 5 Bytes JMP 003A0FDE
.text C:\Windows\system32\svchost.exe[936] ADVAPI32.dll!RegOpenKeyExW 77B5F09D 5 Bytes JMP 003A001E
.text C:\Windows\system32\svchost.exe[936] WS2_32.dll!socket 777036D1 5 Bytes JMP 00360000
.text C:\Windows\system32\svchost.exe[1040] kernel32.dll!GetStartupInfoW 77801929 5 Bytes JMP 000D0082
.text C:\Windows\system32\svchost.exe[1040] kernel32.dll!GetStartupInfoA 778019C9 5 Bytes JMP 000D0F32
.text C:\Windows\system32\svchost.exe[1040] kernel32.dll!CreateProcessW 77801C01 5 Bytes JMP 000D00B8
.text C:\Windows\system32\svchost.exe[1040] kernel32.dll!CreateProcessA 77801C36 5 Bytes JMP 000D009D
.text C:\Windows\system32\svchost.exe[1040] kernel32.dll!VirtualProtect 77801DD1 5 Bytes JMP 000D0F68
.text C:\Windows\system32\svchost.exe[1040] kernel32.dll!CreateNamedPipeW 77805C44 5 Bytes JMP 000D0011
.text C:\Windows\system32\svchost.exe[1040] kernel32.dll!LoadLibraryExW 7782374A 5 Bytes JMP 000D0F79
.text C:\Windows\system32\svchost.exe[1040] kernel32.dll!LoadLibraryW 7782382D 5 Bytes JMP 000D0F94
.text C:\Windows\system32\svchost.exe[1040] kernel32.dll!VirtualProtectEx 77828F5E 5 Bytes JMP 000D0053
.text C:\Windows\system32\svchost.exe[1040] kernel32.dll!LoadLibraryExA 77829649 5 Bytes JMP 000D0036
.text C:\Windows\system32\svchost.exe[1040] kernel32.dll!LoadLibraryA 77829671 5 Bytes JMP 000D0FA5
.text C:\Windows\system32\svchost.exe[1040] kernel32.dll!CreatePipe 77830474 5 Bytes JMP 000D0F43
.text C:\Windows\system32\svchost.exe[1040] kernel32.dll!GetProcAddress 7784BAC6 5 Bytes JMP 000D0F06
.text C:\Windows\system32\svchost.exe[1040] kernel32.dll!CreateFileW 7784CE4E 5 Bytes JMP 000D0000
.text C:\Windows\system32\svchost.exe[1040] kernel32.dll!CreateFileA 7784D171 5 Bytes JMP 000D0FEF
.text C:\Windows\system32\svchost.exe[1040] kernel32.dll!CreateNamedPipeA 7789462E 5 Bytes JMP 000D0FCA
.text C:\Windows\system32\svchost.exe[1040] kernel32.dll!WinExec 7789580B 5 Bytes JMP 000D0F21
.text C:\Windows\system32\svchost.exe[1040] msvcrt.dll!_wsystem 77938A47 5 Bytes JMP 000E0FA6
.text C:\Windows\system32\svchost.exe[1040] msvcrt.dll!system 77938B63 5 Bytes JMP 000E0FB7
.text C:\Windows\system32\svchost.exe[1040] msvcrt.dll!_creat 7793C6F1 5 Bytes JMP 000E001D
.text C:\Windows\system32\svchost.exe[1040] msvcrt.dll!_open 7793DA7E 5 Bytes JMP 000E0FEF
.text C:\Windows\system32\svchost.exe[1040] msvcrt.dll!_wcreat 7793DC9E 5 Bytes JMP 000E0FC8
.text C:\Windows\system32\svchost.exe[1040] msvcrt.dll!_wopen 7793DE79 5 Bytes JMP 000E0000
.text C:\Windows\system32\svchost.exe[1040] ADVAPI32.dll!RegCreateKeyExA 77B3B5E7 5 Bytes JMP 000F0F83
.text C:\Windows\system32\svchost.exe[1040] ADVAPI32.dll!RegCreateKeyA 77B3B8AE 5 Bytes JMP 000F0F9E
.text C:\Windows\system32\svchost.exe[1040] ADVAPI32.dll!RegOpenKeyA 77B40BF5 5 Bytes JMP 000F0FE5
.text C:\Windows\system32\svchost.exe[1040] ADVAPI32.dll!RegCreateKeyW 77B4B83D 5 Bytes JMP 000F001B
.text C:\Windows\system32\svchost.exe[1040] ADVAPI32.dll!RegCreateKeyExW 77B4BCE1 5 Bytes JMP 000F0F72
.text C:\Windows\system32\svchost.exe[1040] ADVAPI32.dll!RegOpenKeyExA 77B4D4E8 5 Bytes JMP 000F0FCA
.text C:\Windows\system32\svchost.exe[1040] ADVAPI32.dll!RegOpenKeyW 77B53CB0 5 Bytes JMP 000F0000
.text C:\Windows\system32\svchost.exe[1040] ADVAPI32.dll!RegOpenKeyExW 77B5F09D 5 Bytes JMP 000F0FAF
.text C:\Windows\system32\svchost.exe[1040] WS2_32.dll!socket 777036D1 5 Bytes JMP 000C0FEF
.text C:\Windows\System32\svchost.exe[1092] kernel32.dll!GetStartupInfoW 77801929 5 Bytes JMP 00260F5B
.text C:\Windows\System32\svchost.exe[1092] kernel32.dll!GetStartupInfoA 778019C9 5 Bytes JMP 00260F76
.text C:\Windows\System32\svchost.exe[1092] kernel32.dll!CreateProcessW 77801C01 5 Bytes JMP 002600D0
.text C:\Windows\System32\svchost.exe[1092] kernel32.dll!CreateProcessA 77801C36 5 Bytes JMP 00260F39
.text C:\Windows\System32\svchost.exe[1092] kernel32.dll!VirtualProtect 77801DD1 5 Bytes JMP 00260086
.text C:\Windows\System32\svchost.exe[1092] kernel32.dll!CreateNamedPipeW 77805C44 5 Bytes JMP 0026002C
.text C:\Windows\System32\svchost.exe[1092] kernel32.dll!LoadLibraryExW 7782374A 5 Bytes JMP 00260069
.text C:\Windows\System32\svchost.exe[1092] kernel32.dll!LoadLibraryW 7782382D 5 Bytes JMP 00260047
.text C:\Windows\System32\svchost.exe[1092] kernel32.dll!VirtualProtectEx 77828F5E 5 Bytes JMP 002600A1
.text C:\Windows\System32\svchost.exe[1092] kernel32.dll!LoadLibraryExA 77829649 5 Bytes JMP 00260058
.text C:\Windows\System32\svchost.exe[1092] kernel32.dll!LoadLibraryA 77829671 5 Bytes JMP 00260FCA
.text C:\Windows\System32\svchost.exe[1092] kernel32.dll!CreatePipe 77830474 5 Bytes JMP 00260F87
.text C:\Windows\System32\svchost.exe[1092] kernel32.dll!GetProcAddress 7784BAC6 5 Bytes JMP 00260F1E
.text C:\Windows\System32\svchost.exe[1092] kernel32.dll!CreateFileW 7784CE4E 5 Bytes JMP 00260011
.text C:\Windows\System32\svchost.exe[1092] kernel32.dll!CreateFileA 7784D171 5 Bytes JMP 00260000
.text C:\Windows\System32\svchost.exe[1092] kernel32.dll!CreateNamedPipeA 7789462E 5 Bytes JMP 00260FDB
.text C:\Windows\System32\svchost.exe[1092] kernel32.dll!WinExec 7789580B 5 Bytes JMP 00260F4A
.text C:\Windows\System32\svchost.exe[1092] msvcrt.dll!_wsystem 77938A47 5 Bytes JMP 00270064
.text C:\Windows\System32\svchost.exe[1092] msvcrt.dll!system 77938B63 5 Bytes JMP 00270049
.text C:\Windows\System32\svchost.exe[1092] msvcrt.dll!_creat 7793C6F1 5 Bytes JMP 0027001D
.text C:\Windows\System32\svchost.exe[1092] msvcrt.dll!_open 7793DA7E 5 Bytes JMP 00270FEF
.text C:\Windows\System32\svchost.exe[1092] msvcrt.dll!_wcreat 7793DC9E 5 Bytes JMP 0027002E
.text C:\Windows\System32\svchost.exe[1092] msvcrt.dll!_wopen 7793DE79 5 Bytes JMP 0027000C
.text C:\Windows\System32\svchost.exe[1092] ADVAPI32.dll!RegCreateKeyExA 77B3B5E7 5 Bytes JMP 00280051
.text C:\Windows\System32\svchost.exe[1092] ADVAPI32.dll!RegCreateKeyA 77B3B8AE 5 Bytes JMP 00280FC3
.text C:\Windows\System32\svchost.exe[1092] ADVAPI32.dll!RegOpenKeyA 77B40BF5 5 Bytes JMP 00280FEF
.text C:\Windows\System32\svchost.exe[1092] ADVAPI32.dll!RegCreateKeyW 77B4B83D 5 Bytes JMP 00280040
.text C:\Windows\System32\svchost.exe[1092] ADVAPI32.dll!RegCreateKeyExW 77B4BCE1 5 Bytes JMP 0028006C
.text C:\Windows\System32\svchost.exe[1092] ADVAPI32.dll!RegOpenKeyExA 77B4D4E8 5 Bytes JMP 0028000A
.text C:\Windows\System32\svchost.exe[1092] ADVAPI32.dll!RegOpenKeyW 77B53CB0 5 Bytes JMP 00280FD4
.text C:\Windows\System32\svchost.exe[1092] ADVAPI32.dll!RegOpenKeyExW 77B5F09D 5 Bytes JMP 00280025
.text C:\Windows\System32\svchost.exe[1092] WS2_32.dll!socket 777036D1 5 Bytes JMP 00240000
.text C:\Windows\System32\svchost.exe[1168] kernel32.dll!GetStartupInfoW 77801929 5 Bytes JMP 007500C4
.text C:\Windows\System32\svchost.exe[1168] kernel32.dll!GetStartupInfoA 778019C9 5 Bytes JMP 00750F7E
.text C:\Windows\System32\svchost.exe[1168] kernel32.dll!CreateProcessW 77801C01 5 Bytes JMP 00750F59
.text C:\Windows\System32\svchost.exe[1168] kernel32.dll!CreateProcessA 77801C36 5 Bytes JMP 007500F0
.text C:\Windows\System32\svchost.exe[1168] kernel32.dll!VirtualProtect 77801DD1 5 Bytes JMP 00750098
.text C:\Windows\System32\svchost.exe[1168] kernel32.dll!CreateNamedPipeW 77805C44 5 Bytes JMP 00750036
.text C:\Windows\System32\svchost.exe[1168] kernel32.dll!LoadLibraryExW 7782374A 5 Bytes JMP 00750FC0
.text C:\Windows\System32\svchost.exe[1168] kernel32.dll!LoadLibraryW 7782382D 5 Bytes JMP 0075006C
.text C:\Windows\System32\svchost.exe[1168] kernel32.dll!VirtualProtectEx 77828F5E 5 Bytes JMP 007500A9
.text C:\Windows\System32\svchost.exe[1168] kernel32.dll!LoadLibraryExA 77829649 5 Bytes JMP 0075007D
.text C:\Windows\System32\svchost.exe[1168] kernel32.dll!LoadLibraryA 77829671 5 Bytes JMP 00750051
.text C:\Windows\System32\svchost.exe[1168] kernel32.dll!CreatePipe 77830474 5 Bytes JMP 00750F99
.text C:\Windows\System32\svchost.exe[1168] kernel32.dll!GetProcAddress 7784BAC6 5 Bytes JMP 00750F48
.text C:\Windows\System32\svchost.exe[1168] kernel32.dll!CreateFileW 7784CE4E 5 Bytes JMP 00750FE5
.text C:\Windows\System32\svchost.exe[1168] kernel32.dll!CreateFileA 7784D171 5 Bytes JMP 00750000
.text C:\Windows\System32\svchost.exe[1168] kernel32.dll!CreateNamedPipeA 7789462E 5 Bytes JMP 0075001B
.text C:\Windows\System32\svchost.exe[1168] kernel32.dll!WinExec 7789580B 5 Bytes JMP 007500D5
.text C:\Windows\System32\svchost.exe[1168] msvcrt.dll!_wsystem 77938A47 5 Bytes JMP 00760F9C
.text C:\Windows\System32\svchost.exe[1168] msvcrt.dll!system 77938B63 5 Bytes JMP 00760FAD
.text C:\Windows\System32\svchost.exe[1168] msvcrt.dll!_creat 7793C6F1 5 Bytes JMP 00760FE3
.text C:\Windows\System32\svchost.exe[1168] msvcrt.dll!_open 7793DA7E 5 Bytes JMP 00760000
.text C:\Windows\System32\svchost.exe[1168] msvcrt.dll!_wcreat 7793DC9E 5 Bytes JMP 00760FC8
.text C:\Windows\System32\svchost.exe[1168] msvcrt.dll!_wopen 7793DE79 5 Bytes JMP 00760011
.text C:\Windows\System32\svchost.exe[1168] ADVAPI32.dll!RegCreateKeyExA 77B3B5E7 5 Bytes JMP 0077004A
.text C:\Windows\System32\svchost.exe[1168] ADVAPI32.dll!RegCreateKeyA 77B3B8AE 5 Bytes JMP 0077002F
.text C:\Windows\System32\svchost.exe[1168] ADVAPI32.dll!RegOpenKeyA 77B40BF5 5 Bytes JMP 0077000A
.text C:\Windows\System32\svchost.exe[1168] ADVAPI32.dll!RegCreateKeyW 77B4B83D 5 Bytes JMP 00770FA8
.text C:\Windows\System32\svchost.exe[1168] ADVAPI32.dll!RegCreateKeyExW 77B4BCE1 5 Bytes JMP 0077005B
.text C:\Windows\System32\svchost.exe[1168] ADVAPI32.dll!RegOpenKeyExA 77B4D4E8 5 Bytes JMP 00770FDE
.text C:\Windows\System32\svchost.exe[1168] ADVAPI32.dll!RegOpenKeyW 77B53CB0 5 Bytes JMP 00770FEF
.text C:\Windows\System32\svchost.exe[1168] ADVAPI32.dll!RegOpenKeyExW 77B5F09D 5 Bytes JMP 00770FCD
.text C:\Windows\System32\svchost.exe[1168] WS2_32.dll!socket 777036D1 5 Bytes JMP 00740000
.text C:\Windows\System32\svchost.exe[1192] kernel32.dll!GetStartupInfoW 77801929 5 Bytes JMP 00900F7C
.text C:\Windows\System32\svchost.exe[1192] kernel32.dll!GetStartupInfoA 778019C9 5 Bytes JMP 009000C2
.text C:\Windows\System32\svchost.exe[1192] kernel32.dll!CreateProcessW 77801C01 5 Bytes JMP 009000DD
.text C:\Windows\System32\svchost.exe[1192] kernel32.dll!CreateProcessA 77801C36 5 Bytes JMP 00900F46
.text C:\Windows\System32\svchost.exe[1192] kernel32.dll!VirtualProtect 77801DD1 5 Bytes JMP 0090008C
.text C:\Windows\System32\svchost.exe[1192] kernel32.dll!CreateNamedPipeW 77805C44 5 Bytes JMP 00900014
.text C:\Windows\System32\svchost.exe[1192] kernel32.dll!LoadLibraryExW 7782374A 5 Bytes JMP 00900FB2
.text C:\Windows\System32\svchost.exe[1192] kernel32.dll!LoadLibraryW 7782382D 5 Bytes JMP 0090004A
.text C:\Windows\System32\svchost.exe[1192] kernel32.dll!VirtualProtectEx 77828F5E 5 Bytes JMP 009000B1
.text C:\Windows\System32\svchost.exe[1192] kernel32.dll!LoadLibraryExA 77829649 5 Bytes JMP 00900065
.text C:\Windows\System32\svchost.exe[1192] kernel32.dll!LoadLibraryA 77829671 5 Bytes JMP 0090002F
.text C:\Windows\System32\svchost.exe[1192] kernel32.dll!CreatePipe 77830474 5 Bytes JMP 00900FA1
.text C:\Windows\System32\svchost.exe[1192] kernel32.dll!GetProcAddress 7784BAC6 5 Bytes JMP 00900F2B
.text C:\Windows\System32\svchost.exe[1192] kernel32.dll!CreateFileW 7784CE4E 5 Bytes JMP 00900FD4
.text C:\Windows\System32\svchost.exe[1192] kernel32.dll!CreateFileA 7784D171 5 Bytes JMP 00900FE5
.text C:\Windows\System32\svchost.exe[1192] kernel32.dll!CreateNamedPipeA 7789462E 5 Bytes JMP 00900FC3
.text C:\Windows\System32\svchost.exe[1192] kernel32.dll!WinExec 7789580B 5 Bytes JMP 00900F61
.text C:\Windows\System32\svchost.exe[1192] msvcrt.dll!_wsystem 77938A47 5 Bytes JMP 00950F92
.text C:\Windows\System32\svchost.exe[1192] msvcrt.dll!system 77938B63 5 Bytes JMP 00950FB7
.text C:\Windows\System32\svchost.exe[1192] msvcrt.dll!_creat 7793C6F1 5 Bytes JMP 0095001D
.text C:\Windows\System32\svchost.exe[1192] msvcrt.dll!_open 7793DA7E 5 Bytes JMP 00950FEF
.text C:\Windows\System32\svchost.exe[1192] msvcrt.dll!_wcreat 7793DC9E 5 Bytes JMP 00950FC8
.text C:\Windows\System32\svchost.exe[1192] msvcrt.dll!_wopen 7793DE79 5 Bytes JMP 0095000C
.text C:\Windows\System32\svchost.exe[1192] ADVAPI32.dll!RegCreateKeyExA 77B3B5E7 5 Bytes JMP 00960FAC
.text C:\Windows\System32\svchost.exe[1192] ADVAPI32.dll!RegCreateKeyA 77B3B8AE 5 Bytes JMP 0096003D
.text C:\Windows\System32\svchost.exe[1192] ADVAPI32.dll!RegOpenKeyA 77B40BF5 5 Bytes JMP 00960FEF
.text C:\Windows\System32\svchost.exe[1192] ADVAPI32.dll!RegCreateKeyW 77B4B83D 5 Bytes JMP 0096004E
.text C:\Windows\System32\svchost.exe[1192] ADVAPI32.dll!RegCreateKeyExW 77B4BCE1 5 Bytes JMP 0096005F
.text C:\Windows\System32\svchost.exe[1192] ADVAPI32.dll!RegOpenKeyExA 77B4D4E8 5 Bytes JMP 0096001B
.text C:\Windows\System32\svchost.exe[1192] ADVAPI32.dll!RegOpenKeyW 77B53CB0 5 Bytes JMP 0096000A
.text C:\Windows\System32\svchost.exe[1192] ADVAPI32.dll!RegOpenKeyExW 77B5F09D 5 Bytes JMP 0096002C
.text C:\Windows\System32\svchost.exe[1192] WS2_32.dll!socket 777036D1 5 Bytes JMP 008F000A
.text C:\Windows\system32\svchost.exe[1224] kernel32.dll!GetStartupInfoW 77801929 5 Bytes JMP 00360F63
.text C:\Windows\system32\svchost.exe[1224] kernel32.dll!GetStartupInfoA 778019C9 5 Bytes JMP 003600A9
.text C:\Windows\system32\svchost.exe[1224] kernel32.dll!CreateProcessW 77801C01 5 Bytes JMP 003600E6
.text C:\Windows\system32\svchost.exe[1224] kernel32.dll!CreateProcessA 77801C36 5 Bytes JMP 003600D5
.text C:\Windows\system32\svchost.exe[1224] kernel32.dll!VirtualProtect 77801DD1 5 Bytes JMP 00360087
.text C:\Windows\system32\svchost.exe[1224] kernel32.dll!CreateNamedPipeW 77805C44 5 Bytes JMP 00360FE5
.text C:\Windows\system32\svchost.exe[1224] kernel32.dll!LoadLibraryExW 7782374A 5 Bytes JMP 00360076
.text C:\Windows\system32\svchost.exe[1224] kernel32.dll!LoadLibraryW 7782382D 5 Bytes JMP 00360FCA
.text C:\Windows\system32\svchost.exe[1224] kernel32.dll!VirtualProtectEx 77828F5E 5 Bytes JMP 00360F88
.text C:\Windows\system32\svchost.exe[1224] kernel32.dll!LoadLibraryExA 77829649 5 Bytes JMP 00360FB9
.text C:\Windows\system32\svchost.exe[1224] kernel32.dll!LoadLibraryA 77829671 5 Bytes JMP 00360051
.text C:\Windows\system32\svchost.exe[1224] kernel32.dll!CreatePipe 77830474 5 Bytes JMP 00360098
.text C:\Windows\system32\svchost.exe[1224] kernel32.dll!GetProcAddress 7784BAC6 5 Bytes JMP 00360F34
.text C:\Windows\system32\svchost.exe[1224] kernel32.dll!CreateFileW 7784CE4E 5 Bytes JMP 0036001B
.text C:\Windows\system32\svchost.exe[1224] kernel32.dll!CreateFileA 7784D171 5 Bytes JMP 00360000
.text C:\Windows\system32\svchost.exe[1224] kernel32.dll!CreateNamedPipeA 7789462E 5 Bytes JMP 00360036
.text C:\Windows\system32\svchost.exe[1224] kernel32.dll!WinExec 7789580B 5 Bytes JMP 003600C4
.text C:\Windows\system32\svchost.exe[1224] msvcrt.dll!_wsystem 77938A47 5 Bytes JMP 0037003A
.text C:\Windows\system32\svchost.exe[1224] msvcrt.dll!system 77938B63 5 Bytes JMP 00370FB9
.text C:\Windows\system32\svchost.exe[1224] msvcrt.dll!_creat 7793C6F1 5 Bytes JMP 00370029
.text C:\Windows\system32\svchost.exe[1224] msvcrt.dll!_open 7793DA7E 5 Bytes JMP 00370FEF
.text C:\Windows\system32\svchost.exe[1224] msvcrt.dll!_wcreat 7793DC9E 5 Bytes JMP 00370FD4
.text C:\Windows\system32\svchost.exe[1224] msvcrt.dll!_wopen 7793DE79 5 Bytes JMP 00370018
.text C:\Windows\system32\svchost.exe[1224] ADVAPI32.dll!RegCreateKeyExA 77B3B5E7 5 Bytes JMP 00380F94
.text C:\Windows\system32\svchost.exe[1224] ADVAPI32.dll!RegCreateKeyA 77B3B8AE 5 Bytes JMP 00380FA5
.text C:\Windows\system32\svchost.exe[1224] ADVAPI32.dll!RegOpenKeyA 77B40BF5 5 Bytes JMP 00380000
.text C:\Windows\system32\svchost.exe[1224] ADVAPI32.dll!RegCreateKeyW 77B4B83D 5 Bytes JMP 00380036
.text C:\Windows\system32\svchost.exe[1224] ADVAPI32.dll!RegCreateKeyExW 77B4BCE1 5 Bytes JMP 00380F6F
.text C:\Windows\system32\svchost.exe[1224] ADVAPI32.dll!RegOpenKeyExA 77B4D4E8 5 Bytes JMP 00380FE5
.text C:\Windows\system32\svchost.exe[1224] ADVAPI32.dll!RegOpenKeyW 77B53CB0 5 Bytes JMP 00380011
.text C:\Windows\system32\svchost.exe[1224] ADVAPI32.dll!RegOpenKeyExW 77B5F09D 5 Bytes JMP 00380FC0
.text C:\Windows\system32\svchost.exe[1224] WS2_32.dll!socket 777036D1 5 Bytes JMP 0035000A
.text C:\Windows\system32\wuauclt.exe[1448] kernel32.dll!GetStartupInfoW 77801929 5 Bytes JMP 00010F5F
.text C:\Windows\system32\wuauclt.exe[1448] kernel32.dll!GetStartupInfoA 778019C9 5 Bytes JMP 0001009B
.text C:\Windows\system32\wuauclt.exe[1448] kernel32.dll!CreateProcessW 77801C01 5 Bytes JMP 000100D1
.text C:\Windows\system32\wuauclt.exe[1448] kernel32.dll!CreateProcessA 77801C36 5 Bytes JMP 000100C0
.text C:\Windows\system32\wuauclt.exe[1448] kernel32.dll!VirtualProtect 77801DD1 5 Bytes JMP 00010F8B
.text C:\Windows\system32\wuauclt.exe[1448] kernel32.dll!CreateNamedPipeW 77805C44 5 Bytes JMP 00010047
.text C:\Windows\system32\wuauclt.exe[1448] kernel32.dll!LoadLibraryExW 7782374A 5 Bytes JMP 00010FA8
.text C:\Windows\system32\wuauclt.exe[1448] kernel32.dll!LoadLibraryW 7782382D 5 Bytes JMP 00010FCA
.text C:\Windows\system32\wuauclt.exe[1448] kernel32.dll!VirtualProtectEx 77828F5E 5 Bytes JMP 00010F7A
.text C:\Windows\system32\wuauclt.exe[1448] kernel32.dll!LoadLibraryExA 77829649 5 Bytes JMP 00010FB9
.text C:\Windows\system32\wuauclt.exe[1448] kernel32.dll!LoadLibraryA 77829671 5 Bytes JMP 00010FE5
.text C:\Windows\system32\wuauclt.exe[1448] kernel32.dll!CreatePipe 77830474 5 Bytes JMP 0001008A
.text C:\Windows\system32\wuauclt.exe[1448] kernel32.dll!GetProcAddress 7784BAC6 5 Bytes JMP 00010F29
.text C:\Windows\system32\wuauclt.exe[1448] kernel32.dll!CreateFileW 7784CE4E 5 Bytes JMP 00010011
.text C:\Windows\system32\wuauclt.exe[1448] kernel32.dll!CreateFileA 7784D171 5 Bytes JMP 00010000
.text C:\Windows\system32\wuauclt.exe[1448] kernel32.dll!CreateNamedPipeA 7789462E 5 Bytes JMP 0001002C
.text C:\Windows\system32\wuauclt.exe[1448] kernel32.dll!WinExec 7789580B 5 Bytes JMP 00010F44
.text C:\Windows\system32\wuauclt.exe[1448] msvcrt.dll!_wsystem 77938A47 5 Bytes JMP 0006003B
.text C:\Windows\system32\wuauclt.exe[1448] msvcrt.dll!system 77938B63 5 Bytes JMP 00060FB0
.text C:\Windows\system32\wuauclt.exe[1448] msvcrt.dll!_creat 7793C6F1 5 Bytes JMP 00060FC1
.text C:\Windows\system32\wuauclt.exe[1448] msvcrt.dll!_open 7793DA7E 5 Bytes JMP 00060FEF
.text C:\Windows\system32\wuauclt.exe[1448] msvcrt.dll!_wcreat 7793DC9E 5 Bytes JMP 00060020
.text C:\Windows\system32\wuauclt.exe[1448] msvcrt.dll!_wopen 7793DE79 5 Bytes JMP 00060FD2
.text C:\Windows\system32\wuauclt.exe[1448] ADVAPI32.dll!RegCreateKeyExA 77B3B5E7 5 Bytes JMP 00070058
.text C:\Windows\system32\wuauclt.exe[1448] ADVAPI32.dll!RegCreateKeyA 77B3B8AE 5 Bytes JMP 0007002C
.text C:\Windows\system32\wuauclt.exe[1448] ADVAPI32.dll!RegOpenKeyA 77B40BF5 5 Bytes JMP 00070000
.text C:\Windows\system32\wuauclt.exe[1448] ADVAPI32.dll!RegCreateKeyW 77B4B83D 5 Bytes JMP 0007003D
.text C:\Windows\system32\wuauclt.exe[1448] ADVAPI32.dll!RegCreateKeyExW 77B4BCE1 5 Bytes JMP 00070069
.text C:\Windows\system32\wuauclt.exe[1448] ADVAPI32.dll!RegOpenKeyExA 77B4D4E8 5 Bytes JMP 00070FDB
.text C:\Windows\system32\wuauclt.exe[1448] ADVAPI32.dll!RegOpenKeyW 77B53CB0 5 Bytes JMP 00070011
.text C:\Windows\system32\wuauclt.exe[1448] ADVAPI32.dll!RegOpenKeyExW 77B5F09D 5 Bytes JMP 00070FC0
.text C:\Windows\system32\svchost.exe[1468] kernel32.dll!GetStartupInfoW 77801929 5 Bytes JMP 004A0F55
.text C:\Windows\system32\svchost.exe[1468] kernel32.dll!GetStartupInfoA 778019C9 5 Bytes JMP 004A009B
.text C:\Windows\system32\svchost.exe[1468] kernel32.dll!CreateProcessW 77801C01 5 Bytes JMP 004A00C0
.text C:\Windows\system32\svchost.exe[1468] kernel32.dll!CreateProcessA 77801C36 5 Bytes JMP 004A0F29
.text C:\Windows\system32\svchost.exe[1468] kernel32.dll!VirtualProtect 77801DD1 5 Bytes JMP 004A0F70
.text C:\Windows\system32\svchost.exe[1468] kernel32.dll!CreateNamedPipeW 77805C44 5 Bytes JMP 004A0FCA
.text C:\Windows\system32\svchost.exe[1468] kernel32.dll!LoadLibraryExW 7782374A 5 Bytes JMP 004A004A
.text C:\Windows\system32\svchost.exe[1468] kernel32.dll!LoadLibraryW 7782382D 5 Bytes JMP 004A0F9E
.text C:\Windows\system32\svchost.exe[1468] kernel32.dll!VirtualProtectEx 77828F5E 5 Bytes JMP 004A006F
.text C:\Windows\system32\svchost.exe[1468] kernel32.dll!LoadLibraryExA 77829649 5 Bytes JMP 004A0F8D
.text C:\Windows\system32\svchost.exe[1468] kernel32.dll!LoadLibraryA 77829671 5 Bytes JMP 004A0FB9
.text C:\Windows\system32\svchost.exe[1468] kernel32.dll!CreatePipe 77830474 5 Bytes JMP 004A0080
.text C:\Windows\system32\svchost.exe[1468] kernel32.dll!GetProcAddress 7784BAC6 5 Bytes JMP 004A0F0E
.text C:\Windows\system32\svchost.exe[1468] kernel32.dll!CreateFileW 7784CE4E 5 Bytes JMP 004A0011
.text C:\Windows\system32\svchost.exe[1468] kernel32.dll!CreateFileA 7784D171 5 Bytes JMP 004A0000
.text C:\Windows\system32\svchost.exe[1468] kernel32.dll!CreateNamedPipeA 7789462E 5 Bytes JMP 004A0FDB
.text C:\Windows\system32\svchost.exe[1468] kernel32.dll!WinExec 7789580B 5 Bytes JMP 004A0F44
.text C:\Windows\system32\svchost.exe[1468] msvcrt.dll!_wsystem 77938A47 5 Bytes JMP 00970FC8
.text C:\Windows\system32\svchost.exe[1468] msvcrt.dll!system 77938B63 5 Bytes JMP 00970053
.text C:\Windows\system32\svchost.exe[1468] msvcrt.dll!_creat 7793C6F1 5 Bytes JMP 0097001D
.text C:\Windows\system32\svchost.exe[1468] msvcrt.dll!_open 7793DA7E 5 Bytes JMP 00970FE3
.text C:\Windows\system32\svchost.exe[1468] msvcrt.dll!_wcreat 7793DC9E 5 Bytes JMP 00970038
.text C:\Windows\system32\svchost.exe[1468] msvcrt.dll!_wopen 7793DE79 5 Bytes JMP 00970000
.text C:\Windows\system32\svchost.exe[1468] ADVAPI32.dll!RegCreateKeyExA 77B3B5E7 5 Bytes JMP 0098005B
.text C:\Windows\system32\svchost.exe[1468] ADVAPI32.dll!RegCreateKeyA 77B3B8AE 5 Bytes JMP 00980040
.text C:\Windows\system32\svchost.exe[1468] ADVAPI32.dll!RegOpenKeyA 77B40BF5 5 Bytes JMP 00980000
.text C:\Windows\system32\svchost.exe[1468] ADVAPI32.dll!RegCreateKeyW 77B4B83D 5 Bytes JMP 00980FB9
.text C:\Windows\system32\svchost.exe[1468] ADVAPI32.dll!RegCreateKeyExW 77B4BCE1 5 Bytes JMP 00980F9E
.text C:\Windows\system32\svchost.exe[1468] ADVAPI32.dll!RegOpenKeyExA 77B4D4E8 5 Bytes JMP 00980025
.text C:\Windows\system32\svchost.exe[1468] ADVAPI32.dll!RegOpenKeyW 77B53CB0 5 Bytes JMP 00980FEF
.text C:\Windows\system32\svchost.exe[1468] ADVAPI32.dll!RegOpenKeyExW 77B5F09D 5 Bytes JMP 00980FD4
.text C:\Windows\system32\svchost.exe[1468] WS2_32.dll!socket 777036D1 5 Bytes JMP 003C0FEF
.text C:\Windows\system32\svchost.exe[1468] WinInet.dll!InternetOpenA 777503DD 5 Bytes JMP 003D0FEF
.text C:\Windows\system32\svchost.exe[1468] WinInet.dll!InternetOpenUrlA 777520A3 5 Bytes JMP 003D000A
.text C:\Windows\system32\svchost.exe[1468] WinInet.dll!InternetOpenW 77752A58 5 Bytes JMP 003D0FD4
.text C:\Windows\system32\svchost.exe[1468] WinInet.dll!InternetOpenUrlW 7779AF69 5 Bytes JMP 003D001B
.text C:\Windows\system32\svchost.exe[1592] kernel32.dll!GetStartupInfoW 77801929 5 Bytes JMP 010E0F26
.text C:\Windows\system32\svchost.exe[1592] kernel32.dll!GetStartupInfoA 778019C9 5 Bytes JMP 010E0F37
.text C:\Windows\system32\svchost.exe[1592] kernel32.dll!CreateProcessW 77801C01 5 Bytes JMP 010E00AC
.text C:\Windows\system32\svchost.exe[1592] kernel32.dll!CreateProcessA 77801C36 5 Bytes JMP 010E0F15
.text C:\Windows\system32\svchost.exe[1592] kernel32.dll!VirtualProtect 77801DD1 5 Bytes JMP 010E0047
.text C:\Windows\system32\svchost.exe[1592] kernel32.dll!CreateNamedPipeW 77805C44 5 Bytes JMP 010E001B
.text C:\Windows\system32\svchost.exe[1592] kernel32.dll!LoadLibraryExW 7782374A 5 Bytes JMP 010E0036
.text C:\Windows\system32\svchost.exe[1592] kernel32.dll!LoadLibraryW 7782382D 3 Bytes JMP 010E0F8A
.text C:\Windows\system32\svchost.exe[1592] kernel32.dll!LoadLibraryW + 4 77823831 1 Byte [89]
.text C:\Windows\system32\svchost.exe[1592] kernel32.dll!VirtualProtectEx 77828F5E 3 Bytes JMP 010E0F5C
.text C:\Windows\system32\svchost.exe[1592] kernel32.dll!VirtualProtectEx + 4 77828F62 1 Byte [89]
.text C:\Windows\system32\svchost.exe[1592] kernel32.dll!LoadLibraryExA 77829649 3 Bytes JMP 010E0F79
.text C:\Windows\system32\svchost.exe[1592] kernel32.dll!LoadLibraryExA + 4 7782964D 1 Byte [89]
.text C:\Windows\system32\svchost.exe[1592] kernel32.dll!LoadLibraryA 77829671 3 Bytes JMP 010E0FAF
.text C:\Windows\system32\svchost.exe[1592] kernel32.dll!LoadLibraryA + 4 77829675 1 Byte [89]
.text C:\Windows\system32\svchost.exe[1592] kernel32.dll!CreatePipe 77830474 5 Bytes JMP 010E0062
.text C:\Windows\system32\svchost.exe[1592] kernel32.dll!GetProcAddress 7784BAC6 5 Bytes JMP 010E0EFA
.text C:\Windows\system32\svchost.exe[1592] kernel32.dll!CreateFileW 7784CE4E 5 Bytes JMP 010E0000
.text C:\Windows\system32\svchost.exe[1592] kernel32.dll!CreateFileA 7784D171 5 Bytes JMP 010E0FEF
.text C:\Windows\system32\svchost.exe[1592] kernel32.dll!CreateNamedPipeA 7789462E 5 Bytes JMP 010E0FCA
.text C:\Windows\system32\svchost.exe[1592] kernel32.dll!WinExec 7789580B 5 Bytes JMP 010E0087
.text C:\Windows\system32\svchost.exe[1592] msvcrt.dll!_wsystem 77938A47 5 Bytes JMP 010F002C
.text C:\Windows\system32\svchost.exe[1592] msvcrt.dll!system 77938B63 5 Bytes JMP 010F001B
.text C:\Windows\system32\svchost.exe[1592] msvcrt.dll!_creat 7793C6F1 5 Bytes JMP 010F000A
.text C:\Windows\system32\svchost.exe[1592] msvcrt.dll!_open 7793DA7E 5 Bytes JMP 010F0FEF
.text C:\Windows\system32\svchost.exe[1592] msvcrt.dll!_wcreat 7793DC9E 5 Bytes JMP 010F0FAB
.text C:\Windows\system32\svchost.exe[1592] msvcrt.dll!_wopen 7793DE79 5 Bytes JMP 010F0FD2
.text C:\Windows\system32\svchost.exe[1592] ADVAPI32.dll!RegCreateKeyExA 77B3B5E7 5 Bytes JMP 01100028
.text C:\Windows\system32\svchost.exe[1592] ADVAPI32.dll!RegCreateKeyA 77B3B8AE 5 Bytes JMP 01100F8D
.text C:\Windows\system32\svchost.exe[1592] ADVAPI32.dll!RegOpenKeyA 77B40BF5 5 Bytes JMP 01100FEF
.text C:\Windows\system32\svchost.exe[1592] ADVAPI32.dll!RegCreateKeyW 77B4B83D 5 Bytes JMP 01100F7C
.text C:\Windows\system32\svchost.exe[1592] ADVAPI32.dll!RegCreateKeyExW 77B4BCE1 5 Bytes JMP 01100039
.text C:\Windows\system32\svchost.exe[1592] ADVAPI32.dll!RegOpenKeyExA 77B4D4E8 5 Bytes JMP 01100FC3
.text C:\Windows\system32\svchost.exe[1592] ADVAPI32.dll!RegOpenKeyW 77B53CB0 5 Bytes JMP 01100FDE
.text C:\Windows\system32\svchost.exe[1592] ADVAPI32.dll!RegOpenKeyExW 77B5F09D 5 Bytes JMP 01100FB2
.text C:\Windows\system32\svchost.exe[1592] WS2_32.dll!socket 777036D1 5 Bytes JMP 01080000
.text C:\Windows\system32\svchost.exe[1592] WININET.dll!InternetOpenA 777503DD 5 Bytes JMP 010D0FEF
.text C:\Windows\system32\svchost.exe[1592] WININET.dll!InternetOpenUrlA 777520A3 5 Bytes JMP 010D0FDE
.text C:\Windows\system32\svchost.exe[1592] WININET.dll!InternetOpenW 77752A58 5 Bytes JMP 010D000A
.text C:\Windows\system32\svchost.exe[1592] WININET.dll!InternetOpenUrlW 7779AF69 5 Bytes JMP 010D0FCD
.text C:\Windows\system32\svchost.exe[1812] kernel32.dll!GetStartupInfoW 77801929 5 Bytes JMP 016500C0
.text C:\Windows\system32\svchost.exe[1812] kernel32.dll!GetStartupInfoA 778019C9 5 Bytes JMP 01650F70
.text C:\Windows\system32\svchost.exe[1812] kernel32.dll!CreateProcessW 77801C01 5 Bytes JMP 01650F29
.text C:\Windows\system32\svchost.exe[1812] kernel32.dll!CreateProcessA 77801C36 5 Bytes JMP 01650F4E
.text C:\Windows\system32\svchost.exe[1812] kernel32.dll!VirtualProtect 77801DD1 5 Bytes JMP 0165006F
.text C:\Windows\system32\svchost.exe[1812] kernel32.dll!CreateNamedPipeW 77805C44 5 Bytes JMP 01650FDE
.text C:\Windows\system32\svchost.exe[1812] kernel32.dll!LoadLibraryExW 7782374A 5 Bytes JMP 01650F95
.text C:\Windows\system32\svchost.exe[1812] kernel32.dll!LoadLibraryW 7782382D 5 Bytes JMP 0165005E
.text C:\Windows\system32\svchost.exe[1812] kernel32.dll!VirtualProtectEx 77828F5E 5 Bytes JMP 01650080
.text C:\Windows\system32\svchost.exe[1812] kernel32.dll!LoadLibraryExA 77829649 5 Bytes JMP 01650FB2
.text C:\Windows\system32\svchost.exe[1812] kernel32.dll!LoadLibraryA 77829671 5 Bytes JMP 01650FCD
.text C:\Windows\system32\svchost.exe[1812] kernel32.dll!CreatePipe 77830474 5 Bytes JMP 0165009B
.text C:\Windows\system32\svchost.exe[1812] kernel32.dll!GetProcAddress 7784BAC6 5 Bytes JMP 01650F18
.text C:\Windows\system32\svchost.exe[1812] kernel32.dll!CreateFileW 7784CE4E 5 Bytes JMP 01650FEF
.text C:\Windows\system32\svchost.exe[1812] kernel32.dll!CreateFileA 7784D171 5 Bytes JMP 0165000A
.text C:\Windows\system32\svchost.exe[1812] kernel32.dll!CreateNamedPipeA 7789462E 5 Bytes JMP 0165002F
.text C:\Windows\system32\svchost.exe[1812] kernel32.dll!WinExec 7789580B 5 Bytes JMP 01650F5F
.text C:\Windows\system32\svchost.exe[1812] msvcrt.dll!_wsystem 77938A47 5 Bytes JMP 016E0FC1
.text C:\Windows\system32\svchost.exe[1812] msvcrt.dll!system 77938B63 5 Bytes JMP 016E0042
.text C:\Windows\system32\svchost.exe[1812] msvcrt.dll!_creat 7793C6F1 5 Bytes JMP 016E001D
.text C:\Windows\system32\svchost.exe[1812] msvcrt.dll!_open 7793DA7E 5 Bytes JMP 016E0000
.text C:\Windows\system32\svchost.exe[1812] msvcrt.dll!_wcreat 7793DC9E 5 Bytes JMP 016E0FD2
.text C:\Windows\system32\svchost.exe[1812] msvcrt.dll!_wopen 7793DE79 5 Bytes JMP 016E0FEF
.text C:\Windows\system32\svchost.exe[1812] ADVAPI32.dll!RegCreateKeyExA 77B3B5E7 5 Bytes JMP 01770F94
.text C:\Windows\system32\svchost.exe[1812] ADVAPI32.dll!RegCreateKeyA 77B3B8AE 5 Bytes JMP 01770FAF
.text C:\Windows\system32\svchost.exe[1812] ADVAPI32.dll!RegOpenKeyA 77B40BF5 5 Bytes JMP 01770FE5
.text C:\Windows\system32\svchost.exe[1812] ADVAPI32.dll!RegCreateKeyW 77B4B83D 5 Bytes JMP 01770036
.text C:\Windows\system32\svchost.exe[1812] ADVAPI32.dll!RegCreateKeyExW 77B4BCE1 5 Bytes JMP 01770F79
.text C:\Windows\system32\svchost.exe[1812] ADVAPI32.dll!RegOpenKeyExA 77B4D4E8 5 Bytes JMP 01770011
.text C:\Windows\system32\svchost.exe[1812] ADVAPI32.dll!RegOpenKeyW 77B53CB0 5 Bytes JMP 01770000
.text C:\Windows\system32\svchost.exe[1812] ADVAPI32.dll!RegOpenKeyExW 77B5F09D 5 Bytes JMP 01770FC0
.text C:\Windows\system32\svchost.exe[1812] WS2_32.dll!socket 777036D1 5 Bytes JMP 01600000
.text C:\Windows\system32\svchost.exe[2076] kernel32.dll!GetStartupInfoW 77801929 5 Bytes JMP 003800AE
.text C:\Windows\system32\svchost.exe[2076] kernel32.dll!GetStartupInfoA 778019C9 5 Bytes JMP 00380F68
.text C:\Windows\system32\svchost.exe[2076] kernel32.dll!CreateProcessW 77801C01 5 Bytes JMP 003800D0
.text C:\Windows\system32\svchost.exe[2076] kernel32.dll!CreateProcessA 77801C36 5 Bytes JMP 003800BF
.text C:\Windows\system32\svchost.exe[2076] kernel32.dll!VirtualProtect 77801DD1 5 Bytes JMP 00380078
.text C:\Windows\system32\svchost.exe[2076] kernel32.dll!CreateNamedPipeW 77805C44 5 Bytes JMP 0038002F
.text C:\Windows\system32\svchost.exe[2076] kernel32.dll!LoadLibraryExW 7782374A 5 Bytes JMP 00380F9E
.text C:\Windows\system32\svchost.exe[2076] kernel32.dll!LoadLibraryW 7782382D 5 Bytes JMP 00380FB9
.text C:\Windows\system32\svchost.exe[2076] kernel32.dll!VirtualProtectEx 77828F5E 5 Bytes JMP 00380089
.text C:\Windows\system32\svchost.exe[2076] kernel32.dll!LoadLibraryExA 77829649 5 Bytes JMP 0038005B
.text C:\Windows\system32\svchost.exe[2076] kernel32.dll!LoadLibraryA 77829671 5 Bytes JMP 00380040
.text C:\Windows\system32\svchost.exe[2076] kernel32.dll!CreatePipe 77830474 5 Bytes JMP 00380F79
.text C:\Windows\system32\svchost.exe[2076] kernel32.dll!GetProcAddress 7784BAC6 5 Bytes JMP 003800E1
.text C:\Windows\system32\svchost.exe[2076] kernel32.dll!CreateFileW 7784CE4E 5 Bytes JMP 00380014
.text C:\Windows\system32\svchost.exe[2076] kernel32.dll!CreateFileA 7784D171 5 Bytes JMP 00380FEF
.text C:\Windows\system32\svchost.exe[2076] kernel32.dll!CreateNamedPipeA 7789462E 5 Bytes JMP 00380FDE
.text C:\Windows\system32\svchost.exe[2076] kernel32.dll!WinExec 7789580B 5 Bytes JMP 00380F4D
.text C:\Windows\system32\svchost.exe[2076] msvcrt.dll!_wsystem 77938A47 5 Bytes JMP 00720FAF
.text C:\Windows\system32\svchost.exe[2076] msvcrt.dll!system 77938B63 5 Bytes JMP 00720FCA
.text C:\Windows\system32\svchost.exe[2076] msvcrt.dll!_creat 7793C6F1 5 Bytes JMP 00720033
.text C:\Windows\system32\svchost.exe[2076] msvcrt.dll!_open 7793DA7E 5 Bytes JMP 0072000C
.text C:\Windows\system32\svchost.exe[2076] msvcrt.dll!_wcreat 7793DC9E 5 Bytes JMP 00720044
.text C:\Windows\system32\svchost.exe[2076] msvcrt.dll!_wopen 7793DE79 5 Bytes JMP 00720FEF
.text C:\Windows\system32\svchost.exe[2076] ADVAPI32.dll!RegCreateKeyExA 77B3B5E7 5 Bytes JMP 00730051
.text C:\Windows\system32\svchost.exe[2076] ADVAPI32.dll!RegCreateKeyA 77B3B8AE 5 Bytes JMP 00730025
.text C:\Windows\system32\svchost.exe[2076] ADVAPI32.dll!RegOpenKeyA 77B40BF5 5 Bytes JMP 00730FE5
.text C:\Windows\system32\svchost.exe[2076] ADVAPI32.dll!RegCreateKeyW 77B4B83D 5 Bytes JMP 00730036
.text C:\Windows\system32\svchost.exe[2076] ADVAPI32.dll!RegCreateKeyExW 77B4BCE1 5 Bytes JMP 00730062
.text C:\Windows\system32\svchost.exe[2076] ADVAPI32.dll!RegOpenKeyExA 77B4D4E8 5 Bytes JMP 00730FCA
.text C:\Windows\system32\svchost.exe[2076] ADVAPI32.dll!RegOpenKeyW 77B53CB0 5 Bytes JMP 00730000
.text C:\Windows\system32\svchost.exe[2076] ADVAPI32.dll!RegOpenKeyExW 77B5F09D 5 Bytes JMP 00730FB9
.text C:\Windows\system32\svchost.exe[2076] WS2_32.dll!socket 777036D1 5 Bytes JMP 000E0FEF
.text C:\Windows\system32\svchost.exe[2100] kernel32.dll!GetStartupInfoW 77801929 5 Bytes JMP 00300F52
.text C:\Windows\system32\svchost.exe[2100] kernel32.dll!GetStartupInfoA 778019C9 5 Bytes JMP 00300F6D
.text C:\Windows\system32\svchost.exe[2100] kernel32.dll!CreateProcessW 77801C01 5 Bytes JMP 003000D8
.text C:\Windows\system32\svchost.exe[2100] kernel32.dll!CreateProcessA 77801C36 5 Bytes JMP 00300F41
.text C:\Windows\system32\svchost.exe[2100] kernel32.dll!VirtualProtect 77801DD1 5 Bytes JMP 0030007D
.text C:\Windows\system32\svchost.exe[2100] kernel32.dll!CreateNamedPipeW 77805C44 5 Bytes JMP 0030002F
.text C:\Windows\system32\svchost.exe[2100] kernel32.dll!LoadLibraryExW 7782374A 5 Bytes JMP 0030006C
.text C:\Windows\system32\svchost.exe[2100] kernel32.dll!LoadLibraryW 7782382D 5 Bytes JMP 0030005B
.text C:\Windows\system32\svchost.exe[2100] kernel32.dll!VirtualProtectEx 77828F5E 5 Bytes JMP 00300F88
.text C:\Windows\system32\svchost.exe[2100] kernel32.dll!LoadLibraryExA 77829649 5 Bytes JMP 00300FB9
.text C:\Windows\system32\svchost.exe[2100] kernel32.dll!LoadLibraryA 77829671 5 Bytes JMP 00300040
.text C:\Windows\system32\svchost.exe[2100] kernel32.dll!CreatePipe 77830474 5 Bytes JMP 00300098
.text C:\Windows\system32\svchost.exe[2100] kernel32.dll!GetProcAddress 7784BAC6 5 Bytes JMP 00300F26
.text C:\Windows\system32\svchost.exe[2100] kernel32.dll!CreateFileW 7784CE4E 5 Bytes JMP 00300FDE
.text C:\Windows\system32\svchost.exe[2100] kernel32.dll!CreateFileA 7784D171 5 Bytes JMP 00300FEF
.text C:\Windows\system32\svchost.exe[2100] kernel32.dll!CreateNamedPipeA 7789462E 5 Bytes JMP 0030001E
.text C:\Windows\system32\svchost.exe[2100] kernel32.dll!WinExec 7789580B 5 Bytes JMP 003000BD
.text C:\Windows\system32\svchost.exe[2100] msvcrt.dll!_wsystem 77938A47 5 Bytes JMP 00310058
.text C:\Windows\system32\svchost.exe[2100] msvcrt.dll!system 77938B63 5 Bytes JMP 00310047
.text C:\Windows\system32\svchost.exe[2100] msvcrt.dll!_creat 7793C6F1 5 Bytes JMP 00310011
.text C:\Windows\system32\svchost.exe[2100] msvcrt.dll!_open 7793DA7E 5 Bytes JMP 00310FEF
.text C:\Windows\system32\svchost.exe[2100] msvcrt.dll!_wcreat 7793DC9E 5 Bytes JMP 00310022
.text C:\Windows\system32\svchost.exe[2100] msvcrt.dll!_wopen 7793DE79 5 Bytes JMP 00310000
.text C:\Windows\system32\svchost.exe[2100] ADVAPI32.dll!RegCreateKeyExA 77B3B5E7 5 Bytes JMP 00320054
.text C:\Windows\system32\svchost.exe[2100] ADVAPI32.dll!RegCreateKeyA 77B3B8AE 5 Bytes JMP 00320039
.text C:\Windows\system32\svchost.exe[2100] ADVAPI32.dll!RegOpenKeyA 77B40BF5 5 Bytes JMP 00320FEF
.text C:\Windows\system32\svchost.exe[2100] ADVAPI32.dll!RegCreateKeyW 77B4B83D 5 Bytes JMP 00320FB2
.text C:\Windows\system32\svchost.exe[2100] ADVAPI32.dll!RegCreateKeyExW 77B4BCE1 5 Bytes JMP 00320FA1
.text C:\Windows\system32\svchost.exe[2100] ADVAPI32.dll!RegOpenKeyExA 77B4D4E8 5 Bytes JMP 00320FC3
.text C:\Windows\system32\svchost.exe[2100] ADVAPI32.dll!RegOpenKeyW 77B53CB0 5 Bytes JMP 00320FD4
.text C:\Windows\system32\svchost.exe[2100] ADVAPI32.dll!RegOpenKeyExW 77B5F09D 5 Bytes JMP 0032001E
.text C:\Windows\system32\svchost.exe[2100] WS2_32.dll!socket 777036D1 5 Bytes JMP 00290FEF
.text C:\Windows\System32\svchost.exe[2620] kernel32.dll!GetStartupInfoW 77801929 5 Bytes JMP 00010F2B
.text C:\Windows\System32\svchost.exe[2620] kernel32.dll!GetStartupInfoA 778019C9 5 Bytes JMP 00010F46
.text C:\Windows\System32\svchost.exe[2620] kernel32.dll!CreateProcessW 77801C01 5 Bytes JMP 00010096
.text C:\Windows\System32\svchost.exe[2620] kernel32.dll!CreateProcessA 77801C36 5 Bytes JMP 00010EFF
.text C:\Windows\System32\svchost.exe[2620] kernel32.dll!VirtualProtect 77801DD1 5 Bytes JMP 00010F72
.text C:\Windows\System32\svchost.exe[2620] kernel32.dll!CreateNamedPipeW 77805C44 5 Bytes JMP 00010FB2
.text C:\Windows\System32\svchost.exe[2620] kernel32.dll!LoadLibraryExW 7782374A 5 Bytes JMP 0001004C
.text C:\Windows\System32\svchost.exe[2620] kernel32.dll!LoadLibraryW 7782382D 5 Bytes JMP 00010F8D
.text C:\Windows\System32\svchost.exe[2620] kernel32.dll!VirtualProtectEx 77828F5E 5 Bytes JMP 00010067
.text C:\Windows\System32\svchost.exe[2620] kernel32.dll!LoadLibraryExA 77829649 5 Bytes JMP 0001002F
.text C:\Windows\System32\svchost.exe[2620] kernel32.dll!LoadLibraryA 77829671 5 Bytes JMP 00010014
.text C:\Windows\System32\svchost.exe[2620] kernel32.dll!CreatePipe 77830474 5 Bytes JMP 00010F57
.text C:\Windows\System32\svchost.exe[2620] kernel32.dll!GetProcAddress 7784BAC6 5 Bytes JMP 000100A7
.text C:\Windows\System32\svchost.exe[2620] kernel32.dll!CreateFileW 7784CE4E 5 Bytes JMP 00010FDE
.text C:\Windows\System32\svchost.exe[2620] kernel32.dll!CreateFileA 7784D171 5 Bytes JMP 00010FEF
.text C:\Windows\System32\svchost.exe[2620] kernel32.dll!CreateNamedPipeA 7789462E 5 Bytes JMP 00010FCD
.text C:\Windows\System32\svchost.exe[2620] kernel32.dll!WinExec 7789580B 5 Bytes JMP 00010F1A
.text C:\Windows\System32\svchost.exe[2620] msvcrt.dll!_wsystem 77938A47 5 Bytes JMP 0009002F
.text C:\Windows\System32\svchost.exe[2620] msvcrt.dll!system 77938B63 5 Bytes JMP 00090FA4
.text C:\Windows\System32\svchost.exe[2620] msvcrt.dll!_creat 7793C6F1 5 Bytes JMP 00090FC6
.text C:\Windows\System32\svchost.exe[2620] msvcrt.dll!_open 7793DA7E 5 Bytes JMP 00090000
.text C:\Windows\System32\svchost.exe[2620] msvcrt.dll!_wcreat 7793DC9E 5 Bytes JMP 00090FB5
.text C:\Windows\System32\svchost.exe[2620] msvcrt.dll!_wopen 7793DE79 5 Bytes JMP 00090FD7
.text C:\Windows\System32\svchost.exe[2620] ADVAPI32.dll!RegCreateKeyExA 77B3B5E7 5 Bytes JMP 000A0062
.text C:\Windows\System32\svchost.exe[2620] ADVAPI32.dll!RegCreateKeyA 77B3B8AE 5 Bytes JMP 000A0FCA
.text C:\Windows\System32\svchost.exe[2620] ADVAPI32.dll!RegOpenKeyA 77B40BF5 5 Bytes JMP 000A000A
.text C:\Windows\System32\svchost.exe[2620] ADVAPI32.dll!RegCreateKeyW 77B4B83D 5 Bytes JMP 000A0051
.text C:\Windows\System32\svchost.exe[2620] ADVAPI32.dll!RegCreateKeyExW 77B4BCE1 5 Bytes JMP 000A007D
.text C:\Windows\System32\svchost.exe[2620] ADVAPI32.dll!RegOpenKeyExA 77B4D4E8 5 Bytes JMP 000A0FE5
.text C:\Windows\System32\svchost.exe[2620] ADVAPI32.dll!RegOpenKeyW 77B53CB0 5 Bytes JMP 000A001B
.text C:\Windows\System32\svchost.exe[2620] ADVAPI32.dll!RegOpenKeyExW 77B5F09D 5 Bytes JMP 000A0036
.text C:\Windows\System32\svchost.exe[2620] WS2_32.dll!socket 777036D1 5 Bytes JMP 00D00FE5
.text C:\Windows\explorer.exe[3992] kernel32.dll!GetStartupInfoW 77801929 5 Bytes JMP 000100DA
.text C:\Windows\explorer.exe[3992] kernel32.dll!GetStartupInfoA 778019C9 5 Bytes JMP 000100BF
.text C:\Windows\explorer.exe[3992] kernel32.dll!CreateProcessW 77801C01 5 Bytes JMP 000100F5
.text C:\Windows\explorer.exe[3992] kernel32.dll!CreateProcessA 77801C36 5 Bytes JMP 00010F5E
.text C:\Windows\explorer.exe[3992] kernel32.dll!VirtualProtect 77801DD1 5 Bytes JMP 00010FB9
.text C:\Windows\explorer.exe[3992] kernel32.dll!CreateNamedPipeW 77805C44 5 Bytes JMP 00010FDE
.text C:\Windows\explorer.exe[3992] kernel32.dll!LoadLibraryExW 7782374A 5 Bytes JMP 00010093
.text C:\Windows\explorer.exe[3992] kernel32.dll!LoadLibraryW 7782382D 5 Bytes JMP 0001005B
.text C:\Windows\explorer.exe[3992] kernel32.dll!VirtualProtectEx 77828F5E 5 Bytes JMP 000100AE
.text C:\Windows\explorer.exe[3992] kernel32.dll!LoadLibraryExA 77829649 5 Bytes JMP 00010076
.text C:\Windows\explorer.exe[3992] kernel32.dll!LoadLibraryA 77829671 5 Bytes JMP 00010040
.text C:\Windows\explorer.exe[3992] kernel32.dll!CreatePipe 77830474 5 Bytes JMP 00010F9E
.text C:\Windows\explorer.exe[3992] kernel32.dll!GetProcAddress 7784BAC6 5 Bytes JMP 00010F43
.text C:\Windows\explorer.exe[3992] kernel32.dll!CreateFileW 7784CE4E 5 Bytes JMP 0001000A
.text C:\Windows\explorer.exe[3992] kernel32.dll!CreateFileA 7784D171 5 Bytes JMP 00010FEF
.text C:\Windows\explorer.exe[3992] kernel32.dll!CreateNamedPipeA 7789462E 5 Bytes JMP 00010025
.text C:\Windows\explorer.exe[3992] kernel32.dll!WinExec 7789580B 5 Bytes JMP 00010F79
.text C:\Windows\explorer.exe[3992] ADVAPI32.dll!RegCreateKeyExA 77B3B5E7 5 Bytes JMP 00050FA8
.text C:\Windows\explorer.exe[3992] ADVAPI32.dll!RegCreateKeyA 77B3B8AE 5 Bytes JMP 00050FC3
.text C:\Windows\explorer.exe[3992] ADVAPI32.dll!RegOpenKeyA 77B40BF5 5 Bytes JMP 00050FEF
.text C:\Windows\explorer.exe[3992] ADVAPI32.dll!RegCreateKeyW 77B4B83D 5 Bytes JMP 0005004A
.text C:\Windows\explorer.exe[3992] ADVAPI32.dll!RegCreateKeyExW 77B4BCE1 5 Bytes JMP 00050065
.text C:\Windows\explorer.exe[3992] ADVAPI32.dll!RegOpenKeyExA 77B4D4E8 5 Bytes JMP 00050025
.text C:\Windows\explorer.exe[3992] ADVAPI32.dll!RegOpenKeyW 77B53CB0 5 Bytes JMP 0005000A
.text C:\Windows\explorer.exe[3992] ADVAPI32.dll!RegOpenKeyExW 77B5F09D 5 Bytes JMP 00050FD4
.text C:\Windows\explorer.exe[3992] msvcrt.dll!_wsystem 77938A47 5 Bytes JMP 00060F84
.text C:\Windows\explorer.exe[3992] msvcrt.dll!system 77938B63 5 Bytes JMP 00060F95
.text C:\Windows\explorer.exe[3992] msvcrt.dll!_creat 7793C6F1 5 Bytes JMP 00060FC1
.text C:\Windows\explorer.exe[3992] msvcrt.dll!_open 7793DA7E 5 Bytes JMP 00060FEF
.text C:\Windows\explorer.exe[3992] msvcrt.dll!_wcreat 7793DC9E 5 Bytes JMP 00060FA6
.text C:\Windows\explorer.exe[3992] msvcrt.dll!_wopen 7793DE79 5 Bytes JMP 00060FD2
.text C:\Windows\explorer.exe[3992] WS2_32.dll!socket 777036D1 5 Bytes JMP 024E0000
.text C:\Windows\explorer.exe[3992] WININET.dll!InternetOpenA 777503DD 5 Bytes JMP 02530000
.text C:\Windows\explorer.exe[3992] WININET.dll!InternetOpenUrlA 777520A3 5 Bytes JMP 02530022
.text C:\Windows\explorer.exe[3992] WININET.dll!InternetOpenW 77752A58 5 Bytes JMP 02530011
.text C:\Windows\explorer.exe[3992] WININET.dll!InternetOpenUrlW 7779AF69 5 Bytes JMP 02530FD1
---- Devices - GMER 1.0.15 ----
AttachedDevice \FileSystem\Ntfs \Ntfs mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
AttachedDevice \Driver\kbdclass \Device\KeyboardClass0 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
AttachedDevice \Driver\kbdclass \Device\KeyboardClass1 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
AttachedDevice \Driver\tdx \Device\Tcp Mpfp.sys (McAfee Personal Firewall Plus Driver/McAfee, Inc.)
Device \Driver\iaStor \Device\Ide\iaStor0 867DCF16
Device \Driver\iaStor \Device\Ide\IAAStorageDevice-0 867DCF16
Device \Driver\iaStor \Device\Ide\IAAStorageDevice-1 867DCF16
AttachedDevice \Driver\tdx \Device\Udp Mpfp.sys (McAfee Personal Firewall Plus Driver/McAfee, Inc.)
AttachedDevice \Driver\tdx \Device\RawIp Mpfp.sys (McAfee Personal Firewall Plus Driver/McAfee, Inc.)
AttachedDevice \FileSystem\fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
AttachedDevice \FileSystem\fastfat \Fat mfehidk.sys (Host Intrusion Detection Link Driver/McAfee, Inc.)
---- Threads - GMER 1.0.15 ----
Thread System [4:244] 867DF0B3
Thread System [4:252] 867DF923
Thread System [4:256] 867E07FB
---- Disk sectors - GMER 1.0.15 ----
Disk \Device\Harddisk0\DR0 TDL4@MBR code has been found <-- ROOTKIT !!!
Disk \Device\Harddisk0\DR0 sector 00: rootkit-like behavior
---- Files - GMER 1.0.15 ----
File C:\Windows\SoftwareDistribution\DataStore\Logs\tmp.edb 0 bytes
---- EOF - GMER 1.0.15 ----
OTL.txt:
OTL logfile created on: 23/10/2011 15:37:46 - Run 2
OTL by OldTimer - Version 3.2.31.0 Folder = C:\Users\eSteve\Desktop
Windows Vista Home Premium Edition Service Pack 1 (Version = 6.0.6001) - Type = NTWorkstation
Internet Explorer (Version = 7.0.6001.18000)
Locale: 00001809 | Country: Ireland | Language: ENI | Date Format: dd/MM/yyyy
2.87 Gb Total Physical Memory | 1.57 Gb Available Physical Memory | 54.84% Memory free
5.96 Gb Paging File | 4.80 Gb Available in Paging File | 80.59% Paging File free
Paging file location(s): ?:\pagefile.sys [binary data]
%SystemDrive% = C: | %SystemRoot% = C:\Windows | %ProgramFiles% = C:\Program Files
Drive C: | 116.29 Gb Total Space | 81.35 Gb Free Space | 69.95% Space Free | Partition Type: NTFS
Drive D: | 115.13 Gb Total Space | 57.64 Gb Free Space | 50.07% Space Free | Partition Type: NTFS
Drive F: | 991.22 Mb Total Space | 990.28 Mb Free Space | 99.91% Space Free | Partition Type: FAT
Computer Name: ESTEVE-PC | User Name: eSteve | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: All users
Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days
========== Processes (SafeList) ========== PRC - [2011/10/22 17:18:58 | 000,584,192 | ---- | M] (OldTimer Tools) -- C:\Users\eSteve\Desktop\OTL.exe
PRC - [2011/07/16 22:21:04 | 000,302,592 | ---- | M] () -- C:\Users\eSteve\Desktop\gmer.exe
PRC - [2009/01/26 15:31:10 | 001,153,368 | ---- | M] (Safer Networking Ltd.) -- C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe
PRC - [2008/07/18 20:39:30 | 000,083,312 | ---- | M] (TOSHIBA Corporation) -- C:\Program Files\TOSHIBA\TOSHIBA DVD PLAYER\TNaviSrv.exe
PRC - [2008/04/24 10:21:56 | 000,099,720 | ---- | M] (Toshiba Europe GmbH) -- C:\Program Files\Toshiba TEMPRO\TempoSVC.exe
PRC - [2008/04/17 00:19:48 | 000,040,960 | ---- | M] (TOSHIBA CORPORATION) -- C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
PRC - [2008/02/06 14:12:56 | 000,126,976 | ---- | M] (TOSHIBA Corporation) -- C:\Program Files\TOSHIBA\SMARTLogService\TosIPCSrv.exe
PRC - [2008/01/21 03:24:24 | 002,927,104 | ---- | M] (Microsoft Corporation) -- C:\Windows\explorer.exe
PRC - [2008/01/17 16:27:34 | 000,431,456 | ---- | M] (TOSHIBA Corporation) -- C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe
PRC - [2007/11/21 17:23:32 | 000,129,632 | ---- | M] (TOSHIBA Corporation) -- C:\Windows\System32\TODDSrv.exe
PRC - [2007/08/24 04:00:40 | 000,023,880 | ---- | M] (McAfee, Inc.) -- C:\Program Files\McAfee\MSK\msksrver.exe
PRC - [2007/08/15 23:15:22 | 000,746,832 | ---- | M] (McAfee, Inc.) -- c:\Program Files\McAfee\MSC\mcupdmgr.exe
PRC - [2007/08/15 12:36:04 | 000,359,248 | ---- | M] (McAfee, Inc.) -- c:\Program Files\Common Files\McAfee\McProxy\McProxy.exe
PRC - [2007/08/04 03:08:06 | 000,749,904 | ---- | M] (McAfee, Inc.) -- C:\Program Files\McAfee\MSC\mcmscsvc.exe
PRC - [2007/08/03 22:33:14 | 000,582,992 | ---- | M] (McAfee, Inc.) -- c:\Program Files\McAfee.com\Agent\mcagent.exe
PRC - [2007/07/25 01:41:52 | 000,695,624 | ---- | M] (McAfee, Inc.) -- C:\Program Files\McAfee\VirusScan\mcsysmon.exe
PRC - [2007/07/24 12:02:14 | 000,144,704 | ---- | M] (McAfee, Inc.) -- C:\Program Files\McAfee\VirusScan\Mcshield.exe
PRC - [2007/07/22 20:15:18 | 002,376,992 | ---- | M] (McAfee, Inc.) -- c:\Program Files\Common Files\McAfee\MNA\McNASvc.exe
PRC - [2007/07/18 15:54:42 | 000,856,864 | ---- | M] (McAfee, Inc.) -- C:\Program Files\McAfee\MPF\MpfSrv.exe
PRC - [2007/07/13 07:14:56 | 000,265,040 | ---- | M] (McAfee, Inc.) -- c:\Program Files\McAfee\MSC\mcuimgr.exe
PRC - [2006/08/23 16:39:48 | 000,049,152 | ---- | M] (Ulead Systems, Inc.) -- C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe
========== Modules (No Company Name) ========== MOD - [2011/07/16 22:21:04 | 000,302,592 | ---- | M] () -- C:\Users\eSteve\Desktop\gmer.exe
========== Win32 Services (SafeList) ========== SRV - [2011/10/13 15:27:21 | 002,151,640 | ---- | M] (Lavasoft Limited) [On_Demand | Stopped] -- C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe -- (Lavasoft Ad-Aware Service)
SRV - [2009/01/26 15:31:10 | 001,153,368 | ---- | M] (Safer Networking Ltd.) [Auto | Running] -- C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe -- (SBSDWSCService)
SRV - [2008/07/18 20:39:30 | 000,083,312 | ---- | M] (TOSHIBA Corporation) [Auto | Running] -- C:\Program Files\TOSHIBA\TOSHIBA DVD PLAYER\TNaviSrv.exe -- (TNaviSrv)
SRV - [2008/04/24 10:21:56 | 000,099,720 | ---- | M] (Toshiba Europe GmbH) [Auto | Running] -- C:\Program Files\Toshiba TEMPRO\TempoSVC.exe -- (TempoMonitoringService)
SRV - [2008/04/17 00:19:48 | 000,040,960 | ---- | M] (TOSHIBA CORPORATION) [Auto | Running] -- C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe -- (ConfigFree Service)
SRV - [2008/02/06 14:12:56 | 000,126,976 | ---- | M] (TOSHIBA Corporation) [Auto | Running] -- C:\Program Files\TOSHIBA\SMARTLogService\TosIPCSrv.exe -- (TOSHIBA SMART Log Service)
SRV - [2008/01/21 03:23:32 | 000,272,952 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Program Files\Windows Defender\MpSvc.dll -- (WinDefend)
SRV - [2008/01/17 16:27:34 | 000,431,456 | ---- | M] (TOSHIBA Corporation) [Auto | Running] -- C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe -- (TosCoSrv)
SRV - [2007/11/21 17:23:32 | 000,129,632 | ---- | M] (TOSHIBA Corporation) [Auto | Running] -- C:\Windows\System32\TODDSrv.exe -- (TODDSrv)
SRV - [2007/08/24 04:00:40 | 000,023,880 | ---- | M] (McAfee, Inc.) [Auto | Running] -- C:\Program Files\McAfee\MSK\MskSrver.exe -- (MSK80Service)
SRV - [2007/08/15 12:36:04 | 000,359,248 | ---- | M] (McAfee, Inc.) [Auto | Running] -- c:\Program Files\Common Files\McAfee\McProxy\McProxy.exe -- (McProxy)
SRV - [2007/08/04 03:08:06 | 000,749,904 | ---- | M] (McAfee, Inc.) [Auto | Running] -- C:\Program Files\McAfee\MSC\mcmscsvc.exe -- (mcmscsvc)
SRV - [2007/07/25 02:16:16 | 000,378,184 | ---- | M] (McAfee, Inc.) [On_Demand | Stopped] -- C:\Program Files\McAfee\VirusScan\mcods.exe -- (McODS)
SRV - [2007/07/25 01:41:52 | 000,695,624 | ---- | M] (McAfee, Inc.) [On_Demand | Running] -- C:\Program Files\McAfee\VirusScan\mcsysmon.exe -- (McSysmon)
SRV - [2007/07/24 12:02:14 | 000,144,704 | ---- | M] (McAfee, Inc.) [Unknown | Running] -- C:\Program Files\McAfee\VirusScan\Mcshield.exe -- (McShield)
SRV - [2007/07/22 20:15:18 | 002,376,992 | ---- | M] (McAfee, Inc.) [Auto | Running] -- c:\Program Files\Common Files\McAfee\MNA\McNASvc.exe -- (McNASvc)
SRV - [2007/07/18 15:54:42 | 000,856,864 | ---- | M] (McAfee, Inc.) [Auto | Running] -- C:\Program Files\McAfee\MPF\MPFSrv.exe -- (MpfService)
SRV - [2006/08/23 16:39:48 | 000,049,152 | ---- | M] (Ulead Systems, Inc.) [Auto | Running] -- C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe -- (UleadBurningHelper)
========== Driver Services (SafeList) ========== DRV - [2011/08/18 15:25:12 | 000,064,512 | ---- | M] (Lavasoft AB) [File_System | Boot | Running] -- C:\Windows\system32\DRIVERS\Lbd.sys -- (Lbd)
DRV - [2011/08/18 15:25:12 | 000,015,232 | ---- | M] () [Kernel | On_Demand | Stopped] -- C:\Program Files\Lavasoft\Ad-Aware\kernexplorer.sys -- (Lavasoft Kernexplorer)
DRV - [2008/07/18 18:52:16 | 000,279,376 | ---- | M] (TOSHIBA Corporation) [Kernel | Boot | Running] -- C:\Windows\system32\DRIVERS\tos_sps32.sys -- (tos_sps32)
DRV - [2008/05/19 19:42:56 | 000,912,384 | ---- | M] (Atheros Communications, Inc.) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\athr.sys -- (athr)
DRV - [2008/04/15 09:05:08 | 000,118,784 | ---- | M] (Realtek Corporation ) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\Rtlh86.sys -- (RTL8169)
DRV - [2007/11/09 14:00:52 | 000,023,640 | ---- | M] (TOSHIBA Corporation) [Kernel | Boot | Running] -- C:\Windows\system32\DRIVERS\TVALZ_O.SYS -- (TVALZ)
DRV - [2007/10/17 21:36:54 | 000,008,704 | ---- | M] (Conexant Systems, Inc.) [Kernel | Auto | Running] -- C:\Windows\System32\drivers\XAudio.sys -- (XAudio)
DRV - [2007/07/24 12:02:36 | 000,033,800 | ---- | M] (McAfee, Inc.) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\mferkdk.sys -- (mferkdk)
DRV - [2007/07/24 07:40:36 | 000,079,304 | ---- | M] (McAfee, Inc.) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\mfeavfk.sys -- (mfeavfk)
DRV - [2007/07/21 09:08:24 | 000,201,288 | ---- | M] (McAfee, Inc.) [Kernel | System | Running] -- C:\Windows\System32\drivers\mfehidk.sys -- (mfehidk)
DRV - [2007/07/21 09:08:24 | 000,040,488 | ---- | M] (McAfee, Inc.) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\mfesmfk.sys -- (mfesmfk)
DRV - [2007/07/21 09:08:24 | 000,035,240 | ---- | M] (McAfee, Inc.) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\mfebopk.sys -- (mfebopk)
DRV - [2007/07/13 09:21:12 | 000,125,728 | ---- | M] (McAfee, Inc.) [Kernel | System | Running] -- C:\Windows\System32\drivers\Mpfp.sys -- (MPFP)
DRV - [2006/11/20 14:11:14 | 000,007,168 | ---- | M] (TOSHIBA Corporation) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\FwLnk.sys -- (FwLnk)
DRV - [2006/11/02 08:41:50 | 000,983,552 | ---- | M] (Agere Systems) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\AGRSM.sys -- (AgereSoftModem)
DRV - [2006/10/18 11:50:04 | 000,016,128 | ---- | M] (TOSHIBA Corporation.) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\tdcmdpst.sys -- (tdcmdpst)
========== Standard Registry (SafeList) ========== ========== Internet Explorer ========== IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Page_URL =
http://www.google.co...=TSEA&bmod=TSEAIE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Local Page = %SystemRoot%\system32\blank.htm
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page =
http://www.google.co...=TSEA&bmod=TSEA IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
IE - HKU\S-1-5-21-373376315-115607217-4222124936-1000\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Page_URL =
http://www.google.co...TSEA&bmod=TSEA;IE - HKU\S-1-5-21-373376315-115607217-4222124936-1000\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page =
http://www.google.co...TSEA&bmod=TSEA;IE - HKU\S-1-5-21-373376315-115607217-4222124936-1000\SOFTWARE\Microsoft\Internet Explorer\Main,StartPageCache = 2
IE - HKU\S-1-5-21-373376315-115607217-4222124936-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
FF - HKLM\Software\MozillaPlugins\@microsoft.com/WPF,version=3.5: c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\NPWPF.dll (Microsoft Corporation)
FF - HKLM\Software\MozillaPlugins\@tools.google.com/Google Update;version=3: C:\Program Files\Google\Update\1.3.21.69\npGoogleUpdate3.dll (Google Inc.)
FF - HKLM\Software\MozillaPlugins\@tools.google.com/Google Update;version=9: C:\Program Files\Google\Update\1.3.21.69\npGoogleUpdate3.dll (Google Inc.)
O1 HOSTS File: ([2006/09/18 22:41:30 | 000,000,761 | ---- | M]) - C:\Windows\System32\drivers\etc\hosts
O1 - Hosts: 127.0.0.1 localhost
O1 - Hosts: ::1 localhost
O2 - BHO: (Adobe PDF Reader Link Helper) - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll (Adobe Systems Incorporated)
O2 - BHO: (McAfee Phishing Filter) - {377C180E-6F0E-4D4C-980F-F45BD3D40CF4} - c:\Program Files\McAfee\MSK\mcapbho.dll ()
O2 - BHO: (Spybot-S&D IE Protection) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll (Safer Networking Limited)
O2 - BHO: (SSVHelper Class) - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll (Sun Microsystems, Inc.)
O2 - BHO: (scriptproxy) - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - C:\Program Files\McAfee\VirusScan\scriptsn.dll (McAfee, Inc.)
O4 - HKLM..\Run: [00TCrdMain] C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe (TOSHIBA Corporation)
O4 - HKLM..\Run: [cfFncEnabler.exe] cfFncEnabler.exe File not found
O4 - HKLM..\Run: [Google EULA Launcher] c:\Program Files\Google\Google EULA\GoogleEULALauncher.exe ( )
O4 - HKLM..\Run: [mcagent_exe] C:\Program Files\McAfee.com\Agent\mcagent.exe (McAfee, Inc.)
O4 - HKLM..\Run: [NDSTray.exe] NDSTray.exe File not found
O4 - HKLM..\Run: [RtHDVCpl] C:\Windows\RtHDVCpl.exe (Realtek Semiconductor)
O4 - HKLM..\Run: [SmoothView] C:\Program Files\TOSHIBA\SmoothView\SmoothView.exe (TOSHIBA Corporation)
O4 - HKLM..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.6.0_06\bin\jusched.exe (Sun Microsystems, Inc.)
O4 - HKLM..\Run: [topi] C:\Program Files\TOSHIBA\Toshiba Online Product Information\topi.exe (TOSHIBA)
O4 - HKLM..\Run: [Toshiba TEMPO] C:\Program Files\Toshiba TEMPRO\Toshiba.Tempo.UI.TrayApplication.exe (Toshiba Europe GmbH)
O4 - HKLM..\Run: [TPwrMain] C:\Program Files\TOSHIBA\Power Saver\TPwrMain.exe (TOSHIBA Corporation)
O4 - HKLM..\Run: [Windows Defender] C:\Program Files\Windows Defender\MSASCui.exe (Microsoft Corporation)
O4 - HKU\S-1-5-19..\Run: [WindowsWelcomeCenter] C:\Windows\System32\oobefldr.dll (Microsoft Corporation)
O4 - HKU\S-1-5-20..\Run: [WindowsWelcomeCenter] C:\Windows\System32\oobefldr.dll (Microsoft Corporation)
O4 - HKU\S-1-5-21-373376315-115607217-4222124936-1000..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe (Safer-Networking Ltd.)
O4 - HKU\S-1-5-21-373376315-115607217-4222124936-1000..\Run: [TOSCDSPD] C:\Program Files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe (TOSHIBA)
O4 - HKU\S-1-5-21-373376315-115607217-4222124936-1000..\Run: [WindowsWelcomeCenter] C:\Windows\System32\oobefldr.dll (Microsoft Corporation)
O4 - HKLM..\RunOnce: [*WerKernelReporting] C:\Windows\System32\WerFault.exe (Microsoft Corporation)
O4 - HKLM..\RunOnce: [Malwarebytes' Anti-Malware] C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe (Malwarebytes Corporation)
O4 - HKLM..\RunOnce: [Unattend0000000001{5198FF2F-06A9-461D-8850-6327576C3989}] C:\Toshiba\Preinst\postoobe.cmd ()
O4 - Startup: C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TRDCReminder.lnk = C:\Program Files\TOSHIBA\TRDCReminder\TRDCReminder.exe (TOSHIBA Europe)
O4 - Startup: C:\Users\Default User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TRDCReminder.lnk = C:\Program Files\TOSHIBA\TRDCReminder\TRDCReminder.exe (TOSHIBA Europe)
O9 - Extra 'Tools' menuitem : Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_06\bin\ssv.dll (Sun Microsystems, Inc.)
O9 - Extra Button: eBay.co.uk - Buy It Sell It Love It - {76577871-04EC-495E-A12B-91F7C3600AFA} -
http://rover.ebay.co...-44557-9400-3/4 File not found
O9 - Extra Button: Amazon.co.uk - {8A918C1D-E123-4E36-B562-5C1519E434CE} -
http://www.amazon.co...nk-21&site=home File not found
O9 - Extra 'Tools' menuitem : Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll (Safer Networking Limited)
O13 - gopher Prefix: missing
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93}
http://java.sun.com/...indows-i586.cab (Java Plug-in 1.6.0_06)
O16 - DPF: {CAFEEFAC-0016-0000-0006-ABCDEFFEDCBA}
http://java.sun.com/...indows-i586.cab (Java Plug-in 1.6.0_06)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}
http://java.sun.com/...indows-i586.cab (Java Plug-in 1.6.0_06)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 192.168.1.254
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{927011F6-887C-4D1C-A122-5111A1D7ED14}: DhcpNameServer = 192.168.1.254
O20 - HKLM Winlogon: Shell - (explorer.exe) -C:\Windows\explorer.exe (Microsoft Corporation)
O20 - HKLM Winlogon: UserInit - (C:\Windows\system32\userinit.exe) -C:\Windows\System32\userinit.exe (Microsoft Corporation)
O24 - Desktop WallPaper: C:\Toshiba\WALLPAPERS\Wallpaper1.jpg
O24 - Desktop BackupWallPaper: C:\Toshiba\WALLPAPERS\Wallpaper1.jpg
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2006/09/18 22:43:36 | 000,000,024 | ---- | M] () - C:\autoexec.bat -- [ NTFS ]
O34 - HKLM BootExecute: (autocheck autochk *)
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37 - HKLM\...com [@ = comfile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*
========== Files/Folders - Created Within 30 Days ========== [2011/10/23 15:36:45 | 000,584,192 | ---- | C] (OldTimer Tools) -- C:\Users\eSteve\Desktop\OTL.exe
[2011/10/23 03:10:44 | 000,000,000 | ---D | C] -- C:\Windows\Minidump
[2011/10/14 12:37:50 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Google Chrome
[2011/10/14 12:22:07 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Spybot - Search & Destroy
[2011/10/14 12:22:02 | 000,000,000 | ---D | C] -- C:\ProgramData\Spybot - Search & Destroy
[2011/10/14 12:22:02 | 000,000,000 | ---D | C] -- C:\Program Files\Spybot - Search & Destroy
[2011/10/14 12:05:40 | 000,000,000 | ---D | C] -- C:\Users\eSteve\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\HiJackThis
[2011/10/14 12:05:39 | 000,000,000 | ---D | C] -- C:\Program Files\Trend Micro
[2011/10/14 12:04:49 | 016,409,960 | ---- | C] (Safer Networking Limited ) -- C:\Users\eSteve\Desktop\spybotsd162.exe
[2011/10/13 17:22:14 | 000,000,000 | ---D | C] -- C:\Windows\System32\WindowsPowerShell
[2011/10/13 17:16:47 | 000,002,048 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\winrsmgr.dll
[2011/10/13 17:16:07 | 000,040,448 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\winrs.exe
[2011/10/13 17:16:07 | 000,020,480 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\winrshost.exe
[2011/10/13 17:16:07 | 000,012,800 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\wsmprovhost.exe
[2011/10/13 17:16:01 | 000,010,240 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\wsmplpxy.dll
[2011/10/13 17:16:01 | 000,010,240 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\winrssrv.dll
[2011/10/13 17:15:53 | 000,081,408 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\wevtfwd.dll
[2011/10/13 17:15:53 | 000,079,872 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\wecutil.exe
[2011/10/13 17:15:53 | 000,056,320 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\wecapi.dll
[2011/10/13 17:15:52 | 000,054,272 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\WsmRes.dll
[2011/10/13 17:15:50 | 000,041,472 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\pwrshplugin.dll
[2011/10/13 17:15:29 | 000,145,408 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\WsmAuto.dll
[2011/10/13 17:15:28 | 000,252,416 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\WSManMigrationPlugin.dll
[2011/10/13 17:15:28 | 000,246,272 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\WSManHTTPConfig.exe
[2011/10/13 17:15:28 | 000,241,152 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\winrscmd.dll
[2011/10/13 17:15:28 | 000,214,016 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\WsmWmiPl.dll
[2011/10/13 17:02:49 | 000,310,784 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\unregmp2.exe
[2011/10/13 17:02:40 | 008,147,456 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\wmploc.DLL
[2011/10/13 16:46:24 | 000,024,064 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\nshhttp.dll
[2011/10/13 16:33:46 | 000,604,520 | ---- | C] (Google Inc.) -- C:\Users\eSteve\Desktop\ChromeSetup.exe
[2011/10/13 16:28:24 | 000,007,680 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\spwmp.dll
[2011/10/13 16:28:22 | 000,004,096 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\msdxm.ocx
[2011/10/13 16:28:22 | 000,004,096 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\dxmasf.dll
[2011/10/13 16:28:19 | 000,043,520 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\msdxm.tlb
[2011/10/13 16:28:19 | 000,018,432 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\amcompat.tlb
[2011/10/13 16:21:14 | 000,002,048 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\tzres.dll
[2011/10/13 15:45:08 | 000,000,000 | ---D | C] -- C:\Users\eSteve\AppData\Local\Google
[2011/10/13 15:41:23 | 000,222,080 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\MpSigStub.exe
[2011/10/13 15:27:32 | 000,101,720 | ---- | C] (Sunbelt Software) -- C:\Windows\System32\drivers\SBREDrv.sys
[2011/10/13 15:25:48 | 000,041,272 | ---- | C] (Malwarebytes Corporation) -- C:\Windows\System32\drivers\mbamswissarmy.sys
[2011/10/13 15:24:00 | 002,421,760 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\wucltux.dll
[2011/10/13 15:24:00 | 000,044,768 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\wups2.dll
[2011/10/13 15:22:52 | 000,171,608 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\wuwebv.dll
[2011/10/13 15:22:52 | 000,033,792 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\wuapp.exe
[2011/10/13 13:41:34 | 000,000,000 | ---D | C] -- C:\Users\eSteve\AppData\Roaming\Malwarebytes
[2011/10/13 13:41:23 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Malwarebytes' Anti-Malware
[2011/10/13 13:41:23 | 000,000,000 | ---D | C] -- C:\ProgramData\Malwarebytes
[2011/10/13 13:41:18 | 000,022,216 | ---- | C] (Malwarebytes Corporation) -- C:\Windows\System32\drivers\mbam.sys
[2011/10/13 13:41:18 | 000,000,000 | ---D | C] -- C:\Program Files\Malwarebytes' Anti-Malware
[2011/10/13 12:37:31 | 000,064,512 | ---- | C] (Lavasoft AB) -- C:\Windows\System32\drivers\Lbd.sys
[2011/10/13 12:37:30 | 000,000,000 | ---D | C] -- C:\Windows\System32\DRVSTORE
[2011/10/13 12:37:22 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Lavasoft
[2011/10/13 12:37:22 | 000,000,000 | ---D | C] -- C:\ProgramData\Lavasoft
[2011/10/13 12:37:22 | 000,000,000 | ---D | C] -- C:\Program Files\Lavasoft
[2011/10/13 12:36:20 | 000,000,000 | R--D | C] -- C:\Users\eSteve\Searches
[2011/10/13 12:36:20 | 000,000,000 | R--D | C] -- C:\Users\eSteve\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools
[2011/10/13 12:36:07 | 000,000,000 | ---D | C] -- C:\Users\eSteve\AppData\Roaming\Identities
[2011/10/13 12:35:31 | 000,000,000 | -HSD | C] -- C:\$RECYCLE.BIN
[2011/10/13 12:34:48 | 000,000,000 | R--D | C] -- C:\Users\eSteve\Contacts
[2011/10/13 12:19:05 | 000,000,000 | ---D | C] -- C:\Users\eSteve\AppData\Local\VirtualStore
[2011/10/13 12:19:02 | 000,000,000 | R--D | C] -- C:\Users\eSteve\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
[2011/10/13 12:19:02 | 000,000,000 | R--D | C] -- C:\Users\eSteve\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance
[2011/10/13 12:19:02 | 000,000,000 | R--D | C] -- C:\Users\eSteve\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories
[2011/10/13 12:19:02 | 000,000,000 | -HSD | C] -- C:\Users\eSteve\AppData\Local\Temporary Internet Files
[2011/10/13 12:19:02 | 000,000,000 | -HSD | C] -- C:\Users\eSteve\Templates
[2011/10/13 12:19:02 | 000,000,000 | -HSD | C] -- C:\Users\eSteve\Start Menu
[2011/10/13 12:19:02 | 000,000,000 | -HSD | C] -- C:\Users\eSteve\SendTo
[2011/10/13 12:19:02 | 000,000,000 | -HSD | C] -- C:\Users\eSteve\Recent
[2011/10/13 12:19:02 | 000,000,000 | -HSD | C] -- C:\Users\eSteve\PrintHood
[2011/10/13 12:19:02 | 000,000,000 | -HSD | C] -- C:\Users\eSteve\NetHood
[2011/10/13 12:19:02 | 000,000,000 | -HSD | C] -- C:\Users\eSteve\Documents\My Videos
[2011/10/13 12:19:02 | 000,000,000 | -HSD | C] -- C:\Users\eSteve\Documents\My Pictures
[2011/10/13 12:19:02 | 000,000,000 | -HSD | C] -- C:\Users\eSteve\Documents\My Music
[2011/10/13 12:19:02 | 000,000,000 | -HSD | C] -- C:\Users\eSteve\My Documents
[2011/10/13 12:19:02 | 000,000,000 | -HSD | C] -- C:\Users\eSteve\Local Settings
[2011/10/13 12:19:02 | 000,000,000 | -HSD | C] -- C:\Users\eSteve\AppData\Local\History
[2011/10/13 12:19:02 | 000,000,000 | -HSD | C] -- C:\Users\eSteve\Cookies
[2011/10/13 12:19:02 | 000,000,000 | -HSD | C] -- C:\Users\eSteve\Application Data
[2011/10/13 12:19:02 | 000,000,000 | -HSD | C] -- C:\Users\eSteve\AppData\Local\Application Data
[2011/10/13 12:19:02 | 000,000,000 | ---D | C] -- C:\Users\eSteve\AppData\Local\Temp
[2011/10/13 12:19:02 | 000,000,000 | ---D | C] -- C:\Users\eSteve\AppData\Local\Microsoft
[2011/10/13 12:19:02 | 000,000,000 | ---D | C] -- C:\Users\eSteve\AppData\Roaming\Media Center Programs
[2011/10/13 12:19:01 | 000,000,000 | --SD | C] -- C:\Users\eSteve\AppData\Roaming\Microsoft
[2011/10/13 12:19:01 | 000,000,000 | R--D | C] -- C:\Users\eSteve\Videos
[2011/10/13 12:19:01 | 000,000,000 | R--D | C] -- C:\Users\eSteve\Saved Games
[2011/10/13 12:19:01 | 000,000,000 | R--D | C] -- C:\Users\eSteve\Pictures
[2011/10/13 12:19:01 | 000,000,000 | R--D | C] -- C:\Users\eSteve\Music
[2011/10/13 12:19:01 | 000,000,000 | R--D | C] -- C:\Users\eSteve\Links
[2011/10/13 12:19:01 | 000,000,000 | R--D | C] -- C:\Users\eSteve\Favorites
[2011/10/13 12:19:01 | 000,000,000 | R--D | C] -- C:\Users\eSteve\Downloads
[2011/10/13 12:19:01 | 000,000,000 | R--D | C] -- C:\Users\eSteve\Documents
[2011/10/13 12:19:01 | 000,000,000 | R--D | C] -- C:\Users\eSteve\Desktop
[2011/10/13 12:19:01 | 000,000,000 | -H-D | C] -- C:\Users\eSteve\AppData
[2011/10/13 11:48:42 | 000,393,216 | ---- | C] (Atheros) -- C:\Windows\System32\athihvs.dll
[2011/10/13 11:48:42 | 000,376,832 | ---- | C] (Atheros) -- C:\Windows\System32\S64CPA.exe
[2011/10/13 11:48:42 | 000,053,248 | ---- | C] (Atheros) -- C:\Windows\System32\athihvui.dll
[2011/10/13 11:48:42 | 000,000,000 | ---D | C] -- C:\Windows\System32\nn-NO
[2011/10/13 11:48:20 | 000,000,000 | ---D | C] -- C:\Program Files\Atheros
[2011/10/13 11:48:19 | 000,000,000 | ---D | C] -- C:\Program Files\Cisco
[2011/10/13 11:48:02 | 000,000,000 | ---D | C] -- C:\ProgramData\Atheros
[2011/10/13 11:47:22 | 000,279,376 | ---- | C] (TOSHIBA Corporation) -- C:\Windows\System32\drivers\tos_sps32.sys
[2011/10/13 11:47:17 | 003,426,072 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\d3dx9_32.dll
[2011/10/13 11:47:02 | 000,000,000 | ---D | C] -- C:\Program Files\Common Files\Toshiba Shared
[2011/10/13 11:47:02 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\TOSHIBA DVD PLAYER
[2011/10/13 11:46:31 | 000,491,520 | ---- | C] (Toshiba Corporation) -- C:\Windows\System32\cselect.exe
[2011/10/13 11:46:31 | 000,106,496 | ---- | C] (Toshiba) -- C:\Windows\System32\tosmreg.exe
[2011/10/13 11:46:29 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\NetWaiting
[2011/10/13 11:46:13 | 000,000,000 | ---D | C] -- C:\Program Files\NetWaiting
[2011/10/13 11:45:54 | 000,000,000 | ---D | C] -- C:\Program Files\CONEXANT
[2011/10/13 11:40:33 | 000,000,000 | ---D | C] -- C:\Windows\System32\RTCOM
[2011/10/13 11:40:25 | 000,319,456 | ---- | C] (Microsoft Corporation) -- C:\Windows\DIFxAPI.dll
[2011/10/13 11:40:23 | 006,037,504 | ---- | C] (Realtek Semiconductor) -- C:\Windows\RtHDVCpl.exe
[2011/10/13 11:40:23 | 002,168,320 | ---- | C] (Realtek Semiconductor Corp.) -- C:\Windows\System32\RtkAPO.dll
[2011/10/13 11:40:23 | 001,196,032 | ---- | C] (Realtek Semiconductor Corp.) -- C:\Windows\RtlUpd.exe
[2011/10/13 11:40:23 | 000,694,272 | ---- | C] (Realtek Semiconductor Corp.) -- C:\Windows\System32\RtkPgExt.dll
[2011/10/13 11:40:23 | 000,532,480 | ---- | C] (Realtek Semiconductor Corp.) -- C:\Windows\System32\RTSndMgr.cpl
[2011/10/13 11:40:23 | 000,339,968 | ---- | C] (SRS Labs, Inc.) -- C:\Windows\System32\SRSTSXT.dll
[2011/10/13 11:40:23 | 000,285,216 | ---- | C] (Realtek Semiconductor Corp.) -- C:\Windows\System32\RtkApoApi.dll
[2011/10/13 11:40:23 | 000,185,776 | ---- | C] (SRS Labs, Inc.) -- C:\Windows\System32\SRSTSHD.dll
[2011/10/13 11:40:23 | 000,167,936 | ---- | C] (SRS Labs, Inc.) -- C:\Windows\System32\SRSHP360.dll
[2011/10/13 11:40:23 | 000,135,168 | ---- | C] (SRS Labs, Inc.) -- C:\Windows\System32\SRSWOW.dll
[2011/10/13 11:40:23 | 000,126,976 | ---- | C] (Waves Audio Ltd.) -- C:\Windows\System32\maxxaudioapo.dll
[2011/10/13 11:40:23 | 000,031,232 | ---- | C] (Realtek Semiconductor Corp.) -- C:\Windows\System32\RtkCoInst.dll
[2011/10/13 11:40:22 | 000,140,288 | ---- | C] (Windows ® Codename Longhorn DDK provider) -- C:\Windows\System32\FMAPO.dll
[2011/10/13 11:40:21 | 000,520,192 | ---- | C] (Realtek Semiconductor Corp.) -- C:\Windows\RtlExUpd.dll
[2011/10/13 11:40:21 | 000,315,392 | ---- | C] (Realtek Semiconductor Corp.) -- C:\Windows\HideWin.exe
[2011/10/13 11:39:42 | 000,920,088 | ---- | C] (Intel® Corporation) -- C:\Windows\System32\igxpun.exe
[2011/10/13 11:39:33 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Intel® Matrix Storage Manager
[2011/10/13 11:39:30 | 000,000,000 | ---D | C] -- C:\Windows\System32\ENU
[2011/10/13 11:39:29 | 001,034,776 | ---- | C] (Intel Corporation) -- C:\Windows\System32\imsmudlg.exe
[2011/10/13 11:39:29 | 000,319,456 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\difxapi.dll
[2011/10/13 11:39:29 | 000,000,000 | ---D | C] -- C:\Windows\System32\Lang
[2011/10/13 11:37:37 | 000,000,000 | ---D | C] -- C:\Windows\SoftwareDistribution
[2011/10/13 11:32:53 | 000,000,000 | -HSD | C] -- C:\System Volume Information
[1 C:\Windows\*.tmp files -> C:\Windows\*.tmp -> ]
========== Files - Modified Within 30 Days ========== [2011/10/23 15:41:07 | 000,000,886 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskMachineUA.job
[2011/10/23 15:34:54 | 000,003,216 | -H-- | M] () -- C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
[2011/10/23 15:34:54 | 000,003,216 | -H-- | M] () -- C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
[2011/10/23 14:06:44 | 000,000,882 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskMachineCore.job
[2011/10/23 14:06:36 | 000,067,584 | --S- | M] () -- C:\Windows\bootstat.dat
[2011/10/23 03:17:21 | 000,600,378 | ---- | M] () -- C:\Windows\System32\perfh009.dat
[2011/10/23 03:17:21 | 000,105,852 | ---- | M] () -- C:\Windows\System32\perfc009.dat
[2011/10/23 03:10:44 | 460,912,627 | ---- | M] () -- C:\Windows\MEMORY.DMP
[2011/10/23 03:09:32 | 3082,809,344 | -HS- | M] () -- C:\hiberfil.sys
[2011/10/22 23:33:19 | 000,000,064 | ---- | M] () -- C:\Windows\System32\rp_stats.dat
[2011/10/22 23:33:19 | 000,000,044 | ---- | M] () -- C:\Windows\System32\rp_rules.dat
[2011/10/22 17:18:58 | 000,584,192 | ---- | M] (OldTimer Tools) -- C:\Users\eSteve\Desktop\OTL.exe
[2011/10/14 15:29:04 | 000,007,615 | ---- | M] () -- C:\Windows\System32\Config.MPF
[2011/10/14 12:27:50 | 000,002,525 | ---- | M] () -- C:\Users\eSteve\Desktop\HiJackThis.lnk
[2011/10/14 12:22:08 | 000,001,084 | ---- | M] () -- C:\Users\eSteve\Application Data\Microsoft\Internet Explorer\Quick Launch\Spybot - Search & Destroy.lnk
[2011/10/14 12:22:08 | 000,001,060 | ---- | M] () -- C:\Users\eSteve\Desktop\Spybot - Search & Destroy.lnk
[2011/10/14 12:07:25 | 000,001,537 | ---- | M] () -- C:\Users\eSteve\Desktop\Windows Explorer.lnk
[2011/10/14 12:07:23 | 000,001,537 | ---- | M] () -- C:\Users\eSteve\Application Data\Microsoft\Internet Explorer\Quick Launch\Windows Explorer.lnk
[2011/10/14 11:55:20 | 016,409,960 | ---- | M] (Safer Networking Limited ) -- C:\Users\eSteve\Desktop\spybotsd162.exe
[2011/10/14 11:54:48 | 001,402,880 | ---- | M] () -- C:\Users\eSteve\Desktop\HijackThis.msi
[2011/10/13 16:56:32 | 000,321,824 | ---- | M] () -- C:\Windows\System32\FNTCACHE.DAT
[2011/10/13 15:43:50 | 000,604,520 | ---- | M] (Google Inc.) -- C:\Users\eSteve\Desktop\ChromeSetup.exe
[2011/10/13 15:27:31 | 000,101,720 | ---- | M] (Sunbelt Software) -- C:\Windows\System32\drivers\SBREDrv.sys
[2011/10/13 15:25:48 | 000,041,272 | ---- | M] (Malwarebytes Corporation) -- C:\Windows\System32\drivers\mbamswissarmy.sys
[2011/10/13 13:41:24 | 000,000,911 | ---- | M] () -- C:\Users\Public\Desktop\Malwarebytes' Anti-Malware.lnk
[2011/10/13 12:39:18 | 000,000,948 | ---- | M] () -- C:\Users\eSteve\Application Data\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk
[2011/10/13 12:37:34 | 000,000,942 | ---- | M] () -- C:\Users\Public\Desktop\Ad-Aware.lnk
[2011/10/13 11:58:37 | 000,047,092 | ---- | M] () -- C:\Windows\System32\license.rtf
[2011/10/13 11:47:56 | 000,016,076 | ---- | M] () -- C:\Windows\System32\results.xml
[2011/10/13 11:45:06 | 000,000,000 | RHS- | M] () -- C:\Windows\System32\drivers\TOSHIBA_Satellite L300_08541-EN_PSLB8E-05V00.MRK
[2011/10/13 11:40:26 | 000,319,456 | ---- | M] (Microsoft Corporation) -- C:\Windows\DIFxAPI.dll
[2011/10/13 11:40:21 | 000,315,392 | ---- | M] (Realtek Semiconductor Corp.) -- C:\Windows\HideWin.exe
[2011/10/13 11:35:29 | 000,000,356 | ---- | M] () -- C:\Windows\tasks\McDefragTask.job
[2011/10/13 11:35:29 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\McQcTask.job
[1 C:\Windows\*.tmp files -> C:\Windows\*.tmp -> ]
========== Files Created - No Company Name ========== [2011/10/23 03:10:07 | 460,912,627 | ---- | C] () -- C:\Windows\MEMORY.DMP
[2011/10/22 23:33:19 | 000,000,064 | ---- | C] () -- C:\Windows\System32\rp_stats.dat
[2011/10/22 23:33:19 | 000,000,044 | ---- | C] () -- C:\Windows\System32\rp_rules.dat
[2011/10/14 12:36:58 | 000,000,886 | ---- | C] () -- C:\Windows\tasks\GoogleUpdateTaskMachineUA.job
[2011/10/14 12:36:57 | 000,000,882 | ---- | C] () -- C:\Windows\tasks\GoogleUpdateTaskMachineCore.job
[2011/10/14 12:22:08 | 000,001,084 | ---- | C] () -- C:\Users\eSteve\Application Data\Microsoft\Internet Explorer\Quick Launch\Spybot - Search & Destroy.lnk
[2011/10/14 12:22:08 | 000,001,060 | ---- | C] () -- C:\Users\eSteve\Desktop\Spybot - Search & Destroy.lnk
[2011/10/14 12:07:25 | 000,001,537 | ---- | C] () -- C:\Users\eSteve\Desktop\Windows Explorer.lnk
[2011/10/14 12:07:23 | 000,001,537 | ---- | C] () -- C:\Users\eSteve\Application Data\Microsoft\Internet Explorer\Quick Launch\Windows Explorer.lnk
[2011/10/14 12:05:40 | 000,002,525 | ---- | C] () -- C:\Users\eSteve\Desktop\HiJackThis.lnk
[2011/10/14 12:04:44 | 001,402,880 | ---- | C] () -- C:\Users\eSteve\Desktop\HijackThis.msi
[2011/10/14 12:02:43 | 3082,809,344 | -HS- | C] () -- C:\hiberfil.sys
[2011/10/13 17:15:39 | 000,201,184 | ---- | C] () -- C:\Windows\System32\winrm.vbs
[2011/10/13 17:15:39 | 000,002,426 | ---- | C] () -- C:\Windows\System32\WsmTxt.xsl
[2011/10/13 17:15:37 | 000,004,675 | ---- | C] () -- C:\Windows\System32\wsmanconfig_schema.xml
[2011/10/13 13:41:24 | 000,000,911 | ---- | C] () -- C:\Users\Public\Desktop\Malwarebytes' Anti-Malware.lnk
[2011/10/13 12:39:18 | 000,000,948 | ---- | C] () -- C:\Users\eSteve\Application Data\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk
[2011/10/13 12:37:34 | 000,000,942 | ---- | C] () -- C:\Users\Public\Desktop\Ad-Aware.lnk
[2011/10/13 12:36:24 | 000,000,954 | ---- | C] () -- C:\Users\eSteve\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Explorer.lnk
[2011/10/13 12:36:17 | 000,000,949 | ---- | C] () -- C:\Users\eSteve\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows Media Player.lnk
[2011/10/13 12:36:03 | 000,000,920 | ---- | C] () -- C:\Users\eSteve\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows Mail.lnk
[2011/10/13 12:19:02 | 000,000,258 | ---- | C] () -- C:\Users\eSteve\Application Data\Microsoft\Internet Explorer\Quick Launch\Shows Desktop.lnk
[2011/10/13 12:19:02 | 000,000,240 | ---- | C] () -- C:\Users\eSteve\Application Data\Microsoft\Internet Explorer\Quick Launch\Window Switcher.lnk
[2011/10/13 11:47:56 | 000,016,076 | ---- | C] () -- C:\Windows\System32\results.xml
[2011/10/13 11:46:31 | 000,128,113 | ---- | C] () -- C:\Windows\System32\csellang.ini
[2011/10/13 11:46:31 | 000,045,056 | ---- | C] () -- C:\Windows\System32\csellang.dll
[2011/10/13 11:46:31 | 000,009,484 | ---- | C] () -- C:\Windows\System32\tosmreg.ini
[2011/10/13 11:46:31 | 000,007,671 | ---- | C] () -- C:\Windows\System32\cseltbl.ini
[2011/10/13 11:45:06 | 000,000,000 | RHS- | C] () -- C:\Windows\System32\drivers\TOSHIBA_Satellite L300_08541-EN_PSLB8E-05V00.MRK
[2011/10/13 11:40:48 | 000,000,553 | ---- | C] () -- C:\Windows\USetup.iss
[2008/08/07 17:37:59 | 000,204,800 | ---- | C] () -- C:\Windows\System32\IVIresizeW7.dll
[2008/08/07 17:37:59 | 000,200,704 | ---- | C] () -- C:\Windows\System32\IVIresizeA6.dll
[2008/08/07 17:37:59 | 000,192,512 | ---- | C] () -- C:\Windows\System32\IVIresizeP6.dll
[2008/08/07 17:37:59 | 000,192,512 | ---- | C] () -- C:\Windows\System32\IVIresizeM6.dll
[2008/08/07 17:37:59 | 000,188,416 | ---- | C] () -- C:\Windows\System32\IVIresizePX.dll
[2008/08/07 17:37:59 | 000,020,480 | ---- | C] () -- C:\Windows\System32\IVIresize.dll
[2008/08/07 17:29:47 | 000,000,000 | ---- | C] () -- C:\Windows\NDSTray.INI
[2008/08/07 17:15:11 | 000,147,456 | ---- | C] () -- C:\Windows\System32\igfxCoIn_v1502.dll
[2008/08/07 17:15:10 | 002,192,024 | ---- | C] () -- C:\Windows\System32\igkrng500.bin
[2008/08/07 17:15:08 | 000,147,172 | ---- | C] () -- C:\Windows\System32\igfcg550.bin
[2008/08/07 17:15:07 | 000,492,496 | ---- | C] () -- C:\Windows\System32\igcompkrng500.bin
[2008/08/07 16:31:36 | 001,060,424 | ---- | C] () -- C:\Windows\System32\WdfCoInstaller01000.dll
[2008/01/21 03:24:14 | 000,100,043 | ---- | C] () -- C:\Windows\System32\StructuredQuerySchema.bin
[2006/11/02 13:57:28 | 000,067,584 | --S- | C] () -- C:\Windows\bootstat.dat
[2006/11/02 13:47:37 | 000,321,824 | ---- | C] () -- C:\Windows\System32\FNTCACHE.DAT
[2006/11/02 13:35:32 | 000,005,632 | ---- | C] () -- C:\Windows\System32\sysprepMCE.dll
[2006/11/02 11:33:01 | 000,600,378 | ---- | C] () -- C:\Windows\System32\perfh009.dat
[2006/11/02 11:33:01 | 000,287,440 | ---- | C] () -- C:\Windows\System32\perfi009.dat
[2006/11/02 11:33:01 | 000,105,852 | ---- | C] () -- C:\Windows\System32\perfc009.dat
[2006/11/02 11:33:01 | 000,030,674 | ---- | C] () -- C:\Windows\System32\perfd009.dat
[2006/11/02 11:23:21 | 000,215,943 | ---- | C] () -- C:\Windows\System32\dssec.dat
[2006/11/02 09:58:30 | 000,043,131 | ---- | C] () -- C:\Windows\mib.bin
[2006/11/02 09:19:00 | 000,000,741 | ---- | C] () -- C:\Windows\System32\NOISE.DAT
[2006/11/02 08:40:29 | 000,013,750 | ---- | C] () -- C:\Windows\System32\pacerprf.ini
[2006/11/02 08:25:31 | 000,673,088 | ---- | C] () -- C:\Windows\System32\mlang.dat
[2006/11/02 08:22:43 | 000,018,271 | ---- | C] () -- C:\Windows\System32\StructuredQuerySchemaTrivial.bin
< End of report >
Extras:
OTL Extras logfile created on: 23/10/2011 15:37:46 - Run 2
OTL by OldTimer - Version 3.2.31.0 Folder = C:\Users\eSteve\Desktop
Windows Vista Home Premium Edition Service Pack 1 (Version = 6.0.6001) - Type = NTWorkstation
Internet Explorer (Version = 7.0.6001.18000)
Locale: 00001809 | Country: Ireland | Language: ENI | Date Format: dd/MM/yyyy
2.87 Gb Total Physical Memory | 1.57 Gb Available Physical Memory | 54.84% Memory free
5.96 Gb Paging File | 4.80 Gb Available in Paging File | 80.59% Paging File free
Paging file location(s): ?:\pagefile.sys [binary data]
%SystemDrive% = C: | %SystemRoot% = C:\Windows | %ProgramFiles% = C:\Program Files
Drive C: | 116.29 Gb Total Space | 81.35 Gb Free Space | 69.95% Space Free | Partition Type: NTFS
Drive D: | 115.13 Gb Total Space | 57.64 Gb Free Space | 50.07% Space Free | Partition Type: NTFS
Drive F: | 991.22 Mb Total Space | 990.28 Mb Free Space | 99.91% Space Free | Partition Type: FAT
Computer Name: ESTEVE-PC | User Name: eSteve | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: All users
Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days
========== Extra Registry (SafeList) ========== ========== File Associations ========== [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>]
.cpl [@ = cplfile] -- C:\Windows\System32\control.exe (Microsoft Corporation)
.hlp [@ = hlpfile] -- C:\Windows\winhlp32.exe (Microsoft Corporation)
.url [@ = InternetShortcut] -- rundll32.exe ieframe.dll,OpenURL %l
========== Shell Spawning ========== [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<key>\shell\[command]\command]
batfile [open] -- "%1" %*
cmdfile [open] -- "%1" %*
comfile [open] -- "%1" %*
cplfile [cplopen] -- %SystemRoot%\System32\control.exe "%1",%* (Microsoft Corporation)
exefile [open] -- "%1" %*
helpfile [open] -- Reg Error: Key error.
hlpfile [open] -- %SystemRoot%\winhlp32.exe %1 (Microsoft Corporation)
inffile [install] -- %SystemRoot%\System32\InfDefaultInstall.exe "%1" (Microsoft Corporation)
InternetShortcut [open] -- rundll32.exe ieframe.dll,OpenURL %l
piffile [open] -- "%1" %*
regfile [merge] -- Reg Error: Key error.
scrfile [config] -- "%1"
scrfile [install] -- rundll32.exe desk.cpl,InstallScreenSaver %l
scrfile [open] -- "%1" /S
txtfile [edit] -- Reg Error: Key error.
Unknown [openas] -- %SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1
Directory [cmd] -- cmd.exe /s /k pushd "%V" (Microsoft Corporation)
Directory [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Folder [open] -- %SystemRoot%\Explorer.exe /separate,/idlist,%I,%L (Microsoft Corporation)
Folder [explore] -- %SystemRoot%\Explorer.exe /separate,/e,/idlist,%I,%L (Microsoft Corporation)
Drive [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
========== Security Center Settings ========== [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
"cval" = 1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring]
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring" = 1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeAntiVirus]
"DisableMonitoring" = 1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeFirewall]
"DisableMonitoring" = 1
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc]
"AntiVirusOverride" = 0
"AntiSpywareOverride" = 0
"FirewallOverride" = 0
"VistaSp1" = Reg Error: Unknown registry data type -- File not found
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc\Vol]
========== Firewall Settings ========== [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile]
"EnableFirewall" = 1
"DisableNotifications" = 0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"EnableFirewall" = 1
"DisableNotifications" = 0
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile]
"EnableFirewall" = 1
"DisableNotifications" = 0
========== Authorized Applications List ========== ========== Vista Active Open Ports Exception List ========== [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules]
========== Vista Active Application Exception List ========== [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules]
"{3BA6AD5F-B5C4-4A70-9B1E-DA764E2474B9}" = protocol=17 | dir=in | app=c:\program files\microsoft office\office12\onenote.exe |
"{43597A08-21ED-471C-AE18-6998A0F6D651}" = protocol=6 | dir=in | app=c:\program files\microsoft office\office12\onenote.exe |
"{FD7CF080-EB00-4B64-BB6E-264A649DAD5F}" = dir=in | app=c:\program files\common files\mcafee\mna\mcnasvc.exe |
========== HKEY_LOCAL_MACHINE Uninstall List ========== [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"{03FAA727-E2B7-471C-AC41-2E1C7F29C7EA}" = Toshiba TEMPRO
"{0D5D0BEE-FBA9-4928-A50D-6CDFAB827755}" = TOSHIBA ConfigFree
"{12B3A009-A080-4619-9A2A-C6DB151D8D67}" = TOSHIBA Assist
"{15BC8CD0-A65B-47D0-A2DD-90A824590FA8}" = Microsoft Works
"{2290A680-4083-410A-ADCC-7092C67FC052}" = Toshiba Online Product Information
"{2883F6F5-0509-43F3-868C-D50330DD9DD3}" = TOSHIBA Hardware Setup
"{3248F0A8-6813-11D6-A77B-00B0D0160060}" = Java 6 Update 6
"{385DD1DD-65AA-408D-8E70-74601C2DB7E6}" = Ad-Aware
"{3F92ABBB-6BBF-11D5-B229-002078017FBF}" = NetWaiting
"{415B2719-AD3A-4944-B404-C472DB6085B3}" = Cisco EAP-FAST Module
"{45A66726-69BC-466B-A7A4-12FCBA4883D7}" = HiJackThis
"{4B1E87C3-00DE-4898-8E39-E390AAEF2391}" = TOSHIBA Supervisor Password
"{5DA0E02F-970B-424B-BF41-513A5018E4C0}" = TOSHIBA Disc Creator
"{617C36FD-0CBE-4600-84B2-441CEB12FADF}" = TOSHIBA Extended Tiles for Windows Mobility Center
"{65DA2EC9-0642-47E9-AAE2-B5267AA14D75}" = Activation Assistant for the 2007 Microsoft Office suites
"{669C7BD8-DAA2-49B6-966C-F1E2AAE6B17E}" = Cisco PEAP Module
"{6C5F3BDC-0A1B-4436-A696-5939629D5C31}" = TOSHIBA DVD PLAYER
"{7299052b-02a4-4627-81f2-1818da5d550d}" = Microsoft Visual C++ 2005 Redistributable
"{773970F1-5EBA-4474-ADEE-1EA3B0A59492}" = TRDCReminder
"{83770D14-21B9-44B3-8689-F7B523F94560}" = Cisco LEAP Module
"{8833FFB6-5B0C-4764-81AA-06DFEED9A476}" = Realtek 8169 8168 8101E 8102E Ethernet Driver
"{90120000-0016-0409-0000-0000000FF1CE}" = Microsoft Office Excel MUI (English) 2007
"{90120000-0018-0409-0000-0000000FF1CE}" = Microsoft Office PowerPoint MUI (English) 2007
"{90120000-001B-0409-0000-0000000FF1CE}" = Microsoft Office Word MUI (English) 2007
"{90120000-001F-0409-0000-0000000FF1CE}" = Microsoft Office Proof (English) 2007
"{90120000-001F-040C-0000-0000000FF1CE}" = Microsoft Office Proof (French) 2007
"{90120000-001F-0C0A-0000-0000000FF1CE}" = Microsoft Office Proof (Spanish) 2007
"{90120000-0020-0409-0000-0000000FF1CE}" = Compatibility Pack for the 2007 Office system
"{90120000-002C-0409-0000-0000000FF1CE}" = Microsoft Office Proofing (English) 2007
"{90120000-006E-0409-0000-0000000FF1CE}" = Microsoft Office Shared MUI (English) 2007
"{90120000-00A1-0409-0000-0000000FF1CE}" = Microsoft Office OneNote MUI (English) 2007
"{90120000-0115-0409-0000-0000000FF1CE}" = Microsoft Office Shared Setup Metadata MUI (English) 2007
"{9068B2BE-D93A-4C0A-861C-5E35E2C0E09E}" = Intel® Matrix Storage Manager
"{91120000-002F-0000-0000-0000000FF1CE}" = Microsoft Office Home and Student 2007
"{95120000-00AF-0409-0000-0000000FF1CE}" = Microsoft Office PowerPoint Viewer 2007 (English)
"{9FE35071-CAB2-4E79-93E7-BFC6A2DC5C5D}" = CD/DVD Drive Acoustic Silencer
"{A92DAB39-4E2C-4304-9AB6-BC44E68B55E2}" = Google Update Helper
"{AC76BA86-7AD7-1033-7B44-A81200000003}" = Adobe Reader 8.1.2
"{B4092C6D-E886-4CB2-BA68-FE5A88D31DE6}_is1" = Spybot - Search & Destroy
"{B5FDA445-CAC4-4BA6-A8FB-A7212BD439DE}" = Microsoft XML Parser
"{B65BBB06-1F8E-48F5-8A54-B024A9E15FDF}" = TOSHIBA Recovery Disc Creator
"{C3A32068-8AB1-4327-BB16-BED9C6219DC7}" = Atheros Driver Installation Program
"{CE2CDD62-0124-36CA-84D3-9F4DCF5C5BD9}" = Microsoft .NET Framework 3.5 SP1
"{DC24971E-1946-445D-8A82-CE685433FA7D}" = Realtek USB 2.0 Card Reader
"{E38C00D0-A68B-4318-A8A6-F7D4B5B1DF0E}" = Windows Media Encoder 9 Series
"{E65C7D8E-186D-484B-BEA8-DEF0331CE600}" = TRORDCLauncher
"{E7271ABF-69D3-4E9D-AA0A-2DE34C10A93D}" = TOSHIBA Manuals
"{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}" = Realtek High Definition Audio Driver
"{F214EAA4-A069-4BAF-9DA4-4DB8BEEDE485}" = DVD MovieFactory for TOSHIBA
"{FEDD27A0-B306-45EF-BF58-B527406B42C8}" = TOSHIBA Value Added Package
"Activation Assistant for the 2007 Microsoft Office suites" = Activation Assistant for the 2007 Microsoft Office suites
"Adobe Flash Player ActiveX" = Adobe Flash Player ActiveX
"CNXT_MODEM_PCI_VEN_14F1&DEV_2C06&SUBSYS_14F10000" = HDAUDIO Soft Data Fax Modem with SmartCP
"Google Chrome" = Google Chrome
"HDMI" = Intel® Graphics Media Accelerator Driver
"HOMESTUDENTR" = Microsoft Office Home and Student 2007
"InstallShield_{617C36FD-0CBE-4600-84B2-441CEB12FADF}" = TOSHIBA Extended Tiles for Windows Mobility Center
"InstallShield_{773970F1-5EBA-4474-ADEE-1EA3B0A59492}" = TRDCReminder
"InstallShield_{E65C7D8E-186D-484B-BEA8-DEF0331CE600}" = TRORDCLauncher
"InstallShield_{FEDD27A0-B306-45EF-BF58-B527406B42C8}" = TOSHIBA Value Added Package
"Malwarebytes' Anti-Malware_is1" = Malwarebytes' Anti-Malware version 1.51.2.1300
"Microsoft .NET Framework 3.5 SP1" = Microsoft .NET Framework 3.5 SP1
"MSC" = McAfee SecurityCenter
"myphotobook" = myphotobook 3.6
"Picasa2" = Picasa 2
"SynTPDeinstKey" = Synaptics Pointing Device Driver
"Windows Media Encoder 9" = Windows Media Encoder 9 Series
========== Last 10 Event Log Errors ========== [ Application Events ]
Error - 13/10/2011 07:29:18 | Computer Name = eSteve-PC | Source = WinMgmt | ID = 10
Description =
Error - 13/10/2011 07:34:44 | Computer Name = eSteve-PC | Source = Application Error | ID = 1000
Description = Faulting application iexplore.exe, version 7.0.6001.18000, time stamp
0x47918f11, faulting module unknown, version 0.0.0.0, time stamp 0x00000000, exception
code 0xc0000005, fault offset 0x0139fbfe, process id 0xca4, application start time
0x01cc899c1a419445.
Error - 13/10/2011 07:37:35 | Computer Name = eSteve-PC | Source = SideBySide | ID = 16842785
Description = Activation context generation failed for "C:\Program Files\Lavasoft\Ad-Aware\Ad-Aware.exe".
Dependent
Assembly Microsoft.VC90.CRT,processorArchitecture="x86",publicKeyToken="1fc8b3b9a1e18e3b",type="win32",version="9.0.21022.8"
could not be found. Please use sxstrace.exe for detailed diagnosis.
Error - 13/10/2011 07:37:35 | Computer Name = eSteve-PC | Source = SideBySide | ID = 16842785
Description = Activation context generation failed for "C:\Program Files\Lavasoft\Ad-Aware\Ad-Aware.exe".
Dependent
Assembly Microsoft.VC90.CRT,processorArchitecture="x86",publicKeyToken="1fc8b3b9a1e18e3b",type="win32",version="9.0.21022.8"
could not be found. Please use sxstrace.exe for detailed diagnosis.
Error - 13/10/2011 08:42:34 | Computer Name = eSteve-PC | Source = Application Error | ID = 1000
Description = Faulting application iexplore.exe, version 7.0.6001.18000, time stamp
0x47918f11, faulting module unknown, version 0.0.0.0, time stamp 0x00000000, exception
code 0xc000001e, fault offset 0x0119fdd8, process id 0x15ac, application start time
0x01cc89a59489e005.
Error - 13/10/2011 10:21:18 | Computer Name = eSteve-PC | Source = Application Error | ID = 1000
Description = Faulting application iexplore.exe, version 7.0.6001.18000, time stamp
0x47918f11, faulting module SHLWAPI.dll, version 6.0.6001.18000, time stamp 0x4791a75c,
exception code 0xc0000005, fault offset 0x00015513, process id 0xef4, application
start time 0x01cc89b35f3233e5.
Error - 13/10/2011 10:25:51 | Computer Name = eSteve-PC | Source = Application Error | ID = 1000
Description = Faulting application explorer.exe, version 6.0.6001.18000, time stamp
0x47918e5d, faulting module unknown, version 0.0.0.0, time stamp 0x00000000, exception
code 0xc0000005, fault offset 0x0687fe2d, process id 0x53c, application start time
0x01cc899c4441b725.
Error - 13/10/2011 11:13:26 | Computer Name = eSteve-PC | Source = Application Error | ID = 1000
Description = Faulting application Explorer.EXE, version 6.0.6001.18000, time stamp
0x47918e5d, faulting module unknown, version 0.0.0.0, time stamp 0x00000000, exception
code 0xc0000096, fault offset 0x021cfd55, process id 0xc80, application start time
0x01cc89baa4890374.
Error - 13/10/2011 11:14:17 | Computer Name = eSteve-PC | Source = WinMgmt | ID = 10
Description =
Error - 13/10/2011 11:19:37 | Computer Name = eSteve-PC | Source = Application Error | ID = 1000
Description = Faulting application explorer.exe, version 6.0.6001.18000, time stamp
0x47918e5d, faulting module swg.dll_unloaded, version 0.0.0.0, time stamp 0x4804fa6a,
exception code 0xc0000005, fault offset 0x0569fbfc, process id 0xbf4, application
start time 0x01cc89bb0ffce314.
[ System Events ]
Error - 14/10/2011 09:16:57 | Computer Name = eSteve-PC | Source = Microsoft-Windows-WindowsUpdateClient | ID = 20
Description =
Error - 14/10/2011 09:16:57 | Computer Name = eSteve-PC | Source = Microsoft-Windows-WindowsUpdateClient | ID = 20
Description =
Error - 14/10/2011 09:16:57 | Computer Name = eSteve-PC | Source = Microsoft-Windows-WindowsUpdateClient | ID = 20
Description =
Error - 14/10/2011 09:16:57 | Computer Name = eSteve-PC | Source = Microsoft-Windows-WindowsUpdateClient | ID = 20
Description =
Error - 14/10/2011 09:16:57 | Computer Name = eSteve-PC | Source = Microsoft-Windows-WindowsUpdateClient | ID = 20
Description =
Error - 14/10/2011 09:16:57 | Computer Name = eSteve-PC | Source = Microsoft-Windows-WindowsUpdateClient | ID = 20
Description =
Error - 14/10/2011 09:16:57 | Computer Name = eSteve-PC | Source = Microsoft-Windows-WindowsUpdateClient | ID = 20
Description =
Error - 14/10/2011 09:16:57 | Computer Name = eSteve-PC | Source = Microsoft-Windows-WindowsUpdateClient | ID = 20
Description =
Error - 14/10/2011 09:16:57 | Computer Name = eSteve-PC | Source = Microsoft-Windows-WindowsUpdateClient | ID = 20
Description =
Error - 22/10/2011 18:31:37 | Computer Name = eSteve-PC | Source = HTTP | ID = 15016
Description =
< End of report >
symptoms are - Windows Explorer crashes on startup, programs won't install, Windows update cannot complete.
let me know what to do next. thanks! -Kieran