L2Mfix 1.02b
Running From:
C:\Documents and Settings\default\Desktop\l2mfix
RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright © 1999-2001 Frank Heyne Software (
http://www.heysoft.de)
This program is Freeware, use it on your own risk!
Access Control List for Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify:
(ID-NI) ALLOW Read BUILTIN\Users
(ID-IO) ALLOW Read BUILTIN\Users
(ID-NI) ALLOW Read BUILTIN\Power Users
(ID-IO) ALLOW Read BUILTIN\Power Users
(ID-NI) ALLOW Full access BUILTIN\Administrators
(ID-IO) ALLOW Full access BUILTIN\Administrators
(ID-NI) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access CREATOR OWNER
Setting registry permissions:
RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright © 1999-2001 Frank Heyne Software (
http://www.heysoft.de)
This program is Freeware, use it on your own risk!
Denying C access for really "Everyone"
- adding new ACCESS DENY entry
Registry Permissions set too:
RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright © 1999-2001 Frank Heyne Software (
http://www.heysoft.de)
This program is Freeware, use it on your own risk!
Access Control List for Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify:
(CI) DENY --C------- Everyone
(ID-NI) ALLOW Read BUILTIN\Users
(ID-IO) ALLOW Read BUILTIN\Users
(ID-NI) ALLOW Read BUILTIN\Power Users
(ID-IO) ALLOW Read BUILTIN\Power Users
(ID-NI) ALLOW Full access BUILTIN\Administrators
(ID-IO) ALLOW Full access BUILTIN\Administrators
(ID-NI) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access CREATOR OWNER
Setting up for Reboot
Starting Reboot!
C:\Documents and Settings\default\Desktop\l2mfix
System Rebooted!
Running From:
C:\Documents and Settings\default\Desktop\l2mfix
killing explorer and rundll32.exe
Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 Craig.Peacock@beyondlogic.org
Killing PID 1136 'explorer.exe'
Killing PID 1136 'explorer.exe'
Killing PID 1136 'explorer.exe'
Killing PID 1136 'explorer.exe'
Command Line Process Viewer/Killer/Suspender for Windows NT/2000/XP V2.03
Copyright© 2002-2003 Craig.Peacock@beyondlogic.org
Error, Cannot find a process with an image name of rundll32.exe
Scanning First Pass. Please Wait!
First Pass Completed
Second Pass Scanning
Second pass Completed!
Backing Up: C:\WINDOWS\system32\drsrslvr.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mqnsspc.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mel_hp.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\axidrab.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\uhbmon.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mpwebdvd.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mepbde40.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\i006lads1d06.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\lv2u09f9e.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\g8220ifoe82c0.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\mv4ml9h11.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\l4r0le9m1h.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\k026lafs1d26.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\n0p4la7q1d.dll
1 file(s) copied.
Backing Up: C:\WINDOWS\system32\guard.tmp
1 file(s) copied.
deleting: C:\WINDOWS\system32\drsrslvr.dll
Successfully Deleted: C:\WINDOWS\system32\drsrslvr.dll
deleting: C:\WINDOWS\system32\mqnsspc.dll
Successfully Deleted: C:\WINDOWS\system32\mqnsspc.dll
deleting: C:\WINDOWS\system32\mel_hp.dll
Successfully Deleted: C:\WINDOWS\system32\mel_hp.dll
deleting: C:\WINDOWS\system32\axidrab.dll
Successfully Deleted: C:\WINDOWS\system32\axidrab.dll
deleting: C:\WINDOWS\system32\uhbmon.dll
Successfully Deleted: C:\WINDOWS\system32\uhbmon.dll
deleting: C:\WINDOWS\system32\mpwebdvd.dll
Successfully Deleted: C:\WINDOWS\system32\mpwebdvd.dll
deleting: C:\WINDOWS\system32\mepbde40.dll
Successfully Deleted: C:\WINDOWS\system32\mepbde40.dll
deleting: C:\WINDOWS\system32\i006lads1d06.dll
Successfully Deleted: C:\WINDOWS\system32\i006lads1d06.dll
deleting: C:\WINDOWS\system32\lv2u09f9e.dll
Successfully Deleted: C:\WINDOWS\system32\lv2u09f9e.dll
deleting: C:\WINDOWS\system32\g8220ifoe82c0.dll
Successfully Deleted: C:\WINDOWS\system32\g8220ifoe82c0.dll
deleting: C:\WINDOWS\system32\mv4ml9h11.dll
Successfully Deleted: C:\WINDOWS\system32\mv4ml9h11.dll
deleting: C:\WINDOWS\system32\l4r0le9m1h.dll
Successfully Deleted: C:\WINDOWS\system32\l4r0le9m1h.dll
deleting: C:\WINDOWS\system32\k026lafs1d26.dll
Successfully Deleted: C:\WINDOWS\system32\k026lafs1d26.dll
deleting: C:\WINDOWS\system32\n0p4la7q1d.dll
Successfully Deleted: C:\WINDOWS\system32\n0p4la7q1d.dll
deleting: C:\WINDOWS\system32\guard.tmp
Successfully Deleted: C:\WINDOWS\system32\guard.tmp
Desktop.ini sucessfully removed
Zipping up files for submission:
adding: drsrslvr.dll (deflated 5%)
adding: mqnsspc.dll (deflated 4%)
adding: mel_hp.dll (deflated 5%)
adding: axidrab.dll (deflated 5%)
adding: uhbmon.dll (deflated 5%)
adding: mpwebdvd.dll (deflated 5%)
adding: mepbde40.dll (deflated 4%)
adding: i006lads1d06.dll (deflated 5%)
adding: lv2u09f9e.dll (deflated 5%)
adding: g8220ifoe82c0.dll (deflated 5%)
adding: mv4ml9h11.dll (deflated 5%)
adding: l4r0le9m1h.dll (deflated 5%)
adding: k026lafs1d26.dll (deflated 5%)
adding: n0p4la7q1d.dll (deflated 5%)
adding: guard.tmp (deflated 5%)
adding: echo.reg (deflated 9%)
adding: clear.reg (deflated 60%)
adding: desktop.ini (deflated 14%)
adding: readme.txt (deflated 49%)
adding: direct.txt (stored 0%)
adding: lo2.txt (deflated 79%)
adding: test2.txt (deflated 42%)
adding: test3.txt (deflated 41%)
adding: test5.txt (deflated 41%)
adding: test.txt (deflated 74%)
adding: xfind.txt (deflated 68%)
adding: backregs/shell.reg (deflated 74%)
adding: backregs/BD472F60-27FA-11cf-B8B4-444553540000.reg (deflated 34%)
adding: backregs/888DCA60-FC0A-11CF-8F0F-00C04FD7D062.reg (deflated 70%)
adding: backregs/393FDB46-EA02-45EC-A9E7-05A719F1F959.reg (deflated 69%)
adding: backregs/B7F364E9-22D9-461D-BBD8-4C0D79201613.reg (deflated 69%)
adding: backregs/61873D2B-23E6-4740-8DE4-E30F1F3760B3.reg (deflated 68%)
adding: backregs/0902DBAC-EDE2-4F03-AC72-65B8FC25C304.reg (deflated 70%)
adding: backregs/5DD86441-4BE8-44C7-8C7F-BF8740598C24.reg (deflated 70%)
Restoring Registry Permissions:
RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright © 1999-2001 Frank Heyne Software (
http://www.heysoft.de)
This program is Freeware, use it on your own risk!
Revoking access for really "Everyone"
Registry permissions set too:
RegDACL 5.1 - Permissions Manager for Registry keys for Windows NT 4 and above
Copyright © 1999-2001 Frank Heyne Software (
http://www.heysoft.de)
This program is Freeware, use it on your own risk!
Access Control List for Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify:
(ID-NI) ALLOW Read BUILTIN\Users
(ID-IO) ALLOW Read BUILTIN\Users
(ID-NI) ALLOW Read BUILTIN\Power Users
(ID-IO) ALLOW Read BUILTIN\Power Users
(ID-NI) ALLOW Full access BUILTIN\Administrators
(ID-IO) ALLOW Full access BUILTIN\Administrators
(ID-NI) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access NT AUTHORITY\SYSTEM
(ID-IO) ALLOW Full access CREATOR OWNER
Restoring Sedebugprivilege:
Granting SeDebugPrivilege to Administrators ... successful
deleting local copy: drsrslvr.dll
deleting local copy: mqnsspc.dll
deleting local copy: mel_hp.dll
deleting local copy: axidrab.dll
deleting local copy: uhbmon.dll
deleting local copy: mpwebdvd.dll
deleting local copy: mepbde40.dll
deleting local copy: i006lads1d06.dll
deleting local copy: lv2u09f9e.dll
deleting local copy: g8220ifoe82c0.dll
deleting local copy: mv4ml9h11.dll
deleting local copy: l4r0le9m1h.dll
deleting local copy: k026lafs1d26.dll
deleting local copy: n0p4la7q1d.dll
deleting local copy: guard.tmp
The following Is the Current Export of the Winlogon notify key:
****************************************************************************
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify]
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\crypt32chain]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,33,00,32,00,2e,00,64,00,6c,00,\
6c,00,00,00
"Logoff"="ChainWlxLogoffEvent"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cryptnet]
"Asynchronous"=dword:00000000
"Impersonate"=dword:00000000
"DllName"=hex(2):63,00,72,00,79,00,70,00,74,00,6e,00,65,00,74,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Logoff"="CryptnetWlxLogoffEvent"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\cscdll]
"DLLName"="cscdll.dll"
"Logon"="WinlogonLogonEvent"
"Logoff"="WinlogonLogoffEvent"
"ScreenSaver"="WinlogonScreenSaverEvent"
"Startup"="WinlogonStartupEvent"
"Shutdown"="WinlogonShutdownEvent"
"StartShell"="WinlogonStartShellEvent"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\draw32]
"DllName"=hex(2):64,00,72,00,61,00,77,00,33,00,32,00,2e,00,64,00,6c,00,6c,00,\
00,00
"Startup"="MedManager"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001
"MaxWait"=dword:00000001
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ScCertProp]
"DLLName"="wlnotify.dll"
"Logon"="SCardStartCertProp"
"Logoff"="SCardStopCertProp"
"Lock"="SCardSuspendCertProp"
"Unlock"="SCardResumeCertProp"
"Enabled"=dword:00000001
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\Schedule]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"StartShell"="SchedStartShell"
"Logoff"="SchedEventLogOff"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\sclgntfy]
"Logoff"="WLEventLogoff"
"Impersonate"=dword:00000000
"Asynchronous"=dword:00000001
"DllName"=hex(2):73,00,63,00,6c,00,67,00,6e,00,74,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\SensLogn]
"DLLName"="WlNotify.dll"
"Lock"="SensLockEvent"
"Logon"="SensLogonEvent"
"Logoff"="SensLogoffEvent"
"Safe"=dword:00000001
"MaxWait"=dword:00000258
"StartScreenSaver"="SensStartScreenSaverEvent"
"StopScreenSaver"="SensStopScreenSaverEvent"
"Startup"="SensStartupEvent"
"Shutdown"="SensShutdownEvent"
"StartShell"="SensStartShellEvent"
"PostShell"="SensPostShellEvent"
"Disconnect"="SensDisconnectEvent"
"Reconnect"="SensReconnectEvent"
"Unlock"="SensUnlockEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\termsrv]
"Asynchronous"=dword:00000000
"DllName"=hex(2):77,00,6c,00,6e,00,6f,00,74,00,69,00,66,00,79,00,2e,00,64,00,\
6c,00,6c,00,00,00
"Impersonate"=dword:00000000
"Logoff"="TSEventLogoff"
"Logon"="TSEventLogon"
"PostShell"="TSEventPostShell"
"Shutdown"="TSEventShutdown"
"StartShell"="TSEventStartShell"
"Startup"="TSEventStartup"
"MaxWait"=dword:00000258
"Reconnect"="TSEventReconnect"
"Disconnect"="TSEventDisconnect"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\wlballoon]
"DLLName"="wlnotify.dll"
"Logon"="RegisterTicketExpiredNotificationEvent"
"Logoff"="UnregisterTicketExpiredNotificationEvent"
"Impersonate"=dword:00000001
"Asynchronous"=dword:00000001
The following are the files found:
****************************************************************************
C:\WINDOWS\system32\drsrslvr.dll
C:\WINDOWS\system32\mqnsspc.dll
C:\WINDOWS\system32\mel_hp.dll
C:\WINDOWS\system32\axidrab.dll
C:\WINDOWS\system32\uhbmon.dll
C:\WINDOWS\system32\mpwebdvd.dll
C:\WINDOWS\system32\mepbde40.dll
C:\WINDOWS\system32\i006lads1d06.dll
C:\WINDOWS\system32\lv2u09f9e.dll
C:\WINDOWS\system32\g8220ifoe82c0.dll
C:\WINDOWS\system32\mv4ml9h11.dll
C:\WINDOWS\system32\l4r0le9m1h.dll
C:\WINDOWS\system32\k026lafs1d26.dll
C:\WINDOWS\system32\n0p4la7q1d.dll
C:\WINDOWS\system32\guard.tmp
Registry Entries that were Deleted:
Please verify that the listing looks ok.
If there was something deleted wrongly there are backups in the backreg folder.
****************************************************************************
REGEDIT4
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved]
"{BD472F60-27FA-11cf-B8B4-444553540000}"=-
"{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}"=-
"{393FDB46-EA02-45EC-A9E7-05A719F1F959}"=-
"{B7F364E9-22D9-461D-BBD8-4C0D79201613}"=-
"{61873D2B-23E6-4740-8DE4-E30F1F3760B3}"=-
"{0902DBAC-EDE2-4F03-AC72-65B8FC25C304}"=-
"{5DD86441-4BE8-44C7-8C7F-BF8740598C24}"=-
[-HKEY_CLASSES_ROOT\CLSID\{BD472F60-27FA-11cf-B8B4-444553540000}]
[-HKEY_CLASSES_ROOT\CLSID\{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}]
[-HKEY_CLASSES_ROOT\CLSID\{393FDB46-EA02-45EC-A9E7-05A719F1F959}]
[-HKEY_CLASSES_ROOT\CLSID\{B7F364E9-22D9-461D-BBD8-4C0D79201613}]
[-HKEY_CLASSES_ROOT\CLSID\{61873D2B-23E6-4740-8DE4-E30F1F3760B3}]
[-HKEY_CLASSES_ROOT\CLSID\{0902DBAC-EDE2-4F03-AC72-65B8FC25C304}]
[-HKEY_CLASSES_ROOT\CLSID\{5DD86441-4BE8-44C7-8C7F-BF8740598C24}]
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform]
"{435D050B-484C-4F10-BB71-0B9E93ADA7B1}"=-
****************************************************************************
Desktop.ini Contents:
****************************************************************************
[.ShellClassInfo]
CLSID={645FF040-5081-101B-9F08-00AA002F954E}
<IDone>{435D050B-484C-4F10-BB71-0B9E93ADA7B1}</IDone>
<IDtwo>AD</IDtwo>
<VERSION>200</VERSION>
****************************************************************************