Hi there.
I have the same "problem" when running Sysinternal's tool.
So I searched the net and found zilch (aside your topic here).
Sysinternal have another very usefull tool called RegMon, that monitors realtime access to the registry, using a low level engine that would almost for sure log any acesses to the "problematic" key.
So I thought that being the key in the a347scsi service branch it could pretty much be related with any scsi device or scsi emultation device. My computer doesn't have any scsi hardware, so chances were that it might be an emulation of some sort. Among the tons of software installed there were only two that might use this kind of emulation: a backup software called Acronis TrueImage, and a well known software called Achool 120%.
Now I was getting somewhere. Checked the device manager, and two things camethe eye: 1st, Acronis created a hardware emulation device called Acronis TrueImage Backup Archive Explorer, wich seemed very much to be able to be our "rootkit". So having RegMon monitoring my registry I disabled and re-enabled this device to check if it rang any bells. Nope. This wasn't it.
Another thing curious: I had indeed a so called A347SCSI SCSI Controller, not having phisically zilch. Well, the next logical step was obvious: disabling and re-enabling the so called SCSI controller. Now this rang many bells, as you might check below:
System:4 CreateKey HKLM\SYSTEM\ControlSet002\Services\a347scsi\Config\jdgg40 SUCCESS Access: 0xF003F
System:4 QueryValue HKLM\SYSTEM\ControlSet002\Services\a347scsi\Config\jdgg40\ujdew BUFFER OVERFLOW
System:4 QueryValue HKLM\SYSTEM\ControlSet002\Services\a347scsi\Config\jdgg40\ujdew SUCCESS 20 02 00 00 BA DB D5 73 ...
System:4 QueryValue HKLM\SYSTEM\ControlSet002\Services\a347scsi\Config\jdgg40\ujdew SUCCESS 20 02 00 00 BA DB D5 73 ...
System:4 DeleteValueKey HKLM\SYSTEM\ControlSet002\Services\a347scsi\Config\jdgg40\ujdew SUCCESS
System:4 QueryValue HKLM\SYSTEM\ControlSet002\Services\a347scsi\Config\jdgg40\ljej40 SUCCESS 1F 17 C9 6E 81 51 F9 00 ...
System:4 DeleteValueKey HKLM\SYSTEM\ControlSet002\Services\a347scsi\Config\jdgg40\ljej40 SUCCESS
Along with this operation, a virtual DVD drive called AXV CD/DVD-ROM SCSI CDROM Device disapeared and re-apeard, indicating that this was the emulation object wich was responsible by the "rootkit" key.
This is indeed a emulated scsi device that Alchool creates in order to "directely work" with the medium images to overcome some of OS's limitations.
So chances are that Infohawk will have this software or some other software of this type installed on his computer that was responsible for the key.
Well, mistery solved (at least in my case). =)
Just registered to tell you guys this, and to "register" my findings for other to see in the future (it had been usefull if I had find this information an hour ago =P )