Results of system analysis

Kaspersky Virus Removal Tool 11.0.0.1245 (database released 20/09/2011; 10:23)

List of processes

File namePIDDescriptionCopyrightMD5Information
AESTSr64.exe
Script: Quarantine, Delete, BC delete, Terminate
1592  ??error getting file info
Command line:
SASCore64.exe
Script: Quarantine, Delete, BC delete, Terminate
1568  ??error getting file info
Command line:
stacsv64.exe
Script: Quarantine, Delete, BC delete, Terminate
948  ??error getting file info
Command line:
sttray64.exe
Script: Quarantine, Delete, BC delete, Terminate
4996  ??error getting file info
Command line:
SynTPEnh.exe
Script: Quarantine, Delete, BC delete, Terminate
5004  ??error getting file info
Command line:
SynTPHelper.exe
Script: Quarantine, Delete, BC delete, Terminate
4384  ??error getting file info
Command line:
wmpnetwk.exe
Script: Quarantine, Delete, BC delete, Terminate
5248  ??error getting file info
Command line:
Detected:68, recognized as trusted 61
Module nameHandleDescriptionCopyrightMD5Used by processes
Modules detected:443, recognized as trusted 443

Kernel Space Modules Viewer

ModuleBase addressSize in memoryDescriptionManufacturer
C:\Windows\System32\Drivers\dump_dumpfve.sys
Script: Quarantine, Delete, BC delete
660E000013000 (77824)
C:\Windows\System32\Drivers\dump_iaStor.sys
Script: Quarantine, Delete, BC delete
4A21000208000 (2129920)
Modules detected - 204, recognized as trusted - 202

Services

ServiceDescriptionStatusFileGroupDependencies
gupdate
Service: Stop, Delete, Disable, BC delete
Google Update Service (gupdate)Not startedC:\Program Files (x86)\Google\Update\GoogleUpdate.exe
Script: Quarantine, Delete, BC delete
 RPCSS
gupdatem
Service: Stop, Delete, Disable, BC delete
Google Update Service (gupdatem)Not startedC:\Program Files (x86)\Google\Update\GoogleUpdate.exe
Script: Quarantine, Delete, BC delete
 RPCSS
Detected - 172, recognized as trusted - 170

Drivers

ServiceDescriptionStatusFileGroupDependencies
Detected - 270, recognized as trusted - 270

Autoruns

File nameStatusStartup methodDescription
C:\Program Files (x86)\Citrix\GoToAssist\514\G2AWinLogon_x64.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\GoToAssist, DLLName
Delete
C:\Program Files (x86)\Dell\DellDock\DellDock.exe
Script: Quarantine, Delete, BC delete
ActiveShortcut in Autoruns folderC:\Users\Regjon Higgins\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\, C:\Users\Regjon Higgins\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dell Dock.lnk,
C:\Users\Regjon Higgins\AppData\Local\Temp\_uninst_88646186.bat
Script: Quarantine, Delete, BC delete
ActiveShortcut in Autoruns folderC:\Users\Regjon Higgins\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\, C:\Users\Regjon Higgins\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_uninst_88646186.lnk,
C:\Users\Regjon Higgins\AppData\Local\Temp\_uninst_89585899.bat
Script: Quarantine, Delete, BC delete
ActiveShortcut in Autoruns folderC:\Users\Regjon Higgins\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\, C:\Users\Regjon Higgins\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_uninst_89585899.lnk,
C:\Windows\System32\appmgmts.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\AppMgmt\Parameters, ServiceDll
Delete
C:\Windows\system32\psxss.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Session Manager\SubSystems, Posix
C:\d910ac4ce79853401de3\DW\DW20.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\VSSetup, EventMessageFile
auditcse.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions\{f3ccc681-b74c-4060-9f26-cd84525dca2a}, DLLName
Delete
igfxdev.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\igfxcui, DLLName
Delete
rdpclip
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Terminal Server\Wds\rdpwd, StartupPrograms
Delete
Autoruns items detected - 605, recognized as trusted - 595

Microsoft Internet Explorer extension modules (BHOs, Toolbars ...)

File nameTypeDescriptionManufacturerCLSID
Extension module{2670000A-7350-4f3c-8081-5663EE0C6C49}
Delete
Extension module{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}
Delete
Elements detected - 6, recognized as trusted - 4

Windows Explorer extension modules

File nameDestinationDescriptionManufacturerCLSID
ColumnHandler{F9DB5320-233E-11D1-9F84-707F02C10627}
Delete
Elements detected - 14, recognized as trusted - 13

Printing system extensions (print monitors, providers)

File nameTypeNameDescriptionManufacturer
hpzllw71.dll
Script: Quarantine, Delete, BC delete
MonitorLIDIL hpzllw71
localspl.dll
Script: Quarantine, Delete, BC delete
MonitorLocal Port
FXSMON.DLL
Script: Quarantine, Delete, BC delete
MonitorMicrosoft Shared Fax Monitor
hpz3lw71.dll
Script: Quarantine, Delete, BC delete
MonitorPCL hpz3lw71
PJLMON.DLL
Script: Quarantine, Delete, BC delete
MonitorPJL Language Monitor
tcpmon.dll
Script: Quarantine, Delete, BC delete
MonitorStandard TCP/IP Port
usbmon.dll
Script: Quarantine, Delete, BC delete
MonitorUSB Monitor
WSDMon.dll
Script: Quarantine, Delete, BC delete
MonitorWSD Port
inetpp.dll
Script: Quarantine, Delete, BC delete
ProviderHTTP Print Services
Elements detected - 10, recognized as trusted - 1

Task Scheduler jobs

File nameJob nameJob statusDescriptionManufacturer
Elements detected - 0, recognized as trusted - 0

SPI/LSP settings

Namespace providers (NSP)
ProviderStatusEXE fileDescriptionGUID
Detected - 9, recognized as trusted - 9
Transport protocol providers (TSP, LSP)
ProviderEXE fileDescription
Detected - 10, recognized as trusted - 10
Results of automatic SPI settings check
LSP settings checked. No errors detected

TCP/UDP ports

PortStatusRemote HostRemote PortApplicationNotes
TCP ports
135LISTENING0.0.0.00[720] svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
139LISTENING0.0.0.00[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
445LISTENING0.0.0.00[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
554LISTENING0.0.0.00[5248] wmpnetwk.exe
Script: Quarantine, Delete, BC delete, Terminate
 
2869LISTENING0.0.0.00[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
5354LISTENING0.0.0.00[1668] c:\program files (x86)\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5357LISTENING0.0.0.00[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
10243LISTENING0.0.0.00[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
27015LISTENING0.0.0.00[1620] c:\program files (x86)\common files\apple\mobile device support\applemobiledeviceservice.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49152LISTENING0.0.0.00[456] wininit.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49153LISTENING0.0.0.00[784] svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49154LISTENING0.0.0.00[900] svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49155LISTENING0.0.0.00[536] lsass.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49156LISTENING0.0.0.00[1404] spoolsv.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49157LISTENING0.0.0.00[1796] c:\program files (x86)\norton security suite\engine\4.3.0.5\ccsvchst.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49159LISTENING0.0.0.00[512] services.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49295LISTENING0.0.0.00[5060] c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe
Script: Quarantine, Delete, BC delete, Terminate
 
59309TIME_WAIT192.168.1.15000[0]   
59310TIME_WAIT192.168.1.15000[0]   
59311TIME_WAIT192.168.1.15000[0]   
59323TIME_WAIT192.168.1.15000[0]   
59324TIME_WAIT192.168.1.15000[0]   
59325TIME_WAIT192.168.1.15000[0]   
59334TIME_WAIT192.168.1.11780[0]   
59338TIME_WAIT192.168.1.15000[0]   
59339TIME_WAIT192.168.1.15000[0]   
59340TIME_WAIT192.168.1.15000[0]   
UDP ports
137LISTENING----[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
138LISTENING----[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
500LISTENING----[900] svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1900LISTENING----[1704] svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1900LISTENING----[1704] svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
3544LISTENING----[900] svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
3702LISTENING----[432] svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
3702LISTENING----[432] svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
3702LISTENING----[1704] svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
3702LISTENING----[1704] svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
4500LISTENING----[900] svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5004LISTENING----[5248] wmpnetwk.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5005LISTENING----[5248] wmpnetwk.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5353LISTENING----[1668] c:\program files (x86)\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5355LISTENING----[972] svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49347LISTENING----[1704] svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49348LISTENING----[1704] svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
53623LISTENING----[1704] svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
53625LISTENING----[1404] spoolsv.exe
Script: Quarantine, Delete, BC delete, Terminate
 
54645LISTENING----[432] svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
56024LISTENING----[900] svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
58974LISTENING----[1620] c:\program files (x86)\common files\apple\mobile device support\applemobiledeviceservice.exe
Script: Quarantine, Delete, BC delete, Terminate
 
58975LISTENING----[1620] c:\program files (x86)\common files\apple\mobile device support\applemobiledeviceservice.exe
Script: Quarantine, Delete, BC delete, Terminate
 
58976LISTENING----[1668] c:\program files (x86)\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, BC delete, Terminate
 

Downloaded Program Files (DPF)

File nameDescriptionManufacturerCLSIDSource URL
C:\Program Files\Java\jre6\bin\npjpi160_20.dll
Script: Quarantine, Delete, BC delete
{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}
Delete
http://java.sun.com/update/1.6.0/jinstall-1_6_0_20-windows-i586.cab
Elements detected - 3, recognized as trusted - 2

Control Panel Applets (CPL)

File nameDescriptionManufacturer
Elements detected - 18, recognized as trusted - 18

Active Setup

File nameDescriptionManufacturerCLSID
Elements detected - 9, recognized as trusted - 9

HOSTS file

Hosts file record
127.0.0.1       localhost
Clear Hosts file

Protocols and handlers

File nameTypeDescriptionManufacturerCLSID
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
Elements detected - 16, recognized as trusted - 13

Suspicious objects

FileDescriptionType


Main script of analysis
Windows version: Windows 7 Home Premium, Build=7600, SP=""
System Restore: enabled
>> Services: potentially dangerous service allowed: TermService (@%SystemRoot%\System32\termsrv.dll,-268)
>> Services: potentially dangerous service allowed: SSDPSRV (@%systemroot%\system32\ssdpsrv.dll,-100)
>> Services: potentially dangerous service allowed: Schedule (@%SystemRoot%\system32\schedsvc.dll,-100)
> Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)!
>> Security: disk drives' autorun is enabled
>> Security: administrative shares (C$, D$ ...) are enabled
>> Security: anonymous user access is enabled
>> Security: sending Remote Assistant queries is enabled
 >>  Disable HDD autorun
 >>  Disable autorun from network drives
 >>  Disable CD/DVD autorun
 >>  Disable removable media autorun
 >>  Windows Explorer - show extensions of known file types
System Analysis in progress

System Analysis - complete
Script commands
Add commands to script:
Additional operations:
File list