Kaspersky Virus Removal Tool 11.0.0.1245 (database released 28/11/2011; 07:04)
File name | PID | Description | Copyright | MD5 | Information
c:\windows\explorer.exe | Script: Quarantine, Delete, BC delete, Terminate 32248 | Windows Explorer | © Microsoft Corporation. All rights reserved. | ?? | 2579.00 kb, rsAh, | created: 27.05.2011 04:35:33, modified: 20.11.2010 16:29:20 Command line: C:\WINDOWS\EXPLORER.EXE c:\windows\system32\svchost.exe | Script: Quarantine, Delete, BC delete, Terminate 1200 | Host Process for Windows Services | © Microsoft Corporation. All rights reserved. | ?? | 44.50 kb, rsAh, | created: 13.07.2009 18:19:28, modified: 20.11.2010 16:29:20 Command line: C:\Windows\system32\svchost.exe -k netsvcs c:\windows\system32\svchost.exe | Script: Quarantine, Delete, BC delete, Terminate 944 | Host Process for Windows Services | © Microsoft Corporation. All rights reserved. | ?? | 44.50 kb, rsAh, | created: 13.07.2009 18:19:28, modified: 20.11.2010 16:29:20 Command line: C:\Windows\system32\svchost.exe -k SDRSVC c:\windows\system32\svchost.exe | Script: Quarantine, Delete, BC delete, Terminate 1344 | Host Process for Windows Services | © Microsoft Corporation. All rights reserved. | ?? | 44.50 kb, rsAh, | created: 13.07.2009 18:19:28, modified: 20.11.2010 16:29:20 Command line: C:\Windows\system32\svchost.exe -k LocalService c:\windows\system32\svchost.exe | Script: Quarantine, Delete, BC delete, Terminate 904 | Host Process for Windows Services | © Microsoft Corporation. All rights reserved. | ?? | 44.50 kb, rsAh, | created: 13.07.2009 18:19:28, modified: 20.11.2010 16:29:20 Command line: C:\Windows\system32\svchost.exe -k DcomLaunch c:\windows\system32\svchost.exe | Script: Quarantine, Delete, BC delete, Terminate 1480 | Host Process for Windows Services | © Microsoft Corporation. All rights reserved. | ?? | 44.50 kb, rsAh, | created: 13.07.2009 18:19:28, modified: 20.11.2010 16:29:20 Command line: C:\Windows\system32\svchost.exe -k NetworkService c:\windows\system32\svchost.exe | Script: Quarantine, Delete, BC delete, Terminate 1004 | Host Process for Windows Services | © Microsoft Corporation. All rights reserved. | ?? | 44.50 kb, rsAh, | created: 13.07.2009 18:19:28, modified: 20.11.2010 16:29:20 Command line: C:\Windows\system32\svchost.exe -k RPCSS c:\windows\system32\svchost.exe | Script: Quarantine, Delete, BC delete, Terminate 1708 | Host Process for Windows Services | © Microsoft Corporation. All rights reserved. | ?? | 44.50 kb, rsAh, | created: 13.07.2009 18:19:28, modified: 20.11.2010 16:29:20 Command line: C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork c:\windows\system32\svchost.exe | Script: Quarantine, Delete, BC delete, Terminate 1080 | Host Process for Windows Services | © Microsoft Corporation. All rights reserved. | ?? | 44.50 kb, rsAh, | created: 13.07.2009 18:19:28, modified: 20.11.2010 16:29:20 Command line: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted c:\windows\system32\svchost.exe | Script: Quarantine, Delete, BC delete, Terminate 1148 | Host Process for Windows Services | © Microsoft Corporation. All rights reserved. | ?? | 44.50 kb, rsAh, | created: 13.07.2009 18:19:28, modified: 20.11.2010 16:29:20 Command line: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted c:\windows\system32\svchost.exe | Script: Quarantine, Delete, BC delete, Terminate 1988 | Host Process for Windows Services | © Microsoft Corporation. All rights reserved. | ?? | 44.50 kb, rsAh, | created: 13.07.2009 18:19:28, modified: 20.11.2010 16:29:20 Command line: C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation c:\windows\system32\svchost.exe | Script: Quarantine, Delete, BC delete, Terminate 2044 | Host Process for Windows Services | © Microsoft Corporation. All rights reserved. | ?? | 44.50 kb, rsAh, | created: 13.07.2009 18:19:28, modified: 20.11.2010 16:29:20 Command line: C:\Windows\system32\svchost.exe -k imgsvc c:\windows\system32\svchost.exe | Script: Quarantine, Delete, BC delete, Terminate 3540 | Host Process for Windows Services | © Microsoft Corporation. All rights reserved. | ?? | 44.50 kb, rsAh, | created: 13.07.2009 18:19:28, modified: 20.11.2010 16:29:20 Command line: C:\Windows\System32\svchost.exe -k LocalServicePeerNet c:\windows\system32\winlogon.exe | Script: Quarantine, Delete, BC delete, Terminate 796 | Windows Logon Application | © Microsoft Corporation. All rights reserved. | ?? | 304.00 kb, rsAh, | created: 20.11.2010 16:29:06, modified: 20.11.2010 16:29:20 Command line: winlogon.exe Detected:68, recognized as trusted 54
| |
Module name | Handle | Description | Copyright | MD5 | Used by processes
Modules detected:574, recognized as trusted 574
| |
Module | Base address | Size in memory | Description | Manufacturer
C:\Windows\System32\Drivers\dump_diskdump.sys | Script: Quarantine, Delete, BC delete 92C63000 | 00A000 (40960) |
| C:\Windows\System32\Drivers\dump_dumpfve.sys | Script: Quarantine, Delete, BC delete 92C83000 | 011000 (69632) |
| C:\Windows\System32\Drivers\dump_SI3112.sys | Script: Quarantine, Delete, BC delete 92C6D000 | 016000 (90112) |
| Modules detected - 173, recognized as trusted - 170
| |
Service | Description | Status | File | Group | Dependencies
VGPU | Driver: Unload, Delete, Disable, BC delete VGPU | Not started | C:\Windows\system32\drivers\rdvgkmd.sys | Script: Quarantine, Delete, BC delete |
| Detected - 271, recognized as trusted - 270
| |
File name | Status | Startup method | Description
C:\Perl\bin\PerlMsg.dll | Script: Quarantine, Delete, BC delete -- | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\PerlMsg, EventMessageFile
| C:\Program Files\TightVNC\WinVNC.exe | Script: Quarantine, Delete, BC delete Active | Shortcut in Autoruns folder | C:\Users\oh\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\, C:\Users\oh\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Launch TightVNC Server.lnk,
| C:\Users\oh\AppData\Local\Temp\_uninst_35891284.bat | Script: Quarantine, Delete, BC delete Active | Shortcut in Autoruns folder | C:\Users\oh\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\, C:\Users\oh\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_uninst_35891284.lnk,
| C:\Windows\System32\winlogon.exe | Script: Quarantine, Delete, BC delete -- | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Winlogon, EventMessageFile
| C:\Windows\System32\winlogon.exe | Script: Quarantine, Delete, BC delete -- | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Wlclntfy, EventMessageFile
| C:\Windows\system32\psxss.exe | Script: Quarantine, Delete, BC delete -- | Registry key | HKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Session Manager\SubSystems, Posix
| C:\Windows\system32\winlogon.exe | Script: Quarantine, Delete, BC delete -- | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\Microsoft-Windows-Winlogon, EventMessageFile
| progman.exe | Script: Quarantine, Delete, BC delete Active | Registry key | HKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, shell | Delete vgafix.fon | Script: Quarantine, Delete, BC delete Active | Registry key | HKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fixedfon.fon | Delete vgaoem.fon | Script: Quarantine, Delete, BC delete Active | Registry key | HKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, oemfonts.fon | Delete vgasys.fon | Script: Quarantine, Delete, BC delete Active | Registry key | HKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fonts.fon | Delete Autoruns items detected - 598, recognized as trusted - 587
| |
File name | Type | Description | Manufacturer | CLSID
Elements detected - 2, recognized as trusted - 2
| |
File name | Destination | Description | Manufacturer | CLSID
WebCheck | {E6FB5E20-DE35-11CF-9C87-00AA005127ED} | Delete AVG Find Extension | {9F97547E-460A-42C5-AE0C-81C61FFAEBC3} | Delete Elements detected - 19, recognized as trusted - 17
| |
File name | Type | Name | Description | Manufacturer
Elements detected - 7, recognized as trusted - 7
| |
File name | Job name | Job status | Description | Manufacturer
Elements detected - 2, recognized as trusted - 2
| |
Provider | Status | EXE file | Description | GUID
Detected - 6, recognized as trusted - 6
| |
Provider | EXE file | Description
Detected - 20, recognized as trusted - 20
| |
File name | Description | Manufacturer | CLSID | Source URL
Elements detected - 3, recognized as trusted - 3
| |
File name | Description | Manufacturer
Elements detected - 22, recognized as trusted - 22
| |
File name | Description | Manufacturer | CLSID
Elements detected - 9, recognized as trusted - 9
| |
Hosts file record
|
File name | Type | Description | Manufacturer | CLSID
mscoree.dll | Script: Quarantine, Delete, BC delete Protocol | Microsoft .NET Runtime Execution Engine () | © Microsoft Corporation. All rights reserved. | {1E66F26B-79EE-11D2-8710-00C04F79ED0D} | Delete mscoree.dll | Script: Quarantine, Delete, BC delete Protocol | Microsoft .NET Runtime Execution Engine () | © Microsoft Corporation. All rights reserved. | {1E66F26B-79EE-11D2-8710-00C04F79ED0D} | Delete mscoree.dll | Script: Quarantine, Delete, BC delete Protocol | Microsoft .NET Runtime Execution Engine () | © Microsoft Corporation. All rights reserved. | {1E66F26B-79EE-11D2-8710-00C04F79ED0D} | Delete Elements detected - 14, recognized as trusted - 11
| |
File | Description | Type
C:\Windows\system32\DRIVERS\AVGIDSShim.Sys | Script: Quarantine, Delete, BC delete Suspicion for Rootkit | Kernel-mode hook
| |
Main script of analysis Windows version: Windows 7 Enterprise, Build=7601, SP="Service Pack 1" System Restore: enabled 1.1 Searching for user-mode API hooks Analysis: kernel32.dll, export table found in section .text IAT modification detected: CreateProcessA - 003C0010<>76102082 IAT modification detected: GetModuleFileNameA - 003C0080<>7614D75A IAT modification detected: FreeLibrary - 003C00F0<>7614EF67 IAT modification detected: GetModuleFileNameW - 003C0160<>7614EF35 IAT modification detected: CreateProcessW - 003C01D0<>7610204D IAT modification detected: LoadLibraryW - 003C02B0<>7614EF42 IAT modification detected: LoadLibraryA - 003C0320<>7614DC65 IAT modification detected: GetProcAddress - 003C0390<>7614CC94 Analysis: ntdll.dll, export table found in section .text Analysis: user32.dll, export table found in section .text Analysis: advapi32.dll, export table found in section .text Analysis: ws2_32.dll, export table found in section .text Analysis: wininet.dll, export table found in section .text Analysis: rasapi32.dll, export table found in section .text Analysis: urlmon.dll, export table found in section .text Analysis: netapi32.dll, export table found in section .text 1.2 Searching for kernel-mode API hooks Driver loaded successfully SDT found (RVA=15FA80) Kernel ntoskrnl.exe found in memory at address 8284C000 SDT = 829ABA80 KiST = 828A870C (401) Function NtOpenProcess (BE) intercepted (82A64E27->92E31F3C), hook C:\Windows\system32\DRIVERS\AVGIDSShim.Sys, driver recognized as trusted >>> Function restored successfully ! >>> Hook code blocked Function NtTerminateProcess (172) intercepted (82A65306->92E31FE4), hook C:\Windows\system32\DRIVERS\AVGIDSShim.Sys, driver recognized as trusted >>> Function restored successfully ! >>> Hook code blocked Function NtTerminateThread (173) intercepted (82A7C7C4->92E32080), hook C:\Windows\system32\DRIVERS\AVGIDSShim.Sys, driver recognized as trusted >>> Function restored successfully ! >>> Hook code blocked Function NtWriteVirtualMemory (18F) intercepted (82A95123->92E3211C), hook C:\Windows\system32\DRIVERS\AVGIDSShim.Sys, driver recognized as trusted >>> Function restored successfully ! >>> Hook code blocked Functions checked: 401, intercepted: 4, restored: 4 1.3 Checking IDT and SYSENTER Analysis for CPU 1 Analysis for CPU 2 CmpCallCallBacks = 00000000 Checking IDT and SYSENTER - complete 1.4 Searching for masking processes and drivers Checking not performed: extended monitoring driver (AVZPM) is not installed 1.5 Checking of IRP handlers Driver loaded successfully Checking - complete >> Services: potentially dangerous service allowed: TermService (Remote Desktop Services) >> Services: potentially dangerous service allowed: SSDPSRV (SSDP Discovery) >> Services: potentially dangerous service allowed: Schedule (Task Scheduler) > Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)! >> Security: disk drives' autorun is enabled >> Security: administrative shares (C$, D$ ...) are enabled >> Security: anonymous user access is enabled >> Security: sending Remote Assistant queries is enabled >> Security: automatic logon is enabled >> Disable HDD autorun >> Disable autorun from network drives >> Disable CD/DVD autorun >> Disable removable media autorun >> Windows Explorer - show extensions of known file types System Analysis in progressAdd commands to script:
System Analysis - complete
Script commands