Results of system analysis

Kaspersky Virus Removal Tool 11.0.0.1245 (database released 29/12/2011; 19:39)

List of processes

File namePIDDescriptionCopyrightMD5Information
c:\program files\common files\apple\mobile device support\applemobiledeviceservice.exe
Script: Quarantine, Delete, BC delete, Terminate
4040Apple Mobile Device Service© 2010 Apple Inc. All rights reserved.??136.00 kb, rsAh,
created: 13.08.2010 12:58:56,
modified: 13.08.2010 12:58:56
Command line:
"C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe"
c:\windows\system32\atieclxx.exe
Script: Quarantine, Delete, BC delete, Terminate
1332AMD External Events Client ModuleCopyright © 2008-2009 AMD??408.00 kb, rsAh,
created: 25.10.2011 21:01:18,
modified: 25.10.2011 21:01:18
Command line:
atieclxx
c:\windows\system32\atiesrxx.exe
Script: Quarantine, Delete, BC delete, Terminate
844AMD External Events Service ModuleCopyright © 2008-2009 AMD??172.00 kb, rsAh,
created: 25.10.2011 21:00:46,
modified: 25.10.2011 21:00:46
Command line:
C:\Windows\system32\atiesrxx.exe
c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, BC delete, Terminate
1592Bonjour ServiceCopyright (C) 2003-2010 Apple Inc.??332.00 kb, rsAh,
created: 27.07.2010 18:44:08,
modified: 27.07.2010 18:44:08
Command line:
"C:\Program Files\Bonjour\mDNSResponder.exe"
c:\program files\windows sidebar\sidebar.exe
Script: Quarantine, Delete, BC delete, Terminate
656Gadgets de escritorio de Windows© Microsoft Corporation. Reservados todos los derechos.??1146.00 kb, rsAh,
created: 13.07.2009 18:41:21,
modified: 13.07.2009 20:14:38
Command line:
"C:\Program Files\Windows Sidebar\sidebar.exe" /autoRun
c:\program files\common files\microsoft shared\windows live\wlidsvc.exe
Script: Quarantine, Delete, BC delete, Terminate
1880Microsoft® Windows Live ID ServiceCopyright © 1995-2010 Microsoft Corp.??1667.50 kb, rsAh,
created: 28.03.2011 20:31:14,
modified: 28.03.2011 20:31:14
Command line:
"C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE"
c:\program files\common files\microsoft shared\windows live\wlidsvcm.exe
Script: Quarantine, Delete, BC delete, Terminate
1960Microsoft® Windows Live ID Service MonitorCopyright © 1995-2010 Microsoft Corp.??183.50 kb, rsAh,
created: 28.03.2011 20:31:16,
modified: 28.03.2011 20:31:16
Command line:
WLIDSvcM.exe 1880
Detected:51, recognized as trusted 45
Module nameHandleDescriptionCopyrightMD5Used by processes
C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\ae9d0d1289e64e7bf042108e547251ac\Microsoft.VisualBasic.ni.dll
Script: Quarantine, Delete, BC delete
1814757376Visual Basic Runtime Library© Microsoft Corporation. All rights reserved.--656
Modules detected:593, recognized as trusted 592

Kernel Space Modules Viewer

ModuleBase addressSize in memoryDescriptionManufacturer
C:\Windows\System32\Drivers\dump_atapi.sys
Script: Quarantine, Delete, BC delete
9A0D3000009000 (36864)
C:\Windows\System32\Drivers\dump_dumpata.sys
Script: Quarantine, Delete, BC delete
9A0C800000B000 (45056)
C:\Windows\System32\Drivers\dump_dumpfve.sys
Script: Quarantine, Delete, BC delete
9A0DC000011000 (69632)
C:\Windows\System32\Drivers\sptd.sys
Script: Quarantine, Delete, BC delete
8B81E00010C000 (1097728)
Modules detected - 159, recognized as trusted - 155

Services

ServiceDescriptionStatusFileGroupDependencies
AMD External Events Utility
Service: Stop, Delete, Disable, BC delete
AMD External Events UtilityRunningC:\Windows\system32\atiesrxx.exe
Script: Quarantine, Delete, BC delete
Event log 
Apple Mobile Device
Service: Stop, Delete, Disable, BC delete
Apple Mobile DeviceRunningC:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
Script: Quarantine, Delete, BC delete
 Tcpip
Bonjour Service
Service: Stop, Delete, Disable, BC delete
Servicio BonjourRunningC:\Program Files\Bonjour\mDNSResponder.exe
Script: Quarantine, Delete, BC delete
 Tcpip
wlidsvc
Service: Stop, Delete, Disable, BC delete
Windows Live ID Sign-in AssistantRunningC:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
Script: Quarantine, Delete, BC delete
 RpcSs
clr_optimization_v4.0.30319_32
Service: Stop, Delete, Disable, BC delete
Microsoft .NET Framework NGEN v4.0.30319_X86Not startedC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
Script: Quarantine, Delete, BC delete
  
iPod Service
Service: Stop, Delete, Disable, BC delete
Servicio del iPodNot startedC:\Program Files\iPod\bin\iPodService.exe
Script: Quarantine, Delete, BC delete
 RpcSs
PnkBstrA
Service: Stop, Delete, Disable, BC delete
PnkBstrANot startedC:\Windows\system32\PnkBstrA.exe
Script: Quarantine, Delete, BC delete
  
Detected - 151, recognized as trusted - 144

Drivers

ServiceDescriptionStatusFileGroupDependencies
sptd
Driver: Unload, Delete, Disable, BC delete
sptdRunningC:\Windows\System32\Drivers\sptd.sys
Script: Quarantine, Delete, BC delete
Boot Bus Extender 
58545770
Driver: Unload, Delete, Disable, BC delete
58545770Not started58545770.sys
Script: Quarantine, Delete, BC delete
  
catchme
Driver: Unload, Delete, Disable, BC delete
catchmeNot startedC:\Users\Skippan\AppData\Local\Temp\catchme.sys
Script: Quarantine, Delete, BC delete
Base 
cpudrv
Driver: Unload, Delete, Disable, BC delete
cpudrvNot startedC:\Program Files\SystemRequirementsLab\cpudrv.sys
Script: Quarantine, Delete, BC delete
  
cpuz130
Driver: Unload, Delete, Disable, BC delete
cpuz130Not startedC:\Users\Skippan\AppData\Local\Temp\cpuz130\cpuz_x32.sys
Script: Quarantine, Delete, BC delete
  
cpuz135
Driver: Unload, Delete, Disable, BC delete
cpuz135Not startedC:\Users\Skippan\AppData\Local\Temp\cpuz135\cpuz135_x32.sys
Script: Quarantine, Delete, BC delete
  
GarenaPEngine
Driver: Unload, Delete, Disable, BC delete
GarenaPEngineNot startedC:\Users\floppyc\AppData\Local\Temp\IYJA4DB.tmp
Script: Quarantine, Delete, BC delete
  
LMIInfo
Driver: Unload, Delete, Disable, BC delete
LogMeIn Kernel Information ProviderNot startedC:\Program Files\LogMeIn\x86\RaInfo.sys
Script: Quarantine, Delete, BC delete
  
LMIRfsClientNP
Driver: Unload, Delete, Disable, BC delete
LMIRfsClientNPNot startedLMIRfsClientNP.sys
Script: Quarantine, Delete, BC delete
NetworkProvider 
Detected - 273, recognized as trusted - 264

Autoruns

File nameStatusStartup methodDescription
C:\PROGRA~1\CDisplay\CDISPS~1.DLL
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved, {EF7605D6-C512-4F90-827B-5DE32DAB94F7}
Delete
C:\Program Files\Bonjour\mDNSResponder.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Bonjour Service, EventMessageFile
C:\Program Files\LogMeIn\x86\rahook.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\LogMeIn, EventMessageFile
C:\Program Files\Pando Networks\Media Booster\PMB.cpl
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SOFTWARE\Microsoft\Windows\CurrentVersion\Control Panel\Cpls, Pando
Delete
C:\Users\Skippan\AppData\Local\temp\_uninst_11071735.bat
Script: Quarantine, Delete, BC delete
ActiveShortcut in Autoruns folderC:\Users\Skippan\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\, C:\Users\Skippan\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_uninst_11071735.lnk,
C:\Windows\System32\appmgmts.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\AppMgmt\Parameters, ServiceDll
Delete
C:\Windows\System32\nvoglv32.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\NVIDIA OpenGL Driver, EventMessageFile
C:\Windows\system32\psxss.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Session Manager\SubSystems, Posix
c:\Program Files\Common Files\Protexis\License Service\PsiService_2.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Protexis Licensing Service, EventMessageFile
progman.exe
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, shell
Delete
rdpclip
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Terminal Server\Wds\rdpwd, StartupPrograms
Delete
vgafix.fon
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fixedfon.fon
Delete
vgaoem.fon
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, oemfonts.fon
Delete
vgasys.fon
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fonts.fon
Delete
Autoruns items detected - 622, recognized as trusted - 608

Microsoft Internet Explorer extension modules (BHOs, Toolbars ...)

File nameTypeDescriptionManufacturerCLSID
Elements detected - 5, recognized as trusted - 5

Windows Explorer extension modules

File nameDestinationDescriptionManufacturerCLSID
Creative Element Power Tools: regagent{9C76B351-0B8A-44B1-9F04-DEFFCC8FB72C}
Delete
C:\PROGRA~1\CDisplay\CDISPS~1.DLL
Script: Quarantine, Delete, BC delete
CDISPSHELL Extension{EF7605D6-C512-4F90-827B-5DE32DAB94F7}
Delete
{B9B9F083-2B04-452A-8691-83694AC1037B}Logitech Setpoint Extension
Delete
Elements detected - 44, recognized as trusted - 41

Printing system extensions (print monitors, providers)

File nameTypeNameDescriptionManufacturer
Elements detected - 9, recognized as trusted - 9

Task Scheduler jobs

File nameJob nameJob statusDescriptionManufacturer
C:\Windows\AutoKMS\AutoKMS.exe
Script: Quarantine, Delete, BC delete
AutoKMS.jobThe task is ready to run at its next scheduled time.AutoKMSCODYQX4 & Bosh
Elements detected - 1, recognized as trusted - 0

SPI/LSP settings

Namespace providers (NSP)
ProviderStatusEXE fileDescriptionGUID
Detected - 9, recognized as trusted - 9
Transport protocol providers (TSP, LSP)
ProviderEXE fileDescription
Detected - 34, recognized as trusted - 34
Results of automatic SPI settings check
LSP settings checked. No errors detected

TCP/UDP ports

PortStatusRemote HostRemote PortApplicationNotes
TCP ports
135LISTENING0.0.0.00[796] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
139LISTENING0.0.0.00[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
5354LISTENING0.0.0.00[1592] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5357LISTENING0.0.0.00[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
27015LISTENING0.0.0.00[4040] c:\program files\common files\apple\mobile device support\applemobiledeviceservice.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49152LISTENING0.0.0.00[480] c:\windows\system32\wininit.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49153LISTENING0.0.0.00[896] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49154LISTENING0.0.0.00[1028] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49155LISTENING0.0.0.00[564] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49157LISTENING0.0.0.00[528] c:\windows\system32\services.exe
Script: Quarantine, Delete, BC delete, Terminate
 
57945ESTABLISHED127.0.0.157946[2016] c:\program files\mozilla firefox 3.6 beta 1\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
57946ESTABLISHED127.0.0.157945[2016] c:\program files\mozilla firefox 3.6 beta 1\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
57947ESTABLISHED127.0.0.157948[2016] c:\program files\mozilla firefox 3.6 beta 1\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
57948ESTABLISHED127.0.0.157947[2016] c:\program files\mozilla firefox 3.6 beta 1\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
58084TIME_WAIT74.125.159.9580[0]   
58086TIME_WAIT74.125.229.9980[0]   
58088ESTABLISHED74.125.113.10680[2016] c:\program files\mozilla firefox 3.6 beta 1\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
58090ESTABLISHED204.236.133.14280[2016] c:\program files\mozilla firefox 3.6 beta 1\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
58091TIME_WAIT204.236.133.14280[0]   
58092ESTABLISHED74.125.229.102443[2016] c:\program files\mozilla firefox 3.6 beta 1\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
58093ESTABLISHED74.125.113.14780[2016] c:\program files\mozilla firefox 3.6 beta 1\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
58094ESTABLISHED74.125.113.147443[2016] c:\program files\mozilla firefox 3.6 beta 1\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
58096TIME_WAIT199.7.55.7280[0]   
58097ESTABLISHED74.125.229.36443[2016] c:\program files\mozilla firefox 3.6 beta 1\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
58102ESTABLISHED50.56.108.20980[2016] c:\program files\mozilla firefox 3.6 beta 1\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
58105TIME_WAIT67.205.62.19180[0]   
58106TIME_WAIT63.228.223.10780[0]   
58107TIME_WAIT63.228.223.10380[0]   
58108TIME_WAIT216.86.148.11180[0]   
58109TIME_WAIT209.200.252.1580[0]   
58110TIME_WAIT87.106.182.16480[0]   
58113ESTABLISHED115.146.126.3880[2016] c:\program files\mozilla firefox 3.6 beta 1\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
58116ESTABLISHED115.146.126.3880[2016] c:\program files\mozilla firefox 3.6 beta 1\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
58120TIME_WAIT67.205.62.19180[0]   
58122ESTABLISHED23.15.7.5680[2016] c:\program files\mozilla firefox 3.6 beta 1\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
58125ESTABLISHED184.30.45.1580[2016] c:\program files\mozilla firefox 3.6 beta 1\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
58127ESTABLISHED23.15.8.980[2016] c:\program files\mozilla firefox 3.6 beta 1\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
58128ESTABLISHED184.25.200.14980[2016] c:\program files\mozilla firefox 3.6 beta 1\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
58130TIME_WAIT208.109.218.23080[0]   
58132ESTABLISHED198.95.32.8280[2016] c:\program files\mozilla firefox 3.6 beta 1\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
58136TIME_WAIT163.181.249.3280[0]   
58137TIME_WAIT208.109.218.23080[0]   
58139TIME_WAIT163.181.249.3280[0]   
58144ESTABLISHED184.30.39.14480[2016] c:\program files\mozilla firefox 3.6 beta 1\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
UDP ports
137LISTENING----[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
138LISTENING----[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
500LISTENING----[1028] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1900LISTENING----[1708] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1900LISTENING----[1708] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
3702LISTENING----[1708] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
3702LISTENING----[1708] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
4500LISTENING----[1028] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5353LISTENING----[1592] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5355LISTENING----[1296] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
51149LISTENING----[2588] g:\steam1\steam.exe
Script: Quarantine, Delete, BC delete, Terminate
 
57705LISTENING----[1708] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
57706LISTENING----[1708] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
59590LISTENING----[656] c:\program files\windows sidebar\sidebar.exe
Script: Quarantine, Delete, BC delete, Terminate
 
60755LISTENING----[1592] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, BC delete, Terminate
 
60757LISTENING----[1708] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 

Downloaded Program Files (DPF)

File nameDescriptionManufacturerCLSIDSource URL
Elements detected - 5, recognized as trusted - 5

Control Panel Applets (CPL)

File nameDescriptionManufacturer
Elements detected - 23, recognized as trusted - 23

Active Setup

File nameDescriptionManufacturerCLSID
Elements detected - 8, recognized as trusted - 8

HOSTS file

Hosts file record
ÿþ1
Clear Hosts file

Protocols and handlers

File nameTypeDescriptionManufacturerCLSID
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
Elements detected - 21, recognized as trusted - 18

Suspicious objects

FileDescriptionType
C:\Windows\system32\DRIVERS\0460089drv.sys
Script: Quarantine, Delete, BC delete
Suspicion for RootkitKernel-mode hook


Main script of analysis
Windows version: Windows 7 Home Premium, Build=7600, SP=""
System Restore: enabled
1.1 Searching for user-mode API hooks
 Analysis: kernel32.dll, export table found in section .text
IAT modification detected: CreateProcessA - 00610010<>76EF2062
IAT modification detected: GetModuleFileNameA - 00610080<>76F41014
IAT modification detected: FreeLibrary - 006100F0<>76F41989
IAT modification detected: GetModuleFileNameW - 00610160<>76F42994
IAT modification detected: CreateProcessW - 006101D0<>76EF202D
IAT modification detected: LoadLibraryW - 006102B0<>76F42852
IAT modification detected: LoadLibraryA - 00610320<>76F42804
IAT modification detected: GetProcAddress - 00610390<>76F417D7
 Analysis: ntdll.dll, export table found in section .text
 Analysis: user32.dll, export table found in section .text
 Analysis: advapi32.dll, export table found in section .text
 Analysis: ws2_32.dll, export table found in section .text
 Analysis: wininet.dll, export table found in section .text
 Analysis: rasapi32.dll, export table found in section .text
 Analysis: urlmon.dll, export table found in section .text
 Analysis: netapi32.dll, export table found in section .text
1.2 Searching for kernel-mode API hooks
 Driver loaded successfully
 SDT found (RVA=1689C0)
 Kernel ntkrnlpa.exe found in memory at address 83407000
   SDT = 8356F9C0
   KiST = 83476860 (401)
Function NtAdjustPrivilegesToken (0C) intercepted (83614C5D->829A9E36), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtAlpcConnectPort (16) intercepted (8365AD8D->829AC074), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtAlpcCreatePort (17) intercepted (835F5480->829AC2EE), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtAlpcSendWaitReceivePort (27) intercepted (8367C612->829AC564), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtClose (32) intercepted (8364E5FC->829AA74A), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtConnectPort (3B) intercepted (8367FE03->829AB57E), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateEvent (40) intercepted (83668B49->829ABAC8), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateFile (42) intercepted (836523EE->829AAA26), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateMutant (4A) intercepted (83686184->829AB9AE), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateNamedPipeFile (4B) intercepted (836915F6->829A9A24), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreatePort (4D) intercepted (835FC1E2->829AB882), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateSection (54) intercepted (83638243->829A9BCC), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateSemaphore (55) intercepted (83688578->829ABBE8), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateThread (57) intercepted (836E2186->829AA3D0), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateThreadEx (58) intercepted (836402B1->829AA4CE), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateUserProcess (5D) intercepted (8365D34C->829AC7AE), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateWaitablePort (5E) intercepted (835A73A7->829AB918), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtDebugActiveProcess (60) intercepted (836B771C->829AD2D6), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtDeviceIoControlFile (6B) intercepted (836649F0->829AAEA8), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtDuplicateObject (6F) intercepted (83683631->829AE4E4), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtFsControlFile (86) intercepted (8366B24E->829AACB6), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtLoadDriver (9B) intercepted (835A8295->829AD3C8), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtMapViewOfSection (A8) intercepted (83686446->829ADB30), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenEvent (B1) intercepted (83688AD6->829ABB5E), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenFile (B3) intercepted (83681B33->829AA7CC), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenMutant (BB) intercepted (83623AC9->829ABA3E), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenProcess (BE) intercepted (83688AA0->829AA074), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenSection (C2) intercepted (83686729->829AD8CA), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenSemaphore (C3) intercepted (835EB459->829ABC7E), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenThread (C6) intercepted (836873F7->829A9F64), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtQueryDirectoryObject (E0) intercepted (8368FDEA->829AC868), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtQuerySection (FE) intercepted (83673474->829ADE6A), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtQueueApcThread (10D) intercepted (835F3BB3->829AD75C), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtReplaceKey (124) intercepted (836A4632->829A86DE), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtReplyPort (126) intercepted (835F83C4->829ABFE2), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtReplyWaitReceivePort (127) intercepted (8367E09C->829ABEA8), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtRequestWaitReplyPort (12B) intercepted (8367E03A->829AD070), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtRestoreKey (12E) intercepted (8369D4C5->829A8A56), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtResumeThread (130) intercepted (8367953E->829AE386), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSaveKey (135) intercepted (8369B5D6->829A8676), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSecureConnectPort (138) intercepted (83666F6F->829AB2C4), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetContextThread (13C) intercepted (836E328B->829AA5EC), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetInformationToken (150) intercepted (8362132A->829AC90A), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetSecurityObject (15B) intercepted (8361D40D->829AD566), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetSystemInformation (15E) intercepted (83692365->829ADFBA), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSuspendProcess (16E) intercepted (836E3E2B->829AE0AC), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSuspendThread (16F) intercepted (836A0BC6->829AE1E6), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSystemDebugControl (170) intercepted (836106E5->829AD1FA), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtTerminateProcess (172) intercepted (836690AD->829AA21A), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtTerminateThread (173) intercepted (8367BE53->829AA170), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtUnmapViewOfSection (181) intercepted (8368324B->829ADD0E), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtWriteVirtualMemory (18F) intercepted (8368EB25->829AA306), hook C:\Windows\system32\DRIVERS\0460089drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Functions checked: 401, intercepted: 52, restored: 52
1.3 Checking IDT and SYSENTER
 Analysis for CPU 1
 Analysis for CPU 2
CmpCallCallBacks = 00000000
 Checking IDT and SYSENTER - complete
1.4 Searching for masking processes and drivers
 Checking not performed: extended monitoring driver (AVZPM) is not installed
1.5 Checking of IRP handlers
 Driver loaded successfully
\FileSystem\ntfs[IRP_MJ_CREATE] = 85D521F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_CLOSE] = 85D521F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_WRITE] = 85D521F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_INFORMATION] = 85D521F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_INFORMATION] = 85D521F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_EA] = 85D521F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_EA] = 85D521F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_VOLUME_INFORMATION] = 85D521F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_VOLUME_INFORMATION] = 85D521F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_DIRECTORY_CONTROL] = 85D521F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_FILE_SYSTEM_CONTROL] = 85D521F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_DEVICE_CONTROL] = 85D521F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_LOCK_CONTROL] = 85D521F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_SECURITY] = 85D521F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_SECURITY] = 85D521F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_PNP] = 85D521F8 -> hook not defined
 Checking - complete
>> Services: potentially dangerous service allowed: TermService (Servicios de Escritorio remoto)
>> Services: potentially dangerous service allowed: SSDPSRV (Detección SSDP)
>> Services: potentially dangerous service allowed: Schedule (Programador de tareas)
> Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)!
>> Security: disk drives' autorun is enabled
>> Security: administrative shares (C$, D$ ...) are enabled
>> Security: anonymous user access is enabled
>> Security: sending Remote Assistant queries is enabled
 >>  Disable HDD autorun
 >>  Disable autorun from network drives
 >>  Disable CD/DVD autorun
 >>  Disable removable media autorun
 >>  Windows Explorer - show extensions of known file types
System Analysis in progress

System Analysis - complete
Script commands
Add commands to script:
Additional operations:
File list