Results of system analysis

Kaspersky Virus Removal Tool 11.0.0.1245 (database released 19/04/2012; 10:47)

List of processes

File namePIDDescriptionCopyrightMD5Information
c:\program files\system security guard\systemsecurityguardtray.exe
Script: Quarantine, Delete, BC delete, Terminate
780System Security Guard tray fileSystemSecurityGuard.com??1076.50 kb, rsAh,
created: 06.04.2012 16:31:00,
modified: 28.03.2012 09:37:30
Command line:
"C:\Program Files\System Security Guard\SystemSecurityGuardTray.exe" /TRAY
Detected:68, recognized as trusted 67
Module nameHandleDescriptionCopyrightMD5Used by processes
Modules detected:639, recognized as trusted 639

Kernel Space Modules Viewer

ModuleBase addressSize in memoryDescriptionManufacturer
C:\Windows\System32\Drivers\dump_dumpfve.sys
Script: Quarantine, Delete, BC delete
93C00000011000 (69632)
C:\Windows\System32\Drivers\dump_iaStorV.sys
Script: Quarantine, Delete, BC delete
93D220000DB000 (897024)
Modules detected - 191, recognized as trusted - 189

Services

ServiceDescriptionStatusFileGroupDependencies
Detected - 169, recognized as trusted - 169

Drivers

ServiceDescriptionStatusFileGroupDependencies
catchme
Driver: Unload, Delete, Disable, BC delete
catchmeNot startedC:\Users\Thom\AppData\Local\Temp\catchme.sys
Script: Quarantine, Delete, BC delete
Base 
EagleXNt
Driver: Unload, Delete, Disable, BC delete
EagleXNtNot startedC:\Windows\system32\drivers\EagleXNt.sys
Script: Quarantine, Delete, BC delete
  
Synth3dVsc
Driver: Unload, Delete, Disable, BC delete
Synth3dVscNot startedC:\Windows\system32\drivers\synth3dvsc.sys
Script: Quarantine, Delete, BC delete
  
tsusbhub
Driver: Unload, Delete, Disable, BC delete
tsusbhubNot startedC:\Windows\system32\drivers\tsusbhub.sys
Script: Quarantine, Delete, BC delete
  
VGPU
Driver: Unload, Delete, Disable, BC delete
VGPUNot startedC:\Windows\system32\drivers\rdvgkmd.sys
Script: Quarantine, Delete, BC delete
  
Detected - 267, recognized as trusted - 262

Autoruns

File nameStatusStartup methodDescription
C:\Program Files\System Security Guard\SystemSecurityGuardTray.exe
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_USERS, S-1-5-21-2243041973-16635593-2241794628-1000\Software\Microsoft\Windows\CurrentVersion\Run, SystemSecurityGuardAutoStart
Delete
C:\Users\Thom\AppData\Local\Temp\_uninst_17185863.bat
Script: Quarantine, Delete, BC delete
ActiveShortcut in Autoruns folderC:\Users\Thom\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\, C:\Users\Thom\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_uninst_17185863.lnk,
C:\Windows\system32\psxss.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Session Manager\SubSystems, Posix
C:\Windows\system32\wuaucpl.cpl
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved, {5F327514-6C5E-4d60-8F16-D07FA08A78ED}
Delete
progman.exe
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, shell
Delete
vgafix.fon
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fixedfon.fon
Delete
vgaoem.fon
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, oemfonts.fon
Delete
vgasys.fon
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fonts.fon
Delete
Autoruns items detected - 746, recognized as trusted - 738

Microsoft Internet Explorer extension modules (BHOs, Toolbars ...)

File nameTypeDescriptionManufacturerCLSID
BHO{5C255C8A-E604-49b4-9D64-90988571CECB}
Delete
Elements detected - 26, recognized as trusted - 25

Windows Explorer extension modules

File nameDestinationDescriptionManufacturerCLSID
AVG Find Extension{9F97547E-460A-42C5-AE0C-81C61FFAEBC3}
Delete
C:\Windows\system32\wuaucpl.cpl
Script: Quarantine, Delete, BC delete
Auto Update Property Sheet Extension{5F327514-6C5E-4d60-8F16-D07FA08A78ED}
Delete
Elements detected - 29, recognized as trusted - 27

Printing system extensions (print monitors, providers)

File nameTypeNameDescriptionManufacturer
Elements detected - 7, recognized as trusted - 7

Task Scheduler jobs

File nameJob nameJob statusDescriptionManufacturer
Elements detected - 1, recognized as trusted - 1

SPI/LSP settings

Namespace providers (NSP)
ProviderStatusEXE fileDescriptionGUID
Detected - 10, recognized as trusted - 10
Transport protocol providers (TSP, LSP)
ProviderEXE fileDescription
Detected - 27, recognized as trusted - 27
Results of automatic SPI settings check
LSP settings checked. No errors detected

TCP/UDP ports

PortStatusRemote HostRemote PortApplicationNotes
TCP ports
80LISTENING0.0.0.00[2440] c:\program files\teamviewer\version6\teamviewer_service.exe
Script: Quarantine, Delete, BC delete, Terminate
 
135LISTENING0.0.0.00[808] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
139LISTENING0.0.0.00[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
443LISTENING0.0.0.00[2440] c:\program files\teamviewer\version6\teamviewer_service.exe
Script: Quarantine, Delete, BC delete, Terminate
 
445LISTENING0.0.0.00[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
2559LISTENING0.0.0.00[5416] c:\program files\nvidia corporation\nvidia updatus\daemonu.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5354LISTENING0.0.0.00[1796] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5357LISTENING0.0.0.00[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
5938LISTENING0.0.0.00[2440] c:\program files\teamviewer\version6\teamviewer_service.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5939ESTABLISHED127.0.0.149161[2440] c:\program files\teamviewer\version6\teamviewer_service.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5939LISTENING0.0.0.00[2440] c:\program files\teamviewer\version6\teamviewer_service.exe
Script: Quarantine, Delete, BC delete, Terminate
 
10110LISTENING0.0.0.00[2600] c:\program files\avg\avg9\avgemc.exe
Script: Quarantine, Delete, BC delete, Terminate
 
27015ESTABLISHED127.0.0.149194[1748] c:\program files\common files\apple\mobile device support\applemobiledeviceservice.exe
Script: Quarantine, Delete, BC delete, Terminate
 
27015LISTENING0.0.0.00[1748] c:\program files\common files\apple\mobile device support\applemobiledeviceservice.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49152LISTENING0.0.0.00[484] c:\windows\system32\wininit.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49153LISTENING0.0.0.00[908] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49154LISTENING0.0.0.00[1000] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49155LISTENING0.0.0.00[556] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49157ESTABLISHED127.0.0.149158[2440] c:\program files\teamviewer\version6\teamviewer_service.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49158ESTABLISHED127.0.0.149157[2440] c:\program files\teamviewer\version6\teamviewer_service.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49159ESTABLISHED127.0.0.149160[3368] c:\program files\teamviewer\version6\teamviewer.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49160ESTABLISHED127.0.0.149159[3368] c:\program files\teamviewer\version6\teamviewer.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49161ESTABLISHED127.0.0.15939[3368] c:\program files\teamviewer\version6\teamviewer.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49162LISTENING0.0.0.00[532] c:\windows\system32\services.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49165ESTABLISHED176.223.198.305938[2440] c:\program files\teamviewer\version6\teamviewer_service.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49194ESTABLISHED127.0.0.127015[1408] c:\program files\itunes\ituneshelper.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49213ESTABLISHED127.0.0.149214[5000] c:\program files\mozilla firefox\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49214ESTABLISHED127.0.0.149213[5000] c:\program files\mozilla firefox\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49335CLOSE_WAIT74.53.175.18180[780] c:\program files\system security guard\systemsecurityguardtray.exe
Script: Quarantine, Delete, BC delete, Terminate
 
UDP ports
137LISTENING----[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
138LISTENING----[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
500LISTENING----[1000] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1900LISTENING----[1896] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1900LISTENING----[1896] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
3702LISTENING----[1144] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
3702LISTENING----[1896] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
3702LISTENING----[1144] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
3702LISTENING----[1896] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
4500LISTENING----[1000] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5353LISTENING----[1796] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5355LISTENING----[1260] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
44301LISTENING----[2060] c:\windows\system32\pnkbstra.exe
Script: Quarantine, Delete, BC delete, Terminate
 
45301LISTENING----[2084] c:\windows\system32\pnkbstrb.exe
Script: Quarantine, Delete, BC delete, Terminate
 
48000LISTENING----[5416] c:\program files\nvidia corporation\nvidia updatus\daemonu.exe
Script: Quarantine, Delete, BC delete, Terminate
 
51217LISTENING----[1144] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
51219LISTENING----[1996] c:\program files\steam\steam.exe
Script: Quarantine, Delete, BC delete, Terminate
 
51738LISTENING----[1896] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
51740LISTENING----[1612] c:\windows\system32\spoolsv.exe
Script: Quarantine, Delete, BC delete, Terminate
 
54836LISTENING----[1144] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
57755LISTENING----[1796] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, BC delete, Terminate
 
62558LISTENING----[1896] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
62559LISTENING----[1896] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 

Downloaded Program Files (DPF)

File nameDescriptionManufacturerCLSIDSource URL
{67DABFBF-D0AB-41FA-9C46-CC0F21721616}
Delete
http://download.divx.com/player/DivXBrowserPlugin.cab
{E2883E8F-472F-4FB0-9522-AC9BF37916A7}
Delete
http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
Elements detected - 7, recognized as trusted - 5

Control Panel Applets (CPL)

File nameDescriptionManufacturer
Elements detected - 22, recognized as trusted - 22

Active Setup

File nameDescriptionManufacturerCLSID
Elements detected - 10, recognized as trusted - 10

HOSTS file

Hosts file record
127.0.0.1       localhost
Clear Hosts file

Protocols and handlers

File nameTypeDescriptionManufacturerCLSID
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
Elements detected - 25, recognized as trusted - 22

Suspicious objects

FileDescriptionType
C:\Windows\system32\DRIVERS\5786307drv.sys
Script: Quarantine, Delete, BC delete
Suspicion for RootkitKernel-mode hook


Main script of analysis
Windows version: Windows 7 Ultimate, Build=7601, SP="Service Pack 1"
System Restore: enabled
1.1 Searching for user-mode API hooks
 Analysis: kernel32.dll, export table found in section .text
IAT modification detected: CreateProcessA - 00390010<>75F12082
IAT modification detected: GetModuleFileNameA - 00390080<>75F5D75A
IAT modification detected: FreeLibrary - 003900F0<>75F5EF67
IAT modification detected: GetModuleFileNameW - 00390160<>75F5EF35
IAT modification detected: CreateProcessW - 003901D0<>75F1204D
IAT modification detected: LoadLibraryW - 003902B0<>75F5EF42
IAT modification detected: LoadLibraryA - 00390320<>75F5DC65
IAT modification detected: GetProcAddress - 00390390<>75F5CC94
 Analysis: ntdll.dll, export table found in section .text
 Analysis: user32.dll, export table found in section .text
 Analysis: advapi32.dll, export table found in section .text
 Analysis: ws2_32.dll, export table found in section .text
 Analysis: wininet.dll, export table found in section .text
 Analysis: rasapi32.dll, export table found in section .text
 Analysis: urlmon.dll, export table found in section .text
 Analysis: netapi32.dll, export table found in section .text
1.2 Searching for kernel-mode API hooks
 Driver loaded successfully
 SDT found (RVA=169B00)
 Kernel ntkrnlpa.exe found in memory at address 82A51000
   SDT = 82BBAB00
   KiST = 82ACFD5C (401)
Function NtAdjustPrivilegesToken (0C) intercepted (82CD6BFD->BAC48E36), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtAlpcConnectPort (16) intercepted (82CC72BE->BAC4B074), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtAlpcCreatePort (17) intercepted (82C46C82->BAC4B2EE), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtAlpcSendWaitReceivePort (27) intercepted (82CA3FC7->BAC4B564), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtClose (32) intercepted (82C96438->BAC4974A), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtConnectPort (3B) intercepted (82CC9DC9->BAC4A57E), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateEvent (40) intercepted (82C9272F->BAC4AAC8), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateFile (42) intercepted (82CA12A2->BAC49A26), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateMutant (4A) intercepted (82C62212->BAC4A9AE), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateNamedPipeFile (4B) intercepted (82CD25B9->BAC48A24), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreatePort (4D) intercepted (82C437D5->BAC4A882), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateSection (54) intercepted (82C74F8D->BAC48BCC), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateSemaphore (55) intercepted (82C57A09->BAC4ABE8), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateThread (57) intercepted (82D2DCEE->BAC493D0), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateThreadEx (58) intercepted (82CC21E4->BAC494CE), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateUserProcess (5D) intercepted (82CC0116->BAC4B7AE), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateWaitablePort (5E) intercepted (82BF613C->BAC4A918), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtDebugActiveProcess (60) intercepted (82CFFC00->BAC4C2D6), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtDeviceIoControlFile (6B) intercepted (82CC548A->BAC49EA8), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtDuplicateObject (6F) intercepted (82C8359A->BAC4D4E4), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtFsControlFile (86) intercepted (82CA7760->BAC49CB6), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtLoadDriver (9B) intercepted (82C17B80->BAC4C3C8), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtMapViewOfSection (A8) intercepted (82C98452->BAC4CB30), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenEvent (B1) intercepted (82C61C0E->BAC4AB5E), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenFile (B3) intercepted (82C83BBA->BAC497CC), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenMutant (BB) intercepted (82CB31A0->BAC4AA3E), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenProcess (BE) intercepted (82C63A58->BAC49074), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenSection (C2) intercepted (82CBB734->BAC4C8CA), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenSemaphore (C3) intercepted (82C3713C->BAC4AC7E), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenThread (C6) intercepted (82CAFE45->BAC48F64), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtQueryDirectoryObject (E0) intercepted (82CAAAAE->BAC4B868), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtQuerySection (FE) intercepted (82CC8AA6->BAC4CE6A), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtQueueApcThread (10D) intercepted (82C4DD20->BAC4C75C), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtReplaceKey (124) intercepted (82CED968->BAC476DE), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtReplyPort (126) intercepted (82C42AB3->BAC4AFE2), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtReplyWaitReceivePort (127) intercepted (82C8A68C->BAC4AEA8), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtRequestWaitReplyPort (12B) intercepted (82C8F983->BAC4C070), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtRestoreKey (12E) intercepted (82CE39CC->BAC47A56), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtResumeThread (130) intercepted (82CC240B->BAC4D386), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSaveKey (135) intercepted (82CE523E->BAC47676), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSecureConnectPort (138) intercepted (82CAFE7A->BAC4A2C4), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetContextThread (13C) intercepted (82D2EDEF->BAC495EC), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetInformationToken (150) intercepted (82C557FC->BAC4B90A), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetSecurityObject (15B) intercepted (82C536A2->BAC4C566), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetSystemInformation (15E) intercepted (82CA01AC->BAC4CFBA), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSuspendProcess (16E) intercepted (82D2F98F->BAC4D0AC), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSuspendThread (16F) intercepted (82CE6EF5->BAC4D1E6), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSystemDebugControl (170) intercepted (82CD752C->BAC4C1FA), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtTerminateProcess (172) intercepted (82CACA7D->BAC4921A), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtTerminateThread (173) intercepted (82CCA3F4->BAC49170), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtUnmapViewOfSection (181) intercepted (82CB66FA->BAC4CD0E), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtWriteVirtualMemory (18F) intercepted (82CB17DA->BAC49306), hook C:\Windows\system32\DRIVERS\5786307drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Functions checked: 401, intercepted: 52, restored: 52
1.3 Checking IDT and SYSENTER
 Analysis for CPU 1
 Analysis for CPU 2
 Analysis for CPU 3
 Analysis for CPU 4
CmpCallCallBacks = 00000000
 Checking IDT and SYSENTER - complete
1.4 Searching for masking processes and drivers
 Checking not performed: extended monitoring driver (AVZPM) is not installed
1.5 Checking of IRP handlers
 Driver loaded successfully
 Checking - complete
Latent loading of libraries through AppInit_DLLs suspected: "C:\Windows\System32\avgrsstx.dll"
>> Services: potentially dangerous service allowed: TermService (Remote Desktop Services)
>> Services: potentially dangerous service allowed: SSDPSRV (SSDP Discovery)
>> Services: potentially dangerous service allowed: Schedule (Task Scheduler)
> Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)!
>> Security: disk drives' autorun is enabled
>> Security: administrative shares (C$, D$ ...) are enabled
>> Security: anonymous user access is enabled
>> Security: sending Remote Assistant queries is enabled
 >>  Disable HDD autorun
 >>  Disable autorun from network drives
 >>  Disable CD/DVD autorun
 >>  Disable removable media autorun
System Analysis in progress

System Analysis - complete
Script commands
Add commands to script:
Additional operations:
File list