Results of system analysis

Kaspersky Virus Removal Tool 11.0.0.1245 (database released 28/05/2012; 10:22)

List of processes

File namePIDDescriptionCopyrightMD5Information
c:\program files\avast software\avast\avastsvc.exe
Script: Quarantine, Delete, BC delete, Terminate
1644avast! ServiceCopyright (c) 2012 AVAST Software??43.72 kb, rsAh,
created: 26.05.2012 09:35:49,
modified: 06.03.2012 18:15:14
Command line:
"C:\Program Files\AVAST Software\Avast\AvastSvc.exe"
Detected:73, recognized as trusted 73
Module nameHandleDescriptionCopyrightMD5Used by processes
C:\Program Files\AVAST Software\Avast\defs\12052801\algo.dll
Script: Quarantine, Delete, BC delete
1645346816  --1644
Modules detected:709, recognized as trusted 708

Kernel Space Modules Viewer

ModuleBase addressSize in memoryDescriptionManufacturer
C:\Windows\System32\Drivers\dump_dumpata.sys
Script: Quarantine, Delete, BC delete
8F7EF00000B000 (45056)
C:\Windows\System32\Drivers\dump_dumpfve.sys
Script: Quarantine, Delete, BC delete
8AA00000011000 (69632)
C:\Windows\System32\Drivers\dump_msahci.sys
Script: Quarantine, Delete, BC delete
905F600000A000 (40960)
Modules detected - 225, recognized as trusted - 222

Services

ServiceDescriptionStatusFileGroupDependencies
McMPFSvc
Service: Stop, Delete, Disable, BC delete
McAfee Personal Firewall ServiceNot startedC:\Program Files\Common Files\Mcafee\McSvcHost\McSvHost.exe
Script: Quarantine, Delete, BC delete
 RpcSs
Detected - 189, recognized as trusted - 188

Drivers

ServiceDescriptionStatusFileGroupDependencies
catchme
Driver: Unload, Delete, Disable, BC delete
catchmeNot startedC:\Users\Lexy\AppData\Local\Temp\catchme.sys
Script: Quarantine, Delete, BC delete
Base 
EagleXNt
Driver: Unload, Delete, Disable, BC delete
EagleXNtNot startedC:\Windows\system32\drivers\EagleXNt.sys
Script: Quarantine, Delete, BC delete
  
LMIRfsClientNP
Driver: Unload, Delete, Disable, BC delete
LMIRfsClientNPNot startedLMIRfsClientNP.sys
Script: Quarantine, Delete, BC delete
NetworkProvider 
Detected - 295, recognized as trusted - 292

Autoruns

File nameStatusStartup methodDescription
C:\3d39f24c72a8e5c873e6679c7068\DW\DW20.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\VSSetup, EventMessageFile
C:\Program Files\SanrioTown\Hello Kitty Online\autoupdate.exe
Script: Quarantine, Delete, BC delete
ActiveShortcut in Autoruns folderC:\Users\Lexy\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\, C:\Users\Lexy\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Hello Kitty Online.lnk,
C:\Users\Lexy\AppData\Local\temp\_uninst_01151137.bat
Script: Quarantine, Delete, BC delete
ActiveShortcut in Autoruns folderC:\Users\Lexy\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\, C:\Users\Lexy\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_uninst_01151137.lnk,
C:\Windows\system32\AlKernel.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\quickhealfirewall\Parameters, ServiceDll
Delete
C:\Windows\system32\BCM43XV.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\MTDVC2_ENUM\Parameters, ServiceDll
Delete
C:\Windows\system32\Blfp.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\se44mdfl\Parameters, ServiceDll
Delete
C:\Windows\system32\SQTECH9080.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\ftpqueue\Parameters, ServiceDll
Delete
C:\Windows\system32\SeaPort.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\GBFSHook\Parameters, ServiceDll
Delete
C:\Windows\system32\USBCCID.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\pdrframe\Parameters, ServiceDll
Delete
C:\Windows\system32\a016mdm.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\U81xobex\Parameters, ServiceDll
Delete
C:\Windows\system32\armoucfltr.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\mcstrm\Parameters, ServiceDll
Delete
C:\Windows\system32\awhost32.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\lxcf_device\Parameters, ServiceDll
Delete
C:\Windows\system32\bgs_sdservice.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\scarddrv\Parameters, ServiceDll
Delete
C:\Windows\system32\nmsaccess.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\CTEDSPIO.DLL\Parameters, ServiceDll
Delete
C:\Windows\system32\pdrframe.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\tabletservice\Parameters, ServiceDll
Delete
C:\Windows\system32\psxss.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Session Manager\SubSystems, Posix
C:\Windows\system32\s716nd5.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\cxpt_service\Parameters, ServiceDll
Delete
C:\Windows\system32\snapman380.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\personalsecuredriveservice\Parameters, ServiceDll
Delete
C:\Windows\system32\ssm_mdfl.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\incdsrv\Parameters, ServiceDll
Delete
C:\Windows\system32\w200mdfl.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\cpntsrv\Parameters, ServiceDll
Delete
C:\Windows\system32\wudfpf.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\avgems\Parameters, ServiceDll
Delete
progman.exe
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, shell
Delete
vgafix.fon
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fixedfon.fon
Delete
vgaoem.fon
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, oemfonts.fon
Delete
vgasys.fon
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fonts.fon
Delete
Autoruns items detected - 703, recognized as trusted - 678

Microsoft Internet Explorer extension modules (BHOs, Toolbars ...)

File nameTypeDescriptionManufacturerCLSID
Extension module{2670000A-7350-4f3c-8081-5663EE0C6C49}
Delete
Extension module{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}
Delete
URLSearchHook{D3D233D5-9F6D-436C-B6C7-E63F77503B30}
Delete
Elements detected - 14, recognized as trusted - 11

Windows Explorer extension modules

File nameDestinationDescriptionManufacturerCLSID
Elements detected - 33, recognized as trusted - 33

Printing system extensions (print monitors, providers)

File nameTypeNameDescriptionManufacturer
Elements detected - 8, recognized as trusted - 8

Task Scheduler jobs

File nameJob nameJob statusDescriptionManufacturer
Elements detected - 4, recognized as trusted - 4

SPI/LSP settings

Namespace providers (NSP)
ProviderStatusEXE fileDescriptionGUID
Detected - 8, recognized as trusted - 8
Transport protocol providers (TSP, LSP)
ProviderEXE fileDescription
Detected - 34, recognized as trusted - 34
Results of automatic SPI settings check
LSP settings checked. No errors detected

TCP/UDP ports

PortStatusRemote HostRemote PortApplicationNotes
TCP ports
135LISTENING0.0.0.00[956] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
139LISTENING0.0.0.00[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
445LISTENING0.0.0.00[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
554LISTENING0.0.0.00[3520] c:\program files\windows media player\wmpnetwk.exe
Script: Quarantine, Delete, BC delete, Terminate
 
2002ESTABLISHED127.0.0.149209[2456] c:\program files\logmein\x86\logmein.exe
Script: Quarantine, Delete, BC delete, Terminate
 
2002LISTENING0.0.0.00[2456] c:\program files\logmein\x86\logmein.exe
Script: Quarantine, Delete, BC delete, Terminate
 
2869LISTENING0.0.0.00[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
5354ESTABLISHED127.0.0.149162[2212] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5354LISTENING0.0.0.00[2212] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5357LISTENING0.0.0.00[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
10243LISTENING0.0.0.00[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
12025LISTENING0.0.0.00[1644] c:\program files\avast software\avast\avastsvc.exe
Script: Quarantine, Delete, BC delete, Terminate
 
12080LISTENING0.0.0.00[1644] c:\program files\avast software\avast\avastsvc.exe
Script: Quarantine, Delete, BC delete, Terminate
 
12110LISTENING0.0.0.00[1644] c:\program files\avast software\avast\avastsvc.exe
Script: Quarantine, Delete, BC delete, Terminate
 
12119LISTENING0.0.0.00[1644] c:\program files\avast software\avast\avastsvc.exe
Script: Quarantine, Delete, BC delete, Terminate
 
12143LISTENING0.0.0.00[1644] c:\program files\avast software\avast\avastsvc.exe
Script: Quarantine, Delete, BC delete, Terminate
 
12465LISTENING0.0.0.00[1644] c:\program files\avast software\avast\avastsvc.exe
Script: Quarantine, Delete, BC delete, Terminate
 
12563LISTENING0.0.0.00[1644] c:\program files\avast software\avast\avastsvc.exe
Script: Quarantine, Delete, BC delete, Terminate
 
12993LISTENING0.0.0.00[1644] c:\program files\avast software\avast\avastsvc.exe
Script: Quarantine, Delete, BC delete, Terminate
 
12995LISTENING0.0.0.00[1644] c:\program files\avast software\avast\avastsvc.exe
Script: Quarantine, Delete, BC delete, Terminate
 
27015LISTENING0.0.0.00[2184] c:\program files\common files\apple\mobile device support\applemobiledeviceservice.exe
Script: Quarantine, Delete, BC delete, Terminate
 
27275LISTENING0.0.0.00[1644] c:\program files\avast software\avast\avastsvc.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49152LISTENING0.0.0.00[596] c:\windows\system32\wininit.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49153LISTENING0.0.0.00[1008] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49154LISTENING0.0.0.00[668] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49155LISTENING0.0.0.00[1140] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49161LISTENING0.0.0.00[1792] c:\windows\system32\spoolsv.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49162ESTABLISHED127.0.0.15354[2184] c:\program files\common files\apple\mobile device support\applemobiledeviceservice.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49174ESTABLISHED216.52.233.164443[2456] c:\program files\logmein\x86\logmein.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49176LISTENING0.0.0.00[652] c:\windows\system32\services.exe
Script: Quarantine, Delete, BC delete, Terminate
 
49209ESTABLISHED127.0.0.12002[3532] c:\program files\logmein\x86\logmeinsystray.exe
Script: Quarantine, Delete, BC delete, Terminate
 
51716ESTABLISHED72.5.58.4780[1644] c:\program files\avast software\avast\avastsvc.exe
Script: Quarantine, Delete, BC delete, Terminate
 
51723TIME_WAIT192.168.2.11780[0]   
51724TIME_WAIT192.168.2.11780[0]   
UDP ports
137LISTENING----[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
138LISTENING----[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
500LISTENING----[1140] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1900LISTENING----[2996] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1900LISTENING----[2996] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
3702LISTENING----[2996] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
3702LISTENING----[1276] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
3702LISTENING----[1276] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
3702LISTENING----[2996] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
4500LISTENING----[1140] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5004LISTENING----[3520] c:\program files\windows media player\wmpnetwk.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5005LISTENING----[3520] c:\program files\windows media player\wmpnetwk.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5353LISTENING----[2212] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5355LISTENING----[1516] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
52848LISTENING----[5012] c:\program files\internet explorer\iexplore.exe
Script: Quarantine, Delete, BC delete, Terminate
 
55702LISTENING----[2184] c:\program files\common files\apple\mobile device support\applemobiledeviceservice.exe
Script: Quarantine, Delete, BC delete, Terminate
 
55703LISTENING----[2184] c:\program files\common files\apple\mobile device support\applemobiledeviceservice.exe
Script: Quarantine, Delete, BC delete, Terminate
 
55704LISTENING----[2212] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, BC delete, Terminate
 
55706LISTENING----[1792] c:\windows\system32\spoolsv.exe
Script: Quarantine, Delete, BC delete, Terminate
 
55749LISTENING----[4080] c:\program files\internet explorer\iexplore.exe
Script: Quarantine, Delete, BC delete, Terminate
 
61035LISTENING----[4600] c:\program files\internet explorer\iexplore.exe
Script: Quarantine, Delete, BC delete, Terminate
 
61054LISTENING----[2996] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
61056LISTENING----[1276] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
65061LISTENING----[2996] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
65062LISTENING----[2996] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
65388LISTENING----[1276] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 

Downloaded Program Files (DPF)

File nameDescriptionManufacturerCLSIDSource URL
Elements detected - 1, recognized as trusted - 1

Control Panel Applets (CPL)

File nameDescriptionManufacturer
Elements detected - 22, recognized as trusted - 22

Active Setup

File nameDescriptionManufacturerCLSID
Elements detected - 9, recognized as trusted - 9

HOSTS file

Hosts file record
ÿþ1
Clear Hosts file

Protocols and handlers

File nameTypeDescriptionManufacturerCLSID
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
Elements detected - 16, recognized as trusted - 13

Suspicious objects

FileDescriptionType
C:\Windows\System32\Drivers\aswSnx.SYS
Script: Quarantine, Delete, BC delete
Suspicion for RootkitKernel-mode hook
C:\Windows\system32\DRIVERS\2785567drv.sys
Script: Quarantine, Delete, BC delete
Suspicion for RootkitKernel-mode hook
C:\Windows\System32\Drivers\aswSP.SYS
Script: Quarantine, Delete, BC delete
Suspicion for RootkitKernel-mode hook
\SystemRoot\System32\Drivers\aswSP.SYS
Script: Quarantine, Delete, BC delete
Suspicion for RootkitKernel-mode hook


Main script of analysis
Windows version: Windows 7 Professional, Build=7601, SP="Service Pack 1"
System Restore: enabled
1.1 Searching for user-mode API hooks
 Analysis: kernel32.dll, export table found in section .text
IAT modification detected: CreateProcessA - 00550010<>754E2082
IAT modification detected: GetModuleFileNameA - 00550080<>7552D75A
IAT modification detected: FreeLibrary - 005500F0<>7552EF67
IAT modification detected: GetModuleFileNameW - 00550160<>7552EF35
IAT modification detected: CreateProcessW - 005501D0<>754E204D
IAT modification detected: LoadLibraryW - 005502B0<>7552EF42
IAT modification detected: LoadLibraryA - 00550320<>7552DC65
IAT modification detected: GetProcAddress - 00550390<>7552CC94
 Analysis: ntdll.dll, export table found in section .text
Function ntdll.dll:LdrLoadDll (137) intercepted, method APICodeHijack.JmpTo[001601EE]
Function ntdll.dll:LdrUnloadDll (161) intercepted, method APICodeHijack.JmpTo[001603F2]
 Analysis: user32.dll, export table found in section .text
Function user32.dll:SetWinEventHook (2216) intercepted, method APICodeHijack.JmpTo[002201EE]
Function user32.dll:SetWindowsHookExA (2231) intercepted, method APICodeHijack.JmpTo[002205F6]
Function user32.dll:SetWindowsHookExW (2232) intercepted, method APICodeHijack.JmpTo[002207FA]
Function user32.dll:UnhookWinEvent (2279) intercepted, method APICodeHijack.JmpTo[002203F2]
Function user32.dll:UnhookWindowsHookEx (2281) intercepted, method APICodeHijack.JmpTo[002209FE]
 Analysis: advapi32.dll, export table found in section .text
 Analysis: ws2_32.dll, export table found in section .text
 Analysis: wininet.dll, export table found in section .text
 Analysis: rasapi32.dll, export table found in section .text
 Analysis: urlmon.dll, export table found in section .text
 Analysis: netapi32.dll, export table found in section .text
1.2 Searching for kernel-mode API hooks
 Driver loaded successfully
 SDT found (RVA=169B00)
 Kernel ntkrnlpa.exe found in memory at address 83018000
   SDT = 83181B00
   KiST = 83096D5C (401)
Function NtAddBootEntry (09) intercepted (8331D7C2->8EA2DDF8), hook C:\Windows\System32\Drivers\aswSnx.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtAdjustPrivilegesToken (0C) intercepted (8329DD8D->BC2B8E36), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtAllocateVirtualMemory (13) intercepted (83242BCC->8F6CEA5A), hook C:\Windows\System32\Drivers\aswSP.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtAlpcConnectPort (16) intercepted (8328E44E->BC2BB074), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtAlpcCreatePort (17) intercepted (8320DCFE->BC2BB2EE), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtAlpcSendWaitReceivePort (27) intercepted (8326B0BE->BC2BB564), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtAssignProcessToJobObject (2B) intercepted (83217FCA->8EA2E85E), hook C:\Windows\System32\Drivers\aswSnx.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtClose (32) intercepted (8325D4F8->BC2B974A), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtConnectPort (3B) intercepted (83290F59->BC2BA57E), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateEvent (40) intercepted (832597EF->BC2BAAC8), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateEventPair (41) intercepted (833234D0->8EA33330), hook C:\Windows\System32\Drivers\aswSnx.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateFile (42) intercepted (83268362->BC2B9A26), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateIoCompletion (43) intercepted (83273875->8EA33422), hook C:\Windows\System32\Drivers\aswSnx.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateMutant (4A) intercepted (8322928E->BC2BA9AE), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateNamedPipeFile (4B) intercepted (83299749->BC2B8A24), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreatePort (4D) intercepted (8320A851->BC2BA882), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateProcessEx (50) - machine code modification Method of JmpTo. jmp 8F6E4D96\SystemRoot\System32\Drivers\aswSP.SYS, driver recognized as trusted
>>> Function restored successfully !
Function NtCreateSection (54) intercepted (8323C04D->BC2B8BCC), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateSemaphore (55) intercepted (8321EA85->BC2BABE8), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateThread (57) intercepted (832F4ED6->BC2B93D0), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateThreadEx (58) intercepted (8328934B->BC2B94CE), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateTimer (59) intercepted (832173FD->8EA333DC), hook C:\Windows\System32\Drivers\aswSnx.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateUserProcess (5D) intercepted (8328727D->BC2BB7AE), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateWaitablePort (5E) intercepted (831BD1B8->BC2BA918), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtDebugActiveProcess (60) intercepted (832C6DB0->BC2BC2D6), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtDeleteBootEntry (64) intercepted (8331D7F3->8EA2DE44), hook C:\Windows\System32\Drivers\aswSnx.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtDeviceIoControlFile (6B) intercepted (8328C5F1->BC2B9EA8), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtDuplicateObject (6F) intercepted (8324A65A->BC2BD4E4), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtFreeVirtualMemory (83) intercepted (830D247A->8F6CEB34), hook C:\Windows\System32\Drivers\aswSP.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtFsControlFile (86) intercepted (8326E8B0->BC2B9CB6), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtLoadDriver (9B) intercepted (831DEBFC->BC2BC3C8), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtMapViewOfSection (A8) intercepted (8325F512->BC2BCB30), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtModifyBootEntry (A9) intercepted (8331D9C4->8EA2DE90), hook C:\Windows\System32\Drivers\aswSnx.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtNotifyChangeKey (AC) intercepted (83212F09->8EA30D1C), hook C:\Windows\System32\Drivers\aswSnx.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtNotifyChangeMultipleKeys (AD) intercepted (8321202B->8EA2EB02), hook C:\Windows\System32\Drivers\aswSnx.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenEvent (B1) intercepted (83228C8A->BC2BAB5E), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenEventPair (B2) intercepted (833235D1->8EA33352), hook C:\Windows\System32\Drivers\aswSnx.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenFile (B3) intercepted (8324AC7A->BC2B97CC), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenIoCompletion (B4) intercepted (832CFF53->8EA33446), hook C:\Windows\System32\Drivers\aswSnx.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenMutant (BB) intercepted (8327A2F0->BC2BAA3E), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenProcess (BE) intercepted (8322AAD4->BC2B9074), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenSection (C2) intercepted (8328289B->BC2BC8CA), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenSemaphore (C3) intercepted (831FE1B8->BC2BAC7E), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenThread (C6) intercepted (83276F95->BC2B8F64), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenTimer (C9) intercepted (83323277->8EA33400), hook C:\Windows\System32\Drivers\aswSnx.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtProtectVirtualMemory (D7) intercepted (8325B581->8F6CECA0), hook C:\Windows\System32\Drivers\aswSP.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtQueryDirectoryObject (E0) intercepted (83271BFE->BC2BB868), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtQueryObject (F8) intercepted (83219FCE->8EA2E9CE), hook C:\Windows\System32\Drivers\aswSnx.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtQuerySection (FE) intercepted (8328FC36->BC2BCE6A), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtQueueApcThread (10D) intercepted (83214D9C->BC2BC75C), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtReplaceKey (124) intercepted (832B4B18->BC2B76DE), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtReplyPort (126) intercepted (83209B2F->BC2BAFE2), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtReplyWaitReceivePort (127) intercepted (8325174C->BC2BAEA8), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtRequestWaitReplyPort (12B) intercepted (83256A43->BC2BC070), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtRestoreKey (12E) intercepted (832AAB5C->BC2B7A56), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtResumeThread (130) intercepted (83289572->BC2BD386), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSaveKey (135) intercepted (832AC3CE->BC2B7676), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSecureConnectPort (138) intercepted (83276FCA->BC2BA2C4), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetBootEntryOrder (13A) intercepted (8331E0D5->8EA2DEDC), hook C:\Windows\System32\Drivers\aswSnx.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetBootOptions (13B) intercepted (8331E5C1->8EA2DF28), hook C:\Windows\System32\Drivers\aswSnx.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetContextThread (13C) intercepted (832F6755->BC2B95EC), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetInformationToken (150) intercepted (8321C878->BC2BB90A), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetSecurityObject (15B) intercepted (8321A71E->BC2BC566), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetSystemInformation (15E) intercepted (8326726C->BC2BCFBA), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetSystemPowerState (15F) intercepted (8333AE4A->8EA2DCEA), hook C:\Windows\System32\Drivers\aswSnx.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtShutdownSystem (168) intercepted (8331B9F7->8EA2DC92), hook C:\Windows\System32\Drivers\aswSnx.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSuspendProcess (16E) intercepted (832F6BE3->BC2BD0AC), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSuspendThread (16F) intercepted (832AE085->BC2BD1E6), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSystemDebugControl (170) intercepted (8329E6BC->BC2BC1FA), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtTerminateProcess (172) intercepted (83273BCD->BC2B921A), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtTerminateThread (173) intercepted (83291584->BC2B9170), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtUnmapViewOfSection (181) intercepted (8327D85A->BC2BCD0E), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtVdmControl (182) intercepted (83310BAF->8EA2DF74), hook C:\Windows\System32\Drivers\aswSnx.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtWriteVirtualMemory (18F) intercepted (8327892A->BC2B9306), hook C:\Windows\system32\DRIVERS\2785567drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function ObMakeTemporaryObject (83223C64) - machine code modification Method of JmpTo. jmp 8F6E1C8C \SystemRoot\System32\Drivers\aswSP.SYS, driver recognized as trusted
>>> Function restored successfully !
Functions checked: 401, intercepted: 73, restored: 75
1.3 Checking IDT and SYSENTER
 Analysis for CPU 1
 Analysis for CPU 2
CmpCallCallBacks = 00000000
 Checking IDT and SYSENTER - complete
1.4 Searching for masking processes and drivers
 Checking not performed: extended monitoring driver (AVZPM) is not installed
1.5 Checking of IRP handlers
 Driver loaded successfully
\FileSystem\ntfs[IRP_MJ_CREATE] = 8F6E48B0 -> C:\Windows\System32\Drivers\aswSP.SYS, driver recognized as trusted
\FileSystem\ntfs[IRP_MJ_CLOSE] = 8F6E48F0 -> C:\Windows\System32\Drivers\aswSP.SYS, driver recognized as trusted
\FileSystem\ntfs[IRP_MJ_WRITE] = 8F6E49B8 -> C:\Windows\System32\Drivers\aswSP.SYS, driver recognized as trusted
\FileSystem\ntfs[IRP_MJ_SET_INFORMATION] = 8F6E49F8 -> C:\Windows\System32\Drivers\aswSP.SYS, driver recognized as trusted
 Checking - complete
>> Services: potentially dangerous service allowed: TermService (Remote Desktop Services)
>> Services: potentially dangerous service allowed: SSDPSRV (SSDP Discovery)
>> Services: potentially dangerous service allowed: Schedule (Task Scheduler)
> Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)!
>> Security: disk drives' autorun is enabled
>> Security: administrative shares (C$, D$ ...) are enabled
>> Security: anonymous user access is enabled
>> Security: sending Remote Assistant queries is enabled
 >>  Service termination timeout is out of admissible values
 >>  Disable HDD autorun
 >>  Disable autorun from network drives
 >>  Disable CD/DVD autorun
 >>  Disable removable media autorun
 >>  Windows Explorer - show extensions of known file types
System Analysis in progress

System Analysis - complete
Script commands
Add commands to script:
Additional operations:
File list