Results of system analysis

Kaspersky Virus Removal Tool 11.0.0.1245 (database released 05/01/2013; 18:47)

List of processes

File namePIDDescriptionCopyrightMD5Information
ATService.exe
Script: Quarantine, Delete, BC delete, Terminate
564  ??error getting file info
Command line:
avgcsrva.exe
Script: Quarantine, Delete, BC delete, Terminate
4476  ??error getting file info
Command line:
avgcsrva.exe
Script: Quarantine, Delete, BC delete, Terminate
592  ??error getting file info
Command line:
avgnsa.exe
Script: Quarantine, Delete, BC delete, Terminate
2340  ??error getting file info
Command line:
avgrsa.exe
Script: Quarantine, Delete, BC delete, Terminate
532  ??error getting file info
Command line:
cbVSCService.exe
Script: Quarantine, Delete, BC delete, Terminate
2252  ??error getting file info
Command line:
CFIWmxSvcs64.exe
Script: Quarantine, Delete, BC delete, Terminate
4908  ??error getting file info
Command line:
FlashUtil64_11_5_502_135_ActiveX.exe
Script: Quarantine, Delete, BC delete, Terminate
4952  ??error getting file info
Command line:
iexplore.exe
Script: Quarantine, Delete, BC delete, Terminate
5872  ??error getting file info
Command line:
mDNSResponder.exe
Script: Quarantine, Delete, BC delete, Terminate
2232  ??error getting file info
Command line:
RAVCpl64.exe
Script: Quarantine, Delete, BC delete, Terminate
4692  ??error getting file info
Command line:
TecoService.exe
Script: Quarantine, Delete, BC delete, Terminate
3004  ??error getting file info
Command line:
TemproSvc.exe
Script: Quarantine, Delete, BC delete, Terminate
3028  ??error getting file info
Command line:
C:\windows\system32\ThpSrv.exe
Script: Quarantine, Delete, BC delete, Terminate
1416  ??error getting file info
Command line:
TOPI.exe
Script: Quarantine, Delete, BC delete, Terminate
2640  ??error getting file info
Command line:
TosCoSrv.exe
Script: Quarantine, Delete, BC delete, Terminate
2348  ??error getting file info
Command line:
TosSENotify.exe
Script: Quarantine, Delete, BC delete, Terminate
4392  ??error getting file info
Command line:
TosSmartSrv.exe
Script: Quarantine, Delete, BC delete, Terminate
5700  ??error getting file info
Command line:
c:\program files (x86)\vodafone\vodafone mobile broadband\bin\vmbservice.exe
Script: Quarantine, Delete, BC delete, Terminate
3140VmbServiceCopyright © 2005-2010 Vodafone Group. All rights reserved.??9.00 kb, rsAh,
created: 25.06.2010 12:57:36,
modified: 25.06.2010 12:57:36
Command line:
"C:\Program Files (x86)\Vodafone\Vodafone Mobile Broadband\Bin\VmbService.exe"
wmpnetwk.exe
Script: Quarantine, Delete, BC delete, Terminate
3772  ??error getting file info
Command line:
Detected:86, recognized as trusted 66
Module nameHandleDescriptionCopyrightMD5Used by processes
C:\Program Files (x86)\Vodafone\Vodafone Mobile Broadband\Bin\Vodafone.Common.dll
Script: Quarantine, Delete, BC delete
1878261760Vodafone.CommonCopyright © 2005-2010 Vodafone Group. All rights reserved.--3140
C:\Program Files (x86)\Vodafone\Vodafone Mobile Broadband\Bin\Vodafone.ConflictingApplications.dll
Script: Quarantine, Delete, BC delete
1877999616Vodafone.ConflictingApplicationsManagerCopyright © 2005-2010 Vodafone Group. All rights reserved.--3140
C:\Program Files (x86)\Vodafone\Vodafone Mobile Broadband\Bin\Vodafone.Data.dll
Script: Quarantine, Delete, BC delete
1870659584Vodafone.Data.dllCopyright © 2005-2010 Vodafone Group. All rights reserved.--3140
C:\Program Files (x86)\Vodafone\Vodafone Mobile Broadband\Bin\Vodafone.DataAccessor.dll
Script: Quarantine, Delete, BC delete
1871446016Vodafone.DataAccessorCopyright © 2005-2010 Vodafone Group. All rights reserved.--3140
C:\Program Files (x86)\Vodafone\Vodafone Mobile Broadband\Bin\Vodafone.LogEngine.dll
Script: Quarantine, Delete, BC delete
1871380480Vodafone.LogEngineCopyright © 2005-2010 Vodafone Group. All rights reserved.--3140
C:\Program Files (x86)\Vodafone\Vodafone Mobile Broadband\Bin\Vodafone.NtServiceCore.dll
Script: Quarantine, Delete, BC delete
1878130688Vodafone.NtServiceCoreCopyright © 2005-2010 Vodafone Group. All rights reserved.--3140
C:\Program Files (x86)\Vodafone\Vodafone Mobile Broadband\Bin\Vodafone.NtServiceMessaging.dll
Script: Quarantine, Delete, BC delete
1871577088Vodafone.NtServiceMessagingCopyright © 2005-2010 Vodafone Group. All rights reserved.--3140
C:\Program Files (x86)\Vodafone\Vodafone Mobile Broadband\Bin\Vodafone.Platform.dll
Script: Quarantine, Delete, BC delete
1870856192Vodafone.PlatformCopyright © 2005-2010 Vodafone Group. All rights reserved.--3140
C:\Program Files (x86)\Vodafone\Vodafone Mobile Broadband\Bin\Vodafone.Win32.dll
Script: Quarantine, Delete, BC delete
922746880Vodafone.Win32Copyright © 2005-2010 Vodafone Group. All rights reserved.--3140
C:\windows\assembly\NativeImages_v2.0.50727_32\mscorlib\187d7c66735c533de851c76384f86912\mscorlib.ni.dll
Script: Quarantine, Delete, BC delete
1887043584Microsoft Common Language Runtime Class Library© Microsoft Corporation. All rights reserved.--3140
C:\windows\assembly\NativeImages_v2.0.50727_32\System.Configuration\c64ca3678261c8ffcd9e7efd1af6ed54\System.Configuration.ni.dll
Script: Quarantine, Delete, BC delete
1869611008System.Configuration.dll© Microsoft Corporation. All rights reserved.--3140
C:\windows\assembly\NativeImages_v2.0.50727_32\System.Management\66694f9192bd0dddc2eaf90fbcbcd555\System.Management.ni.dll
Script: Quarantine, Delete, BC delete
1866334208.NET Framework© Microsoft Corporation. All rights reserved.--3140
C:\windows\assembly\NativeImages_v2.0.50727_32\System.Security\3079aabe5fd4f325656d52b94b19ae2e\System.Security.ni.dll
Script: Quarantine, Delete, BC delete
1867448320System.Security.dll© Microsoft Corporation. All rights reserved.--3140
C:\windows\assembly\NativeImages_v2.0.50727_32\System.ServiceProce#\17796f2951c17ebf92dd4b7c9b3ce556\System.ServiceProcess.ni.dll
Script: Quarantine, Delete, BC delete
1878720512.NET Framework© Microsoft Corporation. All rights reserved.--3140
C:\windows\assembly\NativeImages_v2.0.50727_32\System.Xml\25e672ea505e50ab058258ac72a54f02\System.Xml.ni.dll
Script: Quarantine, Delete, BC delete
1872494592.NET Framework© Microsoft Corporation. All rights reserved.--3140
C:\windows\assembly\NativeImages_v2.0.50727_32\System\9dd758ac0bf7358ac6e4720610fcc63c\System.ni.dll
Script: Quarantine, Delete, BC delete
1878982656.NET Framework© Microsoft Corporation. All rights reserved.--3140
Modules detected:377, recognized as trusted 361

Kernel Space Modules Viewer

ModuleBase addressSize in memoryDescriptionManufacturer
C:\windows\System32\Drivers\dump_dumpfve.sys
Script: Quarantine, Delete, BC delete
8C28000013000 (77824)
C:\windows\System32\Drivers\dump_iaStor.sys
Script: Quarantine, Delete, BC delete
36A0000154000 (1392640)
Modules detected - 194, recognized as trusted - 192

Services

ServiceDescriptionStatusFileGroupDependencies
Thpsrv
Service: Stop, Delete, Disable, BC delete
TOSHIBA HDD ProtectionRunningC:\windows\system32\ThpSrv.exe
Script: Quarantine, Delete, BC delete
  
VmbService
Service: Stop, Delete, Disable, BC delete
Serviço Vodafone Mobile BroadbandRunningC:\Program Files (x86)\Vodafone\Vodafone Mobile Broadband\Bin\VmbService.exe
Script: Quarantine, Delete, BC delete
 winmgmt
BrYNSvc
Service: Stop, Delete, Disable, BC delete
BrYNSvcNot startedC:\Program Files (x86)\Browny02\BrYNSvc.exe
Script: Quarantine, Delete, BC delete
 RPCSS
Detected - 193, recognized as trusted - 190

Drivers

ServiceDescriptionStatusFileGroupDependencies
catchme
Driver: Unload, Delete, Disable, BC delete
catchmeNot startedC:\ComboFix\catchme.sys
Script: Quarantine, Delete, BC delete
Base 
Tosrfcom
Driver: Unload, Delete, Disable, BC delete
TosrfcomNot startedTosrfcom.sys
Script: Quarantine, Delete, BC delete
  
Detected - 300, recognized as trusted - 298

Autoruns

File nameStatusStartup methodDescription
C:\Program Files (x86)\Brother\PtAdrBook11\AdrBook.exe
Script: Quarantine, Delete, BC delete
ActiveShortcut in Autoruns folderC:\Users\Pleitao\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\, C:\Users\Pleitao\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\P-touch Address Book 1.1.lnk,
C:\Program Files (x86)\Brother\Ptedit50\Ptedit50.exe
Script: Quarantine, Delete, BC delete
ActiveShortcut in Autoruns folderC:\Users\Pleitao\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\, C:\Users\Pleitao\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\P-touch Editor 5.0.lnk,
C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\MEWMIProv\MeProv.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\MEProv, EventMessageFile
C:\Program Files\Common Files\Autodesk Shared\AcDgnCOM18.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved, {4B392032-A759-43ED-9469-377C80A4472D}
Delete
C:\Program Files\Common Files\Autodesk Shared\AcShellEx\AcShellExtension.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved, {5800AD5B-72C1-477B-9A08-CA112DF06D97}
Delete
C:\Program Files\Common Files\Autodesk Shared\AcShellEx\AcShellExtension.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved, {8A0BC933-7552-42E2-A228-3BE055777227}
Delete
C:\Program Files\Common Files\Autodesk Shared\Thumbnail\AcThumbnail16.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved, {AC1DB655-4F9A-4c39-8AD2-A65324A4C446}
Delete
C:\Program Files\Common Files\McAfee\SystemCore\
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\cfwids.sys, EventMessageFile
C:\Program Files\Common Files\McAfee\SystemCore\
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\mfeapfk.sys, EventMessageFile
C:\Program Files\Common Files\McAfee\SystemCore\
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\mfeavfk.sys, EventMessageFile
C:\Program Files\Common Files\McAfee\SystemCore\
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\mfefirek.sys, EventMessageFile
C:\Program Files\Common Files\McAfee\SystemCore\
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\mfenlfk.sys, EventMessageFile
C:\Program Files\Common Files\McAfee\SystemCore\
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\mferkdet.sys, EventMessageFile
C:\Program Files\DivX\DivX Plus Media Foundation Components\DivXPropertyHandler.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved, {D8D1CE8C-B1EB-4E95-B63B-1531BA60E992}
Delete
C:\Program Files\DivX\DivX Plus Media Foundation Components\DivXThumbnailProvider.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved, {83238FAE-D346-4E12-8734-D42F7554B3E6}
Delete
C:\Program Files\Intel\WiFi\bin\iproset.cpl
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SOFTWARE\Microsoft\Windows\CurrentVersion\Control Panel\Cpls, PROSet Tools
Delete
C:\Program Files\TOSHIBA\TFPU\TFPUFileShellExt.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved, {F4AE3B49-F019-4C6C-9A1A-3EE75DC83555}
Delete
C:\Program Files\TOSHIBA\TPHM\TReport.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\TPHM, EventMessageFile
C:\Users\Pleitao\AppData\Local\Temp\_uninst_53018271.bat
Script: Quarantine, Delete, BC delete
ActiveShortcut in Autoruns folderC:\Users\Pleitao\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\, C:\Users\Pleitao\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_uninst_53018271.lnk,
C:\Users\Pleitao\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Shows Desktop.lnk
Script: Quarantine, Delete, BC delete
ActiveFile in Autoruns folderC:\Users\Pleitao\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\, C:\Users\Pleitao\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Shows Desktop.lnk,
C:\Users\Pleitao\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Window Switcher.lnk
Script: Quarantine, Delete, BC delete
ActiveFile in Autoruns folderC:\Users\Pleitao\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\, C:\Users\Pleitao\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Window Switcher.lnk,
C:\ccf825afacc8aa307202388add\DW\DW20.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\VSSetup, EventMessageFile
C:\windows\System32\MsSpellCheckingFacility.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Microsoft-Windows-Spell-Checking, EventMessageFile
C:\windows\System32\MsSpellCheckingFacility.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Microsoft-Windows-SpellChecker, EventMessageFile
C:\windows\System32\MsSpellCheckingFacility.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\Microsoft-Windows-Spell-Checking, EventMessageFile
C:\windows\System32\MsSpellCheckingFacility.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\Microsoft-Windows-SpellChecker, EventMessageFile
C:\windows\system32\AcSignIcon.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved, {36A21736-36C2-4C11-8ACB-D4136F2B57BD}
Delete
C:\windows\system32\psxss.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Session Manager\SubSystems, Posix
C:\windows\system32\wuaucpl.cpl
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved, {5F327514-6C5E-4d60-8F16-D07FA08A78ED}
Delete
auditcse.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions\{f3ccc681-b74c-4060-9f26-cd84525dca2a}, DLLName
Delete
igfxdev.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\igfxcui, DLLName
Delete
rdpclip
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Terminal Server\Wds\rdpwd, StartupPrograms
Delete
Autoruns items detected - 682, recognized as trusted - 650

Microsoft Internet Explorer extension modules (BHOs, Toolbars ...)

File nameTypeDescriptionManufacturerCLSID
Extension module{97F922BD-8563-4184-87EE-8C4ACA438823}
Delete
Elements detected - 8, recognized as trusted - 7

Windows Explorer extension modules

File nameDestinationDescriptionManufacturerCLSID
WebCheck{E6FB5E20-DE35-11CF-9C87-00AA005127ED}
Delete
C:\Program Files\TOSHIBA\TFPU\TFPUFileShellExt.dll
Script: Quarantine, Delete, BC delete
TFPU file icon extensionTOSHIBA TFPUFileShellExt2008 (c) TOSHIBA. All rights reserved.{F4AE3B49-F019-4C6C-9A1A-3EE75DC83555}
Delete
C:\Program Files\Common Files\Autodesk Shared\AcDgnCOM18.dll
Script: Quarantine, Delete, BC delete
Autodesk Dgn File PreviewAcDgnCOM ModuleCopyright (c) 1982-2009 by Autodesk, Inc.{4B392032-A759-43ED-9469-377C80A4472D}
Delete
C:\Program Files\Common Files\Autodesk Shared\Thumbnail\AcThumbnail16.dll
Script: Quarantine, Delete, BC delete
Autodesk Drawing PreviewAutoCAD componentCopyright (c) 1982-2009 by Autodesk, Inc.{AC1DB655-4F9A-4c39-8AD2-A65324A4C446}
Delete
C:\windows\system32\AcSignIcon.dll
Script: Quarantine, Delete, BC delete
AutoCAD Digital Signatures Icon Overlay Handler{36A21736-36C2-4C11-8ACB-D4136F2B57BD}
Delete
C:\Program Files\Common Files\Autodesk Shared\AcShellEx\AcShellExtension.dll
Script: Quarantine, Delete, BC delete
AutoCAD DWG InfoTip HandlerAutoCAD Dwg common shell extension handlerCopyright (c) 1982-2009 by Autodesk, Inc.{5800AD5B-72C1-477B-9A08-CA112DF06D97}
Delete
C:\Program Files\Common Files\Autodesk Shared\AcShellEx\AcShellExtension.dll
Script: Quarantine, Delete, BC delete
AutoCAD DWG Column HandlerAutoCAD Dwg common shell extension handlerCopyright (c) 1982-2009 by Autodesk, Inc.{8A0BC933-7552-42E2-A228-3BE055777227}
Delete
WinRAR shell extension{B41DB860-8EE4-11D2-9906-E49FADC173CA}
Delete
C:\Program Files\DivX\DivX Plus Media Foundation Components\DivXThumbnailProvider.dll
Script: Quarantine, Delete, BC delete
DivX Thumbnail ProviderDivX MKV/AVI Thumbnail Provider© Copyright 2009 DivX, Inc.{83238FAE-D346-4E12-8734-D42F7554B3E6}
Delete
C:\Program Files\DivX\DivX Plus Media Foundation Components\DivXPropertyHandler.dll
Script: Quarantine, Delete, BC delete
DivX Property HandlerDivX MKV/AVI Property Handler© Copyright 2009 DivX, Inc.{D8D1CE8C-B1EB-4E95-B63B-1531BA60E992}
Delete
C:\windows\system32\wuaucpl.cpl
Script: Quarantine, Delete, BC delete
Auto Update Property Sheet Extension{5F327514-6C5E-4d60-8F16-D07FA08A78ED}
Delete
AVG Find Extension{9F97547E-460A-42C5-AE0C-81C61FFAEBC3}
Delete
C:\Program Files\Common Files\Autodesk Shared\AcShellEx\AcShellExtension.dll
Script: Quarantine, Delete, BC delete
ColumnHandlerAutoCAD Dwg common shell extension handlerCopyright (c) 1982-2009 by Autodesk, Inc.{8A0BC933-7552-42E2-A228-3BE055777227}
Delete
ColumnHandler{F9DB5320-233E-11D1-9F84-707F02C10627}
Delete
Elements detected - 31, recognized as trusted - 17

Printing system extensions (print monitors, providers)

File nameTypeNameDescriptionManufacturer
AdobePDF.dll
Script: Quarantine, Delete, BC delete
MonitorAdobe PDF Port Monitor
QL56L.DLL
Script: Quarantine, Delete, BC delete
MonitorBrother QL-560 Monitor
localspl.dll
Script: Quarantine, Delete, BC delete
MonitorLocal Port
FXSMON.DLL
Script: Quarantine, Delete, BC delete
MonitorMicrosoft Shared Fax Monitor
tcpmon.dll
Script: Quarantine, Delete, BC delete
MonitorStandard TCP/IP Port
tbtmon.dll
Script: Quarantine, Delete, BC delete
MonitorToshiba Bluetooth Monitor
usbmon.dll
Script: Quarantine, Delete, BC delete
MonitorUSB Monitor
WSDMon.dll
Script: Quarantine, Delete, BC delete
MonitorWSD Port
inetpp.dll
Script: Quarantine, Delete, BC delete
ProviderHTTP Print Services
Elements detected - 10, recognized as trusted - 1

Task Scheduler jobs

File nameJob nameJob statusDescriptionManufacturer
Elements detected - 4, recognized as trusted - 4

SPI/LSP settings

Namespace providers (NSP)
ProviderStatusEXE fileDescriptionGUID
Detected - 9, recognized as trusted - 9
Transport protocol providers (TSP, LSP)
ProviderEXE fileDescription
Detected - 10, recognized as trusted - 10
Results of automatic SPI settings check
LSP settings checked. No errors detected

TCP/UDP ports

PortStatusRemote HostRemote PortApplicationNotes
TCP ports
UDP ports

Downloaded Program Files (DPF)

File nameDescriptionManufacturerCLSIDSource URL
Elements detected - 0, recognized as trusted - 0

Control Panel Applets (CPL)

File nameDescriptionManufacturer
C:\windows\system32\FlashPlayerCPLApp.cpl
Script: Quarantine, Delete, BC delete
Adobe Flash Player Control Panel AppletCopyright © 1996 Adobe Systems Incorporated. All Rights Reserved. Adobe and Flash are either trademarks or registered trademarks in the United States and/or other countries.
Elements detected - 20, recognized as trusted - 19

Active Setup

File nameDescriptionManufacturerCLSID
Elements detected - 7, recognized as trusted - 7

HOSTS file

Hosts file record
127.0.0.1       localhost
Clear Hosts file

Protocols and handlers

File nameTypeDescriptionManufacturerCLSID
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
Elements detected - 15, recognized as trusted - 12

Suspicious objects

FileDescriptionType


Main script of analysis
Windows version: Windows 7 Professional, Build=7601, SP="Service Pack 1"
System Restore: enabled
>> Services: potentially dangerous service allowed: TermService (@%SystemRoot%\System32\termsrv.dll,-268)
>> Services: potentially dangerous service allowed: SSDPSRV (@%systemroot%\system32\ssdpsrv.dll,-100)
>> Services: potentially dangerous service allowed: Schedule (@%SystemRoot%\system32\schedsvc.dll,-100)
> Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)!
>> Security: disk drives' autorun is enabled
>> Security: administrative shares (C$, D$ ...) are enabled
>> Security: anonymous user access is enabled
>> Security: sending Remote Assistant queries is enabled
 >>  Abnormal SCR files association
 >>  Disable HDD autorun
 >>  Disable autorun from network drives
 >>  Disable CD/DVD autorun
 >>  Disable removable media autorun
 >>  Windows Explorer - show extensions of known file types
System Analysis in progress

System Analysis - complete
Script commands
Add commands to script:
Additional operations:
File list