Results of system analysis

Kaspersky Virus Removal Tool 11.0.0.1245 (database released 27/08/2013; 15:15)

List of processes

File namePIDDescriptionCopyrightMD5Information
MsMpEng.exe
Script: Quarantine, Delete, BC delete, Terminate
776  ??error getting file info
Command line:
Detected:21, recognized as trusted 20
Module nameHandleDescriptionCopyrightMD5Used by processes
Modules detected:130, recognized as trusted 130

Kernel Space Modules Viewer

ModuleBase addressSize in memoryDescriptionManufacturer
C:\Windows\System32\Drivers\dump_iaStor.sys
Script: Quarantine, Delete, BC delete
8C60D0000CE000 (843776)
Modules detected - 87, recognized as trusted - 86

Services

ServiceDescriptionStatusFileGroupDependencies
jswpsapi
Service: Stop, Delete, Disable, BC delete
Jumpstart Wifi Protected SetupNot startedC:\Program Files\Jumpstart\jswpsapi.exe
Script: Quarantine, Delete, BC delete
 RPCSS
msiserver
Service: Stop, Delete, Disable, BC delete
Windows InstallerNot startedC:\Windows\system32\msiexec
Script: Quarantine, Delete, BC delete
 rpcss
Detected - 144, recognized as trusted - 142

Drivers

ServiceDescriptionStatusFileGroupDependencies
catchme
Driver: Unload, Delete, Disable, BC delete
catchmeNot startedC:\Users\Elaine\AppData\Local\Temp\catchme.sys
Script: Quarantine, Delete, BC delete
Base 
SVRPEDRV
Driver: Unload, Delete, Disable, BC delete
SVRPEDRVNot startedC:\Windows\System32\sysprep\PEDrv.sys
Script: Quarantine, Delete, BC delete
  
Detected - 236, recognized as trusted - 234

Autoruns

File nameStatusStartup methodDescription
C:\PROGRA~1\COMMON~1\MICROS~1\DW\DW20.EXE
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\HotFixInstaller, EventMessageFile
C:\PROGRA~1\COMMON~1\MICROS~1\DW\DW20.EXE
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\VSSetup, EventMessageFile
C:\Program Files\ArcSoft\TotalMedia Extreme\MSGDll.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\ArcSoft TotalMedia Extreme, EventMessageFile
C:\Program Files\Google\Picasa3\Picasa3.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Picasa3, EventMessageFile
C:\Users\Elaine\AppData\Local\temp\_uninst_.bat
Script: Quarantine, Delete, BC delete
ActiveShortcut in Autoruns folderC:\Users\Elaine\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\, C:\Users\Elaine\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_uninst_.lnk,
C:\Users\Elaine\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Shows Desktop.lnk
Script: Quarantine, Delete, BC delete
ActiveFile in Autoruns folderC:\Users\Elaine\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\, C:\Users\Elaine\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Shows Desktop.lnk,
C:\WindowsSystem32\IoLogMsg.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\vsmraid, EventMessageFile
C:\Windows\System32\appmgmts.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\AppMgmt\Parameters, ServiceDll
Delete
C:\Windows\System32\drivers\dwprot.sys
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\DwProt, EventMessageFile
C:\Windows\System32\drivers\sbapifs.sys
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\Anti-Spyware Filter, EventMessageFile
C:\Windows\System32\igmpv2.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IGMPv2, EventMessageFile
C:\Windows\System32\ipbootp.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IPBOOTP, EventMessageFile
C:\Windows\System32\iprip2.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IPRIP2, EventMessageFile
C:\Windows\System32\ws03res.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IPNATHLP, EventMessageFile
C:\Windows\system32\psxss.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Session Manager\SubSystems, Posix
C:\Windows\twain_32\escndv\escndv.exe
Script: Quarantine, Delete, BC delete
ActiveShortcut in Autoruns folderC:\Users\Elaine\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\, C:\Users\Elaine\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\EPSON Scan.lnk,
C:\Windows\winstart.bat
Script: Quarantine, Delete, BC delete
--File in Autoruns folderC:\Windows\, C:\Windows\winstart.bat,
NDSTray.exe
Script: Quarantine, Delete, BC delete
DisabledRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run-, NDSTray.exe
Delete
SDEvents.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Spybot - Search & Destroy 2, EventMessageFile
TOSCDSPD.EXE
Script: Quarantine, Delete, BC delete
DisabledRegistry keyHKEY_USERS, S-1-5-21-1517136145-1328366619-2469452859-1000\Software\Microsoft\Windows\CurrentVersion\Run-, TOSCDSPD
Delete
progman.exe
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, shell
Delete
rdpclip
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Terminal Server\Wds\rdpwd, StartupPrograms
Delete
vgafix.fon
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fixedfon.fon
Delete
vgaoem.fon
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, oemfonts.fon
Delete
vgasys.fon
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fonts.fon
Delete
Autoruns items detected - 566, recognized as trusted - 541

Microsoft Internet Explorer extension modules (BHOs, Toolbars ...)

File nameTypeDescriptionManufacturerCLSID
res:\C:\Program Files\ieSpell\iespell.dll/SPELLCHECK.HTM
Script: Quarantine, Delete, BC delete
Extension module{0E17D5B7-9F5D-4fee-9DF6-CA6EE38B68A8}
Delete
res:\C:\Program Files\ieSpell\iespell.dll/SPELLOPTION.HTM
Script: Quarantine, Delete, BC delete
Extension module{1606D6F9-9D3B-4aea-A025-ED5B2FD488E7}
Delete
Elements detected - 3, recognized as trusted - 1

Windows Explorer extension modules

File nameDestinationDescriptionManufacturerCLSID
Auto Update Property Sheet Extension{5F327514-6C5E-4d60-8F16-D07FA08A78ED}
Delete
ColumnHandlerAutorunsDisabled
Delete
"C:\Program Files\OpenOffice.org 3\Basis\program\shlxthdl\shlxthdl.dll"
Script: Quarantine, Delete, BC delete
ColumnHandler{C52AF81D-F7A0-4AAB-8E87-F80A60CCD396}
Delete
Elements detected - 6, recognized as trusted - 3

Printing system extensions (print monitors, providers)

File nameTypeNameDescriptionManufacturer
C:\Windows\system32\enppmon.dll
Script: Quarantine, Delete, BC delete
MonitorEpsonNet Print PortEpsonNet Print Port Monitor DLLCopyright (C) SEIKO EPSON CORPORATION 2004-2011. All rights reserved.
Elements detected - 9, recognized as trusted - 8

Task Scheduler jobs

File nameJob nameJob statusDescriptionManufacturer
Elements detected - 0, recognized as trusted - 0

SPI/LSP settings

Namespace providers (NSP)
ProviderStatusEXE fileDescriptionGUID
Detected - 6, recognized as trusted - 6
Transport protocol providers (TSP, LSP)
ProviderEXE fileDescription
Detected - 26, recognized as trusted - 26
Results of automatic SPI settings check
LSP settings checked. No errors detected

TCP/UDP ports

PortStatusRemote HostRemote PortApplicationNotes
TCP ports
UDP ports

Downloaded Program Files (DPF)

File nameDescriptionManufacturerCLSIDSource URL
Elements detected - 1, recognized as trusted - 1

Control Panel Applets (CPL)

File nameDescriptionManufacturer
Elements detected - 24, recognized as trusted - 24

Active Setup

File nameDescriptionManufacturerCLSID
Elements detected - 8, recognized as trusted - 8

HOSTS file

Hosts file record
127.0.0.1       localhost
Clear Hosts file

Protocols and handlers

File nameTypeDescriptionManufacturerCLSID
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
Elements detected - 21, recognized as trusted - 18

Suspicious objects

FileDescriptionType


Main script of analysis
Windows version: Windows Vista (TM) Home Basic, Build=6002, SP="Service Pack 2"
System Restore: enabled
System booted in Safe Mode
1.1 Searching for user-mode API hooks
 Analysis: kernel32.dll, export table found in section .text
IAT modification detected: CreateProcessA - 00CB0010<>77251C28
IAT modification detected: GetModuleFileNameA - 00CB0080<>7729B8BD
IAT modification detected: FreeLibrary - 00CB00F0<>77293F64
IAT modification detected: GetModuleFileNameW - 00CB0160<>7729B47E
IAT modification detected: CreateProcessW - 00CB01D0<>77251BF3
IAT modification detected: LoadLibraryW - 00CB02B0<>772793F0
IAT modification detected: LoadLibraryA - 00CB0320<>7727956C
IAT modification detected: GetProcAddress - 00CB0390<>7729921B
 Analysis: ntdll.dll, export table found in section .text
 Analysis: user32.dll, export table found in section .text
 Analysis: advapi32.dll, export table found in section .text
 Analysis: ws2_32.dll, export table found in section .text
 Analysis: wininet.dll, export table found in section .text
 Analysis: rasapi32.dll, export table found in section .text
 Analysis: urlmon.dll, export table found in section .text
 Analysis: netapi32.dll, export table found in section .text
1.2 Searching for kernel-mode API hooks
 Error loading driver - scan interrupted [C0000061]
1.4 Searching for masking processes and drivers
 Checking not performed: extended monitoring driver (AVZPM) is not installed
1.5 Checking of IRP handlers
 Error loading driver - scan interrupted [C0000061]
>> Services: potentially dangerous service allowed: SSDPSRV (SSDP Discovery)
>> Services: potentially dangerous service allowed: Schedule (Task Scheduler)
> Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)!
>> Security: disk drives' autorun is enabled
>> Security: administrative shares (C$, D$ ...) are enabled
>> Security: anonymous user access is enabled
 >>  Disable HDD autorun
 >>  Disable autorun from network drives
 >>  Disable CD/DVD autorun
 >>  Disable removable media autorun
 >>  Windows Explorer - show extensions of known file types
System Analysis in progress

System Analysis - complete
Script commands
Add commands to script:
Additional operations:
File list