Results of system analysis

Kaspersky Virus Removal Tool 11.0.0.1245 (database released 24/06/2012; 09:22)

List of processes

File namePIDDescriptionCopyrightMD5Information
c:\program files\common files\arcsoft\connection service\bin\acservice.exe
Script: Quarantine, Delete, BC delete, Terminate
1812ArcSoft Connect ServiceCopyright (C) ArcSoft 2007??110.50 kb, rsAh,
created: 11.09.2010 20:43:05,
modified: 11.11.2011 17:24:16
Command line:
"C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe"
c:\program files\bt business broadband desktop help\btbb\bthelpnotifier.exe
Script: Quarantine, Delete, BC delete, Terminate
5208mcci+McciTrayAppCopyright ª 1999-2009, Alcatel-Lucent??1547.50 kb, rsAh,
created: 25.05.2010 10:07:08,
modified: 07.12.2009 12:56:00
Command line:
"C:\Program Files\BT Business Broadband Desktop Help\btbb\BTHelpNotifier.exe"
c:\program files\cisco systems\vpn client\cvpnd.exe
Script: Quarantine, Delete, BC delete, Terminate
920Cisco Systems VPN ClientCopyright © 1998-2003 Cisco Systems, Inc.??1400.02 kb, rsAh,
created: 12.02.2008 17:01:12,
modified: 11.11.2011 17:24:21
Command line:
"C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe"
c:\program files\wave systems corp\common\dataserver.exe
Script: Quarantine, Delete, BC delete, Terminate
1076Database ServiceCopyright © 2004 Wave Systems Corp.??308.00 kb, rsAh,
created: 25.03.2006 17:24:04,
modified: 11.11.2011 17:24:23
Command line:
"C:\Program Files\Wave Systems Corp\Common\DataServer.exe"
c:\program files\intel\wireless\bin\evteng.exe
Script: Quarantine, Delete, BC delete, Terminate
1236Intel(R) PROSet/Wireless Event LogCopyright (c) Intel Corporation 1999-2005??112.06 kb, rsAh,
created: 28.12.2005 11:45:02,
modified: 11.11.2011 17:24:10
Command line:
"C:\Program Files\Intel\Wireless\Bin\EvtEng.exe"
c:\windows\explorer.exe
Script: Quarantine, Delete, BC delete, Terminate
5528Windows Explorer© Microsoft Corporation. All rights reserved.??1009.50 kb, rsAh,
created: 11.08.2004 17:00:13,
modified: 14.04.2008 01:12:19
Command line:
C:\WINDOWS\explorer.exe
c:\windows\system32\lsass.exe
Script: Quarantine, Delete, BC delete, Terminate
556LSA Shell (Export Version)© Microsoft Corporation. All rights reserved.??13.00 kb, rsAh,
created: 11.08.2004 17:00:18,
modified: 14.04.2008 01:12:24
Command line:
C:\WINDOWS\system32\lsass.exe
c:\mbl\mbrain\software\mortgage brain framework 1.0\bin\mbservicehost.exe
Script: Quarantine, Delete, BC delete, Terminate
2040mbServiceHostCopyright © 2010??28.50 kb, rsAh,
created: 30.11.2010 14:16:18,
modified: 30.11.2010 14:16:18
Command line:
"C:\MBL\MBrain\Software\Mortgage Brain Framework 1.0\bin\mbServiceHost.exe"
c:\program files\common files\motive\mccicmservice.exe
Script: Quarantine, Delete, BC delete, Terminate
796mcci+McciCMServiceCopyright ª 1999-2009, Alcatel-Lucent??312.00 kb, rsAh,
created: 25.05.2010 10:05:59,
modified: 11.11.2011 17:24:26
Command line:
"C:\Program Files\Common Files\Motive\McciCMService.exe"
c:\program files\vodafone\vodafone mobile connect\bin\mobileconnect.exe
Script: Quarantine, Delete, BC delete, Terminate
4888MobileConnectCopyright © 2005-2009 Vodafone Group. All rights reserved.??2355.50 kb, rsAh,
created: 20.04.2010 11:43:08,
modified: 18.09.2009 18:48:34
Command line:
"C:\Program Files\Vodafone\Vodafone Mobile Connect\Bin\MobileConnect.exe" /silent
c:\program files\dell\quickset\nicconfigsvc.exe
Script: Quarantine, Delete, BC delete, Terminate
2100Internal Network Card Power Management ServiceCopyright (C) 2005 Dell Inc.??372.00 kb, rsAh,
created: 21.05.2006 18:03:39,
modified: 11.11.2011 17:25:40
Command line:
"C:\Program Files\Dell\QuickSet\NICCONFIGSVC.exe"
c:\windows\system32\nvsvc32.exe
Script: Quarantine, Delete, BC delete, Terminate
2276NVIDIA Driver Helper Service, Version 83.13(C) NVIDIA Corporation. All rights reserved.??140.07 kb, rsAh,
created: 21.05.2006 17:39:52,
modified: 11.11.2011 17:25:41
Command line:
C:\WINDOWS\system32\nvsvc32.exe
c:\program files\intel\wireless\bin\regsrvc.exe
Script: Quarantine, Delete, BC delete, Terminate
2368Intel(R) PROSet/Wireless Registry ServiceCopyright (c) Intel Corporation 1999-2005??216.00 kb, rsAh,
created: 28.12.2005 11:44:24,
modified: 11.11.2011 17:25:43
Command line:
"C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe"
c:\program files\intel\wireless\bin\s24evmon.exe
Script: Quarantine, Delete, BC delete, Terminate
1284Wireless Management ServiceCopyright (c) Intel Corporation 1999-2005??532.00 kb, rsAh,
created: 28.12.2005 11:47:10,
modified: 11.11.2011 17:24:13
Command line:
"C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe"
c:\program files\microsoft sql server\90\shared\sqlbrowser.exe
Script: Quarantine, Delete, BC delete, Terminate
2776SQL Browser Service EXE© Microsoft Corp. All rights reserved.??233.34 kb, rsAh,
created: 10.12.2010 19:29:30,
modified: 11.11.2011 17:25:52
Command line:
"C:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe"
c:\program files\microsoft sql server\mssql\binn\sqlservr.exe
Script: Quarantine, Delete, BC delete, Terminate
1608SQL Server Windows NT© 1988-2003 Microsoft Corp. All rights reserved.??7344.08 kb, rsAh,
created: 17.12.2002 17:26:22,
modified: 11.11.2011 17:25:37
Command line:
"C:\Program Files\Microsoft SQL Server\MSSQL\Binn\sqlservr.exe" -sMSSQLSERVER
c:\program files\microsoft sql server\mssql.1\mssql\binn\sqlservr.exe
Script: Quarantine, Delete, BC delete, Terminate
976SQL Server Windows NT© Microsoft Corp. All rights reserved.??28606.84 kb, rsAh,
created: 10.12.2010 19:29:30,
modified: 11.11.2011 17:24:55
Command line:
"C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe" -sETI
c:\program files\microsoft sql server\mssql$otp\binn\sqlservr.exe
Script: Quarantine, Delete, BC delete, Terminate
1036SQL Server Windows NT© 1988-2004 Microsoft Corp. All rights reserved.??8944.00 kb, rsAh,
created: 04.05.2005 01:04:28,
modified: 11.11.2011 17:25:19
Command line:
"C:\Program Files\Microsoft SQL Server\MSSQL$OTP\Binn\sqlservr.exe" -sOTP
c:\program files\microsoft sql server\90\shared\sqlwriter.exe
Script: Quarantine, Delete, BC delete, Terminate
2800SQL Server VSS Writer© Microsoft Corp. All rights reserved.??84.84 kb, rsAh,
created: 10.12.2010 19:30:50,
modified: 11.11.2011 17:25:54
Command line:
"C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe"
c:\program files\vodafone\vodafone mobile connect\bin\vmcservice.exe
Script: Quarantine, Delete, BC delete, Terminate
272VMCServiceCopyright © 2005-2009 Vodafone Group. All rights reserved.??10.50 kb, rsAh,
created: 18.09.2009 19:48:28,
modified: 11.11.2011 17:26:16
Command line:
"C:\Program Files\Vodafone\Vodafone Mobile Connect\Bin\VMCService.exe"
c:\program files\intel\wireless\bin\wlkeeper.exe
Script: Quarantine, Delete, BC delete, Terminate
1316WLANKEEPERCopyright (c) Intel Corporation 1999-2005??256.07 kb, rsAh,
created: 28.12.2005 12:04:56,
modified: 11.11.2011 17:24:14
Command line:
"C:\Program Files\Intel\Wireless\Bin\WLKeeper.exe"
Detected:61, recognized as trusted 43
Module nameHandleDescriptionCopyrightMD5Used by processes
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\0e4a2cdb\001b4b6f_571fcb01\mbSystemManager.DLL
Script: Quarantine, Delete, BC delete
17170432SystemManagerCopyright © 2007--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\1087cab2\0091e9f5_0a3acb01\MBProcFeeData.DLL
Script: Quarantine, Delete, BC delete
119209984MBProcFeeDataCopyright © 2009--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\14981b07\002fd8c3_0a3acb01\MBEventLogManager.DLL
Script: Quarantine, Delete, BC delete
113311744EventLogManagerCopyright © 2007--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\1a6e6ad9\0048a0eb_f45fcb01\MBDocumentManager.DLL
Script: Quarantine, Delete, BC delete
114753536MBDocumentManagerCopyright © 2009--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\1a9d2087\004ee984_1075cb01\MBLenderManager.DLL
Script: Quarantine, Delete, BC delete
114098176MBLenderManagerCopyright © 2008--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\21540dac\00791824_17accb01\MBScheme.DLL
Script: Quarantine, Delete, BC delete
116129792MBSchemeCopyright © 2008--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\29e0446b\00e5d320_0b3acb01\MBLenderPanelManager.DLL
Script: Quarantine, Delete, BC delete
114032640MBLenderPanelManagerCopyright © 2008--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\2a53c4a8\0094dbe6_f45fcb01\MBClientManager.DLL
Script: Quarantine, Delete, BC delete
112852992mbClientManager© Mortgage Brain Ltd. All rights reserved--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\3d264949\00f1c3cf_0a3acb01\MBCompanyData.DLL
Script: Quarantine, Delete, BC delete
118358016MBCompanyDataCopyright © 2008--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\4d71d4fe\00ee196e_571fcb01\mbHost.DLL
Script: Quarantine, Delete, BC delete
112656384mbHostCopyright © 20010--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\5105ae54\00790998_0b3acb01\mbIntegrationData.DLL
Script: Quarantine, Delete, BC delete
121831424mbIntegrationData© Mortgage Brain Ltd. All rights reserved--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\52053979\000287c5_7b59cb01\MBKFIData.DLL
Script: Quarantine, Delete, BC delete
118554624MBKFIDataCopyright © 2009--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\638a1b1b\002960ec_0a3acb01\MBLenderPanelData.DLL
Script: Quarantine, Delete, BC delete
119078912MBLenderPanelDataCopyright © 2010--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\6d6eb4e6\004d5d2a_0b3acb01\MBQuickCalculatorManager.DLL
Script: Quarantine, Delete, BC delete
122028032QuickCalculatorManagerCopyright © 2009--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\78139e24\002fdf8a_1075cb01\mbMTEForms.DLL
Script: Quarantine, Delete, BC delete
114229248mbMTEFormsCopyright © 2009--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\81fe7b6c\008145ca_b276cb01\MBCompanyManager.DLL
Script: Quarantine, Delete, BC delete
115015680MBCompanyManager© Mortgage Brain Ltd. All rights reserved--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\a7d2e126\00d575c1_0a3acb01\mbGeneric.DLL
Script: Quarantine, Delete, BC delete
54001664mbGenericCopyright © 2007--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\a94a4ec5\005671f0_7b59cb01\MBSettingsManager.DLL
Script: Quarantine, Delete, BC delete
119668736MBSettingsManagerCopyright © 2009--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\c7e46120\00a202ee_f45fcb01\MBKFIManager.DLL
Script: Quarantine, Delete, BC delete
115539968MBKFIManagerCopyright © 2009--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\cea5eacc\00120522_0b3acb01\MBProcFeeManager.DLL
Script: Quarantine, Delete, BC delete
114360320MBProcFeeManagerCopyright © 2009--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\dd6bfbf5\007f6c69_1ea1cb01\MBAuditManager.DLL
Script: Quarantine, Delete, BC delete
114622464MBAuditManager© Mortgage Brain Ltd. All rights reserved--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\de46c531\003ddfcd_7b59cb01\MBSettingsData.DLL
Script: Quarantine, Delete, BC delete
119537664MBSettingsDataCopyright © 2009--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\f8553d7a\005316f0_6fa0cb01\mbIntegration.DLL
Script: Quarantine, Delete, BC delete
121438208mbIntegration© Mortgage Brain Ltd. All rights reserved--2040
C:\Documents and Settings\NetworkService\Local Settings\Application Data\assembly\dl3\Y1M0X5PK.LRL\JT1B59VE.JDJ\fb87e9e7\00ad4c0b_aa97cb01\MBSchemeManager.DLL
Script: Quarantine, Delete, BC delete
122421248MBSchemeManagerCopyright © 2009--2040
C:\MBL\System\MBLAPPS.DLL
Script: Quarantine, Delete, BC delete
130220032ActiveX DllMortgage Brain Ltd (2007)--2040
C:\Program Files\Common Files\Motive\McciContextDetectorEmail_DSR.dll
Script: Quarantine, Delete, BC delete
1660944384mcci+McciContextDetectorEmailCopyright ª 1999-2009, Alcatel-Lucent--5208
C:\Program Files\Common Files\Motive\McciContextDetectorWin32_DSR.dll
Script: Quarantine, Delete, BC delete
17891328mcci+McciContextDetectorWin32Copyright ª 1999-2009, Alcatel-Lucent--5208
C:\Program Files\Common Files\Motive\McciContextX.dll
Script: Quarantine, Delete, BC delete
1650458624mcci+McciContextXCopyright ª 1999-2009, Alcatel-Lucent--5208
C:\Program Files\Wave Systems Corp\Services Manager\DocMgr\bin\ContextMenuItem.dll
Script: Quarantine, Delete, BC delete
20119552ContextMenuItem ModuleCopyright 2002--5528
C:\Program Files\Wave Systems Corp\Services Manager\DocMgr\bin\VaultServer.dll
Script: Quarantine, Delete, BC delete
20316160VaultServer Dynamic Link LibraryCopyright (C) 2004--5528
C:\Program Files\Wave Systems Corp\Services Manager\DocMgr\bin\WxEtsEula.dll
Script: Quarantine, Delete, BC delete
20971520WxEtsEula DLLCopyright (C) 2004--5528
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\359fd69eb60e9844ffd497e92345178c\Microsoft.VisualBasic.ni.dll
Script: Quarantine, Delete, BC delete
1581449216Visual Basic Runtime Library© Microsoft Corporation. All rights reserved.--2040
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\System.Drawing\d86f2038209a4cf0d0f5b30f6375c9b2\System.Drawing.ni.dll
Script: Quarantine, Delete, BC delete
2061369344.NET Framework© Microsoft Corporation. All rights reserved.--4888
C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\01abbadafaf265d9f4ac9bbb247acb98\System.Windows.Forms.ni.dll
Script: Quarantine, Delete, BC delete
2063400960.NET Framework© Microsoft Corporation. All rights reserved.--4888
C:\WINDOWS\system32\biolsp.dll
Script: Quarantine, Delete, BC delete
10027008BioLsp Dynamic Link LibraryCopyright © 2005 Wave Systems Corp.--556
C:\WINDOWS\system32\detoured.dll
Script: Quarantine, Delete, BC delete
20905984  --5528
C:\WINDOWS\system32\tcg15.dll
Script: Quarantine, Delete, BC delete
268435456tcgdll Dynamic Link LibraryCopyright © 2004 Wave Systems Corp.--1076
C:\WINDOWS\system32\wclient14.dll
Script: Quarantine, Delete, BC delete
3735552Wave Client Class LibraryCopyright © 2004 Wave Systems Corp.--1076
C:\WINDOWS\system32\wvauth.dll
Script: Quarantine, Delete, BC delete
268435456Authentication PackageCopyright © 2005 Wave Systems Corp.--556
C:\WINDOWS\system32\wxvault.dll
Script: Quarantine, Delete, BC delete
27262976wxvault Dynamic Link LibraryCopyright (C) 2004--5528
Modules detected:655, recognized as trusted 615

Kernel Space Modules Viewer

ModuleBase addressSize in memoryDescriptionManufacturer
C:\DOCUME~1\richards\LOCALS~1\Temp\catchme.sys
Script: Quarantine, Delete, BC delete
F7964000008000 (32768)
C:\WINDOWS\system32\Drivers\CVPNDRVA.sys
Script: Quarantine, Delete, BC delete
A980000007B000 (503808)Cisco Systems VPN Client IPSec DriverCopyright © 1998-2003 Cisco Systems, Inc.
C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Script: Quarantine, Delete, BC delete
F7AA6000002000 (8192)
C:\WINDOWS\system32\Drivers\PROCEXP113.SYS
Script: Quarantine, Delete, BC delete
F7AF2000002000 (8192)
spgg.sys
Script: Quarantine, Delete, BC delete
F7383000100000 (1048576)
Modules detected - 155, recognized as trusted - 150

Services

ServiceDescriptionStatusFileGroupDependencies
ACDaemon
Service: Stop, Delete, Disable, BC delete
ArcSoft Connect DaemonRunningC:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe
Script: Quarantine, Delete, BC delete
  
CVPND
Service: Stop, Delete, Disable, BC delete
Cisco Systems, Inc. VPN ServiceRunningC:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
Script: Quarantine, Delete, BC delete
 Tcpip
DataSvr2
Service: Stop, Delete, Disable, BC delete
DataSvr2RunningC:\Program Files\Wave Systems Corp\Common\DataServer.exe
Script: Quarantine, Delete, BC delete
 RPCSS
EvtEng
Service: Stop, Delete, Disable, BC delete
Intel(R) PROSet/Wireless Event LogRunningC:\Program Files\Intel\Wireless\Bin\EvtEng.exe
Script: Quarantine, Delete, BC delete
 RPCSS
MBServiceHost
Service: Stop, Delete, Disable, BC delete
MB Service HostRunningC:\MBL\MBrain\Software\Mortgage Brain Framework 1.0\bin\mbServiceHost.exe
Script: Quarantine, Delete, BC delete
  
McciCMService
Service: Stop, Delete, Disable, BC delete
McciCMServiceRunningC:\Program Files\Common Files\Motive\McciCMService.exe
Script: Quarantine, Delete, BC delete
 RPCSS
MSSQL$ETI
Service: Stop, Delete, Disable, BC delete
SQL Server (ETI)RunningC:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe
Script: Quarantine, Delete, BC delete
  
MSSQL$OTP
Service: Stop, Delete, Disable, BC delete
MSSQL$OTPRunningC:\Program Files\Microsoft SQL Server\MSSQL$OTP\Binn\sqlservr.exe
Script: Quarantine, Delete, BC delete
  
MSSQLSERVER
Service: Stop, Delete, Disable, BC delete
MSSQLSERVERRunningC:\Program Files\Microsoft SQL Server\MSSQL\Binn\sqlservr.exe
Script: Quarantine, Delete, BC delete
  
NICCONFIGSVC
Service: Stop, Delete, Disable, BC delete
NICCONFIGSVCRunningC:\Program Files\Dell\QuickSet\NICCONFIGSVC.exe
Script: Quarantine, Delete, BC delete
  
NVSvc
Service: Stop, Delete, Disable, BC delete
NVIDIA Display Driver ServiceRunningC:\WINDOWS\system32\nvsvc32.exe
Script: Quarantine, Delete, BC delete
  
RegSrvc
Service: Stop, Delete, Disable, BC delete
Intel(R) PROSet/Wireless Registry ServiceRunningC:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
Script: Quarantine, Delete, BC delete
 RPCSS
S24EventMonitor
Service: Stop, Delete, Disable, BC delete
Intel(R) PROSet/Wireless ServiceRunningC:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
Script: Quarantine, Delete, BC delete
PNP_TDIs24trans
SQLBrowser
Service: Stop, Delete, Disable, BC delete
SQL Server BrowserRunningC:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe
Script: Quarantine, Delete, BC delete
  
SQLWriter
Service: Stop, Delete, Disable, BC delete
SQL Server VSS WriterRunningC:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
Script: Quarantine, Delete, BC delete
  
VMCService
Service: Stop, Delete, Disable, BC delete
Vodafone Mobile Connect ServiceRunningC:\Program Files\Vodafone\Vodafone Mobile Connect\Bin\VMCService.exe
Script: Quarantine, Delete, BC delete
 winmgmt
WLANKEEPER
Service: Stop, Delete, Disable, BC delete
Intel(R) PROSet/Wireless SSO ServiceRunningC:\Program Files\Intel\Wireless\Bin\WLKeeper.exe
Script: Quarantine, Delete, BC delete
PNP_TDIS24EventMonitor
Canon Driver Information Assist Service
Service: Stop, Delete, Disable, BC delete
Canon Driver Information Assist ServiceNot startedC:\Program Files\Canon\DIAS\CnxDIAS.exe
Script: Quarantine, Delete, BC delete
 Spooler
MSCamSvc
Service: Stop, Delete, Disable, BC delete
MSCamSvcNot startedC:\Program Files\Microsoft LifeCam\MSCamS32.exe
Script: Quarantine, Delete, BC delete
 RPCSS
tcsd_win32.exe
Service: Stop, Delete, Disable, BC delete
NTRU Hybrid TSS v2.0.7 TCSNot startedC:\Program Files\NTRU Cryptosystems\NTRU Hybrid TSS v2.0.7\bin\tcsd_win32.exe
Script: Quarantine, Delete, BC delete
  
Detected - 154, recognized as trusted - 134

Drivers

ServiceDescriptionStatusFileGroupDependencies
catchme
Driver: Unload, Delete, Disable, BC delete
catchmeRunningC:\DOCUME~1\richards\LOCALS~1\Temp\catchme.sys
Script: Quarantine, Delete, BC delete
Base 
CVPNDRVA
Driver: Unload, Delete, Disable, BC delete
Cisco Systems IPsec DriverRunningC:\WINDOWS\system32\Drivers\CVPNDRVA.sys
Script: Quarantine, Delete, BC delete
 DNE
sptd
Driver: Unload, Delete, Disable, BC delete
sptdRunningC:\WINDOWS\System32\Drivers\sptd.sys
Script: Quarantine, Delete, BC delete
Boot Bus Extender 
Abiosdsk
Driver: Unload, Delete, Disable, BC delete
AbiosdskNot startedAbiosdsk.sys
Script: Quarantine, Delete, BC delete
Primary disk 
Atdisk
Driver: Unload, Delete, Disable, BC delete
AtdiskNot startedAtdisk.sys
Script: Quarantine, Delete, BC delete
Primary disk 
Changer
Driver: Unload, Delete, Disable, BC delete
ChangerNot startedChanger.sys
Script: Quarantine, Delete, BC delete
Filter 
lbrtfdc
Driver: Unload, Delete, Disable, BC delete
lbrtfdcNot startedlbrtfdc.sys
Script: Quarantine, Delete, BC delete
System Bus Extender 
MREMPR5
Driver: Unload, Delete, Disable, BC delete
MREMPR5 NDIS Protocol DriverNot startedC:\PROGRA~1\COMMON~1\Motive\MREMPR5.SYS
Script: Quarantine, Delete, BC delete
PNP_TDI 
MRENDIS5
Driver: Unload, Delete, Disable, BC delete
MRENDIS5 NDIS Protocol DriverNot startedC:\PROGRA~1\COMMON~1\Motive\MRENDIS5.SYS
Script: Quarantine, Delete, BC delete
PNP_TDI 
NokiaSuite3
Driver: Unload, Delete, Disable, BC delete
NokiaSuite3Not startedC:\WINDOWS\system32\Drivers\NokiaSuite3.sys
Script: Quarantine, Delete, BC delete
Extended base 
PCIDump
Driver: Unload, Delete, Disable, BC delete
PCIDumpNot startedPCIDump.sys
Script: Quarantine, Delete, BC delete
PCI Configuration 
PDCOMP
Driver: Unload, Delete, Disable, BC delete
PDCOMPNot startedPDCOMP.sys
Script: Quarantine, Delete, BC delete
  
PDFRAME
Driver: Unload, Delete, Disable, BC delete
PDFRAMENot startedPDFRAME.sys
Script: Quarantine, Delete, BC delete
  
PDRELI
Driver: Unload, Delete, Disable, BC delete
PDRELINot startedPDRELI.sys
Script: Quarantine, Delete, BC delete
  
PDRFRAME
Driver: Unload, Delete, Disable, BC delete
PDRFRAMENot startedPDRFRAME.sys
Script: Quarantine, Delete, BC delete
  
Simbad
Driver: Unload, Delete, Disable, BC delete
SimbadNot startedSimbad.sys
Script: Quarantine, Delete, BC delete
Filter 
tfju17xkb.sys
Driver: Unload, Delete, Disable, BC delete
tfju17xkb.sysNot startedC:\WINDOWS\system32\drivers\tfju17xkb.sys
Script: Quarantine, Delete, BC delete
  
WDICA
Driver: Unload, Delete, Disable, BC delete
WDICANot startedWDICA.sys
Script: Quarantine, Delete, BC delete
  
Detected - 246, recognized as trusted - 228

Autoruns

File nameStatusStartup methodDescription
C:\Documents and Settings\richards\Local Settings\temp\_uninst_44341505.bat
Script: Quarantine, Delete, BC delete
ActiveShortcut in Autoruns folderC:\Documents and Settings\richards\Start Menu\Programs\Startup\, C:\Documents and Settings\richards\Start Menu\Programs\Startup\_uninst_44341505.lnk,
C:\Documents and Settings\richards\My Documents\Develop Database\client 2011.mdb
Script: Quarantine, Delete, BC delete
ActiveShortcut in Autoruns folderC:\Documents and Settings\richards\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\richards\Application Data\Microsoft\Internet Explorer\Quick Launch\Client new.mdb.lnk,
C:\Program Files\Abbey\Introducer Internet Offline\MSSQL$ABBEYIIOFFLINE\Binn\SQLAGENT.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\SQLAgent$ABBEYIIOFFLINE, EventMessageFile
C:\Program Files\BT Business Broadband Desktop Help\btbb\BTHelpNotifier.exe
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, btbb_McciTrayApp
Delete
C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\CVPND, EventMessageFile
C:\Program Files\Common Files\McAfee\SystemCore\
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\cfwids.sys, EventMessageFile
C:\Program Files\Common Files\McAfee\SystemCore\
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\mfeapfk.sys, EventMessageFile
C:\Program Files\Common Files\McAfee\SystemCore\
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\mfeavfk.sys, EventMessageFile
C:\Program Files\Common Files\McAfee\SystemCore\
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\mfebopk.sys, EventMessageFile
C:\Program Files\Common Files\McAfee\SystemCore\
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\mfefirek.sys, EventMessageFile
C:\Program Files\Common Files\McAfee\SystemCore\
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\mfendisk.sys, EventMessageFile
C:\Program Files\Common Files\McAfee\SystemCore\
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\mferkdet.sys, EventMessageFile
C:\Program Files\Intel\Wireless\Bin\WLKeeper.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\WLANKEEPER, EventMessageFile
C:\Program Files\Iomega\Iomegaware\IMGMENU.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved, {c7745760-8ead-11ce-b750-02608ca5202c}
Delete
C:\Program Files\Iomega\Iomegaware\Imgprop.Dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved, {c7745761-8ead-11ce-b750-02608ca5202c}
Delete
C:\Program Files\Windows Media Player\WMPNetwk.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\WMPNetworkSvc, EventMessageFile
C:\WINDOWS\System32\Drivers\NokiaSuite3.sys
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\Ncds, EventMessageFile
C:\WINDOWS\System32\Drivers\lbrtfdc.sys
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\lbrtfdc, EventMessageFile
C:\WINDOWS\System32\PrintFilterPipelineSvc.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\PrintFilterPipelineSvc, EventMessageFile
C:\WINDOWS\System32\hidserv.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\HidServ\Parameters, ServiceDll
Delete
C:\WINDOWS\System32\igmpv2.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IGMPv2, EventMessageFile
C:\WINDOWS\System32\ipbootp.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IPBOOTP, EventMessageFile
C:\WINDOWS\System32\iprip2.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IPRIP2, EventMessageFile
C:\WINDOWS\System32\ospf.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\OSPF, EventMessageFile
C:\WINDOWS\System32\ospfmib.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\OSPFMib, EventMessageFile
C:\WINDOWS\System32\polagent.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\PolicyAgent, EventMessageFile
C:\WINDOWS\System32\tssdis.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\TermServSessDir, EventMessageFile
C:\WINDOWS\system32\AegisE5.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\AegisP, EventMessageFile
C:\WINDOWS\system32\EventLogger.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\FocusErrorSubsystem, EventMessageFile
C:\WINDOWS\system32\KB905474\wgasetup.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\WgaSetup, EventMessageFile
C:\WINDOWS\system32\MsSip1.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 1, $DLL
Delete
C:\WINDOWS\system32\MsSip2.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 2, $DLL
Delete
C:\WINDOWS\system32\MsSip3.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 3, $DLL
Delete
C:\WINDOWS\system32\ZipToA.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\ZipToA, EventMessageFile
C:\WINDOWS\system32\psxss.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Session Manager\SubSystems, Posix
C:\WINDOWS\system32\stisvc.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System, EventMessageFile
C:\WINDOWS\system32\tcgcsp.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SOFTWARE\Microsoft\Cryptography\Defaults\Provider\Wave TCG Enabled CSP, Image Path
Delete
C:\WINDOWS\system32\tcgcsp.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SOFTWARE\Microsoft\Cryptography\Defaults\Provider\Wave TCG Enabled SChannel CSP, Image Path
Delete
C:\WINDOWS\system32\twext.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved, {596AB062-B4D2-4215-9F74-E9109B0A8153}
Delete
C:\WINDOWS\system32\twext.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved, {9DB7A13C-F208-4981-8353-73CC61AE2783}
Delete
C:\WINDOWS\system32\wvauth.dll
Script: Quarantine, Delete, BC delete
--?HKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Lsa, Authentication Packages
SDEvents.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Spybot - Search & Destroy 2, EventMessageFile
\\Servant\Private\LFSSYSTEM\AutoFEUpdaterV2.13\StartMDB.exe
Script: Quarantine, Delete, BC delete
ActiveShortcut in Autoruns folderC:\Documents and Settings\richards\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\richards\Application Data\Microsoft\Internet Explorer\Quick Launch\LFSSystem.lnk,
c:\Program Files\Halifax GI - Intermediaries\Halifax GI - Intermediaries.exe
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, Halifax GI - Intermediaries
Delete
mvfs32.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_USERS, .DEFAULT\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_USERS, S-1-5-19\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_USERS, S-1-5-20\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_USERS, S-1-5-18\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_USERS, S-1-5-21-3533930121-66260186-3188412238-1135\Control Panel\IOProcs, MVB
Delete
vgafix.fon
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fixedfon.fon
Delete
vgaoem.fon
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, oemfonts.fon
Delete
vgasys.fon
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fonts.fon
Delete
Autoruns items detected - 990, recognized as trusted - 938

Microsoft Internet Explorer extension modules (BHOs, Toolbars ...)

File nameTypeDescriptionManufacturerCLSID
c:\progra~1\mcafee\msk\mskapbho.dll
Script: Quarantine, Delete, BC delete
BHO{27B4851A-3207-45A2-B947-BE8AFE6163AB}
Delete
Elements detected - 13, recognized as trusted - 12

Windows Explorer extension modules

File nameDestinationDescriptionManufacturerCLSID
Display Panning CPL Extension{42071714-76d4-11d1-8b24-00a0c9068ff3}
Delete
Shell extensions for file compression{764BF0E1-F219-11ce-972D-00AA00A14F56}
Delete
Encryption Context Menu{853FE2B1-B769-11d0-9C4E-00C04FB6C6FA}
Delete
Taskbar and Start Menu{0DF44EAA-FF21-4412-828E-260A8728E7F1}
Delete
C:\WINDOWS\system32\twext.dll
Script: Quarantine, Delete, BC delete
Previous Versions Property Page{596AB062-B4D2-4215-9F74-E9109B0A8153}
Delete
C:\WINDOWS\system32\twext.dll
Script: Quarantine, Delete, BC delete
Previous Versions{9DB7A13C-F208-4981-8353-73CC61AE2783}
Delete
User Accounts{7A9D77BD-5403-11d2-8785-2E0420524153}
Delete
C:\Program Files\Iomega\Iomegaware\IMGMENU.dll
Script: Quarantine, Delete, BC delete
IomegaWare for Windows NTIMGMENUCopyright © 1999 Iomega Corporation All language version{c7745760-8ead-11ce-b750-02608ca5202c}
Delete
C:\Program Files\Iomega\Iomegaware\Imgprop.Dll
Script: Quarantine, Delete, BC delete
IomegaWare for Windows NTIMGPROPCopyright © 1999 Iomega Corporation, All language version{c7745761-8ead-11ce-b750-02608ca5202c}
Delete
Microsoft Browser Architecture{BC476F4C-D9D7-4100-8D4E-E043F6DEC409}
Delete
IE User Assist{FAC3CBF6-8697-43d0-BAB9-DCD1FCE19D75}
Delete
Elements detected - 222, recognized as trusted - 211

Printing system extensions (print monitors, providers)

File nameTypeNameDescriptionManufacturer
Elements detected - 17, recognized as trusted - 17

Task Scheduler jobs

File nameJob nameJob statusDescriptionManufacturer
Elements detected - 6, recognized as trusted - 6

SPI/LSP settings

Namespace providers (NSP)
ProviderStatusEXE fileDescriptionGUID
Detected - 6, recognized as trusted - 6
Transport protocol providers (TSP, LSP)
ProviderEXE fileDescription
Detected - 54, recognized as trusted - 54
Results of automatic SPI settings check
LSP settings checked. No errors detected

TCP/UDP ports

PortStatusRemote HostRemote PortApplicationNotes
TCP ports
7LISTENING0.0.0.024738[2580] c:\windows\system32\tcpsvcs.exe
Script: Quarantine, Delete, BC delete, Terminate
 
9LISTENING0.0.0.024712[2580] c:\windows\system32\tcpsvcs.exe
Script: Quarantine, Delete, BC delete, Terminate
 
13LISTENING0.0.0.037024[2580] c:\windows\system32\tcpsvcs.exe
Script: Quarantine, Delete, BC delete, Terminate
 
17LISTENING0.0.0.022572[2580] c:\windows\system32\tcpsvcs.exe
Script: Quarantine, Delete, BC delete, Terminate
 
19LISTENING0.0.0.024678[2580] c:\windows\system32\tcpsvcs.exe
Script: Quarantine, Delete, BC delete, Terminate
 
135LISTENING0.0.0.049171[860] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
139LISTENING0.0.0.039118[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
445LISTENING0.0.0.06396[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
1028ESTABLISHED127.0.0.15354[1824] c:\program files\common files\apple\mobile device support\applemobiledeviceservice.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1036LISTENING0.0.0.04266[3872] c:\windows\system32\mqsvc.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1041LISTENING0.0.0.02096[2496] c:\windows\system32\alg.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1801LISTENING0.0.0.04330[3872] c:\windows\system32\mqsvc.exe
Script: Quarantine, Delete, BC delete, Terminate
 
2103LISTENING0.0.0.032797[3872] c:\windows\system32\mqsvc.exe
Script: Quarantine, Delete, BC delete, Terminate
 
2105LISTENING0.0.0.049238[3872] c:\windows\system32\mqsvc.exe
Script: Quarantine, Delete, BC delete, Terminate
 
2107LISTENING0.0.0.06227[3872] c:\windows\system32\mqsvc.exe
Script: Quarantine, Delete, BC delete, Terminate
 
3390LISTENING0.0.0.038974[1036] c:\program files\microsoft sql server\mssql$otp\binn\sqlservr.exe
Script: Quarantine, Delete, BC delete, Terminate
 
3969TIME_WAIT192.168.1.656646[0]   
3986TIME_WAIT192.168.1.656646[0]   
5354ESTABLISHED127.0.0.11028[1844] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5354LISTENING0.0.0.06197[1844] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, BC delete, Terminate
 
6646LISTENING0.0.0.02272[252] c:\program files\common files\mcafee\mcsvchost\mcsvhost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
8001LISTENING0.0.0.039070[2040] c:\mbl\mbrain\software\mortgage brain framework 1.0\bin\mbservicehost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
8090LISTENING0.0.0.02128[2040] c:\mbl\mbrain\software\mortgage brain framework 1.0\bin\mbservicehost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
27015LISTENING0.0.0.037011[1824] c:\program files\common files\apple\mobile device support\applemobiledeviceservice.exe
Script: Quarantine, Delete, BC delete, Terminate
 
UDP ports
7LISTENING----[2580] c:\windows\system32\tcpsvcs.exe
Script: Quarantine, Delete, BC delete, Terminate
 
9LISTENING----[2580] c:\windows\system32\tcpsvcs.exe
Script: Quarantine, Delete, BC delete, Terminate
 
13LISTENING----[2580] c:\windows\system32\tcpsvcs.exe
Script: Quarantine, Delete, BC delete, Terminate
 
17LISTENING----[2580] c:\windows\system32\tcpsvcs.exe
Script: Quarantine, Delete, BC delete, Terminate
 
19LISTENING----[2580] c:\windows\system32\tcpsvcs.exe
Script: Quarantine, Delete, BC delete, Terminate
 
137LISTENING----[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
138LISTENING----[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
161LISTENING----[2752] c:\windows\system32\snmp.exe
Script: Quarantine, Delete, BC delete, Terminate
 
445LISTENING----[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
500LISTENING----[556] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1025LISTENING----[1824] c:\program files\common files\apple\mobile device support\applemobiledeviceservice.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1026LISTENING----[1824] c:\program files\common files\apple\mobile device support\applemobiledeviceservice.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1027LISTENING----[1844] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1035LISTENING----[3872] c:\windows\system32\mqsvc.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1434LISTENING----[2776] c:\program files\microsoft sql server\90\shared\sqlbrowser.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1900LISTENING----[1672] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1900LISTENING----[1672] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
2348LISTENING----[5664] c:\program files\internet explorer\iexplore.exe
Script: Quarantine, Delete, BC delete, Terminate
 
3527LISTENING----[3872] c:\windows\system32\mqsvc.exe
Script: Quarantine, Delete, BC delete, Terminate
 
4500LISTENING----[556] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5353LISTENING----[1844] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, BC delete, Terminate
 
6646LISTENING----[252] c:\program files\common files\mcafee\mcsvchost\mcsvhost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
62515LISTENING----[920] c:\program files\cisco systems\vpn client\cvpnd.exe
Script: Quarantine, Delete, BC delete, Terminate
 
62517LISTENING----[920] c:\program files\cisco systems\vpn client\cvpnd.exe
Script: Quarantine, Delete, BC delete, Terminate
 
62519LISTENING----[920] c:\program files\cisco systems\vpn client\cvpnd.exe
Script: Quarantine, Delete, BC delete, Terminate
 
62521LISTENING----[920] c:\program files\cisco systems\vpn client\cvpnd.exe
Script: Quarantine, Delete, BC delete, Terminate
 
62523LISTENING----[920] c:\program files\cisco systems\vpn client\cvpnd.exe
Script: Quarantine, Delete, BC delete, Terminate
 
62524LISTENING----[920] c:\program files\cisco systems\vpn client\cvpnd.exe
Script: Quarantine, Delete, BC delete, Terminate
 

Downloaded Program Files (DPF)

File nameDescriptionManufacturerCLSIDSource URL
{8FFBE65D-2C9C-4669-84BD-5829DC0B603C}
Delete
Elements detected - 1, recognized as trusted - 0

Control Panel Applets (CPL)

File nameDescriptionManufacturer
Elements detected - 32, recognized as trusted - 32

Active Setup

File nameDescriptionManufacturerCLSID
Elements detected - 16, recognized as trusted - 16

HOSTS file

Hosts file record
127.0.0.1       localhost
Clear Hosts file

Protocols and handlers

File nameTypeDescriptionManufacturerCLSID
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
Elements detected - 37, recognized as trusted - 34

Suspicious objects

FileDescriptionType
C:\WINDOWS\system32\DRIVERS\0077467drv.sys
Script: Quarantine, Delete, BC delete
Suspicion for RootkitKernel-mode hook
mfehidk.sys
Script: Quarantine, Delete, BC delete
Suspicion for RootkitKernel-mode hook
\SystemRoot\system32\DRIVERS\0077467drv.sys
Script: Quarantine, Delete, BC delete
Suspicion for RootkitKernel-mode hook


Main script of analysis
Windows version: Microsoft Windows XP, Build=2600, SP="Service Pack 3"
System Restore: enabled
1.1 Searching for user-mode API hooks
 Analysis: kernel32.dll, export table found in section .text
IAT modification detected: CreateProcessA - 00B00010<>7C80236B
IAT modification detected: GetModuleFileNameA - 00B00080<>7C80B56F
IAT modification detected: FreeLibrary - 00B000F0<>7C80AC7E
IAT modification detected: GetModuleFileNameW - 00B00160<>7C80B475
IAT modification detected: CreateProcessW - 00B001D0<>7C802336
IAT modification detected: LoadLibraryW - 00B002B0<>7C80AEEB
IAT modification detected: LoadLibraryA - 00B00320<>7C801D7B
IAT modification detected: GetProcAddress - 00B00390<>7C80AE40
 Analysis: ntdll.dll, export table found in section .text
 Analysis: user32.dll, export table found in section .text
 Analysis: advapi32.dll, export table found in section .text
 Analysis: ws2_32.dll, export table found in section .text
 Analysis: wininet.dll, export table found in section .text
 Analysis: rasapi32.dll, export table found in section .text
 Analysis: urlmon.dll, export table found in section .text
 Analysis: netapi32.dll, export table found in section .text
1.2 Searching for kernel-mode API hooks
 Driver loaded successfully
 SDT found (RVA=085700)
 Kernel ntkrnlpa.exe found in memory at address 804D7000
   SDT = 8055C700
   KiST = 80504494 (284)
Function NtAdjustPrivilegesToken (0B) intercepted (805EC336->A5B57690), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtClose (19) intercepted (805BC538->A5B57F94), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtConnectPort (1F) intercepted (805A45D8->A5B58DC8), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateEvent (23) intercepted (8060EE4C->A5B59312), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateFile (25) intercepted (805790A2->A5B58270), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateKey (29) intercepted (80623FD6->A5B56500), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateMutant (2B) intercepted (8061758E->A5B591F8), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateNamedPipeFile (2C) intercepted (805790DC->A5B5727E), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreatePort (2E) intercepted (805A50F4->A5B590CC), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateSection (32) intercepted (805AB3D0->A5B57426), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateSemaphore (33) intercepted (80614F4C->A5B59432), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateThread (35) intercepted (805D1038->A5B57C1C), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateWaitablePort (38) intercepted (805A5118->A5B59162), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtDebugActiveProcess (39) intercepted (80643A1C->A5B5AB1A), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtDeleteKey (3F) intercepted (80624472->A5B56B0A), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtDeleteKey (3F) - machine code modification Method of JmpTo. jmp F724F2BEmfehidk.sys, driver recognized as trusted
>>> Function restored successfully !
Function NtDeleteValueKey (41) intercepted (80624642->A5B56EBE), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtDeleteValueKey (41) - machine code modification Method of JmpTo. jmp F724F2EAmfehidk.sys, driver recognized as trusted
>>> Function restored successfully !
Function NtDeviceIoControlFile (42) intercepted (80579268->A5B586F2), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtDuplicateObject (44) intercepted (805BE010->A5B5BD26), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtEnumerateKey (47) intercepted (80624822->A5B5700A), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtEnumerateValueKey (49) intercepted (80624A8C->A5B570A2), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtFsControlFile (54) intercepted (8057929C->A5B58500), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtLoadDriver (61) intercepted (80584172->A5B5AC0C), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtLoadKey (62) intercepted (806261FA->A5B564DC), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtLoadKey2 (63) intercepted (80625E06->A5B564EE), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtMapViewOfSection (6C) intercepted (805B2042->A5B5B374), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtMapViewOfSection (6C) - machine code modification Method of JmpTo. jmp F724F340mfehidk.sys, driver recognized as trusted
>>> Function restored successfully !
Function NtNotifyChangeKey (6F) intercepted (806261C4->A5B571CE), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenEvent (72) intercepted (8060EF4C->A5B593A8), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenFile (74) intercepted (8057A1A0->A5B58016), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenKey (77) intercepted (806253B4->A5B566C0), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenMutant (78) intercepted (80617666->A5B59288), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenProcess (7A) intercepted (805CB456->A5B578CC), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenProcess (7A) - machine code modification Method of JmpTo. jmp F724F268mfehidk.sys, driver recognized as trusted
>>> Function restored successfully !
Function NtOpenSection (7D) intercepted (805AA3F4->A5B5B10E), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenSemaphore (7E) intercepted (80615046->A5B594C8), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenThread (80) intercepted (805CB6E2->A5B577BE), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenThread (80) - machine code modification Method of JmpTo. jmp F724F27Cmfehidk.sys, driver recognized as trusted
>>> Function restored successfully !
Function NtQueryKey (A0) intercepted (806256F6->A5B5713A), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtQueryMultipleValueKey (A1) intercepted (80623124->A5B56D72), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtQuerySection (A7) intercepted (805B85E8->A5B5B6AE), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtQueryValueKey (B1) intercepted (806221FA->A5B5699C), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtQueueApcThread (B4) intercepted (805D2756->A5B5AFA0), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtRenameKey (C0) intercepted (806239F8->A5B56C2C), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtRenameKey (C0) - machine code modification Method of JmpTo. jmp F724F2D4mfehidk.sys, driver recognized as trusted
>>> Function restored successfully !
Function NtReplaceKey (C1) intercepted (806260AA->A5B55F16), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtReplyPort (C2) intercepted (805A54F4->A5B5982C), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtReplyWaitReceivePort (C3) intercepted (805A64BC->A5B596F2), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtRequestWaitReplyPort (C8) intercepted (805A2D7E->A5B5A8B4), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtRestoreKey (CC) intercepted (806259B6->A5B5628E), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtResumeThread (CE) intercepted (805D4A18->A5B5BBC8), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSaveKey (CF) intercepted (80625AB2->A5B55EAE), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSecureConnectPort (D2) intercepted (805A3D6C->A5B58B0E), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetContextThread (D5) intercepted (805D2C1A->A5B57E38), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetInformationToken (E6) intercepted (805FA686->A5B5A154), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetSecurityObject (ED) intercepted (805C0636->A5B5ADAA), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetSecurityObject (ED) - machine code modification Method of JmpTo. jmp F724F316mfehidk.sys, driver recognized as trusted
>>> Function restored successfully !
Function NtSetSystemInformation (F0) intercepted (8060FC04->A5B5B7FE), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetValueKey (F7) intercepted (80622548->A5B56816), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSuspendProcess (FD) intercepted (805D4AE0->A5B5B8F0), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSuspendThread (FE) intercepted (805D4952->A5B5BA2A), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSystemDebugControl (FF) intercepted (80617FAA->A5B5AA3E), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtTerminateProcess (101) intercepted (805D22D8->A5B57A68), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtTerminateProcess (101) - machine code modification Method of JmpTo. jmp F724F36Amfehidk.sys, driver recognized as trusted
>>> Function restored successfully !
Function NtTerminateThread (102) intercepted (805D24D2->A5B579C8), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtUnmapViewOfSection (10B) intercepted (805B2E50->A5B5B552), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtUnmapViewOfSection (10B) - machine code modification Method of JmpTo. jmp F724F356mfehidk.sys, driver recognized as trusted
>>> Function restored successfully !
Function NtWriteVirtualMemory (115) intercepted (805B43D4->A5B57B52), hook C:\WINDOWS\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtYieldExecution (116) - machine code modification Method of JmpTo. jmp F724F32Amfehidk.sys, driver recognized as trusted
>>> Function restored successfully !
Function FsRtlCheckLockForReadAccess (804EAF84) - machine code modification Method of JmpTo. jmp A5B49FD0 \SystemRoot\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
Function IoIsOperationSynchronous (804EF92C) - machine code modification Method of JmpTo. jmp A5B4A3AC \SystemRoot\system32\DRIVERS\0077467drv.sys, driver recognized as trusted
>>> Function restored successfully !
Functions checked: 284, intercepted: 60, restored: 72
1.3 Checking IDT and SYSENTER
 Analysis for CPU 1
 Analysis for CPU 2
CmpCallCallBacks = 00093D84
Disable callback OK
 Checking IDT and SYSENTER - complete
1.4 Searching for masking processes and drivers
 Checking not performed: extended monitoring driver (AVZPM) is not installed
1.5 Checking of IRP handlers
 Driver loaded successfully
\FileSystem\ntfs[IRP_MJ_CREATE] = 87D631F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_CLOSE] = 87D631F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_WRITE] = 87D631F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_INFORMATION] = 87D631F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_INFORMATION] = 87D631F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_EA] = 87D631F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_EA] = 87D631F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_VOLUME_INFORMATION] = 87D631F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_VOLUME_INFORMATION] = 87D631F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_DIRECTORY_CONTROL] = 87D631F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_FILE_SYSTEM_CONTROL] = 87D631F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_DEVICE_CONTROL] = 87D631F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_LOCK_CONTROL] = 87D631F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_SECURITY] = 87D631F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_SECURITY] = 87D631F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_PNP] = 87D631F8 -> hook not defined
 Checking - complete
>> Services: potentially dangerous service allowed: RemoteRegistry (Remote Registry)
>> Services: potentially dangerous service allowed: TermService (Terminal Services)
>> Services: potentially dangerous service allowed: SSDPSRV (SSDP Discovery Service)
>> Services: potentially dangerous service allowed: TlntSvr (Telnet)
>> Services: potentially dangerous service allowed: Schedule (Task Scheduler)
>> Services: potentially dangerous service allowed: mnmsrvc (NetMeeting Remote Desktop Sharing)
>> Services: potentially dangerous service allowed: RDSessMgr (Remote Desktop Help Session Manager)
> Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)!
>> Security: disk drives' autorun is enabled
>> Security: administrative shares (C$, D$ ...) are enabled
>> Security: anonymous user access is enabled
 >>  Disable HDD autorun
 >>  Disable autorun from network drives
 >>  Disable CD/DVD autorun
 >>  Disable removable media autorun
 >>  [?? - AVZ1789]
System Analysis in progress

System Analysis - complete
Script commands
Add commands to script:
Additional operations:
File list