Results of system analysis

AVZ 4.32 http://z-oleg.com/secur/avz/

Process List

File namePIDDescriptionCopyrightMD5Information
c:\windows\system32\algv.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1092  ??1252.00 kb, rSAH,
created: 22.2.2010 15:06:52,
modified: 12.7.2009 7:56:24
Command line:
algv.exe
c:\program files\eset\eset smart security\egui.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1844ESET GUICopyright (c) ESET 1992-2009. All rights reserved.??2006.21 kb, rsAh,
created: 16.11.2009 9:03:32,
modified: 16.11.2009 9:03:32
Command line:
"C:\Program Files\ESET\ESET Smart Security\egui.exe" /hide /waitservice
c:\program files\eset\eset smart security\ekrn.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1692ESET ServiceCopyright (c) ESET 1992-2009. All rights reserved.??718.71 kb, rsAh,
created: 16.11.2009 9:04:30,
modified: 16.11.2009 9:04:30
Command line:
"C:\Program Files\ESET\ESET Smart Security\ekrn.exe"
c:\windows\explorer.exe
Script: Quarantine, Delete, Delete via BC, Terminate
884Průzkumník Windows© Microsoft Corporation. Všechna práva vyhrazena.??1009.50 kb, rsAh,
created: 2.3.2006 13:00:00,
modified: 13.6.2007 14:23:39
Command line:
C:\WINDOWS\Explorer.EXE
c:\program files\internet explorer\iexplore.exe
Script: Quarantine, Delete, Delete via BC, Terminate
2704Internet Explorer© Microsoft Corporation. All rights reserved.??619.77 kb, rsAh,
created: 31.3.2008 6:13:10,
modified: 18.12.2009 14:05:43
Command line:
"C:\Program Files\Internet Explorer\iexplore.exe"
c:\program files\logmein\x86\lmiguardian.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1796LMIGuardianCopyright © 1998-2009 LogMeIn, Inc. All rights reserved.??369.31 kb, rsAh,
created: 7.7.2008 8:17:17,
modified: 5.10.2009 6:09:21
Command line:
"C:\Program Files\LogMeIn\x86\LMIGuardian" /ESCORT 1776
c:\program files\logmein\x86\logmein.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1776LogMeInCopyright © 2003-2007 LogMeIn, Inc. US patents pending.??61.56 kb, rsAh,
created: 3.8.2007 14:09:34,
modified: 3.8.2007 14:09:34
Command line:
"C:\Program Files\LogMeIn\x86\LogMeIn.exe"
c:\program files\logmein\x86\ramaint.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1732LogMeIn Maintenance ServiceCopyright © 2003-2009 LogMeIn, Inc. Patented and patents pending.??113.31 kb, rsAh,
created: 15.11.2007 17:46:14,
modified: 5.10.2009 6:10:05
Command line:
"C:\Program Files\LogMeIn\x86\RaMaint.exe"
c:\windows\system32\spoolsv.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1580Spooler SubSystem App© Microsoft Corporation. All rights reserved.??56.50 kb, rsAh,
created: 2.3.2006 13:00:00,
modified: 11.6.2005 0:53:32
Command line:
C:\WINDOWS\system32\spoolsv.exe
c:\windows\system32\winlogon.exe
Script: Quarantine, Delete, Delete via BC, Terminate
924Windows NT Logon Application© Microsoft Corporation. Všechna práva vyhrazena.??490.50 kb, rsAh,
created: 2.3.2006 13:00:00,
modified: 2.3.2006 13:00:00
Command line:
winlogon.exe
Detected:27, recognized as trusted 22
Module nameHandleDescriptionCopyrightMD5Used by processes
C:\Program Files\ESET\ESET Smart Security\egui.exe
Script: Quarantine, Delete, Delete via BC
4194304ESET GUICopyright (c) ESET 1992-2009. All rights reserved.??1844
C:\Program Files\ESET\ESET Smart Security\eguiAmon.dll
Script: Quarantine, Delete, Delete via BC
557842432ESET Amon GUICopyright (c) ESET 1992-2009. All rights reserved.--1844
C:\Program Files\ESET\ESET Smart Security\eguiDmon.dll
Script: Quarantine, Delete, Delete via BC
589299712ESET Document Scanner GUICopyright (c) ESET 1992-2009. All rights reserved.--1844
C:\Program Files\ESET\ESET Smart Security\eguiEmon.dll
Script: Quarantine, Delete, Delete via BC
559939584ESET Emon GUICopyright (c) ESET 1992-2009. All rights reserved.--1844
C:\Program Files\ESET\ESET Smart Security\eguiEpfw.dll
Script: Quarantine, Delete, Delete via BC
541065216ESET Personal Firewall UICopyright (c) ESET 1992-2009. All rights reserved.--1844
C:\Program Files\ESET\ESET Smart Security\eguiMailPlugins.dll
Script: Quarantine, Delete, Delete via BC
581959680ESET MailPlugins GUICopyright (c) ESET 1992-2009. All rights reserved.--1844
C:\Program Files\ESET\ESET Smart Security\eguiScan.dll
Script: Quarantine, Delete, Delete via BC
566231040ESET On-demmand Scanner GUICopyright (c) ESET 1992-2009. All rights reserved.--1844
C:\Program Files\ESET\ESET Smart Security\eguiSmon.dll
Script: Quarantine, Delete, Delete via BC
545259520ESET Antispam GUICopyright (c) ESET 1992-2009. All rights reserved.--1844
C:\Program Files\ESET\ESET Smart Security\eguiUpdate.dll
Script: Quarantine, Delete, Delete via BC
555745280ESET Update GUICopyright (c) ESET 1992-2009. All rights reserved.--1844
C:\Program Files\ESET\ESET Smart Security\ekrn.exe
Script: Quarantine, Delete, Delete via BC
4194304ESET ServiceCopyright (c) ESET 1992-2009. All rights reserved.??1692
C:\Program Files\ESET\ESET Smart Security\ekrnAmon.dll
Script: Quarantine, Delete, Delete via BC
556793856ESET Amon ServiceCopyright (c) ESET 1992-2009. All rights reserved.--1692
C:\Program Files\ESET\ESET Smart Security\ekrnDmon.dll
Script: Quarantine, Delete, Delete via BC
591396864ESET Document Scanner KernelCopyright (c) ESET 1992-2009. All rights reserved.--1692
C:\Program Files\ESET\ESET Smart Security\ekrnEmon.dll
Script: Quarantine, Delete, Delete via BC
51380224ESET Emon ServiceCopyright (c) ESET 1992-2009. All rights reserved.--1692
C:\Program Files\ESET\ESET Smart Security\ekrnEpfw.dll
Script: Quarantine, Delete, Delete via BC
540016640ESET Personal Firewall serviceCopyright (c) ESET 1992-2009. All rights reserved.--1692
C:\Program Files\ESET\ESET Smart Security\ekrnMailPlugins.dll
Script: Quarantine, Delete, Delete via BC
579862528ESET MailPlugins ServiceCopyright (c) ESET 1992-2009. All rights reserved.--1692
C:\Program Files\ESET\ESET Smart Security\ekrnScan.dll
Script: Quarantine, Delete, Delete via BC
568328192ESET On-demmand Scanner KernelCopyright (c) ESET 1992-2009. All rights reserved.--1692
C:\Program Files\ESET\ESET Smart Security\ekrnSmon.dll
Script: Quarantine, Delete, Delete via BC
543162368ESET Antispam ServiceCopyright (c) ESET 1992-2009. All rights reserved.--1692
C:\Program Files\ESET\ESET Smart Security\ekrnUpdate.dll
Script: Quarantine, Delete, Delete via BC
554696704ESET Update ServiceCopyright (c) ESET 1992-2009. All rights reserved.--1692
C:\Program Files\ESET\ESET Smart Security\MFC80U.DLL
Script: Quarantine, Delete, Delete via BC
2016280576MFCDLL Shared Library - Retail Version© Microsoft Corporation. All rights reserved.--1844
C:\Program Files\ESET\ESET Smart Security\shellExt.dll
Script: Quarantine, Delete, Delete via BC
570425344Shell ExtensionCopyright (c) ESET 1992-2009. All rights reserved.--884
C:\Program Files\ESET\ESET Smart Security\updater.dll
Script: Quarantine, Delete, Delete via BC
553648128ESET Update EngineCopyright (c) ESET 1992-2009. All rights reserved.--1692
C:\Program Files\LogMeIn\x86\ICSAgent32.dll
Script: Quarantine, Delete, Delete via BC
23855104Intel® Connect Service Agent LibraryCopyright © 1998-2009 LogMeIn, Inc. All rights reserved.--1776
C:\Program Files\LogMeIn\x86\LMIGuardian.exe
Script: Quarantine, Delete, Delete via BC
4194304LMIGuardianCopyright © 1998-2009 LogMeIn, Inc. All rights reserved.??1796
C:\Program Files\LogMeIn\x86\LMIGuardianDll.dll
Script: Quarantine, Delete, Delete via BC
268435456LMIGuardianDllCopyright © 1998-2009 LogMeIn, Inc. All rights reserved.--1796
C:\Program Files\LogMeIn\x86\LogMeIn.dll
Script: Quarantine, Delete, Delete via BC
268435456LogMeInCopyright © 2003-2009 LogMeIn, Inc. Patented and patents pending.--1776
C:\Program Files\LogMeIn\x86\RaMaint.exe
Script: Quarantine, Delete, Delete via BC
4194304LogMeIn Maintenance ServiceCopyright © 2003-2009 LogMeIn, Inc. Patented and patents pending.??1732
C:\WINDOWS\system32\algv.exe
Script: Quarantine, Delete, Delete via BC
268435456  ??1092
C:\WINDOWS\system32\LMIinit.dll
Script: Quarantine, Delete, Delete via BC
268435456LogMeIn Remote Control HelperCopyright © 2003-2009 LogMeIn, Inc. Patented and patents pending.--924
C:\WINDOWS\system32\LMIport.dll
Script: Quarantine, Delete, Delete via BC
1346371584RemotelyAnywhere Printer Port MonitorCopyright © 1998-2008 LogMeIn, Inc. All rights reserved.--1580
C:\WINDOWS\system32\LMIRfsClientNP.dll
Script: Quarantine, Delete, Delete via BC
268435456LogMeIn Rfs Client Network ProviderCopyright © 2003-2009 LogMeIn, Inc. Patented and patents pending.--884, 2704, 924
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\acpdf300.dll
Script: Quarantine, Delete, Delete via BC
131399680Amyuni Document ConverterCopyright © 1999-2008, AMYUNI Technologies--2704
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\acpdfui300.dll
Script: Quarantine, Delete, Delete via BC
1787822080Amyuni Document Converter User InterfaceCopyright © 1999-2008, AMYUNI Technologies--2704
C:\WINDOWS\System32\spool\PRTPROCS\W32X86\LMIproc.dll
Script: Quarantine, Delete, Delete via BC
1787822080RemotelyAnywhere Print ProcessorCopyright © 1998-2008 LogMeIn, Inc. All rights reserved.--1580
Modules found:324, recognized as trusted 291

Kernel Space Modules Viewer

ModuleBase addressSize in memoryDescriptionManufacturer
C:\WINDOWS\System32\Drivers\dump_atapi.sys
Script: Quarantine, Delete, Delete via BC
AA51B000018000 (98304)
C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Script: Quarantine, Delete, Delete via BC
F8992000002000 (8192)
C:\WINDOWS\system32\DRIVERS\eamon.sys
Script: Quarantine, Delete, Delete via BC
AA30F0000CC000 (835584)Amon monitorCopyright (c) ESET 1992-2009. All rights reserved.
C:\WINDOWS\system32\DRIVERS\ehdrv.sys
Script: Quarantine, Delete, Delete via BC
AA8F500001D000 (118784)ESET Helper driverCopyright (c) ESET 1992-2009. All rights reserved.
C:\WINDOWS\system32\DRIVERS\epfwtdi.sys
Script: Quarantine, Delete, Delete via BC
AA638000013000 (77824)ESET Personal Firewall TDI filterCopyright (c) ESET 1992-2009. All rights reserved.
Modules found - 117, recognized as trusted - 112

Services

ServiceDescriptionStatusFileGroupDependencies
ekrn
Service: Stop, Delete, Disable
ESET ServiceRunningC:\Program Files\ESET\ESET Smart Security\ekrn.exe
Script: Quarantine, Delete, Delete via BC
  
LMIMaint
Service: Stop, Delete, Disable
LogMeIn Maintenance ServiceRunningC:\Program Files\LogMeIn\x86\RaMaint.exe
Script: Quarantine, Delete, Delete via BC
  
EhttpSrv
Service: Stop, Delete, Disable
ESET HTTP ServerNot startedC:\Program Files\ESET\ESET Smart Security\EHttpSrv.exe
Script: Quarantine, Delete, Delete via BC
  
Detected - 89, recognized as trusted - 86

Drivers

ServiceDescriptionStatusFileGroupDependencies
eamon
Driver: Unload, Delete, Disable
eamonRunningC:\WINDOWS\system32\DRIVERS\eamon.sys
Script: Quarantine, Delete, Delete via BC
FSFilter Anti-Virus 
ehdrv
Driver: Unload, Delete, Disable
ehdrvRunningC:\WINDOWS\system32\DRIVERS\ehdrv.sys
Script: Quarantine, Delete, Delete via BC
Base 
epfwtdi
Driver: Unload, Delete, Disable
epfwtdiRunningC:\WINDOWS\system32\DRIVERS\epfwtdi.sys
Script: Quarantine, Delete, Delete via BC
PNP_TDI 
Abiosdsk
Driver: Unload, Delete, Disable
AbiosdskNot startedAbiosdsk.sys
Script: Quarantine, Delete, Delete via BC
Primary disk 
abp480n5
Driver: Unload, Delete, Disable
abp480n5Not startedabp480n5.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
adpu160m
Driver: Unload, Delete, Disable
adpu160mNot startedadpu160m.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Aha154x
Driver: Unload, Delete, Disable
Aha154xNot startedAha154x.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
aic78u2
Driver: Unload, Delete, Disable
aic78u2Not startedaic78u2.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
aic78xx
Driver: Unload, Delete, Disable
aic78xxNot startedaic78xx.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
AliIde
Driver: Unload, Delete, Disable
AliIdeNot startedAliIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
amsint
Driver: Unload, Delete, Disable
amsintNot startedamsint.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
asc
Driver: Unload, Delete, Disable
ascNot startedasc.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
asc3350p
Driver: Unload, Delete, Disable
asc3350pNot startedasc3350p.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
asc3550
Driver: Unload, Delete, Disable
asc3550Not startedasc3550.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Atdisk
Driver: Unload, Delete, Disable
AtdiskNot startedAtdisk.sys
Script: Quarantine, Delete, Delete via BC
Primary disk 
cd20xrnt
Driver: Unload, Delete, Disable
cd20xrntNot startedcd20xrnt.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Changer
Driver: Unload, Delete, Disable
ChangerNot startedChanger.sys
Script: Quarantine, Delete, Delete via BC
Filter 
CmdIde
Driver: Unload, Delete, Disable
CmdIdeNot startedCmdIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
Cpqarray
Driver: Unload, Delete, Disable
CpqarrayNot startedCpqarray.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
dac960nt
Driver: Unload, Delete, Disable
dac960ntNot starteddac960nt.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
dpti2o
Driver: Unload, Delete, Disable
dpti2oNot starteddpti2o.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
hpn
Driver: Unload, Delete, Disable
hpnNot startedhpn.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
i2omgmt
Driver: Unload, Delete, Disable
i2omgmtNot startedi2omgmt.sys
Script: Quarantine, Delete, Delete via BC
SCSI Class 
i2omp
Driver: Unload, Delete, Disable
i2ompNot startedi2omp.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ini910u
Driver: Unload, Delete, Disable
ini910uNot startedini910u.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
IntelIde
Driver: Unload, Delete, Disable
IntelIdeNot startedIntelIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
lbrtfdc
Driver: Unload, Delete, Disable
lbrtfdcNot startedlbrtfdc.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
LMIRfsClientNP
Driver: Unload, Delete, Disable
LMIRfsClientNPNot startedLMIRfsClientNP.sys
Script: Quarantine, Delete, Delete via BC
NetworkProvider 
mraid35x
Driver: Unload, Delete, Disable
mraid35xNot startedmraid35x.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
PCIDump
Driver: Unload, Delete, Disable
PCIDumpNot startedPCIDump.sys
Script: Quarantine, Delete, Delete via BC
PCI Configuration 
PDCOMP
Driver: Unload, Delete, Disable
PDCOMPNot startedPDCOMP.sys
Script: Quarantine, Delete, Delete via BC
  
PDFRAME
Driver: Unload, Delete, Disable
PDFRAMENot startedPDFRAME.sys
Script: Quarantine, Delete, Delete via BC
  
PDRELI
Driver: Unload, Delete, Disable
PDRELINot startedPDRELI.sys
Script: Quarantine, Delete, Delete via BC
  
PDRFRAME
Driver: Unload, Delete, Disable
PDRFRAMENot startedPDRFRAME.sys
Script: Quarantine, Delete, Delete via BC
  
perc2
Driver: Unload, Delete, Disable
perc2Not startedperc2.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
perc2hib
Driver: Unload, Delete, Disable
perc2hibNot startedperc2hib.sys
Script: Quarantine, Delete, Delete via BC
Filter 
ql1080
Driver: Unload, Delete, Disable
ql1080Not startedql1080.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Ql10wnt
Driver: Unload, Delete, Disable
Ql10wntNot startedQl10wnt.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ql12160
Driver: Unload, Delete, Disable
ql12160Not startedql12160.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ql1240
Driver: Unload, Delete, Disable
ql1240Not startedql1240.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ql1280
Driver: Unload, Delete, Disable
ql1280Not startedql1280.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Simbad
Driver: Unload, Delete, Disable
SimbadNot startedSimbad.sys
Script: Quarantine, Delete, Delete via BC
Filter 
Sparrow
Driver: Unload, Delete, Disable
SparrowNot startedSparrow.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
SSPORT
Driver: Unload, Delete, Disable
SSPORTNot startedC:\WINDOWS\system32\Drivers\SSPORT.sys
Script: Quarantine, Delete, Delete via BC
  
sym_hi
Driver: Unload, Delete, Disable
sym_hiNot startedsym_hi.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
sym_u3
Driver: Unload, Delete, Disable
sym_u3Not startedsym_u3.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
symc810
Driver: Unload, Delete, Disable
symc810Not startedsymc810.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
symc8xx
Driver: Unload, Delete, Disable
symc8xxNot startedsymc8xx.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
TosIde
Driver: Unload, Delete, Disable
TosIdeNot startedTosIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
ultra
Driver: Unload, Delete, Disable
ultraNot startedultra.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ViaIde
Driver: Unload, Delete, Disable
ViaIdeNot startedViaIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
WDICA
Driver: Unload, Delete, Disable
WDICANot startedWDICA.sys
Script: Quarantine, Delete, Delete via BC
  
Detected - 172, recognized as trusted - 120

Autoruns

File nameStatusStartup methodDescription
C:\PROGRA~1\MICROS~2\Office12\1029\MAPIR.DLL
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Outlook, EventMessageFile
Delete
C:\Program Files\ESET\ESET Smart Security\egui.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, egui
Delete
C:\Program Files\LogMeIn\x86\rahook.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\LogMeIn, EventMessageFile
Delete
C:\Program Files\Nero\Nero 7\Nero Toolkit\NeroBurnRights.cpl
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SOFTWARE\Microsoft\Windows\CurrentVersion\Control Panel\Cpls, Nero BurnRights
Delete
C:\WINDOWS\System32\PrintFilterPipelineSvc.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\PrintFilterPipelineSvc, EventMessageFile
Delete
C:\WINDOWS\System32\appmgmts.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\AppMgmt\Parameters, ServiceDll
Delete
C:\WINDOWS\System32\appmgmts.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Application Management, EventMessageFile
Delete
C:\WINDOWS\System32\appmgr.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Software Installation, EventMessageFile
Delete
C:\WINDOWS\System32\fdeploy.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\File Deployment, EventMessageFile
Delete
C:\WINDOWS\System32\fdeploy.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Folder Redirection, EventMessageFile
Delete
C:\WINDOWS\System32\igmpv2.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IGMPv2, EventMessageFile
Delete
C:\WINDOWS\System32\ipbootp.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IPBOOTP, EventMessageFile
Delete
C:\WINDOWS\System32\iprip2.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IPRIP2, EventMessageFile
Delete
C:\WINDOWS\System32\ntbackup.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\ntbackup, EventMessageFile
Delete
C:\WINDOWS\System32\ospf.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\OSPF, EventMessageFile
Delete
C:\WINDOWS\System32\ospfmib.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\OSPFMib, EventMessageFile
Delete
C:\WINDOWS\System32\polagent.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\PolicyAgent, EventMessageFile
Delete
C:\WINDOWS\System32\spmsg.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\Internet Explorer 7 Disk, EventMessageFile
Delete
C:\WINDOWS\System32\spmsg.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\NtServicePack, EventMessageFile
Delete
C:\WINDOWS\System32\spmsg.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\WGA, EventMessageFile
Delete
C:\WINDOWS\System32\spmsg.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\Windows Installer 3.1, EventMessageFile
Delete
C:\WINDOWS\System32\spmsg.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\WindowsMedia, EventMessageFile
Delete
C:\WINDOWS\System32\tssdis.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\TermServSessDir, EventMessageFile
Delete
C:\WINDOWS\system32\MsSip1.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 1, $DLL
Delete
C:\WINDOWS\system32\MsSip2.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 2, $DLL
Delete
C:\WINDOWS\system32\MsSip3.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 3, $DLL
Delete
C:\WINDOWS\system32\algv.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, algv.exe
Delete
C:\WINDOWS\system32\algv.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, x.exe
Delete
C:\WINDOWS\system32\asr_fmt.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\Asr\Commands, ASR format utility for volumes
Delete
C:\WINDOWS\system32\asr_ldm.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\Asr\Commands, ASR utility for Logical Disk Manager
Delete
C:\WINDOWS\system32\asr_pfu.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\Asr\Commands, ASR protected file utility
Delete
C:\WINDOWS\system32\msvbvm60.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\VBRuntime, EventMessageFile
Delete
C:\WINDOWS\system32\psxss.exe
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Session Manager\SubSystems, Posix
C:\WINDOWS\system32\stisvc.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System, EventMessageFile
Delete
LMIRfsClientNP.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\LMIRfsClientNP\NetworkProvider, ProviderPath
Delete
LMIinit.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\LMIinit, DLLName
Delete
appmgmts.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions\{c6dc5466-785a-11d2-84d0-00c04fb169f7}, DLLName
Delete
kbd101.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\i8042prt\Parameters, LayerDriver JPN
Delete
kbd101a.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\i8042prt\Parameters, LayerDriver KOR
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, .DEFAULT\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, S-1-5-19\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, S-1-5-20\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, S-1-5-18\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_CURRENT_USER, Control Panel\IOProcs, MVB
Delete
vgafix.fon
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fixedfon.fon
Delete
vgaoem.fon
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, oemfonts.fon
Delete
vgasys.fon
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fonts.fon
Delete
Autoruns items found - 530, recognized as trusted - 483

Internet Explorer extension modules (BHOs, Toolbars ...)

File nameTypeDescriptionManufacturerCLSID
Items found - 2, recognized as trusted - 2

Windows Explorer extension modules

File nameDestinationDescriptionManufacturerCLSID
deskpan.dll
Script: Quarantine, Delete, Delete via BC
Rozšíření panelu Zobrazení pro panoramatické zobrazení{42071714-76d4-11d1-8b24-00a0c9068ff3}
Delete
Rozšíření prostředí pro kompresi souborů{764BF0E1-F219-11ce-972D-00AA00A14F56}
Delete
Kontextová nabídka šifrování{853FE2B1-B769-11d0-9C4E-00C04FB6C6FA}
Delete
Hlavní panel a nabídka Start{0DF44EAA-FF21-4412-828E-260A8728E7F1}
Delete
rundll32.exe C:\WINDOWS\system32\shimgvw.dll,ImageView_COMServer {00E7B358-F65B-4dcf-83DF-CD026B94BFD4}
Script: Quarantine, Delete, Delete via BC
Autoplay for SlideShow{00E7B358-F65B-4dcf-83DF-CD026B94BFD4}
Delete
Uživatelské účty{7A9D77BD-5403-11d2-8785-2E0420524153}
Delete
C:\Program Files\ESET\ESET Smart Security\shellExt.dll
Script: Quarantine, Delete, Delete via BC
ESET Smart Security - Context Menu Shell ExtensionShell ExtensionCopyright (c) ESET 1992-2009. All rights reserved.{B089FE88-FB52-11D3-BDF1-0050DA34150D}
Delete
Items found - 208, recognized as trusted - 201

Printing system extensions (print monitors, providers)

File nameTypeNameDescriptionManufacturer
C:\WINDOWS\system32\LMIport.dll
Script: Quarantine, Delete, Delete via BC
MonitorLogMeIn Printer Port MonitorRemotelyAnywhere Printer Port MonitorCopyright © 1998-2008 LogMeIn, Inc. All rights reserved.
Items found - 9, recognized as trusted - 8

Task Scheduler jobs

File nameJob nameJob stateDescriptionManufacturer
Items found - 0, recognized as trusted - 0

SPI/LSP settings

Namespace providers (NSP)
ManufacturerStatusEXE fileDescriptionGUID
Detected - 3, recognized as trusted - 3
Transport protocol providers (TSP, LSP)
ManufacturerEXE fileDescription
Detected - 11, recognized as trusted - 11
Results of automatic SPI settings check
LSP settings checked. No errors detected

TCP/UDP ports

PortStatusRemote HostRemote PortApplicationNotes
TCP ports
135LISTENING0.0.0.02080[1220] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
139LISTENING0.0.0.036888[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
445LISTENING0.0.0.047175[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
1028LISTENING0.0.0.055496[636] c:\windows\system32\alg.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1066ESTABLISHED127.0.0.130606[1776] c:\program files\logmein\x86\logmein.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1067ESTABLISHED77.242.193.141443[1692] c:\program files\eset\eset smart security\ekrn.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1602ESTABLISHED93.184.71.1080[1692] c:\program files\eset\eset smart security\ekrn.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1623ESTABLISHED127.0.0.130606[1092] c:\windows\system32\algv.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1624SYN_SENT127.0.0.180[1692] c:\program files\eset\eset smart security\ekrn.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
2002LISTENING0.0.0.039166[1776] c:\program files\logmein\x86\logmein.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
30606TIME_WAIT127.0.0.11402[0]   
30606TIME_WAIT127.0.0.11404[0]   
30606TIME_WAIT127.0.0.11406[0]   
30606TIME_WAIT127.0.0.11408[0]   
30606TIME_WAIT127.0.0.11410[0]   
30606TIME_WAIT127.0.0.11412[0]   
30606TIME_WAIT127.0.0.11416[0]   
30606TIME_WAIT127.0.0.11418[0]   
30606TIME_WAIT127.0.0.11420[0]   
30606TIME_WAIT127.0.0.11422[0]   
30606TIME_WAIT127.0.0.11434[0]   
30606TIME_WAIT127.0.0.11436[0]   
30606TIME_WAIT127.0.0.11438[0]   
30606TIME_WAIT127.0.0.11440[0]   
30606TIME_WAIT127.0.0.11442[0]   
30606TIME_WAIT127.0.0.11444[0]   
30606TIME_WAIT127.0.0.11448[0]   
30606TIME_WAIT127.0.0.11450[0]   
30606TIME_WAIT127.0.0.11452[0]   
30606TIME_WAIT127.0.0.11454[0]   
30606TIME_WAIT127.0.0.11464[0]   
30606TIME_WAIT127.0.0.11466[0]   
30606TIME_WAIT127.0.0.11468[0]   
30606TIME_WAIT127.0.0.11470[0]   
30606TIME_WAIT127.0.0.11472[0]   
30606TIME_WAIT127.0.0.11474[0]   
30606TIME_WAIT127.0.0.11476[0]   
30606TIME_WAIT127.0.0.11480[0]   
30606TIME_WAIT127.0.0.11482[0]   
30606TIME_WAIT127.0.0.11484[0]   
30606TIME_WAIT127.0.0.11486[0]   
30606TIME_WAIT127.0.0.11496[0]   
30606TIME_WAIT127.0.0.11498[0]   
30606TIME_WAIT127.0.0.11500[0]   
30606TIME_WAIT127.0.0.11502[0]   
30606TIME_WAIT127.0.0.11504[0]   
30606TIME_WAIT127.0.0.11506[0]   
30606TIME_WAIT127.0.0.11508[0]   
30606TIME_WAIT127.0.0.11512[0]   
30606TIME_WAIT127.0.0.11514[0]   
30606TIME_WAIT127.0.0.11516[0]   
30606TIME_WAIT127.0.0.11518[0]   
30606TIME_WAIT127.0.0.11528[0]   
30606TIME_WAIT127.0.0.11530[0]   
30606TIME_WAIT127.0.0.11532[0]   
30606TIME_WAIT127.0.0.11534[0]   
30606TIME_WAIT127.0.0.11536[0]   
30606TIME_WAIT127.0.0.11538[0]   
30606TIME_WAIT127.0.0.11540[0]   
30606TIME_WAIT127.0.0.11544[0]   
30606TIME_WAIT127.0.0.11546[0]   
30606TIME_WAIT127.0.0.11548[0]   
30606TIME_WAIT127.0.0.11550[0]   
30606TIME_WAIT127.0.0.11560[0]   
30606TIME_WAIT127.0.0.11562[0]   
30606TIME_WAIT127.0.0.11564[0]   
30606TIME_WAIT127.0.0.11566[0]   
30606TIME_WAIT127.0.0.11568[0]   
30606TIME_WAIT127.0.0.11570[0]   
30606TIME_WAIT127.0.0.11572[0]   
30606TIME_WAIT127.0.0.11576[0]   
30606TIME_WAIT127.0.0.11578[0]   
30606TIME_WAIT127.0.0.11580[0]   
30606TIME_WAIT127.0.0.11582[0]   
30606TIME_WAIT127.0.0.11592[0]   
30606TIME_WAIT127.0.0.11594[0]   
30606TIME_WAIT127.0.0.11596[0]   
30606TIME_WAIT127.0.0.11598[0]   
30606TIME_WAIT127.0.0.11600[0]   
30606TIME_WAIT127.0.0.11603[0]   
30606TIME_WAIT127.0.0.11605[0]   
30606TIME_WAIT127.0.0.11609[0]   
30606TIME_WAIT127.0.0.11611[0]   
30606TIME_WAIT127.0.0.11613[0]   
30606TIME_WAIT127.0.0.11615[0]   
30606ESTABLISHED127.0.0.11623[1692] c:\program files\eset\eset smart security\ekrn.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
30606LISTENING0.0.0.043257[1692] c:\program files\eset\eset smart security\ekrn.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
30606ESTABLISHED127.0.0.11066[1692] c:\program files\eset\eset smart security\ekrn.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
30606TIME_WAIT127.0.0.11400[0]   
UDP ports
123LISTENING----[1260] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
123LISTENING----[1260] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
137LISTENING----[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
138LISTENING----[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
445LISTENING----[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
500LISTENING----[980] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1900LISTENING----[1412] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1900LISTENING----[1412] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
3092LISTENING----[2704] c:\program files\internet explorer\iexplore.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
4500LISTENING----[980] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 

Downloaded Program Files (DPF)

File nameDescriptionManufacturerCLSIDSource URL
Items found - 1, recognized as trusted - 1

Control Panel Applets (CPL)

File nameDescriptionManufacturer
Items found - 26, recognized as trusted - 26

Active Setup

File nameDescriptionManufacturerCLSID
Items found - 15, recognized as trusted - 15

HOSTS file

Hosts file record

127.0.0.1       localhost

Protocols and handlers

File nameTypeDescriptionManufacturerCLSID
mscoree.dll
Script: Quarantine, Delete, Delete via BC
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
mscoree.dll
Script: Quarantine, Delete, Delete via BC
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
mscoree.dll
Script: Quarantine, Delete, Delete via BC
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Items found - 30, recognized as trusted - 27

Suspicious objects

FileDescriptionType


Attention !!! Database was last updated 21.8.2009 it is necessary to update the database (via File - Database update)
AVZ Antiviral Toolkit log; AVZ version is 4.32
Scanning started at 5.3.2010 12:24:04
Database loaded: signatures - 237871, NN profile(s) - 2, malware removal microprograms - 56, signature database released 21.08.2009 14:23
Heuristic microprograms loaded: 374
PVS microprograms loaded: 9
Digital signatures of system files loaded: 135524
Heuristic analyzer mode: Maximum heuristics mode
Malware removal mode: disabled
Windows version is: 5.1.2600, Service Pack 2 ; AVZ is run with administrator rights
System Restore: enabled
1. Searching for Rootkits and other software intercepting API functions
1.1 Searching for user-mode API hooks
 Analysis: kernel32.dll, export table found in section .text
 Analysis: ntdll.dll, export table found in section .text
 Analysis: user32.dll, export table found in section .text
 Analysis: advapi32.dll, export table found in section .text
 Analysis: ws2_32.dll, export table found in section .text
 Analysis: wininet.dll, export table found in section .text
 Analysis: rasapi32.dll, export table found in section .text
 Analysis: urlmon.dll, export table found in section .text
 Analysis: netapi32.dll, export table found in section .text
1.2 Searching for kernel-mode API hooks
 Driver loaded successfully
 SDT found (RVA=07B400)
 Kernel ntkrnlpa.exe found in memory at address 804D7000
   SDT = 80552400
   KiST = 80501224 (284)
Function NtOpenProcess (7A) intercepted (805BFEAC->817BFCB0), hook not defined
Function NtOpenThread (80) intercepted (805C0138->817C00D0), hook not defined
Function NtSuspendProcess (FD) intercepted (805C98BA->817C06D0), hook not defined
Function NtSuspendThread (FE) intercepted (805C972C->817C04F0), hook not defined
Function NtTerminateProcess (101) intercepted (805C77FA->817BFEE0), hook not defined
Function NtTerminateThread (102) intercepted (805C79F4->817C0310), hook not defined
Functions checked: 284, intercepted: 6, restored: 0
1.3 Checking IDT and SYSENTER
 Analyzing CPU 1
 Checking IDT and SYSENTER - complete
1.4 Searching for masking processes and drivers
 Checking not performed: extended monitoring driver (AVZPM) is not installed
 Driver loaded successfully
1.5 Checking IRP handlers
 Checking - complete
2. Scanning RAM
 Number of processes found: 26
Extended process analysis: 1692 C:\Program Files\ESET\ESET Smart Security\ekrn.exe
[ES]:Program code includes networking-related functionality
[ES]:Capable of sending mail ?!
[ES]:Listens on TCP ports !
[ES]:Listens on HTTP ports !
[ES]:Application has no visible windows
[ES]:Loads RASAPI DLL - may use dialing ?
Extended process analysis: 1732 C:\Program Files\LogMeIn\x86\RaMaint.exe
[ES]:Program code includes networking-related functionality
[ES]:Application has no visible windows
Extended process analysis: 1796 C:\Program Files\LogMeIn\x86\LMIGuardian.exe
[ES]:Program code includes networking-related functionality
[ES]:Application has no visible windows
 Number of modules loaded: 306
Scanning RAM - complete
3. Scanning disks
4. Checking  Winsock Layered Service Provider (SPI/LSP)
 LSP settings checked. No errors detected
5. Searching for keyboard/mouse/windows events hooks (Keyloggers, Trojan DLLs)
6. Searching for opened TCP/UDP ports used by malicious software
 Checking - disabled by user
7. Heuristic system check
non-standard Winlogon\Shell key, hidden startup suspected "explorer.exe,algv.exe"
Checking - complete
8. Searching for vulnerabilities
>> Services: potentially dangerous service allowed: TermService (Termin?lov? slu?ba)
>> Services: potentially dangerous service allowed: SSDPSRV (Slu?ba rozpozn?v?n? pomoc? protokolu SSDP)
>> Services: potentially dangerous service allowed: Schedule (Pl?nova? ?loh)
>> Services: potentially dangerous service allowed: mnmsrvc (NetMeeting - Vzd?len? sd?len? plochy)
>> Services: potentially dangerous service allowed: RDSessMgr (Spr?vce relac? n?pov?dy ke vzd?len? plo?e)
> Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)!
>> Security: disk drives' autorun is enabled
>> Security: administrative shares (C$, D$ ...) are enabled
>> Security: anonymous user access is enabled
>> Security: sending Remote Assistant queries is enabled
Checking - complete
9. Troubleshooting wizard
 >>  Windows Explorer startup key is modified
 >>  HDD autorun is allowed
 >>  Network drives autorun is allowed
 >>  Removable media autorun is allowed
Checking - complete
Files scanned: 333, extracted from archives: 0, malicious software found 0, suspicions - 0
Scanning finished at 5.3.2010 12:24:40
Time of scanning: 00:00:38
If you have a suspicion on presence of viruses or questions on the suspected objects,
you can address http://virusinfo.info conference
System Analysis in progress

Script commands
Add commands to script:
Additional operations:
File list