Results of system analysis

AVZ 4.32 http://z-oleg.com/secur/avz/

Process List

File namePIDDescriptionCopyrightMD5Information
c:\windows\system32\atservice.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1776AFSS ServiceCopyright (C) 2000-2008, AuthenTec. All rights reserved.??1641.24 kb, rsAh,
created: 19.3.2009 5:48:34,
modified: 19.3.2009 5:48:34
Command line:
C:\WINDOWS\system32\AtService.exe
c:\program files\alwil software\avast5\avastsvc.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1988avast! ServiceCopyright (c) 2010 ALWIL Software??39.44 kb, rsAh,
created: 5.4.2010 14:48:15,
modified: 9.3.2010 12:24:08
Command line:
"C:\Program Files\Alwil Software\Avast5\AvastSvc.exe"
c:\progra~1\alwils~1\avast5\avastui.exe
Script: Quarantine, Delete, Delete via BC, Terminate
3036avast! AntivirusCopyright (c) 2010 ALWIL Software??2704.43 kb, rsAh,
created: 5.4.2010 14:48:15,
modified: 9.3.2010 12:24:10
Command line:
"C:\PROGRA~1\ALWILS~1\Avast5\avastUI.exe" /nogui
c:\program files\thinkpad\bluetooth software\bin\btwdins.exe
Script: Quarantine, Delete, Delete via BC, Terminate
340Bluetooth Support ServerCopyright 2000-2008, Broadcom Corporation.??334.59 kb, rsAh,
created: 29.5.2008 0:23:00,
modified: 29.5.2008 0:23:00
Command line:
"C:\Program Files\ThinkPad\Bluetooth Software\bin\btwdins.exe"
c:\windows\system32\ccm\ccmexec.exe
Script: Quarantine, Delete, Delete via BC, Terminate
3920CCM ExecutiveCopyright (C) Microsoft Corporation. 2004??565.22 kb, rsAh,
created: 9.2.2006 11:50:00,
modified: 9.2.2006 11:50:00
Command line:
C:\WINDOWS\system32\CCM\CcmExec.exe
c:\windows\system32\dts.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1736Data Transfer Service©AuthenTec, Inc. All rights reserved.??96.00 kb, rsAh,
created: 19.3.2009 5:53:02,
modified: 19.3.2009 5:53:02
Command line:
C:\WINDOWS\system32\DTS.exe
c:\windows\explorer.exe
Script: Quarantine, Delete, Delete via BC, Terminate
3444Windows Explorer© Microsoft Corporation. All rights reserved.??1008.00 kb, rsah,
created: 24.9.2009 4:50:45,
modified: 4.8.2004 14:00:00
Command line:
C:\WINDOWS\Explorer.EXE
c:\windows\temp\fdd447.exe
Script: Quarantine, Delete, Delete via BC, Terminate
2732  ??168.07 kb, rsAh,
created: 11.4.2010 14:02:58,
modified: 7.2.2006 16:10:04
Command line:
"C:\WINDOWS\TEMP\FDD447.EXE"
c:\windows\system32\spool\drivers\w32x86\3\fppdis2a.exe
Script: Quarantine, Delete, Delete via BC, Terminate
3056pdfFactoryCopyright (c) 2001-2005 FinePrint Software, LLC??480.00 kb, rsAh,
created: 8.8.2006 22:08:25,
modified: 24.11.2005 11:12:34
Command line:
"C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\fppdis2a.exe" /source=HKCU
c:\program files\common files\microsoft shared\vs7debug\mdm.exe
Script: Quarantine, Delete, Delete via BC, Terminate
2068Machine Debug Manager© Microsoft Corporation. All rights reserved.??314.57 kb, rsAh,
created: 20.6.2003 8:25:00,
modified: 20.6.2003 8:25:00
Command line:
"C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE"
c:\program files\pc connectivity solution\transports\nclbcbtsrv.exe
Script: Quarantine, Delete, Delete via BC, Terminate
4424Broadcomm Bluetooth Media ServerCopyright (c) 2007 - 2009 Nokia. All Rights Reserved.??156.00 kb, rsAh,
created: 29.10.2009 14:03:34,
modified: 29.10.2009 14:03:34
Command line:
{29CD04CD-A72D-4231-B18B-B84D653A2C05}
c:\program files\thinkpad\utilities\pwmdbsvc.exe
Script: Quarantine, Delete, Delete via BC, Terminate
3860PWMDBSVC ModuleCopyright 2008??92.00 kb, rsah,
created: 16.12.2009 13:58:21,
modified: 25.9.2008 2:47:00
Command line:
"C:\Program Files\ThinkPad\Utilities\PWMDBSVC.EXE"
c:\program files\common files\research in motion\auto update\rimautoupdate.exe
Script: Quarantine, Delete, Delete via BC, Terminate
3052RIM Auto Update© 1997-2010 Research In Motion Limited.??633.34 kb, rsAh,
created: 10.3.2010 22:32:26,
modified: 10.3.2010 22:32:26
Command line:
"C:\Program Files\Common Files\Research In Motion\Auto Update\RIMAutoUpdate.exe" /background
c:\windows\system32\rundll32.exe
Script: Quarantine, Delete, Delete via BC, Terminate
2024Run a DLL as an App© Microsoft Corporation. All rights reserved.??32.50 kb, rsAh,
created: 24.9.2009 4:51:25,
modified: 4.8.2004 14:00:00
Command line:
"C:\WINDOWS\system32\rundll32.exe" C:\PROGRA~1\ThinkPad\UTILIT~1\PWRMGRTR.DLL,PwrMgrBkGndMonitor
c:\windows\system32\spoolsv.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1236Spooler SubSystem App© Microsoft Corporation. All rights reserved.??56.50 kb, rsah,
created: 24.9.2009 4:51:29,
modified: 11.6.2005 1:53:32
Command line:
C:\WINDOWS\system32\spoolsv.exe
c:\program files\trend micro\officescan client\tmlisten.exe
Script: Quarantine, Delete, Delete via BC, Terminate
3288 Copyright (C) 1998-2006 Trend Micro Incorporated. All rights reserved.??600.09 kb, rsAh,
created: 7.2.2006 15:48:52,
modified: 7.2.2006 15:48:52
Command line:
"C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe"
c:\program files\lenovo\npdirect\tpfnf7sp.exe
Script: Quarantine, Delete, Delete via BC, Terminate
2136Presentation Director Fn+F7 handlerCopyright (C) Lenovo 2006.??58.78 kb, rsah,
created: 16.12.2009 13:58:34,
modified: 31.7.2008 5:01:00
Command line:
"C:\Program Files\Lenovo\NPDIRECT\TPFNF7SP.exe" /r
c:\windows\system32\winlogon.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1460Windows NT Logon Application© Microsoft Corporation. All rights reserved.??490.50 kb, rsah,
created: 24.9.2009 4:51:39,
modified: 4.8.2004 14:00:00
Command line:
winlogon.exe
Detected:68, recognized as trusted 59
Module nameHandleDescriptionCopyrightMD5Used by processes
C:\Program Files\Alwil Software\Avast5\1029\Base.dll
Script: Quarantine, Delete, Delete via BC
1711800320avast! Czech Basic ModuleCopyright (c) 2010 ALWIL Software--1988, 3036
C:\Program Files\Alwil Software\Avast5\defs\10041001\algo.dll
Script: Quarantine, Delete, Delete via BC
1665138688  --1988
C:\Program Files\Alwil Software\Avast5\defs\10041001\aswCmnBS.dll
Script: Quarantine, Delete, Delete via BC
1678245888Common functionsCopyright (c) 2010 ALWIL Software--1988
C:\Program Files\Alwil Software\Avast5\defs\10041001\aswCmnIS.dll
Script: Quarantine, Delete, Delete via BC
1678770176Antivirus independent functionsCopyright (c) 2010 ALWIL Software--1988
C:\Program Files\Alwil Software\Avast5\defs\10041001\aswCmnOS.dll
Script: Quarantine, Delete, Delete via BC
1677721600Antivirus HW dependent libraryCopyright (c) 2010 ALWIL Software--1988
C:\Program Files\Alwil Software\Avast5\defs\10041001\aswEngin.dll
Script: Quarantine, Delete, Delete via BC
1680080896High level antivirus engineCopyright (c) 2010 ALWIL Software--1988
C:\Program Files\Alwil Software\Avast5\defs\10041001\aswScan.dll
Script: Quarantine, Delete, Delete via BC
1679818752Low level antivirus engineCopyright (c) 2010 ALWIL Software--1988
C:\Program Files\Alwil Software\Avast5\defs\10041100\algo.dll
Script: Quarantine, Delete, Delete via BC
130285568  --1988
C:\Program Files\Alwil Software\Avast5\defs\10041100\aswCmnBS.dll
Script: Quarantine, Delete, Delete via BC
128712704Common functionsCopyright (c) 2010 ALWIL Software--1988
C:\Program Files\Alwil Software\Avast5\defs\10041100\aswCmnIS.dll
Script: Quarantine, Delete, Delete via BC
90767360Antivirus independent functionsCopyright (c) 2010 ALWIL Software--1988
C:\Program Files\Alwil Software\Avast5\defs\10041100\aswCmnOS.dll
Script: Quarantine, Delete, Delete via BC
90570752Antivirus HW dependent libraryCopyright (c) 2010 ALWIL Software--1988
C:\Program Files\Alwil Software\Avast5\defs\10041100\aswEngin.dll
Script: Quarantine, Delete, Delete via BC
127533056High level antivirus engineCopyright (c) 2010 ALWIL Software--1988
C:\Program Files\Alwil Software\Avast5\defs\10041100\aswScan.dll
Script: Quarantine, Delete, Delete via BC
104005632Low level antivirus engineCopyright (c) 2010 ALWIL Software--1988
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MSDBG2.DLL
Script: Quarantine, Delete, Delete via BC
1364721664Active Debugging Proxy/Stub© Microsoft Corporation. All rights reserved.--2068
C:\Program Files\Common Files\Research In Motion\Auto Update\AutoUpdateRes1029.dll
Script: Quarantine, Delete, Delete via BC
268435456RIM Auto Update© 1997-2010 Research In Motion Limited.--3052
C:\Program Files\Common Files\Research In Motion\Auto Update\RIMAutoUpdate.exe
Script: Quarantine, Delete, Delete via BC
4194304RIM Auto Update© 1997-2010 Research In Motion Limited.??3052
C:\Program Files\Internet Explorer\mui\0405\browselc.dll
Script: Quarantine, Delete, Delete via BC
1916862464Shell Browser UI Library© Microsoft Corporation. Všechna práva vyhrazena.--3444
C:\Program Files\Lenovo Fingerprint Software\ATCSSINT.DLL
Script: Quarantine, Delete, Delete via BC
17301504Fingerprint Authentication Interfaces (C) AuthenTec Inc. All rights reserved.--1460
C:\Program Files\Lenovo Fingerprint Software\FPResource.dll
Script: Quarantine, Delete, Delete via BC
21233664Multilingual Resource Dynamic Link Library© AuthenTec, Inc. All rights reserved.--1460
C:\Program Files\Lenovo Fingerprint Software\SharedResources.dll
Script: Quarantine, Delete, Delete via BC
15925248Fingerprint Shared Resources Dynamic Link LibraryCopyright (C) 2006--1460
C:\Program Files\Lenovo\NPDIRECT\tpfnf7.dll
Script: Quarantine, Delete, Delete via BC
11403264Presentation Director Fn+F7 handlerCopyright (C) Lenovo 2006.--2136
C:\Program Files\Lenovo\NPDIRECT\TPFNF7SP.exe
Script: Quarantine, Delete, Delete via BC
4194304Presentation Director Fn+F7 handlerCopyright (C) Lenovo 2006.??2136
C:\Program Files\ThinkPad\Bluetooth Software\bin\btwdins.exe
Script: Quarantine, Delete, Delete via BC
4194304Bluetooth Support ServerCopyright 2000-2008, Broadcom Corporation.??340
C:\Program Files\ThinkPad\Utilities\PWMDBSVC.EXE
Script: Quarantine, Delete, Delete via BC
4194304PWMDBSVC ModuleCopyright 2008??3860
C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
Script: Quarantine, Delete, Delete via BC
4194304 Copyright (C) 1998-2006 Trend Micro Incorporated. All rights reserved.??3288
C:\PROGRA~1\ALWILS~1\Avast5\1029\UILangRes.dll
Script: Quarantine, Delete, Delete via BC
1712062464UILangResCopyright (c) 2010 ALWIL Software--3036
C:\PROGRA~1\ThinkPad\UTILIT~1\PWRMGRIF.DLL
Script: Quarantine, Delete, Delete via BC
47579136  --3444, 3860, 2024
C:\PROGRA~1\ThinkPad\UTILIT~1\PWRMGRTR.DLL
Script: Quarantine, Delete, Delete via BC
45940736ThinkPad Power Manager Background Monitor and Tray Battery GaugeCopyright (C) Lenovo 2005,2007.--3444, 2024
C:\PROGRA~1\ThinkPad\UTILIT~1\US\PWRMGRRT.DLL
Script: Quarantine, Delete, Delete via BC
47513600  --3444, 2024
C:\WINDOWS\system32\AFSSClientLib.dll
Script: Quarantine, Delete, Delete via BC
26148864AFSS Client LibraryCopyright (C) 2000-2008, AuthenTec. All rights reserved.--1460
C:\WINDOWS\system32\ATGinaHook.dll
Script: Quarantine, Delete, Delete via BC
268435456Fingerprint system pass-through GINA Copyright (C) 2009 AuthenTec Inc.--1460
C:\WINDOWS\system32\AtService.exe
Script: Quarantine, Delete, Delete via BC
4194304AFSS ServiceCopyright (C) 2000-2008, AuthenTec. All rights reserved.??1776
C:\WINDOWS\system32\bthcrp.dll
Script: Quarantine, Delete, Delete via BC
15532032bthcrp DLLCopyright 2000-2008, Broadcom Corporation.--1236
C:\WINDOWS\system32\CCM\ccmhttp.dll
Script: Quarantine, Delete, Delete via BC
404160512CCM HTTP ServicesCopyright (C) Microsoft Corporation. 2004--3920
C:\WINDOWS\system32\DTS.exe
Script: Quarantine, Delete, Delete via BC
4194304Data Transfer Service©AuthenTec, Inc. All rights reserved.??1736
C:\WINDOWS\system32\FpWinLogonNp.dll
Script: Quarantine, Delete, Delete via BC
29229056Fingerprint Winlogon Dynamic Link Library©AuthenTec, Inc. All rights reserved.--1460
C:\WINDOWS\system32\lmdimon.dll
Script: Quarantine, Delete, Delete via BC
12910592Microsoft® Live MeetingCopyright (C) Microsoft Corp. 2001-2004--1236
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\fppdis2a.exe
Script: Quarantine, Delete, Delete via BC
553648128pdfFactoryCopyright (c) 2001-2005 FinePrint Software, LLC??3056
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\fppgraf2.dll
Script: Quarantine, Delete, Delete via BC
603979776pdfFactoryCopyright (c) 2001-2005 FinePrint Software, LLC--3056
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\fppint2.dll
Script: Quarantine, Delete, Delete via BC
620756992pdfFactoryCopyright (c) 2001-2005 FinePrint Software, LLC--3056
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\fppr232.dll
Script: Quarantine, Delete, Delete via BC
1090519040pdfFactoryCopyright (c) 2001-2005 FinePrint Software, LLC--3056
C:\WINDOWS\System32\spool\PRTPROCS\W32X86\lmdippr.dll
Script: Quarantine, Delete, Delete via BC
16711680Microsoft® Live MeetingCopyright (C) Microsoft Corp. 2001-2004--1236
C:\WINDOWS\system32\wbtapi.dll
Script: Quarantine, Delete, Delete via BC
268435456WBTApi DLLCopyright 2000-2008, Broadcom Corporation.--4424, 1236
C:\WINDOWS\system32\WidcommSdk.dll
Script: Quarantine, Delete, Delete via BC
21037056WidcommSdk DLLCopyright 2000-2008, Broadcom Corporation.--1236
C:\WINDOWS\TEMP\FDD447.EXE
Script: Quarantine, Delete, Delete via BC
4194304  ??2732
Modules found:533, recognized as trusted 488

Kernel Space Modules Viewer

ModuleBase addressSize in memoryDescriptionManufacturer
C:\WINDOWS\System32\Drivers\dump_iaStor.sys
Script: Quarantine, Delete, Delete via BC
AC4C90000DA000 (892928)
spfs.sys
Script: Quarantine, Delete, Delete via BC
B9EB40000F3000 (995328)
C:\WINDOWS\system32\DRIVERS\TPHKDRV.sys
Script: Quarantine, Delete, Delete via BC
B8D9F000005000 (20480)ThinkPad Hotkey Driver(C) Lenovo 2005-2008, (C) IBM Corporation 1999-2005.
Modules found - 215, recognized as trusted - 212

Services

ServiceDescriptionStatusFileGroupDependencies
ATService
Service: Stop, Delete, Disable
AuthenTec Fingerprint ServiceRunningC:\WINDOWS\system32\AtService.exe
Script: Quarantine, Delete, Delete via BC
Pointer Class 
btwdins
Service: Stop, Delete, Disable
Bluetooth ServiceRunningC:\Program Files\ThinkPad\Bluetooth Software\bin\btwdins.exe
Script: Quarantine, Delete, Delete via BC
PlugPlay 
dtsvc
Service: Stop, Delete, Disable
Data Transfer ServiceRunningC:\WINDOWS\system32\DTS.exe
Script: Quarantine, Delete, Delete via BC
Base 
Power Manager DBC Service
Service: Stop, Delete, Disable
Power Manager DBC ServiceRunningC:\Program Files\ThinkPad\Utilities\PWMDBSVC.EXE
Script: Quarantine, Delete, Delete via BC
 RPCSS
tmlisten
Service: Stop, Delete, Disable
OfficeScanNT ListenerRunningC:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe
Script: Quarantine, Delete, Delete via BC
  
ADMonitor
Service: Stop, Delete, Disable
AD MonitorNot startedC:\WINDOWS\system32\ADMonitor.exe
Script: Quarantine, Delete, Delete via BC
Base 
FingerprintServer
Service: Stop, Delete, Disable
Fingerprint ServerNot startedC:\WINDOWS\system32\FpLogonServ.exe
Script: Quarantine, Delete, Delete via BC
Pointer Class 
Roxio UPnP Renderer 9
Service: Stop, Delete, Disable
Roxio UPnP Renderer 9Not startedC:\Program Files\Roxio\Digital Home 9\RoxioUPnPRenderer9.exe
Script: Quarantine, Delete, Delete via BC
  
Roxio Upnp Server 9
Service: Stop, Delete, Disable
Roxio Upnp Server 9Not startedC:\Program Files\Roxio\Digital Home 9\RoxioUpnpService9.exe
Script: Quarantine, Delete, Delete via BC
  
RoxLiveShare9
Service: Stop, Delete, Disable
LiveShare P2P Server 9Not startedC:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxLiveShare9.exe
Script: Quarantine, Delete, Delete via BC
 RPCSS
RoxMediaDB9
Service: Stop, Delete, Disable
RoxMediaDB9Not startedC:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxMediaDB9.exe
Script: Quarantine, Delete, Delete via BC
  
RoxWatch9
Service: Stop, Delete, Disable
Roxio Hard Drive Watcher 9Not startedC:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxWatch9.exe
Script: Quarantine, Delete, Delete via BC
  
Detected - 120, recognized as trusted - 108

Drivers

ServiceDescriptionStatusFileGroupDependencies
sptd
Driver: Unload, Delete, Disable
sptdRunningC:\WINDOWS\System32\Drivers\sptd.sys
Script: Quarantine, Delete, Delete via BC
Boot Bus Extender 
TPHKDRV
Driver: Unload, Delete, Disable
TPHKDRVRunningC:\WINDOWS\system32\DRIVERS\TPHKDRV.sys
Script: Quarantine, Delete, Delete via BC
  
Abiosdsk
Driver: Unload, Delete, Disable
AbiosdskNot startedAbiosdsk.sys
Script: Quarantine, Delete, Delete via BC
Primary disk 
Atdisk
Driver: Unload, Delete, Disable
AtdiskNot startedAtdisk.sys
Script: Quarantine, Delete, Delete via BC
Primary disk 
catchme
Driver: Unload, Delete, Disable
catchmeNot startedC:\DOCUME~1\ROBERT~1.JAN\LOCALS~1\Temp\catchme.sys
Script: Quarantine, Delete, Delete via BC
Base 
Changer
Driver: Unload, Delete, Disable
ChangerNot startedChanger.sys
Script: Quarantine, Delete, Delete via BC
Filter 
lbrtfdc
Driver: Unload, Delete, Disable
lbrtfdcNot startedlbrtfdc.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
PCIDump
Driver: Unload, Delete, Disable
PCIDumpNot startedPCIDump.sys
Script: Quarantine, Delete, Delete via BC
PCI Configuration 
PDCOMP
Driver: Unload, Delete, Disable
PDCOMPNot startedPDCOMP.sys
Script: Quarantine, Delete, Delete via BC
  
PDFRAME
Driver: Unload, Delete, Disable
PDFRAMENot startedPDFRAME.sys
Script: Quarantine, Delete, Delete via BC
  
PDRELI
Driver: Unload, Delete, Disable
PDRELINot startedPDRELI.sys
Script: Quarantine, Delete, Delete via BC
  
PDRFRAME
Driver: Unload, Delete, Disable
PDRFRAMENot startedPDRFRAME.sys
Script: Quarantine, Delete, Delete via BC
  
prepdrvr
Driver: Unload, Delete, Disable
SMS Process Event DriverNot startedC:\WINDOWS\system32\CCM\prepdrv.sys
Script: Quarantine, Delete, Delete via BC
  
Simbad
Driver: Unload, Delete, Disable
SimbadNot startedSimbad.sys
Script: Quarantine, Delete, Delete via BC
Filter 
WDICA
Driver: Unload, Delete, Disable
WDICANot startedWDICA.sys
Script: Quarantine, Delete, Delete via BC
  
Detected - 251, recognized as trusted - 236

Autoruns

File nameStatusStartup methodDescription
ATGinaHook.dll
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\Winlogon, GinaDLL
C:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\RapidShareManager.exe
Script: Quarantine, Delete, Delete via BC
ActiveFile in Startup folderC:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\RapidShareManager.exe,
C:\Documents and Settings\robert.janota\Local Settings\Temp\NEventMessages.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Nokia Software Installer, EventMessageFile
Delete
C:\Jean\jean.exe
Script: Quarantine, Delete, Delete via BC
ActiveShortcut in Startup folderC:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\JEAN.lnk,
C:\PROGRA~1\ThinkPad\UTILIT~1\PWRMGRTR.DLL
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, PWRMGRTR
Delete
C:\Program Files\Ashampoo\Ashampoo Burning Studio 6 FREE\burningstudio.exe
Script: Quarantine, Delete, Delete via BC
ActiveShortcut in Startup folderC:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\Ashampoo Burning Studio 6 FREE.lnk,
C:\Program Files\Bonjour\mDNSResponder.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Bonjour Service, EventMessageFile
Delete
C:\Program Files\Common Files\Research In Motion\Auto Update\RIMAutoUpdate.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, BlackBerryAutoUpdate
Delete
C:\Program Files\Essentials Codec Pack\update.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, Media Codec Update Service
Delete
C:\Program Files\Lenovo Fingerprint Software\fpapp.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, FingerPrintSoftware
Delete
C:\Program Files\Lenovo\NPDIRECT\TPFNF7SP.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, TPFNF7
Delete
C:\Program Files\Research In Motion\BlackBerry\DesktopMgr.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Synchronize, EventMessageFile
Delete
C:\Program Files\Research In Motion\BlackBerry\DesktopMgr.exe
Script: Quarantine, Delete, Delete via BC
ActiveShortcut in Startup folderC:\Documents and Settings\All Users\Start Menu\Programs\Startup\, C:\Documents and Settings\All Users\Start Menu\Programs\Startup\BlackBerry Desktop Manager.lnk,
C:\Program Files\Research In Motion\BlackBerry\DesktopMgr.exe
Script: Quarantine, Delete, Delete via BC
ActiveShortcut in Startup folderC:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\BlackBerry Desktop Manager.lnk,
C:\Program Files\Roxio\Media Manager 9\MediaManager9.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\RIMDeviceFileAccess, EventMessageFile
Delete
C:\Program Files\Zoner\Photo Studio 9\Program\Zps9.exe
Script: Quarantine, Delete, Delete via BC
ActiveShortcut in Startup folderC:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\Zoner Photo Studio 9.lnk,
C:\Program Files\pdaBusiness\Qlock\Qlock.exe
Script: Quarantine, Delete, Delete via BC
ActiveShortcut in Startup folderC:\Documents and Settings\All Users\Start Menu\Programs\Startup\, C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Qlock.lnk,
C:\WINDOWS\Installer\{075F852B-6A58-44D0-A46F-81B13589C637}\Icon075F852B.exe
Script: Quarantine, Delete, Delete via BC
ActiveShortcut in Startup folderC:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\PC Translator 2004.lnk,
C:\WINDOWS\System32\PrintFilterPipelineSvc.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\PrintFilterPipelineSvc, EventMessageFile
Delete
C:\WINDOWS\System32\hidserv.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\HidServ\Parameters, ServiceDll
Delete
C:\WINDOWS\System32\igmpv2.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IGMPv2, EventMessageFile
Delete
C:\WINDOWS\System32\ipbootp.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IPBOOTP, EventMessageFile
Delete
C:\WINDOWS\System32\iprip2.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IPRIP2, EventMessageFile
Delete
C:\WINDOWS\System32\ospf.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\OSPF, EventMessageFile
Delete
C:\WINDOWS\System32\ospfmib.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\OSPFMib, EventMessageFile
Delete
C:\WINDOWS\System32\polagent.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\PolicyAgent, EventMessageFile
Delete
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\fppdis2a.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_CURRENT_USER, Software\Microsoft\Windows\CurrentVersion\Run, pdfFactory Pro Dispatcher v2
Delete
C:\WINDOWS\System32\tssdis.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\TermServSessDir, EventMessageFile
Delete
C:\WINDOWS\system
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\ATService, EventMessageFile
Delete
C:\WINDOWS\system32\FpWinLogonNp.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ATFUS, DLLName
Delete
C:\WINDOWS\system32\MsSip1.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 1, $DLL
Delete
C:\WINDOWS\system32\MsSip2.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 2, $DLL
Delete
C:\WINDOWS\system32\MsSip3.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 3, $DLL
Delete
C:\WINDOWS\system32\dfrg.msc %c:
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\DefragPath,
C:\WINDOWS\system32\psxss.exe
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Session Manager\SubSystems, Posix
C:\WINDOWS\system32\stisvc.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System, EventMessageFile
Delete
SDEvents.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Spybot - Search & Destroy 2, EventMessageFile
Delete
kbd101.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\i8042prt\Parameters, LayerDriver JPN
Delete
kbd101a.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\i8042prt\Parameters, LayerDriver KOR
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, .DEFAULT\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, S-1-5-19\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, S-1-5-20\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, S-1-5-18\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_CURRENT_USER, Control Panel\IOProcs, MVB
Delete
vgafix.fon
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fixedfon.fon
Delete
vgaoem.fon
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, oemfonts.fon
Delete
vgasys.fon
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fonts.fon
Delete
Autoruns items found - 631, recognized as trusted - 584

Internet Explorer extension modules (BHOs, Toolbars ...)

File nameTypeDescriptionManufacturerCLSID
C:\TRANSLAT\WEBIE.DL_
Script: Quarantine, Delete, Delete via BC
ToolbarWebTranslator ModuleCopyright 2002{BFC32E1D-EE75-4A48-BC60-104E11EE2431}
Delete
Toolbar{855F3B16-6D32-4FE6-8A56-BBB695989046}
Delete
C:\TRANSLAT\WEBIE.DL_
Script: Quarantine, Delete, Delete via BC
Extension moduleWebTranslator ModuleCopyright 2002{BFC32E1D-EE75-4A48-BC60-104E11EE2431}
Delete
C:\TRANSLAT\WEBIE.DL_
Script: Quarantine, Delete, Delete via BC
Extension moduleWebTranslator ModuleCopyright 2002{CC963627-B1DC-40E0-B52A-CF21EE748450}
Delete
C:\TRANSLAT\WEBIE.DL_
Script: Quarantine, Delete, Delete via BC
Extension moduleWebTranslator ModuleCopyright 2002{CC963627-B1DC-40E0-B52A-CF21EE748451}
Delete
C:\TRANSLAT\WEBIE.DL_
Script: Quarantine, Delete, Delete via BC
Extension moduleWebTranslator ModuleCopyright 2002{CC963627-B1DC-40E0-B52A-CF21EE748452}
Delete
C:\Program Files\ThinkPad\Bluetooth Software\btsendto_ie.htm
Script: Quarantine, Delete, Delete via BC
Extension module{CCA281CA-C863-46ef-9331-5C8D4460577F}
Delete
URLSearchHook{855F3B16-6D32-4fe6-8A56-BBB695989046}
Delete
Items found - 17, recognized as trusted - 9

Windows Explorer extension modules

File nameDestinationDescriptionManufacturerCLSID
deskpan.dll
Script: Quarantine, Delete, Delete via BC
Display Panning CPL Extension{42071714-76d4-11d1-8b24-00a0c9068ff3}
Delete
Shell extensions for file compression{764BF0E1-F219-11ce-972D-00AA00A14F56}
Delete
Encryption Context Menu{853FE2B1-B769-11d0-9C4E-00C04FB6C6FA}
Delete
Taskbar and Start Menu{0DF44EAA-FF21-4412-828E-260A8728E7F1}
Delete
rundll32.exe C:\WINDOWS\system32\shimgvw.dll,ImageView_COMServer {00E7B358-F65B-4dcf-83DF-CD026B94BFD4}
Script: Quarantine, Delete, Delete via BC
Autoplay for SlideShow{00E7B358-F65B-4dcf-83DF-CD026B94BFD4}
Delete
User Accounts{7A9D77BD-5403-11d2-8785-2E0420524153}
Delete
C:\WINDOWS\system32\BTNEIG~1.DLL
Script: Quarantine, Delete, Delete via BC
My Bluetooth PlacesBTNeighborhood DLLCopyright 2000-2008, Broadcom Corporation.{6af09ec9-b429-11d4-a1fb-0090960218cb}
Delete
C:\WINDOWS\system32\btncopy.dll
Script: Quarantine, Delete, Delete via BC
MonitorBTNCopy ModuleCopyright 2000-2008, Broadcom Corporation.{7842554E-6BED-11D2-8CDB-B05550C10000}
Delete
Microsoft Office Metadata Handler{993BE281-6695-4BA5-8A2A-7AACBFAAB69E}
Delete
Microsoft Office Thumbnail Handler{C41662BB-1FA0-4CE0-8DC5-9B7F8279FF97}
Delete
IE User Assist{FAC3CBF6-8697-43d0-BAB9-DCD1FCE19D75}
Delete
Items found - 220, recognized as trusted - 208

Printing system extensions (print monitors, providers)

File nameTypeNameDescriptionManufacturer
C:\WINDOWS\system32\lmdimon.dll
Script: Quarantine, Delete, Delete via BC
MonitorMicrosoft Office Live Meeting Document Writer MonitorMicrosoft® Live MeetingCopyright (C) Microsoft Corp. 2001-2004
C:\WINDOWS\system32\bthcrp.dll
Script: Quarantine, Delete, Delete via BC
MonitorPort tiskárny Bluetoothbthcrp DLLCopyright 2000-2008, Broadcom Corporation.
Items found - 13, recognized as trusted - 11

Task Scheduler jobs

File nameJob nameJob stateDescriptionManufacturer
C:\PROGRA~1\ThinkPad\UTILIT~1\PWMIDTSK.EXE
Script: Quarantine, Delete, Delete via BC
PMTask.jobThe task will not run at the scheduled times because it has been disabled.
Items found - 4, recognized as trusted - 3

SPI/LSP settings

Namespace providers (NSP)
ManufacturerStatusEXE fileDescriptionGUID
Detected - 3, recognized as trusted - 3
Transport protocol providers (TSP, LSP)
ManufacturerEXE fileDescription
Detected - 23, recognized as trusted - 23
Results of automatic SPI settings check
LSP settings checked. No errors detected

TCP/UDP ports

PortStatusRemote HostRemote PortApplicationNotes
TCP ports
135LISTENING0.0.0.018636[1912] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
445LISTENING0.0.0.038974[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
1025ESTABLISHED127.0.0.15550[1460] \??\c:\windows\system32\winlogon.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1033ESTABLISHED127.0.0.127015[3020] c:\program files\itunes\ituneshelper.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1068LISTENING0.0.0.049273[4192] c:\windows\system32\alg.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
5550LISTENING0.0.0.024789[1776] c:\windows\system32\atservice.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
5550ESTABLISHED127.0.0.11025[1776] c:\windows\system32\atservice.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
27015LISTENING0.0.0.024792[1060] c:\program files\common files\apple\mobile device support\bin\applemobiledeviceservice.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
27015ESTABLISHED127.0.0.11033[1060] c:\program files\common files\apple\mobile device support\bin\applemobiledeviceservice.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
62514LISTENING0.0.0.08300[1140] c:\program files\cisco systems\vpn client\cvpnd.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
65394LISTENING0.0.0.020716[3288] c:\program files\trend micro\officescan client\tmlisten.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
UDP ports
123LISTENING----[296] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
445LISTENING----[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
500LISTENING----[1520] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1900LISTENING----[980] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
4500LISTENING----[1520] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
62514LISTENING----[1140] c:\program files\cisco systems\vpn client\cvpnd.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 

Downloaded Program Files (DPF)

File nameDescriptionManufacturerCLSIDSource URL
Items found - 4, recognized as trusted - 4

Control Panel Applets (CPL)

File nameDescriptionManufacturer
C:\WINDOWS\system32\btcpl.cpl
Script: Quarantine, Delete, Delete via BC
Bluetooth Control PanelCopyright 2000-2008, Broadcom Corporation.
Items found - 29, recognized as trusted - 28

Active Setup

File nameDescriptionManufacturerCLSID
Items found - 15, recognized as trusted - 15

HOSTS file

Hosts file record

127.0.0.1       localhost

Protocols and handlers

File nameTypeDescriptionManufacturerCLSID
mscoree.dll
Script: Quarantine, Delete, Delete via BC
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
mscoree.dll
Script: Quarantine, Delete, Delete via BC
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
mscoree.dll
Script: Quarantine, Delete, Delete via BC
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Items found - 31, recognized as trusted - 28

Suspicious objects

FileDescriptionType
C:\WINDOWS\System32\Drivers\aswSP.SYS
Script: Quarantine, Delete, Delete via BC
Suspicion for RootkitKernel-mode hook
C:\System Volume Information\_restore{9AB2435C-DE2B-4478-9105-C7393117FEFB}\RP31\A0046811.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by File scannerSuspicion for Backdoor.Win32.Eclypse ( 0041F192 00186D09 00178E59 0009F1EA 40960)
C:\System Volume Information\_restore{9AB2435C-DE2B-4478-9105-C7393117FEFB}\RP31\A0046813.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by File scannerSuspicion for Backdoor.Win32.Eclypse ( 0041F192 00186D09 00178E59 0009F1EA 40960)


AVZ Antiviral Toolkit log; AVZ version is 4.32
Scanning started at 11.4.2010 14:10:12
Database loaded: signatures - 270034, NN profile(s) - 2, malware removal microprograms - 56, signature database released 10.04.2010 22:53
Heuristic microprograms loaded: 382
PVS microprograms loaded: 9
Digital signatures of system files loaded: 194145
Heuristic analyzer mode: Medium heuristics mode
Malware removal mode: enabled
Windows version is: 5.1.2600, Service Pack 2 ; AVZ is run with administrator rights
System Restore: enabled
1. Searching for Rootkits and other software intercepting API functions
1.1 Searching for user-mode API hooks
 Analysis: kernel32.dll, export table found in section .text
 Analysis: ntdll.dll, export table found in section .text
 Analysis: user32.dll, export table found in section .text
 Analysis: advapi32.dll, export table found in section .text
 Analysis: ws2_32.dll, export table found in section .text
 Analysis: wininet.dll, export table found in section .text
 Analysis: rasapi32.dll, export table found in section .text
 Analysis: urlmon.dll, export table found in section .text
 Analysis: netapi32.dll, export table found in section .text
1.2 Searching for kernel-mode API hooks
 Driver loaded successfully
 SDT found (RVA=0846E0)
 Kernel ntkrnlpa.exe found in memory at address 804D7000
   SDT = 8055B6E0
   KiST = 80503960 (284)
Functions checked: 284, intercepted: 0, restored: 0
1.3 Checking IDT and SYSENTER
 Analyzing CPU 1
 Analyzing CPU 2
CmpCallCallBacks = 00092D3C
Disable callback - ??? ???????????????
 Checking IDT and SYSENTER - complete
1.4 Searching for masking processes and drivers
 Checking not performed: extended monitoring driver (AVZPM) is not installed
 Driver loaded successfully
1.5 Checking IRP handlers
\FileSystem\ntfs[IRP_MJ_CREATE] = AC5DFFEE -> C:\WINDOWS\System32\Drivers\aswSP.SYS, driver recognized as trusted
\FileSystem\ntfs[IRP_MJ_CLOSE] = AC5E002E -> C:\WINDOWS\System32\Drivers\aswSP.SYS, driver recognized as trusted
\FileSystem\ntfs[IRP_MJ_WRITE] = AC5E010A -> C:\WINDOWS\System32\Drivers\aswSP.SYS, driver recognized as trusted
\FileSystem\ntfs[IRP_MJ_QUERY_INFORMATION] = 8A5C91F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_INFORMATION] = AC5E014A -> C:\WINDOWS\System32\Drivers\aswSP.SYS, driver recognized as trusted
\FileSystem\ntfs[IRP_MJ_QUERY_EA] = 8A5C91F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_EA] = 8A5C91F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_VOLUME_INFORMATION] = 8A5C91F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_VOLUME_INFORMATION] = 8A5C91F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_DIRECTORY_CONTROL] = 8A5C91F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_FILE_SYSTEM_CONTROL] = 8A5C91F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_DEVICE_CONTROL] = 8A5C91F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_LOCK_CONTROL] = 8A5C91F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_SECURITY] = 8A5C91F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_SECURITY] = 8A5C91F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_PNP] = 8A5C91F8 -> hook not defined
\FileSystem\FastFat[IRP_MJ_CREATE] = 892191F8 -> hook not defined
\FileSystem\FastFat[IRP_MJ_CLOSE] = 892191F8 -> hook not defined
\FileSystem\FastFat[IRP_MJ_WRITE] = 892191F8 -> hook not defined
\FileSystem\FastFat[IRP_MJ_QUERY_INFORMATION] = 892191F8 -> hook not defined
\FileSystem\FastFat[IRP_MJ_SET_INFORMATION] = 892191F8 -> hook not defined
\FileSystem\FastFat[IRP_MJ_QUERY_EA] = 892191F8 -> hook not defined
\FileSystem\FastFat[IRP_MJ_SET_EA] = 892191F8 -> hook not defined
\FileSystem\FastFat[IRP_MJ_QUERY_VOLUME_INFORMATION] = 892191F8 -> hook not defined
\FileSystem\FastFat[IRP_MJ_SET_VOLUME_INFORMATION] = 892191F8 -> hook not defined
\FileSystem\FastFat[IRP_MJ_DIRECTORY_CONTROL] = 892191F8 -> hook not defined
\FileSystem\FastFat[IRP_MJ_FILE_SYSTEM_CONTROL] = 892191F8 -> hook not defined
\FileSystem\FastFat[IRP_MJ_DEVICE_CONTROL] = 892191F8 -> hook not defined
\FileSystem\FastFat[IRP_MJ_LOCK_CONTROL] = 892191F8 -> hook not defined
\FileSystem\FastFat[IRP_MJ_PNP] = 892191F8 -> hook not defined
 Checking - complete
2. Scanning RAM
 Number of processes found: 66
 Number of modules loaded: 474
Scanning RAM - complete
3. Scanning disks
C:\System Volume Information\_restore{9AB2435C-DE2B-4478-9105-C7393117FEFB}\RP31\A0046811.exe >>> suspicion for Backdoor.Win32.Eclypse ( 0041F192 00186D09 00178E59 0009F1EA 40960)
C:\System Volume Information\_restore{9AB2435C-DE2B-4478-9105-C7393117FEFB}\RP31\A0046813.exe >>> suspicion for Backdoor.Win32.Eclypse ( 0041F192 00186D09 00178E59 0009F1EA 40960)
Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\EndpointQueues\execmgr\00000002.msg
Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\EndpointQueues\InventoryAgent\00000004.msg
Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\EndpointQueues\LS_ReplyLocations\00000001.msg
Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\EndpointQueues\LS_ScheduledCleanup\0000000H.msg
Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\EndpointQueues\PolicyAgent_Cleanup\00000009.msg
Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\EndpointQueues\PolicyAgent_PolicyDownload\00000001.msg
Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\EndpointQueues\PolicyAgent_PolicyEvaluator\000000BX.msg
Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\EndpointQueues\PolicyAgent_ReplyAssignments\00000001.msg
Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\EndpointQueues\SrcUpdateMgr\00000001.msg
Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\OutgoingQueues\amp_[http]mp_locationmanager\0000000P.msg
Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\OutgoingQueues\mp_mp_ddrendpoint\00000001.msg
Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\OutgoingQueues\mp_mp_hinvendpoint\00000001.msg
Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\OutgoingQueues\mp_mp_sinvendpoint\00000001.msg
Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\OutgoingQueues\mp_statusreceiver\00000005.msg
Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\OutgoingQueues\mp_statusreceiver\00000006.msg
Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\OutgoingQueues\mp_[http]mp_locationmanager\0000000W.msg
Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\OutgoingQueues\mp_[http]mp_policymanager\0000003O.msg
Direct reading: C:\WINDOWS\system32\drivers\sptd.sys
Direct reading: C:\WINDOWS\system32\kbdblrr.dll
4. Checking  Winsock Layered Service Provider (SPI/LSP)
 LSP settings checked. No errors detected
5. Searching for keyboard/mouse/windows events hooks (Keyloggers, Trojan DLLs)
6. Searching for opened TCP/UDP ports used by malicious software
 Checking - disabled by user
7. Heuristic system check
Checking - complete
8. Searching for vulnerabilities
>> Services: potentially dangerous service allowed: RemoteRegistry (Remote Registry)
>> Services: potentially dangerous service allowed: TermService (Terminal Services)
>> Services: potentially dangerous service allowed: SSDPSRV (SSDP Discovery Service)
>> Services: potentially dangerous service allowed: TlntSvr (Telnet)
>> Services: potentially dangerous service allowed: Schedule (Task Scheduler)
>> Services: potentially dangerous service allowed: mnmsrvc (NetMeeting Remote Desktop Sharing)
>> Services: potentially dangerous service allowed: RDSessMgr (Remote Desktop Help Session Manager)
> Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)!
>> Security: disk drives' autorun is enabled
>> Security: administrative shares (C$, D$ ...) are enabled
>> Security: anonymous user access is enabled
>> Security: sending Remote Assistant queries is enabled
Checking - complete
9. Troubleshooting wizard
 >>  HDD autorun is allowed
 >>  Network drives autorun is allowed
 >>  Removable media autorun is allowed
Checking - complete
Files scanned: 173345, extracted from archives: 149714, malicious software found 0, suspicions - 2
Scanning finished at 11.4.2010 14:45:52
Time of scanning: 00:35:41
If you have a suspicion on presence of viruses or questions on the suspected objects,
you can address http://virusinfo.info conference
Creating archive of files from Quarantine
Creating archive of files from Quarantine - complete
System Analysis in progress

Script commands
Add commands to script:
Additional operations:
File list