AVZ 4.32 http://z-oleg.com/secur/avz/
File name | PID | Description | Copyright | MD5 | Information
c:\windows\system32\atservice.exe | Script: Quarantine, Delete, Delete via BC, Terminate 1776 | AFSS Service | Copyright (C) 2000-2008, AuthenTec. All rights reserved. | ?? | 1641.24 kb, rsAh, | created: 19.3.2009 5:48:34, modified: 19.3.2009 5:48:34 Command line: C:\WINDOWS\system32\AtService.exe c:\program files\alwil software\avast5\avastsvc.exe | Script: Quarantine, Delete, Delete via BC, Terminate 1988 | avast! Service | Copyright (c) 2010 ALWIL Software | ?? | 39.44 kb, rsAh, | created: 5.4.2010 14:48:15, modified: 9.3.2010 12:24:08 Command line: "C:\Program Files\Alwil Software\Avast5\AvastSvc.exe" c:\progra~1\alwils~1\avast5\avastui.exe | Script: Quarantine, Delete, Delete via BC, Terminate 3036 | avast! Antivirus | Copyright (c) 2010 ALWIL Software | ?? | 2704.43 kb, rsAh, | created: 5.4.2010 14:48:15, modified: 9.3.2010 12:24:10 Command line: "C:\PROGRA~1\ALWILS~1\Avast5\avastUI.exe" /nogui c:\program files\thinkpad\bluetooth software\bin\btwdins.exe | Script: Quarantine, Delete, Delete via BC, Terminate 340 | Bluetooth Support Server | Copyright 2000-2008, Broadcom Corporation. | ?? | 334.59 kb, rsAh, | created: 29.5.2008 0:23:00, modified: 29.5.2008 0:23:00 Command line: "C:\Program Files\ThinkPad\Bluetooth Software\bin\btwdins.exe" c:\windows\system32\ccm\ccmexec.exe | Script: Quarantine, Delete, Delete via BC, Terminate 3920 | CCM Executive | Copyright (C) Microsoft Corporation. 2004 | ?? | 565.22 kb, rsAh, | created: 9.2.2006 11:50:00, modified: 9.2.2006 11:50:00 Command line: C:\WINDOWS\system32\CCM\CcmExec.exe c:\windows\system32\dts.exe | Script: Quarantine, Delete, Delete via BC, Terminate 1736 | Data Transfer Service | ©AuthenTec, Inc. All rights reserved. | ?? | 96.00 kb, rsAh, | created: 19.3.2009 5:53:02, modified: 19.3.2009 5:53:02 Command line: C:\WINDOWS\system32\DTS.exe c:\windows\explorer.exe | Script: Quarantine, Delete, Delete via BC, Terminate 3444 | Windows Explorer | © Microsoft Corporation. All rights reserved. | ?? | 1008.00 kb, rsah, | created: 24.9.2009 4:50:45, modified: 4.8.2004 14:00:00 Command line: C:\WINDOWS\Explorer.EXE c:\windows\temp\fdd447.exe | Script: Quarantine, Delete, Delete via BC, Terminate 2732 | | | ?? | 168.07 kb, rsAh, | created: 11.4.2010 14:02:58, modified: 7.2.2006 16:10:04 Command line: "C:\WINDOWS\TEMP\FDD447.EXE" c:\windows\system32\spool\drivers\w32x86\3\fppdis2a.exe | Script: Quarantine, Delete, Delete via BC, Terminate 3056 | pdfFactory | Copyright (c) 2001-2005 FinePrint Software, LLC | ?? | 480.00 kb, rsAh, | created: 8.8.2006 22:08:25, modified: 24.11.2005 11:12:34 Command line: "C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\fppdis2a.exe" /source=HKCU c:\program files\common files\microsoft shared\vs7debug\mdm.exe | Script: Quarantine, Delete, Delete via BC, Terminate 2068 | Machine Debug Manager | © Microsoft Corporation. All rights reserved. | ?? | 314.57 kb, rsAh, | created: 20.6.2003 8:25:00, modified: 20.6.2003 8:25:00 Command line: "C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE" c:\program files\pc connectivity solution\transports\nclbcbtsrv.exe | Script: Quarantine, Delete, Delete via BC, Terminate 4424 | Broadcomm Bluetooth Media Server | Copyright (c) 2007 - 2009 Nokia. All Rights Reserved. | ?? | 156.00 kb, rsAh, | created: 29.10.2009 14:03:34, modified: 29.10.2009 14:03:34 Command line: {29CD04CD-A72D-4231-B18B-B84D653A2C05} c:\program files\thinkpad\utilities\pwmdbsvc.exe | Script: Quarantine, Delete, Delete via BC, Terminate 3860 | PWMDBSVC Module | Copyright 2008 | ?? | 92.00 kb, rsah, | created: 16.12.2009 13:58:21, modified: 25.9.2008 2:47:00 Command line: "C:\Program Files\ThinkPad\Utilities\PWMDBSVC.EXE" c:\program files\common files\research in motion\auto update\rimautoupdate.exe | Script: Quarantine, Delete, Delete via BC, Terminate 3052 | RIM Auto Update | © 1997-2010 Research In Motion Limited. | ?? | 633.34 kb, rsAh, | created: 10.3.2010 22:32:26, modified: 10.3.2010 22:32:26 Command line: "C:\Program Files\Common Files\Research In Motion\Auto Update\RIMAutoUpdate.exe" /background c:\windows\system32\rundll32.exe | Script: Quarantine, Delete, Delete via BC, Terminate 2024 | Run a DLL as an App | © Microsoft Corporation. All rights reserved. | ?? | 32.50 kb, rsAh, | created: 24.9.2009 4:51:25, modified: 4.8.2004 14:00:00 Command line: "C:\WINDOWS\system32\rundll32.exe" C:\PROGRA~1\ThinkPad\UTILIT~1\PWRMGRTR.DLL,PwrMgrBkGndMonitor c:\windows\system32\spoolsv.exe | Script: Quarantine, Delete, Delete via BC, Terminate 1236 | Spooler SubSystem App | © Microsoft Corporation. All rights reserved. | ?? | 56.50 kb, rsah, | created: 24.9.2009 4:51:29, modified: 11.6.2005 1:53:32 Command line: C:\WINDOWS\system32\spoolsv.exe c:\program files\trend micro\officescan client\tmlisten.exe | Script: Quarantine, Delete, Delete via BC, Terminate 3288 | | Copyright (C) 1998-2006 Trend Micro Incorporated. All rights reserved. | ?? | 600.09 kb, rsAh, | created: 7.2.2006 15:48:52, modified: 7.2.2006 15:48:52 Command line: "C:\Program Files\Trend Micro\OfficeScan Client\tmlisten.exe" c:\program files\lenovo\npdirect\tpfnf7sp.exe | Script: Quarantine, Delete, Delete via BC, Terminate 2136 | Presentation Director Fn+F7 handler | Copyright (C) Lenovo 2006. | ?? | 58.78 kb, rsah, | created: 16.12.2009 13:58:34, modified: 31.7.2008 5:01:00 Command line: "C:\Program Files\Lenovo\NPDIRECT\TPFNF7SP.exe" /r c:\windows\system32\winlogon.exe | Script: Quarantine, Delete, Delete via BC, Terminate 1460 | Windows NT Logon Application | © Microsoft Corporation. All rights reserved. | ?? | 490.50 kb, rsah, | created: 24.9.2009 4:51:39, modified: 4.8.2004 14:00:00 Command line: winlogon.exe Detected:68, recognized as trusted 59
| |
Module | Base address | Size in memory | Description | Manufacturer
C:\WINDOWS\System32\Drivers\dump_iaStor.sys | Script: Quarantine, Delete, Delete via BC AC4C9000 | 0DA000 (892928) |
| spfs.sys | Script: Quarantine, Delete, Delete via BC B9EB4000 | 0F3000 (995328) |
| C:\WINDOWS\system32\DRIVERS\TPHKDRV.sys | Script: Quarantine, Delete, Delete via BC B8D9F000 | 005000 (20480) | ThinkPad Hotkey Driver | (C) Lenovo 2005-2008, (C) IBM Corporation 1999-2005.
| Modules found - 215, recognized as trusted - 212
| |
File name | Status | Startup method | Description
ATGinaHook.dll | Script: Quarantine, Delete, Delete via BC -- | Registry key | HKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\Winlogon, GinaDLL
| C:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\RapidShareManager.exe | Script: Quarantine, Delete, Delete via BC Active | File in Startup folder | C:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\RapidShareManager.exe,
| C:\Documents and Settings\robert.janota\Local Settings\Temp\NEventMessages.dll | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Nokia Software Installer, EventMessageFile | Delete C:\Jean\jean.exe | Script: Quarantine, Delete, Delete via BC Active | Shortcut in Startup folder | C:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\JEAN.lnk,
| C:\PROGRA~1\ThinkPad\UTILIT~1\PWRMGRTR.DLL | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, PWRMGRTR | Delete C:\Program Files\Ashampoo\Ashampoo Burning Studio 6 FREE\burningstudio.exe | Script: Quarantine, Delete, Delete via BC Active | Shortcut in Startup folder | C:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\Ashampoo Burning Studio 6 FREE.lnk,
| C:\Program Files\Bonjour\mDNSResponder.exe | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Bonjour Service, EventMessageFile | Delete C:\Program Files\Common Files\Research In Motion\Auto Update\RIMAutoUpdate.exe | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, BlackBerryAutoUpdate | Delete C:\Program Files\Essentials Codec Pack\update.exe | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, Media Codec Update Service | Delete C:\Program Files\Lenovo Fingerprint Software\fpapp.exe | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, FingerPrintSoftware | Delete C:\Program Files\Lenovo\NPDIRECT\TPFNF7SP.exe | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, TPFNF7 | Delete C:\Program Files\Research In Motion\BlackBerry\DesktopMgr.exe | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Synchronize, EventMessageFile | Delete C:\Program Files\Research In Motion\BlackBerry\DesktopMgr.exe | Script: Quarantine, Delete, Delete via BC Active | Shortcut in Startup folder | C:\Documents and Settings\All Users\Start Menu\Programs\Startup\, C:\Documents and Settings\All Users\Start Menu\Programs\Startup\BlackBerry Desktop Manager.lnk,
| C:\Program Files\Research In Motion\BlackBerry\DesktopMgr.exe | Script: Quarantine, Delete, Delete via BC Active | Shortcut in Startup folder | C:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\BlackBerry Desktop Manager.lnk,
| C:\Program Files\Roxio\Media Manager 9\MediaManager9.exe | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\RIMDeviceFileAccess, EventMessageFile | Delete C:\Program Files\Zoner\Photo Studio 9\Program\Zps9.exe | Script: Quarantine, Delete, Delete via BC Active | Shortcut in Startup folder | C:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\Zoner Photo Studio 9.lnk,
| C:\Program Files\pdaBusiness\Qlock\Qlock.exe | Script: Quarantine, Delete, Delete via BC Active | Shortcut in Startup folder | C:\Documents and Settings\All Users\Start Menu\Programs\Startup\, C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Qlock.lnk,
| C:\WINDOWS\Installer\{075F852B-6A58-44D0-A46F-81B13589C637}\Icon075F852B.exe | Script: Quarantine, Delete, Delete via BC Active | Shortcut in Startup folder | C:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\robert.janota\Application Data\Microsoft\Internet Explorer\Quick Launch\PC Translator 2004.lnk,
| C:\WINDOWS\System32\PrintFilterPipelineSvc.exe | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\PrintFilterPipelineSvc, EventMessageFile | Delete C:\WINDOWS\System32\hidserv.dll | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\HidServ\Parameters, ServiceDll | Delete C:\WINDOWS\System32\igmpv2.dll | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IGMPv2, EventMessageFile | Delete C:\WINDOWS\System32\ipbootp.dll | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IPBOOTP, EventMessageFile | Delete C:\WINDOWS\System32\iprip2.dll | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IPRIP2, EventMessageFile | Delete C:\WINDOWS\System32\ospf.dll | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\OSPF, EventMessageFile | Delete C:\WINDOWS\System32\ospfmib.dll | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\OSPFMib, EventMessageFile | Delete C:\WINDOWS\System32\polagent.dll | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\PolicyAgent, EventMessageFile | Delete C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\fppdis2a.exe | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_CURRENT_USER, Software\Microsoft\Windows\CurrentVersion\Run, pdfFactory Pro Dispatcher v2 | Delete C:\WINDOWS\System32\tssdis.exe | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\TermServSessDir, EventMessageFile | Delete C:\WINDOWS\system | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\ATService, EventMessageFile | Delete C:\WINDOWS\system32\FpWinLogonNp.dll | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\ATFUS, DLLName | Delete C:\WINDOWS\system32\MsSip1.dll | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 1, $DLL | Delete C:\WINDOWS\system32\MsSip2.dll | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 2, $DLL | Delete C:\WINDOWS\system32\MsSip3.dll | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 3, $DLL | Delete C:\WINDOWS\system32\dfrg.msc %c: | Script: Quarantine, Delete, Delete via BC -- | Registry key | HKEY_LOCAL_MACHINE, SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\DefragPath,
| C:\WINDOWS\system32\psxss.exe | Script: Quarantine, Delete, Delete via BC -- | Registry key | HKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Session Manager\SubSystems, Posix
| C:\WINDOWS\system32\stisvc.exe | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System, EventMessageFile | Delete SDEvents.dll | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Spybot - Search & Destroy 2, EventMessageFile | Delete kbd101.dll | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\i8042prt\Parameters, LayerDriver JPN | Delete kbd101a.dll | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\i8042prt\Parameters, LayerDriver KOR | Delete mvfs32.dll | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_USERS, .DEFAULT\Control Panel\IOProcs, MVB | Delete mvfs32.dll | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_USERS, S-1-5-19\Control Panel\IOProcs, MVB | Delete mvfs32.dll | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_USERS, S-1-5-20\Control Panel\IOProcs, MVB | Delete mvfs32.dll | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_USERS, S-1-5-18\Control Panel\IOProcs, MVB | Delete mvfs32.dll | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_CURRENT_USER, Control Panel\IOProcs, MVB | Delete vgafix.fon | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fixedfon.fon | Delete vgaoem.fon | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, oemfonts.fon | Delete vgasys.fon | Script: Quarantine, Delete, Delete via BC Active | Registry key | HKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fonts.fon | Delete Autoruns items found - 631, recognized as trusted - 584
| |
File name | Type | Description | Manufacturer | CLSID
C:\TRANSLAT\WEBIE.DL_ | Script: Quarantine, Delete, Delete via BC Toolbar | WebTranslator Module | Copyright 2002 | {BFC32E1D-EE75-4A48-BC60-104E11EE2431} | Delete Toolbar | {855F3B16-6D32-4FE6-8A56-BBB695989046} | Delete C:\TRANSLAT\WEBIE.DL_ | Script: Quarantine, Delete, Delete via BC Extension module | WebTranslator Module | Copyright 2002 | {BFC32E1D-EE75-4A48-BC60-104E11EE2431} | Delete C:\TRANSLAT\WEBIE.DL_ | Script: Quarantine, Delete, Delete via BC Extension module | WebTranslator Module | Copyright 2002 | {CC963627-B1DC-40E0-B52A-CF21EE748450} | Delete C:\TRANSLAT\WEBIE.DL_ | Script: Quarantine, Delete, Delete via BC Extension module | WebTranslator Module | Copyright 2002 | {CC963627-B1DC-40E0-B52A-CF21EE748451} | Delete C:\TRANSLAT\WEBIE.DL_ | Script: Quarantine, Delete, Delete via BC Extension module | WebTranslator Module | Copyright 2002 | {CC963627-B1DC-40E0-B52A-CF21EE748452} | Delete C:\Program Files\ThinkPad\Bluetooth Software\btsendto_ie.htm | Script: Quarantine, Delete, Delete via BC Extension module | {CCA281CA-C863-46ef-9331-5C8D4460577F} | Delete URLSearchHook | {855F3B16-6D32-4fe6-8A56-BBB695989046} | Delete Items found - 17, recognized as trusted - 9
| |
File name | Destination | Description | Manufacturer | CLSID
deskpan.dll | Script: Quarantine, Delete, Delete via BC Display Panning CPL Extension | {42071714-76d4-11d1-8b24-00a0c9068ff3} | Delete Shell extensions for file compression | {764BF0E1-F219-11ce-972D-00AA00A14F56} | Delete Encryption Context Menu | {853FE2B1-B769-11d0-9C4E-00C04FB6C6FA} | Delete Taskbar and Start Menu | {0DF44EAA-FF21-4412-828E-260A8728E7F1} | Delete rundll32.exe C:\WINDOWS\system32\shimgvw.dll,ImageView_COMServer {00E7B358-F65B-4dcf-83DF-CD026B94BFD4} | Script: Quarantine, Delete, Delete via BC Autoplay for SlideShow | {00E7B358-F65B-4dcf-83DF-CD026B94BFD4} | Delete User Accounts | {7A9D77BD-5403-11d2-8785-2E0420524153} | Delete
| C:\WINDOWS\system32\BTNEIG~1.DLL | Script: Quarantine, Delete, Delete via BC My Bluetooth Places | BTNeighborhood DLL | Copyright 2000-2008, Broadcom Corporation. | {6af09ec9-b429-11d4-a1fb-0090960218cb} | Delete C:\WINDOWS\system32\btncopy.dll | Script: Quarantine, Delete, Delete via BC Monitor | BTNCopy Module | Copyright 2000-2008, Broadcom Corporation. | {7842554E-6BED-11D2-8CDB-B05550C10000} | Delete Microsoft Office Metadata Handler | {993BE281-6695-4BA5-8A2A-7AACBFAAB69E} | Delete Microsoft Office Thumbnail Handler | {C41662BB-1FA0-4CE0-8DC5-9B7F8279FF97} | Delete IE User Assist | {FAC3CBF6-8697-43d0-BAB9-DCD1FCE19D75} | Delete Items found - 220, recognized as trusted - 208
| |
File name | Type | Name | Description | Manufacturer
C:\WINDOWS\system32\lmdimon.dll | Script: Quarantine, Delete, Delete via BC Monitor | Microsoft Office Live Meeting Document Writer Monitor | Microsoft® Live Meeting | Copyright (C) Microsoft Corp. 2001-2004
| C:\WINDOWS\system32\bthcrp.dll | Script: Quarantine, Delete, Delete via BC Monitor | Port tiskárny Bluetooth | bthcrp DLL | Copyright 2000-2008, Broadcom Corporation.
| Items found - 13, recognized as trusted - 11
| |
File name | Job name | Job state | Description | Manufacturer
C:\PROGRA~1\ThinkPad\UTILIT~1\PWMIDTSK.EXE | Script: Quarantine, Delete, Delete via BC PMTask.job | The task will not run at the scheduled times because it has been disabled. |
| Items found - 4, recognized as trusted - 3
| |
Manufacturer | Status | EXE file | Description | GUID
Detected - 3, recognized as trusted - 3
| |
Manufacturer | EXE file | Description
Detected - 23, recognized as trusted - 23
| |
File name | Description | Manufacturer | CLSID | Source URL
Items found - 4, recognized as trusted - 4
| |
File name | Description | Manufacturer
C:\WINDOWS\system32\btcpl.cpl | Script: Quarantine, Delete, Delete via BC Bluetooth Control Panel | Copyright 2000-2008, Broadcom Corporation.
| Items found - 29, recognized as trusted - 28
| |
File name | Description | Manufacturer | CLSID
Items found - 15, recognized as trusted - 15
| |
Hosts file record
|
File name | Type | Description | Manufacturer | CLSID
mscoree.dll | Script: Quarantine, Delete, Delete via BC Protocol | Microsoft .NET Runtime Execution Engine () | © Microsoft Corporation. All rights reserved. | {1E66F26B-79EE-11D2-8710-00C04F79ED0D}
| mscoree.dll | Script: Quarantine, Delete, Delete via BC Protocol | Microsoft .NET Runtime Execution Engine () | © Microsoft Corporation. All rights reserved. | {1E66F26B-79EE-11D2-8710-00C04F79ED0D}
| mscoree.dll | Script: Quarantine, Delete, Delete via BC Protocol | Microsoft .NET Runtime Execution Engine () | © Microsoft Corporation. All rights reserved. | {1E66F26B-79EE-11D2-8710-00C04F79ED0D}
| Items found - 31, recognized as trusted - 28
| |
File | Description | Type
C:\WINDOWS\System32\Drivers\aswSP.SYS | Script: Quarantine, Delete, Delete via BC Suspicion for Rootkit | Kernel-mode hook
| C:\System Volume Information\_restore{9AB2435C-DE2B-4478-9105-C7393117FEFB}\RP31\A0046811.exe | Script: Quarantine, Delete, Delete via BC Suspicion by File scanner | Suspicion for Backdoor.Win32.Eclypse ( 0041F192 00186D09 00178E59 0009F1EA 40960)
| C:\System Volume Information\_restore{9AB2435C-DE2B-4478-9105-C7393117FEFB}\RP31\A0046813.exe | Script: Quarantine, Delete, Delete via BC Suspicion by File scanner | Suspicion for Backdoor.Win32.Eclypse ( 0041F192 00186D09 00178E59 0009F1EA 40960)
| |
AVZ Antiviral Toolkit log; AVZ version is 4.32 Scanning started at 11.4.2010 14:10:12 Database loaded: signatures - 270034, NN profile(s) - 2, malware removal microprograms - 56, signature database released 10.04.2010 22:53 Heuristic microprograms loaded: 382 PVS microprograms loaded: 9 Digital signatures of system files loaded: 194145 Heuristic analyzer mode: Medium heuristics mode Malware removal mode: enabled Windows version is: 5.1.2600, Service Pack 2 ; AVZ is run with administrator rights System Restore: enabled 1. Searching for Rootkits and other software intercepting API functions 1.1 Searching for user-mode API hooks Analysis: kernel32.dll, export table found in section .text Analysis: ntdll.dll, export table found in section .text Analysis: user32.dll, export table found in section .text Analysis: advapi32.dll, export table found in section .text Analysis: ws2_32.dll, export table found in section .text Analysis: wininet.dll, export table found in section .text Analysis: rasapi32.dll, export table found in section .text Analysis: urlmon.dll, export table found in section .text Analysis: netapi32.dll, export table found in section .text 1.2 Searching for kernel-mode API hooks Driver loaded successfully SDT found (RVA=0846E0) Kernel ntkrnlpa.exe found in memory at address 804D7000 SDT = 8055B6E0 KiST = 80503960 (284) Functions checked: 284, intercepted: 0, restored: 0 1.3 Checking IDT and SYSENTER Analyzing CPU 1 Analyzing CPU 2 CmpCallCallBacks = 00092D3C Disable callback - ??? ??????????????? Checking IDT and SYSENTER - complete 1.4 Searching for masking processes and drivers Checking not performed: extended monitoring driver (AVZPM) is not installed Driver loaded successfully 1.5 Checking IRP handlers \FileSystem\ntfs[IRP_MJ_CREATE] = AC5DFFEE -> C:\WINDOWS\System32\Drivers\aswSP.SYS, driver recognized as trusted \FileSystem\ntfs[IRP_MJ_CLOSE] = AC5E002E -> C:\WINDOWS\System32\Drivers\aswSP.SYS, driver recognized as trusted \FileSystem\ntfs[IRP_MJ_WRITE] = AC5E010A -> C:\WINDOWS\System32\Drivers\aswSP.SYS, driver recognized as trusted \FileSystem\ntfs[IRP_MJ_QUERY_INFORMATION] = 8A5C91F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_SET_INFORMATION] = AC5E014A -> C:\WINDOWS\System32\Drivers\aswSP.SYS, driver recognized as trusted \FileSystem\ntfs[IRP_MJ_QUERY_EA] = 8A5C91F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_SET_EA] = 8A5C91F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_QUERY_VOLUME_INFORMATION] = 8A5C91F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_SET_VOLUME_INFORMATION] = 8A5C91F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_DIRECTORY_CONTROL] = 8A5C91F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_FILE_SYSTEM_CONTROL] = 8A5C91F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_DEVICE_CONTROL] = 8A5C91F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_LOCK_CONTROL] = 8A5C91F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_QUERY_SECURITY] = 8A5C91F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_SET_SECURITY] = 8A5C91F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_PNP] = 8A5C91F8 -> hook not defined \FileSystem\FastFat[IRP_MJ_CREATE] = 892191F8 -> hook not defined \FileSystem\FastFat[IRP_MJ_CLOSE] = 892191F8 -> hook not defined \FileSystem\FastFat[IRP_MJ_WRITE] = 892191F8 -> hook not defined \FileSystem\FastFat[IRP_MJ_QUERY_INFORMATION] = 892191F8 -> hook not defined \FileSystem\FastFat[IRP_MJ_SET_INFORMATION] = 892191F8 -> hook not defined \FileSystem\FastFat[IRP_MJ_QUERY_EA] = 892191F8 -> hook not defined \FileSystem\FastFat[IRP_MJ_SET_EA] = 892191F8 -> hook not defined \FileSystem\FastFat[IRP_MJ_QUERY_VOLUME_INFORMATION] = 892191F8 -> hook not defined \FileSystem\FastFat[IRP_MJ_SET_VOLUME_INFORMATION] = 892191F8 -> hook not defined \FileSystem\FastFat[IRP_MJ_DIRECTORY_CONTROL] = 892191F8 -> hook not defined \FileSystem\FastFat[IRP_MJ_FILE_SYSTEM_CONTROL] = 892191F8 -> hook not defined \FileSystem\FastFat[IRP_MJ_DEVICE_CONTROL] = 892191F8 -> hook not defined \FileSystem\FastFat[IRP_MJ_LOCK_CONTROL] = 892191F8 -> hook not defined \FileSystem\FastFat[IRP_MJ_PNP] = 892191F8 -> hook not defined Checking - complete 2. Scanning RAM Number of processes found: 66 Number of modules loaded: 474 Scanning RAM - complete 3. Scanning disks C:\System Volume Information\_restore{9AB2435C-DE2B-4478-9105-C7393117FEFB}\RP31\A0046811.exe >>> suspicion for Backdoor.Win32.Eclypse ( 0041F192 00186D09 00178E59 0009F1EA 40960) C:\System Volume Information\_restore{9AB2435C-DE2B-4478-9105-C7393117FEFB}\RP31\A0046813.exe >>> suspicion for Backdoor.Win32.Eclypse ( 0041F192 00186D09 00178E59 0009F1EA 40960) Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\EndpointQueues\execmgr\00000002.msg Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\EndpointQueues\InventoryAgent\00000004.msg Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\EndpointQueues\LS_ReplyLocations\00000001.msg Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\EndpointQueues\LS_ScheduledCleanup\0000000H.msg Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\EndpointQueues\PolicyAgent_Cleanup\00000009.msg Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\EndpointQueues\PolicyAgent_PolicyDownload\00000001.msg Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\EndpointQueues\PolicyAgent_PolicyEvaluator\000000BX.msg Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\EndpointQueues\PolicyAgent_ReplyAssignments\00000001.msg Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\EndpointQueues\SrcUpdateMgr\00000001.msg Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\OutgoingQueues\amp_[http]mp_locationmanager\0000000P.msg Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\OutgoingQueues\mp_mp_ddrendpoint\00000001.msg Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\OutgoingQueues\mp_mp_hinvendpoint\00000001.msg Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\OutgoingQueues\mp_mp_sinvendpoint\00000001.msg Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\OutgoingQueues\mp_statusreceiver\00000005.msg Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\OutgoingQueues\mp_statusreceiver\00000006.msg Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\OutgoingQueues\mp_[http]mp_locationmanager\0000000W.msg Direct reading: C:\WINDOWS\system32\CCM\ServiceData\Messaging\OutgoingQueues\mp_[http]mp_policymanager\0000003O.msg Direct reading: C:\WINDOWS\system32\drivers\sptd.sys Direct reading: C:\WINDOWS\system32\kbdblrr.dll 4. Checking Winsock Layered Service Provider (SPI/LSP) LSP settings checked. No errors detected 5. Searching for keyboard/mouse/windows events hooks (Keyloggers, Trojan DLLs) 6. Searching for opened TCP/UDP ports used by malicious software Checking - disabled by user 7. Heuristic system check Checking - complete 8. Searching for vulnerabilities >> Services: potentially dangerous service allowed: RemoteRegistry (Remote Registry) >> Services: potentially dangerous service allowed: TermService (Terminal Services) >> Services: potentially dangerous service allowed: SSDPSRV (SSDP Discovery Service) >> Services: potentially dangerous service allowed: TlntSvr (Telnet) >> Services: potentially dangerous service allowed: Schedule (Task Scheduler) >> Services: potentially dangerous service allowed: mnmsrvc (NetMeeting Remote Desktop Sharing) >> Services: potentially dangerous service allowed: RDSessMgr (Remote Desktop Help Session Manager) > Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)! >> Security: disk drives' autorun is enabled >> Security: administrative shares (C$, D$ ...) are enabled >> Security: anonymous user access is enabled >> Security: sending Remote Assistant queries is enabled Checking - complete 9. Troubleshooting wizard >> HDD autorun is allowed >> Network drives autorun is allowed >> Removable media autorun is allowed Checking - complete Files scanned: 173345, extracted from archives: 149714, malicious software found 0, suspicions - 2 Scanning finished at 11.4.2010 14:45:52 Time of scanning: 00:35:41 If you have a suspicion on presence of viruses or questions on the suspected objects, you can address http://virusinfo.info conference Creating archive of files from Quarantine Creating archive of files from Quarantine - complete System Analysis in progressAdd commands to script:
Script commands