Results of system analysis

AVZ 4.37 http://z-oleg.com/secur/avz/

Process List

File namePIDDescriptionCopyrightMD5Information
c:\program files\adobe\acrobat 9.0\acrobat\acrotray.exe
Script: Quarantine, Delete, Delete via BC, Terminate
376AcroTrayCopyright 1984-2010 Adobe Systems Incorporated and its licensors. All rights reserved.??625.43 kb, rsAh,
created: 25.10.2009 13:56:30,
modified: 22.09.2010 18:11:26
Command line:
"C:\Program Files\Adobe\Acrobat 9.0\Acrobat\Acrotray.exe"
c:\program files\betclic poker.com\betclic pokercom.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1756  ??822.50 kb, rsAh,
created: 08.09.2011 17:39:05,
modified: 22.10.2011 08:38:27
Command line:
"C:\Program Files\BetClic Poker.com\BetClic Pokercom.exe" /wait 1636 /clone
c:\program files\canon\myprinter\bjmyprt.exe
Script: Quarantine, Delete, Delete via BC, Terminate
408Canon My PrinterCopyright 2004-2007 CANON INC. All Rights Reserved.??1565.58 kb, rsAh,
created: 25.10.2009 16:55:57,
modified: 03.04.2007 18:50:00
Command line:
"C:\Program Files\Canon\MyPrinter\BJMyPrt.exe" /logon
c:\program files\ati technologies\ati.ace\cli.exe
Script: Quarantine, Delete, Delete via BC, Terminate
2320CLI Application (Command Line Interface)2002-2005??44.00 kb, rsAh,
created: 02.01.2006 17:41:22,
modified: 02.01.2006 17:41:22
Command line:
"C:\Program Files\ATI Technologies\ATI.ACE\cli.exe" -hide Dashboard
c:\program files\ati technologies\ati.ace\cli.exe
Script: Quarantine, Delete, Delete via BC, Terminate
440CLI Application (Command Line Interface)2002-2005??44.00 kb, rsAh,
created: 02.01.2006 17:41:22,
modified: 02.01.2006 17:41:22
Command line:
"C:\Program Files\ATI Technologies\ATI.ACE\cli.exe" runtime -Delay
c:\program files\ati technologies\ati.ace\cli.exe
Script: Quarantine, Delete, Delete via BC, Terminate
2156CLI Application (Command Line Interface)2002-2005??44.00 kb, rsAh,
created: 02.01.2006 17:41:22,
modified: 02.01.2006 17:41:22
Command line:
"C:\Program Files\ATI Technologies\ATI.ACE\cli.exe" -hide SystemTray
c:\windows\explorer.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1672Průzkumník Windows© Microsoft Corporation. Všechna práva vyhrazena.??1010.00 kb, rsAh,
created: 14.04.2008 10:52:24,
modified: 14.04.2008 10:52:24
Command line:
C:\WINDOWS\Explorer.EXE
c:\program files\java\jre6\bin\jqs.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1412Java(TM) Quick Starter ServiceCopyright © 2011??149.78 kb, rsAh,
created: 23.10.2009 19:09:23,
modified: 03.10.2011 05:06:18
Command line:
"C:\Program Files\Java\jre6\bin\jqs.exe" -service -config "C:\Program Files\Java\jre6\lib\deploy\jqs\jqs.conf"
c:\program files\the kmplayer\kmplayer.exe
Script: Quarantine, Delete, Delete via BC, Terminate
504The KMPlayerCopyright Pandora.TV 2009.??6749.00 kb, rsAh,
created: 03.11.2010 10:05:54,
modified: 03.11.2010 10:05:54
Command line:
"C:\Program Files\The KMPlayer\KMPlayer.exe" "C:\Documents and Settings\Skot\Dokumenty\Stažené soubory\velka-vlastenecka-valka-1978-dvdrip-czdub-1-dil.avi"
c:\program files\microsoft office\office12\onenotem.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1884Microsoft Office OneNote Quick Launcher© 2006 Microsoft Corporation. All rights reserved.??95.39 kb, rsAh,
created: 26.02.2009 15:24:50,
modified: 26.02.2009 15:24:50
Command line:
"C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE" /tsr
c:\windows\system32\pnkbstrb.exe
Script: Quarantine, Delete, Delete via BC, Terminate
232  ??185.30 kb, rsAh,
created: 24.11.2009 17:16:36,
modified: 24.11.2009 17:19:06
Command line:
C:\WINDOWS\system32\PnkBstrB.exe
c:\windows\update.tray-2-0-lnk\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
4016Roman Plan Bass Net Nine TerseHuey © Macro Rams 1996-2010??1170.00 kb, rsaH,
created: 27.10.2011 15:11:56,
modified: 27.10.2011 14:58:30
Command line:
"C:\WINDOWS\update.tray-2-0-lnk\svchost.exe" tray 2-0 1
Detected:40, recognized as trusted 37
Module nameHandleDescriptionCopyrightMD5Used by processes
C:\Documents and Settings\Skot\Plocha\ShellExtend.dll
Script: Quarantine, Delete, Delete via BC
67502080PowerTool????Copyright @ 2010. All rights reserved.--1672
C:\Program Files\Adobe\Acrobat 9.0\Acrobat Elements\ContextMenu.cze
Script: Quarantine, Delete, Delete via BC
57344000Adobe Acrobat Context MenuCopyright 1984-2009 Adobe Systems Incorporated and its licensors. All rights reserved.--1672
C:\Program Files\Adobe\Acrobat 9.0\Acrobat\Acrotray.cze
Script: Quarantine, Delete, Delete via BC
268435456  --376
C:\Program Files\Adobe\Acrobat 9.0\Acrobat\AcroTray.HUN
Script: Quarantine, Delete, Delete via BC
12648448  --376
C:\Program Files\Adobe\Acrobat 9.0\Acrobat\AcroTray.POL
Script: Quarantine, Delete, Delete via BC
12779520  --376
C:\Program Files\Adobe\Acrobat 9.0\Acrobat\AcroTray.SKY
Script: Quarantine, Delete, Delete via BC
13500416  --376
c:\program files\ati technologies\ati.ace\cs\cli.component.systemtray.resources.dll
Script: Quarantine, Delete, Delete via BC
60489728SystemTray Component2002-2004--2156
C:\Program Files\BetClic Poker.com\GVBASE.dll
Script: Quarantine, Delete, Delete via BC
21037056  --1756
C:\Program Files\BetClic Poker.com\gvgfx-dib.dll
Script: Quarantine, Delete, Delete via BC
22020096  --1756
C:\Program Files\BetClic Poker.com\gvgfx.dll
Script: Quarantine, Delete, Delete via BC
22282240  --1756
C:\Program Files\BetClic Poker.com\gvmain.dll
Script: Quarantine, Delete, Delete via BC
268435456  --1756
C:\Program Files\BetClic Poker.com\gvnetwork.dll
Script: Quarantine, Delete, Delete via BC
21757952  --1756
C:\Program Files\BetClic Poker.com\gvsound.dll
Script: Quarantine, Delete, Delete via BC
23527424  --1756
C:\Program Files\Canon\MyPrinter\BJMyRes.dll
Script: Quarantine, Delete, Delete via BC
268435456Canon My PrinterCopyright 2004-2007 CANON INC. All Rights Reserved.--408
C:\Program Files\Java\jre6\bin\awt.dll
Script: Quarantine, Delete, Delete via BC
1828716544Java(TM) Platform SE binaryCopyright © 2011--1412
C:\Program Files\Microsoft Office\Office12\1029\GrooveIntlResource.dll
Script: Quarantine, Delete, Delete via BC
58523648GrooveIntlResource Module© 2007 Microsoft Corporation. Všechna práva vyhrazena.--1672
C:\Program Files\Microsoft Office\Office12\1029\ONINTL.DLL
Script: Quarantine, Delete, Delete via BC
869269504Microsoft Office OneNote International Resources© 2007 Microsoft Corporation. Všechna práva vyhrazena.--1884
C:\Program Files\The KMPlayer\MediaInfo.Dll
Script: Quarantine, Delete, Delete via BC
186777600Library to read info about media filesLGPL--504
c:\windows\assembly\nativeimages1_v1.1.4322\mscorlib\1.0.5000.0__b77a5c561934e089_bac559f2\mscorlib.dll
Script: Quarantine, Delete, Delete via BC
2040070144  --2320, 440, 2156
c:\windows\assembly\nativeimages1_v1.1.4322\system.drawing\1.0.5000.0__b03f5f7f11d50a3a_378a6441\system.drawing.dll
Script: Quarantine, Delete, Delete via BC
2068905984  --2320, 440, 2156
c:\windows\assembly\nativeimages1_v1.1.4322\system.windows.forms\1.0.5000.0__b77a5c561934e089_5411ebef\system.windows.forms.dll
Script: Quarantine, Delete, Delete via BC
2072051712  --2320, 440, 2156
c:\windows\assembly\nativeimages1_v1.1.4322\system.xml\1.0.5000.0__b77a5c561934e089_7871e94f\system.xml.dll
Script: Quarantine, Delete, Delete via BC
2077622272  --2320, 440, 2156
c:\windows\assembly\nativeimages1_v1.1.4322\system\1.0.5000.0__b77a5c561934e089_b1ae4de2\system.dll
Script: Quarantine, Delete, Delete via BC
2065498112  --2320, 440, 2156
C:\WINDOWS\Microsoft.NET\Framework\v1.1.4322\CorperfmonExt.dll
Script: Quarantine, Delete, Delete via BC
2037776384Microsoft Common Language Runtime - WorkStationCopyright © Microsoft Corporation 1998-2002. All rights reserved.--2320, 440, 2156, 1412
Modules found:560, recognized as trusted 536

Kernel Space Modules Viewer

ModuleBase addressSize in memoryDescriptionManufacturer
C:\WINDOWS\System32\Drivers\abwkomsr.SYS
Script: Quarantine, Delete, Delete via BC
F732E000066000 (417792)
C:\WINDOWS\System32\Drivers\dump_atapi.sys
Script: Quarantine, Delete, Delete via BC
BA518000018000 (98304)
C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Script: Quarantine, Delete, Delete via BC
F8A8B000002000 (8192)
C:\WINDOWS\system32\DRIVERS\eamon.sys
Script: Quarantine, Delete, Delete via BC
B83590000A7000 (684032)Amon monitorCopyright (c) ESET 1992-2010. All rights reserved.
C:\WINDOWS\system32\DRIVERS\epfw.sys
Script: Quarantine, Delete, Delete via BC
B830F000022000 (139264)ESET Personal Firewall driverCopyright (c) ESET 1992-2010. All rights reserved.
C:\WINDOWS\system32\DRIVERS\epfwtdi.sys
Script: Quarantine, Delete, Delete via BC
BA71B000012000 (73728)ESET Personal Firewall TDI filterCopyright (c) ESET 1992-2010. All rights reserved.
C:\WINDOWS\system32\DRIVERS\epfwtdir.sys
Script: Quarantine, Delete, Delete via BC
BA6DB000018000 (98304)ESET Antivirus Network RedirectorCopyright (c) ESET 1992-2010. All rights reserved.
C:\Documents and Settings\Skot\Plocha\kEvP.sys
Script: Quarantine, Delete, Delete via BC
B6FF7000026000 (155648)
lfxekk.sys
Script: Quarantine, Delete, Delete via BC
F853500000E000 (57344)
C:\WINDOWS\system32\Drivers\sptd.sys
Script: Quarantine, Delete, Delete via BC
F842C0000E8000 (950272)
Modules found - 127, recognized as trusted - 117

Services

ServiceDescriptionStatusFileGroupDependencies
PnkBstrB
Service: Stop, Delete, Disable, Delete via BC
PnkBstrBRunningC:\WINDOWS\system32\PnkBstrB.exe
Script: Quarantine, Delete, Delete via BC
  
EhttpSrv
Service: Stop, Delete, Disable, Delete via BC
ESET HTTP ServerNot startedC:\Program Files\ESET\ESET NOD32 Antivirus\EHttpSrv.exe
Script: Quarantine, Delete, Delete via BC
  
ekrn
Service: Stop, Delete, Disable, Delete via BC
ESET ServiceNot startedC:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe
Script: Quarantine, Delete, Delete via BC
  
McComponentHostService
Service: Stop, Delete, Disable, Delete via BC
McAfee Security Scan Component Host ServiceNot startedC:\Program Files\McAfee Security Scan\2.0.181\McCHSvc.exe
Script: Quarantine, Delete, Delete via BC
 RPCSS
WinDefend
Service: Stop, Delete, Disable, Delete via BC
Windows DefenderNot startedC:\Program Files\Windows Defender\MsMpEng.exe
Script: Quarantine, Delete, Delete via BC
COM InfrastructureRpcSs
Detected - 99, recognized as trusted - 94

Drivers

ServiceDescriptionStatusFileGroupDependencies
eamon
Driver: Unload, Delete, Disable, Delete via BC
eamonRunningC:\WINDOWS\system32\DRIVERS\eamon.sys
Script: Quarantine, Delete, Delete via BC
FSFilter Anti-Virus 
epfw
Driver: Unload, Delete, Disable, Delete via BC
epfwRunningC:\WINDOWS\system32\DRIVERS\epfw.sys
Script: Quarantine, Delete, Delete via BC
Streams Drivers 
epfwtdi
Driver: Unload, Delete, Disable, Delete via BC
epfwtdiRunningC:\WINDOWS\system32\DRIVERS\epfwtdi.sys
Script: Quarantine, Delete, Delete via BC
PNP_TDITcpip
epfwtdir
Driver: Unload, Delete, Disable, Delete via BC
epfwtdirRunningC:\WINDOWS\system32\DRIVERS\epfwtdir.sys
Script: Quarantine, Delete, Delete via BC
PNP_TDITcpip
sptd
Driver: Unload, Delete, Disable, Delete via BC
sptdRunningC:\WINDOWS\System32\Drivers\sptd.sys
Script: Quarantine, Delete, Delete via BC
Boot Bus Extender 
Abiosdsk
Driver: Unload, Delete, Disable, Delete via BC
AbiosdskNot startedAbiosdsk.sys
Script: Quarantine, Delete, Delete via BC
Primary disk 
abp480n5
Driver: Unload, Delete, Disable, Delete via BC
abp480n5Not startedabp480n5.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
adpu160m
Driver: Unload, Delete, Disable, Delete via BC
adpu160mNot startedadpu160m.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Aha154x
Driver: Unload, Delete, Disable, Delete via BC
Aha154xNot startedAha154x.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
aic78u2
Driver: Unload, Delete, Disable, Delete via BC
aic78u2Not startedaic78u2.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
aic78xx
Driver: Unload, Delete, Disable, Delete via BC
aic78xxNot startedaic78xx.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
AliIde
Driver: Unload, Delete, Disable, Delete via BC
AliIdeNot startedAliIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
amsint
Driver: Unload, Delete, Disable, Delete via BC
amsintNot startedamsint.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
asc
Driver: Unload, Delete, Disable, Delete via BC
ascNot startedasc.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
asc3350p
Driver: Unload, Delete, Disable, Delete via BC
asc3350pNot startedasc3350p.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
asc3550
Driver: Unload, Delete, Disable, Delete via BC
asc3550Not startedasc3550.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Atdisk
Driver: Unload, Delete, Disable, Delete via BC
AtdiskNot startedAtdisk.sys
Script: Quarantine, Delete, Delete via BC
Primary disk 
catchme
Driver: Unload, Delete, Disable, Delete via BC
catchmeNot startedC:\ComboFix\catchme.sys
Script: Quarantine, Delete, Delete via BC
Base 
cd20xrnt
Driver: Unload, Delete, Disable, Delete via BC
cd20xrntNot startedcd20xrnt.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Changer
Driver: Unload, Delete, Disable, Delete via BC
ChangerNot startedChanger.sys
Script: Quarantine, Delete, Delete via BC
Filter 
CmdIde
Driver: Unload, Delete, Disable, Delete via BC
CmdIdeNot startedCmdIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
Cpqarray
Driver: Unload, Delete, Disable, Delete via BC
CpqarrayNot startedCpqarray.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
dac960nt
Driver: Unload, Delete, Disable, Delete via BC
dac960ntNot starteddac960nt.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
dpti2o
Driver: Unload, Delete, Disable, Delete via BC
dpti2oNot starteddpti2o.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
hpn
Driver: Unload, Delete, Disable, Delete via BC
hpnNot startedhpn.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
i2omgmt
Driver: Unload, Delete, Disable, Delete via BC
i2omgmtNot startedi2omgmt.sys
Script: Quarantine, Delete, Delete via BC
SCSI Class 
i2omp
Driver: Unload, Delete, Disable, Delete via BC
i2ompNot startedi2omp.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ini910u
Driver: Unload, Delete, Disable, Delete via BC
ini910uNot startedini910u.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
lbrtfdc
Driver: Unload, Delete, Disable, Delete via BC
lbrtfdcNot startedlbrtfdc.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
mraid35x
Driver: Unload, Delete, Disable, Delete via BC
mraid35xNot startedmraid35x.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
PCIDump
Driver: Unload, Delete, Disable, Delete via BC
PCIDumpNot startedPCIDump.sys
Script: Quarantine, Delete, Delete via BC
PCI Configuration 
PDCOMP
Driver: Unload, Delete, Disable, Delete via BC
PDCOMPNot startedPDCOMP.sys
Script: Quarantine, Delete, Delete via BC
  
PDFRAME
Driver: Unload, Delete, Disable, Delete via BC
PDFRAMENot startedPDFRAME.sys
Script: Quarantine, Delete, Delete via BC
  
PDRELI
Driver: Unload, Delete, Disable, Delete via BC
PDRELINot startedPDRELI.sys
Script: Quarantine, Delete, Delete via BC
  
PDRFRAME
Driver: Unload, Delete, Disable, Delete via BC
PDRFRAMENot startedPDRFRAME.sys
Script: Quarantine, Delete, Delete via BC
  
perc2
Driver: Unload, Delete, Disable, Delete via BC
perc2Not startedperc2.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
perc2hib
Driver: Unload, Delete, Disable, Delete via BC
perc2hibNot startedperc2hib.sys
Script: Quarantine, Delete, Delete via BC
Filter 
ql1080
Driver: Unload, Delete, Disable, Delete via BC
ql1080Not startedql1080.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Ql10wnt
Driver: Unload, Delete, Disable, Delete via BC
Ql10wntNot startedQl10wnt.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ql12160
Driver: Unload, Delete, Disable, Delete via BC
ql12160Not startedql12160.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ql1240
Driver: Unload, Delete, Disable, Delete via BC
ql1240Not startedql1240.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ql1280
Driver: Unload, Delete, Disable, Delete via BC
ql1280Not startedql1280.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Simbad
Driver: Unload, Delete, Disable, Delete via BC
SimbadNot startedSimbad.sys
Script: Quarantine, Delete, Delete via BC
Filter 
Sparrow
Driver: Unload, Delete, Disable, Delete via BC
SparrowNot startedSparrow.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
sym_hi
Driver: Unload, Delete, Disable, Delete via BC
sym_hiNot startedsym_hi.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
sym_u3
Driver: Unload, Delete, Disable, Delete via BC
sym_u3Not startedsym_u3.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
symc810
Driver: Unload, Delete, Disable, Delete via BC
symc810Not startedsymc810.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
symc8xx
Driver: Unload, Delete, Disable, Delete via BC
symc8xxNot startedsymc8xx.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
TosIde
Driver: Unload, Delete, Disable, Delete via BC
TosIdeNot startedTosIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
TrueSight
Driver: Unload, Delete, Disable, Delete via BC
TrueSightNot startedc:\windows\system32\drivers\TrueSight.sys
Script: Quarantine, Delete, Delete via BC
  
ultra
Driver: Unload, Delete, Disable, Delete via BC
ultraNot startedultra.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ViaIde
Driver: Unload, Delete, Disable, Delete via BC
ViaIdeNot startedViaIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
WDICA
Driver: Unload, Delete, Disable, Delete via BC
WDICANot startedWDICA.sys
Script: Quarantine, Delete, Delete via BC
  
Detected - 178, recognized as trusted - 125

Autoruns

File nameStatusStartup methodDescription
C:\PROGRA~1\MICROS~2\Office12\1029\MAPIR.DLL
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Outlook, EventMessageFile
C:\Program Files\Ashampoo\Ashampoo Burning Studio 10\burningstudio10.exe
Script: Quarantine, Delete, Delete via BC
ActiveShortcut in Startup folderC:\Documents and Settings\Skot\Data aplikací\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\Skot\Data aplikací\Microsoft\Internet Explorer\Quick Launch\Ashampoo Burning Studio 10.lnk,
C:\Program Files\ESET\ESET NOD32 Antivirus\shellExt.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved, {B089FE88-FB52-11D3-BDF1-0050DA34150D}
Delete
C:\Program Files\ESET\MiNODLogin\MiNODLogin.exe
Script: Quarantine, Delete, Delete via BC
ActiveShortcut in Startup folderC:\Documents and Settings\All Users\Nabídka Start\Programy\Po spuštění\, C:\Documents and Settings\All Users\Nabídka Start\Programy\Po spuštění\Update ESET's licence.lnk,
C:\Program Files\ESET\MiNODLogin\MiNODLogin.exe
Script: Quarantine, Delete, Delete via BC
ActiveShortcut in Startup folderC:\Documents and Settings\All Users\Nabídka Start\Programy\Po spuštění\, C:\Documents and Settings\All Users\Nabídka Start\Programy\Po spuštění\Update ESET's license.lnk,
C:\Program Files\McAfee Security Scan\2.0.181\SSScheduler.exe
Script: Quarantine, Delete, Delete via BC
ActiveShortcut in Startup folderC:\Documents and Settings\All Users\Nabídka Start\Programy\Po spuštění\, C:\Documents and Settings\All Users\Nabídka Start\Programy\Po spuštění\McAfee Security Scan Plus.lnk,
C:\Program Files\Trojan Remover\Trjscan.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, TrojanScanner
Delete
C:\Program Files\Windows Defender\MpEvMsg.dll
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\WinDefendRtp, EventMessageFile
C:\Program Files\Windows Defender\MpEvMsg.dll
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\WinDefend, EventMessageFile
C:\WINDOWS\System32\Drivers\AliIde.sys
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\aliide, EventMessageFile
C:\WINDOWS\System32\Drivers\CmdIde.sys
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\cmdide, EventMessageFile
C:\WINDOWS\System32\Drivers\TosIde.sys
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\toside, EventMessageFile
C:\WINDOWS\System32\Drivers\ViaIde.sys
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\viaide, EventMessageFile
C:\WINDOWS\System32\Drivers\lbrtfdc.sys
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\lbrtfdc, EventMessageFile
C:\WINDOWS\System32\igmpv2.dll
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IGMPv2, EventMessageFile
C:\WINDOWS\System32\ipbootp.dll
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IPBOOTP, EventMessageFile
C:\WINDOWS\System32\iprip2.dll
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IPRIP2, EventMessageFile
C:\WINDOWS\System32\ospf.dll
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\OSPF, EventMessageFile
C:\WINDOWS\System32\ospfmib.dll
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\OSPFMib, EventMessageFile
C:\WINDOWS\System32\polagent.dll
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\PolicyAgent, EventMessageFile
C:\WINDOWS\System32\spmsg.dll
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\Internet Explorer 8, EventMessageFile
C:\WINDOWS\System32\spmsg.dll
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\NtServicePack, EventMessageFile
C:\WINDOWS\System32\spmsg.dll
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\WindowsMedia, EventMessageFile
C:\WINDOWS\System32\spmsg.dll
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\Wudf01000, EventMessageFile
C:\WINDOWS\System32\tssdis.exe
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\TermServSessDir, EventMessageFile
C:\WINDOWS\system32\KB905474\wgasetup.exe
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\WgaSetup, EventMessageFile
C:\WINDOWS\system32\MsSip1.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 1, $DLL
Delete
C:\WINDOWS\system32\MsSip2.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 2, $DLL
Delete
C:\WINDOWS\system32\MsSip3.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 3, $DLL
Delete
C:\WINDOWS\system32\psxss.exe
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Session Manager\SubSystems, Posix
C:\WINDOWS\system32\stisvc.exe
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System, EventMessageFile
kbd101.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\i8042prt\Parameters, LayerDriver JPN
Delete
kbd101a.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\i8042prt\Parameters, LayerDriver KOR
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, .DEFAULT\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, S-1-5-19\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, S-1-5-20\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, S-1-5-18\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_CURRENT_USER, Control Panel\IOProcs, MVB
Delete
services32.exe
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\SafeBoot, AlternateShell
vgafix.fon
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fixedfon.fon
Delete
vgaoem.fon
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, oemfonts.fon
Delete
vgasys.fon
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fonts.fon
Delete
Autoruns items found - 840, recognized as trusted - 798

Internet Explorer extension modules (BHOs, Toolbars ...)

File nameTypeDescriptionManufacturerCLSID
Extension module{2670000A-7350-4f3c-8081-5663EE0C6C49}
Delete
Items found - 22, recognized as trusted - 21

Windows Explorer extension modules

File nameDestinationDescriptionManufacturerCLSID
Rozšíření panelu Zobrazení pro panoramatické zobrazení{42071714-76d4-11d1-8b24-00a0c9068ff3}
Delete
Rozšíření prostředí pro kompresi souborů{764BF0E1-F219-11ce-972D-00AA00A14F56}
Delete
Kontextová nabídka šifrování{853FE2B1-B769-11d0-9C4E-00C04FB6C6FA}
Delete
Hlavní panel a nabídka Start{0DF44EAA-FF21-4412-828E-260A8728E7F1}
Delete
Uživatelské účty{7A9D77BD-5403-11d2-8785-2E0420524153}
Delete
C:\Program Files\ESET\ESET NOD32 Antivirus\shellExt.dll
Script: Quarantine, Delete, Delete via BC
ESET Smart Security - Context Menu Shell Extension{B089FE88-FB52-11D3-BDF1-0050DA34150D}
Delete
Items found - 218, recognized as trusted - 212

Printing system extensions (print monitors, providers)

File nameTypeNameDescriptionManufacturer
Items found - 11, recognized as trusted - 11

Task Scheduler jobs

File nameJob nameJob stateDescriptionManufacturer
C:\WINDOWS\system32\KB905474\wgasetup.exe
Script: Quarantine, Delete, Delete via BC
WGASetup.job
Script: Delete
The task is ready to run at its next scheduled time.Nastavení programu Windows Genuine Advantage Notification© 1995-2008 Microsoft Corporation
Items found - 2, recognized as trusted - 1

SPI/LSP settings

Namespace providers (NSP)
ManufacturerStatusEXE fileDescriptionGUID
Detected - 3, recognized as trusted - 3
Transport protocol providers (TSP, LSP)
ManufacturerEXE fileDescription
Detected - 11, recognized as trusted - 11
Results of automatic SPI settings check
LSP settings checked. No errors detected

TCP/UDP ports

PortStatusRemote HostRemote PortApplicationNotes
TCP ports
135LISTENING0.0.0.022725[1068] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
139LISTENING0.0.0.038942[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
445LISTENING0.0.0.02078[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
1025LISTENING0.0.0.04259[440] c:\program files\ati technologies\ati.ace\cli.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1031LISTENING0.0.0.045209[2664] c:\windows\system32\alg.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1034LISTENING0.0.0.08316[2320] c:\program files\ati technologies\ati.ace\cli.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1036LISTENING0.0.0.051255[2156] c:\program files\ati technologies\ati.ace\cli.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1049ESTABLISHED127.0.0.11050[1592] c:\program files\mozilla firefox\firefox.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1050ESTABLISHED127.0.0.11049[1592] c:\program files\mozilla firefox\firefox.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1051ESTABLISHED127.0.0.11052[1592] c:\program files\mozilla firefox\firefox.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1052ESTABLISHED127.0.0.11051[1592] c:\program files\mozilla firefox\firefox.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
2357ESTABLISHED66.212.230.70443[1756] c:\program files\betclic poker.com\betclic pokercom.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
2425ESTABLISHED68.233.253.14480[1756] c:\program files\betclic poker.com\betclic pokercom.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
2580ESTABLISHED95.168.207.11480[1592] c:\program files\mozilla firefox\firefox.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
2603CLOSE_WAIT89.108.66.15680[3488] c:\documents and settings\skot\plocha\avz4\avz.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
2623TIME_WAIT77.75.76.680[0]   
5152LISTENING0.0.0.039150[1412] c:\program files\java\jre6\bin\jqs.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
5152CLOSE_WAIT127.0.0.12377[1412] c:\program files\java\jre6\bin\jqs.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
UDP ports
123LISTENING----[1184] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
123LISTENING----[1184] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
137LISTENING----[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
138LISTENING----[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
445LISTENING----[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
500LISTENING----[800] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1900LISTENING----[1336] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1900LISTENING----[1336] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
2354LISTENING----[1756] c:\program files\betclic poker.com\betclic pokercom.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
4500LISTENING----[800] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
44301LISTENING----[2032] c:\windows\system32\pnkbstra.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
45301LISTENING----[232] c:\windows\system32\pnkbstrb.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 

Downloaded Program Files (DPF)

File nameDescriptionManufacturerCLSIDSource URL
Items found - 3, recognized as trusted - 3

Control Panel Applets (CPL)

File nameDescriptionManufacturer
Items found - 26, recognized as trusted - 26

Active Setup

File nameDescriptionManufacturerCLSID
Items found - 15, recognized as trusted - 15

HOSTS file

Hosts file record
127.0.0.1	localhost
Clear Hosts file

Protocols and handlers

File nameTypeDescriptionManufacturerCLSID
Items found - 28, recognized as trusted - 28

Suspicious objects

FileDescriptionType
C:\WINDOWS\ufa\ufa.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by Heuristic analysis HSC: suspicion for File with suspicious name (CH)
C:\WINDOWS\update.tray-15-0\svchost.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by Heuristic analysis HSC: suspicion for File with suspicious name (CH)
C:\WINDOWS\update.tray-2-0\svchost.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by Heuristic analysis HSC: suspicion for File with suspicious name (CH)
C:\WINDOWS\update.tray-3-0\svchost.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by Heuristic analysis HSC: suspicion for File with suspicious name (CH)
C:\Program Files\daemon tools\setupdtsb.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by Heuristic analysis HSC: suspicion for File with suspicious name (CH)


AVZ Antiviral Toolkit log; AVZ version is 4.37
Scanning started at 28.10.2011 19:49:40
Database loaded: signatures - 294598, NN profile(s) - 2, malware removal microprograms - 56, signature database released 28.10.2011 04:00
Heuristic microprograms loaded: 388
PVS microprograms loaded: 9
Digital signatures of system files loaded: 302280
Heuristic analyzer mode: Maximum heuristics mode
Malware removal mode: disabled
Windows version is: 5.1.2600, Service Pack 3 ; AVZ is run with administrator rights
System Restore: enabled
1. Searching for Rootkits and other software intercepting API functions
1.1 Searching for user-mode API hooks
 Analysis: kernel32.dll, export table found in section .text
 Analysis: ntdll.dll, export table found in section .text
 Analysis: user32.dll, export table found in section .text
 Analysis: advapi32.dll, export table found in section .text
 Analysis: ws2_32.dll, export table found in section .text
 Analysis: wininet.dll, export table found in section .text
 Analysis: rasapi32.dll, export table found in section .text
 Analysis: urlmon.dll, export table found in section .text
 Analysis: netapi32.dll, export table found in section .text
1.2 Searching for kernel-mode API hooks
 Driver loaded successfully
 SDT found (RVA=0832A0)
 Kernel ntoskrnl.exe found in memory at address 804D7000
   SDT = 8055A2A0
   KiST = 804E26B8 (284)
Functions checked: 284, intercepted: 0, restored: 0
1.3 Checking IDT and SYSENTER
 Analyzing CPU 1
 Checking IDT and SYSENTER - complete
1.4 Searching for masking processes and drivers
 Checking not performed: extended monitoring driver (AVZPM) is not installed
1.5 Checking IRP handlers
 Driver loaded successfully
\FileSystem\ntfs[IRP_MJ_CREATE] = 823691E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_CLOSE] = 823691E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_WRITE] = 823691E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_INFORMATION] = 823691E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_INFORMATION] = 823691E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_EA] = 823691E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_EA] = 823691E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_VOLUME_INFORMATION] = 823691E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_VOLUME_INFORMATION] = 823691E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_DIRECTORY_CONTROL] = 823691E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_FILE_SYSTEM_CONTROL] = 823691E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_DEVICE_CONTROL] = 823691E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_LOCK_CONTROL] = 823691E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_SECURITY] = 823691E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_SECURITY] = 823691E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_PNP] = 823691E8 -> hook not defined
 Checking - complete
2. Scanning RAM
 Number of processes found: 39
Extended process analysis: 232 C:\WINDOWS\system32\PnkBstrB.exe
[ES]:Program code includes networking-related functionality
[ES]:Capable of sending mail ?!
[ES]:Application has no visible windows
[ES]:Located in system folder
Extended process analysis: 1756 C:\Program Files\BetClic Poker.com\BetClic Pokercom.exe
[ES]:Program code includes networking-related functionality
[ES]:Listens on HTTP ports !
[ES]:Loads RASAPI DLL - may use dialing ?
 Number of modules loaded: 559
Scanning RAM - complete
3. Scanning disks
4. Checking  Winsock Layered Service Provider (SPI/LSP)
 LSP settings checked. No errors detected
5. Searching for keyboard/mouse/windows events hooks (Keyloggers, Trojan DLLs)
6. Searching for opened TCP/UDP ports used by malicious software
 Checking - disabled by user
7. Heuristic system check
>>> C:\WINDOWS\ufa\ufa.exe HSC: suspicion for File with suspicious name (CH)
>>> C:\WINDOWS\update.tray-15-0\svchost.exe HSC: suspicion for File with suspicious name (CH)
>>> C:\WINDOWS\update.tray-2-0\svchost.exe HSC: suspicion for File with suspicious name (CH)
>>> C:\WINDOWS\update.tray-3-0\svchost.exe HSC: suspicion for File with suspicious name (CH)
>>> C:\Program Files\daemon tools\setupdtsb.exe HSC: suspicion for File with suspicious name (CH)
Checking - complete
8. Searching for vulnerabilities
>> Services: potentially dangerous service allowed: RemoteRegistry (Vzd?len? registr)
>> Services: potentially dangerous service allowed: TermService (Termin?lov? slu?ba)
>> Services: potentially dangerous service allowed: SSDPSRV (Slu?ba rozpozn?v?n? pomoc? protokolu SSDP)
>> Services: potentially dangerous service allowed: TlntSvr (Telnet)
>> Services: potentially dangerous service allowed: Schedule (Pl?nova? ?loh)
>> Services: potentially dangerous service allowed: mnmsrvc (NetMeeting - Vzd?len? sd?len? plochy)
>> Services: potentially dangerous service allowed: RDSessMgr (Spr?vce relac? n?pov?dy ke vzd?len? plo?e)
> Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)!
>> Security: disk drives' autorun is enabled
>> Security: administrative shares (C$, D$ ...) are enabled
>> Security: anonymous user access is enabled
>> Security: sending Remote Assistant queries is enabled
Checking - complete
9. Troubleshooting wizard
 >>  HDD autorun is allowed
 >>  Network drives autorun is allowed
 >>  Removable media autorun is allowed
Checking - complete
Files scanned: 599, extracted from archives: 0, malicious software found 0, suspicions - 0
Scanning finished at 28.10.2011 19:53:50
Time of scanning: 00:04:14
If you have a suspicion on presence of viruses or questions on the suspected objects,
you can address http://forum.kaspersky.com/index.php?showforum=19
System Analysis in progress

System Analysis - complete
Script commands
Add commands to script:
Additional operations:
File list