Results of system analysis

AVZ 4.37 http://z-oleg.com/secur/avz/

Process List

File namePIDDescriptionCopyrightMD5Information
c:\documents and settings\erika\local settings\application data\google\chrome\application\chrome.exe
Script: Quarantine, Delete, Delete via BC, Terminate
3748Google ChromeCopyright (C) 2006-2010 Google Inc. All Rights Reserved.??1012.05 kb, rsAh,
created: 28.10.2011 18:53:38,
modified: 26.10.2011 10:10:47
Command line:
"C:\Documents and Settings\Erika\Local Settings\Application Data\Google\Chrome\Application\chrome.exe" --type=extension --lang=sk --force-fieldtest=ConnCountImpact/conn_count_6/ConnnectBackupJobs/ConnectBackupJobsEnabled/DnsImpact/default_enabled_prefetch/DnsParallelism/parallel_default/GlobalSdch/global_enable_sdch/IdleSktToImpact/idle_timeout_10/Prefetch/ContentPrefetchPrerender2/ProxyConnectionImpact/proxy_connections_32/SpdyCwnd/cwnd10/SpdyImpact/npn_with_spdy/SuggestHostPrefix/Default_Prefix/WarmSocketImpact/warmest_socket/ --enable-print-preview --channel=2004.01199840.1795876145 --ignored=" --type=renderer " /prefetch:3
c:\documents and settings\erika\local settings\application data\google\chrome\application\chrome.exe
Script: Quarantine, Delete, Delete via BC, Terminate
2632Google ChromeCopyright (C) 2006-2010 Google Inc. All Rights Reserved.??1012.05 kb, rsAh,
created: 28.10.2011 18:53:38,
modified: 26.10.2011 10:10:47
Command line:
"C:\Documents and Settings\Erika\Local Settings\Application Data\Google\Chrome\Application\chrome.exe" --type=extension --lang=sk --force-fieldtest=ConnCountImpact/conn_count_6/ConnnectBackupJobs/ConnectBackupJobsEnabled/DnsImpact/default_enabled_prefetch/DnsParallelism/parallel_default/GlobalSdch/global_enable_sdch/IdleSktToImpact/idle_timeout_10/Prefetch/ContentPrefetchPrerender2/ProxyConnectionImpact/proxy_connections_32/SpdyCwnd/cwnd10/SpdyImpact/npn_with_spdy/SuggestHostPrefix/Default_Prefix/WarmSocketImpact/warmest_socket/ --enable-print-preview --disable-webgl --disable-pepper-3d-for-untrusted-use --disable-gl-multisampling --disable-accelerated-compositing --disable-accelerated-2d-canvas --channel=2004.011996E0.832218346 --ignored=" --type=renderer " /prefetch:3
c:\documents and settings\erika\local settings\application data\google\chrome\application\chrome.exe
Script: Quarantine, Delete, Delete via BC, Terminate
420Google ChromeCopyright (C) 2006-2010 Google Inc. All Rights Reserved.??1012.05 kb, rsAh,
created: 28.10.2011 18:53:38,
modified: 26.10.2011 10:10:47
Command line:
"C:\Documents and Settings\Erika\Local Settings\Application Data\Google\Chrome\Application\chrome.exe" --type=renderer --lang=sk --force-fieldtest=ConnCountImpact/conn_count_6/ConnnectBackupJobs/ConnectBackupJobsEnabled/DnsImpact/default_enabled_prefetch/DnsParallelism/parallel_default/GlobalSdch/global_enable_sdch/IdleSktToImpact/idle_timeout_10/Prefetch/ContentPrefetchPrerender2/ProxyConnectionImpact/proxy_connections_32/SpdyCwnd/cwnd10/SpdyImpact/npn_with_spdy/SuggestHostPrefix/Default_Prefix/WarmSocketImpact/warmest_socket/ --enable-print-preview --disable-webgl --disable-pepper-3d-for-untrusted-use --disable-gl-multisampling --disable-accelerated-compositing --disable-accelerated-2d-canvas --channel=2004.0755CB00.1069026339 /prefetch:3
c:\documents and settings\erika\local settings\application data\google\chrome\application\chrome.exe
Script: Quarantine, Delete, Delete via BC, Terminate
3036Google ChromeCopyright (C) 2006-2010 Google Inc. All Rights Reserved.??1012.05 kb, rsAh,
created: 28.10.2011 18:53:38,
modified: 26.10.2011 10:10:47
Command line:
"C:\Documents and Settings\Erika\Local Settings\Application Data\Google\Chrome\Application\chrome.exe" --type=plugin --plugin-path="C:\Documents and Settings\Erika\Local Settings\Application Data\Google\Chrome\User Data\Default\Extensions\lifbcibllhkdhoafpjfnlhfpfgnpldfl\5.7.0.8524_0\npSkypeChromePlugin.dll" --lang=sk --channel=2004.081191C0.1824210752 /prefetch:4
c:\documents and settings\erika\local settings\application data\google\chrome\application\chrome.exe
Script: Quarantine, Delete, Delete via BC, Terminate
604Google ChromeCopyright (C) 2006-2010 Google Inc. All Rights Reserved.??1012.05 kb, rsAh,
created: 28.10.2011 18:53:38,
modified: 26.10.2011 10:10:47
Command line:
"C:\Documents and Settings\Erika\Local Settings\Application Data\Google\Chrome\Application\chrome.exe" --type=plugin --plugin-path="C:\Documents and Settings\Erika\Local Settings\Application Data\Google\Chrome\Application\15.0.874.106\gcswf32.dll" --lang=sk --channel=2004.0810A1C0.925572454 /prefetch:4
c:\documents and settings\erika\local settings\application data\google\chrome\application\chrome.exe
Script: Quarantine, Delete, Delete via BC, Terminate
2004Google ChromeCopyright (C) 2006-2010 Google Inc. All Rights Reserved.??1012.05 kb, rsAh,
created: 28.10.2011 18:53:38,
modified: 26.10.2011 10:10:47
Command line:
"C:\Documents and Settings\Erika\Local Settings\Application Data\Google\Chrome\Application\chrome.exe" http://www.viry.cz/forum/viewtopic.php?f=13&t=105895
c:\windows\explorer.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1968Windows Explorer© Microsoft Corporation. All rights reserved.??1009.50 kb, rsAh,
created: 16.01.2007 22:05:41,
modified: 14.04.2008 02:12:19
Command line:
C:\WINDOWS\Explorer.EXE
c:\program files\common files\microsoft shared\vs7debug\mdm.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1268Machine Debug Manager© Microsoft Corporation. All rights reserved.??314.57 kb, rsAh,
created: 20.06.2003 00:25:00,
modified: 20.06.2003 00:25:00
Command line:
"C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE"
c:\windows\system32\pnkbstrb.exe
Script: Quarantine, Delete, Delete via BC, Terminate
628  ??209.49 kb, rsAh,
created: 24.12.2009 20:56:57,
modified: 28.10.2011 17:54:35
Command line:
C:\WINDOWS\system32\PnkBstrB.exe
c:\windows\system32\rundll32.exe
Script: Quarantine, Delete, Delete via BC, Terminate
476Run a DLL as an App© Microsoft Corporation. All rights reserved.??32.50 kb, rsAh,
created: 04.08.2004 01:56:56,
modified: 14.04.2008 02:12:33
Command line:
"C:\WINDOWS\system32\RUNDLL32.EXE" C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
2572  ??1901.00 kb, rsAh,
created: 28.10.2011 18:27:15,
modified: 28.10.2011 23:27:11
Command line:
C:\WINDOWS\update.2\svchost.exe srv
c:\windows\update.5.0\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
2660  ??336.50 kb, rsAh,
created: 28.10.2011 23:17:09,
modified: 28.10.2011 23:16:55
Command line:
"C:\WINDOWS\update.5.0\svchost.exe" stand
c:\windows\update.1\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
2056RonPaces © Wino Cloth 2004-2007??1173.00 kb, rsaH,
created: 28.10.2011 18:22:39,
modified: 28.10.2011 18:12:15
Command line:
C:\WINDOWS\update.1\svchost.exe srv
c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
2804  ??1901.00 kb, rsAh,
created: 28.10.2011 18:27:15,
modified: 28.10.2011 23:27:11
Command line:
"C:\WINDOWS\update.2\svchost.exe" stand
c:\windows\update.tray-3-0\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1784RonPaces © Wino Cloth 2004-2007??1173.00 kb, rsaH,
created: 28.10.2011 18:22:31,
modified: 28.10.2011 18:12:15
Command line:
"C:\WINDOWS\update.tray-3-0\svchost.exe"
c:\windows\update.tray-2-0\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1900RonPaces © Wino Cloth 2004-2007??1173.00 kb, rsaH,
created: 28.10.2011 18:22:31,
modified: 28.10.2011 18:12:15
Command line:
"C:\WINDOWS\update.tray-2-0\svchost.exe"
c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
584Generic Host Process for Win32 Services© Microsoft Corporation. All rights reserved.??14.00 kb, rsAh,
created: 04.08.2004 01:56:58,
modified: 14.04.2008 02:12:36
Command line:
C:\WINDOWS\System32\svchost.exe -k Akamai
c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1864  ??1901.00 kb, rsAh,
created: 28.10.2011 18:27:15,
modified: 28.10.2011 23:27:11
Command line:
"C:\WINDOWS\update.2\svchost.exe" spamer
c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
952  ??1901.00 kb, rsAh,
created: 28.10.2011 18:27:15,
modified: 28.10.2011 23:27:11
Command line:
"C:\WINDOWS\update.2\svchost.exe" spamer
c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1152  ??1901.00 kb, rsAh,
created: 28.10.2011 18:27:15,
modified: 28.10.2011 23:27:11
Command line:
"C:\WINDOWS\update.2\svchost.exe" spamer
c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
2848  ??1901.00 kb, rsAh,
created: 28.10.2011 18:27:15,
modified: 28.10.2011 23:27:11
Command line:
"C:\WINDOWS\update.2\svchost.exe" spamer
c:\windows\update.5.0\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
608  ??336.50 kb, rsAh,
created: 28.10.2011 23:17:09,
modified: 28.10.2011 23:16:55
Command line:
C:\WINDOWS\update.5.0\svchost.exe srv
c:\windows\sysdriver32.exe
Script: Quarantine, Delete, Delete via BC, Terminate
4036  ??252.00 kb, rsAh,
created: 28.10.2011 18:26:12,
modified: 28.10.2011 18:25:54
Command line:
C:\WINDOWS\sysdriver32.exe srv
Detected:52, recognized as trusted 33
Module nameHandleDescriptionCopyrightMD5Used by processes
C:\Documents and Settings\Erika\Local Settings\Application Data\Google\Chrome\Application\15.0.874.106\avcodec-53.dll
Script: Quarantine, Delete, Delete via BC
1709965312  --3748, 2632, 420
C:\Documents and Settings\Erika\Local Settings\Application Data\Google\Chrome\Application\15.0.874.106\avformat-53.dll
Script: Quarantine, Delete, Delete via BC
1789919232  --3748, 2632, 420
C:\Documents and Settings\Erika\Local Settings\Application Data\Google\Chrome\Application\15.0.874.106\avutil-51.dll
Script: Quarantine, Delete, Delete via BC
1756889088  --3748, 2632, 420
C:\Documents and Settings\Erika\Local Settings\Application Data\Google\Chrome\Application\15.0.874.106\chrome.dll
Script: Quarantine, Delete, Delete via BC
29556736Google ChromeCopyright (C) 2006-2010 Google Inc. All Rights Reserved.--3748, 2632, 420, 3036, 604, 2004
C:\Documents and Settings\Erika\Local Settings\Application Data\Google\Chrome\Application\15.0.874.106\icudt.dll
Script: Quarantine, Delete, Delete via BC
1255145472ICU Data DLL Copyright (C) 2010, International Business Machines Corporation and others. All Rights Reserved. --3748, 2632, 420, 3036, 604, 2004
C:\Documents and Settings\Erika\Local Settings\Application Data\Google\Chrome\Application\15.0.874.106\pdf.dll
Script: Quarantine, Delete, Delete via BC
268435456Chrome PDF ViewerCopyright (C) 2010--3748, 2632, 420
C:\Documents and Settings\Erika\Local Settings\Application Data\Google\Chrome\Application\15.0.874.106\ppGoogleNaClPluginChrome.dll
Script: Quarantine, Delete, Delete via BC
18087936  --3748, 2632, 420
C:\Documents and Settings\Erika\Local Settings\Application Data\Google\Chrome\User Data\Default\Extensions\lifbcibllhkdhoafpjfnlhfpfgnpldfl\5.7.0.8524_0\npSkypeChromePlugin.dll
Script: Quarantine, Delete, Delete via BC
268435456Skype Click to Call for Chrome(c) Skype Technologies S.A.--3036
C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\PDFShell.SKY
Script: Quarantine, Delete, Delete via BC
139198464PDF Shell ExtensionCopyright 2000-2007 Adobe Systems, Inc.--2004, 1968
c:\program files\common files\akamai\netsession_win_807ba95.dll
Script: Quarantine, Delete, Delete via BC
268435456  --584
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MSDBG2.DLL
Script: Quarantine, Delete, Delete via BC
1364721664Active Debugging Proxy/Stub© Microsoft Corporation. All rights reserved.--1268, 1864, 952, 1152, 2848
C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\PDM.DLL
Script: Quarantine, Delete, Delete via BC
1365639168Process Debug Manager© Microsoft Corporation. All rights reserved.--1864, 952, 1152, 2848
C:\Program Files\Skype\Toolbars\Shared\SkypePnr.dll
Script: Quarantine, Delete, Delete via BC
66584576Skype Phone Number Recognizer(c) Skype Technologies S.A.--3036
C:\Program Files\WinRAR\rarlng.dll
Script: Quarantine, Delete, Delete via BC
43778048  --1968
C:\Program Files\Zoner\Photo Studio 13\Program32\SHELLEXT.DLL
Script: Quarantine, Delete, Delete via BC
37158912Zoner Photo Studio 13Copyright © 1995-2010--1968
C:\WINDOWS\system32\NVRSSK.DLL
Script: Quarantine, Delete, Delete via BC
40435712NVIDIA Slovak language resource library(C) NVIDIA Corporation. All rights reserved.--1968, 476
Modules found:309, recognized as trusted 293

Kernel Space Modules Viewer

ModuleBase addressSize in memoryDescriptionManufacturer
.sys
Script: Quarantine, Delete, Delete via BC
F7474000018000 (98304)
C:\WINDOWS\System32\Drivers\dump_atapi.sys
Script: Quarantine, Delete, Delete via BC
B560A000018000 (98304)
C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Script: Quarantine, Delete, Delete via BC
F79C3000002000 (8192)
C:\WINDOWS\system32\drivers\sp_rsdrv2.sys
Script: Quarantine, Delete, Delete via BC
B56E5000027000 (159744)
Modules found - 120, recognized as trusted - 116

Services

ServiceDescriptionStatusFileGroupDependencies
PnkBstrB
Service: Stop, Delete, Disable, Delete via BC
PnkBstrBRunningC:\WINDOWS\system32\PnkBstrB.exe
Script: Quarantine, Delete, Delete via BC
  
srvbtcclient
Service: Stop, Delete, Disable, Delete via BC
srvbtcclientRunningC:\WINDOWS\update.5.0\svchost.exe
Script: Quarantine, Delete, Delete via BC
  
srviecheck
Service: Stop, Delete, Disable, Delete via BC
srviecheckRunningC:\WINDOWS\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC
  
srvsysdriver32
Service: Stop, Delete, Disable, Delete via BC
srvsysdriver32RunningC:\WINDOWS\sysdriver32.exe
Script: Quarantine, Delete, Delete via BC
  
wxpdrivers
Service: Stop, Delete, Disable, Delete via BC
wxpdriversRunningC:\WINDOWS\update.1\svchost.exe
Script: Quarantine, Delete, Delete via BC
  
EhttpSrv
Service: Stop, Delete, Disable, Delete via BC
ESET HTTP ServerNot startedC:\Program Files\ESET\ESET NOD32 Antivirus\EHttpSrv.exe
Script: Quarantine, Delete, Delete via BC
  
ekrn
Service: Stop, Delete, Disable, Delete via BC
ESET ServiceNot startedC:\Program Files\ESET\ESET NOD32 Antivirus\ekrn.exe
Script: Quarantine, Delete, Delete via BC
  
npggsvc
Service: Stop, Delete, Disable, Delete via BC
nProtect GameGuard ServiceNot startedC:\WINDOWS\system32\GameMon.des
Script: Quarantine, Delete, Delete via BC
  
Detected - 109, recognized as trusted - 101

Drivers

ServiceDescriptionStatusFileGroupDependencies
sp_rsdrv2
Driver: Unload, Delete, Disable, Delete via BC
Spyware Terminator 2012 Realtime Shield DriverRunningC:\WINDOWS\system32\Drivers\sp_rsdrv2.sys
Script: Quarantine, Delete, Delete via BC
  
Abiosdsk
Driver: Unload, Delete, Disable, Delete via BC
AbiosdskNot startedAbiosdsk.sys
Script: Quarantine, Delete, Delete via BC
Primary disk 
abp480n5
Driver: Unload, Delete, Disable, Delete via BC
abp480n5Not startedabp480n5.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
adpu160m
Driver: Unload, Delete, Disable, Delete via BC
adpu160mNot startedadpu160m.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Aha154x
Driver: Unload, Delete, Disable, Delete via BC
Aha154xNot startedAha154x.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
aic78u2
Driver: Unload, Delete, Disable, Delete via BC
aic78u2Not startedaic78u2.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
aic78xx
Driver: Unload, Delete, Disable, Delete via BC
aic78xxNot startedaic78xx.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
AliIde
Driver: Unload, Delete, Disable, Delete via BC
AliIdeNot startedAliIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
amsint
Driver: Unload, Delete, Disable, Delete via BC
amsintNot startedamsint.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
asc
Driver: Unload, Delete, Disable, Delete via BC
ascNot startedasc.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
asc3350p
Driver: Unload, Delete, Disable, Delete via BC
asc3350pNot startedasc3350p.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
asc3550
Driver: Unload, Delete, Disable, Delete via BC
asc3550Not startedasc3550.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Atdisk
Driver: Unload, Delete, Disable, Delete via BC
AtdiskNot startedAtdisk.sys
Script: Quarantine, Delete, Delete via BC
Primary disk 
cd20xrnt
Driver: Unload, Delete, Disable, Delete via BC
cd20xrntNot startedcd20xrnt.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Changer
Driver: Unload, Delete, Disable, Delete via BC
ChangerNot startedChanger.sys
Script: Quarantine, Delete, Delete via BC
Filter 
CmdIde
Driver: Unload, Delete, Disable, Delete via BC
CmdIdeNot startedCmdIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
Cpqarray
Driver: Unload, Delete, Disable, Delete via BC
CpqarrayNot startedCpqarray.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
dac960nt
Driver: Unload, Delete, Disable, Delete via BC
dac960ntNot starteddac960nt.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
dpti2o
Driver: Unload, Delete, Disable, Delete via BC
dpti2oNot starteddpti2o.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
EagleXNt
Driver: Unload, Delete, Disable, Delete via BC
EagleXNtNot startedC:\WINDOWS\system32\drivers\EagleXNt.sys
Script: Quarantine, Delete, Delete via BC
  
GGSAFERDriver
Driver: Unload, Delete, Disable, Delete via BC
GGSAFER DriverNot startedC:\Program Files\Garena\safedrv.sys
Script: Quarantine, Delete, Delete via BC
  
hpn
Driver: Unload, Delete, Disable, Delete via BC
hpnNot startedhpn.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
i2omgmt
Driver: Unload, Delete, Disable, Delete via BC
i2omgmtNot startedi2omgmt.sys
Script: Quarantine, Delete, Delete via BC
SCSI Class 
i2omp
Driver: Unload, Delete, Disable, Delete via BC
i2ompNot startedi2omp.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ini910u
Driver: Unload, Delete, Disable, Delete via BC
ini910uNot startedini910u.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
IntelIde
Driver: Unload, Delete, Disable, Delete via BC
IntelIdeNot startedIntelIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
lbrtfdc
Driver: Unload, Delete, Disable, Delete via BC
lbrtfdcNot startedlbrtfdc.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
mraid35x
Driver: Unload, Delete, Disable, Delete via BC
mraid35xNot startedmraid35x.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
PCIDump
Driver: Unload, Delete, Disable, Delete via BC
PCIDumpNot startedPCIDump.sys
Script: Quarantine, Delete, Delete via BC
PCI Configuration 
PDCOMP
Driver: Unload, Delete, Disable, Delete via BC
PDCOMPNot startedPDCOMP.sys
Script: Quarantine, Delete, Delete via BC
  
PDFRAME
Driver: Unload, Delete, Disable, Delete via BC
PDFRAMENot startedPDFRAME.sys
Script: Quarantine, Delete, Delete via BC
  
PDRELI
Driver: Unload, Delete, Disable, Delete via BC
PDRELINot startedPDRELI.sys
Script: Quarantine, Delete, Delete via BC
  
PDRFRAME
Driver: Unload, Delete, Disable, Delete via BC
PDRFRAMENot startedPDRFRAME.sys
Script: Quarantine, Delete, Delete via BC
  
perc2
Driver: Unload, Delete, Disable, Delete via BC
perc2Not startedperc2.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
perc2hib
Driver: Unload, Delete, Disable, Delete via BC
perc2hibNot startedperc2hib.sys
Script: Quarantine, Delete, Delete via BC
Filter 
ql1080
Driver: Unload, Delete, Disable, Delete via BC
ql1080Not startedql1080.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Ql10wnt
Driver: Unload, Delete, Disable, Delete via BC
Ql10wntNot startedQl10wnt.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ql12160
Driver: Unload, Delete, Disable, Delete via BC
ql12160Not startedql12160.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ql1240
Driver: Unload, Delete, Disable, Delete via BC
ql1240Not startedql1240.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ql1280
Driver: Unload, Delete, Disable, Delete via BC
ql1280Not startedql1280.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Simbad
Driver: Unload, Delete, Disable, Delete via BC
SimbadNot startedSimbad.sys
Script: Quarantine, Delete, Delete via BC
Filter 
Sparrow
Driver: Unload, Delete, Disable, Delete via BC
SparrowNot startedSparrow.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
sym_hi
Driver: Unload, Delete, Disable, Delete via BC
sym_hiNot startedsym_hi.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
sym_u3
Driver: Unload, Delete, Disable, Delete via BC
sym_u3Not startedsym_u3.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
symc810
Driver: Unload, Delete, Disable, Delete via BC
symc810Not startedsymc810.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
symc8xx
Driver: Unload, Delete, Disable, Delete via BC
symc8xxNot startedsymc8xx.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
TosIde
Driver: Unload, Delete, Disable, Delete via BC
TosIdeNot startedTosIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
ultra
Driver: Unload, Delete, Disable, Delete via BC
ultraNot startedultra.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ViaIde
Driver: Unload, Delete, Disable, Delete via BC
ViaIdeNot startedViaIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
WDICA
Driver: Unload, Delete, Disable, Delete via BC
WDICANot startedWDICA.sys
Script: Quarantine, Delete, Delete via BC
  
Detected - 191, recognized as trusted - 141

Autoruns

File nameStatusStartup methodDescription
C:\DOCUME~1\Erika\LOCALS~1\Temp\3269838.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, 3269838.exe
Delete
C:\DOCUME~1\Erika\LOCALS~1\Temp\9589922.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, 9589922.exe
Delete
C:\DOCUME~1\Erika\LOCALS~1\Temp\wininitd.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, Audio HD Driver
Delete
C:\Documents and Settings\Erika\Application Data\audiohd.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_CURRENT_USER, Software\Microsoft\Windows\CurrentVersion\Run, Windows Audio Driver
Delete
C:\Documents and Settings\Erika\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
Script: Quarantine, Delete, Delete via BC
ActiveShortcut in Startup folderC:\Documents and Settings\Erika\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\Erika\Application Data\Microsoft\Internet Explorer\Quick Launch\Google Chrome (2).lnk,
C:\Documents and Settings\Erika\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
Script: Quarantine, Delete, Delete via BC
ActiveShortcut in Startup folderC:\Documents and Settings\Erika\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\Erika\Application Data\Microsoft\Internet Explorer\Quick Launch\Google Chrome.lnk,
C:\Program Files\Activision\Call of Duty 2\GamePark2\gpcl.exe
Script: Quarantine, Delete, Delete via BC
ActiveShortcut in Startup folderC:\Documents and Settings\All Users\Start Menu\Programs\Startup\, C:\Documents and Settings\All Users\Start Menu\Programs\Startup\GamePark klient 2.lnk,
C:\Program Files\Common Files\Logitech\LCD Manager\lcdmon.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, Launch LCDMon
Delete
C:\Program Files\ESET\ESET NOD32 Antivirus\egui.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, egui
Delete
C:\Program Files\ESET\ESET NOD32 Antivirus\shellExt.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved, {B089FE88-FB52-11D3-BDF1-0050DA34150D}
Delete
C:\Program Files\Electronic Arts\EADM\Core.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_CURRENT_USER, Software\Microsoft\Windows\CurrentVersion\Run, EA Core
Delete
C:\Program Files\Gameforge4D\4Story\PrePatch.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, 4StoryPrePatch
Delete
C:\Program Files\ICQ7.2\ICQ.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_CURRENT_USER, Software\Microsoft\Windows\CurrentVersion\Run, ICQ
Delete
C:\Program Files\NuGardt Software\Seismovision 3\Seismovision3.exe
Script: Quarantine, Delete, Delete via BC
ActiveShortcut in Startup folderC:\Documents and Settings\Erika\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\Erika\Application Data\Microsoft\Internet Explorer\Quick Launch\Seismovision 3.lnk,
C:\Program Files\PokerStars\PokerStarsUpdate.exe
Script: Quarantine, Delete, Delete via BC
ActiveShortcut in Startup folderC:\Documents and Settings\Erika\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\Erika\Application Data\Microsoft\Internet Explorer\Quick Launch\PokerStars.lnk,
C:\Program Files\Skype\Phone\Skype.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_CURRENT_USER, Software\Microsoft\Windows\CurrentVersion\Run, Skype
Delete
C:\Program Files\Winamp\winampa.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, WinampAgent
Delete
C:\Program Files\Zoner\Photo Studio 13\Program32\Zps.exe
Script: Quarantine, Delete, Delete via BC
ActiveShortcut in Startup folderC:\Documents and Settings\Erika\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\Erika\Application Data\Microsoft\Internet Explorer\Quick Launch\Zoner Photo Studio 13.lnk,
C:\WINDOWS\System32\Drivers\AliIde.sys
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\aliide, EventMessageFile
C:\WINDOWS\System32\Drivers\CmdIde.sys
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\cmdide, EventMessageFile
C:\WINDOWS\System32\Drivers\IntelIde.sys
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\intelide, EventMessageFile
C:\WINDOWS\System32\Drivers\TosIde.sys
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\toside, EventMessageFile
C:\WINDOWS\System32\Drivers\ViaIde.sys
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\viaide, EventMessageFile
C:\WINDOWS\System32\Drivers\lbrtfdc.sys
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\lbrtfdc, EventMessageFile
C:\WINDOWS\System32\PrintFilterPipelineSvc.exe
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\PrintFilterPipelineSvc, EventMessageFile
C:\WINDOWS\System32\drivers\ss_bbus.sys
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\ss_bbus, EventMessageFile
C:\WINDOWS\System32\igmpv2.dll
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IGMPv2, EventMessageFile
C:\WINDOWS\System32\ipbootp.dll
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IPBOOTP, EventMessageFile
C:\WINDOWS\System32\iprip2.dll
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IPRIP2, EventMessageFile
C:\WINDOWS\System32\ospf.dll
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\OSPF, EventMessageFile
C:\WINDOWS\System32\ospfmib.dll
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\OSPFMib, EventMessageFile
C:\WINDOWS\System32\polagent.dll
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\PolicyAgent, EventMessageFile
C:\WINDOWS\System32\tssdis.exe
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\TermServSessDir, EventMessageFile
C:\WINDOWS\TEMP\7847201.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, 7847201.exe
Delete
C:\WINDOWS\TEMP\8661981.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, 8661981.exe
Delete
C:\WINDOWS\TEMP\9595252.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, 9595252.exe
Delete
C:\WINDOWS\services32.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, wxpdrv
Delete
C:\WINDOWS\sysdriver32.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, sysdriver32.exe
Delete
C:\WINDOWS\sysdriver32_.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, sysdriver32_.exe
Delete
C:\WINDOWS\system32\KB905474\wgasetup.exe
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\WgaSetup, EventMessageFile
C:\WINDOWS\system32\MsSip1.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 1, $DLL
Delete
C:\WINDOWS\system32\MsSip2.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 2, $DLL
Delete
C:\WINDOWS\system32\MsSip3.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 3, $DLL
Delete
C:\WINDOWS\system32\SEISMO~1.SCR
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_CURRENT_USER, Control Panel\Desktop, scrnsave.exe
Delete
C:\WINDOWS\system32\SEISMO~1.SCR
Script: Quarantine, Delete, Delete via BC
ActiveFile system.iniC:\WINDOWS\system.ini, boot, SCRNSAVE.EXE
C:\WINDOWS\system32\WUDHost.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, Windows-Network Component
Delete
C:\WINDOWS\system32\psxss.exe
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Session Manager\SubSystems, Posix
C:\WINDOWS\system32\stisvc.exe
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System, EventMessageFile
C:\WINDOWS\update.tray-2-0\svchost.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, tray_ico1
Delete
C:\WINDOWS\update.tray-3-0\svchost.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, tray_ico0
Delete
c:\program files\common files\akamai\netsession_win_807ba95.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Akamai\Parameters, ServiceDll
Delete
kbd101.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\i8042prt\Parameters, LayerDriver JPN
Delete
kbd101a.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\i8042prt\Parameters, LayerDriver KOR
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, .DEFAULT\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, S-1-5-19\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, S-1-5-20\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, S-1-5-18\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_CURRENT_USER, Control Panel\IOProcs, MVB
Delete
services32.exe
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\SafeBoot, AlternateShell
vgafix.fon
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fixedfon.fon
Delete
vgaoem.fon
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, oemfonts.fon
Delete
vgasys.fon
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fonts.fon
Delete
Autoruns items found - 880, recognized as trusted - 818

Internet Explorer extension modules (BHOs, Toolbars ...)

File nameTypeDescriptionManufacturerCLSID
C:\Program Files\Skype\Toolbars\Internet Explorer\skypeieplugin.dll
Script: Quarantine, Delete, Delete via BC
BHOSkype Click to Call for Internet Explorer(c) Skype Technologies S.A.{AE805869-2E5C-4ED4-8F7B-F1F7851A4497}
Delete
C:\Program Files\PokerStars\PokerStarsUpdate.exe
Script: Quarantine, Delete, Delete via BC
Extension modulePokerStars UpdateCopyright (C) 2001 - 2010 PokerStars{3AD14F0C-ED16-4e43-B6D8-661B03F6A1EF}
Delete
C:\Program Files\Skype\Toolbars\Internet Explorer\skypeieplugin.dll
Script: Quarantine, Delete, Delete via BC
Extension moduleSkype Click to Call for Internet Explorer(c) Skype Technologies S.A.{898EA8C8-E7FF-479B-8935-AEC46303B9E5}
Delete
C:\Program Files\Skype\Toolbars\Internet Explorer\skypeieplugin.dll
Script: Quarantine, Delete, Delete via BC
Extension moduleSkype Click to Call for Internet Explorer(c) Skype Technologies S.A.{92780B25-18CC-41C8-B9BE-3C9C571A8263}
Delete
Items found - 27, recognized as trusted - 23

Windows Explorer extension modules

File nameDestinationDescriptionManufacturerCLSID
Display Panning CPL Extension{42071714-76d4-11d1-8b24-00a0c9068ff3}
Delete
Shell extensions for file compression{764BF0E1-F219-11ce-972D-00AA00A14F56}
Delete
Encryption Context Menu{853FE2B1-B769-11d0-9C4E-00C04FB6C6FA}
Delete
Taskbar and Start Menu{0DF44EAA-FF21-4412-828E-260A8728E7F1}
Delete
User Accounts{7A9D77BD-5403-11d2-8785-2E0420524153}
Delete
C:\Program Files\ESET\ESET NOD32 Antivirus\shellExt.dll
Script: Quarantine, Delete, Delete via BC
ESET Smart Security - Context Menu Shell Extension{B089FE88-FB52-11D3-BDF1-0050DA34150D}
Delete
Items found - 197, recognized as trusted - 191

Printing system extensions (print monitors, providers)

File nameTypeNameDescriptionManufacturer
Items found - 8, recognized as trusted - 8

Task Scheduler jobs

File nameJob nameJob stateDescriptionManufacturer
Items found - 4, recognized as trusted - 4

SPI/LSP settings

Namespace providers (NSP)
ManufacturerStatusEXE fileDescriptionGUID
Detected - 3, recognized as trusted - 3
Transport protocol providers (TSP, LSP)
ManufacturerEXE fileDescription
Detected - 19, recognized as trusted - 19
Results of automatic SPI settings check
LSP settings checked. No errors detected

TCP/UDP ports

PortStatusRemote HostRemote PortApplicationNotes
TCP ports
80LISTENING0.0.0.012516[2804] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
135LISTENING0.0.0.030793[1060] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
139LISTENING0.0.0.057404[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
443LISTENING0.0.0.08340[2804] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
445LISTENING0.0.0.045080[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
1143LISTENING0.0.0.016520[2480] c:\windows\system32\alg.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1188LISTENING0.0.0.02048[2804] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1492ESTABLISHED127.0.0.145771[1864] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1512ESTABLISHED127.0.0.153935[952] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1526ESTABLISHED127.0.0.145771[1864] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1537ESTABLISHED127.0.0.153935[952] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1573ESTABLISHED127.0.0.126888[1152] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1578ESTABLISHED127.0.0.143169[2848] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1600ESTABLISHED127.0.0.126888[1152] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1605ESTABLISHED127.0.0.143169[2848] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1634ESTABLISHED127.0.0.145771[1864] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1649ESTABLISHED127.0.0.145771[1864] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
2438ESTABLISHED74.125.79.10080[2004] c:\documents and settings\erika\local settings\application data\google\chrome\application\chrome.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
2479ESTABLISHED127.0.0.153935[952] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
2489ESTABLISHED127.0.0.153935[952] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
2808ESTABLISHED127.0.0.126888[1152] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
2840ESTABLISHED127.0.0.126888[1152] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
3170SYN_SENT79.118.212.1062999[4036] c:\windows\sysdriver32.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
3175SYN_SENT92.249.218.4662999[4036] c:\windows\sysdriver32.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
3192SYN_SENT188.129.251.5062999[2804] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
3224SYN_SENT85.198.211.2229442[2660] c:\windows\update.5.0\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
3227SYN_SENT188.190.79.239442[2660] c:\windows\update.5.0\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
3321ESTABLISHED89.108.66.15680[2680] c:\program files\avz4\avz.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
3337SYN_SENT156.17.190.3462999[2848] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
3343SYN_SENT78.139.158.21962999[2848] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
3352SYN_SENT109.87.216.16462999[952] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
3356SYN_SENT213.111.112.7962999[952] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
3361SYN_SENT188.230.15.25062999[952] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
5152LISTENING0.0.0.08204[1132] c:\program files\java\jre6\bin\jqs.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
8081LISTENING0.0.0.018523[4036] c:\windows\sysdriver32.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
9421LISTENING0.0.0.016546[584] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
9422LISTENING0.0.0.02240[584] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
9423LISTENING0.0.0.012444[584] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
22616LISTENING0.0.0.039074[2660] c:\windows\update.5.0\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
26888ESTABLISHED127.0.0.12808[1152] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
26888ESTABLISHED127.0.0.12840[1152] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
26888LISTENING0.0.0.02096[1152] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
26888ESTABLISHED127.0.0.11573[1152] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
26888ESTABLISHED127.0.0.11600[1152] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
34304LISTENING0.0.0.08444[2804] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
41711LISTENING0.0.0.038942[2080] c:\program files\dna\btdna.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
43169ESTABLISHED127.0.0.11578[2848] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
43169ESTABLISHED127.0.0.11605[2848] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
43169LISTENING0.0.0.039070[2848] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
45771ESTABLISHED127.0.0.11634[1864] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
45771ESTABLISHED127.0.0.11649[1864] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
45771LISTENING0.0.0.059622[1864] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
45771ESTABLISHED127.0.0.11492[1864] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
45771ESTABLISHED127.0.0.11526[1864] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
53935ESTABLISHED127.0.0.12479[952] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
53935ESTABLISHED127.0.0.12489[952] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
53935LISTENING0.0.0.014496[952] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
53935ESTABLISHED127.0.0.11512[952] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
53935ESTABLISHED127.0.0.11537[952] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
UDP ports
123LISTENING----[1156] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
123LISTENING----[1156] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
137LISTENING----[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
138LISTENING----[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
445LISTENING----[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
500LISTENING----[816] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1026LISTENING----[1584] c:\program files\divx\divx update\divxupdate.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1027LISTENING----[584] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1028LISTENING----[584] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1491LISTENING----[1864] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1510LISTENING----[952] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1572LISTENING----[1152] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1577LISTENING----[2848] c:\windows\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1900LISTENING----[1408] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1900LISTENING----[2080] c:\program files\dna\btdna.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1900LISTENING----[1408] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
4500LISTENING----[816] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
41711LISTENING----[2080] c:\program files\dna\btdna.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
44301LISTENING----[1700] c:\windows\system32\pnkbstra.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
45301LISTENING----[628] c:\windows\system32\pnkbstrb.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 

Downloaded Program Files (DPF)

File nameDescriptionManufacturerCLSIDSource URL
Items found - 6, recognized as trusted - 6

Control Panel Applets (CPL)

File nameDescriptionManufacturer
Items found - 33, recognized as trusted - 33

Active Setup

File nameDescriptionManufacturerCLSID
Items found - 14, recognized as trusted - 14

HOSTS file

Hosts file record
127.0.0.1       localhost
127.0.0.1 facebook.com
127.0.0.1 www.facebook.com
127.0.0.1 af-za.facebook.com
127.0.0.1 az-az.facebook.com
127.0.0.1 id-id.facebook.com
127.0.0.1 ms-my.facebook.com
127.0.0.1 bs-ba.facebook.com
127.0.0.1 ca-es.facebook.com
127.0.0.1 cs-cz.facebook.com
127.0.0.1 cy-gb.facebook.com
127.0.0.1 da-dk.facebook.com
127.0.0.1 de-de.facebook.com
127.0.0.1 et-ee.facebook.com
127.0.0.1 en-gb.facebook.com
127.0.0.1 es-la.facebook.com
127.0.0.1 eo-eo.facebook.com
127.0.0.1 eu-es.facebook.com
127.0.0.1 tl-ph.facebook.com
127.0.0.1 fo-fo.facebook.com
127.0.0.1 fr-fr.facebook.com
127.0.0.1 fy-nl.facebook.com
127.0.0.1 ga-ie.facebook.com
127.0.0.1 gl-es.facebook.com
127.0.0.1 ko-kr.facebook.com
127.0.0.1 hr-hr.facebook.com
127.0.0.1 is-is.facebook.com
127.0.0.1 it-it.facebook.com
127.0.0.1 ka-ge.facebook.com
127.0.0.1 sw-ke.facebook.com
127.0.0.1 ku-tr.facebook.com
127.0.0.1 lv-lv.facebook.com
127.0.0.1 fb-lt.facebook.com
127.0.0.1 lt-lt.facebook.com
127.0.0.1 la-va.facebook.com
127.0.0.1 hu-hu.facebook.com
127.0.0.1 nl-nl.facebook.com
127.0.0.1 ja-jp.facebook.com
127.0.0.1 nb-no.facebook.com
127.0.0.1 nn-no.facebook.com
127.0.0.1 pl-pl.facebook.com
127.0.0.1 pt-br.facebook.com
127.0.0.1 ro-ro.facebook.com
127.0.0.1 ru-ru.facebook.com
127.0.0.1 sq-al.facebook.com
127.0.0.1 sk-sk.facebook.com
127.0.0.1 sl-si.facebook.com
127.0.0.1 fi-fi.facebook.com
127.0.0.1 sv-se.facebook.com
127.0.0.1 th-th.facebook.com
127.0.0.1 vi-vn.facebook.com
127.0.0.1 tr-tr.facebook.com
127.0.0.1 zh-tw.facebook.com
127.0.0.1 el-gr.facebook.com
127.0.0.1 be-by.facebook.com
127.0.0.1 bg-bg.facebook.com
127.0.0.1 mk-mk.facebook.com
127.0.0.1 sr-rs.facebook.com
127.0.0.1 uk-ua.facebook.com
127.0.0.1 hy-am.facebook.com
127.0.0.1 he-il.facebook.com
127.0.0.1 ar-ar.facebook.com
127.0.0.1 ps-af.facebook.com
127.0.0.1 fa-ir.facebook.com
127.0.0.1 ne-np.facebook.com
127.0.0.1 hi-in.facebook.com
127.0.0.1 bn-in.facebook.com
127.0.0.1 pa-in.facebook.com
127.0.0.1 ta-in.facebook.com
127.0.0.1 te-in.facebook.com
127.0.0.1 ml-in.facebook.com
127.0.0.1 es-es.facebook.com
127.0.0.1 fr-ca.facebook.com
127.0.0.1 pt-pt.facebook.com
127.0.0.1 zh-cn.facebook.com
127.0.0.1 zh-hk.facebook.com
Clear Hosts file

Protocols and handlers

File nameTypeDescriptionManufacturerCLSID
mscoree.dll
Script: Quarantine, Delete, Delete via BC
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
mscoree.dll
Script: Quarantine, Delete, Delete via BC
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
mscoree.dll
Script: Quarantine, Delete, Delete via BC
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
C:\Program Files\Skype\Toolbars\Internet Explorer\skypeieplugin.dll
Script: Quarantine, Delete, Delete via BC
HandlerSkype Click to Call for Internet Explorer (skype-ie-addon-data: pluggable protocol)(c) Skype Technologies S.A.{91774881-D725-4E58-B298-07617B9B86A8}
Delete
Items found - 33, recognized as trusted - 29

Suspicious objects

FileDescriptionType
C:\WINDOWS\services32.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by Heuristic analysis HSC: suspicion for File with suspicious name (CH) (high degree of probability)
C:\WINDOWS\sysdriver32.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by Heuristic analysis HSC: suspicion for File with suspicious name (CH) (high degree of probability)
C:\WINDOWS\sysdriver32_.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by Heuristic analysis HSC: suspicion for File with suspicious name (CH) (high degree of probability)
C:\WINDOWS\ufa\ufa.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by Heuristic analysis HSC: suspicion for File with suspicious name (CH)
C:\WINDOWS\update.tray-2-0\svchost.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by Heuristic analysis HSC: suspicion for File with suspicious name (CH)
C:\WINDOWS\update.tray-3-0\svchost.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by Heuristic analysis HSC: suspicion for File with suspicious name (CH)
C:\WINDOWS\update.1\svchost.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by Heuristic analysis HSC: suspicion for File with suspicious name (CH)
C:\WINDOWS\update.2\svchost.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by Heuristic analysis HSC: suspicion for File with suspicious name (CH)
C:\WINDOWS\update.5.0\svchost.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by Heuristic analysis HSC: suspicion for File with suspicious name (CH)
C:\DOCUME~1\Erika\LOCALS~1\Temp\wininitd.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by Heuristic analysis HSC: suspicion for File with suspicious name (CH - Autorun) (high degree of probability)


AVZ Antiviral Toolkit log; AVZ version is 4.37
Scanning started at 29.10.2011 16:34:37
Database loaded: signatures - 294598, NN profile(s) - 2, malware removal microprograms - 56, signature database released 29.10.2011 16:00
Heuristic microprograms loaded: 388
PVS microprograms loaded: 9
Digital signatures of system files loaded: 302280
Heuristic analyzer mode: Maximum heuristics mode
Malware removal mode: disabled
Windows version is: 5.1.2600, Service Pack 3 ; AVZ is run with administrator rights
System Restore: enabled
1. Searching for Rootkits and other software intercepting API functions
1.1 Searching for user-mode API hooks
 Analysis: kernel32.dll, export table found in section .text
 Analysis: ntdll.dll, export table found in section .text
 Analysis: user32.dll, export table found in section .text
 Analysis: advapi32.dll, export table found in section .text
 Analysis: ws2_32.dll, export table found in section .text
 Analysis: wininet.dll, export table found in section .text
 Analysis: rasapi32.dll, export table found in section .text
 Analysis: urlmon.dll, export table found in section .text
 Analysis: netapi32.dll, export table found in section .text
1.2 Searching for kernel-mode API hooks
 Driver loaded successfully
 SDT found (RVA=08B520)
 Kernel ntoskrnl.exe found in memory at address 804D7000
   SDT = 80562520
   KiST = 804E48D0 (284)
Functions checked: 284, intercepted: 0, restored: 0
1.3 Checking IDT and SYSENTER
 Analyzing CPU 1
 Analyzing CPU 2
 Analyzing CPU 3
 Analyzing CPU 4
 Checking IDT and SYSENTER - complete
1.4 Searching for masking processes and drivers
 Checking not performed: extended monitoring driver (AVZPM) is not installed
1.5 Checking IRP handlers
 Driver loaded successfully
 Checking - complete
2. Scanning RAM
 Number of processes found: 51
Extended process analysis: 628 C:\WINDOWS\system32\PnkBstrB.exe
[ES]:Program code includes networking-related functionality
[ES]:Capable of sending mail ?!
[ES]:Application has no visible windows
[ES]:Located in system folder
Extended process analysis: 608 C:\WINDOWS\update.5.0\svchost.exe
[ES]:Program code includes networking-related functionality
[ES]:Application has no visible windows
[ES]:EXE runtime packer ?
[ES]:Located in system folder
Extended process analysis: 2660 C:\WINDOWS\update.5.0\svchost.exe
[ES]:Program code includes networking-related functionality
[ES]:Listens on TCP ports !
[ES]:Application has no visible windows
[ES]:EXE runtime packer ?
[ES]:Located in system folder
[ES]:Loads RASAPI DLL - may use dialing ?
Extended process analysis: 4036 C:\WINDOWS\sysdriver32.exe
[ES]:Program code includes networking-related functionality
[ES]:Listens on TCP ports !
[ES]:Application has no visible windows
[ES]:EXE runtime packer ?
[ES]:Located in system folder
[ES]:Registered for automatic startup !!
[ES]:Loads RASAPI DLL - may use dialing ?
 Number of modules loaded: 309
Scanning RAM - complete
3. Scanning disks
4. Checking  Winsock Layered Service Provider (SPI/LSP)
 LSP settings checked. No errors detected
5. Searching for keyboard/mouse/windows events hooks (Keyloggers, Trojan DLLs)
6. Searching for opened TCP/UDP ports used by malicious software
 Checking - disabled by user
7. Heuristic system check
Non-standard registry key for system service: BITS ImagePath=""
Non-standard registry key for system service: wuauserv ImagePath=""
>>> C:\WINDOWS\services32.exe HSC: suspicion for File with suspicious name (CH) (high degree of probability)
>>> C:\WINDOWS\sysdriver32.exe HSC: suspicion for File with suspicious name (CH) (high degree of probability)
>>> C:\WINDOWS\sysdriver32_.exe HSC: suspicion for File with suspicious name (CH) (high degree of probability)
>>> C:\WINDOWS\ufa\ufa.exe HSC: suspicion for File with suspicious name (CH)
>>> C:\WINDOWS\update.tray-2-0\svchost.exe HSC: suspicion for File with suspicious name (CH)
>>> C:\WINDOWS\update.tray-3-0\svchost.exe HSC: suspicion for File with suspicious name (CH)
>>> C:\WINDOWS\update.1\svchost.exe HSC: suspicion for File with suspicious name (CH)
>>> C:\WINDOWS\update.2\svchost.exe HSC: suspicion for File with suspicious name (CH)
>>> C:\WINDOWS\update.5.0\svchost.exe HSC: suspicion for File with suspicious name (CH)
>>> C:\DOCUME~1\Erika\LOCALS~1\Temp\wininitd.exe HSC: suspicion for File with suspicious name (CH - Autorun) (high degree of probability)
>>> C:\WINDOWS\sysdriver32.exe HSC: suspicion for File with suspicious name (CH - Autorun) (high degree of probability)
>>> C:\WINDOWS\sysdriver32_.exe HSC: suspicion for File with suspicious name (CH - Autorun) (high degree of probability)
>>> C:\WINDOWS\update.tray-3-0\svchost.exe HSC: suspicion for File with suspicious name (CH - Autorun) (high degree of probability)
>>> C:\WINDOWS\update.tray-2-0\svchost.exe HSC: suspicion for File with suspicious name (CH - Autorun) (high degree of probability)
>>> C:\WINDOWS\services32.exe HSC: suspicion for File with suspicious name (CH - Autorun) (high degree of probability)
>>> C:\WINDOWS\update.5.0\svchost.exe HSC: suspicion for File with suspicious name (CH - Service) (high degree of probability)
>>> C:\WINDOWS\update.2\svchost.exe HSC: suspicion for File with suspicious name (CH - Service) (high degree of probability)
>>> C:\WINDOWS\sysdriver32.exe HSC: suspicion for File with suspicious name (CH - Service) (high degree of probability)
>>> C:\WINDOWS\update.1\svchost.exe HSC: suspicion for File with suspicious name (CH - Service) (high degree of probability)
Checking - complete
8. Searching for vulnerabilities
>> Services: potentially dangerous service allowed: RemoteRegistry (Remote Registry)
>> Services: potentially dangerous service allowed: TermService (Terminal Services)
>> Services: potentially dangerous service allowed: SSDPSRV (SSDP Discovery Service)
>> Services: potentially dangerous service allowed: Schedule (Task Scheduler)
>> Services: potentially dangerous service allowed: mnmsrvc (NetMeeting Remote Desktop Sharing)
>> Services: potentially dangerous service allowed: RDSessMgr (Remote Desktop Help Session Manager)
> Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)!
>> Security: disk drives' autorun is enabled
>> Security: administrative shares (C$, D$ ...) are enabled
>> Security: anonymous user access is enabled
>> Security: sending Remote Assistant queries is enabled
Checking - complete
9. Troubleshooting wizard
 >>  HDD autorun is allowed
 >>  Network drives autorun is allowed
 >>  Removable media autorun is allowed
Checking - complete
Files scanned: 363, extracted from archives: 0, malicious software found 0, suspicions - 0
Scanning finished at 29.10.2011 16:35:06
Time of scanning: 00:00:30
If you have a suspicion on presence of viruses or questions on the suspected objects,
you can address http://forum.kaspersky.com/index.php?showforum=19
System Analysis in progress

System Analysis - complete
Script commands
Add commands to script:
Additional operations:
File list