Results of system analysis

Kaspersky Virus Removal Tool 11.0.0.1245 (database released 03/12/2011; 19:06)

List of processes

File namePIDDescriptionCopyrightMD5Information
c:\docume~1\jarda\locals~1\temp\rarsfx0\8785589.exe
Script: Quarantine, Delete, BC delete, Terminate
2972  ??700.48 kb, rsAh,
created: 03.12.2011 22:20:22,
modified: 04.12.2011 00:20:48
Command line:
"C:\DOCUME~1\Jarda\LOCALS~1\Temp\RarSFX0\8785589.exe"
c:\program files\mouse\amoumain.exe
Script: Quarantine, Delete, BC delete, Terminate
492  ??264.00 kb, rsAh,
created: 28.06.2010 12:03:02,
modified: 19.03.2008 22:51:46
Command line:
"C:\Program Files\Mouse\Amoumain.exe"
c:\windows\explorer.exe
Script: Quarantine, Delete, BC delete, Terminate
1976Průzkumník Windows© Microsoft Corporation. Všechna práva vyhrazena.??1010.00 kb, rsAh,
created: 25.10.2001 12:00:00,
modified: 14.04.2008 08:52:24
Command line:
C:\WINDOWS\Explorer.EXE
c:\program files\free download manager\fdm.exe
Script: Quarantine, Delete, BC delete, Terminate
1668Free Download ManagerCopyright © 2003-2010??3640.05 kb, rsAh,
created: 03.06.2010 17:12:56,
modified: 28.04.2010 23:28:18
Command line:
"C:\Program Files\Free Download Manager\fdm.exe" -autorun
c:\program files\srware iron\iron.exe
Script: Quarantine, Delete, BC delete, Terminate
2220SRWare IronCopyright (C) 2006-2009 The Chromium Authors. All Rights Reserved.??1184.00 kb, rsAh,
created: 14.12.2010 18:47:47,
modified: 26.09.2011 23:11:18
Command line:
"C:\Program Files\SRWare Iron\iron.exe" --type=extension --lang=cs --force-fieldtest=ConnCountImpact/conn_count_6/ConnnectBackupJobs/ConnectBackupJobsEnabled/DnsImpact/default_enabled_prefetch/DnsParallelism/parallel_default/GlobalSdch/global_enable_sdch/IdleSktToImpact/idle_timeout_10/Prefetch/ContentPrefetchPrerender2/ProxyConnectionImpact/proxy_connections_32/SpdyImpact/npn_with_spdy/SuggestHostPrefix/Default_Prefix/WarmSocketImpact/warmest_socket/ --disable-client-side-phishing-detection --channel=3392.011E9580.1808700889 --ignored=" --type=renderer " /prefetch:3
c:\program files\srware iron\iron.exe
Script: Quarantine, Delete, BC delete, Terminate
3336SRWare IronCopyright (C) 2006-2009 The Chromium Authors. All Rights Reserved.??1184.00 kb, rsAh,
created: 14.12.2010 18:47:47,
modified: 26.09.2011 23:11:18
Command line:
"C:\Program Files\SRWare Iron\iron.exe" --type=plugin --plugin-path="C:\Documents and Settings\Jarda\Local Settings\Data aplikací\Chromium\User Data\Default\Extensions\jbolfgndggfhhpbnkgnpjkfhinclbigj\1.0.0_0\npFreemake.dll" --lang=cs --channel=3392.0797CE00.994014229 /prefetch:4
c:\program files\srware iron\iron.exe
Script: Quarantine, Delete, BC delete, Terminate
3140SRWare IronCopyright (C) 2006-2009 The Chromium Authors. All Rights Reserved.??1184.00 kb, rsAh,
created: 14.12.2010 18:47:47,
modified: 26.09.2011 23:11:18
Command line:
"C:\Program Files\SRWare Iron\iron.exe" --type=renderer --lang=cs --force-fieldtest=ConnCountImpact/conn_count_6/ConnnectBackupJobs/ConnectBackupJobsEnabled/DnsImpact/default_enabled_prefetch/DnsParallelism/parallel_default/GlobalSdch/global_enable_sdch/IdleSktToImpact/idle_timeout_10/Prefetch/ContentPrefetchPrerender2/ProxyConnectionImpact/proxy_connections_32/SpdyImpact/npn_with_spdy/SuggestHostPrefix/Default_Prefix/WarmSocketImpact/warmest_socket/ --disable-client-side-phishing-detection --channel=3392.08AB4840.1821637052 /prefetch:3
c:\program files\srware iron\iron.exe
Script: Quarantine, Delete, BC delete, Terminate
3392SRWare IronCopyright (C) 2006-2009 The Chromium Authors. All Rights Reserved.??1184.00 kb, rsAh,
created: 14.12.2010 18:47:47,
modified: 26.09.2011 23:11:18
Command line:
"C:\Program Files\SRWare Iron\iron.exe" -- "http://www.kaspersky.com/"
c:\program files\srware iron\iron.exe
Script: Quarantine, Delete, BC delete, Terminate
4020SRWare IronCopyright (C) 2006-2009 The Chromium Authors. All Rights Reserved.??1184.00 kb, rsAh,
created: 14.12.2010 18:47:47,
modified: 26.09.2011 23:11:18
Command line:
"C:\Program Files\SRWare Iron\iron.exe" --type=extension --lang=cs --force-fieldtest=ConnCountImpact/conn_count_6/ConnnectBackupJobs/ConnectBackupJobsEnabled/DnsImpact/default_enabled_prefetch/DnsParallelism/parallel_default/GlobalSdch/global_enable_sdch/IdleSktToImpact/idle_timeout_10/Prefetch/ContentPrefetchPrerender2/ProxyConnectionImpact/proxy_connections_32/SpdyImpact/npn_with_spdy/SuggestHostPrefix/Default_Prefix/WarmSocketImpact/warmest_socket/ --disable-client-side-phishing-detection --channel=3392.011E9160.1497422121 --ignored=" --type=renderer " /prefetch:3
c:\program files\srware iron\iron.exe
Script: Quarantine, Delete, BC delete, Terminate
1744SRWare IronCopyright (C) 2006-2009 The Chromium Authors. All Rights Reserved.??1184.00 kb, rsAh,
created: 14.12.2010 18:47:47,
modified: 26.09.2011 23:11:18
Command line:
"C:\Program Files\SRWare Iron\iron.exe" --type=plugin --plugin-path="C:\WINDOWS\system32\Macromed\Flash\NPSWF32.dll" --lang=cs --channel=3392.0809D700.882311347 /prefetch:4
c:\program files\srware iron\iron.exe
Script: Quarantine, Delete, BC delete, Terminate
216SRWare IronCopyright (C) 2006-2009 The Chromium Authors. All Rights Reserved.??1184.00 kb, rsAh,
created: 14.12.2010 18:47:47,
modified: 26.09.2011 23:11:18
Command line:
"C:\Program Files\SRWare Iron\iron.exe" --type=extension --lang=cs --force-fieldtest=ConnCountImpact/conn_count_6/ConnnectBackupJobs/ConnectBackupJobsEnabled/DnsImpact/default_enabled_prefetch/DnsParallelism/parallel_default/GlobalSdch/global_enable_sdch/IdleSktToImpact/idle_timeout_10/Prefetch/ContentPrefetchPrerender2/ProxyConnectionImpact/proxy_connections_32/SpdyImpact/npn_with_spdy/SuggestHostPrefix/Default_Prefix/WarmSocketImpact/warmest_socket/ --disable-client-side-phishing-detection --channel=3392.011E9840.941396014 --ignored=" --type=renderer " /prefetch:3
c:\program files\srware iron\iron.exe
Script: Quarantine, Delete, BC delete, Terminate
4028SRWare IronCopyright (C) 2006-2009 The Chromium Authors. All Rights Reserved.??1184.00 kb, rsAh,
created: 14.12.2010 18:47:47,
modified: 26.09.2011 23:11:18
Command line:
"C:\Program Files\SRWare Iron\iron.exe" --type=extension --lang=cs --force-fieldtest=ConnCountImpact/conn_count_6/ConnnectBackupJobs/ConnectBackupJobsEnabled/DnsImpact/default_enabled_prefetch/DnsParallelism/parallel_default/GlobalSdch/global_enable_sdch/IdleSktToImpact/idle_timeout_10/Prefetch/ContentPrefetchPrerender2/ProxyConnectionImpact/proxy_connections_32/SpdyImpact/npn_with_spdy/SuggestHostPrefix/Default_Prefix/WarmSocketImpact/warmest_socket/ --disable-client-side-phishing-detection --channel=3392.011E96E0.66784938 --ignored=" --type=renderer " /prefetch:3
c:\windows\system32\mmc.exe
Script: Quarantine, Delete, BC delete, Terminate
1940Konzola Microsoft Management Console© Microsoft Corporation. Všechna práva vyhrazena.??1382.00 kb, rsAh,
created: 25.10.2001 12:00:00,
modified: 14.04.2008 08:52:32
Command line:
"C:\WINDOWS\system32\mmc.exe" "C:\WINDOWS\system32\compmgmt.msc" /s
c:\program files\panda security\panda cloud antivirus\psunmain.exe
Script: Quarantine, Delete, BC delete, Terminate
1284Panda Cloud Antivirus© Panda 2011??429.31 kb, rsAh,
created: 28.04.2011 14:01:20,
modified: 28.04.2011 14:01:20
Command line:
"C:\Program Files\Panda Security\Panda Cloud Antivirus\PSUNMain.exe" /Traybar
c:\program files\dbns\screen grabber 2.0\screengrabber.exe
Script: Quarantine, Delete, BC delete, Terminate
1584DBNSScreenGrabberCopyright © DBNS 2008??516.00 kb, rsAh,
created: 06.03.2008 13:28:50,
modified: 06.03.2008 13:28:50
Command line:
"C:\Program Files\DBNS\Screen Grabber 2.0\ScreenGrabber.exe"
c:\program files\dbns\screen grabber 2.0\screengrabber.exe
Script: Quarantine, Delete, BC delete, Terminate
456DBNSScreenGrabberCopyright © DBNS 2008??516.00 kb, rsAh,
created: 06.03.2008 13:28:50,
modified: 06.03.2008 13:28:50
Command line:
"C:\Program Files\DBNS\Screen Grabber 2.0\ScreenGrabber.exe"
c:\documents and settings\jarda\plocha\downloads\setup_11.0.0.1245.x01_2011_12_04_00_19.exe
Script: Quarantine, Delete, BC delete, Terminate
508  ??102041.02 kb, rsAh,
created: 03.12.2011 22:07:24,
modified: 03.12.2011 22:13:29
Command line:
"C:\Documents and Settings\Jarda\Plocha\Downloads\setup_11.0.0.1245.x01_2011_12_04_00_19.exe"
c:\program files\speedfan\speedfan.exe
Script: Quarantine, Delete, BC delete, Terminate
2172  ??4506.90 kb, rsAh,
created: 13.07.2011 07:33:08,
modified: 13.07.2011 07:33:08
Command line:
"C:\Program Files\SpeedFan\speedfan.exe"
c:\program files\usb safely remove\usbsafelyremove.exe
Script: Quarantine, Delete, BC delete, Terminate
2192USB and SATA Device ManagerCopyright © 2011 by Crystal Rich Ltd??1796.34 kb, rsAh,
created: 08.11.2011 20:24:47,
modified: 04.08.2011 14:25:20
Command line:
"C:\Program Files\USB Safely Remove\USBSafelyRemove.exe" /startup
Detected:67, recognized as trusted 64
Module nameHandleDescriptionCopyrightMD5Used by processes
C:\DOCUME~1\Jarda\LOCALS~1\Temp\sfareca00001.dll
Script: Quarantine, Delete, BC delete
268435456  --2172
C:\Program Files\Mouse\Amoures.dll
Script: Quarantine, Delete, BC delete
14024704  --492
C:\Program Files\SRWare Iron\locales\cs.dll
Script: Quarantine, Delete, BC delete
1022361600  --2220, 3336, 3140, 3392, 4020, 1744, 216, 4028
C:\WINDOWS\system32\Amhooker.dll
Script: Quarantine, Delete, BC delete
42991616  --2972, 492, 1976, 1668, 3392, 1940, 1284, 1584, 456, 508, 2192
Modules detected:611, recognized as trusted 607

Kernel Space Modules Viewer

ModuleBase addressSize in memoryDescriptionManufacturer
C:\WINDOWS\system32\DRIVERS\Amfilter.sys
Script: Quarantine, Delete, BC delete
F77A7000008000 (32768)Mouse Filter Driver(Standard mouse types) 2001-2007
C:\WINDOWS\system32\DRIVERS\Amusbprt.sys
Script: Quarantine, Delete, BC delete
F2C41000009000 (36864)HID Mouse Filter Driver(Standard mouse types) 2001-2007
C:\WINDOWS\System32\Drivers\dump_atapi.sys
Script: Quarantine, Delete, BC delete
AD1FA000018000 (98304)
C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Script: Quarantine, Delete, BC delete
F7999000002000 (8192)
C:\Program Files\Roland\Virtual Sound Canvas VST\RVIEg01VST.sys
Script: Quarantine, Delete, BC delete
A99D3000028000 (163840)Roland VSC Synthesizer EngineCopyright (C) 2001 Roland Corporation, All Rights Reserved
C:\WINDOWS\system32\Drivers\sptd.sys
Script: Quarantine, Delete, BC delete
F7276000110000 (1114112)
Modules detected - 151, recognized as trusted - 145

Services

ServiceDescriptionStatusFileGroupDependencies
CardBusService
Service: Stop, Delete, Disable, BC delete
CardBusServiceNot startedCardBusService.sys
Script: Quarantine, Delete, BC delete
  
ttscp
Service: Stop, Delete, Disable, BC delete
Text-to-Speech system EposNot startedC:\Program Files\Epos\epos-2.4.85\src\epos.exe
Script: Quarantine, Delete, BC delete
  
VideoAcceleratorService
Service: Stop, Delete, Disable, BC delete
VideoAcceleratorServiceNot startedC:\PROGRA~1\SpeedBit Video Accelerator\VideoAcceleratorService.exe
Script: Quarantine, Delete, BC delete
  
Detected - 120, recognized as trusted - 117

Drivers

ServiceDescriptionStatusFileGroupDependencies
Amfilter
Driver: Unload, Delete, Disable, BC delete
Compatible Mouse Filter DriverRunningC:\WINDOWS\system32\DRIVERS\Amfilter.sys
Script: Quarantine, Delete, BC delete
Pointer Class 
Amusbprt
Driver: Unload, Delete, Disable, BC delete
Compatible HID-compliant Mouse DriverRunningC:\WINDOWS\system32\DRIVERS\Amusbprt.sys
Script: Quarantine, Delete, BC delete
Pointer Port 
RVIEGVST
Driver: Unload, Delete, Disable, BC delete
VSC VST EngineRunningC:\Program Files\Roland\Virtual Sound Canvas VST\RVIEg01VST.sys
Script: Quarantine, Delete, BC delete
  
sptd
Driver: Unload, Delete, Disable, BC delete
sptdRunningC:\WINDOWS\SystemRoot\System32\Drivers\sptd.sys
Script: Quarantine, Delete, BC delete
Boot Bus Extender 
Abiosdsk
Driver: Unload, Delete, Disable, BC delete
AbiosdskNot startedAbiosdsk.sys
Script: Quarantine, Delete, BC delete
Primary disk 
abp480n5
Driver: Unload, Delete, Disable, BC delete
abp480n5Not startedabp480n5.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
adpu160m
Driver: Unload, Delete, Disable, BC delete
adpu160mNot startedadpu160m.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
Aha154x
Driver: Unload, Delete, Disable, BC delete
Aha154xNot startedAha154x.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
aic78u2
Driver: Unload, Delete, Disable, BC delete
aic78u2Not startedaic78u2.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
aic78xx
Driver: Unload, Delete, Disable, BC delete
aic78xxNot startedaic78xx.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
AliIde
Driver: Unload, Delete, Disable, BC delete
AliIdeNot startedAliIde.sys
Script: Quarantine, Delete, BC delete
System Bus Extender 
amsint
Driver: Unload, Delete, Disable, BC delete
amsintNot startedamsint.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
AODDriver
Driver: Unload, Delete, Disable, BC delete
AODDriverNot startedAODDriver.sys
Script: Quarantine, Delete, BC delete
  
asc
Driver: Unload, Delete, Disable, BC delete
ascNot startedasc.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
asc3350p
Driver: Unload, Delete, Disable, BC delete
asc3350pNot startedasc3350p.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
asc3550
Driver: Unload, Delete, Disable, BC delete
asc3550Not startedasc3550.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
Atdisk
Driver: Unload, Delete, Disable, BC delete
AtdiskNot startedAtdisk.sys
Script: Quarantine, Delete, BC delete
Primary disk 
cd20xrnt
Driver: Unload, Delete, Disable, BC delete
cd20xrntNot startedcd20xrnt.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
CmdIde
Driver: Unload, Delete, Disable, BC delete
CmdIdeNot startedCmdIde.sys
Script: Quarantine, Delete, BC delete
System Bus Extender 
Cpqarray
Driver: Unload, Delete, Disable, BC delete
CpqarrayNot startedCpqarray.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
cpuz135
Driver: Unload, Delete, Disable, BC delete
cpuz135Not startedC:\WINDOWS\TEMP\cpuz135\cpuz135_x32.sys
Script: Quarantine, Delete, BC delete
  
dac960nt
Driver: Unload, Delete, Disable, BC delete
dac960ntNot starteddac960nt.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
dpti2o
Driver: Unload, Delete, Disable, BC delete
dpti2oNot starteddpti2o.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
DSDrv4
Driver: Unload, Delete, Disable, BC delete
DSDrv4Not startedDSDrv4.sys
Script: Quarantine, Delete, BC delete
  
esihdrv
Driver: Unload, Delete, Disable, BC delete
esihdrvNot startedesihdrv.sys
Script: Quarantine, Delete, BC delete
  
hpn
Driver: Unload, Delete, Disable, BC delete
hpnNot startedhpn.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
hpt3xx
Driver: Unload, Delete, Disable, BC delete
hpt3xxNot startedhpt3xx.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
i2omp
Driver: Unload, Delete, Disable, BC delete
i2ompNot startedi2omp.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
ini910u
Driver: Unload, Delete, Disable, BC delete
ini910uNot startedini910u.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
IntelIde
Driver: Unload, Delete, Disable, BC delete
IntelIdeNot startedIntelIde.sys
Script: Quarantine, Delete, BC delete
System Bus Extender 
mraid35x
Driver: Unload, Delete, Disable, BC delete
mraid35xNot startedmraid35x.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
PCIDump
Driver: Unload, Delete, Disable, BC delete
PCIDumpNot startedPCIDump.sys
Script: Quarantine, Delete, BC delete
PCI Configuration 
perc2
Driver: Unload, Delete, Disable, BC delete
perc2Not startedperc2.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
perc2hib
Driver: Unload, Delete, Disable, BC delete
perc2hibNot startedperc2hib.sys
Script: Quarantine, Delete, BC delete
Filter 
ql1080
Driver: Unload, Delete, Disable, BC delete
ql1080Not startedql1080.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
Ql10wnt
Driver: Unload, Delete, Disable, BC delete
Ql10wntNot startedQl10wnt.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
ql12160
Driver: Unload, Delete, Disable, BC delete
ql12160Not startedql12160.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
ql1240
Driver: Unload, Delete, Disable, BC delete
ql1240Not startedql1240.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
ql1280
Driver: Unload, Delete, Disable, BC delete
ql1280Not startedql1280.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
RushTopDevice_J
Driver: Unload, Delete, Disable, BC delete
RushTopDevice_JNot startedRushTopDevice_J.sys
Script: Quarantine, Delete, BC delete
  
Simbad
Driver: Unload, Delete, Disable, BC delete
SimbadNot startedSimbad.sys
Script: Quarantine, Delete, BC delete
Filter 
Sparrow
Driver: Unload, Delete, Disable, BC delete
SparrowNot startedSparrow.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
StMp3Rec
Driver: Unload, Delete, Disable, BC delete
Player Recovery Device Control DriverNot startedC:\WINDOWS\system32\Drivers\StMp3Rec.sys
Script: Quarantine, Delete, BC delete
  
sym_hi
Driver: Unload, Delete, Disable, BC delete
sym_hiNot startedsym_hi.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
sym_u3
Driver: Unload, Delete, Disable, BC delete
sym_u3Not startedsym_u3.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
symc810
Driver: Unload, Delete, Disable, BC delete
symc810Not startedsymc810.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
symc8xx
Driver: Unload, Delete, Disable, BC delete
symc8xxNot startedsymc8xx.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
TosIde
Driver: Unload, Delete, Disable, BC delete
TosIdeNot startedTosIde.sys
Script: Quarantine, Delete, BC delete
System Bus Extender 
ultra
Driver: Unload, Delete, Disable, BC delete
ultraNot startedultra.sys
Script: Quarantine, Delete, BC delete
SCSI miniport 
ViaIde
Driver: Unload, Delete, Disable, BC delete
ViaIdeNot startedViaIde.sys
Script: Quarantine, Delete, BC delete
System Bus Extender 
Detected - 238, recognized as trusted - 188

Autoruns

File nameStatusStartup methodDescription
"C:\Program Files\Soluto\Debugger\x86\ntsd.exe" -p %ld -e %ld -noio -c "g;g;.dump /u /o /mFhut C:\Documents and Settings\All Users\Data aplikací\Soluto\Dumps\ApplicationDumps\AeDebug.dmp; .kill; q"
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\AeDebug, Debugger
(None)
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_USERS, .DEFAULT\Control Panel\Desktop, scrnsave.exe
Delete
(None)
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_USERS, S-1-5-18\Control Panel\Desktop, scrnsave.exe
Delete
C:\Documents and Settings\Jarda\Local Settings\temp\_uninst_63443825.bat
Script: Quarantine, Delete, BC delete
ActiveShortcut in Autoruns folderC:\Documents and Settings\Jarda\Nabídka Start\Programy\Po spuštění\, C:\Documents and Settings\Jarda\Nabídka Start\Programy\Po spuštění\_uninst_63443825.lnk,
C:\PROGRA~1\PERFEC~1\CONTEX~1.DLL
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved, {84058084-7609-44D1-B3CC-7A9436CB6D92}
Delete
C:\Program Files\AmaPro\OnLineSlovnik\onlineslovnik.exe
Script: Quarantine, Delete, BC delete
ActiveShortcut in Autoruns folderC:\Documents and Settings\Jarda\Data aplikací\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\Jarda\Data aplikací\Microsoft\Internet Explorer\Quick Launch\On Line Slovník.lnk,
C:\Program Files\Ashampoo\Ashampoo WinOptimizer 8\DfsdkS.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\DfSdkS, EventMessageFile
C:\Program Files\Cepstral\bin\ceptools.cpl
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SOFTWARE\Microsoft\Windows\CurrentVersion\Control Panel\Cpls, Cepstral Tools
Delete
C:\Program Files\Mouse\Amoumain.exe
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, WheelMouse
Delete
C:\WINDOWS\System32\Drivers\AliIde.sys
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\aliide, EventMessageFile
C:\WINDOWS\System32\Drivers\CmdIde.sys
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\cmdide, EventMessageFile
C:\WINDOWS\System32\Drivers\IntelIde.sys
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\intelide, EventMessageFile
C:\WINDOWS\System32\Drivers\TosIde.sys
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\toside, EventMessageFile
C:\WINDOWS\System32\Drivers\ViaIde.sys
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\viaide, EventMessageFile
C:\WINDOWS\System32\Drivers\lbrtfdc.sys
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\lbrtfdc, EventMessageFile
C:\WINDOWS\System32\drivers\Amusbprt.sys
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\Amusbprt, EventMessageFile
C:\WINDOWS\System32\drivers\avipbb.sys
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\avipbb, EventMessageFile
C:\WINDOWS\System32\drivers\avkmgr.sys
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\avkmgr, EventMessageFile
C:\WINDOWS\System32\drivers\dwprot.sys
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\DwProt, EventMessageFile
C:\WINDOWS\syst
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SOFTWARE\Microsoft\Windows\CurrentVersion\Control Panel\Cpls, PSUNCPL
Delete
C:\WINDOWS\system32\CTsvcCDA.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Creative Service for CDROM Access, EventMessageFile
C:\WINDOWS\system32\HDDSvc.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\HDD Info Service, EventMessageFile
C:\WINDOWS\system32\MsSip1.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 1, $DLL
Delete
C:\WINDOWS\system32\MsSip2.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 2, $DLL
Delete
C:\WINDOWS\system32\MsSip3.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 3, $DLL
Delete
C:\WINDOWS\system32\psxss.exe
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Session Manager\SubSystems, Posix
SDEvents.dll
Script: Quarantine, Delete, BC delete
--Registry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Spybot - Search & Destroy 2, EventMessageFile
kbd101.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\i8042prt\Parameters, LayerDriver JPN
Delete
kbd101a.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\i8042prt\Parameters, LayerDriver KOR
Delete
mvfs32.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_USERS, .DEFAULT\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_USERS, S-1-5-19\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_USERS, S-1-5-20\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_USERS, S-1-5-18\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_USERS, S-1-5-21-1390067357-1960408961-725345543-1003\Control Panel\IOProcs, MVB
Delete
vgafix.fon
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fixedfon.fon
Delete
vgaoem.fon
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, oemfonts.fon
Delete
vgasys.fon
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fonts.fon
Delete
Autoruns items detected - 974, recognized as trusted - 937

Microsoft Internet Explorer extension modules (BHOs, Toolbars ...)

File nameTypeDescriptionManufacturerCLSID
Extension module{2670000A-7350-4f3c-8081-5663EE0C6C49}
Delete
/C:\Program Files\Siber Systems\AI RoboForm\RoboFormComFillForms.html
Script: Quarantine, Delete, BC delete
Extension module{320AF880-6646-11D3-ABEE-C5DBF3571F46}
Delete
/C:\Program Files\Siber Systems\AI RoboForm\RoboFormComSavePass.html
Script: Quarantine, Delete, BC delete
Extension module{320AF880-6646-11D3-ABEE-C5DBF3571F49}
Delete
/C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
Script: Quarantine, Delete, BC delete
Extension module{724d43aa-0d85-11d4-9908-00400523e39a}
Delete
/C:\Program Files\Siber Systems\AI RoboForm\RoboFormComShowToolbar.html
Script: Quarantine, Delete, BC delete
Extension module{92780B25-18CC-41C8-B9BE-3C9C571A8263}
Delete
Explorer Bar{C5F7A735-70F1-477F-8C36-6FF3C736017B}
Delete
Elements detected - 26, recognized as trusted - 20

Windows Explorer extension modules

File nameDestinationDescriptionManufacturerCLSID
Rozšíření ikony programu HyperTerminal{88895560-9AA2-1069-930E-00AA0030EBC8}
Delete
Hlavní panel a nabídka Start{0DF44EAA-FF21-4412-828E-260A8728E7F1}
Delete
Uživatelské účty{7A9D77BD-5403-11d2-8785-2E0420524153}
Delete
SmartFolders{684AF5C2-4C42-4756-B1AA-05206B6A70B9}
Delete
Zařízení technologie UPnP{e57ce731-33e8-4c51-8354-bb4de9d215d1}
Delete
Shell Extension for Malware scanning{45AC2688-0253-4ED8-97DE-B5370FA7D48A}
Delete
C:\PROGRA~1\PERFEC~1\CONTEX~1.DLL
Script: Quarantine, Delete, BC delete
Context Menu Shell Extension{84058084-7609-44D1-B3CC-7A9436CB6D92}
Delete
Elements detected - 228, recognized as trusted - 221

Printing system extensions (print monitors, providers)

File nameTypeNameDescriptionManufacturer
Elements detected - 9, recognized as trusted - 9

Task Scheduler jobs

File nameJob nameJob statusDescriptionManufacturer
C:\Program Files\ErrorEND\ErrorEND.exe
Script: Quarantine, Delete, BC delete
ErrorEND.jobThe task has not yet run.
C:\Program Files\REGSERVO\RegSERVO.exe
Script: Quarantine, Delete, BC delete
RegSERVO.jobThe task has not yet run.
C:\Program Files\NCH Swift Sound\TwelveKeys\twelvekeys.exe
Script: Quarantine, Delete, BC delete
twelvekeysShakeIcon.jobThe task will not run at the scheduled times because it has been disabled.TwelveKeys Music Transcription SoftwareNCH Software
Elements detected - 13, recognized as trusted - 10

SPI/LSP settings

Namespace providers (NSP)
ProviderStatusEXE fileDescriptionGUID
Detected - 4, recognized as trusted - 4
Transport protocol providers (TSP, LSP)
ProviderEXE fileDescription
Detected - 19, recognized as trusted - 19
Results of automatic SPI settings check
LSP settings checked. No errors detected

TCP/UDP ports

PortStatusRemote HostRemote PortApplicationNotes
TCP ports
135LISTENING0.0.0.039102[1224] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
139LISTENING0.0.0.037004[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
445LISTENING0.0.0.063738[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
1034LISTENING0.0.0.028764[2684] c:\windows\system32\alg.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1040CLOSE_WAIT2.21.34.1680[1544] c:\documents and settings\all users\data aplikací\panda security url filtering\panda_url_filtering.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1891ESTABLISHED46.255.230.8980[3392] c:\program files\srware iron\iron.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1893ESTABLISHED46.255.224.2680[3392] c:\program files\srware iron\iron.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1895ESTABLISHED46.255.224.2680[3392] c:\program files\srware iron\iron.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1906ESTABLISHED69.171.242.1380[3392] c:\program files\srware iron\iron.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1919ESTABLISHED80.239.148.9480[3392] c:\program files\srware iron\iron.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1929ESTABLISHED173.194.65.10180[3392] c:\program files\srware iron\iron.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1931ESTABLISHED173.194.67.9580[3392] c:\program files\srware iron\iron.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1939ESTABLISHED74.125.39.14780[3392] c:\program files\srware iron\iron.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1947ESTABLISHED74.125.39.14780[3392] c:\program files\srware iron\iron.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1949ESTABLISHED66.220.146.49443[3392] c:\program files\srware iron\iron.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1950ESTABLISHED80.239.148.10280[3392] c:\program files\srware iron\iron.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1955ESTABLISHED74.125.39.16680[3392] c:\program files\srware iron\iron.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1962ESTABLISHED74.125.39.15480[3392] c:\program files\srware iron\iron.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1994TIME_WAIT80.239.148.8980[0]   
2007TIME_WAIT80.239.148.8980[0]   
2008TIME_WAIT91.216.218.20780[0]   
2012ESTABLISHED80.239.148.8980[3604] c:\program files\panda security\panda cloud antivirus\psanhost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
2016ESTABLISHED74.125.39.15480[456] c:\program files\dbns\screen grabber 2.0\screengrabber.exe
Script: Quarantine, Delete, BC delete, Terminate
 
2037TIME_WAIT91.216.218.20780[0]   
2038TIME_WAIT91.216.218.20780[0]   
2039TIME_WAIT91.216.218.20780[0]   
2041TIME_WAIT91.216.218.20780[0]   
2042TIME_WAIT91.216.218.20780[0]   
2043TIME_WAIT91.216.218.20780[0]   
3306LISTENING0.0.0.028883[3152] c:\program files\mysql\mysql server 5.1\bin\mysqld.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5354LISTENING0.0.0.039102[2712] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, BC delete, Terminate
 
UDP ports
123LISTENING----[1296] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
123LISTENING----[1296] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
137LISTENING----[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
138LISTENING----[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
445LISTENING----[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
500LISTENING----[884] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1026LISTENING----[2712] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1044LISTENING----[1712] c:\documents and settings\jarda\local settings\data aplikací\chemtable software\handy start menu\handystartmenu.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1051LISTENING----[2876] c:\program files\common files\speedbit\sbupdate\sbupdate.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1900LISTENING----[1592] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1900LISTENING----[1592] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
2013LISTENING----[456] c:\program files\dbns\screen grabber 2.0\screengrabber.exe
Script: Quarantine, Delete, BC delete, Terminate
 
4500LISTENING----[884] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5353LISTENING----[2712] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, BC delete, Terminate
 

Downloaded Program Files (DPF)

File nameDescriptionManufacturerCLSIDSource URL
Elements detected - 8, recognized as trusted - 8

Control Panel Applets (CPL)

File nameDescriptionManufacturer
Elements detected - 31, recognized as trusted - 31

Active Setup

File nameDescriptionManufacturerCLSID
Elements detected - 15, recognized as trusted - 15

HOSTS file

Hosts file record
127.0.0.1       localhost
Clear Hosts file

Protocols and handlers

File nameTypeDescriptionManufacturerCLSID
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Delete
"C:\Program Files\Common Files\BinarySense\hlAPP.dll"
Script: Quarantine, Delete, BC delete
Handler (hddlife: pluggable protocol){BD758015-47D9-477A-8873-4B688A2BC0E2}
Delete
Elements detected - 33, recognized as trusted - 29

Suspicious objects

FileDescriptionType
R:\autorun.inf
Script: Quarantine, Delete, BC delete
Suspicion by Heuristic analysis HSC: suspicion for hidden autorun (high degree of probability)


Main script of analysis
Windows version: Microsoft Windows XP, Build=2600, SP="Service Pack 3"
System Restore: enabled
1.1 Searching for user-mode API hooks
 Analysis: kernel32.dll, export table found in section .text
IAT modification detected: CreateProcessA - 00BE0010<>7C80236B
IAT modification detected: GetModuleFileNameA - 00BE0080<>7C80B56F
IAT modification detected: FreeLibrary - 00BE00F0<>7C80AC7E
IAT modification detected: GetModuleFileNameW - 00BE0160<>7C80B475
IAT modification detected: CreateProcessW - 00BE01D0<>7C802336
IAT modification detected: LoadLibraryW - 00BE02B0<>7C80AEEB
IAT modification detected: LoadLibraryA - 00BE0320<>7C801D7B
IAT modification detected: GetProcAddress - 00BE0390<>7C80AE40
 Analysis: ntdll.dll, export table found in section .text
 Analysis: user32.dll, export table found in section .text
 Analysis: advapi32.dll, export table found in section .text
 Analysis: ws2_32.dll, export table found in section .text
 Analysis: wininet.dll, export table found in section .text
 Analysis: rasapi32.dll, export table found in section .text
 Analysis: urlmon.dll, export table found in section .text
 Analysis: netapi32.dll, export table found in section .text
1.2 Searching for kernel-mode API hooks
 Driver loaded successfully
 SDT found (RVA=085700)
 Kernel ntkrnlpa.exe found in memory at address 804D7000
   SDT = 8055C700
   KiST = 80504480 (284)
Functions checked: 284, intercepted: 0, restored: 0
1.3 Checking IDT and SYSENTER
 Analysis for CPU 1
 Analysis for CPU 2
CmpCallCallBacks = 00093D84
Disable callback - óćĺ íĺéňčđŕëčçîâŕíű
 Checking IDT and SYSENTER - complete
1.4 Searching for masking processes and drivers
 Checking not performed: extended monitoring driver (AVZPM) is not installed
1.5 Checking of IRP handlers
 Driver loaded successfully
\FileSystem\ntfs[IRP_MJ_CREATE] = 8B63C1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_CLOSE] = 8B63C1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_WRITE] = 8B63C1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_INFORMATION] = 8B63C1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_INFORMATION] = 8B63C1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_EA] = 8B63C1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_EA] = 8B63C1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_VOLUME_INFORMATION] = 8B63C1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_VOLUME_INFORMATION] = 8B63C1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_DIRECTORY_CONTROL] = 8B63C1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_FILE_SYSTEM_CONTROL] = 8B63C1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_DEVICE_CONTROL] = 8B63C1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_LOCK_CONTROL] = 8B63C1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_SECURITY] = 8B63C1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_SECURITY] = 8B63C1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_PNP] = 8B63C1E8 -> hook not defined
\FileSystem\FastFat[IRP_MJ_CREATE] = 89B32430 -> hook not defined
\FileSystem\FastFat[IRP_MJ_CLOSE] = 89B32430 -> hook not defined
\FileSystem\FastFat[IRP_MJ_WRITE] = 89B32430 -> hook not defined
\FileSystem\FastFat[IRP_MJ_QUERY_INFORMATION] = 89B32430 -> hook not defined
\FileSystem\FastFat[IRP_MJ_SET_INFORMATION] = 89B32430 -> hook not defined
\FileSystem\FastFat[IRP_MJ_QUERY_EA] = 89B32430 -> hook not defined
\FileSystem\FastFat[IRP_MJ_SET_EA] = 89B32430 -> hook not defined
\FileSystem\FastFat[IRP_MJ_QUERY_VOLUME_INFORMATION] = 89B32430 -> hook not defined
\FileSystem\FastFat[IRP_MJ_SET_VOLUME_INFORMATION] = 89B32430 -> hook not defined
\FileSystem\FastFat[IRP_MJ_DIRECTORY_CONTROL] = 89B32430 -> hook not defined
\FileSystem\FastFat[IRP_MJ_FILE_SYSTEM_CONTROL] = 89B32430 -> hook not defined
\FileSystem\FastFat[IRP_MJ_DEVICE_CONTROL] = 89B32430 -> hook not defined
\FileSystem\FastFat[IRP_MJ_LOCK_CONTROL] = 89B32430 -> hook not defined
\FileSystem\FastFat[IRP_MJ_PNP] = 89B32430 -> hook not defined
 Checking - complete
>>> R:\autorun.inf HSC: suspicion for  hidden autorun (high degree of probability)
>>> Suspecting the masking of\driver service registry key ".NET Data Provider for SqlServe"
>> Services: potentially dangerous service allowed: RemoteRegistry (Vzdálený registr)
>> Services: potentially dangerous service allowed: TermService (Terminálová služba)
>> Services: potentially dangerous service allowed: SSDPSRV (Služba rozpoznávání pomocí protokolu SSDP)
>> Services: potentially dangerous service allowed: TlntSvr (Telnet)
>> Services: potentially dangerous service allowed: Schedule (Plánovač úloh)
>> Services: potentially dangerous service allowed: mnmsrvc (NetMeeting - Vzdálené sdílení plochy)
>> Services: potentially dangerous service allowed: RDSessMgr (Správce relací nápovědy ke vzdálené ploše)
> Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)!
>> Security: disk drives' autorun is enabled
>> Security: administrative shares (C$, D$ ...) are enabled
>> Security: anonymous user access is enabled
>> Security: sending Remote Assistant queries is enabled
 >>  Abnormal REG files association
 >>  Process termination timeout is out of admissible values
 >>  Service termination timeout is out of admissible values
 >>  Timeout of "Not Responding" verdict for processes is out of admissible values
 >>  Disable HDD autorun
 >>  Disable autorun from network drives
 >>  Disable CD/DVD autorun
 >>  Disable removable media autorun
System Analysis in progress

System Analysis - complete
Script commands
Add commands to script:
Additional operations:
File list