Results of system analysis

AVZ 4.32 http://z-oleg.com/secur/avz/

Process List

File namePIDDescriptionCopyrightMD5Information
c:\windows\system32\alg.exe
Script: Quarantine, Delete, Delete via BC, Terminate
2476Application Layer Gateway Service© Microsoft Corporation. All rights reserved.??43.50 kb, rsAh,
created: 2/28/2006 3:00:00 PM,
modified: 4/14/2008 3:12:12 AM
Command line:
C:\windows\System32\alg.exe
c:\documents and settings\king\my documents\downloads\compressed\avz4\avz4\avz.exe
Script: Quarantine, Delete, Delete via BC, Terminate
3020???????????? ??????? AVZ???????????? ??????? AVZ??733.00 kb, rsAh,
created: 9/13/2009 9:17:16 PM,
modified: 8/21/2009 2:40:32 PM
Command line:
"C:\Documents and Settings\King\My Documents\Downloads\Compressed\avz4\avz4\avz.exe"
c:\program files\eset\eset smart security\egui.exe
Script: Quarantine, Delete, Delete via BC, Terminate
312ESET GUICopyright (c) ESET 1992-2009. All rights reserved.??1982.07 kb, rsAh,
created: 4/9/2009 3:17:56 PM,
modified: 4/9/2009 3:17:56 PM
Command line:
"C:\Program Files\ESET\ESET Smart Security\egui.exe" /hide /waitservice
c:\program files\eset\eset smart security\ekrn.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1988ESET ServiceCopyright (c) ESET 1992-2009. All rights reserved.??714.69 kb, rsAh,
created: 4/9/2009 3:19:08 PM,
modified: 4/9/2009 3:19:08 PM
Command line:
"C:\Program Files\ESET\ESET Smart Security\ekrn.exe"
c:\windows\explorer.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1716Windows Explorer© Microsoft Corporation. All rights reserved.??1009.50 kb, rsAh,
created: 2/28/2006 3:00:00 PM,
modified: 4/14/2008 3:12:19 AM
Command line:
C:\windows\Explorer.EXE
c:\program files\internet download manager\idman.exe
Script: Quarantine, Delete, Delete via BC, Terminate
256Internet Download Manager (IDM)Tonec Inc., Copyright © 1999 - 2009??3045.42 kb, rsAh,
created: 9/9/2009 12:53:04 PM,
modified: 9/9/2009 4:21:22 PM
Command line:
"C:\Program Files\Internet Download Manager\IDMan.exe" /onboot
c:\program files\internet download manager\iemonitor.exe
Script: Quarantine, Delete, Delete via BC, Terminate
2592Internet Download Manager agent for click monitoring in IE-based browsersTonec Inc., Copyright © 1999 - 2008??245.42 kb, rsAh,
created: 9/9/2009 12:52:59 PM,
modified: 2/18/2008 4:01:01 PM
Command line:
"C:\Program Files\Internet Download Manager\IEMonitor.exe"
c:\program files\java\jre6\bin\jqs.exe
Script: Quarantine, Delete, Delete via BC, Terminate
376Java(TM) Quick Starter ServiceCopyright © 2004??149.78 kb, rsAh,
created: 9/10/2009 4:14:46 AM,
modified: 7/25/2009 5:23:10 AM
Command line:
"C:\Program Files\Java\jre6\bin\jqs.exe" -service -config "C:\Program Files\Java\jre6\lib\deploy\jqs\jqs.conf"
c:\windows\system32\lsass.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1040LSA Shell (Export Version)© Microsoft Corporation. All rights reserved.??13.00 kb, rsAh,
created: 2/28/2006 3:00:00 PM,
modified: 4/14/2008 3:12:24 AM
Command line:
C:\windows\system32\lsass.exe
c:\program files\common files\ahead\lib\nmbgmonitor.exe
Script: Quarantine, Delete, Delete via BC, Terminate
668Nero HomeCopyright (c) 1995-2006 Nero AG and its licensors??140.00 kb, rsAh,
created: 12/23/2006 6:05:20 PM,
modified: 12/23/2006 6:05:20 PM
Command line:
"C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe"
c:\program files\common files\ahead\lib\nmindexingservice.exe
Script: Quarantine, Delete, Delete via BC, Terminate
2360Nero HomeCopyright (c) 1995-2006 Nero AG and its licensors??256.00 kb, rsAh,
created: 12/23/2006 5:54:04 PM,
modified: 12/23/2006 5:54:04 PM
Command line:
"C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe"
c:\program files\common files\ahead\lib\nmindexstoresvr.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1248Nero HomeCopyright (c) 1995-2006 Nero AG and its licensors??884.00 kb, rsAh,
created: 12/23/2006 6:04:42 PM,
modified: 12/23/2006 6:04:42 PM
Command line:
"C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe" -Embedding
c:\program files\common files\real\update_ob\realsched.exe
Script: Quarantine, Delete, Delete via BC, Terminate
492RealNetworks SchedulerCopyright © RealNetworks, Inc. 1995-2007??193.52 kb, rsAh,
created: 9/10/2009 5:08:16 AM,
modified: 9/10/2009 5:08:16 AM
Command line:
"C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1296Generic Host Process for Win32 Services© Microsoft Corporation. All rights reserved.??14.00 kb, rsAh,
created: 2/28/2006 3:00:00 PM,
modified: 4/14/2008 3:12:36 AM
Command line:
C:\windows\system32\svchost -k rpcss
c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1360Generic Host Process for Win32 Services© Microsoft Corporation. All rights reserved.??14.00 kb, rsAh,
created: 2/28/2006 3:00:00 PM,
modified: 4/14/2008 3:12:36 AM
Command line:
C:\windows\System32\svchost.exe -k netsvcs
c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1484Generic Host Process for Win32 Services© Microsoft Corporation. All rights reserved.??14.00 kb, rsAh,
created: 2/28/2006 3:00:00 PM,
modified: 4/14/2008 3:12:36 AM
Command line:
C:\windows\system32\svchost.exe -k LocalService
c:\program files\utorrent\utorrent.exe
Script: Quarantine, Delete, Delete via BC, Terminate
592µTorrent©2009 BitTorrent, Inc. All Rights Reserved.??281.80 kb, rsAh,
created: 9/10/2009 4:21:21 AM,
modified: 9/10/2009 4:21:21 AM
Command line:
"C:\Program Files\uTorrent\uTorrent.exe"
Detected:31, recognized as trusted 26
Module nameHandleDescriptionCopyrightMD5Used by processes
C:\Program Files\Common Files\Ahead\Lib\AdvrCntr2.dll
Script: Quarantine, Delete, Delete via BC
268435456AdvrCntr ModuleCopyright 2006 Nero AG and its licensors--668
C:\Program Files\Common Files\Ahead\Lib\NeroIPP.dll
Script: Quarantine, Delete, Delete via BC
30081024Nero IPP ProxyCopyright (c) 2005 Nero AG and its licensors--1248
C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
Script: Quarantine, Delete, Delete via BC
4194304Nero HomeCopyright (c) 1995-2006 Nero AG and its licensors??668
C:\Program Files\Common Files\Ahead\Lib\NMCoFoundation.dll
Script: Quarantine, Delete, Delete via BC
25427968Nero HomeCopyright (c) 1995-2006 Nero AG and its licensors--1248
C:\Program Files\Common Files\Ahead\Lib\NMDataServices.dll
Script: Quarantine, Delete, Delete via BC
21757952Nero HomeCopyright (c) 1995-2006 Nero AG and its licensors--668, 2360, 1248
C:\Program Files\Common Files\Ahead\Lib\NMFullTextExtraction.dll
Script: Quarantine, Delete, Delete via BC
29360128Nero HomeCopyright (c) 1995-2006 Nero AG and its licensors--1248
C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
Script: Quarantine, Delete, Delete via BC
4194304Nero HomeCopyright (c) 1995-2006 Nero AG and its licensors??2360
C:\Program Files\Common Files\Ahead\Lib\NMIndexingServicePS.dll
Script: Quarantine, Delete, Delete via BC
268435456Nero HomeCopyright (c) 1995-2006 Nero AG and its licensors--2360, 1248
C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe
Script: Quarantine, Delete, Delete via BC
4194304Nero HomeCopyright (c) 1995-2006 Nero AG and its licensors??1248
C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvrPS.dll
Script: Quarantine, Delete, Delete via BC
19726336Nero HomeCopyright (c) 1995-2006 Nero AG and its licensors--668, 1248
C:\Program Files\Common Files\Ahead\Lib\NMLogCxx.dll
Script: Quarantine, Delete, Delete via BC
6815744Nero HomeCopyright (c) 1995-2006 Nero AG and its licensors--2360, 1248
C:\Program Files\Common Files\Ahead\Lib\NMPluginBase.dll
Script: Quarantine, Delete, Delete via BC
27000832Nero HomeCopyright (c) 1995-2006 Nero AG and its licensors--1248
C:\Program Files\Common Files\Ahead\Lib\NMSearchPluginSimilarImages.dll
Script: Quarantine, Delete, Delete via BC
29884416Nero HomeCopyright (c) 1995-2006 Nero AG and its licensors--1248
C:\Program Files\Common Files\Ahead\Lib\NMSQLDB.dll
Script: Quarantine, Delete, Delete via BC
268435456Nero HomeCopyright (c) 1995-2006 Nero AG and its licensors--1248
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
Script: Quarantine, Delete, Delete via BC
4194304RealNetworks SchedulerCopyright © RealNetworks, Inc. 1995-2007??492
C:\Program Files\Internet Download Manager\IDMan.exe
Script: Quarantine, Delete, Delete via BC
4194304Internet Download Manager (IDM)Tonec Inc., Copyright © 1999 - 2009??256
C:\Program Files\Internet Download Manager\IDMIECC.dll
Script: Quarantine, Delete, Delete via BC
42336256IDM BHO ModuleTonec Inc., Copyright © 1999 - 2009--1716
C:\Program Files\Real\RealPlayer\browserrecord\chrome\hook\rpchromebrowserrecordhelper.dll
Script: Quarantine, Delete, Delete via BC
1649541120RealPlayer Download and Record PluginCopyright © RealNetworks, Inc. 1995-2007--3020, 312, 1716, 256, 2592, 1248, 492, 592
C:\WINDOWS\system32\idmmbc.dll
Script: Quarantine, Delete, Delete via BC
268435456Internet Download Manager LSP dllTonec Inc., Copyright © 1999 - 2009--2476, 1988, 376, 1040, 1296, 1360, 1484, 592
Modules found:350, recognized as trusted 331

Kernel Space Modules Viewer

ModuleBase addressSize in memoryDescriptionManufacturer
C:\windows\System32\Drivers\dump_atapi.sys
Script: Quarantine, Delete, Delete via BC
F5BB0000018000 (98304)
C:\windows\System32\Drivers\dump_WMILIB.SYS
Script: Quarantine, Delete, Delete via BC
F7D92000002000 (8192)
C:\windows\system32\DRIVERS\slnt.sys
Script: Quarantine, Delete, Delete via BC
F7B58000005000 (20480)Silan 10/100M Network DriverCopyright (C) Silan Micro-Electronics Inc. 1990-2003
C:\windows\system32\Drivers\sptd.sys
Script: Quarantine, Delete, Delete via BC
F775D0000EA000 (958464)
Modules found - 116, recognized as trusted - 112

Services

ServiceDescriptionStatusFileGroupDependencies
NMIndexingService
Service: Stop, Delete, Disable
NMIndexingServiceRunningC:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
Script: Quarantine, Delete, Delete via BC
 RPCSS
ASKUpgrade
Service: Stop, Delete, Disable
ASKUpgradeNot startedC:\Program Files\AskBarDis\bar\bin\ASKUpgrade.exe
Script: Quarantine, Delete, Delete via BC
  
NBService
Service: Stop, Delete, Disable
NBServiceNot startedC:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
Script: Quarantine, Delete, Delete via BC
 RPCSS
Detected - 94, recognized as trusted - 91

Drivers

ServiceDescriptionStatusFileGroupDependencies
slnt
Driver: Unload, Delete, Disable
RTL8139D PCI Fast Ethernet AdapterRunningC:\windows\system32\DRIVERS\slnt.sys
Script: Quarantine, Delete, Delete via BC
NDIS 
sptd
Driver: Unload, Delete, Disable
sptdRunningC:\windows\System32\Drivers\sptd.sys
Script: Quarantine, Delete, Delete via BC
Boot Bus Extender 
Abiosdsk
Driver: Unload, Delete, Disable
AbiosdskNot startedAbiosdsk.sys
Script: Quarantine, Delete, Delete via BC
Primary disk 
abp480n5
Driver: Unload, Delete, Disable
abp480n5Not startedabp480n5.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
adpu160m
Driver: Unload, Delete, Disable
adpu160mNot startedadpu160m.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Aha154x
Driver: Unload, Delete, Disable
Aha154xNot startedAha154x.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
aic78u2
Driver: Unload, Delete, Disable
aic78u2Not startedaic78u2.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
aic78xx
Driver: Unload, Delete, Disable
aic78xxNot startedaic78xx.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
AliIde
Driver: Unload, Delete, Disable
AliIdeNot startedAliIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
amsint
Driver: Unload, Delete, Disable
amsintNot startedamsint.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
asc
Driver: Unload, Delete, Disable
ascNot startedasc.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
asc3350p
Driver: Unload, Delete, Disable
asc3350pNot startedasc3350p.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
asc3550
Driver: Unload, Delete, Disable
asc3550Not startedasc3550.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Atdisk
Driver: Unload, Delete, Disable
AtdiskNot startedAtdisk.sys
Script: Quarantine, Delete, Delete via BC
Primary disk 
cd20xrnt
Driver: Unload, Delete, Disable
cd20xrntNot startedcd20xrnt.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Changer
Driver: Unload, Delete, Disable
ChangerNot startedChanger.sys
Script: Quarantine, Delete, Delete via BC
Filter 
CmdIde
Driver: Unload, Delete, Disable
CmdIdeNot startedCmdIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
Cpqarray
Driver: Unload, Delete, Disable
CpqarrayNot startedCpqarray.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
dac960nt
Driver: Unload, Delete, Disable
dac960ntNot starteddac960nt.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
dpti2o
Driver: Unload, Delete, Disable
dpti2oNot starteddpti2o.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
hpn
Driver: Unload, Delete, Disable
hpnNot startedhpn.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
i2omgmt
Driver: Unload, Delete, Disable
i2omgmtNot startedi2omgmt.sys
Script: Quarantine, Delete, Delete via BC
SCSI Class 
i2omp
Driver: Unload, Delete, Disable
i2ompNot startedi2omp.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ini910u
Driver: Unload, Delete, Disable
ini910uNot startedini910u.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
lbrtfdc
Driver: Unload, Delete, Disable
lbrtfdcNot startedlbrtfdc.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
mraid35x
Driver: Unload, Delete, Disable
mraid35xNot startedmraid35x.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
PCIDump
Driver: Unload, Delete, Disable
PCIDumpNot startedPCIDump.sys
Script: Quarantine, Delete, Delete via BC
PCI Configuration 
PCIIde
Driver: Unload, Delete, Disable
PCIIdeNot startedPCIIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
PDCOMP
Driver: Unload, Delete, Disable
PDCOMPNot startedPDCOMP.sys
Script: Quarantine, Delete, Delete via BC
  
PDFRAME
Driver: Unload, Delete, Disable
PDFRAMENot startedPDFRAME.sys
Script: Quarantine, Delete, Delete via BC
  
PDRELI
Driver: Unload, Delete, Disable
PDRELINot startedPDRELI.sys
Script: Quarantine, Delete, Delete via BC
  
PDRFRAME
Driver: Unload, Delete, Disable
PDRFRAMENot startedPDRFRAME.sys
Script: Quarantine, Delete, Delete via BC
  
perc2
Driver: Unload, Delete, Disable
perc2Not startedperc2.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
perc2hib
Driver: Unload, Delete, Disable
perc2hibNot startedperc2hib.sys
Script: Quarantine, Delete, Delete via BC
Filter 
ql1080
Driver: Unload, Delete, Disable
ql1080Not startedql1080.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Ql10wnt
Driver: Unload, Delete, Disable
Ql10wntNot startedQl10wnt.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ql12160
Driver: Unload, Delete, Disable
ql12160Not startedql12160.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ql1240
Driver: Unload, Delete, Disable
ql1240Not startedql1240.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ql1280
Driver: Unload, Delete, Disable
ql1280Not startedql1280.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Simbad
Driver: Unload, Delete, Disable
SimbadNot startedSimbad.sys
Script: Quarantine, Delete, Delete via BC
Filter 
Sparrow
Driver: Unload, Delete, Disable
SparrowNot startedSparrow.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
sym_hi
Driver: Unload, Delete, Disable
sym_hiNot startedsym_hi.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
sym_u3
Driver: Unload, Delete, Disable
sym_u3Not startedsym_u3.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
symc810
Driver: Unload, Delete, Disable
symc810Not startedsymc810.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
symc8xx
Driver: Unload, Delete, Disable
symc8xxNot startedsymc8xx.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
TosIde
Driver: Unload, Delete, Disable
TosIdeNot startedTosIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
ultra
Driver: Unload, Delete, Disable
ultraNot startedultra.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ViaIde
Driver: Unload, Delete, Disable
ViaIdeNot startedViaIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
WDICA
Driver: Unload, Delete, Disable
WDICANot startedWDICA.sys
Script: Quarantine, Delete, Delete via BC
  
Detected - 166, recognized as trusted - 117

Autoruns

File nameStatusStartup methodDescription
C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_CURRENT_USER, Software\Microsoft\Windows\CurrentVersion\Run, BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}
Delete
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, TkBellExe
Delete
C:\Program Files\ESET\ESET Smart Security\NodEnabler\NodEnabler.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, NodEnabler
Delete
C:\Program Files\Internet Download Manager\IDMan.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_CURRENT_USER, Software\Microsoft\Windows\CurrentVersion\Run, IDMan
Delete
C:\Program Files\Nero\Nero 7\Nero Home\NeroHome.exe
Script: Quarantine, Delete, Delete via BC
ActiveShortcut in Startup folderC:\Documents and Settings\King\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\King\Application Data\Microsoft\Internet Explorer\Quick Launch\Nero Home Essentials SE.lnk,
C:\Program Files\Nero\Nero 7\Nero StartSmart\NeroStartSmart.exe
Script: Quarantine, Delete, Delete via BC
ActiveShortcut in Startup folderC:\Documents and Settings\King\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\King\Application Data\Microsoft\Internet Explorer\Quick Launch\Nero StartSmart Essentials.lnk,
C:\Program Files\QuickTime\QuickTimePlayer.exe
Script: Quarantine, Delete, Delete via BC
ActiveShortcut in Startup folderC:\Documents and Settings\King\Application Data\Microsoft\Internet Explorer\Quick Launch\, C:\Documents and Settings\King\Application Data\Microsoft\Internet Explorer\Quick Launch\QuickTime Player.lnk,
C:\windows\System32\hidserv.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\HidServ\Parameters, ServiceDll
Delete
C:\windows\System32\igmpv2.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IGMPv2, EventMessageFile
Delete
C:\windows\System32\ipbootp.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IPBOOTP, EventMessageFile
Delete
C:\windows\System32\iprip2.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IPRIP2, EventMessageFile
Delete
C:\windows\System32\ospf.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\OSPF, EventMessageFile
Delete
C:\windows\System32\ospfmib.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\OSPFMib, EventMessageFile
Delete
C:\windows\System32\polagent.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\PolicyAgent, EventMessageFile
Delete
C:\windows\System32\tssdis.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\TermServSessDir, EventMessageFile
Delete
C:\windows\system32\MsSip1.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 1, $DLL
Delete
C:\windows\system32\MsSip2.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 2, $DLL
Delete
C:\windows\system32\MsSip3.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 3, $DLL
Delete
C:\windows\system32\psxss.exe
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Session Manager\SubSystems, Posix
C:\windows\system32\stisvc.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System, EventMessageFile
Delete
C:\windows\system32\xvidvfw.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\Drivers32, VIDC.XVID
Delete
kbd101.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\i8042prt\Parameters, LayerDriver JPN
Delete
kbd101a.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\i8042prt\Parameters, LayerDriver KOR
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, .DEFAULT\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, S-1-5-19\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, S-1-5-20\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, S-1-5-18\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_CURRENT_USER, Control Panel\IOProcs, MVB
Delete
vgafix.fon
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fixedfon.fon
Delete
vgaoem.fon
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, oemfonts.fon
Delete
vgasys.fon
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fonts.fon
Delete
Autoruns items found - 532, recognized as trusted - 501

Internet Explorer extension modules (BHOs, Toolbars ...)

File nameTypeDescriptionManufacturerCLSID
C:\Program Files\Internet Download Manager\IDMIECC.dll
Script: Quarantine, Delete, Delete via BC
BHOIDM BHO ModuleTonec Inc., Copyright © 1999 - 2009{0055C089-8582-441B-A0BF-17B458C2A3A8}
Delete
C:\Program Files\AskBarDis\bar\bin\askBar.dll
Script: Quarantine, Delete, Delete via BC
BHOAsk.com ToolbarCopyright © 2008 Ask.com{201f27d4-3704-41d6-89c1-aa35e39143ed}
Delete
C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll
Script: Quarantine, Delete, Delete via BC
BHORealPlayer Download and Record PluginCopyright © RealNetworks, Inc. 1995-2007{3049C3E9-B461-4BC5-8870-4C09146192CA}
Delete
C:\Program Files\AskBarDis\bar\bin\askBar.dll
Script: Quarantine, Delete, Delete via BC
ToolbarAsk.com ToolbarCopyright © 2008 Ask.com{3041d03e-fd4b-44e0-b742-2d9b88305f98}
Delete
C:\Program Files\AskSearch\bin\DefaultSearch.dll
Script: Quarantine, Delete, Delete via BC
URLSearchHookDefaultSearch ModuleCopyright 2008{C94E154B-1459-4A47-966B-4B843BEFC7DB}
Delete
Items found - 12, recognized as trusted - 7

Windows Explorer extension modules

File nameDestinationDescriptionManufacturerCLSID
deskpan.dll
Script: Quarantine, Delete, Delete via BC
Display Panning CPL Extension{42071714-76d4-11d1-8b24-00a0c9068ff3}
Delete
Shell extensions for file compression{764BF0E1-F219-11ce-972D-00AA00A14F56}
Delete
Encryption Context Menu{853FE2B1-B769-11d0-9C4E-00C04FB6C6FA}
Delete
Taskbar and Start Menu{0DF44EAA-FF21-4412-828E-260A8728E7F1}
Delete
rundll32.exe C:\windows\system32\shimgvw.dll,ImageView_COMServer {00E7B358-F65B-4dcf-83DF-CD026B94BFD4}
Script: Quarantine, Delete, Delete via BC
Autoplay for SlideShow{00E7B358-F65B-4dcf-83DF-CD026B94BFD4}
Delete
User Accounts{7A9D77BD-5403-11d2-8785-2E0420524153}
Delete
C:\Program Files\Real\RealPlayer\rpshell.dll
Script: Quarantine, Delete, Delete via BC
Shell Extensions for RealOne PlayerRealPlayer Shell ExtensionsCopyright © RealNetworks, Inc. 2001-2007{F0CB00CD-5A07-4D91-97F5-A8C92CDA93E4}
Delete
IE User Assist{FAC3CBF6-8697-43d0-BAB9-DCD1FCE19D75}
Delete
Items found - 211, recognized as trusted - 203

Printing system extensions (print monitors, providers)

File nameTypeNameDescriptionManufacturer
Items found - 7, recognized as trusted - 7

Task Scheduler jobs

File nameJob nameJob stateDescriptionManufacturer
Items found - 3, recognized as trusted - 3

SPI/LSP settings

Namespace providers (NSP)
ManufacturerStatusEXE fileDescriptionGUID
Detected - 3, recognized as trusted - 3
Transport protocol providers (TSP, LSP)
ManufacturerEXE fileDescription
IDM_LAYERED_MSAFD Tcpip [TCP/IP]C:\WINDOWS\system32\idmmbc.dll
Script: Quarantine, Delete, Delete via BC
Tonec Inc., Copyright © 1999 - 2009
IDM_LAYERED_MSAFD Tcpip [UDP/IP]C:\WINDOWS\system32\idmmbc.dll
Script: Quarantine, Delete, Delete via BC
Tonec Inc., Copyright © 1999 - 2009
IDM_LAYERED_MSAFD Tcpip [RAW/IP]C:\WINDOWS\system32\idmmbc.dll
Script: Quarantine, Delete, Delete via BC
Tonec Inc., Copyright © 1999 - 2009
IDM_LAYERED_RSVP UDP Service ProviderC:\WINDOWS\system32\idmmbc.dll
Script: Quarantine, Delete, Delete via BC
Tonec Inc., Copyright © 1999 - 2009
IDM_LAYERED_RSVP TCP Service ProviderC:\WINDOWS\system32\idmmbc.dll
Script: Quarantine, Delete, Delete via BC
Tonec Inc., Copyright © 1999 - 2009
IDM_LPC:\WINDOWS\system32\idmmbc.dll
Script: Quarantine, Delete, Delete via BC
Tonec Inc., Copyright © 1999 - 2009
Detected - 17, recognized as trusted - 11
Results of automatic SPI settings check
LSP settings checked. No errors detected

TCP/UDP ports

PortStatusRemote HostRemote PortApplicationNotes
TCP ports
135LISTENING0.0.0.026648[1296] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
445LISTENING0.0.0.02048[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
1031LISTENING0.0.0.045277[2476] c:\windows\system32\alg.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
5152LISTENING0.0.0.010338[376] c:\program files\java\jre6\bin\jqs.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
24604LISTENING0.0.0.045113[592] c:\program files\utorrent\utorrent.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
30606LISTENING0.0.0.0213[1988] c:\program files\eset\eset smart security\ekrn.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
UDP ports
123LISTENING----[1360] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
445LISTENING----[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
500LISTENING----[1040] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1900LISTENING----[592] c:\program files\utorrent\utorrent.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1900LISTENING----[1484] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
4500LISTENING----[1040] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
24604LISTENING----[592] c:\program files\utorrent\utorrent.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 

Downloaded Program Files (DPF)

File nameDescriptionManufacturerCLSIDSource URL
Items found - 4, recognized as trusted - 4

Control Panel Applets (CPL)

File nameDescriptionManufacturer
Items found - 26, recognized as trusted - 26

Active Setup

File nameDescriptionManufacturerCLSID
Items found - 14, recognized as trusted - 14

HOSTS file

Hosts file record

127.0.0.1       localhost

Protocols and handlers

File nameTypeDescriptionManufacturerCLSID
Items found - 25, recognized as trusted - 25

Suspicious objects

FileDescriptionType
C:\windows\system32\Drivers\sptd.sys
Script: Quarantine, Delete, Delete via BC
Suspicion for RootkitKernel-mode hook
C:\Program Files\Real\RealPlayer\browserrecord\chrome\hook\rpchromebrowserrecordhelper.dll
Script: Quarantine, Delete, Delete via BC
Suspicion for KeyloggerSuspicion for Keylogger or Trojan DLL


AVZ Antiviral Toolkit log; AVZ version is 4.32
Scanning started at 9/13/2009 9:51:03 PM
Database loaded: signatures - 241239, NN profile(s) - 2, malware removal microprograms - 56, signature database released 12.09.2009 22:24
Heuristic microprograms loaded: 374
PVS microprograms loaded: 9
Digital signatures of system files loaded: 139608
Heuristic analyzer mode: Maximum heuristics mode
Malware removal mode: disabled
Windows version is: 5.1.2600, Service Pack 3 ; AVZ is run with administrator rights
System Restore: enabled
1. Searching for Rootkits and other software intercepting API functions
1.1 Searching for user-mode API hooks
 Analysis: kernel32.dll, export table found in section .text
 Analysis: ntdll.dll, export table found in section .text
 Analysis: user32.dll, export table found in section .text
 Analysis: advapi32.dll, export table found in section .text
 Analysis: ws2_32.dll, export table found in section .text
 Analysis: wininet.dll, export table found in section .text
 Analysis: rasapi32.dll, export table found in section .text
 Analysis: urlmon.dll, export table found in section .text
 Analysis: netapi32.dll, export table found in section .text
1.2 Searching for kernel-mode API hooks
 Driver loaded successfully
 SDT found (RVA=083220)
 Kernel ntoskrnl.exe found in memory at address 804D7000
   SDT = 8055A220
   KiST = 804E26A8 (284)
Function NtAssignProcessToJobObject (13) intercepted (805A24CA->83113630), hook not defined
Function NtCreateKey (29) intercepted (8057065D->F775E0D0), hook C:\windows\system32\Drivers\sptd.sys
Function NtEnumerateKey (47) intercepted (80570D64->F7763FB2), hook C:\windows\system32\Drivers\sptd.sys
Function NtEnumerateValueKey (49) intercepted (80590677->F7764340), hook C:\windows\system32\Drivers\sptd.sys
Function NtOpenKey (77) intercepted (80568D59->F775E0B0), hook C:\windows\system32\Drivers\sptd.sys
Function NtOpenProcess (7A) intercepted (805717C7->83112A60), hook not defined
Function NtOpenThread (80) intercepted (8058A1C9->83112E80), hook not defined
Function NtQueryKey (A0) intercepted (80570A6D->F7764418), hook C:\windows\system32\Drivers\sptd.sys
Function NtQueryValueKey (B1) intercepted (8056A1F2->F7764298), hook C:\windows\system32\Drivers\sptd.sys
Function NtSetValueKey (F7) intercepted (80572889->F77644AA), hook C:\windows\system32\Drivers\sptd.sys
Function NtSuspendProcess (FD) intercepted (8062F8F9->83113460), hook not defined
Function NtSuspendThread (FE) intercepted (805E046E->83113280), hook not defined
Function NtTerminateProcess (101) intercepted (805822EC->83112C90), hook not defined
Function NtTerminateThread (102) intercepted (8057B88F->831130B0), hook not defined
Functions checked: 284, intercepted: 14, restored: 0
1.3 Checking IDT and SYSENTER
 Analyzing CPU 1
 Checking IDT and SYSENTER - complete
1.4 Searching for masking processes and drivers
 Checking not performed: extended monitoring driver (AVZPM) is not installed
 Driver loaded successfully
1.5 Checking IRP handlers
\FileSystem\ntfs[IRP_MJ_CREATE] = 837DC1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_CLOSE] = 837DC1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_WRITE] = 837DC1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_INFORMATION] = 837DC1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_INFORMATION] = 837DC1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_EA] = 837DC1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_EA] = 837DC1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_VOLUME_INFORMATION] = 837DC1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_VOLUME_INFORMATION] = 837DC1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_DIRECTORY_CONTROL] = 837DC1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_FILE_SYSTEM_CONTROL] = 837DC1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_DEVICE_CONTROL] = 837DC1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_LOCK_CONTROL] = 837DC1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_SECURITY] = 837DC1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_SECURITY] = 837DC1E8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_PNP] = 837DC1E8 -> hook not defined
 Checking - complete
2. Scanning RAM
 Number of processes found: 31
Extended process analysis: 492 C:\Program Files\Common Files\Real\Update_OB\realsched.exe
[ES]:Application has no visible windows
[ES]:Registered for automatic startup !!
Extended process analysis: 668 C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe
[ES]:Program code includes networking-related functionality
[ES]:Application has no visible windows
[ES]:Registered for automatic startup !!
Extended process analysis: 1248 C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe
[ES]:Program code includes networking-related functionality
[ES]:Application has no visible windows
Extended process analysis: 2360 C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe
[ES]:Program code includes networking-related functionality
[ES]:Application has no visible windows
 Number of modules loaded: 327
Scanning RAM - complete
3. Scanning disks
4. Checking  Winsock Layered Service Provider (SPI/LSP)
 LSP settings checked. No errors detected
5. Searching for keyboard/mouse/windows events hooks (Keyloggers, Trojan DLLs)
C:\Program Files\Real\RealPlayer\browserrecord\chrome\hook\rpchromebrowserrecordhelper.dll --> Suspicion for Keylogger or Trojan DLL
C:\Program Files\Real\RealPlayer\browserrecord\chrome\hook\rpchromebrowserrecordhelper.dll>>> Behaviour analysis 
  1. Reacts to events: keyboard, mouse
C:\Program Files\Real\RealPlayer\browserrecord\chrome\hook\rpchromebrowserrecordhelper.dll>>> Neural net: file is 0.00% like a typical keyboard/mouse events interceptor
Note: Do NOT delete suspicious files, send them for analysis  (see FAQ for more details),  because there are lots of useful hooking DLLs
6. Searching for opened TCP/UDP ports used by malicious software
 Checking - disabled by user
7. Heuristic system check
Checking - complete
8. Searching for vulnerabilities
>> Services: potentially dangerous service allowed: RemoteRegistry (Remote Registry)
>> Services: potentially dangerous service allowed: TermService (Terminal Services)
>> Services: potentially dangerous service allowed: SSDPSRV (SSDP Discovery Service)
>> Services: potentially dangerous service allowed: Alerter (Alerter)
>> Services: potentially dangerous service allowed: Schedule (Task Scheduler)
>> Services: potentially dangerous service allowed: mnmsrvc (NetMeeting Remote Desktop Sharing)
>> Services: potentially dangerous service allowed: RDSessMgr (Remote Desktop Help Session Manager)
> Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)!
>> Security: disk drives' autorun is enabled
>> Security: administrative shares (C$, D$ ...) are enabled
>> Security: anonymous user access is enabled
>> Security: sending Remote Assistant queries is enabled
Checking - complete
9. Troubleshooting wizard
 >>  HDD autorun is allowed
 >>  Network drives autorun is allowed
 >>  Removable media autorun is allowed
Checking - complete
Files scanned: 358, extracted from archives: 0, malicious software found 0, suspicions - 0
Scanning finished at 9/13/2009 9:52:02 PM
Time of scanning: 00:01:02
If you have a suspicion on presence of viruses or questions on the suspected objects,
you can address http://virusinfo.info conference
System Analysis in progress

Script commands
Add commands to script:
Additional operations:
File list