Results of system analysis

AVZ 4.32 http://z-oleg.com/secur/avz/

Process List

File namePIDDescriptionCopyrightMD5Information
c:\program files\common files\lightscribe\lightscribecontrolpanel.exe
Script: Quarantine, Delete, Delete via BC, Terminate
2272 © Copyright 2003-2006 Hewlett-Packard Development Company, LP??2308.00 kb, rsAh,
created: 10/22/2008 7:57:34 PM,
modified: 10/22/2008 7:57:34 PM
Command line:
"C:\Program Files\Common Files\LightScribe\LightScribeControlPanel.exe" -hidden
c:\windows\system32\lxrsii1s.exe
Script: Quarantine, Delete, Delete via BC, Terminate
336  ??52.00 kb, rsAh,
created: 4/5/2008 11:35:33 PM,
modified: 5/19/2005 1:48:34 PM
Command line:
LxrSII1s.exe
c:\windows\system32\spoolsv.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1664Spooler SubSystem App© Microsoft Corporation. All rights reserved.??56.50 kb, rsah,
created: 8/3/2004 10:56:58 PM,
modified: 6/10/2005 4:53:32 PM
Command line:
C:\WINDOWS\system32\spoolsv.exe
Detected:41, recognized as trusted 39
Module nameHandleDescriptionCopyrightMD5Used by processes
C:\Program Files\Common Files\LightScribe\LightScribeControlPanel.exe
Script: Quarantine, Delete, Delete via BC
4194304 © Copyright 2003-2006 Hewlett-Packard Development Company, LP??2272
C:\Program Files\Lexmark Fax Solutions\ipcmt.dll
Script: Quarantine, Delete, Delete via BC
14090240IPC Core DllCopyright (C) 2003--1664
C:\WINDOWS\system32\LXF3OEM.DLL
Script: Quarantine, Delete, Delete via BC
268435456Lexmark Fax Solutions SoftwareCopyright (C) 2004--1664
C:\WINDOWS\system32\LXF3PMON.DLL
Script: Quarantine, Delete, Delete via BC
1346371584Print Monitor (Win2k/WinXP) --1664
C:\WINDOWS\system32\LXF3PMRC.DLL
Script: Quarantine, Delete, Delete via BC
14155776 Copyright © 2003--1664
C:\WINDOWS\system32\LxrSII1s.exe
Script: Quarantine, Delete, Delete via BC
4194304  ??336
Modules found:349, recognized as trusted 343

Kernel Space Modules Viewer

ModuleBase addressSize in memoryDescriptionManufacturer
C:\WINDOWS\System32\Drivers\dump_atapi.sys
Script: Quarantine, Delete, Delete via BC
EF160000018000 (98304)
C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Script: Quarantine, Delete, Delete via BC
F7BEA000002000 (8192)
C:\WINDOWS\system32\Drivers\LxrSII1d.sys
Script: Quarantine, Delete, Delete via BC
BA388000012000 (73728)
splk.sys
Script: Quarantine, Delete, Delete via BC
F7485000100000 (1048576)
Modules found - 132, recognized as trusted - 128

Services

ServiceDescriptionStatusFileGroupDependencies
LxrSII1s
Service: Stop, Delete, Disable
Lexar Secure IIRunningC:\WINDOWS\system32\LxrSII1s.exe
Script: Quarantine, Delete, Delete via BC
  
ALG
Service: Stop, Delete, Disable
Application Layer Gateway ServiceNot startedC:\WINDOWS\System32\alg.exe
Script: Quarantine, Delete, Delete via BC
  
LVSrvLauncher
Service: Stop, Delete, Disable
LVSrvLauncherNot startedC:\Program Files\Common Files\LogiShrd\SrvLnch\SrvLnch.exe
Script: Quarantine, Delete, Delete via BC
  
rpcapd
Service: Stop, Delete, Disable
Remote Packet Capture Protocol v.0 (experimental)Not startedC:\Program Files\WinPcap\rpcapd.exe
Script: Quarantine, Delete, Delete via BC
  
StkASSrv
Service: Stop, Delete, Disable
Syntek STK1160 ServiceNot startedC:\WINDOWS\System32\StkASv2K.exe
Script: Quarantine, Delete, Delete via BC
  
Detected - 107, recognized as trusted - 102

Drivers

ServiceDescriptionStatusFileGroupDependencies
LxrSII1d
Driver: Unload, Delete, Disable
Secure II DriverRunningC:\WINDOWS\system32\Drivers\LxrSII1d.sys
Script: Quarantine, Delete, Delete via BC
  
sptd
Driver: Unload, Delete, Disable
sptdRunningC:\WINDOWS\System32\Drivers\sptd.sys
Script: Quarantine, Delete, Delete via BC
Boot Bus Extender 
Abiosdsk
Driver: Unload, Delete, Disable
AbiosdskNot startedAbiosdsk.sys
Script: Quarantine, Delete, Delete via BC
Primary disk 
abp480n5
Driver: Unload, Delete, Disable
abp480n5Not startedabp480n5.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
adpu160m
Driver: Unload, Delete, Disable
adpu160mNot startedadpu160m.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Aha154x
Driver: Unload, Delete, Disable
Aha154xNot startedAha154x.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
aic78u2
Driver: Unload, Delete, Disable
aic78u2Not startedaic78u2.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
aic78xx
Driver: Unload, Delete, Disable
aic78xxNot startedaic78xx.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
AliIde
Driver: Unload, Delete, Disable
AliIdeNot startedAliIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
amsint
Driver: Unload, Delete, Disable
amsintNot startedamsint.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
asc
Driver: Unload, Delete, Disable
ascNot startedasc.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
asc3350p
Driver: Unload, Delete, Disable
asc3350pNot startedasc3350p.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
asc3550
Driver: Unload, Delete, Disable
asc3550Not startedasc3550.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Atdisk
Driver: Unload, Delete, Disable
AtdiskNot startedAtdisk.sys
Script: Quarantine, Delete, Delete via BC
Primary disk 
ATI Remote Wonder II
Driver: Unload, Delete, Disable
ATI Remote Wonder IINot startedC:\WINDOWS\system32\drivers\ATIRWVD.SYS
Script: Quarantine, Delete, Delete via BC
  
catchme
Driver: Unload, Delete, Disable
catchmeNot startedC:\ComboFix\catchme.sys
Script: Quarantine, Delete, Delete via BC
Base 
cd20xrnt
Driver: Unload, Delete, Disable
cd20xrntNot startedcd20xrnt.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Changer
Driver: Unload, Delete, Disable
ChangerNot startedChanger.sys
Script: Quarantine, Delete, Delete via BC
Filter 
CmdIde
Driver: Unload, Delete, Disable
CmdIdeNot startedCmdIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
Cpqarray
Driver: Unload, Delete, Disable
CpqarrayNot startedCpqarray.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
dac960nt
Driver: Unload, Delete, Disable
dac960ntNot starteddac960nt.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
dpti2o
Driver: Unload, Delete, Disable
dpti2oNot starteddpti2o.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
hpn
Driver: Unload, Delete, Disable
hpnNot startedhpn.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
i2omgmt
Driver: Unload, Delete, Disable
i2omgmtNot startedi2omgmt.sys
Script: Quarantine, Delete, Delete via BC
SCSI Class 
i2omp
Driver: Unload, Delete, Disable
i2ompNot startedi2omp.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ini910u
Driver: Unload, Delete, Disable
ini910uNot startedini910u.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
IntelIde
Driver: Unload, Delete, Disable
IntelIdeNot startedIntelIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
lbrtfdc
Driver: Unload, Delete, Disable
lbrtfdcNot startedlbrtfdc.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
MCSTRM
Driver: Unload, Delete, Disable
MCSTRMNot startedMCSTRM.sys
Script: Quarantine, Delete, Delete via BC
MCSTRM 
mraid35x
Driver: Unload, Delete, Disable
mraid35xNot startedmraid35x.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
PCIDump
Driver: Unload, Delete, Disable
PCIDumpNot startedPCIDump.sys
Script: Quarantine, Delete, Delete via BC
PCI Configuration 
PDCOMP
Driver: Unload, Delete, Disable
PDCOMPNot startedPDCOMP.sys
Script: Quarantine, Delete, Delete via BC
  
PDFRAME
Driver: Unload, Delete, Disable
PDFRAMENot startedPDFRAME.sys
Script: Quarantine, Delete, Delete via BC
  
PDRELI
Driver: Unload, Delete, Disable
PDRELINot startedPDRELI.sys
Script: Quarantine, Delete, Delete via BC
  
PDRFRAME
Driver: Unload, Delete, Disable
PDRFRAMENot startedPDRFRAME.sys
Script: Quarantine, Delete, Delete via BC
  
perc2
Driver: Unload, Delete, Disable
perc2Not startedperc2.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
perc2hib
Driver: Unload, Delete, Disable
perc2hibNot startedperc2hib.sys
Script: Quarantine, Delete, Delete via BC
Filter 
PsSdk30
Driver: Unload, Delete, Disable
PsSdk30Not startedC:\WINDOWS\system32\Drivers\PsSdk30.drv
Script: Quarantine, Delete, Delete via BC
  
ql1080
Driver: Unload, Delete, Disable
ql1080Not startedql1080.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Ql10wnt
Driver: Unload, Delete, Disable
Ql10wntNot startedQl10wnt.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ql12160
Driver: Unload, Delete, Disable
ql12160Not startedql12160.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ql1240
Driver: Unload, Delete, Disable
ql1240Not startedql1240.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
ql1280
Driver: Unload, Delete, Disable
ql1280Not startedql1280.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
Simbad
Driver: Unload, Delete, Disable
SimbadNot startedSimbad.sys
Script: Quarantine, Delete, Delete via BC
Filter 
Sparrow
Driver: Unload, Delete, Disable
SparrowNot startedSparrow.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
StkAMini
Driver: Unload, Delete, Disable
Syntek STK1160Not startedC:\WINDOWS\system32\Drivers\StkAMini.sys
Script: Quarantine, Delete, Delete via BC
  
StkScan
Driver: Unload, Delete, Disable
Syntek STK1160 Still ImageNot startedC:\WINDOWS\system32\Drivers\StkScan.sys
Script: Quarantine, Delete, Delete via BC
  
sym_hi
Driver: Unload, Delete, Disable
sym_hiNot startedsym_hi.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
sym_u3
Driver: Unload, Delete, Disable
sym_u3Not startedsym_u3.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
symc810
Driver: Unload, Delete, Disable
symc810Not startedsymc810.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
symc8xx
Driver: Unload, Delete, Disable
symc8xxNot startedsymc8xx.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
TosIde
Driver: Unload, Delete, Disable
TosIdeNot startedTosIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
ultra
Driver: Unload, Delete, Disable
ultraNot startedultra.sys
Script: Quarantine, Delete, Delete via BC
SCSI miniport 
USBAAPL
Driver: Unload, Delete, Disable
Apple Mobile USB DriverNot startedC:\WINDOWS\system32\Drivers\usbaapl.sys
Script: Quarantine, Delete, Delete via BC
Base 
ViaIde
Driver: Unload, Delete, Disable
ViaIdeNot startedViaIde.sys
Script: Quarantine, Delete, Delete via BC
System Bus Extender 
WDICA
Driver: Unload, Delete, Disable
WDICANot startedWDICA.sys
Script: Quarantine, Delete, Delete via BC
  
Detected - 210, recognized as trusted - 154

Autoruns

File nameStatusStartup methodDescription
%NEXT_ROOT%\NextLibrary\Executables\Foundation.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\AliDiskViewer, EventMessageFile
Delete
C:\Program Files\Common Files\LightScribe\LightScribeControlPanel.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_CURRENT_USER, Software\Microsoft\Windows\CurrentVersion\Run, LightScribe Control Panel
Delete
C:\Program Files\Google\Picasa3\Picasa3.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Picasa3, EventMessageFile
Delete
C:\Program Files\Symantec\LiveUpdate\ResLuComServer_3_2.DLL
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\LiveUpdate, EventMessageFile
Delete
C:\Program Files\The Print Shop 23\Remind.exe
Script: Quarantine, Delete, Delete via BC
ActiveShortcut in Startup folderC:\Documents and Settings\All Users\Start Menu\Programs\Startup\, C:\Documents and Settings\All Users\Start Menu\Programs\Startup\Event Reminder.lnk,
C:\WINDOWS\System32\PrintFilterPipelineSvc.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\PrintFilterPipelineSvc, EventMessageFile
Delete
C:\WINDOWS\System32\igmpv2.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IGMPv2, EventMessageFile
Delete
C:\WINDOWS\System32\ipbootp.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IPBOOTP, EventMessageFile
Delete
C:\WINDOWS\System32\iprip2.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\IPRIP2, EventMessageFile
Delete
C:\WINDOWS\System32\ospf.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\OSPF, EventMessageFile
Delete
C:\WINDOWS\System32\ospfmib.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\OSPFMib, EventMessageFile
Delete
C:\WINDOWS\System32\polagent.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\PolicyAgent, EventMessageFile
Delete
C:\WINDOWS\System32\tssdis.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\TermServSessDir, EventMessageFile
Delete
C:\WINDOWS\System\LVMaLogD.DLL
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\LOGITECH, EventMessageFile
Delete
C:\WINDOWS\system32\Ati2evxx.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System\Ati HotKey Poller, EventMessageFile
Delete
C:\WINDOWS\system32\MsSip1.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 1, $DLL
Delete
C:\WINDOWS\system32\MsSip2.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 2, $DLL
Delete
C:\WINDOWS\system32\MsSip3.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 3, $DLL
Delete
C:\WINDOWS\system32\psxss.exe
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Session Manager\SubSystems, Posix
C:\WINDOWS\system32\stisvc.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\System, EventMessageFile
Delete
C:\WINDOWS\system32\x264vfw.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\Drivers32, vidc.x264
Delete
kbd101.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\i8042prt\Parameters, LayerDriver JPN
Delete
kbd101a.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\i8042prt\Parameters, LayerDriver KOR
Delete
m3jpeg32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\Drivers32, vidc.MJPG
Delete
m3jpeg32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\Drivers32, vidc.dmb1
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, .DEFAULT\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, S-1-5-19\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, S-1-5-20\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, S-1-5-18\Control Panel\IOProcs, MVB
Delete
mvfs32.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_CURRENT_USER, Control Panel\IOProcs, MVB
Delete
vgafix.fon
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fixedfon.fon
Delete
vgaoem.fon
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, oemfonts.fon
Delete
vgasys.fon
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fonts.fon
Delete
Autoruns items found - 621, recognized as trusted - 588

Internet Explorer extension modules (BHOs, Toolbars ...)

File nameTypeDescriptionManufacturerCLSID
Extension module{2670000A-7350-4f3c-8081-5663EE0C6C49}
Delete
Extension module{92780B25-18CC-41C8-B9BE-3C9C571A8263}
Delete
Items found - 11, recognized as trusted - 9

Windows Explorer extension modules

File nameDestinationDescriptionManufacturerCLSID
deskpan.dll
Script: Quarantine, Delete, Delete via BC
Display Panning CPL Extension{42071714-76d4-11d1-8b24-00a0c9068ff3}
Delete
Shell extensions for file compression{764BF0E1-F219-11ce-972D-00AA00A14F56}
Delete
Encryption Context Menu{853FE2B1-B769-11d0-9C4E-00C04FB6C6FA}
Delete
Taskbar and Start Menu{0DF44EAA-FF21-4412-828E-260A8728E7F1}
Delete
rundll32.exe C:\WINDOWS\system32\shimgvw.dll,ImageView_COMServer {00E7B358-F65B-4dcf-83DF-CD026B94BFD4}
Script: Quarantine, Delete, Delete via BC
Autoplay for SlideShow{00E7B358-F65B-4dcf-83DF-CD026B94BFD4}
Delete
User Accounts{7A9D77BD-5403-11d2-8785-2E0420524153}
Delete
Record ISO Image to CD{34F4B935-17DC-4885-8BC9-CCD1ADF42F93}
Delete
Cleanup Utility{955CC7C3-EE83-4A0D-8135-83728B8B9EAD}
Delete
Items found - 229, recognized as trusted - 221

Printing system extensions (print monitors, providers)

File nameTypeNameDescriptionManufacturer
C:\WINDOWS\system32\LXF3PMON.DLL
Script: Quarantine, Delete, Delete via BC
MonitorLexmark Print-2-Fax PortPrint Monitor (Win2k/WinXP)
Items found - 12, recognized as trusted - 11

Task Scheduler jobs

File nameJob nameJob stateDescriptionManufacturer
Items found - 2, recognized as trusted - 2

SPI/LSP settings

Namespace providers (NSP)
ManufacturerStatusEXE fileDescriptionGUID
Detected - 4, recognized as trusted - 4
Transport protocol providers (TSP, LSP)
ManufacturerEXE fileDescription
Detected - 21, recognized as trusted - 21
Results of automatic SPI settings check
LSP settings checked. No errors detected

TCP/UDP ports

PortStatusRemote HostRemote PortApplicationNotes
TCP ports
135LISTENING0.0.0.061688[1140] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
139LISTENING0.0.0.02270[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
445LISTENING0.0.0.02107[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
5354LISTENING0.0.0.038926[1816] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
10005LISTENING0.0.0.061691[304] c:\windows\system32\lxdecoms.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
UDP ports
123LISTENING----[1236] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
123LISTENING----[1236] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
137LISTENING----[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
138LISTENING----[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
445LISTENING----[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
500LISTENING----[888] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1025LISTENING----[1816] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1900LISTENING----[1536] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1900LISTENING----[1536] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
4500LISTENING----[888] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
5353LISTENING----[1816] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
44301LISTENING----[408] c:\windows\system32\pnkbstra.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 

Downloaded Program Files (DPF)

File nameDescriptionManufacturerCLSIDSource URL
C:\WINDOWS\Downloaded Program Files\PhotoUploader55.ocx
Script: Quarantine, Delete, Delete via BC
Facebook Photo Uploader 5 ControlCopyright © 2008 The Facebook{8100D56A-5661-482C-BEE8-AFECE305D968}
Delete
http://upload.facebook.com/controls/2009.07.28_v5.5.8.1/FacebookPhotoUploader55.cab
{8FFBE65D-2C9C-4669-84BD-5829DC0B603C}
Delete
http://fpdownload.macromedia.com/get/flashplayer/current/ultrashim.cab
{CF40ACC5-E1BB-4AFF-AC72-04C2F616BCA7}
Delete
http://www.adobe.com/products/acrobat/nos/gp.cab
{E2883E8F-472F-4FB0-9522-AC9BF37916A7}
Delete
http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
Items found - 6, recognized as trusted - 2

Control Panel Applets (CPL)

File nameDescriptionManufacturer
Items found - 29, recognized as trusted - 29

Active Setup

File nameDescriptionManufacturerCLSID
C:\Program Files\Common Files\LightScribe\LSRunOnce.exe
Script: Quarantine, Delete, Delete via BC
© Copyright 2003-2006 Hewlett-Packard Development Company, LP{10880D85-AAD9-4558-ABDC-2AB1552D831F}
Items found - 17, recognized as trusted - 16

HOSTS file

Hosts file record
127.0.0.1       localhost

Protocols and handlers

File nameTypeDescriptionManufacturerCLSID
mscoree.dll
Script: Quarantine, Delete, Delete via BC
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
mscoree.dll
Script: Quarantine, Delete, Delete via BC
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
mscoree.dll
Script: Quarantine, Delete, Delete via BC
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Items found - 32, recognized as trusted - 29

Suspicious objects

FileDescriptionType
splk.sys
Script: Quarantine, Delete, Delete via BC
Suspicion for RootkitKernel-mode hook


AVZ Antiviral Toolkit log; AVZ version is 4.32
Scanning started at 1/25/2010 12:23:52 AM
Database loaded: signatures - 260759, NN profile(s) - 2, malware removal microprograms - 56, signature database released 24.01.2010 11:20
Heuristic microprograms loaded: 374
PVS microprograms loaded: 9
Digital signatures of system files loaded: 166374
Heuristic analyzer mode: Maximum heuristics mode
Malware removal mode: disabled
Windows version is: 5.1.2600, Service Pack 2 ; AVZ is run with administrator rights
System Restore: enabled
1. Searching for Rootkits and other software intercepting API functions
1.1 Searching for user-mode API hooks
 Analysis: kernel32.dll, export table found in section .text
 Analysis: ntdll.dll, export table found in section .text
 Analysis: user32.dll, export table found in section .text
 Analysis: advapi32.dll, export table found in section .text
 Analysis: ws2_32.dll, export table found in section .text
 Analysis: wininet.dll, export table found in section .text
 Analysis: rasapi32.dll, export table found in section .text
 Analysis: urlmon.dll, export table found in section .text
 Analysis: netapi32.dll, export table found in section .text
1.2 Searching for kernel-mode API hooks
 Driver loaded successfully
 SDT found (RVA=0846E0)
 Kernel ntkrnlpa.exe found in memory at address 804D7000
   SDT = 8055B6E0
   KiST = 80503960 (284)
Function NtCreateKey (29) intercepted (80622130->F74860E0), hook splk.sys
Function NtEnumerateKey (47) intercepted (80622970->F74A4CA2), hook splk.sys
Function NtEnumerateValueKey (49) intercepted (80622BDA->F74A5030), hook splk.sys
Function NtOpenKey (77) intercepted (806234C6->F74860C0), hook splk.sys
Function NtQueryKey (A0) intercepted (806237EA->F74A5108), hook splk.sys
Function NtQueryValueKey (B1) intercepted (806201EA->F74A4F88), hook splk.sys
Function NtSetValueKey (F7) intercepted (806207F0->F74A519A), hook splk.sys
Functions checked: 284, intercepted: 7, restored: 0
1.3 Checking IDT and SYSENTER
 Analyzing CPU 1
 Analyzing CPU 2
 Checking IDT and SYSENTER - complete
1.4 Searching for masking processes and drivers
 Checking not performed: extended monitoring driver (AVZPM) is not installed
 Driver loaded successfully
1.5 Checking IRP handlers
\FileSystem\ntfs[IRP_MJ_CREATE] = 86FD61F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_CLOSE] = 86FD61F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_WRITE] = 86FD61F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_INFORMATION] = 86FD61F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_INFORMATION] = 86FD61F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_EA] = 86FD61F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_EA] = 86FD61F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_VOLUME_INFORMATION] = 86FD61F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_VOLUME_INFORMATION] = 86FD61F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_DIRECTORY_CONTROL] = 86FD61F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_FILE_SYSTEM_CONTROL] = 86FD61F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_DEVICE_CONTROL] = 86FD61F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_LOCK_CONTROL] = 86FD61F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_SECURITY] = 86FD61F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_SECURITY] = 86FD61F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_PNP] = 86FD61F8 -> hook not defined
 Checking - complete
2. Scanning RAM
 Number of processes found: 40
Extended process analysis: 336 C:\WINDOWS\system32\LxrSII1s.exe
[ES]:Application has no visible windows
[ES]:Located in system folder
 Number of modules loaded: 315
Scanning RAM - complete
3. Scanning disks
4. Checking  Winsock Layered Service Provider (SPI/LSP)
 LSP settings checked. No errors detected
5. Searching for keyboard/mouse/windows events hooks (Keyloggers, Trojan DLLs)
6. Searching for opened TCP/UDP ports used by malicious software
 Checking - disabled by user
7. Heuristic system check
Checking - complete
8. Searching for vulnerabilities
>> Services: potentially dangerous service allowed: TermService (Terminal Services)
>> Services: potentially dangerous service allowed: SSDPSRV (SSDP Discovery Service)
>> Services: potentially dangerous service allowed: TlntSvr (Telnet)
>> Services: potentially dangerous service allowed: Messenger (Messenger)
>> Services: potentially dangerous service allowed: Alerter (Alerter)
>> Services: potentially dangerous service allowed: Schedule ()
>> Services: potentially dangerous service allowed: mnmsrvc (NetMeeting Remote Desktop Sharing)
>> Services: potentially dangerous service allowed: RDSessMgr (Remote Desktop Help Session Manager)
> Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)!
>> Security: disk drives' autorun is enabled
>> Security: administrative shares (C$, D$ ...) are enabled
>> Security: anonymous user access is enabled
>> Security: sending Remote Assistant queries is enabled
Checking - complete
9. Troubleshooting wizard
 >>  HDD autorun is allowed
 >>  Network drives autorun is allowed
 >>  Removable media autorun is allowed
Checking - complete
Files scanned: 355, extracted from archives: 0, malicious software found 0, suspicions - 0
Scanning finished at 1/25/2010 12:24:19 AM
Time of scanning: 00:00:28
If you have a suspicion on presence of viruses or questions on the suspected objects,
you can address http://virusinfo.info conference
System Analysis in progress

Script commands
Add commands to script:
Additional operations:
File list