Results of system analysis

AVZ 4.30 http://z-oleg.com/secur/avz/

List of processes

File namePIDDescriptionCopyrightMD5Information
c:\windows\system32\zunebusenum.exe
Script: Quarantine, Delete, BC delete, Terminate
296Zune Bus Enumerator Service© Microsoft Corporation. All rights reserved.??58.63 kb, rsah,
created: 12/12/2008 1:41:02 PM,
modified: 12/12/2008 1:41:02 PM
Command line:
c:\WINDOWS\system32\ZuneBusEnum.exe
c:\program files\zune\zunenss.exe
Script: Quarantine, Delete, BC delete, Terminate
764Zune Network Sharing Service© Microsoft Corporation. All rights reserved.??4997.63 kb, rsah,
created: 12/12/2008 1:41:18 PM,
modified: 12/12/2008 1:41:18 PM
Command line:
"c:\Program Files\Zune\ZuneNss.exe"
Detected:24, recognized as trusted 22
Module nameHandleDescriptionCopyrightMD5Used by processes
C:\Documents and Settings\All Users\DRM\Cache\Indiv01.key
Script: Quarantine, Delete, BC delete
180355072Individualized Black Box DLL© Microsoft Corporation. All rights reserved.--764
c:\Program Files\Zune\ZuneCfg.DLL
Script: Quarantine, Delete, BC delete
1694892032Zune Configuration© Microsoft Corporation. All rights reserved.--764
c:\Program Files\Zune\ZuneDB.dll
Script: Quarantine, Delete, BC delete
1729560576OLEDB Provider (32-bit)© Microsoft Corporation. All rights reserved.--764
c:\Program Files\Zune\zunemde.dll
Script: Quarantine, Delete, BC delete
1746141184ZuneMDE DLL© Microsoft Corporation. All rights reserved.--764
c:\Program Files\Zune\ZuneNativeLib.dll
Script: Quarantine, Delete, BC delete
1701445632Zune Native Library DLL© Microsoft Corporation. All rights reserved.--764
c:\Program Files\Zune\ZuneNss.exe
Script: Quarantine, Delete, BC delete
1748238336Zune Network Sharing Service© Microsoft Corporation. All rights reserved.??764
c:\Program Files\Zune\ZuneQP.dll
Script: Quarantine, Delete, BC delete
1730543616Query Processor (32-bit)© Microsoft Corporation. All rights reserved.--764
c:\Program Files\Zune\ZuneSE.dll
Script: Quarantine, Delete, BC delete
1733820416Storage Engine (32-bit)© Microsoft Corporation. All rights reserved.--764
c:\Program Files\Zune\ZuneService.dll
Script: Quarantine, Delete, BC delete
1711669248Zune Service DLL© Microsoft Corporation. All rights reserved.--764
c:\Program Files\Zune\ZuneSH.DLL
Script: Quarantine, Delete, BC delete
1713569792Zune Device Communication Support© Microsoft Corporation. All rights reserved.--764
c:\WINDOWS\system32\ZuneBusEnum.exe
Script: Quarantine, Delete, BC delete
4194304Zune Bus Enumerator Service© Microsoft Corporation. All rights reserved.??296
Modules detected:309, recognized as trusted 298

Kernel Space Modules Viewer

ModuleBase addressSize in memoryDescriptionManufacturer
C:\WINDOWS\System32\Drivers\dump_atapi.sys
Script: Quarantine, Delete, BC delete
EF1F9000018000 (98304)
C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Script: Quarantine, Delete, BC delete
F7A32000002000 (8192)
C:\WINDOWS\SYSTEM32\EGATHDRV.SYS
Script: Quarantine, Delete, BC delete
F7A36000002000 (8192)IBM eGatherer Kernel Module(c) Copyright 1999, 2000 IBM Corporation
C:\WINDOWS\System32\drivers\pmemnt.sys
Script: Quarantine, Delete, BC delete
F7A42000002000 (8192)Physical Memory DriverCopyright (C) Microsoft Corp. 1981-1996
C:\Program Files\SMI2\smi2.sys
Script: Quarantine, Delete, BC delete
F0E2A000001000 (4096)SMI BIOS driverCopyright (C) 1999-2005 IBM Corp.
C:\WINDOWS\system32\drivers\tvtfilter.sys
Script: Quarantine, Delete, BC delete
B9AA2000004000 (16384)Rescue and Recovery filter driverCopyright (C) Lenovo2003
Modules detected - 117, recognized as trusted - 111

Services

ServiceDescriptionStatusFileGroupDependencies
ZuneBusEnum
Service: Stop, Delete, Disable
Zune Bus EnumeratorRunningc:\WINDOWS\system32\ZuneBusEnum.exe
Script: Quarantine, Delete, BC delete
  
ZuneNetworkSvc
Service: Stop, Delete, Disable
Zune Network Sharing ServiceRunningc:\Program Files\Zune\ZuneNss.exe
Script: Quarantine, Delete, BC delete
 upnphost
getPlus(R) Helper
Service: Stop, Delete, Disable
getPlus(R) HelperNot startedC:\Program Files\NOS\bin\getPlus_HelperSvc.exe
Script: Quarantine, Delete, BC delete
 RPCSS
PsaSrv
Service: Stop, Delete, Disable
IBM PSA Access Driver ControlNot startedPsaSrv.sys
Script: Quarantine, Delete, BC delete
  
ThinkVantage Registry Monitor Service
Service: Stop, Delete, Disable
ThinkVantage Registry Monitor ServiceNot startedC:\Program Files\Common Files\Lenovo\tvt_reg_monitor_svc.exe
Script: Quarantine, Delete, BC delete
  
TVT Backup Service
Service: Stop, Delete, Disable
TVT Backup ServiceNot startedC:\Program Files\Lenovo\Rescue and Recovery\rrservice.exe
Script: Quarantine, Delete, BC delete
  
TVT Scheduler
Service: Stop, Delete, Disable
TVT SchedulerNot startedC:\Program Files\Common Files\Lenovo\Scheduler\tvtsched.exe
Script: Quarantine, Delete, BC delete
  
WmcCds
Service: Stop, Delete, Disable
Windows Media Connect (WMC)Not startedc:\program files\windows media connect\mswmccds.exe
Script: Quarantine, Delete, BC delete
 RPCSS
WmcCdsLs
Service: Stop, Delete, Disable
Windows Media Connect (WMC) HelperNot startedC:\Program Files\Windows Media Connect\mswmcls.exe
Script: Quarantine, Delete, BC delete
 RPCSS
Detected - 100, recognized as trusted - 91

Drivers

ServiceDescriptionStatusFileGroupDependencies
EGATHDRV
Driver: Unload, Delete, Disable
IBM eGathererRunningC:\WINDOWS\SYSTEM32\EGATHDRV.SYS
Script: Quarantine, Delete, BC delete
  
pmem
Driver: Unload, Delete, Disable
pmemRunningC:\WINDOWS\System32\drivers\pmemnt.sys
Script: Quarantine, Delete, BC delete
  
smi2
Driver: Unload, Delete, Disable
smi2RunningC:\Program Files\SMI2\smi2.sys
Script: Quarantine, Delete, BC delete
  
tvtfilter
Driver: Unload, Delete, Disable
tvtfilterRunningC:\WINDOWS\system32\drivers\tvtfilter.sys
Script: Quarantine, Delete, BC delete
  
Abiosdsk
Driver: Unload, Delete, Disable
AbiosdskNot startedAbiosdsk.sys
Script: Quarantine, Delete, BC delete
Primary disk 
Atdisk
Driver: Unload, Delete, Disable
AtdiskNot startedAtdisk.sys
Script: Quarantine, Delete, BC delete
Primary disk 
Changer
Driver: Unload, Delete, Disable
ChangerNot startedChanger.sys
Script: Quarantine, Delete, BC delete
Filter 
lbrtfdc
Driver: Unload, Delete, Disable
lbrtfdcNot startedlbrtfdc.sys
Script: Quarantine, Delete, BC delete
System Bus Extender 
PCIDump
Driver: Unload, Delete, Disable
PCIDumpNot startedPCIDump.sys
Script: Quarantine, Delete, BC delete
PCI Configuration 
PDCOMP
Driver: Unload, Delete, Disable
PDCOMPNot startedPDCOMP.sys
Script: Quarantine, Delete, BC delete
  
PDFRAME
Driver: Unload, Delete, Disable
PDFRAMENot startedPDFRAME.sys
Script: Quarantine, Delete, BC delete
  
PDRELI
Driver: Unload, Delete, Disable
PDRELINot startedPDRELI.sys
Script: Quarantine, Delete, BC delete
  
PDRFRAME
Driver: Unload, Delete, Disable
PDRFRAMENot startedPDRFRAME.sys
Script: Quarantine, Delete, BC delete
  
psadd
Driver: Unload, Delete, Disable
IBM PSA Access DriverNot startedC:\WINDOWS\system32\Drivers\psadd.sys
Script: Quarantine, Delete, BC delete
  
Simbad
Driver: Unload, Delete, Disable
SimbadNot startedSimbad.sys
Script: Quarantine, Delete, BC delete
Filter 
UIUSys
Driver: Unload, Delete, Disable
Conexant Setup APINot startedUIUSys.sys
Script: Quarantine, Delete, BC delete
  
WDICA
Driver: Unload, Delete, Disable
WDICANot startedWDICA.sys
Script: Quarantine, Delete, BC delete
  
Detected - 191, recognized as trusted - 174

Autoruns

File nameStatusStartup methodDescription
C:\Program Files\AIM6\aim6.exe
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_CURRENT_USER, Software\Microsoft\Windows\CurrentVersion\Run, Aim6
appmgmts.dll
Script: Quarantine, Delete, BC delete
ActiveRegistry keyHKEY_LOCAL_MACHINE, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions\{c6dc5466-785a-11d2-84d0-00c04fb169f7}, DLLName
Autoruns items detected - 52, recognized as trusted - 50

Internet Explorer extension modules (BHOs, Toolbars ...)

File nameTypeDescriptionManufacturerCLSID
Extension module{2670000A-7350-4f3c-8081-5663EE0C6C49}
Delete
C:\Program Files\PokerStars\PokerStarsUpdate.exe
Script: Quarantine, Delete, BC delete
Extension modulePokerStars UpdateCopyright (C) 2001 - 2008 PokerStars.com{3AD14F0C-ED16-4e43-B6D8-661B03F6A1EF}
Delete
C:\Program Files\PokerStars\PokerStarsUpdate.exe
Script: Quarantine, Delete, BC delete
Extension modulePokerStars UpdateCopyright (C) 2001 - 2008 PokerStars.com{92780B25-18CC-41C8-B9BE-3C9C571A8263}
Delete
Elements detected - 9, recognized as trusted - 6

Windows Explorer extension modules

File nameDestinationDescriptionManufacturerCLSID
deskpan.dll
Script: Quarantine, Delete, BC delete
Display Panning CPL Extension{42071714-76d4-11d1-8b24-00a0c9068ff3}
Shell extensions for file compression{764BF0E1-F219-11ce-972D-00AA00A14F56}
Encryption Context Menu{853FE2B1-B769-11d0-9C4E-00C04FB6C6FA}
Taskbar and Start Menu{0DF44EAA-FF21-4412-828E-260A8728E7F1}
rundll32.exe C:\WINDOWS\system32\shimgvw.dll,ImageView_COMServer {00E7B358-F65B-4dcf-83DF-CD026B94BFD4}
Script: Quarantine, Delete, BC delete
Autoplay for SlideShow{00E7B358-F65B-4dcf-83DF-CD026B94BFD4}
User Accounts{7A9D77BD-5403-11d2-8785-2E0420524153}
C:\WINDOWS\system32\mscoree.dll
Script: Quarantine, Delete, BC delete
Fusion CacheMicrosoft .NET Runtime Execution Engine© Microsoft Corporation. All rights reserved.{1D2680C9-0E2A-469d-B787-065558BC7D43}
C:\WINDOWS\system32\nvshell.dll
Script: Quarantine, Delete, BC delete
Desktop Explorer{1CDB2949-8F65-4355-8456-263E7C208A5D}
C:\WINDOWS\system32\nvshell.dll
Script: Quarantine, Delete, BC delete
Desktop Explorer Menu{1E9B04FB-F9E5-4718-997B-B8DA88302A47}
C:\WINDOWS\system32\nvshell.dll
Script: Quarantine, Delete, BC delete
nView Desktop Context Menu{1E9B04FB-F9E5-4718-997B-B8DA88302A48}
Shell Extension for Malware scanning{45AC2688-0253-4ED8-97DE-B5370FA7D48A}
Elements detected - 205, recognized as trusted - 194

Printing system extensions (print monitors, providers)

File nameTypeNameDescriptionManufacturer
Elements detected - 8, recognized as trusted - 8

Task Scheduler jobs

File nameJob nameJob statusDescriptionManufacturer
Elements detected - 0, recognized as trusted - 0

SPI/LSP settings

Namespace providers (NSP)
ManufacturerStatusEXE fileDescriptionGUID
Detected - 3, recognized as trusted - 3
Transport protocol providers (TSP, LSP)
ManufacturerEXE fileDescription
Detected - 13, recognized as trusted - 13
Results of automatic SPI settings check
LSP settings checked. No errors detected

TCP/UDP ports

PortStatusRemote HostRemote PortApplicationNotes
TCP ports
135LISTENING0.0.0.038990[1380] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
139LISTENING0.0.0.032853[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
445LISTENING0.0.0.051442[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
1028LISTENING0.0.0.047268[1184] c:\windows\system32\alg.exe
Script: Quarantine, Delete, BC delete, Terminate
 
2869LISTENING0.0.0.06155[1736] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
4489ESTABLISHED127.0.0.14490[2496] c:\program files\mozilla firefox\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
4490ESTABLISHED127.0.0.14489[2496] c:\program files\mozilla firefox\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
4492ESTABLISHED127.0.0.14493[2496] c:\program files\mozilla firefox\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
4493ESTABLISHED127.0.0.14492[2496] c:\program files\mozilla firefox\firefox.exe
Script: Quarantine, Delete, BC delete, Terminate
 
4558CLOSE_WAIT89.108.66.15680[2960] c:\documents and settings\ben\desktop\avz4\avz.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5152LISTENING0.0.0.039143[1664] c:\program files\java\jre6\bin\jqs.exe
Script: Quarantine, Delete, BC delete, Terminate
 
5152CLOSE_WAIT127.0.0.14559[1664] c:\program files\java\jre6\bin\jqs.exe
Script: Quarantine, Delete, BC delete, Terminate
 
10244LISTENING0.0.0.08404[764] c:\program files\zune\zunenss.exe
Script: Quarantine, Delete, BC delete, Terminate
 
UDP ports
123LISTENING----[1504] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
123LISTENING----[1504] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
137LISTENING----[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
138LISTENING----[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
445LISTENING----[4] System
Script: Quarantine, Delete, BC delete, Terminate
 
500LISTENING----[1116] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1900LISTENING----[1736] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1900LISTENING----[296] c:\windows\system32\zunebusenum.exe
Script: Quarantine, Delete, BC delete, Terminate
 
1900LISTENING----[1736] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, BC delete, Terminate
 
4500LISTENING----[1116] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, BC delete, Terminate
 

Downloaded Program Files (DPF)

File nameDescriptionManufacturerCLSIDSource URL
{8FFBE65D-2C9C-4669-84BD-5829DC0B603C}
Delete
http://fpdownload.macromedia.com/get/flashplayer/current/polarbear/ultrashim.cab
Elements detected - 4, recognized as trusted - 3

Control Panel Applets (CPL)

File nameDescriptionManufacturer
C:\WINDOWS\system32\nvtuicpl.cpl
Script: Quarantine, Delete, BC delete
Elements detected - 25, recognized as trusted - 24

Active Setup

File nameDescriptionManufacturerCLSID
C:\WINDOWS\alg
Script: Quarantine, Delete, BC delete
{E17D8D3C-762E-E86C-BC90-D2638B15129B}
Elements detected - 15, recognized as trusted - 14

HOSTS file

Hosts file record
127.0.0.1       localhost

Protocols and handlers

File nameTypeDescriptionManufacturerCLSID
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
mscoree.dll
Script: Quarantine, Delete, BC delete
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Elements detected - 33, recognized as trusted - 30

Suspicious objects

FileDescriptionType


AVZ Antiviral Toolkit log; AVZ version is 4.30
Scanning started at 4/13/2009 1:42:03 AM
Database loaded: signatures - 218522, NN profile(s) - 2, microprograms of healing - 56, signature database released 12.04.2009 21:36
Heuristic microprograms loaded: 372
SPV microprograms loaded: 9
Digital signatures of system files loaded: 106813
Heuristic analyzer mode: Medium heuristics level
Healing mode: enabled
Windows version: 5.1.2600, Service Pack 3 ; AVZ is launched with administrator rights
System Restore: enabled
1. Searching for Rootkits and programs intercepting API functions
1.1 Searching for user-mode API hooks
 Analysis: kernel32.dll, export table found in section .text
 Analysis: ntdll.dll, export table found in section .text
 Analysis: user32.dll, export table found in section .text
 Analysis: advapi32.dll, export table found in section .text
 Analysis: ws2_32.dll, export table found in section .text
 Analysis: wininet.dll, export table found in section .text
 Analysis: rasapi32.dll, export table found in section .text
 Analysis: urlmon.dll, export table found in section .text
 Analysis: netapi32.dll, export table found in section .text
1.2 Searching for kernel-mode API hooks
 Driver loaded successfully
 SDT found (RVA=085700)
 Kernel ntkrnlpa.exe found in memory at address 804D7000
   SDT = 8055C700
   KiST = 80504460 (284)
Functions checked: 284, intercepted: 0, restored: 0
1.3 Checking IDT and SYSENTER
 Analysis for CPU 1
 Analysis for CPU 2
 Checking IDT and SYSENTER - complete
1.4 Searching for masking processes and drivers
 Checking not performed: extended monitoring driver (AVZPM) is not installed
 Driver loaded successfully
1.5 Checking of IRP handlers
 Checking - complete
2. Scanning memory
 Number of processes found: 25
 Number of modules loaded: 346
Scanning memory - complete
3. Scanning disks
4. Checking  Winsock Layered Service Provider (SPI/LSP)
 LSP settings checked. No errors detected
5. Searching for keyboard/mouse/windows events hooks (Keyloggers, Trojan DLLs)
6. Searching for opened TCP/UDP ports used by malicious programs
 Checking disabled by user
7. Heuristic system check
Checking - complete
8. Searching for vulnerabilities
>> Services: potentially dangerous service allowed: TermService (Terminal Services)
>> Services: potentially dangerous service allowed: SSDPSRV (SSDP Discovery Service)
>> Services: potentially dangerous service allowed: Schedule (Task Scheduler)
>> Services: potentially dangerous service allowed: mnmsrvc (NetMeeting Remote Desktop Sharing)
>> Services: potentially dangerous service allowed: RDSessMgr (Remote Desktop Help Session Manager)
> Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)!
>> Security: disk drives' autorun is enabled
>> Security: administrative shares (C$, D$ ...) are enabled
>> Security: anonymous user access is enabled
>> Security: sending Remote Assistant queries is enabled
>> Security: automatic logon is enabled
Checking - complete
9. Troubleshooting wizard
 >>  HDD autorun are allowed
 >>  Autorun from network drives are allowed
 >>  Removable media autorun are allowed
Checking - complete
Files scanned: 74768, extracted from archives: 51038, malicious software found 0, suspicions - 0
Scanning finished at 4/13/2009 2:26:15 AM
Time of scanning: 00:44:12
If you have a suspicion on presence of viruses or questions on the suspected objects,
you can address http://virusinfo.info conference
Creating archive of files from Quarantine
Creating archive of files from Quarantine - complete
System Analysis in progress

Script commands
Add commands to script:
Additional operations:
File list