Results of system analysis

AVZ 4.32 http://z-oleg.com/secur/avz/

Process List

File namePIDDescriptionCopyrightMD5Information
c:\users\Χρήστος\desktop\rapidshare tools\cryptload_1.1.6\cryptload.exe
Script: Quarantine, Delete, Delete via BC, Terminate
3072CryptLoadCopyright © shira - 2007??7576.99 kb, rsAh,
created: 28/11/2009 10:53:24 μμ,
modified: 25/7/2009 1:30:49 πμ,
name contains national symbols
Command line:
"C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\CryptLoad.exe"
c:\windows\explorer.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1612Εξερεύνηση των Windows© Microsoft Corporation. Με επιφύλαξη κάθε νόμιμου δικαιώματος.??2552.00 kb, rsAh,
created: 27/11/2009 2:07:25 μμ,
modified: 3/8/2009 7:35:50 πμ
Command line:
C:\Windows\Explorer.EXE
c:\program files\malwarebytes' anti-malware\mbamservice.exe
Script: Quarantine, Delete, Delete via BC, Terminate
3456Malwarebytes' Anti-Malware© All rights reserved.??270.33 kb, rsAh,
created: 5/12/2009 2:16:40 πμ,
modified: 3/12/2009 4:14:02 μμ
Command line:
"C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe"
c:\program files\windows media player\wmpnetwk.exe
Script: Quarantine, Delete, Delete via BC, Terminate
1168Windows Media Player Network Sharing Service© Microsoft Corporation. All rights reserved.??1095.00 kb, rsAh,
created: 2/11/2006 6:06:06 μμ,
modified: 2/11/2006 6:06:06 μμ
Command line:
"C:\Program Files\Windows Media Player\wmpnetwk.exe"
Detected:41, recognized as trusted 38
Module nameHandleDescriptionCopyrightMD5Used by processes
C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
Script: Quarantine, Delete, Delete via BC
4194304Malwarebytes' Anti-Malware© All rights reserved.??3456
C:\Program Files\Microsoft Office\Office12\1032\GrooveIntlResource.dll
Script: Quarantine, Delete, Delete via BC
268435456GrooveIntlResource Module© 2007 Microsoft Corporation. Με επιφύλαξη κάθε νόμιμου δικαιώματος.--1612
C:\Program Files\Windows Media Player\wmpnetwk.exe
Script: Quarantine, Delete, Delete via BC
4325376Windows Media Player Network Sharing Service© Microsoft Corporation. All rights reserved.??1168
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\CryptLoad.exe
Script: Quarantine, Delete, Delete via BC
4194304CryptLoadCopyright © shira - 2007??3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\1kh.de.dll
Script: Quarantine, Delete, Delete via BC
18709217281kh.deCopyright © - 2008--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\3.dl.am.dll
Script: Quarantine, Delete, Delete via BC
18612879363.dl.amCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\aeon.to.dll
Script: Quarantine, Delete, Delete via BC
1854734336aeon.toCopyright © 2008--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\airfresh.steelhoster.com.dll
Script: Quarantine, Delete, Delete via BC
1854668800airfresh.steelhoster.comCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\bluehost.to.dll
Script: Quarantine, Delete, Delete via BC
1843593216bluehost.toCopyright © - 2009--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\cat.serienjunkies.dl.am.dll
Script: Quarantine, Delete, Delete via BC
1843527680cat.serienjunkies.dl.amCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\cine.to.dll
Script: Quarantine, Delete, Delete via BC
1843462144cine.toCopyright © 2008--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\Collectors Zone.dll
Script: Quarantine, Delete, Delete via BC
1843396608Collectors ZoneCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\crypt.dll
Script: Quarantine, Delete, Delete via BC
147456000RSDF PluginLoos - Teck--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\ddl-music.cc.dll
Script: Quarantine, Delete, Delete via BC
1841496064ddl-music.ccCopyright © Apokalypser 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\ddl-warez.org.dll
Script: Quarantine, Delete, Delete via BC
1829634048ddl-warez.orgCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\dlc.dll
Script: Quarantine, Delete, Delete via BC
1823539200dlcCopyright © 2008--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\doku.cc.dll
Script: Quarantine, Delete, Delete via BC
1822162944doku.ccCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\dxp.divxvid.org.dll
Script: Quarantine, Delete, Delete via BC
1814495232dxp.divxvid.orgCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\fast-load.net.dll
Script: Quarantine, Delete, Delete via BC
1786445824fast-load.netCopyright © 2008--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\fastfolder.net.dll
Script: Quarantine, Delete, Delete via BC
1740111872fastfolder.netCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\file-protect.net.file.dll
Script: Quarantine, Delete, Delete via BC
1740046336file-protect.net.fileCopyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\file-protect.net.folder.dll
Script: Quarantine, Delete, Delete via BC
1739980800file-protect.net.folderCopyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\filefront.com.dll
Script: Quarantine, Delete, Delete via BC
1739915264filefront.comCopyright © Apokalypser 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\filehost.it.dll
Script: Quarantine, Delete, Delete via BC
1739849728filehost.itCopyright © Apokalypser 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\flyload.net.dll
Script: Quarantine, Delete, Delete via BC
1663959040flyload.netCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\folder_filer.net.dll
Script: Quarantine, Delete, Delete via BC
1663893504folder_filer.netCopyright © - 2008--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\freakshare.net.dll
Script: Quarantine, Delete, Delete via BC
1663827968freakshare.netCopyright © 2009--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\game-blog.us.dll
Script: Quarantine, Delete, Delete via BC
1663762432game-blog.usCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\games.da.cx.dll
Script: Quarantine, Delete, Delete via BC
1663696896games.da.cxCopyright © Apokalypser 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\gamestube.dl.am.dll
Script: Quarantine, Delete, Delete via BC
1663631360gamestube.dl.amCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.archiv.to.dll
Script: Quarantine, Delete, Delete via BC
1663565824archiv.toCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.boost.am.dll
Script: Quarantine, Delete, Delete via BC
1663500288h.boost.amCopyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.depositfiles.com.dll
Script: Quarantine, Delete, Delete via BC
1663434752h.depositfiles.comCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.file-upload.net.dll
Script: Quarantine, Delete, Delete via BC
1663369216h.file-upload.netCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.filefactory.com.dll
Script: Quarantine, Delete, Delete via BC
1663303680h.filefactory.comCopyright © - 2009--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.filer.net.dll
Script: Quarantine, Delete, Delete via BC
1663238144filer.netCopyright © 2008--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.files.to.dll
Script: Quarantine, Delete, Delete via BC
1591672832h.files.toCopyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.gigasize.com.dll
Script: Quarantine, Delete, Delete via BC
1591607296h.gigasize.comCopyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.hotfile.com.dll
Script: Quarantine, Delete, Delete via BC
1591541760h.hotfile.comCopyright © 2009--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.imagevenue.com.dll
Script: Quarantine, Delete, Delete via BC
1591476224imagevenue.comCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.load.to.dll
Script: Quarantine, Delete, Delete via BC
1591410688load.toCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.lobortis.com.dll
Script: Quarantine, Delete, Delete via BC
1591345152lobortis.comCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.meinupload.com.dll
Script: Quarantine, Delete, Delete via BC
1591279616h.meinupload.comCopyright © 2008--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.netload.in.dll
Script: Quarantine, Delete, Delete via BC
1591214080h.netload.inCopyright © - 2009--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.netupload.com.dll
Script: Quarantine, Delete, Delete via BC
1591148544netupload.comCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.qshare.com.dll
Script: Quarantine, Delete, Delete via BC
1591083008qshare.comCopyright © 2008--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.rapidshare.com.dll
Script: Quarantine, Delete, Delete via BC
1590951936h.rapidshare.comCopyright © 2009--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.rapidshare.de.dll
Script: Quarantine, Delete, Delete via BC
1590886400h.rapidshare.deCopyright © - 2008--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.share-online.biz.dll
Script: Quarantine, Delete, Delete via BC
1590820864h.share-online.bizCopyright © 2009--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.share.gulli.com.dll
Script: Quarantine, Delete, Delete via BC
1590755328h.share.gulli.comCopyright © - 2008--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.uploaded.to.dll
Script: Quarantine, Delete, Delete via BC
1590689792h.uploaded.toCopyright © 2009--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.uploadoo.com.dll
Script: Quarantine, Delete, Delete via BC
1590624256uploadoo.comCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.yourfiles.biz.dll
Script: Quarantine, Delete, Delete via BC
1590558720h.yourfiles.bizCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\h.zshare.net.dll
Script: Quarantine, Delete, Delete via BC
1590493184h.zshare.netCopyright © - 2009--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\hoerbuch-blog.dl.am.dll
Script: Quarantine, Delete, Delete via BC
1590427648hoerbuch-blog.dl.amCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\link-me.freehostia.com.dll
Script: Quarantine, Delete, Delete via BC
1590362112link-me.freehostia.comCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\link-protector.com.dll
Script: Quarantine, Delete, Delete via BC
1590296576link-protector.comCopyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\link.kuzeyforum.net.dll
Script: Quarantine, Delete, Delete via BC
1590231040link.kuzeyforum.netCopyright © Apokalypser 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\linkbank.eu.dll
Script: Quarantine, Delete, Delete via BC
1590165504linkbank.euCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\linkbucks.com.dll
Script: Quarantine, Delete, Delete via BC
1590099968linkbucks.comCopyright © - 2008--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\linksafe.ws.dll
Script: Quarantine, Delete, Delete via BC
1590034432linksafe.wsCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\lix.in.dll
Script: Quarantine, Delete, Delete via BC
1589968896lix.inCopyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\megaupload.com.dll
Script: Quarantine, Delete, Delete via BC
1589903360megaupload.comCopyright © 2009--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\mirrorit.de.dll
Script: Quarantine, Delete, Delete via BC
1589837824mirrorit.deCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\moviestube.dl.am.dll
Script: Quarantine, Delete, Delete via BC
1589772288moviestube.dl.amCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\myref.de.dll
Script: Quarantine, Delete, Delete via BC
1589706752myref.deCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\proit.freehostia.com.dll
Script: Quarantine, Delete, Delete via BC
1589641216proit.freehostia.comCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\protect-it.ath.cx.dll
Script: Quarantine, Delete, Delete via BC
1589575680protect-it.ath.cxCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\protect.to.dll
Script: Quarantine, Delete, Delete via BC
1589510144protect.toCopyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\rapidbolt.com.dll
Script: Quarantine, Delete, Delete via BC
1589444608rapidbolt.comCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\rapidfolder.com.dll
Script: Quarantine, Delete, Delete via BC
1589379072rapidfolder.comCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\rapidlayer.in.dll
Script: Quarantine, Delete, Delete via BC
1589313536rapidlayer.inCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\rapidsafe.de.dll
Script: Quarantine, Delete, Delete via BC
1589248000rapidsafe.deCopyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\rapidsafe.de.v2.dll
Script: Quarantine, Delete, Delete via BC
1589182464rapidsafe.de.v2Copyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\rapidsafe.net.dll
Script: Quarantine, Delete, Delete via BC
1589116928rapidsafe.netCopyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\rapidshare.com.dll
Script: Quarantine, Delete, Delete via BC
1589051392rapidshare.comCopyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\relink.us.dll
Script: Quarantine, Delete, Delete via BC
1588985856relink.usCopyright © - 2008--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\rs.dr.ag.0.dll
Script: Quarantine, Delete, Delete via BC
1588920320rs.dr.ag.0Copyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\rs.dr.ag.1.dll
Script: Quarantine, Delete, Delete via BC
1588854784rs.dr.ag.1Copyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\rslayer.com.dll
Script: Quarantine, Delete, Delete via BC
1588789248rslayer.comCopyright © 2008--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\rsprotect.com.dll
Script: Quarantine, Delete, Delete via BC
1588723712rsprotect.comCopyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\rsx.angernet.webd.pl.dll
Script: Quarantine, Delete, Delete via BC
1588658176rsx.angernet.webd.plCopyright ©Apokalypser 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\safe.crystalize.biz.dll
Script: Quarantine, Delete, Delete via BC
1588592640safe.crystalize.bizCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\safe.filecash.biz.dll
Script: Quarantine, Delete, Delete via BC
1588527104safe.filecash.bizCopyright © SnipeR's Redemption Network 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\safe.to.dll
Script: Quarantine, Delete, Delete via BC
1588461568safe.toCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\safelink.in.dll
Script: Quarantine, Delete, Delete via BC
1588396032safelink.inCopyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\save.raidrush.to.dll
Script: Quarantine, Delete, Delete via BC
1588330496save.raidrush.toCopyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\save.raidrush.ws.dll
Script: Quarantine, Delete, Delete via BC
1588264960save.raidrush.wsCopyright © Apokalypser 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\sceneload.to.dll
Script: Quarantine, Delete, Delete via BC
1588199424sceneload.toCopyright © - 2008--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\secur.6x.to.dll
Script: Quarantine, Delete, Delete via BC
1588133888secur.6x.toCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\secured.in.dll
Script: Quarantine, Delete, Delete via BC
1588068352secured.inCopyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\serienjunkies.dl.am.dll
Script: Quarantine, Delete, Delete via BC
1588002816serienjunkies.dl.amCopyright © - 2009--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\share.da.cx.dll
Script: Quarantine, Delete, Delete via BC
1587937280share.da.cxCopyright © Apokalypser 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\sharebase.to.dll
Script: Quarantine, Delete, Delete via BC
1587871744sharebase.toCopyright © 2009--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\shareplace.com.dll
Script: Quarantine, Delete, Delete via BC
1587806208shareplace.comCopyright © 2009--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\shareprotect.t-w.at.dll
Script: Quarantine, Delete, Delete via BC
1587740672shareprotect.t-w.atCopyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\sharingmatrix.com.dll
Script: Quarantine, Delete, Delete via BC
1587675136sharingmatrix.comCopyright © 2009--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\shragle.com.dll
Script: Quarantine, Delete, Delete via BC
1587609600shragle.comCopyright © 2009--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\snipurl.com.dll
Script: Quarantine, Delete, Delete via BC
1587544064snipurl.comCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\speedsafe.in.dll
Script: Quarantine, Delete, Delete via BC
1587478528speedsafe.inCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\sprezer.com.dll
Script: Quarantine, Delete, Delete via BC
1587412992sprezer.comCopyright © - 2009--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\ssl-linkz.com.dll
Script: Quarantine, Delete, Delete via BC
1587347456ssl-linkz.comCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\stacheldraht.be.dll
Script: Quarantine, Delete, Delete via BC
1587281920stacheldraht.beCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\stealth.to.dll
Script: Quarantine, Delete, Delete via BC
1587216384stealth.toCopyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\steelwarez.com.dll
Script: Quarantine, Delete, Delete via BC
1587150848steelwarez.comCopyright © SnipeR's Redemption Network 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\storage.to.dll
Script: Quarantine, Delete, Delete via BC
1587085312storage.toCopyright © 2009--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\technochecker.com.dll
Script: Quarantine, Delete, Delete via BC
1587019776technochecker.comCopyright © SnipeR's Redemption Network 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\tinyurl.com.dll
Script: Quarantine, Delete, Delete via BC
1586954240tinyurl.comCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\tlf.dl.am.dll
Script: Quarantine, Delete, Delete via BC
1586888704tlf.dl.amCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\tresor.in.dll
Script: Quarantine, Delete, Delete via BC
1586823168tresor.inCopyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\urShort.net.dll
Script: Quarantine, Delete, Delete via BC
1586757632urShort.netCopyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\wii-reloaded.ath.cx.dll
Script: Quarantine, Delete, Delete via BC
1586692096wii-reloaded.ath.cxCopyright © 2008--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\won-site.biz.dll
Script: Quarantine, Delete, Delete via BC
1586626560won-site.bizCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\xaili.com.dll
Script: Quarantine, Delete, Delete via BC
1586561024xaili.comCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\xeem.to.dll
Script: Quarantine, Delete, Delete via BC
1586495488xeem.toCopyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\xirror.com.dll
Script: Quarantine, Delete, Delete via BC
1586429952xirror.comCopyright © - 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\xlspread.com.dll
Script: Quarantine, Delete, Delete via BC
1586364416xlspread.comCopyright © - 2008--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\xxx-blog.org.dll
Script: Quarantine, Delete, Delete via BC
1586298880xxx-blog.orgCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\zerowaitingtime.com.dll
Script: Quarantine, Delete, Delete via BC
1586233344zerowaitingtime.comCopyright © 2007--3072
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.1.6\plugins\zippyshare.com.dll
Script: Quarantine, Delete, Delete via BC
1586167808zippyshare.comCopyright © 2009--3072
C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Data\7f457271e765b5d72f081942b829469c\System.Data.ni.dll
Script: Quarantine, Delete, Delete via BC
1594163200.NET Framework© Microsoft Corporation. All rights reserved.--3072
Modules found:620, recognized as trusted 499

Kernel Space Modules Viewer

ModuleBase addressSize in memoryDescriptionManufacturer
C:\Windows\System32\Drivers\ari0smpp.SYS
Script: Quarantine, Delete, Delete via BC
90973000039000 (233472)
C:\Windows\system32\DRIVERS\atapi.sys
Script: Quarantine, Delete, Delete via BC
8B08F000009000 (36864)
C:\Windows\system32\DRIVERS\epfwwfpr.sys
Script: Quarantine, Delete, Delete via BC
9FCA000001A000 (106496)ESET Personal Firewall driverCopyright (c) ESET 1992-2009. All rights reserved.
C:\Windows\system32\drivers\mbam.sys
Script: Quarantine, Delete, Delete via BC
A36D4000004000 (16384)Malwarebytes' Anti-Malware© All rights reserved.
C:\Windows\System32\Drivers\spsm.sys
Script: Quarantine, Delete, Delete via BC
8369D0000F3000 (995328)
Modules found - 182, recognized as trusted - 177

Services

ServiceDescriptionStatusFileGroupDependencies
MBAMService
Service: Stop, Delete, Disable
MBAMServiceRunningC:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
Script: Quarantine, Delete, Delete via BC
 MBAMProtector
WMPNetworkSvc
Service: Stop, Delete, Disable
Windows Media Player Network Sharing ServiceRunningC:\Program Files\Windows Media Player\wmpnetwk.exe
Script: Quarantine, Delete, Delete via BC
 http
MSSQLServerADHelper
Service: Stop, Delete, Disable
SQL Server Active Directory HelperNot startedC:\Program Files\Microsoft SQL Server\90\Shared\sqladhlp90.exe
Script: Quarantine, Delete, Delete via BC
  
Detected - 155, recognized as trusted - 152

Drivers

ServiceDescriptionStatusFileGroupDependencies
atapi
Driver: Unload, Delete, Disable
Κανάλι IDERunningC:\Windows\system32\DRIVERS\atapi.sys
Script: Quarantine, Delete, Delete via BC
SCSI Miniport 
epfwwfpr
Driver: Unload, Delete, Disable
epfwwfprRunningC:\Windows\system32\DRIVERS\epfwwfpr.sys
Script: Quarantine, Delete, Delete via BC
  
MBAMProtector
Driver: Unload, Delete, Disable
MBAMProtectorRunningC:\Windows\system32\drivers\mbam.sys
Script: Quarantine, Delete, Delete via BC
FSFilter Anti-VirusFltMgr
sptd
Driver: Unload, Delete, Disable
sptdRunningC:\Windows\System32\Drivers\sptd.sys
Script: Quarantine, Delete, Delete via BC
Boot Bus Extender 
Point32
Driver: Unload, Delete, Disable
Microsoft IntelliPoint Filter DriverNot startedC:\Windows\system32\DRIVERS\point32k.sys
Script: Quarantine, Delete, Delete via BC
Pointer Port 
Detected - 249, recognized as trusted - 244

Autoruns

File nameStatusStartup methodDescription
C:\PROGRA~1\MICROS~3\Office12\1032\MAPIR.DLL
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Outlook, EventMessageFile
Delete
C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows\CurrentVersion\Run, Malwarebytes' Anti-Malware
Delete
C:\Users\Χρήστος\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Shows Desktop.lnk
Script: Quarantine, Delete, Delete via BC
ActiveFile in Startup folderC:\Users\Χρήστος\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\, C:\Users\Χρήστος\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Shows Desktop.lnk,
C:\Users\Χρήστος\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Window Switcher.lnk
Script: Quarantine, Delete, Delete via BC
ActiveFile in Startup folderC:\Users\Χρήστος\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\, C:\Users\Χρήστος\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Window Switcher.lnk,
C:\Windows\system32\psxss.exe
Script: Quarantine, Delete, Delete via BC
--Registry keyHKEY_LOCAL_MACHINE, System\CurrentControlSet\Control\Session Manager\SubSystems, Posix
C:\Windows\system32\sshnas.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, .DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run, LosAlamos
Delete
C:\Windows\system32\sshnas.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_USERS, S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Run, LosAlamos
Delete
C:\Windows\system32\vorbis.acm
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\Drivers32, msacm.vorbis
Delete
C:\Windows\system32\xlive.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\XLive, EventMessageFile
Delete
SDEvents.dll
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, SYSTEM\CurrentControlSet\Services\Eventlog\Application\Spybot - Search & Destroy 2, EventMessageFile
Delete
progman.exe
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, shell
Delete
vgafix.fon
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fixedfon.fon
Delete
vgaoem.fon
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, oemfonts.fon
Delete
vgasys.fon
Script: Quarantine, Delete, Delete via BC
ActiveRegistry keyHKEY_LOCAL_MACHINE, Software\Microsoft\Windows NT\CurrentVersion\WOW\boot, fonts.fon
Delete
Autoruns items found - 575, recognized as trusted - 561

Internet Explorer extension modules (BHOs, Toolbars ...)

File nameTypeDescriptionManufacturerCLSID
Extension module{2670000A-7350-4f3c-8081-5663EE0C6C49}
Delete
Extension module{92780B25-18CC-41C8-B9BE-3C9C571A8263}
Delete
Extension module{DFB852A3-47F8-48C4-A200-58CAB36FD2A2}
Delete
Items found - 7, recognized as trusted - 4

Windows Explorer extension modules

File nameDestinationDescriptionManufacturerCLSID
Groove GFS Browser Helper{72853161-30C5-4D22-B7F9-0BBC1D38A37E}
Delete
Items found - 28, recognized as trusted - 27

Printing system extensions (print monitors, providers)

File nameTypeNameDescriptionManufacturer
Items found - 9, recognized as trusted - 9

Task Scheduler jobs

File nameJob nameJob stateDescriptionManufacturer
C:\Windows\TEMP\b.exe
Script: Quarantine, Delete, Delete via BC
{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.jobThe task is ready to run at its next scheduled time.
C:\Windows\TEMP\c.exe
Script: Quarantine, Delete, Delete via BC
{66BA574B-1E11-49b8-909C-8CC9E0E8E015}.jobThe task is ready to run at its next scheduled time.
Items found - 2, recognized as trusted - 0

SPI/LSP settings

Namespace providers (NSP)
ManufacturerStatusEXE fileDescriptionGUID
Detected - 7, recognized as trusted - 7
Transport protocol providers (TSP, LSP)
ManufacturerEXE fileDescription
Detected - 20, recognized as trusted - 20
Results of automatic SPI settings check
LSP settings checked. No errors detected

TCP/UDP ports

PortStatusRemote HostRemote PortApplicationNotes
TCP ports
135LISTENING0.0.0.00[764] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
139LISTENING0.0.0.00[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
445LISTENING0.0.0.00[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
2869LISTENING0.0.0.00[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
5354LISTENING0.0.0.00[1724] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
5357LISTENING0.0.0.00[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
49152LISTENING0.0.0.00[448] c:\windows\system32\wininit.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
49153LISTENING0.0.0.00[864] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
49154LISTENING0.0.0.00[948] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
49155LISTENING0.0.0.00[552] c:\windows\system32\lsass.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
49161LISTENING0.0.0.00[544] c:\windows\system32\services.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
51712LISTENING0.0.0.00[3072] c:\users\Χρήστος\desktop\rapidshare tools\cryptload_1.1.6\cryptload.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
52202CLOSE_WAIT195.122.131.2280[3072] c:\users\Χρήστος\desktop\rapidshare tools\cryptload_1.1.6\cryptload.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
52203CLOSE_WAIT195.122.131.2180[3072] c:\users\Χρήστος\desktop\rapidshare tools\cryptload_1.1.6\cryptload.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
52204CLOSE_WAIT195.122.131.2080[3072] c:\users\Χρήστος\desktop\rapidshare tools\cryptload_1.1.6\cryptload.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
UDP ports
137LISTENING----[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
138LISTENING----[4] System
Script: Quarantine, Delete, Delete via BC, Terminate
 
500LISTENING----[948] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1434LISTENING----[2128] c:\program files\microsoft sql server\90\shared\sqlbrowser.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1900LISTENING----[1936] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
1900LISTENING----[1936] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
3702LISTENING----[1936] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
3702LISTENING----[1936] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
3702LISTENING----[1108] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
3702LISTENING----[1108] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
4500LISTENING----[948] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
5353LISTENING----[1724] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
5355LISTENING----[1244] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
52351LISTENING----[656] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
53220LISTENING----[1936] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
53221LISTENING----[1936] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
55067LISTENING----[1724] c:\program files\bonjour\mdnsresponder.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
58302LISTENING----[1108] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
59870LISTENING----[1108] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 
61373LISTENING----[1936] c:\windows\system32\svchost.exe
Script: Quarantine, Delete, Delete via BC, Terminate
 

Downloaded Program Files (DPF)

File nameDescriptionManufacturerCLSIDSource URL
Items found - 4, recognized as trusted - 4

Control Panel Applets (CPL)

File nameDescriptionManufacturer
Items found - 23, recognized as trusted - 23

Active Setup

File nameDescriptionManufacturerCLSID
Items found - 9, recognized as trusted - 9

HOSTS file

Hosts file record

Protocols and handlers

File nameTypeDescriptionManufacturerCLSID
mscoree.dll
Script: Quarantine, Delete, Delete via BC
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
mscoree.dll
Script: Quarantine, Delete, Delete via BC
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
mscoree.dll
Script: Quarantine, Delete, Delete via BC
ProtocolMicrosoft .NET Runtime Execution Engine ()© Microsoft Corporation. All rights reserved.{1E66F26B-79EE-11D2-8710-00C04F79ED0D}
Items found - 20, recognized as trusted - 17

Suspicious objects

FileDescriptionType
C:\Documents and Settings\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.0.4-ELL\CryptLoad_1.0.4-ELL\CryptLoad_1.0.4\ocr\megaupload.com\FineReader\result.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by File scannerSuspicion for Trojan.Win32.VB.izh ( 00449025 001B74A5 000ECA48 00000000 16384)
C:\Documents and Settings\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.0.4-ELL\CryptLoad_1.0.4-ELL\CryptLoad_1.0.4\ocr\netload.in\FineReader\result.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by File scannerSuspicion for Trojan.Win32.VB.izh ( 00449025 001B74A5 000ECA48 00000000 16384)
C:\Program Files\BRS\UserLayout.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by File scannerSuspicion for AdvWare.Win32.Zango.aj ( 00862849 08CD5FC5 0024484A 001F8DA6 1638400)
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.0.4-ELL\CryptLoad_1.0.4-ELL\CryptLoad_1.0.4\ocr\megaupload.com\FineReader\result.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by File scannerSuspicion for Trojan.Win32.VB.izh ( 00449025 001B74A5 000ECA48 00000000 16384)
C:\Users\Χρήστος\Desktop\Rapidshare Tools\CryptLoad_1.0.4-ELL\CryptLoad_1.0.4-ELL\CryptLoad_1.0.4\ocr\netload.in\FineReader\result.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by File scannerSuspicion for Trojan.Win32.VB.izh ( 00449025 001B74A5 000ECA48 00000000 16384)
E:\My programmes\Backcolors\Project1.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by File scannerSuspicion for IM-Worm.Win32.VB.ao ( 0045BA24 00131D11 000BB7EB 0011EF64 20480)
E:\My programmes\calculator\Calculator Version 1.1.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by File scannerSuspicion for Trojan.Win32.Agent.aouc ( 004876B2 0029FAE2 0016ACC0 000440E0 40960)
E:\My programmes\calculator\Calculator Version 1.1.rar
Script: Quarantine, Delete, Delete via BC
Suspicion by File scannerSuspicion for Trojan.Win32.Agent.aouc ( 004876B2 0029FAE2 0016ACC0 000440E0 40960)
E:\My programmes\calculator\Claculator Version 1.00.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by File scannerSuspicion for Trojan.Win32.Agent.aouc ( 00479C8F 0029FAE2 0017DC66 000440E0 40960)
E:\My programmes\My First Code\Project1.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by File scannerSuspicion for IM-Worm.Win32.VB.ao ( 00426395 00131D11 0011D6BB 00000000 20480)
E:\My programmes\Text Programme\Project1.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by File scannerSuspicion for IM-Worm.Win32.VB.ao ( 0040D8C2 00131D11 000A0E9C 00000000 20480)
E:\Playstation Portable\psp downloads\Work\PSPMillionaire_1[1].10.rar
Script: Quarantine, Delete, Delete via BC
Suspicion by File scannerSuspicion for Trojan.Win32.Rebooter.b ( 004849A7 0057C422 00132372 00080885 40960)
E:\Playstation Portable\psp-devhook 0.41d-backup\PSP\GAME\PSPMillionaire 1\Custom\PSP Millioniaire Question Adder.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by File scannerSuspicion for Trojan.Win32.Rebooter.b ( 004849A7 0057C422 00132372 00080885 40960)
E:\Τα εγγραφά μου\Παιχνίδια\san andreas\Downloads\Tools\carspawner.zip
Script: Quarantine, Delete, Delete via BC
Suspicion by File scannerSuspicion for Trojan-Downloader.Win32.VB.eu ( 0044CCC8 001B74A5 000AF5E6 0021CA6C 32768)
E:\Τα εγγραφά μου\Παιχνίδια\san andreas\Downloads\Tools\GTA-SA.CarSpawn-Trainer v1.1.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by File scannerSuspicion for Trojan-Downloader.Win32.VB.eu ( 0044CCC8 001B74A5 000AF5E6 0021CA6C 32768)
F:\Program Files\Game Trainer Studio\! Extra\Pacman\Trainer.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by File scannerSuspicion for Trojan-Downloader.Win32.Agent.aqs ( 09B1C8EC 062FE7FA 0001ACB4 00000000 6656)
F:\Program Files\Game Trainer Studio\Output\Mafia.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by File scannerSuspicion for Trojan-Downloader.Win32.Agent.aqs ( 09B1C8EC 062FE7FA 0001ACB4 00000000 6656)
F:\PSP-20-3-09 Backup\PSP\GAME150\PSPMillionaire 1\Custom\PSP Millioniaire Question Adder.exe
Script: Quarantine, Delete, Delete via BC
Suspicion by File scannerSuspicion for Trojan.Win32.Rebooter.b ( 004849A7 0057C422 00132372 00080885 40960)


AVZ Antiviral Toolkit log; AVZ version is 4.32
Scanning started at 18/12/2009 8:46:15 ??
Database loaded: signatures - 254478, NN profile(s) - 2, malware removal microprograms - 56, signature database released 17.12.2009 18:18
Heuristic microprograms loaded: 374
PVS microprograms loaded: 9
Digital signatures of system files loaded: 161328
Heuristic analyzer mode: Medium heuristics mode
Malware removal mode: enabled
Windows version is: 6.1.7600,  ; AVZ is run with administrator rights
System Restore: enabled
1. Searching for Rootkits and other software intercepting API functions
1.1 Searching for user-mode API hooks
 Analysis: kernel32.dll, export table found in section .text
 Analysis: ntdll.dll, export table found in section .text
 Analysis: user32.dll, export table found in section .text
 Analysis: advapi32.dll, export table found in section .text
Function advapi32.dll:AddMandatoryAce (1029) intercepted, method - ProcAddressHijack.GetProcAddress ->775624B5->75AE193A
Function advapi32.dll:I_QueryTagInformation (1361) intercepted, method - ProcAddressHijack.GetProcAddress ->77562655->772172D8
Function advapi32.dll:I_ScIsSecurityProcess (1362) intercepted, method - ProcAddressHijack.GetProcAddress ->7756268C->7721733F
Function advapi32.dll:I_ScPnPGetServiceName (1363) intercepted, method - ProcAddressHijack.GetProcAddress ->775626C3->77217C40
Function advapi32.dll:I_ScQueryServiceConfig (1364) intercepted, method - ProcAddressHijack.GetProcAddress ->775626FA->77215F8A
Function advapi32.dll:I_ScSendPnPMessage (1365) intercepted, method - ProcAddressHijack.GetProcAddress ->77562732->77215E7D
Function advapi32.dll:I_ScSendTSMessage (1366) intercepted, method - ProcAddressHijack.GetProcAddress ->77562766->772171C5
Function advapi32.dll:I_ScValidatePnPService (1369) intercepted, method - ProcAddressHijack.GetProcAddress ->77562799->77216B9D
Function advapi32.dll:IsValidRelativeSecurityDescriptor (1389) intercepted, method - ProcAddressHijack.GetProcAddress ->775627D1->75AD977E
Function advapi32.dll:PerfCreateInstance (1515) intercepted, method - ProcAddressHijack.GetProcAddress ->77562858->74FA2187
Function advapi32.dll:PerfDecrementULongCounterValue (1516) intercepted, method - ProcAddressHijack.GetProcAddress ->77562871->74FA2A1D
Function advapi32.dll:PerfDecrementULongLongCounterValue (1517) intercepted, method - ProcAddressHijack.GetProcAddress ->77562896->74FA2B3C
Function advapi32.dll:PerfDeleteInstance (1519) intercepted, method - ProcAddressHijack.GetProcAddress ->775628BF->74FA2259
Function advapi32.dll:PerfIncrementULongCounterValue (1522) intercepted, method - ProcAddressHijack.GetProcAddress ->775628D8->74FA27B9
Function advapi32.dll:PerfIncrementULongLongCounterValue (1523) intercepted, method - ProcAddressHijack.GetProcAddress ->775628FD->74FA28D6
Function advapi32.dll:PerfQueryInstance (1528) intercepted, method - ProcAddressHijack.GetProcAddress ->77562926->74FA2373
Function advapi32.dll:PerfSetCounterRefValue (1529) intercepted, method - ProcAddressHijack.GetProcAddress ->7756293E->74FA2447
Function advapi32.dll:PerfSetCounterSetInfo (1530) intercepted, method - ProcAddressHijack.GetProcAddress ->7756295B->74FA20B0
Function advapi32.dll:PerfSetULongCounterValue (1531) intercepted, method - ProcAddressHijack.GetProcAddress ->77562977->74FA2565
Function advapi32.dll:PerfSetULongLongCounterValue (1532) intercepted, method - ProcAddressHijack.GetProcAddress ->77562996->74FA2680
Function advapi32.dll:PerfStartProvider (1533) intercepted, method - ProcAddressHijack.GetProcAddress ->775629B9->74FA1FED
Function advapi32.dll:PerfStartProviderEx (1534) intercepted, method - ProcAddressHijack.GetProcAddress ->775629D1->74FA1F34
Function advapi32.dll:PerfStopProvider (1535) intercepted, method - ProcAddressHijack.GetProcAddress ->775629EB->74FA2026
Function advapi32.dll:SystemFunction035 (1753) intercepted, method - ProcAddressHijack.GetProcAddress ->77562A3C->75413EA8
 Analysis: ws2_32.dll, export table found in section .text
 Analysis: wininet.dll, export table found in section .text
 Analysis: rasapi32.dll, export table found in section .text
 Analysis: urlmon.dll, export table found in section .text
 Analysis: netapi32.dll, export table found in section .text
Function netapi32.dll:DavAddConnection (1) intercepted, method - ProcAddressHijack.GetProcAddress ->74133B10->747F29DD
Function netapi32.dll:DavDeleteConnection (2) intercepted, method - ProcAddressHijack.GetProcAddress ->74133B29->747F181B
Function netapi32.dll:DavFlushFile (3) intercepted, method - ProcAddressHijack.GetProcAddress ->74133B45->747F1713
Function netapi32.dll:DavGetExtendedError (4) intercepted, method - ProcAddressHijack.GetProcAddress ->74133B5A->747F2347
Function netapi32.dll:DavGetHTTPFromUNCPath (5) intercepted, method - ProcAddressHijack.GetProcAddress ->74133B76->747F275B
Function netapi32.dll:DavGetUNCFromHTTPPath (6) intercepted, method - ProcAddressHijack.GetProcAddress ->74133B94->747F257D
Function netapi32.dll:DsAddressToSiteNamesA (7) intercepted, method - ProcAddressHijack.GetProcAddress ->74133BB2->75274A4D
Function netapi32.dll:DsAddressToSiteNamesExA (8) intercepted, method - ProcAddressHijack.GetProcAddress ->74133BD1->75274D79
Function netapi32.dll:DsAddressToSiteNamesExW (9) intercepted, method - ProcAddressHijack.GetProcAddress ->74133BF2->75275049
Function netapi32.dll:DsAddressToSiteNamesW (10) intercepted, method - ProcAddressHijack.GetProcAddress ->74133C13->75274C29
Function netapi32.dll:DsDeregisterDnsHostRecordsA (11) intercepted, method - ProcAddressHijack.GetProcAddress ->74133C32->75276DD9
Function netapi32.dll:DsDeregisterDnsHostRecordsW (12) intercepted, method - ProcAddressHijack.GetProcAddress ->74133C57->75276D59
Function netapi32.dll:DsEnumerateDomainTrustsA (13) intercepted, method - ProcAddressHijack.GetProcAddress ->74133C7C->75276771
Function netapi32.dll:DsEnumerateDomainTrustsW (14) intercepted, method - ProcAddressHijack.GetProcAddress ->74133C9E->752660BC
Function netapi32.dll:DsGetDcCloseW (15) intercepted, method - ProcAddressHijack.GetProcAddress ->74133CC0->7527495D
Function netapi32.dll:DsGetDcNameA (16) intercepted, method - ProcAddressHijack.GetProcAddress ->74133CD7->75275BB2
Function netapi32.dll:DsGetDcNameW (17) intercepted, method - ProcAddressHijack.GetProcAddress ->74133CED->75264CA8
Function netapi32.dll:DsGetDcNameWithAccountA (18) intercepted, method - ProcAddressHijack.GetProcAddress ->74133D03->752755E9
Function netapi32.dll:DsGetDcNameWithAccountW (19) intercepted, method - ProcAddressHijack.GetProcAddress ->74133D24->75264CD1
Function netapi32.dll:DsGetDcNextA (20) intercepted, method - ProcAddressHijack.GetProcAddress ->74133D45->75274896
Function netapi32.dll:DsGetDcNextW (21) intercepted, method - ProcAddressHijack.GetProcAddress ->74133D5B->752747ED
Function netapi32.dll:DsGetDcOpenA (22) intercepted, method - ProcAddressHijack.GetProcAddress ->74133D71->7527473D
Function netapi32.dll:DsGetDcOpenW (23) intercepted, method - ProcAddressHijack.GetProcAddress ->74133D87->752746AB
Function netapi32.dll:DsGetDcSiteCoverageA (24) intercepted, method - ProcAddressHijack.GetProcAddress ->74133D9D->75275239
Function netapi32.dll:DsGetDcSiteCoverageW (25) intercepted, method - ProcAddressHijack.GetProcAddress ->74133DBB->75275409
Function netapi32.dll:DsGetForestTrustInformationW (26) intercepted, method - ProcAddressHijack.GetProcAddress ->74133DD9->75276E6F
Function netapi32.dll:DsGetSiteNameA (27) intercepted, method - ProcAddressHijack.GetProcAddress ->74133DFF->75275B39
Function netapi32.dll:DsGetSiteNameW (28) intercepted, method - ProcAddressHijack.GetProcAddress ->74133E17->75265F24
Function netapi32.dll:DsMergeForestTrustInformationW (29) intercepted, method - ProcAddressHijack.GetProcAddress ->74133E2F->75276F71
Function netapi32.dll:DsRoleAbortDownlevelServerUpgrade (30) intercepted, method - ProcAddressHijack.GetProcAddress ->74133E57->73C64339
Function netapi32.dll:DsRoleCancel (31) intercepted, method - ProcAddressHijack.GetProcAddress ->74133E80->73C634A9
Function netapi32.dll:DsRoleDcAsDc (32) intercepted, method - ProcAddressHijack.GetProcAddress ->74133E94->73C63EAD
Function netapi32.dll:DsRoleDcAsReplica (33) intercepted, method - ProcAddressHijack.GetProcAddress ->74133EA8->73C63F99
Function netapi32.dll:DsRoleDemoteDc (34) intercepted, method - ProcAddressHijack.GetProcAddress ->74133EC1->73C64189
Function netapi32.dll:DsRoleDnsNameToFlatName (35) intercepted, method - ProcAddressHijack.GetProcAddress ->74133ED7->73C632B5
Function netapi32.dll:DsRoleFreeMemory (36) intercepted, method - ProcAddressHijack.GetProcAddress ->74133EF6->73C619A9
Function netapi32.dll:DsRoleGetDatabaseFacts (37) intercepted, method - ProcAddressHijack.GetProcAddress ->74133F0E->73C63651
Function netapi32.dll:DsRoleGetDcOperationProgress (38) intercepted, method - ProcAddressHijack.GetProcAddress ->74133F2C->73C63351
Function netapi32.dll:DsRoleGetDcOperationResults (39) intercepted, method - ProcAddressHijack.GetProcAddress ->74133F50->73C63401
Function netapi32.dll:DsRoleGetPrimaryDomainInformation (40) intercepted, method - ProcAddressHijack.GetProcAddress ->74133F73->73C61F3D
Function netapi32.dll:DsRoleIfmHandleFree (41) intercepted, method - ProcAddressHijack.GetProcAddress ->74133F9C->73C63539
Function netapi32.dll:DsRoleServerSaveStateForUpgrade (42) intercepted, method - ProcAddressHijack.GetProcAddress ->74133FB7->73C635C9
Function netapi32.dll:DsRoleUpgradeDownlevelServer (43) intercepted, method - ProcAddressHijack.GetProcAddress ->74133FDE->73C64261
Function netapi32.dll:DsValidateSubnetNameA (44) intercepted, method - ProcAddressHijack.GetProcAddress ->74134002->75275AF9
Function netapi32.dll:DsValidateSubnetNameW (45) intercepted, method - ProcAddressHijack.GetProcAddress ->74134021->752749E1
Function netapi32.dll:I_BrowserDebugCall (46) intercepted, method - ProcAddressHijack.GetProcAddress ->74134040->740724A9
Function netapi32.dll:I_BrowserDebugTrace (47) intercepted, method - ProcAddressHijack.GetProcAddress ->7413405B->74072581
Function netapi32.dll:I_BrowserQueryEmulatedDomains (48) intercepted, method - ProcAddressHijack.GetProcAddress ->74134077->740729F9
Function netapi32.dll:I_BrowserQueryOtherDomains (49) intercepted, method - ProcAddressHijack.GetProcAddress ->7413409D->740722C1
Function netapi32.dll:I_BrowserQueryStatistics (50) intercepted, method - ProcAddressHijack.GetProcAddress ->741340C0->74072651
Function netapi32.dll:I_BrowserResetNetlogonState (51) intercepted, method - ProcAddressHijack.GetProcAddress ->741340E1->740723D1
Function netapi32.dll:I_BrowserResetStatistics (52) intercepted, method - ProcAddressHijack.GetProcAddress ->74134105->74072729
Function netapi32.dll:I_BrowserServerEnum (53) intercepted, method - ProcAddressHijack.GetProcAddress ->74134126->740720BF
Function netapi32.dll:I_BrowserSetNetlogonState (54) intercepted, method - ProcAddressHijack.GetProcAddress ->74134142->74072919
Function netapi32.dll:I_DsUpdateReadOnlyServerDnsRecords (55) intercepted, method - ProcAddressHijack.GetProcAddress ->74134164->75275569
Function netapi32.dll:I_NetAccountDeltas (56) intercepted, method - ProcAddressHijack.GetProcAddress ->74134190->752763AB
Function netapi32.dll:I_NetAccountSync (57) intercepted, method - ProcAddressHijack.GetProcAddress ->741341AC->752763AB
Function netapi32.dll:I_NetChainSetClientAttributes (59) intercepted, method - ProcAddressHijack.GetProcAddress ->741341C6->75276FA6
Function netapi32.dll:I_NetChainSetClientAttributes2 (58) intercepted, method - ProcAddressHijack.GetProcAddress ->741341ED->75277029
Function netapi32.dll:I_NetDatabaseDeltas (60) intercepted, method - ProcAddressHijack.GetProcAddress ->74134215->75276391
Function netapi32.dll:I_NetDatabaseRedo (61) intercepted, method - ProcAddressHijack.GetProcAddress ->74134232->75276521
Function netapi32.dll:I_NetDatabaseSync (63) intercepted, method - ProcAddressHijack.GetProcAddress ->7413424D->75276391
Function netapi32.dll:I_NetDatabaseSync2 (62) intercepted, method - ProcAddressHijack.GetProcAddress ->74134268->7527639E
Function netapi32.dll:I_NetDfsGetVersion (64) intercepted, method - ProcAddressHijack.GetProcAddress ->74134284->755B7CA1
Function netapi32.dll:I_NetDfsIsThisADomainName (65) intercepted, method - ProcAddressHijack.GetProcAddress ->7413429E->72BD4E39
Function netapi32.dll:I_NetGetDCList (66) intercepted, method - ProcAddressHijack.GetProcAddress ->741342BF->75275D9C
Function netapi32.dll:I_NetGetForestTrustInformation (67) intercepted, method - ProcAddressHijack.GetProcAddress ->741342D7->75276EF1
Function netapi32.dll:I_NetLogonControl (69) intercepted, method - ProcAddressHijack.GetProcAddress ->741342FF->752763B8
Function netapi32.dll:I_NetLogonControl2 (68) intercepted, method - ProcAddressHijack.GetProcAddress ->7413431A->75276439
Function netapi32.dll:I_NetLogonGetDomainInfo (70) intercepted, method - ProcAddressHijack.GetProcAddress ->74134336->752664A4
Function netapi32.dll:I_NetLogonSamLogoff (71) intercepted, method - ProcAddressHijack.GetProcAddress ->74134357->75276091
Function netapi32.dll:I_NetLogonSamLogon (72) intercepted, method - ProcAddressHijack.GetProcAddress ->74134374->75275F39
Function netapi32.dll:I_NetLogonSamLogonEx (73) intercepted, method - ProcAddressHijack.GetProcAddress ->74134390->75275FE1
Function netapi32.dll:I_NetLogonSamLogonWithFlags (74) intercepted, method - ProcAddressHijack.GetProcAddress ->741343AE->7526B22A
Function netapi32.dll:I_NetLogonSendToSam (75) intercepted, method - ProcAddressHijack.GetProcAddress ->741343D3->75276111
Function netapi32.dll:I_NetLogonUasLogoff (76) intercepted, method - ProcAddressHijack.GetProcAddress ->741343F0->75275EC9
Function netapi32.dll:I_NetLogonUasLogon (77) intercepted, method - ProcAddressHijack.GetProcAddress ->7413440D->75275E53
Function netapi32.dll:I_NetServerAuthenticate (80) intercepted, method - ProcAddressHijack.GetProcAddress ->74134429->75276191
Function netapi32.dll:I_NetServerAuthenticate2 (78) intercepted, method - ProcAddressHijack.GetProcAddress ->7413444A->75276211
Function netapi32.dll:I_NetServerAuthenticate3 (79) intercepted, method - ProcAddressHijack.GetProcAddress ->7413446C->75266393
Function netapi32.dll:I_NetServerGetTrustInfo (81) intercepted, method - ProcAddressHijack.GetProcAddress ->7413448E->75276C61
Function netapi32.dll:I_NetServerPasswordGet (82) intercepted, method - ProcAddressHijack.GetProcAddress ->741344AF->75276B61
Function netapi32.dll:I_NetServerPasswordSet (84) intercepted, method - ProcAddressHijack.GetProcAddress ->741344CF->75276291
Function netapi32.dll:I_NetServerPasswordSet2 (83) intercepted, method - ProcAddressHijack.GetProcAddress ->741344EF->75276311
Function netapi32.dll:I_NetServerReqChallenge (85) intercepted, method - ProcAddressHijack.GetProcAddress ->74134510->75266424
Function netapi32.dll:I_NetServerSetServiceBits (86) intercepted, method - ProcAddressHijack.GetProcAddress ->74134531->755B426D
Function netapi32.dll:I_NetServerSetServiceBitsEx (87) intercepted, method - ProcAddressHijack.GetProcAddress ->74134552->755B6D11
Function netapi32.dll:I_NetServerTrustPasswordsGet (88) intercepted, method - ProcAddressHijack.GetProcAddress ->74134575->75276BE1
Function netapi32.dll:I_NetlogonComputeClientDigest (89) intercepted, method - ProcAddressHijack.GetProcAddress ->7413459B->75265C20
Function netapi32.dll:I_NetlogonComputeServerDigest (90) intercepted, method - ProcAddressHijack.GetProcAddress ->741345C2->75276AEC
Function netapi32.dll:NetAddAlternateComputerName (97) intercepted, method - ProcAddressHijack.GetProcAddress ->741345E9->74115B21
Function netapi32.dll:NetAddServiceAccount (98) intercepted, method - ProcAddressHijack.GetProcAddress ->7413460C->752770B1
Function netapi32.dll:NetApiBufferAllocate (101) intercepted, method - ProcAddressHijack.GetProcAddress ->7413462A->74121415
Function netapi32.dll:NetApiBufferFree (102) intercepted, method - ProcAddressHijack.GetProcAddress ->74134648->741213D2
Function netapi32.dll:NetApiBufferReallocate (103) intercepted, method - ProcAddressHijack.GetProcAddress ->74134662->74123729
Function netapi32.dll:NetApiBufferSize (104) intercepted, method - ProcAddressHijack.GetProcAddress ->74134682->74123771
Function netapi32.dll:NetBrowserStatisticsGet (108) intercepted, method - ProcAddressHijack.GetProcAddress ->7413469C->74072801
Function netapi32.dll:NetConnectionEnum (112) intercepted, method - ProcAddressHijack.GetProcAddress ->741346BC->755B5521
Function netapi32.dll:NetDfsAdd (113) intercepted, method - ProcAddressHijack.GetProcAddress ->741346D5->72BD78FD
Function netapi32.dll:NetDfsAddFtRoot (114) intercepted, method - ProcAddressHijack.GetProcAddress ->741346E6->72BD6859
Function netapi32.dll:NetDfsAddRootTarget (115) intercepted, method - ProcAddressHijack.GetProcAddress ->741346FD->72BD7401
Function netapi32.dll:NetDfsAddStdRoot (116) intercepted, method - ProcAddressHijack.GetProcAddress ->74134718->72BD2B1E
Function netapi32.dll:NetDfsAddStdRootForced (117) intercepted, method - ProcAddressHijack.GetProcAddress ->74134730->72BD2BB1
Function netapi32.dll:NetDfsEnum (118) intercepted, method - ProcAddressHijack.GetProcAddress ->7413474E->72BD70F9
Function netapi32.dll:NetDfsGetClientInfo (119) intercepted, method - ProcAddressHijack.GetProcAddress ->74134760->72BD3F25
Function netapi32.dll:NetDfsGetDcAddress (120) intercepted, method - ProcAddressHijack.GetProcAddress ->7413477B->72BD2C51
Function netapi32.dll:NetDfsGetFtContainerSecurity (121) intercepted, method - ProcAddressHijack.GetProcAddress ->74134795->72BD5363
Function netapi32.dll:NetDfsGetInfo (122) intercepted, method - ProcAddressHijack.GetProcAddress ->741347B9->72BD2D69
Function netapi32.dll:NetDfsGetSecurity (123) intercepted, method - ProcAddressHijack.GetProcAddress ->741347CE->72BD7741
Function netapi32.dll:NetDfsGetStdContainerSecurity (124) intercepted, method - ProcAddressHijack.GetProcAddress ->741347E7->72BD3AD5
Function netapi32.dll:NetDfsGetSupportedNamespaceVersion (125) intercepted, method - ProcAddressHijack.GetProcAddress ->7413480C->72BD5C19
Function netapi32.dll:NetDfsManagerGetConfigInfo (126) intercepted, method - ProcAddressHijack.GetProcAddress ->74134836->72BD2E9C
Function netapi32.dll:NetDfsManagerInitialize (127) intercepted, method - ProcAddressHijack.GetProcAddress ->74134858->72BD2F91
Function netapi32.dll:NetDfsManagerSendSiteInfo (128) intercepted, method - ProcAddressHijack.GetProcAddress ->74134877->72BD72C5
Function netapi32.dll:NetDfsMove (129) intercepted, method - ProcAddressHijack.GetProcAddress ->74134898->72BD5651
Function netapi32.dll:NetDfsRemove (130) intercepted, method - ProcAddressHijack.GetProcAddress ->741348AA->72BD7A19
Function netapi32.dll:NetDfsRemoveFtRoot (131) intercepted, method - ProcAddressHijack.GetProcAddress ->741348BE->72BD6A99
Function netapi32.dll:NetDfsRemoveFtRootForced (132) intercepted, method - ProcAddressHijack.GetProcAddress ->741348D8->72BD6BE5
Function netapi32.dll:NetDfsRemoveRootTarget (133) intercepted, method - ProcAddressHijack.GetProcAddress ->741348F8->72BD5879
Function netapi32.dll:NetDfsRemoveStdRoot (134) intercepted, method - ProcAddressHijack.GetProcAddress ->74134916->72BD2CE1
Function netapi32.dll:NetDfsRename (135) intercepted, method - ProcAddressHijack.GetProcAddress ->74134931->72BD2E91
Function netapi32.dll:NetDfsSetClientInfo (136) intercepted, method - ProcAddressHijack.GetProcAddress ->74134945->72BD4301
Function netapi32.dll:NetDfsSetFtContainerSecurity (137) intercepted, method - ProcAddressHijack.GetProcAddress ->74134960->72BD53AF
Function netapi32.dll:NetDfsSetInfo (138) intercepted, method - ProcAddressHijack.GetProcAddress ->74134984->72BD6D8B
Function netapi32.dll:NetDfsSetSecurity (139) intercepted, method - ProcAddressHijack.GetProcAddress ->74134999->72BD7822
Function netapi32.dll:NetDfsSetStdContainerSecurity (140) intercepted, method - ProcAddressHijack.GetProcAddress ->741349B2->72BD3B24
Function netapi32.dll:NetEnumerateComputerNames (141) intercepted, method - ProcAddressHijack.GetProcAddress ->741349D7->74115E39
Function netapi32.dll:NetEnumerateServiceAccounts (142) intercepted, method - ProcAddressHijack.GetProcAddress ->741349F8->75277199
Function netapi32.dll:NetEnumerateTrustedDomains (143) intercepted, method - ProcAddressHijack.GetProcAddress ->74134A1D->7527652E
Function netapi32.dll:NetFileClose (147) intercepted, method - ProcAddressHijack.GetProcAddress ->74134A41->755B5659
Function netapi32.dll:NetFileEnum (148) intercepted, method - ProcAddressHijack.GetProcAddress ->74134A55->755B5729
Function netapi32.dll:NetFileGetInfo (149) intercepted, method - ProcAddressHijack.GetProcAddress ->74134A68->755B5859
Function netapi32.dll:NetGetAnyDCName (150) intercepted, method - ProcAddressHijack.GetProcAddress ->74134A7E->7527496D
Function netapi32.dll:NetGetDCName (151) intercepted, method - ProcAddressHijack.GetProcAddress ->74134A97->75275913
Function netapi32.dll:NetGetDisplayInformationIndex (152) intercepted, method - ProcAddressHijack.GetProcAddress ->74134AAD->74104117
Function netapi32.dll:NetGetJoinInformation (153) intercepted, method - ProcAddressHijack.GetProcAddress ->74134AD2->74112DC7
Function netapi32.dll:NetGetJoinableOUs (154) intercepted, method - ProcAddressHijack.GetProcAddress ->74134AEF->741159D1
Function netapi32.dll:NetGroupAdd (155) intercepted, method - ProcAddressHijack.GetProcAddress ->74134B08->741071C3
Function netapi32.dll:NetGroupAddUser (156) intercepted, method - ProcAddressHijack.GetProcAddress ->74134B1B->741073AD
Function netapi32.dll:NetGroupDel (157) intercepted, method - ProcAddressHijack.GetProcAddress ->74134B32->741073CB
Function netapi32.dll:NetGroupDelUser (158) intercepted, method - ProcAddressHijack.GetProcAddress ->74134B45->741073EB
Function netapi32.dll:NetGroupEnum (159) intercepted, method - ProcAddressHijack.GetProcAddress ->74134B5C->74107409
Function netapi32.dll:NetGroupGetInfo (160) intercepted, method - ProcAddressHijack.GetProcAddress ->74134B70->741078C8
Function netapi32.dll:NetGroupGetUsers (161) intercepted, method - ProcAddressHijack.GetProcAddress ->74134B87->74107952
Function netapi32.dll:NetGroupSetInfo (162) intercepted, method - ProcAddressHijack.GetProcAddress ->74134B9F->74107C02
Function netapi32.dll:NetGroupSetUsers (163) intercepted, method - ProcAddressHijack.GetProcAddress ->74134BB6->74107DAE
Function netapi32.dll:NetIsServiceAccount (164) intercepted, method - ProcAddressHijack.GetProcAddress ->74134BCE->752772D9
Function netapi32.dll:NetJoinDomain (165) intercepted, method - ProcAddressHijack.GetProcAddress ->74134BEB->741154B9
Function netapi32.dll:NetLocalGroupAdd (166) intercepted, method - ProcAddressHijack.GetProcAddress ->74134C00->7410875A
Function netapi32.dll:NetLocalGroupAddMember (167) intercepted, method - ProcAddressHijack.GetProcAddress ->74134C18->74108886
Function netapi32.dll:NetLocalGroupAddMembers (168) intercepted, method - ProcAddressHijack.GetProcAddress ->74134C36->74108E99
Function netapi32.dll:NetLocalGroupDel (169) intercepted, method - ProcAddressHijack.GetProcAddress ->74134C55->741088A4
Function netapi32.dll:NetLocalGroupDelMember (170) intercepted, method - ProcAddressHijack.GetProcAddress ->74134C6D->74108928
Function netapi32.dll:NetLocalGroupDelMembers (171) intercepted, method - ProcAddressHijack.GetProcAddress ->74134C8B->74108EBD
Function netapi32.dll:NetLocalGroupEnum (172) intercepted, method - ProcAddressHijack.GetProcAddress ->74134CAA->74108946
Function netapi32.dll:NetLocalGroupGetInfo (173) intercepted, method - ProcAddressHijack.GetProcAddress ->74134CC3->74108CE4
Function netapi32.dll:NetLocalGroupGetMembers (174) intercepted, method - ProcAddressHijack.GetProcAddress ->74134CDF->74102265
Function netapi32.dll:NetLocalGroupSetInfo (175) intercepted, method - ProcAddressHijack.GetProcAddress ->74134CFE->74108D57
Function netapi32.dll:NetLocalGroupSetMembers (176) intercepted, method - ProcAddressHijack.GetProcAddress ->74134D1A->74108E75
Function netapi32.dll:NetLogonGetTimeServiceParentDomain (177) intercepted, method - ProcAddressHijack.GetProcAddress ->74134D39->75276CE9
Function netapi32.dll:NetLogonSetServiceBits (178) intercepted, method - ProcAddressHijack.GetProcAddress ->74134D65->7526603C
Function netapi32.dll:NetProvisionComputerAccount (184) intercepted, method - ProcAddressHijack.GetProcAddress ->74134D85->754FF2D3
Function netapi32.dll:NetQueryDisplayInformation (185) intercepted, method - ProcAddressHijack.GetProcAddress ->74134DA9->74103D87
Function netapi32.dll:NetQueryServiceAccount (186) intercepted, method - ProcAddressHijack.GetProcAddress ->74134DCB->75277249
Function netapi32.dll:NetRemoteComputerSupports (188) intercepted, method - ProcAddressHijack.GetProcAddress ->74134DEB->74122160
Function netapi32.dll:NetRemoteTOD (189) intercepted, method - ProcAddressHijack.GetProcAddress ->74134E0E->755B6C11
Function netapi32.dll:NetRemoveAlternateComputerName (190) intercepted, method - ProcAddressHijack.GetProcAddress ->74134E22->74115C29
Function netapi32.dll:NetRemoveServiceAccount (191) intercepted, method - ProcAddressHijack.GetProcAddress ->74134E48->75277129
Function netapi32.dll:NetRenameMachineInDomain (192) intercepted, method - ProcAddressHijack.GetProcAddress ->74134E69->74115751
Function netapi32.dll:NetRequestOfflineDomainJoin (208) intercepted, method - ProcAddressHijack.GetProcAddress ->74134E89->754FB52F
Function netapi32.dll:NetScheduleJobAdd (209) intercepted, method - ProcAddressHijack.GetProcAddress ->74134EAD->6DC319D1
Function netapi32.dll:NetScheduleJobDel (210) intercepted, method - ProcAddressHijack.GetProcAddress ->74134EC8->6DC31AC9
Function netapi32.dll:NetScheduleJobEnum (211) intercepted, method - ProcAddressHijack.GetProcAddress ->74134EE3->6DC31BC1
Function netapi32.dll:NetScheduleJobGetInfo (212) intercepted, method - ProcAddressHijack.GetProcAddress ->74134EFF->6DC31CE1
Function netapi32.dll:NetServerAliasAdd (213) intercepted, method - ProcAddressHijack.GetProcAddress ->74134F1E->755B7843
Function netapi32.dll:NetServerAliasDel (214) intercepted, method - ProcAddressHijack.GetProcAddress ->74134F37->755B7A79
Function netapi32.dll:NetServerAliasEnum (215) intercepted, method - ProcAddressHijack.GetProcAddress ->74134F50->755B7931
Function netapi32.dll:NetServerComputerNameAdd (216) intercepted, method - ProcAddressHijack.GetProcAddress ->74134F6A->755B7411
Function netapi32.dll:NetServerComputerNameDel (217) intercepted, method - ProcAddressHijack.GetProcAddress ->74134F8A->755B76FB
Function netapi32.dll:NetServerDiskEnum (218) intercepted, method - ProcAddressHijack.GetProcAddress ->74134FAA->755B6559
Function netapi32.dll:NetServerEnum (219) intercepted, method - ProcAddressHijack.GetProcAddress ->74134FC3->74072F61
Function netapi32.dll:NetServerEnumEx (220) intercepted, method - ProcAddressHijack.GetProcAddress ->74134FD9->74072C5F
Function netapi32.dll:NetServerGetInfo (221) intercepted, method - ProcAddressHijack.GetProcAddress ->74134FF1->755B3CFA
Function netapi32.dll:NetServerSetInfo (222) intercepted, method - ProcAddressHijack.GetProcAddress ->74135009->755B6681
Function netapi32.dll:NetServerTransportAdd (223) intercepted, method - ProcAddressHijack.GetProcAddress ->74135021->755B6851
Function netapi32.dll:NetServerTransportAddEx (224) intercepted, method - ProcAddressHijack.GetProcAddress ->7413503E->755B7329
Function netapi32.dll:NetServerTransportDel (225) intercepted, method - ProcAddressHijack.GetProcAddress ->7413505D->755B6A01
Function netapi32.dll:NetServerTransportEnum (226) intercepted, method - ProcAddressHijack.GetProcAddress ->7413507A->755B6AD9
Function netapi32.dll:NetSessionDel (231) intercepted, method - ProcAddressHijack.GetProcAddress ->74135098->755B5941
Function netapi32.dll:NetSessionEnum (232) intercepted, method - ProcAddressHijack.GetProcAddress ->741350AD->755B5A11
Function netapi32.dll:NetSessionGetInfo (233) intercepted, method - ProcAddressHijack.GetProcAddress ->741350C3->755B5B41
Function netapi32.dll:NetSetPrimaryComputerName (234) intercepted, method - ProcAddressHijack.GetProcAddress ->741350DC->74115D31
Function netapi32.dll:NetShareAdd (235) intercepted, method - ProcAddressHijack.GetProcAddress ->741350FD->755B5C81
Function netapi32.dll:NetShareCheck (236) intercepted, method - ProcAddressHijack.GetProcAddress ->74135110->755B5E91
Function netapi32.dll:NetShareDel (237) intercepted, method - ProcAddressHijack.GetProcAddress ->74135125->755B5F81
Function netapi32.dll:NetShareDelEx (238) intercepted, method - ProcAddressHijack.GetProcAddress ->74135138->755B7B61
Function netapi32.dll:NetShareDelSticky (239) intercepted, method - ProcAddressHijack.GetProcAddress ->7413514D->755B60D1
Function netapi32.dll:NetShareEnum (240) intercepted, method - ProcAddressHijack.GetProcAddress ->74135166->755B3F91
Function netapi32.dll:NetShareEnumSticky (241) intercepted, method - ProcAddressHijack.GetProcAddress ->7413517A->755B61C9
Function netapi32.dll:NetShareGetInfo (242) intercepted, method - ProcAddressHijack.GetProcAddress ->74135194->755B433F
Function netapi32.dll:NetShareSetInfo (243) intercepted, method - ProcAddressHijack.GetProcAddress ->741351AB->755B6341
Function netapi32.dll:NetUnjoinDomain (245) intercepted, method - ProcAddressHijack.GetProcAddress ->741351C2->74115641
Function netapi32.dll:NetUseAdd (247) intercepted, method - ProcAddressHijack.GetProcAddress ->741351D9->74113693
Function netapi32.dll:NetUseDel (248) intercepted, method - ProcAddressHijack.GetProcAddress ->741351EA->74115FA9
Function netapi32.dll:NetUseEnum (249) intercepted, method - ProcAddressHijack.GetProcAddress ->741351FB->74113184
Function netapi32.dll:NetUseGetInfo (250) intercepted, method - ProcAddressHijack.GetProcAddress ->7413520D->74116039
Function netapi32.dll:NetUserAdd (251) intercepted, method - ProcAddressHijack.GetProcAddress ->74135222->7410464F
Function netapi32.dll:NetUserChangePassword (252) intercepted, method - ProcAddressHijack.GetProcAddress ->74135234->74105A06
Function netapi32.dll:NetUserDel (253) intercepted, method - ProcAddressHijack.GetProcAddress ->74135251->74104826
Function netapi32.dll:NetUserEnum (254) intercepted, method - ProcAddressHijack.GetProcAddress ->74135263->741049D6
Function netapi32.dll:NetUserGetGroups (255) intercepted, method - ProcAddressHijack.GetProcAddress ->74135276->74104E01
Function netapi32.dll:NetUserGetInfo (256) intercepted, method - ProcAddressHijack.GetProcAddress ->7413528E->74101C60
Function netapi32.dll:NetUserGetLocalGroups (257) intercepted, method - ProcAddressHijack.GetProcAddress ->741352A4->74102875
Function netapi32.dll:NetUserModalsGet (258) intercepted, method - ProcAddressHijack.GetProcAddress ->741352C1->7410206B
Function netapi32.dll:NetUserModalsSet (259) intercepted, method - ProcAddressHijack.GetProcAddress ->741352D9->741054AA
Function netapi32.dll:NetUserSetGroups (260) intercepted, method - ProcAddressHijack.GetProcAddress ->741352F1->74105095
Function netapi32.dll:NetUserSetInfo (261) intercepted, method - ProcAddressHijack.GetProcAddress ->74135309->74104D1D
Function netapi32.dll:NetValidateName (262) intercepted, method - ProcAddressHijack.GetProcAddress ->7413531F->74115859
Function netapi32.dll:NetValidatePasswordPolicy (263) intercepted, method - ProcAddressHijack.GetProcAddress ->74135336->74109967
Function netapi32.dll:NetValidatePasswordPolicyFree (264) intercepted, method - ProcAddressHijack.GetProcAddress ->74135357->74109B6B
Function netapi32.dll:NetWkstaTransportAdd (267) intercepted, method - ProcAddressHijack.GetProcAddress ->7413537C->74114E45
Function netapi32.dll:NetWkstaTransportDel (268) intercepted, method - ProcAddressHijack.GetProcAddress ->74135398->74114F21
Function netapi32.dll:NetWkstaTransportEnum (269) intercepted, method - ProcAddressHijack.GetProcAddress ->741353B4->74114CF9
Function netapi32.dll:NetWkstaUserEnum (270) intercepted, method - ProcAddressHijack.GetProcAddress ->741353D1->74114AD1
Function netapi32.dll:NetWkstaUserGetInfo (271) intercepted, method - ProcAddressHijack.GetProcAddress ->741353E9->74113280
Function netapi32.dll:NetWkstaUserSetInfo (272) intercepted, method - ProcAddressHijack.GetProcAddress ->74135404->74114C15
Function netapi32.dll:NetapipBufferAllocate (273) intercepted, method - ProcAddressHijack.GetProcAddress ->7413541F->741237AA
Function netapi32.dll:NetpIsRemote (289) intercepted, method - ProcAddressHijack.GetProcAddress ->7413543E->7412382D
Function netapi32.dll:NetpwNameCanonicalize (296) intercepted, method - ProcAddressHijack.GetProcAddress ->74135454->74121C30
Function netapi32.dll:NetpwNameCompare (297) intercepted, method - ProcAddressHijack.GetProcAddress ->74135473->74121F2E
Function netapi32.dll:NetpwNameValidate (298) intercepted, method - ProcAddressHijack.GetProcAddress ->7413548D->74121990
Function netapi32.dll:NetpwPathCanonicalize (299) intercepted, method - ProcAddressHijack.GetProcAddress ->741354A8->7412275D
Function netapi32.dll:NetpwPathCompare (300) intercepted, method - ProcAddressHijack.GetProcAddress ->741354C7->74124086
Function netapi32.dll:NetpwPathType (301) intercepted, method - ProcAddressHijack.GetProcAddress ->741354E1->74122533
Function netapi32.dll:NlBindingAddServerToCache (302) intercepted, method - ProcAddressHijack.GetProcAddress ->741354F8->752661F8
Function netapi32.dll:NlBindingRemoveServerFromCache (303) intercepted, method - ProcAddressHijack.GetProcAddress ->7413551B->75265D67
Function netapi32.dll:NlBindingSetAuthInfo (304) intercepted, method - ProcAddressHijack.GetProcAddress ->74135543->75266198
1.2 Searching for kernel-mode API hooks
 Driver loaded successfully
 SDT found (RVA=1689C0)
 Kernel ntkrnlpa.exe found in memory at address 82A00000
   SDT = 82B689C0
   KiST = 82A6F6F0 (401)
Functions checked: 401, intercepted: 0, restored: 0
1.3 Checking IDT and SYSENTER
 Analyzing CPU 1
 Analyzing CPU 2
CmpCallCallBacks = 00000000
 Checking IDT and SYSENTER - complete
1.4 Searching for masking processes and drivers
 Checking not performed: extended monitoring driver (AVZPM) is not installed
 Driver loaded successfully
1.5 Checking IRP handlers
\FileSystem\ntfs[IRP_MJ_CREATE] = 855811F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_CLOSE] = 855811F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_WRITE] = 855811F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_INFORMATION] = 855811F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_INFORMATION] = 855811F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_EA] = 855811F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_EA] = 855811F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_VOLUME_INFORMATION] = 855811F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_VOLUME_INFORMATION] = 855811F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_DIRECTORY_CONTROL] = 855811F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_FILE_SYSTEM_CONTROL] = 855811F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_DEVICE_CONTROL] = 855811F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_LOCK_CONTROL] = 855811F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_SECURITY] = 855811F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_SECURITY] = 855811F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_PNP] = 855811F8 -> hook not defined
 Checking - complete
2. Scanning RAM
 Number of processes found: 43
 Number of modules loaded: 537
Scanning RAM - complete
3. Scanning disks
Direct reading: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Documents and Settings\All Users\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Documents and Settings\All Users\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Documents and Settings\All Users\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Documents and Settings\All Users\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Documents and Settings\All Users\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Documents and Settings\All Users\Microsoft\RAC\Temp\sql362F.tmp
C:\Documents and Settings\???????\Desktop\Rapidshare Tools\CryptLoad_1.0.4-ELL\CryptLoad_1.0.4-ELL\CryptLoad_1.0.4\ocr\megaupload.com\FineReader\result.exe >>> suspicion for Trojan.Win32.VB.izh ( 00449025 001B74A5 000ECA48 00000000 16384)
C:\Documents and Settings\???????\Desktop\Rapidshare Tools\CryptLoad_1.0.4-ELL\CryptLoad_1.0.4-ELL\CryptLoad_1.0.4\ocr\netload.in\FineReader\result.exe >>> suspicion for Trojan.Win32.VB.izh ( 00449025 001B74A5 000ECA48 00000000 16384)
C:\Program Files\BRS\UserLayout.exe >>> suspicion for AdvWare.Win32.Zango.aj ( 00862849 08CD5FC5 0024484A 001F8DA6 1638400)
Direct reading: C:\ProgramData\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\ProgramData\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\ProgramData\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\ProgramData\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\ProgramData\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\ProgramData\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\ProgramData\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\ProgramData\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\ProgramData\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\ProgramData\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\ProgramData\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\ProgramData\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\ProgramData\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\ProgramData\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\ProgramData\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\ProgramData\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\ProgramData\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\ProgramData\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\ProgramData\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\ProgramData\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\ProgramData\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\ProgramData\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\ProgramData\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\ProgramData\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\ProgramData\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\ProgramData\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Users\All Users\Application Data\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Users\All Users\Application Data\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Users\All Users\Application Data\Microsoft\RAC\Temp\sql362F.tmp
Direct reading: C:\Users\All Users\Microsoft\RAC\Temp\sql3301.tmp
Direct reading: C:\Users\All Users\Microsoft\RAC\Temp\sql362F.tmp
C:\Users\???????\Desktop\Rapidshare Tools\CryptLoad_1.0.4-ELL\CryptLoad_1.0.4-ELL\CryptLoad_1.0.4\ocr\megaupload.com\FineReader\result.exe >>> suspicion for Trojan.Win32.VB.izh ( 00449025 001B74A5 000ECA48 00000000 16384)
File quarantined succesfully (C:\Users\???????\Desktop\Rapidshare Tools\CryptLoad_1.0.4-ELL\CryptLoad_1.0.4-ELL\CryptLoad_1.0.4\ocr\megaupload.com\FineReader\result.exe)
C:\Users\???????\Desktop\Rapidshare Tools\CryptLoad_1.0.4-ELL\CryptLoad_1.0.4-ELL\CryptLoad_1.0.4\ocr\netload.in\FineReader\result.exe >>> suspicion for Trojan.Win32.VB.izh ( 00449025 001B74A5 000ECA48 00000000 16384)
File quarantined succesfully (C:\Users\???????\Desktop\Rapidshare Tools\CryptLoad_1.0.4-ELL\CryptLoad_1.0.4-ELL\CryptLoad_1.0.4\ocr\netload.in\FineReader\result.exe)
Direct reading: C:\Users\???????\Local Settings\Application Data\Application Data\Application Data\Temp\fla341C.tmp
Direct reading: C:\Windows\System32\drivers\sptd.sys
Direct reading: C:\Windows\Temp\HTT5B9A.tmp
Direct reading: C:\Windows\Temp\HTTD542.tmp
E:\My programmes\Backcolors\Project1.exe >>> suspicion for IM-Worm.Win32.VB.ao ( 0045BA24 00131D11 000BB7EB 0011EF64 20480)
File quarantined succesfully (E:\My programmes\Backcolors\Project1.exe)
E:\My programmes\calculator\Calculator Version 1.1.exe >>> suspicion for Trojan.Win32.Agent.aouc ( 004876B2 0029FAE2 0016ACC0 000440E0 40960)
File quarantined succesfully (E:\My programmes\calculator\Calculator Version 1.1.exe)
E:\My programmes\calculator\Calculator Version 1.1.rar/{RAR}/Calculator Version 1.1.exe >>> suspicion for Trojan.Win32.Agent.aouc ( 004876B2 0029FAE2 0016ACC0 000440E0 40960)
File quarantined succesfully (E:\My programmes\calculator\Calculator Version 1.1.rar)
E:\My programmes\calculator\Claculator Version 1.00.exe >>> suspicion for Trojan.Win32.Agent.aouc ( 00479C8F 0029FAE2 0017DC66 000440E0 40960)
File quarantined succesfully (E:\My programmes\calculator\Claculator Version 1.00.exe)
E:\My programmes\My First Code\Project1.exe >>> suspicion for IM-Worm.Win32.VB.ao ( 00426395 00131D11 0011D6BB 00000000 20480)
File quarantined succesfully (E:\My programmes\My First Code\Project1.exe)
E:\My programmes\Text Programme\Project1.exe >>> suspicion for IM-Worm.Win32.VB.ao ( 0040D8C2 00131D11 000A0E9C 00000000 20480)
File quarantined succesfully (E:\My programmes\Text Programme\Project1.exe)
E:\Playstation Portable\psp downloads\Work\PSPMillionaire_1[1].10.rar/{RAR}/PSPMillionaire\Custom\PSP Millioniaire Question Adder.exe >>> suspicion for Trojan.Win32.Rebooter.b ( 004849A7 0057C422 00132372 00080885 40960)
File quarantined succesfully (E:\Playstation Portable\psp downloads\Work\PSPMillionaire_1[1].10.rar)
E:\Playstation Portable\psp-devhook 0.41d-backup\PSP\GAME\PSPMillionaire                  1\Custom\PSP Millioniaire Question Adder.exe >>> suspicion for Trojan.Win32.Rebooter.b ( 004849A7 0057C422 00132372 00080885 40960)
File quarantined succesfully (E:\Playstation Portable\psp-devhook 0.41d-backup\PSP\GAME\PSPMillionaire                  1\Custom\PSP Millioniaire Question Adder.exe)
Direct reading: E:\?? ??????? ???\I??????? ??????????\tanoulitsa1992@hotmail.com\?????????? 2009.html
E:\?? ??????? ???\?????????\san andreas\Downloads\Tools\carspawner.zip/{ZIP}/GTA-SA.CarSpawn-Trainer v1.1.exe >>> suspicion for Trojan-Downloader.Win32.VB.eu ( 0044CCC8 001B74A5 000AF5E6 0021CA6C 32768)
File quarantined succesfully (E:\?? ??????? ???\?????????\san andreas\Downloads\Tools\carspawner.zip)
E:\?? ??????? ???\?????????\san andreas\Downloads\Tools\GTA-SA.CarSpawn-Trainer v1.1.exe >>> suspicion for Trojan-Downloader.Win32.VB.eu ( 0044CCC8 001B74A5 000AF5E6 0021CA6C 32768)
File quarantined succesfully (E:\?? ??????? ???\?????????\san andreas\Downloads\Tools\GTA-SA.CarSpawn-Trainer v1.1.exe)
F:\Program Files\Game Trainer Studio\! Extra\Pacman\Trainer.exe >>> suspicion for Trojan-Downloader.Win32.Agent.aqs ( 09B1C8EC 062FE7FA 0001ACB4 00000000 6656)
File quarantined succesfully (F:\Program Files\Game Trainer Studio\! Extra\Pacman\Trainer.exe)
F:\Program Files\Game Trainer Studio\Output\Mafia.exe >>> suspicion for Trojan-Downloader.Win32.Agent.aqs ( 09B1C8EC 062FE7FA 0001ACB4 00000000 6656)
File quarantined succesfully (F:\Program Files\Game Trainer Studio\Output\Mafia.exe)
F:\PSP-20-3-09 Backup\PSP\GAME150\PSPMillionaire                  1\Custom\PSP Millioniaire Question Adder.exe >>> suspicion for Trojan.Win32.Rebooter.b ( 004849A7 0057C422 00132372 00080885 40960)
File quarantined succesfully (F:\PSP-20-3-09 Backup\PSP\GAME150\PSPMillionaire                  1\Custom\PSP Millioniaire Question Adder.exe)
Direct reading: G:\4c973afbcf8db016533f088cef\update\update.exe
4. Checking  Winsock Layered Service Provider (SPI/LSP)
 LSP settings checked. No errors detected
5. Searching for keyboard/mouse/windows events hooks (Keyloggers, Trojan DLLs)
 Checking - disabled by user
6. Searching for opened TCP/UDP ports used by malicious software
 Checking - disabled by user
7. Heuristic system check
Checking - complete
8. Searching for vulnerabilities
>> Services: potentially dangerous service allowed: TermService (@%SystemRoot%\System32\termsrv.dll,-268)
>> Services: potentially dangerous service allowed: SSDPSRV (@%systemroot%\system32\ssdpsrv.dll,-100)
>> Services: potentially dangerous service allowed: Schedule (@%SystemRoot%\system32\schedsvc.dll,-100)
> Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)!
>> Security: disk drives' autorun is enabled
>> Security: administrative shares (C$, D$ ...) are enabled
>> Security: anonymous user access is enabled
>> Security: sending Remote Assistant queries is enabled
Checking - complete
9. Troubleshooting wizard
 >>  Process termination timeout is out of admissible values
 >>  Service termination timeout is out of admissible values
 >>  Timeout of "Not Responding" verdict for processes is out of admissible values
 >>  HDD autorun is allowed
 >>  Network drives autorun is allowed
 >>  Removable media autorun is allowed
 >>  Start -> Run menu item is blocked
Checking - complete
Files scanned: 905483, extracted from archives: 214868, malicious software found 0, suspicions - 18
Scanning finished at 18/12/2009 10:33:05 ??
Time of scanning: 01:46:51
If you have a suspicion on presence of viruses or questions on the suspected objects,
you can address http://virusinfo.info conference
Creating archive of files from Quarantine
Creating archive of files from Quarantine - complete
System Analysis in progress

Script commands
Add commands to script:
Additional operations:
File list