Attention !!! Database was last updated 19.04.2011 it is necessary to update the database (via File - Database update) |
AVZ Antiviral Toolkit log; AVZ version is 4.35 |
Scanning started at 04.05.2011 16:23:54 |
Database loaded: signatures - 288679, NN profile(s) - 2, malware removal microprograms - 56, signature database released 19.04.2011 22:47 |
Heuristic microprograms loaded: 388 |
PVS microprograms loaded: 9 |
Digital signatures of system files loaded: 272495 |
Heuristic analyzer mode: Medium heuristics mode |
Malware removal mode: enabled |
Windows version is: 6.0.6002, Service Pack 2 ; AVZ is run with administrator rights |
System Restore: enabled |
1. Searching for Rootkits and other software intercepting API functions |
1.1 Searching for user-mode API hooks |
Analysis: kernel32.dll, export table found in section .text |
Analysis: ntdll.dll, export table found in section .text |
Analysis: user32.dll, export table found in section .text |
Analysis: advapi32.dll, export table found in section .text |
Analysis: ws2_32.dll, export table found in section .text |
Analysis: wininet.dll, export table found in section .text |
Analysis: rasapi32.dll, export table found in section .text |
Analysis: urlmon.dll, export table found in section .text |
Analysis: netapi32.dll, export table found in section .text |
1.2 Searching for kernel-mode API hooks |
Driver loaded successfully |
SDT found (RVA=137B00) |
Kernel ntkrnlpa.exe found in memory at address 82000000 |
SDT = 82137B00 |
KiST = 820AC86C (391) |
Functions checked: 391, intercepted: 0, restored: 0 |
1.3 Checking IDT and SYSENTER |
Analyzing CPU 1 |
Analyzing CPU 2 |
Checking IDT and SYSENTER - complete |
1.4 Searching for masking processes and drivers |
Masking process with PID=456, name = "" |
>> PID substitution detected (current PID is=0, real = 456) |
Masking process with PID=568, name = "" |
>> PID substitution detected (current PID is=0, real = 568) |
Masking process with PID=624, name = "" |
>> PID substitution detected (current PID is=0, real = 624) |
Masking process with PID=1232, name = "" |
>> PID substitution detected (current PID is=0, real = 1232) |
Masking process with PID=756, name = "" |
>> PID substitution detected (current PID is=0, real = 756) |
Masking process with PID=1204, name = "" |
>> PID substitution detected (current PID is=0, real = 1204) |
Masking process with PID=1676, name = "" |
>> PID substitution detected (current PID is=0, real = 1676) |
Masking process with PID=1844, name = "" |
>> PID substitution detected (current PID is=0, real = 1844) |
Masking process with PID=1716, name = "" |
>> PID substitution detected (current PID is=0, real = 1716) |
Masking process with PID=2072, name = "" |
>> PID substitution detected (current PID is=0, real = 2072) |
Masking process with PID=2096, name = "" |
>> PID substitution detected (current PID is=0, real = 2096) |
Masking process with PID=2204, name = "" |
>> PID substitution detected (current PID is=0, real = 2204) |
Masking process with PID=2320, name = "" |
>> PID substitution detected (current PID is=0, real = 2320) |
Masking process with PID=2344, name = "" |
>> PID substitution detected (current PID is=0, real = 2344) |
Masking process with PID=2440, name = "" |
>> PID substitution detected (current PID is=0, real = 2440) |
Masking process with PID=2620, name = "" |
>> PID substitution detected (current PID is=0, real = 2620) |
Masking process with PID=2872, name = "" |
>> PID substitution detected (current PID is=0, real = 2872) |
Masking process with PID=2932, name = "" |
>> PID substitution detected (current PID is=0, real = 2932) |
Masking process with PID=3012, name = "" |
>> PID substitution detected (current PID is=0, real = 3012) |
Masking process with PID=3020, name = "" |
>> PID substitution detected (current PID is=0, real = 3020) |
Masking process with PID=3060, name = "" |
>> PID substitution detected (current PID is=0, real = 3060) |
Masking process with PID=3244, name = "" |
>> PID substitution detected (current PID is=0, real = 3244) |
Masking process with PID=3300, name = "" |
>> PID substitution detected (current PID is=0, real = 3300) |
Masking process with PID=3720, name = "" |
>> PID substitution detected (current PID is=0, real = 3720) |
Masking process with PID=2460, name = "" |
>> PID substitution detected (current PID is=0, real = 2460) |
Masking process with PID=1376, name = "" |
>> PID substitution detected (current PID is=0, real = 1376) |
Masking process with PID=872, name = "" |
>> PID substitution detected (current PID is=0, real = 872) |
Masking process with PID=2872, name = "" |
>> PID substitution detected (current PID is=0, real = 2872) |
Masking process with PID=820, name = "" |
>> PID substitution detected (current PID is=0, real = 820) |
Masking process with PID=2864, name = "" |
>> PID substitution detected (current PID is=0, real = 2864) |
Masking process with PID=3708, name = "" |
>> PID substitution detected (current PID is=0, real = 3708) |
Masking process with PID=1840, name = "" |
>> PID substitution detected (current PID is=0, real = 1840) |
Masking process with PID=1856, name = "" |
>> PID substitution detected (current PID is=0, real = 1856) |
Masking process with PID=3532, name = "" |
>> PID substitution detected (current PID is=0, real = 3532) |
Searching for masking processes and drivers - complete |
1.5 Checking IRP handlers |
Driver loaded successfully |
Checking - complete |
2. Scanning RAM |
Number of processes found: 61 |
Number of modules loaded: 521 |
Scanning RAM - complete |
3. Scanning disks |
4. Checking Winsock Layered Service Provider (SPI/LSP) |
LSP settings checked. No errors detected |
5. Searching for keyboard/mouse/windows events hooks (Keyloggers, Trojan DLLs) |
6. Searching for opened TCP/UDP ports used by malicious software |
Checking - disabled by user |
7. Heuristic system check |
Latent DLL loading through AppInit_DLLs suspected: "C:\PROGRA~1\Google\GOOGLE~2\GOEC62~1.DLL" |
Checking - complete |
8. Searching for vulnerabilities |
>> Services: potentially dangerous service allowed: TermService (Terminaldienste) |
>> Services: potentially dangerous service allowed: SSDPSRV (SSDP-Suche) |
>> Services: potentially dangerous service allowed: Schedule (Aufgabenplanung) |
> Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)! |
>> Security: disk drives' autorun is enabled |
>> Security: administrative shares (C$, D$ ...) are enabled |
>> Security: anonymous user access is enabled |
>> Security: sending Remote Assistant queries is enabled |
Checking - complete |
9. Troubleshooting wizard |
>> HDD autorun is allowed |
>> Network drives autorun is allowed |
>> Removable media autorun is allowed |
Checking - complete |
Files scanned: 582, extracted from archives: 0, malicious software found 0, suspicions - 0 |
Scanning finished at 04.05.2011 16:24:32 |
Time of scanning: 00:00:40 |
If you have a suspicion on presence of viruses or questions on the suspected objects, |
you can address hxxp://project911.kaspersky-labs.com/ |