<AVZ_CollectSysInfo>
--------------------
Start time: 4/25/2009 6:44:46 PM
Duration: 00:03:33
Finish time: 4/25/2009 6:48:19 PM
<AVZ_CollectSysInfo>
--------------------
Time Event
---- -----
4/25/2009 6:44:48 PM Windows version: Microsoft Windows XP, Build=2600, SP="Service Pack 2"
4/25/2009 6:44:48 PM System Restore: Disabled
4/25/2009 6:44:51 PM 1.1 Searching for user-mode API hooks
4/25/2009 6:44:51 PM Analysis: kernel32.dll, export table found in section .text
4/25/2009 6:44:51 PM Function kernel32.dll:CreateProcessA (99) intercepted, method ProcAddressHijack.GetProcAddress ->7C802367->61F03F42
4/25/2009 6:44:51 PM Hook kernel32.dll:CreateProcessA (99) blocked
4/25/2009 6:44:51 PM Function kernel32.dll:CreateProcessW (103) intercepted, method ProcAddressHijack.GetProcAddress ->7C802332->61F04040
4/25/2009 6:44:51 PM Hook kernel32.dll:CreateProcessW (103) blocked
4/25/2009 6:44:51 PM Function kernel32.dll:FreeLibrary (241) intercepted, method ProcAddressHijack.GetProcAddress ->7C80ABDE->61F041FC
4/25/2009 6:44:51 PM Hook kernel32.dll:FreeLibrary (241) blocked
4/25/2009 6:44:51 PM Function kernel32.dll:GetModuleFileNameA (372) intercepted, method ProcAddressHijack.GetProcAddress ->7C80B4CF->61F040FB
4/25/2009 6:44:51 PM Hook kernel32.dll:GetModuleFileNameA (372) blocked
4/25/2009 6:44:51 PM Function kernel32.dll:GetModuleFileNameW (373) intercepted, method ProcAddressHijack.GetProcAddress ->7C80B3D5->61F041A0
4/25/2009 6:44:51 PM Hook kernel32.dll:GetModuleFileNameW (373) blocked
4/25/2009 6:44:51 PM Function kernel32.dll:GetProcAddress (408) intercepted, method ProcAddressHijack.GetProcAddress ->7C80ADA0->61F04648
4/25/2009 6:44:51 PM Hook kernel32.dll:GetProcAddress (408) blocked
4/25/2009 6:44:51 PM Function kernel32.dll:LoadLibraryA (578) intercepted, method ProcAddressHijack.GetProcAddress ->7C801D77->61F03C6F
4/25/2009 6:44:51 PM Hook kernel32.dll:LoadLibraryA (578) blocked
4/25/2009 6:44:51 PM >>> Functions LoadLibraryA - preventing AVZ process from being intercepted by address replacement !!)
4/25/2009 6:44:51 PM Function kernel32.dll:LoadLibraryExA (579) intercepted, method ProcAddressHijack.GetProcAddress ->7C801D4F->61F03DAF
4/25/2009 6:44:51 PM Hook kernel32.dll:LoadLibraryExA (579) blocked
4/25/2009 6:44:51 PM >>> Functions LoadLibraryExA - preventing AVZ process from being intercepted by address replacement !!)
4/25/2009 6:44:51 PM Function kernel32.dll:LoadLibraryExW (580) intercepted, method ProcAddressHijack.GetProcAddress ->7C801AF1->61F03E5A
4/25/2009 6:44:51 PM Hook kernel32.dll:LoadLibraryExW (580) blocked
4/25/2009 6:44:51 PM Function kernel32.dll:LoadLibraryW (581) intercepted, method ProcAddressHijack.GetProcAddress ->7C80AE4B->61F03D0C
4/25/2009 6:44:51 PM Hook kernel32.dll:LoadLibraryW (581) blocked
4/25/2009 6:44:51 PM IAT modification detected: GetModuleFileNameW - 00D30010<>7C80B3D5
4/25/2009 6:44:51 PM Analysis: ntdll.dll, export table found in section .text
4/25/2009 6:44:52 PM Analysis: user32.dll, export table found in section .text
4/25/2009 6:44:52 PM Analysis: advapi32.dll, export table found in section .text
4/25/2009 6:44:52 PM Analysis: ws2_32.dll, export table found in section .text
4/25/2009 6:44:52 PM Analysis: wininet.dll, export table found in section .text
4/25/2009 6:44:52 PM Analysis: rasapi32.dll, export table found in section .text
4/25/2009 6:44:52 PM Analysis: urlmon.dll, export table found in section .text
4/25/2009 6:44:52 PM Analysis: netapi32.dll, export table found in section .text
4/25/2009 6:44:55 PM 1.2 Searching for kernel-mode API hooks
4/25/2009 6:44:55 PM Driver loaded successfully
4/25/2009 6:44:55 PM SDT found (RVA=082800)
4/25/2009 6:44:55 PM Kernel ntoskrnl.exe found in memory at address 804D7000
4/25/2009 6:44:55 PM SDT = 80559800
4/25/2009 6:44:55 PM KiST = 804E26A8 (284)
4/25/2009 6:44:56 PM Function NtOpenFile (74) intercepted (8056FD13->F819E080), hook C:\WINDOWS\system32\Drivers\kl1.sys
4/25/2009 6:44:56 PM >>> Function restored successfully !
4/25/2009 6:44:56 PM >>> Hook code blocked
4/25/2009 6:45:05 PM Functions checked: 284, intercepted: 1, restored: 1
4/25/2009 6:45:05 PM 1.3 Checking IDT and SYSENTER
4/25/2009 6:45:05 PM Analysis for CPU 1
4/25/2009 6:45:05 PM Checking IDT and SYSENTER - complete
4/25/2009 6:45:09 PM 1.4 Searching for masking processes and drivers
4/25/2009 6:45:09 PM Checking not performed: extended monitoring driver (AVZPM) is not installed
4/25/2009 6:45:09 PM Driver loaded successfully
4/25/2009 6:45:09 PM 1.5 Checking of IRP handlers
4/25/2009 6:45:09 PM Checking - complete
4/25/2009 6:45:54 PM >>> Attention - Task Manager is blocked
4/25/2009 6:45:57 PM >>> Attention: Registry Editor is blocked
4/25/2009 6:45:58 PM >> Services: potentially dangerous service allowed: RemoteRegistry (Remote Registry)
4/25/2009 6:45:58 PM >> Services: potentially dangerous service allowed: TermService (Terminal Services)
4/25/2009 6:45:58 PM >> Services: potentially dangerous service allowed: SSDPSRV (SSDP Discovery Service)
4/25/2009 6:45:58 PM >> Services: potentially dangerous service allowed: Schedule (Task Scheduler)
4/25/2009 6:45:58 PM >> Services: potentially dangerous service allowed: mnmsrvc (NetMeeting Remote Desktop Sharing)
4/25/2009 6:45:58 PM >> Services: potentially dangerous service allowed: RDSessMgr (Remote Desktop Help Session Manager)
4/25/2009 6:45:58 PM > Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)!
4/25/2009 6:45:58 PM >> Security: disk drives' autorun is enabled
4/25/2009 6:45:58 PM >> Security: administrative shares (C$, D$ ...) are enabled
4/25/2009 6:45:59 PM >> Security: anonymous user access is enabled
4/25/2009 6:46:00 PM >> Security: sending Remote Assistant queries is enabled
4/25/2009 6:46:03 PM >> Block: Registry Editor
4/25/2009 6:46:03 PM >> Block: Task Manager
4/25/2009 6:46:15 PM >> Service termination timeout is out of admissible values
4/25/2009 6:46:17 PM >> Disable HDD autorun
4/25/2009 6:46:17 PM >> Disable autorun from network drives
4/25/2009 6:46:17 PM >> Disable CD/DVD autorun
4/25/2009 6:46:17 PM >> Disable removable media autorun
4/25/2009 6:46:18 PM >> Windows Update is disabled
4/25/2009 6:46:18 PM System Analysis in progress
4/25/2009 6:48:18 PM System Analysis - complete
4/25/2009 6:48:18 PM Delete file:C:\Documents and Settings\salmaa\Desktop\Kaspersky Lab Tool\is-SC1GR\LOG\avptool_syscheck.htm
4/25/2009 6:48:18 PM Delete file:C:\Documents and Settings\salmaa\Desktop\Kaspersky Lab Tool\is-SC1GR\LOG\avptool_syscheck.xml
4/25/2009 6:48:18 PM Deleting service/driver: ute4njq4
4/25/2009 6:48:18 PM Delete file:C:\WINDOWS\system32\Drivers\ute4njq4.sys
4/25/2009 6:48:19 PM Deleting service/driver: uje4njq4
4/25/2009 6:48:19 PM Script executed without errors