Trojaner-Board

Trojaner-Board (https://www.trojaner-board.de/)
-   Log-Analyse und Auswertung (https://www.trojaner-board.de/log-analyse-auswertung/)
-   -   GVU Trojaner - Admin Benutzerkonto, Win XP (https://www.trojaner-board.de/115943-gvu-trojaner-admin-benutzerkonto-win-xp.html)

schwonz 29.05.2012 14:29

GVU Trojaner - Admin Benutzerkonto, Win XP
 
Hallo allerseits,

ich brauche eure Hilfe:
Seit letzter Woche habe ich auf meinem Rechner (Win XP, SP3) auf meinem einzigen Account (Admin) einen GVU Trojaner, der sich sofort beim Start von Windows bemerkmar macht. Der Desktop wird gar nicht erst geladen, vorher erscheint schon, dass eine Verbindung hergestellt wird, dann kommt nach einer Weile das Bild mit der GVU, dass ich Geld überweisen soll etc.

Was kann ich machen? Logs kann ich leider nicht erstellen, da ich nicht ins System komme. Im abgesicherten Modus komme ich leider auch nicht auf die Windows Oberfläche.
Der Taskmanager ist vom Trojaner offensichtlich gesperrt.

Habe auf chip.de gelesen, dass man mit Kaspersky Rescue Disk helfen kann. Wenn ich dies aber von CD starte, bleibt das Programm zu einem späteren Zeitpunkt bei mir hängen, klappt also nicht.

Hat jemand eine Idee, wie mir noch zu helfen ist? Ist diese Vorgehensweise hier die richtige: http://www.trojaner-board.de/114737-gvu-trojaner.html ?


Vielen Dank euch schonmal im Voraus!

Ich nochmal.

Die Anleitung auf der folgenden Seite vom Benutzer "cosinus" scheint ja funktioniert zu haben:
http://www.trojaner-board.de/111969-...aner-echt.html

Ich habe da mal den ersten Schritt ausgeführt und poste im Folgenden meine OTL.txt und Extras.txt.

Kann mir jemand damit dann weiterhelfen?


Vielen Dank!!!!

Hallo, kann mir denn niemand helfen?
In diesem Thread http://www.trojaner-board.de/111969-...aner-echt.html hat ja auch jemand (Benutzer "Cosinus") dann einen Code vorgegeben, den ich dann in OTL einspeisen muss...


Danke danke für jede Hilfe!

cosinus 31.05.2012 11:17

Zitat:

Hallo, kann mir denn niemand helfen?
Schonmal mitbekommen, was für ein Ansturm hier gerade los ist? Du bist nun wirklich nicht der einzige der Hilfe haben will!

cosinus 31.05.2012 11:20

Mach einen OTL-Fix über OTLPE, starte OTL und kopiere folgenden Text in die "Custom Scan/Fixes" Box (unten in OTL): (das ":OTL" muss mitkopiert werden!!!)

Code:

:OTL
O4 - HKLM..\Run: [B64Fu7wxCKTba7x] C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe ()
O4 - HKU\Administrator_ON_C..\Run: [B64Fu7wxCKTba7x] C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe ()
O4 - HKU\systemprofile_ON_C..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe (Gerhard Schlager)
O4 - Startup: C:\Dokumente und Einstellungen\All Users\Startmenü\Programme\Autostart\Adobe Reader - Schnellstart.lnk = C:\Programme\Adobe\Acrobat 7.0\Reader\reader_sl.exe (Adobe Systems Incorporated)
O7 - HKU\.DEFAULT\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O7 - HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\Administrator_ON_C\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O7 - HKU\Administrator_ON_C\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\Administrator_ON_C\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDesktop = 1
O7 - HKU\Administrator_ON_C\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: DisableTaskMgr = 1
O7 - HKU\Administrator_ON_C\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: DisableRegistryTools = 1
O7 - HKU\LocalService_ON_C\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O7 - HKU\LocalService_ON_C\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\NetworkService_ON_C\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O7 - HKU\NetworkService_ON_C\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\systemprofile_ON_C\Software\Policies\Microsoft\Internet Explorer\Restrictions present
O7 - HKU\systemprofile_ON_C\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O10 - NameSpace_Catalog5\Catalog_Entries\000000000004 [] - C:\Programme\Bonjour\mdnsNSP.dll (Apple Computer, Inc.)
O10 - Protocol_Catalog9\Catalog_Entries\000000000001 -  File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000002 -  File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000003 -  File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000004 -  File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000005 -  File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000006 -  File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000007 -  File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000008 -  File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000009 -  File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000010 -  File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000011 -  File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000012 -  File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000013 -  File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000014 -  File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000015 -  File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000016 -  File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000017 -  File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000018 -  File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000019 -  File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000020 -  File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000021 -  File not found
O20 - HKLM Winlogon: Shell - (C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe) - C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe ()
O20 - HKLM Winlogon: UserInit - (C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe) - C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe ()
O20 - HKU\Administrator_ON_C Winlogon: Shell - (C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe) - C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe ()
O20 - HKU\Administrator_ON_C Winlogon: UserInit - (C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe) - C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe ()
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2005/09/15 08:34:55 | 000,000,000 | ---- | M] () - C:\AUTOEXEC.BAT -- [ NTFS ]
@Alternate Data Stream - 117 bytes -> C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\TEMP:D031D15E
@Alternate Data Stream - 115 bytes -> C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\TEMP:BE76DBCF
@Alternate Data Stream - 113 bytes -> C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\TEMP:76650B61
:Files
C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe
C:\WINDOWS\System32\dds_log_ad13.cmd
C:\WINDOWS\System32\blckdom.res
C:\WINDOWS\System32\UAs
C:\WINDOWS\System32\08039
C:\WINDOWS\System32\xmldm
C:\WINDOWS\System32\kock
:Commands
[purity]
[resethosts]

Klick dann oben links auf den Button Fix!
Das Logfile müsste geöffnet werden, wenn Du nach dem Fixen auf ok klickst, poste das bitte. Evtl. wird der Rechner neu gestartet.

Die mit diesem Script gefixten Einträge, Dateien und Ordner werden zur Sicherheit nicht vollständig gelöscht, es wird eine Sicherheitskopie auf der Systempartition im Ordner "_OTL" erstellt.

Hinweis: Das obige Script ist nur für diesen einen User in dieser Situtation erstellt worden. Es ist auf keinen anderen Rechner portierbar und darf nicht anderweitig verwandt werden, da es das System nachhaltig schädigen kann!

Danach sollte Windows wieder normal starten - stell uns bitte den Quarantäneordner von OTL zur Verfügung. Dabei bitte so vorgehen:

1.) GANZ WICHTIG!! Virenscanner deaktivieren, der darf das Packen nicht beeinträchtigen!
2.) Ordner movedfiles in C:\_OTL in eine Datei zippen
3.) Die erstellte ZIP-Datei hier hochladen => http://www.trojaner-board.de/54791-a...ner-board.html
4.) Wenns erfolgreich war Bescheid sagen
5.) Erst dann wieder den Virenscanner einschalten

schwonz 31.05.2012 18:43

Tut mir echt Leid, dass ich gequängelt hab! Sorry.

Vielen Dank für die Hilfe. Habe die ersten Schritte wie befohlen ausgeführt. Hier nun der Log nach dem Fix in OTL:

Code:

========== OTL ==========
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\B64Fu7wxCKTba7x deleted successfully.
C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe moved successfully.
Registry value HKEY_USERS\Administrator_ON_C\Software\Microsoft\Windows\CurrentVersion\Run\\B64Fu7wxCKTba7x deleted successfully.
File C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe not found.
Registry value HKEY_USERS\systemprofile_ON_C\Software\Microsoft\Windows\CurrentVersion\Run\\CTFMON.EXE deleted successfully.
C:\WINDOWS\system32\ctfmon.exe moved successfully.
C:\Dokumente und Einstellungen\All Users\Startmenü\Programme\Autostart\Adobe Reader - Schnellstart.lnk moved successfully.
C:\Programme\Adobe\Acrobat 7.0\Reader\reader_sl.exe moved successfully.
Registry key HKEY_USERS\.DEFAULT\Software\Policies\Microsoft\Internet Explorer\Restrictions\ not found.
Registry value HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\NoDriveTypeAutoRun deleted successfully.
Registry key HKEY_USERS\Administrator_ON_C\Software\Policies\Microsoft\Internet Explorer\Restrictions\ deleted successfully.
Registry value HKEY_USERS\Administrator_ON_C\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\NoDriveTypeAutoRun deleted successfully.
Registry value HKEY_USERS\Administrator_ON_C\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\NoDesktop deleted successfully.
Registry value HKEY_USERS\Administrator_ON_C\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\\DisableTaskMgr deleted successfully.
Registry value HKEY_USERS\Administrator_ON_C\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\\DisableRegistryTools deleted successfully.
Registry key HKEY_USERS\LocalService_ON_C\Software\Policies\Microsoft\Internet Explorer\Restrictions\ not found.
Registry value HKEY_USERS\LocalService_ON_C\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\NoDriveTypeAutoRun deleted successfully.
Registry key HKEY_USERS\NetworkService_ON_C\Software\Policies\Microsoft\Internet Explorer\Restrictions\ not found.
Registry value HKEY_USERS\NetworkService_ON_C\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\NoDriveTypeAutoRun deleted successfully.
Registry key HKEY_USERS\systemprofile_ON_C\Software\Policies\Microsoft\Internet Explorer\Restrictions\ not found.
Registry value HKEY_USERS\systemprofile_ON_C\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\NoDriveTypeAutoRun deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries\000000000004\ deleted successfully.
C:\Programme\Bonjour\mdnsNSP.dll moved successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000001\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000002\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000003\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000004\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000005\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000006\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000007\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000008\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000009\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000010\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000011\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000012\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000013\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000014\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000015\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000016\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000017\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000018\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000019\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000020\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000021\ deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell:C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe deleted successfully.
File C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe not found.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\\UserInit:C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe deleted successfully.
File C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe not found.
Registry value HKEY_USERS\Administrator_ON_C\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell:C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe deleted successfully.
File C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe not found.
Registry value HKEY_USERS\Administrator_ON_C\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\\UserInit:C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe deleted successfully.
File C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe not found.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Cdrom\\AutoRun|DWORD:1 /E : value set successfully!
C:\AUTOEXEC.BAT moved successfully.
ADS C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\TEMP:D031D15E deleted successfully.
ADS C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\TEMP:BE76DBCF deleted successfully.
ADS C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\TEMP:76650B61 deleted successfully.
========== FILES ==========
File\Folder C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\ArchiverforWin.exe not found.
C:\WINDOWS\System32\dds_log_ad13.cmd moved successfully.
C:\WINDOWS\System32\blckdom.res moved successfully.
C:\WINDOWS\System32\UAs folder moved successfully.
C:\WINDOWS\System32\08039\components folder moved successfully.
C:\WINDOWS\System32\08039 folder moved successfully.
C:\WINDOWS\System32\xmldm folder moved successfully.
C:\WINDOWS\System32\kock folder moved successfully.
========== COMMANDS ==========
C:\WINDOWS\System32\drivers\etc\Hosts moved successfully.
HOSTS file reset successfully
 
OTLPE by OldTimer - Version 3.1.48.0 log created on 05312012_213537


Nach ca. 5min startet Windows dann doch, nachdem am Anfang nur der Desktophintergrund zu sehen war. Es werden keine Desktopsymbole angezeigt, aber ich kann den Explorer öffnen.

Wie in der anderen Anleitung (siehe Link in meinem ersten Beitrag) angegeben, habe ich auch schon mal TDSS-Killer von Kaspersky gestartet. Hier der Log von dem TDSS-Scan:

Code:

22:24:44.0437 3708        TDSS rootkit removing tool 2.7.36.0 May 21 2012 16:40:16
22:24:44.0453 3708        ============================================================
22:24:44.0453 3708        Current date / time: 2012/05/31 22:24:44.0453
22:24:44.0453 3708        SystemInfo:
22:24:44.0453 3708       
22:24:44.0453 3708        OS Version: 5.1.2600 ServicePack: 3.0
22:24:44.0453 3708        Product type: Workstation
22:24:44.0453 3708        ComputerName: PC
22:24:44.0453 3708        UserName: Administrator
22:24:44.0453 3708        Windows directory: C:\WINDOWS
22:24:44.0453 3708        System windows directory: C:\WINDOWS
22:24:44.0453 3708        Processor architecture: Intel x86
22:24:44.0453 3708        Number of processors: 1
22:24:44.0453 3708        Page size: 0x1000
22:24:44.0453 3708        Boot type: Normal boot
22:24:44.0453 3708        ============================================================
22:24:45.0593 3708        Drive \Device\Harddisk0\DR0 - Size: 0x25433D6000 (149.05 Gb), SectorSize: 0x200, Cylinders: 0x4C01, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000054
22:24:45.0593 3708        Drive \Device\Harddisk1\DR4 - Size: 0x1F400000 (0.49 Gb), SectorSize: 0x200, Cylinders: 0x3F, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'W'
22:24:45.0593 3708        ============================================================
22:24:45.0593 3708        \Device\Harddisk0\DR0:
22:24:45.0593 3708        MBR partitions:
22:24:45.0593 3708        \Device\Harddisk0\DR0\Partition0: MBR, Type 0x7, StartLBA 0x3F, BlocksNum 0x1D4B139
22:24:45.0593 3708        \Device\Harddisk0\DR0\Partition1: MBR, Type 0x7, StartLBA 0x1D4B178, BlocksNum 0x62408CD
22:24:45.0593 3708        \Device\Harddisk0\DR0\Partition2: MBR, Type 0x7, StartLBA 0x7F8BA45, BlocksNum 0xAA8D07C
22:24:45.0593 3708        \Device\Harddisk1\DR4:
22:24:45.0593 3708        MBR partitions:
22:24:45.0593 3708        \Device\Harddisk1\DR4\Partition0: MBR, Type 0x6, StartLBA 0x20, BlocksNum 0xF9FDF
22:24:45.0593 3708        ============================================================
22:24:45.0593 3708        C: <-> \Device\Harddisk0\DR0\Partition0
22:24:45.0656 3708        F: <-> \Device\Harddisk0\DR0\Partition2
22:24:45.0687 3708        D: <-> \Device\Harddisk0\DR0\Partition1
22:24:45.0687 3708        ============================================================
22:24:45.0687 3708        Initialize success
22:24:45.0687 3708        ============================================================
22:26:16.0468 2232        ============================================================
22:26:16.0468 2232        Scan started
22:26:16.0468 2232        Mode: Manual; SigCheck; TDLFS;
22:26:16.0468 2232        ============================================================
22:26:16.0781 2232        3xHybrid        (1ea2cd0426ab053df019cdcff97a5cd8) C:\WINDOWS\system32\DRIVERS\3xHybrid.sys
22:26:17.0109 2232        3xHybrid - ok
22:26:17.0125 2232        a016mdm        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\wlsetupsvc.dll
22:26:17.0187 2232        a016mdm ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:17.0187 2232        a016mdm - detected Backdoor.Multi.ZAccess.gen (0)
22:26:17.0203 2232        Abiosdsk - ok
22:26:17.0218 2232        abp480n5 - ok
22:26:17.0234 2232        acdservice      (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\wcontrol.dll
22:26:17.0234 2232        acdservice ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:17.0234 2232        acdservice - detected Backdoor.Multi.ZAccess.gen (0)
22:26:17.0281 2232        ACPI            (ac407f1a62c3a300b4f2b5a9f1d55b2c) C:\WINDOWS\system32\DRIVERS\ACPI.sys
22:26:17.0812 2232        ACPI - ok
22:26:17.0843 2232        ACPIEC          (9e1ca3160dafb159ca14f83b1e317f75) C:\WINDOWS\system32\drivers\ACPIEC.sys
22:26:18.0000 2232        ACPIEC - ok
22:26:18.0031 2232        AdfuUd          (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\se2End5.dll
22:26:18.0031 2232        AdfuUd ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:18.0031 2232        AdfuUd - detected Backdoor.Multi.ZAccess.gen (0)
22:26:18.0046 2232        adpu160m - ok
22:26:18.0062 2232        aec            (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys
22:26:18.0156 2232        aec - ok
22:26:18.0187 2232        AFD            (925051fe24b4af88dfa97493be10e107) C:\WINDOWS\System32\drivers\afd.sys
22:26:18.0187 2232        Suspicious file (Forged): C:\WINDOWS\System32\drivers\afd.sys. Real md5: 925051fe24b4af88dfa97493be10e107, Fake md5: 322d0e36693d6e24a2398bee62a268cd
22:26:18.0187 2232        AFD ( Virus.Win32.ZAccess.g ) - infected
22:26:18.0187 2232        AFD - detected Virus.Win32.ZAccess.g (0)
22:26:18.0218 2232        agentsrv        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\elotouchscreen.dll
22:26:18.0218 2232        agentsrv ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:18.0218 2232        agentsrv - detected Backdoor.Multi.ZAccess.gen (0)
22:26:18.0234 2232        Aha154x - ok
22:26:18.0234 2232        aic78u2 - ok
22:26:18.0250 2232        aic78xx - ok
22:26:18.0296 2232        ALCXSENS        (ba88534a3ceb6161e7432438b9ea4f54) C:\WINDOWS\system32\drivers\ALCXSENS.SYS
22:26:18.0375 2232        ALCXSENS - ok
22:26:18.0406 2232        ALCXWDM        (9a6a99f0d75b457e3a2267776ebe9f47) C:\WINDOWS\system32\drivers\ALCXWDM.SYS
22:26:18.0468 2232        ALCXWDM - ok
22:26:18.0500 2232        Alerter        (738d80cc01d7bc7584be917b7f544394) C:\WINDOWS\system32\alrsvc.dll
22:26:18.0593 2232        Alerter - ok
22:26:18.0609 2232        ALG            (190cd73d4984f94d823f9444980513e5) C:\WINDOWS\System32\alg.exe
22:26:18.0718 2232        ALG - ok
22:26:18.0734 2232        AliIde - ok
22:26:18.0750 2232        AmdK8          (23622661f5a52f34c4129611ca68b398) C:\WINDOWS\system32\DRIVERS\AmdK8.sys
22:26:18.0781 2232        AmdK8 - ok
22:26:18.0796 2232        amsint - ok
22:26:18.0796 2232        androidusb      (dd8d9c597af7cd2f6b70a3d6a4a1acea) C:\WINDOWS\system32\Drivers\ssadadb.sys
22:26:19.0000 2232        androidusb - ok
22:26:19.0078 2232        AntiVirSchedulerService (b4837fe56d76b2e9ea90e5365cf6a2be) D:\Programme\Avira\AntiVir Desktop\sched.exe
22:26:19.0093 2232        AntiVirSchedulerService - ok
22:26:19.0125 2232        AntiVirService  (df5a3016052755c910a206058b4a1729) D:\Programme\Avira\AntiVir Desktop\avguard.exe
22:26:19.0140 2232        AntiVirService - ok
22:26:19.0171 2232        AppMgmt        (d45960be52c3c610d361977057f98c54) C:\WINDOWS\System32\appmgmts.dll
22:26:19.0281 2232        AppMgmt - ok
22:26:19.0312 2232        Arp1394        (b5b8a80875c1dededa8b02765642c32f) C:\WINDOWS\system32\DRIVERS\arp1394.sys
22:26:19.0406 2232        Arp1394 - ok
22:26:19.0421 2232        asc - ok
22:26:19.0421 2232        asc3350p - ok
22:26:19.0437 2232        asc3550 - ok
22:26:19.0468 2232        AsIO            (2b4e66fac6503494a2c6f32bb6ab3826) C:\WINDOWS\system32\drivers\AsIO.sys
22:26:19.0484 2232        AsIO - ok
22:26:19.0500 2232        aslm75          (71356a1370739e25375a1d17b6ae318f) C:\WINDOWS\system32\drivers\aslm75.sys
22:26:19.0500 2232        aslm75 ( UnsignedFile.Multi.Generic ) - warning
22:26:19.0500 2232        aslm75 - detected UnsignedFile.Multi.Generic (1)
22:26:19.0578 2232        aspnet_state    (0e5e4957549056e2bf2c49f4f6b601ad) C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\aspnet_state.exe
22:26:19.0609 2232        aspnet_state - ok
22:26:19.0625 2232        astcc          (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\rupsmon.dll
22:26:19.0625 2232        astcc ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:19.0625 2232        astcc - detected Backdoor.Multi.ZAccess.gen (0)
22:26:19.0656 2232        AsyncMac        (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys
22:26:19.0750 2232        AsyncMac - ok
22:26:19.0765 2232        atapi          (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys
22:26:19.0859 2232        atapi - ok
22:26:19.0875 2232        Atdisk - ok
22:26:19.0937 2232        Ati HotKey Poller (28c15e1d8f39f40e69d8b1feedb9161d) C:\WINDOWS\system32\Ati2evxx.exe
22:26:19.0984 2232        Ati HotKey Poller ( UnsignedFile.Multi.Generic ) - warning
22:26:19.0984 2232        Ati HotKey Poller - detected UnsignedFile.Multi.Generic (1)
22:26:20.0031 2232        ATI Smart      (960f36a5382db8b7a95f9ccfeebff761) C:\WINDOWS\system32\ati2sgag.exe
22:26:20.0062 2232        ATI Smart ( UnsignedFile.Multi.Generic ) - warning
22:26:20.0062 2232        ATI Smart - detected UnsignedFile.Multi.Generic (1)
22:26:20.0531 2232        ati2mtag        (756a1320c96d2b4e74d22423959af431) C:\WINDOWS\system32\DRIVERS\ati2mtag.sys
22:26:20.0781 2232        ati2mtag ( UnsignedFile.Multi.Generic ) - warning
22:26:20.0781 2232        ati2mtag - detected UnsignedFile.Multi.Generic (1)
22:26:20.0921 2232        Atmarpc        (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys
22:26:21.0031 2232        Atmarpc - ok
22:26:21.0062 2232        AudioSrv        (58ed0d5452df7be732193e7999c6b9a4) C:\WINDOWS\System32\audiosrv.dll
22:26:21.0156 2232        AudioSrv - ok
22:26:21.0171 2232        audstub        (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys
22:26:21.0281 2232        audstub - ok
22:26:21.0296 2232        avgio          (0b497c79824f8e1bf22fa6aacd3de3a0) D:\Programme\Avira\AntiVir Desktop\avgio.sys
22:26:21.0312 2232        avgio - ok
22:26:21.0328 2232        avgntflt        (1e4114685de1ffa9675e09c6a1fb3f4b) C:\WINDOWS\system32\DRIVERS\avgntflt.sys
22:26:21.0343 2232        avgntflt - ok
22:26:21.0375 2232        avipbb          (0f78d3dae6dedd99ae54c9491c62adf2) C:\WINDOWS\system32\DRIVERS\avipbb.sys
22:26:21.0375 2232        avipbb - ok
22:26:21.0406 2232        bdfsfltr        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\remoteaccess.dll
22:26:21.0406 2232        bdfsfltr ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:21.0406 2232        bdfsfltr - detected Backdoor.Multi.ZAccess.gen (0)
22:26:21.0437 2232        Beep            (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys
22:26:21.0562 2232        Beep - ok
22:26:21.0578 2232        besclient      (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\messenger.dll
22:26:21.0578 2232        besclient ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:21.0578 2232        besclient - detected Backdoor.Multi.ZAccess.gen (0)
22:26:21.0625 2232        bh611          (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\iwebmsg.dll
22:26:21.0625 2232        bh611 ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:21.0625 2232        bh611 - detected Backdoor.Multi.ZAccess.gen (0)
22:26:21.0671 2232        BITS            (d6f603772a789bb3228f310d650b8bd1) C:\WINDOWS\system32\qmgr.dll
22:26:21.0781 2232        BITS - ok
22:26:21.0796 2232        Bridge          (f934d1b230f84e1d19dd00ac5a7a83ed) C:\WINDOWS\system32\DRIVERS\bridge.sys
22:26:21.0906 2232        Bridge - ok
22:26:21.0906 2232        BridgeMP        (f934d1b230f84e1d19dd00ac5a7a83ed) C:\WINDOWS\system32\DRIVERS\bridge.sys
22:26:22.0000 2232        BridgeMP - ok
22:26:22.0031 2232        Browser        (b42057f06bbb98b31876c0b3f2b54e33) C:\WINDOWS\System32\browser.dll
22:26:22.0125 2232        Browser - ok
22:26:22.0156 2232        bthusb          (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\pclepci.dll
22:26:22.0156 2232        bthusb ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:22.0156 2232        bthusb - detected Backdoor.Multi.ZAccess.gen (0)
22:26:22.0187 2232        BVRPMPR5        (248dfa5762dde38dfddbbd44149e9d7a) C:\WINDOWS\system32\drivers\BVRPMPR5.SYS
22:26:22.0187 2232        BVRPMPR5 ( UnsignedFile.Multi.Generic ) - warning
22:26:22.0187 2232        BVRPMPR5 - detected UnsignedFile.Multi.Generic (1)
22:26:22.0218 2232        c-dillasrv      (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\SaiNtBus.dll
22:26:22.0218 2232        c-dillasrv ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:22.0218 2232        c-dillasrv - detected Backdoor.Multi.ZAccess.gen (0)
22:26:22.0234 2232        CamAv          (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\nbservice.dll
22:26:22.0234 2232        CamAv ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:22.0234 2232        CamAv - detected Backdoor.Multi.ZAccess.gen (0)
22:26:22.0250 2232        cbidf2k        (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys
22:26:22.0390 2232        cbidf2k - ok
22:26:22.0406 2232        CCDECODE        (0be5aef125be881c4f854c554f2b025c) C:\WINDOWS\system32\DRIVERS\CCDECODE.sys
22:26:22.0484 2232        CCDECODE - ok
22:26:22.0500 2232        cd20xrnt - ok
22:26:22.0531 2232        Cdaudio        (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys
22:26:22.0656 2232        Cdaudio - ok
22:26:22.0671 2232        Cdfs            (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys
22:26:22.0765 2232        Cdfs - ok
22:26:22.0781 2232        Cdrom          (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys
22:26:22.0875 2232        Cdrom - ok
22:26:22.0890 2232        Changer - ok
22:26:22.0906 2232        cisvc          (28e3040d1f1ca2008cd6b29dfebc9a5e) C:\WINDOWS\System32\cisvc.exe
22:26:23.0000 2232        cisvc - ok
22:26:23.0015 2232        ClipSrv        (778a30ed3c134eb7e406afc407e9997d) C:\WINDOWS\system32\clipsrv.exe
22:26:23.0109 2232        ClipSrv - ok
22:26:23.0187 2232        clr_optimization_v2.0.50727_32 (d87acaed61e417bba546ced5e7e36d9c) C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
22:26:23.0265 2232        clr_optimization_v2.0.50727_32 - ok
22:26:23.0281 2232        CmdIde - ok
22:26:23.0281 2232        COMSysApp - ok
22:26:23.0296 2232        Cpqarray - ok
22:26:23.0359 2232        cpuz - ok
22:26:23.0375 2232        CryptSvc        (611f824e5c703a5a899f84c5f1699e4d) C:\WINDOWS\System32\cryptsvc.dll
22:26:23.0468 2232        CryptSvc - ok
22:26:23.0484 2232        ctusfsyn        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\BcmSqlStartupSvc.dll
22:26:23.0484 2232        ctusfsyn ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:23.0484 2232        ctusfsyn - detected Backdoor.Multi.ZAccess.gen (0)
22:26:23.0515 2232        CVirtA          (b5ecadf7708960f1818c7fa015f4c239) C:\WINDOWS\system32\DRIVERS\CVirtA.sys
22:26:23.0546 2232        CVirtA - ok
22:26:23.0640 2232        CVPND          (66257cb4e4fb69887cddc71663741435) D:\Programme\VPN Client\cvpnd.exe
22:26:23.0718 2232        CVPND - ok
22:26:23.0750 2232        CVPNDRVA        (18994842386fd3039279d7865740abbd) C:\WINDOWS\system32\Drivers\CVPNDRVA.sys
22:26:23.0781 2232        CVPNDRVA ( UnsignedFile.Multi.Generic ) - warning
22:26:23.0781 2232        CVPNDRVA - detected UnsignedFile.Multi.Generic (1)
22:26:23.0781 2232        dac2w2k - ok
22:26:23.0796 2232        dac960nt - ok
22:26:23.0828 2232        DCamUSBMke      (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\vzfw.dll
22:26:23.0828 2232        DCamUSBMke ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:23.0828 2232        DCamUSBMke - detected Backdoor.Multi.ZAccess.gen (0)
22:26:23.0875 2232        DcomLaunch      (e970c2296916bf4a2f958680016fe312) C:\WINDOWS\system32\rpcss.dll
22:26:23.0968 2232        DcomLaunch - ok
22:26:24.0000 2232        Dhcp            (c29a1c9b75ba38fa37f8c44405dec360) C:\WINDOWS\System32\dhcpcsvc.dll
22:26:24.0093 2232        Dhcp - ok
22:26:24.0109 2232        digisptiservice (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\msmpsvc.dll
22:26:24.0109 2232        digisptiservice ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:24.0109 2232        digisptiservice - detected Backdoor.Multi.ZAccess.gen (0)
22:26:24.0125 2232        Disk            (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys
22:26:24.0218 2232        Disk - ok
22:26:24.0250 2232        dlartl_n        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\XUIF.dll
22:26:24.0328 2232        dlartl_n ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:24.0328 2232        dlartl_n - detected Backdoor.Multi.ZAccess.gen (0)
22:26:24.0328 2232        dmadmin - ok
22:26:24.0390 2232        dmboot          (0dcfc8395a99fecbb1ef771cec7fe4ea) C:\WINDOWS\system32\drivers\dmboot.sys
22:26:24.0531 2232        dmboot - ok
22:26:24.0546 2232        dmio            (53720ab12b48719d00e327da470a619a) C:\WINDOWS\system32\drivers\dmio.sys
22:26:24.0656 2232        dmio - ok
22:26:24.0671 2232        dmload          (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys
22:26:24.0796 2232        dmload - ok
22:26:24.0812 2232        dmserver        (25c83ffbba13b554eb6d59a9b2e2ee78) C:\WINDOWS\System32\dmserver.dll
22:26:24.0906 2232        dmserver - ok
22:26:24.0921 2232        DMusic          (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys
22:26:25.0000 2232        DMusic - ok
22:26:25.0015 2232        DNE            (b5aa5aa5ac327bd7c1aec0c58f0c1144) C:\WINDOWS\system32\DRIVERS\dne2000.sys
22:26:25.0031 2232        DNE - ok
22:26:25.0062 2232        Dnscache        (8c9ed3b2834aae63081ab2da831c6fe9) C:\WINDOWS\System32\dnsrslvr.dll
22:26:25.0156 2232        Dnscache - ok
22:26:25.0171 2232        dnserver32      (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\TcUsb.dll
22:26:25.0187 2232        dnserver32 ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:25.0187 2232        dnserver32 - detected Backdoor.Multi.ZAccess.gen (0)
22:26:25.0218 2232        Dot3svc        (676e36c4ff5bcea1900f44182b9723e6) C:\WINDOWS\System32\dot3svc.dll
22:26:25.0312 2232        Dot3svc - ok
22:26:25.0312 2232        dpti2o - ok
22:26:25.0312 2232        drmkaud        (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys
22:26:25.0421 2232        drmkaud - ok
22:26:25.0437 2232        DS1410D - ok
22:26:25.0468 2232        DSDrvNT        (5088d03e627d664a1147e25c79e4bcc5) D:\Installationen\VirtualDubVCR\DSDrvNT.sys
22:26:25.0468 2232        DSDrvNT ( UnsignedFile.Multi.Generic ) - warning
22:26:25.0468 2232        DSDrvNT - detected UnsignedFile.Multi.Generic (1)
22:26:25.0515 2232        dtscsi          (6461e57bb51a848aae26f52427b7cf9e) C:\WINDOWS\System32\Drivers\dtscsi.sys
22:26:25.0531 2232        dtscsi - ok
22:26:25.0578 2232        EapHost        (4e4f2fddab0a0736d7671134dcce91fb) C:\WINDOWS\System32\eapsvc.dll
22:26:25.0656 2232        EapHost - ok
22:26:25.0671 2232        ElbyCDIO        (178cc9403816c082d22a1d47fa1f9c85) C:\WINDOWS\system32\Drivers\ElbyCDIO.sys
22:26:25.0687 2232        ElbyCDIO - ok
22:26:25.0703 2232        elbydelay      (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\BrPar.dll
22:26:25.0703 2232        elbydelay ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:25.0703 2232        elbydelay - detected Backdoor.Multi.ZAccess.gen (0)
22:26:25.0734 2232        enecbpth        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\Si3132.dll
22:26:25.0734 2232        enecbpth ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:25.0734 2232        enecbpth - detected Backdoor.Multi.ZAccess.gen (0)
22:26:25.0750 2232        ENTECH          (fd9fc82f134b1c91004ffc76a5ae494b) C:\WINDOWS\system32\DRIVERS\ENTECH.sys
22:26:25.0750 2232        ENTECH ( UnsignedFile.Multi.Generic ) - warning
22:26:25.0750 2232        ENTECH - detected UnsignedFile.Multi.Generic (1)
22:26:25.0781 2232        enxpsvr        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\ups.dll
22:26:25.0781 2232        enxpsvr ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:25.0781 2232        enxpsvr - detected Backdoor.Multi.ZAccess.gen (0)
22:26:25.0796 2232        EPOWER          (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\USBCamera.dll
22:26:25.0796 2232        EPOWER ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:25.0796 2232        EPOWER - detected Backdoor.Multi.ZAccess.gen (0)
22:26:25.0812 2232        epsonbidirectionalagent (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\asp.net_2.0.50727.dll
22:26:25.0812 2232        epsonbidirectionalagent ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:25.0812 2232        epsonbidirectionalagent - detected Backdoor.Multi.ZAccess.gen (0)
22:26:25.0843 2232        ERSvc          (877c18558d70587aa7823a1a308ac96b) C:\WINDOWS\System32\ersvc.dll
22:26:25.0937 2232        ERSvc - ok
22:26:25.0953 2232        Eventlog        (4bb6a83640f1d1792ad21ce767b621c6) C:\WINDOWS\system32\services.exe
22:26:26.0046 2232        Eventlog - ok
22:26:26.0062 2232        EventSystem    (0f3edaee1ef97cf3db2be23a7289b78c) C:\WINDOWS\System32\es.dll
22:26:26.0171 2232        EventSystem - ok
22:26:26.0187 2232        Fastfat        (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys
22:26:26.0296 2232        Fastfat - ok
22:26:26.0312 2232        fasttx2k        (3acbc73531dedd69837fe73b1623d49c) C:\WINDOWS\system32\DRIVERS\fasttx2k.sys
22:26:26.0343 2232        fasttx2k - ok
22:26:26.0375 2232        FastUserSwitchingCompatibility (40602ebfbe06aa075c8e4560743f6883) C:\WINDOWS\System32\shsvcs.dll
22:26:26.0453 2232        FastUserSwitchingCompatibility - ok
22:26:26.0484 2232        Fdc            (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\DRIVERS\fdc.sys
22:26:26.0562 2232        Fdc - ok
22:26:26.0578 2232        Fips            (b0678a548587c5f1967b0d70bacad6c1) C:\WINDOWS\system32\drivers\Fips.sys
22:26:26.0671 2232        Fips - ok
22:26:26.0796 2232        FirebirdServerMAGIXInstance (167d24a045499ebef438f231976158df) C:\Programme\Common\Database\bin\fbserver.exe
22:26:26.0890 2232        FirebirdServerMAGIXInstance ( UnsignedFile.Multi.Generic ) - warning
22:26:26.0890 2232        FirebirdServerMAGIXInstance - detected UnsignedFile.Multi.Generic (1)
22:26:26.0968 2232        FLEXnet Licensing Service (227846995afeefa70d328bf5334a86a5) C:\Programme\Gemeinsame Dateien\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
22:26:27.0000 2232        FLEXnet Licensing Service ( UnsignedFile.Multi.Generic ) - warning
22:26:27.0000 2232        FLEXnet Licensing Service - detected UnsignedFile.Multi.Generic (1)
22:26:27.0125 2232        Flpydisk        (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\DRIVERS\flpydisk.sys
22:26:27.0203 2232        Flpydisk - ok
22:26:27.0234 2232        FltMgr          (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\drivers\fltmgr.sys
22:26:27.0328 2232        FltMgr - ok
22:26:27.0390 2232        FontCache3.0.0.0 (8ba7c024070f2b7fdd98ed8a4ba41789) C:\WINDOWS\Microsoft.NET\Framework\v3.0\WPF\PresentationFontCache.exe
22:26:27.0406 2232        FontCache3.0.0.0 - ok
22:26:27.0421 2232        framework      (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\armoucfltr.dll
22:26:27.0421 2232        framework ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:27.0421 2232        framework - detected Backdoor.Multi.ZAccess.gen (0)
22:26:27.0453 2232        Fs_Rec          (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys
22:26:27.0578 2232        Fs_Rec - ok
22:26:27.0593 2232        Ftdisk          (8f1955ce42e1484714b542f341647778) C:\WINDOWS\system32\DRIVERS\ftdisk.sys
22:26:27.0734 2232        Ftdisk - ok
22:26:27.0750 2232        GameConsoleService (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\aic78xx.dll
22:26:27.0750 2232        GameConsoleService ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:27.0750 2232        GameConsoleService - detected Backdoor.Multi.ZAccess.gen (0)
22:26:27.0781 2232        Gpc            (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys
22:26:27.0875 2232        Gpc - ok
22:26:27.0890 2232        gs30s          (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\UMPass.dll
22:26:27.0906 2232        gs30s ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:27.0906 2232        gs30s - detected Backdoor.Multi.ZAccess.gen (0)
22:26:27.0937 2232        GTF32BUS        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\centennialiptransferagent.dll
22:26:27.0937 2232        GTF32BUS ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:27.0937 2232        GTF32BUS - detected Backdoor.Multi.ZAccess.gen (0)
22:26:27.0953 2232        gupdate - ok
22:26:27.0984 2232        helpsvc        (cb66bf85bf599befd6c6a57c2e20357f) C:\WINDOWS\PCHealth\HelpCtr\Binaries\pchsvc.dll
22:26:28.0078 2232        helpsvc - ok
22:26:28.0109 2232        HidServ        (b35da85e60c0103f2e4104532da2f12b) C:\WINDOWS\System32\hidserv.dll
22:26:28.0203 2232        HidServ - ok
22:26:28.0218 2232        HidUsb          (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys
22:26:28.0312 2232        HidUsb - ok
22:26:28.0343 2232        hkmsvc          (ed29f14101523a6e0e808107405d452c) C:\WINDOWS\System32\kmsvc.dll
22:26:28.0437 2232        hkmsvc - ok
22:26:28.0437 2232        hpn - ok
22:26:28.0468 2232        HpqKbFiltr      (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\FsVga.dll
22:26:28.0468 2232        HpqKbFiltr ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:28.0468 2232        HpqKbFiltr - detected Backdoor.Multi.ZAccess.gen (0)
22:26:28.0484 2232        hpt3xx - ok
22:26:28.0500 2232        hpwirelessmgr  (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\SWNC8U51.dll
22:26:28.0500 2232        hpwirelessmgr ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:28.0500 2232        hpwirelessmgr - detected Backdoor.Multi.ZAccess.gen (0)
22:26:28.0531 2232        HTTP            (f6aacf5bce2893e0c1754afeb672e5c9) C:\WINDOWS\system32\Drivers\HTTP.sys
22:26:28.0609 2232        HTTP - ok
22:26:28.0625 2232        HTTPFilter      (9e4adb854cebcfb81a4b36718feecd16) C:\WINDOWS\System32\w3ssl.dll
22:26:28.0718 2232        HTTPFilter - ok
22:26:28.0718 2232        i2omgmt - ok
22:26:28.0734 2232        i2omp - ok
22:26:28.0750 2232        i8042prt        (e283b97cfbeb86c1d86baed5f7846a92) C:\WINDOWS\system32\DRIVERS\i8042prt.sys
22:26:28.0843 2232        i8042prt - ok
22:26:28.0921 2232        IDriverT        (1cf03c69b49acb70c722df92755c0c8c) C:\Programme\Gemeinsame Dateien\InstallShield\Driver\11\Intel 32\IDriverT.exe
22:26:28.0953 2232        IDriverT ( UnsignedFile.Multi.Generic ) - warning
22:26:28.0953 2232        IDriverT - detected UnsignedFile.Multi.Generic (1)
22:26:29.0015 2232        idsvc          (c01ac32dc5c03076cfb852cb5da5229c) C:\WINDOWS\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe
22:26:29.0062 2232        idsvc - ok
22:26:29.0093 2232        igateway        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\logmein.dll
22:26:29.0093 2232        igateway ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:29.0093 2232        igateway - detected Backdoor.Multi.ZAccess.gen (0)
22:26:29.0125 2232        imap4d32        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\vwkernel.dll
22:26:29.0125 2232        imap4d32 ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:29.0125 2232        imap4d32 - detected Backdoor.Multi.ZAccess.gen (0)
22:26:29.0140 2232        Imapi          (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys
22:26:29.0234 2232        Imapi - ok
22:26:29.0265 2232        ImapiService    (d4b413aa210c21e46aedd2ba5b68d38e) C:\WINDOWS\System32\imapi.exe
22:26:29.0359 2232        ImapiService - ok
22:26:29.0375 2232        incdrec        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\netdevio.dll
22:26:29.0375 2232        incdrec ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:29.0375 2232        incdrec - detected Backdoor.Multi.ZAccess.gen (0)
22:26:29.0390 2232        ini910u - ok
22:26:29.0406 2232        IntelIde - ok
22:26:29.0437 2232        ip6fw          (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\drivers\ip6fw.sys
22:26:29.0515 2232        ip6fw - ok
22:26:29.0531 2232        IpFilterDriver  (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys
22:26:29.0656 2232        IpFilterDriver - ok
22:26:29.0671 2232        IpInIp          (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys
22:26:29.0750 2232        IpInIp - ok
22:26:29.0781 2232        IpNat          (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys
22:26:29.0875 2232        IpNat - ok
22:26:29.0890 2232        ipodsrv        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\emclisrv.dll
22:26:29.0890 2232        ipodsrv ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:29.0890 2232        ipodsrv - detected Backdoor.Multi.ZAccess.gen (0)
22:26:29.0906 2232        IPSec          (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys
22:26:30.0000 2232        IPSec - ok
22:26:30.0015 2232        IRENUM          (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys
22:26:30.0093 2232        IRENUM - ok
22:26:30.0109 2232        isapnp          (6dfb88f64135c525433e87648bda30de) C:\WINDOWS\system32\DRIVERS\isapnp.sys
22:26:30.0187 2232        isapnp - ok
22:26:30.0265 2232        JavaQuickStarterService (9ae07549a0d691a103faf8946554bdb7) D:\Programme\Java\bin\jqs.exe
22:26:30.0281 2232        JavaQuickStarterService - ok
22:26:30.0328 2232        Kbdclass        (1704d8c4c8807b889e43c649b478a452) C:\WINDOWS\system32\DRIVERS\kbdclass.sys
22:26:30.0406 2232        Kbdclass - ok
22:26:30.0437 2232        kbdhid          (b6d6c117d771c98130497265f26d1882) C:\WINDOWS\system32\DRIVERS\kbdhid.sys
22:26:30.0515 2232        kbdhid - ok
22:26:30.0531 2232        kmixer          (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys
22:26:30.0625 2232        kmixer - ok
22:26:30.0640 2232        KSecDD          (1705745d900dabf2d89f90ebaddc7517) C:\WINDOWS\system32\drivers\KSecDD.sys
22:26:30.0718 2232        KSecDD - ok
22:26:30.0750 2232        lanmanserver    (d6eb4916b203cbe525f8eff5fd5ab16c) C:\WINDOWS\System32\srvsvc.dll
22:26:30.0843 2232        lanmanserver - ok
22:26:30.0859 2232        lanmanworkstation (c0db1e9367681ecd7ecca9615c1d0f9b) C:\WINDOWS\System32\wkssvc.dll
22:26:30.0968 2232        lanmanworkstation - ok
22:26:30.0968 2232        lbrtfdc - ok
22:26:31.0000 2232        livesrv        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\lvselsus.dll
22:26:31.0000 2232        livesrv ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:31.0000 2232        livesrv - detected Backdoor.Multi.ZAccess.gen (0)
22:26:31.0031 2232        lktimesync      (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\mcrdsvc.dll
22:26:31.0031 2232        lktimesync ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:31.0031 2232        lktimesync - detected Backdoor.Multi.ZAccess.gen (0)
22:26:31.0062 2232        LmHosts        (636714b7d43c8d0c80449123fd266920) C:\WINDOWS\System32\lmhsvc.dll
22:26:31.0140 2232        LmHosts - ok
22:26:31.0156 2232        lvselsus        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\AtlsAud.dll
22:26:31.0156 2232        lvselsus ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:31.0156 2232        lvselsus - detected Backdoor.Multi.ZAccess.gen (0)
22:26:31.0187 2232        MBAMProtector  (b7ca8cc3f978201856b6ab82f40953c3) C:\WINDOWS\system32\drivers\mbam.sys
22:26:31.0187 2232        MBAMProtector - ok
22:26:31.0265 2232        MBAMService    (de199f3aa9c541a349af95a5c72a71af) D:\Programme\Malwarebytes' Anti-Malware\mbamservice.exe
22:26:31.0281 2232        MBAMService - ok
22:26:31.0281 2232        MBAMSwissArmy - ok
22:26:31.0312 2232        mdc8021x        (2efe1db1ec58a26b0c14bfda122e246f) C:\WINDOWS\system32\irmon.dll
22:26:31.0406 2232        mdc8021x - ok
22:26:31.0406 2232        merakcontrol - ok
22:26:31.0453 2232        Messenger      (b7550a7107281d170ce85524b1488c98) C:\WINDOWS\System32\msgsvc.dll
22:26:31.0531 2232        Messenger - ok
22:26:31.0546 2232        mnmdd          (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys
22:26:31.0671 2232        mnmdd - ok
22:26:31.0703 2232        mnmsrvc        (c2f1d365fd96791b037ee504868065d3) C:\WINDOWS\System32\mnmsrvc.exe
22:26:31.0781 2232        mnmsrvc - ok
22:26:31.0812 2232        Modem          (6fb74ebd4ec57a6f1781de3852cc3362) C:\WINDOWS\system32\drivers\Modem.sys
22:26:31.0890 2232        Modem - ok
22:26:31.0906 2232        Mouclass        (b24ce8005deab254c0251e15cb71d802) C:\WINDOWS\system32\DRIVERS\mouclass.sys
22:26:31.0984 2232        Mouclass - ok
22:26:32.0015 2232        mouhid          (66a6f73c74e1791464160a7065ce711a) C:\WINDOWS\system32\DRIVERS\mouhid.sys
22:26:32.0140 2232        mouhid - ok
22:26:32.0156 2232        MountMgr        (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys
22:26:32.0250 2232        MountMgr - ok
22:26:32.0250 2232        MPE            (c0f8e0c2c3c0437cf37c6781896dc3ec) C:\WINDOWS\system32\DRIVERS\MPE.sys
22:26:32.0343 2232        MPE - ok
22:26:32.0343 2232        mpservice - ok
22:26:32.0359 2232        mraid35x - ok
22:26:32.0375 2232        MRxDAV          (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys
22:26:32.0468 2232        MRxDAV - ok
22:26:32.0515 2232        MRxSmb          (68755f0ff16070178b54674fe5b847b0) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
22:26:32.0625 2232        MRxSmb - ok
22:26:32.0640 2232        MSDTC          (35a031af38c55f92d28aa03ee9f12cc9) C:\WINDOWS\System32\msdtc.exe
22:26:32.0718 2232        MSDTC - ok
22:26:32.0734 2232        Msfs            (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys
22:26:32.0812 2232        Msfs - ok
22:26:32.0812 2232        MSIServer - ok
22:26:32.0843 2232        MSKSSRV        (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys
22:26:32.0953 2232        MSKSSRV - ok
22:26:32.0953 2232        msloop - ok
22:26:32.0968 2232        MSPCLOCK        (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys
22:26:33.0062 2232        MSPCLOCK - ok
22:26:33.0062 2232        MSPQM          (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys
22:26:33.0156 2232        MSPQM - ok
22:26:33.0187 2232        mssmbios        (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys
22:26:33.0265 2232        mssmbios - ok
22:26:33.0281 2232        MSTEE          (e53736a9e30c45fa9e7b5eac55056d1d) C:\WINDOWS\system32\drivers\MSTEE.sys
22:26:33.0359 2232        MSTEE - ok
22:26:33.0375 2232        MSW_USB - ok
22:26:33.0390 2232        MTDVC2 - ok
22:26:33.0406 2232        Mup            (2f625d11385b1a94360bfc70aaefdee1) C:\WINDOWS\system32\drivers\Mup.sys
22:26:33.0484 2232        Mup - ok
22:26:33.0500 2232        mvdcodec        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\dm1service.dll
22:26:33.0500 2232        mvdcodec ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:33.0500 2232        mvdcodec - detected Backdoor.Multi.ZAccess.gen (0)
22:26:33.0515 2232        MXOPSWD - ok
22:26:33.0546 2232        NABTSFEC        (5b50f1b2a2ed47d560577b221da734db) C:\WINDOWS\system32\DRIVERS\NABTSFEC.sys
22:26:33.0640 2232        NABTSFEC - ok
22:26:33.0671 2232        nalntservice    (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\Ndisipo.dll
22:26:33.0671 2232        nalntservice ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:33.0671 2232        nalntservice - detected Backdoor.Multi.ZAccess.gen (0)
22:26:33.0703 2232        napagent        (46bb15ae2ac7d025d6d2567b876817bd) C:\WINDOWS\System32\qagentrt.dll
22:26:33.0796 2232        napagent - ok
22:26:33.0812 2232        NDIS            (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys
22:26:33.0921 2232        NDIS - ok
22:26:33.0937 2232        NdisIP          (7ff1f1fd8609c149aa432f95a8163d97) C:\WINDOWS\system32\DRIVERS\NdisIP.sys
22:26:34.0031 2232        NdisIP - ok
22:26:34.0046 2232        NdisTapi        (1ab3d00c991ab086e69db84b6c0ed78f) C:\WINDOWS\system32\DRIVERS\ndistapi.sys
22:26:34.0125 2232        NdisTapi - ok
22:26:34.0140 2232        Ndisuio        (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys
22:26:34.0234 2232        Ndisuio - ok
22:26:34.0250 2232        NdisWan        (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys
22:26:34.0328 2232        NdisWan - ok
22:26:34.0343 2232        NDProxy        (6215023940cfd3702b46abc304e1d45a) C:\WINDOWS\system32\drivers\NDProxy.sys
22:26:34.0437 2232        NDProxy - ok
22:26:34.0453 2232        NetBIOS        (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys
22:26:34.0562 2232        NetBIOS - ok
22:26:34.0578 2232        NetBT          (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys
22:26:34.0687 2232        NetBT - ok
22:26:34.0750 2232        NetDDE          (8ace4251bffd09ce75679fe940e996cc) C:\WINDOWS\system32\netdde.exe
22:26:34.0859 2232        NetDDE - ok
22:26:34.0859 2232        NetDDEdsdm      (8ace4251bffd09ce75679fe940e996cc) C:\WINDOWS\system32\netdde.exe
22:26:34.0953 2232        NetDDEdsdm - ok
22:26:34.0953 2232        NETFWDSL - ok
22:26:34.0984 2232        Netlogon        (afb8261b56cba0d86aeb6df682af9785) C:\WINDOWS\System32\lsass.exe
22:26:35.0078 2232        Netlogon - ok
22:26:35.0109 2232        Netman          (e6d88f1f6745bf00b57e7855a2ab696c) C:\WINDOWS\System32\netman.dll
22:26:35.0203 2232        Netman - ok
22:26:35.0218 2232        netmnt          (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\vmware.dll
22:26:35.0218 2232        netmnt ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:35.0218 2232        netmnt - detected Backdoor.Multi.ZAccess.gen (0)
22:26:35.0296 2232        NetTcpPortSharing (d34612c5d02d026535b3095d620626ae) C:\WINDOWS\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\SMSvcHost.exe
22:26:35.0296 2232        NetTcpPortSharing - ok
22:26:35.0312 2232        NIC1394        (e9e47cfb2d461fa0fc75b7a74c6383ea) C:\WINDOWS\system32\DRIVERS\nic1394.sys
22:26:35.0406 2232        NIC1394 - ok
22:26:35.0437 2232        NICSer_WPC54G  (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\eeyeevnt.dll
22:26:35.0437 2232        NICSer_WPC54G ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:35.0437 2232        NICSer_WPC54G - detected Backdoor.Multi.ZAccess.gen (0)
22:26:35.0453 2232        NinjaUSB        (16220ba146234625b50c055f413edf03) C:\WINDOWS\system32\drivers\NinjaUSB.sys
22:26:35.0468 2232        NinjaUSB ( UnsignedFile.Multi.Generic ) - warning
22:26:35.0468 2232        NinjaUSB - detected UnsignedFile.Multi.Generic (1)
22:26:35.0500 2232        Nla            (f12b9d9a069331877d006cc81b4735f9) C:\WINDOWS\System32\mswsock.dll
22:26:35.0593 2232        Nla - ok
22:26:35.0625 2232        Npfs            (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys
22:26:35.0718 2232        Npfs - ok
22:26:35.0765 2232        Ntfs            (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys
22:26:35.0875 2232        Ntfs - ok
22:26:35.0906 2232        ntgrip          (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\utilman.dll
22:26:35.0906 2232        ntgrip ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:35.0906 2232        ntgrip - detected Backdoor.Multi.ZAccess.gen (0)
22:26:35.0906 2232        NtLmSsp        (afb8261b56cba0d86aeb6df682af9785) C:\WINDOWS\System32\lsass.exe
22:26:35.0984 2232        NtLmSsp - ok
22:26:36.0015 2232        NtmsSvc        (56af4064996fa5bac9c449b1514b4770) C:\WINDOWS\system32\ntmssvc.dll
22:26:36.0140 2232        NtmsSvc - ok
22:26:36.0171 2232        Null            (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys
22:26:36.0281 2232        Null - ok
22:26:36.0312 2232        NwlnkFlt        (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys
22:26:36.0421 2232        NwlnkFlt - ok
22:26:36.0421 2232        NwlnkFwd        (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys
22:26:36.0515 2232        NwlnkFwd - ok
22:26:36.0625 2232        odserv          (84de1dd996b48b05ace31ad015fa108a) C:\Programme\Gemeinsame Dateien\Microsoft Shared\OFFICE12\ODSERV.EXE
22:26:36.0671 2232        odserv - ok
22:26:36.0687 2232        ohci1394        (ca33832df41afb202ee7aeb05145922f) C:\WINDOWS\system32\DRIVERS\ohci1394.sys
22:26:36.0765 2232        ohci1394 - ok
22:26:36.0796 2232        ONSIO          (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\bb-run.dll
22:26:36.0796 2232        ONSIO ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:36.0796 2232        ONSIO - detected Backdoor.Multi.ZAccess.gen (0)
22:26:36.0812 2232        oracleorahometnslistener (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\stcagent.dll
22:26:36.0812 2232        oracleorahometnslistener ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:36.0812 2232        oracleorahometnslistener - detected Backdoor.Multi.ZAccess.gen (0)
22:26:36.0859 2232        ose            (5a432a042dae460abe7199b758e8606c) C:\Programme\Gemeinsame Dateien\Microsoft Shared\Source Engine\OSE.EXE
22:26:36.0890 2232        ose - ok
22:26:36.0906 2232        Parport        (f84785660305b9b903fb3bca8ba29837) C:\WINDOWS\system32\DRIVERS\parport.sys
22:26:37.0015 2232        Parport - ok
22:26:37.0015 2232        PartMgr        (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys
22:26:37.0109 2232        PartMgr - ok
22:26:37.0125 2232        ParVdm          (c2bf987829099a3eaa2ca6a0a90ecb4f) C:\WINDOWS\system32\drivers\ParVdm.sys
22:26:37.0234 2232        ParVdm - ok
22:26:37.0250 2232        PCI            (387e8dedc343aa2d1efbc30580273acd) C:\WINDOWS\system32\DRIVERS\pci.sys
22:26:37.0343 2232        PCI - ok
22:26:37.0343 2232        PCIDump - ok
22:26:37.0343 2232        PCIIde - ok
22:26:37.0375 2232        PCLEPCI        (ab1b09736d26e0dadddaae41b2745c57) C:\WINDOWS\system32\Drivers\PCLEPCI.SYS
22:26:37.0390 2232        PCLEPCI ( UnsignedFile.Multi.Generic ) - warning
22:26:37.0390 2232        PCLEPCI - detected UnsignedFile.Multi.Generic (1)
22:26:37.0406 2232        Pcmcia          (a2a966b77d61847d61a3051df87c8c97) C:\WINDOWS\system32\drivers\Pcmcia.sys
22:26:37.0500 2232        Pcmcia - ok
22:26:37.0515 2232        pcouffin        (5b6c11de7e839c05248ced8825470fef) C:\WINDOWS\system32\Drivers\pcouffin.sys
22:26:37.0531 2232        pcouffin ( UnsignedFile.Multi.Generic ) - warning
22:26:37.0531 2232        pcouffin - detected UnsignedFile.Multi.Generic (1)
22:26:37.0546 2232        pctvvbi        (eb7de8f91803f267e899f87197731664) C:\WINDOWS\system32\DRIVERS\pctvvbi.sys
22:26:37.0578 2232        pctvvbi - ok
22:26:37.0578 2232        PDCOMP - ok
22:26:37.0593 2232        PDFRAME - ok
22:26:37.0609 2232        pdlncbas        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\tnbrlds.dll
22:26:37.0609 2232        pdlncbas ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:37.0609 2232        pdlncbas - detected Backdoor.Multi.ZAccess.gen (0)
22:26:37.0625 2232        PDRELI - ok
22:26:37.0625 2232        PDRFRAME - ok
22:26:37.0656 2232        pensup          (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\se26unic.dll
22:26:37.0656 2232        pensup ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:37.0656 2232        pensup - detected Backdoor.Multi.ZAccess.gen (0)
22:26:37.0671 2232        perc2 - ok
22:26:37.0671 2232        perc2hib - ok
22:26:37.0718 2232        personalsecuredriveservice (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\null.dll
22:26:37.0718 2232        personalsecuredriveservice ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:37.0718 2232        personalsecuredriveservice - detected Backdoor.Multi.ZAccess.gen (0)
22:26:37.0734 2232        Pfc            (f2b3785d7282bac66d4b644fc88749f0) C:\WINDOWS\system32\drivers\pfc.sys
22:26:37.0750 2232        Pfc ( UnsignedFile.Multi.Generic ) - warning
22:26:37.0750 2232        Pfc - detected UnsignedFile.Multi.Generic (1)
22:26:37.0750 2232        phc600 - ok
22:26:37.0765 2232        picturetaker    (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\akshasp.dll
22:26:37.0765 2232        picturetaker ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:37.0765 2232        picturetaker - detected Backdoor.Multi.ZAccess.gen (0)
22:26:37.0796 2232        PlugPlay        (4bb6a83640f1d1792ad21ce767b621c6) C:\WINDOWS\system32\services.exe
22:26:37.0890 2232        PlugPlay - ok
22:26:37.0906 2232        PolicyAgent    (afb8261b56cba0d86aeb6df682af9785) C:\WINDOWS\System32\lsass.exe
22:26:37.0984 2232        PolicyAgent - ok
22:26:38.0000 2232        PptpMiniport    (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys
22:26:38.0093 2232        PptpMiniport - ok
22:26:38.0125 2232        Processor      (2cb55427c58679f49ad600fccba76360) C:\WINDOWS\system32\DRIVERS\processr.sys
22:26:38.0203 2232        Processor - ok
22:26:38.0218 2232        ProtectedStorage (afb8261b56cba0d86aeb6df682af9785) C:\WINDOWS\system32\lsass.exe
22:26:38.0296 2232        ProtectedStorage - ok
22:26:38.0312 2232        proxyserverservice (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\ONSIO.dll
22:26:38.0328 2232        proxyserverservice ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:38.0328 2232        proxyserverservice - detected Backdoor.Multi.ZAccess.gen (0)
22:26:38.0328 2232        PSched          (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys
22:26:38.0437 2232        PSched - ok
22:26:38.0453 2232        Ptilink        (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys
22:26:38.0562 2232        Ptilink - ok
22:26:38.0593 2232        PxHelp20        (e42e3433dbb4cffe8fdd91eab29aea8e) C:\WINDOWS\system32\Drivers\PxHelp20.sys
22:26:38.0609 2232        PxHelp20 - ok
22:26:38.0609 2232        ql1080 - ok
22:26:38.0609 2232        Ql10wnt - ok
22:26:38.0625 2232        ql12160 - ok
22:26:38.0625 2232        ql1240 - ok
22:26:38.0640 2232        ql1280 - ok
22:26:38.0656 2232        rapapp - ok
22:26:38.0671 2232        RasAcd          (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys
22:26:38.0765 2232        RasAcd - ok
22:26:38.0796 2232        RasAuto        (f5ba6caccdb66c8f048e867563203246) C:\WINDOWS\System32\rasauto.dll
22:26:38.0875 2232        RasAuto - ok
22:26:38.0906 2232        Rasl2tp        (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
22:26:39.0000 2232        Rasl2tp - ok
22:26:39.0046 2232        RasMan          (f9a7b66ea345726edb5862a46b1eccd5) C:\WINDOWS\System32\rasmans.dll
22:26:39.0125 2232        RasMan - ok
22:26:39.0125 2232        RasPppoe        (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys
22:26:39.0234 2232        RasPppoe - ok
22:26:39.0234 2232        Raspti          (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys
22:26:39.0328 2232        Raspti - ok
22:26:39.0359 2232        Rdbss          (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys
22:26:39.0453 2232        Rdbss - ok
22:26:39.0468 2232        RDPCDD          (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys
22:26:39.0562 2232        RDPCDD - ok
22:26:39.0593 2232        rdpdr          (15cabd0f7c00c47c70124907916af3f1) C:\WINDOWS\system32\DRIVERS\rdpdr.sys
22:26:39.0687 2232        rdpdr - ok
22:26:39.0718 2232        RDPWD          (6728e45b66f93c08f11de2e316fc70dd) C:\WINDOWS\system32\drivers\RDPWD.sys
22:26:39.0796 2232        RDPWD - ok
22:26:39.0812 2232        RDSessMgr      (263af18af0f3db99f574c95f284ccec9) C:\WINDOWS\system32\sessmgr.exe
22:26:39.0937 2232        RDSessMgr - ok
22:26:39.0968 2232        redbook        (ed761d453856f795a7fe056e42c36365) C:\WINDOWS\system32\DRIVERS\redbook.sys
22:26:40.0062 2232        redbook - ok
22:26:40.0078 2232        RemoteAccess    (0e97ec96d6942ceec2d188cc2eb69a01) C:\WINDOWS\System32\mprdim.dll
22:26:40.0171 2232        RemoteAccess - ok
22:26:40.0187 2232        RemoteRegistry  (e4cd1f3d84e1c2ca0b8cf7501e201593) C:\WINDOWS\system32\regsvc.dll
22:26:40.0265 2232        RemoteRegistry - ok
22:26:40.0281 2232        rimmptsk - ok
22:26:40.0312 2232        rimsptsk        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\InterBaseServer.dll
22:26:40.0312 2232        rimsptsk ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:40.0312 2232        rimsptsk - detected Backdoor.Multi.ZAccess.gen (0)
22:26:40.0343 2232        roxupnpserver  (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\pptchpad.dll
22:26:40.0343 2232        roxupnpserver ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:40.0343 2232        roxupnpserver - detected Backdoor.Multi.ZAccess.gen (0)
22:26:40.0359 2232        RpcLocator      (2a02e21867497df20b8fc95631395169) C:\WINDOWS\System32\locator.exe
22:26:40.0453 2232        RpcLocator - ok
22:26:40.0500 2232        RpcSs          (e970c2296916bf4a2f958680016fe312) C:\WINDOWS\system32\rpcss.dll
22:26:40.0593 2232        RpcSs - ok
22:26:41.0062 2232        RSVP            (4bdd71b4b521521499dfd14735c4f398) C:\WINDOWS\System32\rsvp.exe
22:26:41.0156 2232        RSVP - ok
22:26:41.0187 2232        rtl8139        (d507c1400284176573224903819ffda3) C:\WINDOWS\system32\DRIVERS\RTL8139.SYS
22:26:41.0265 2232        rtl8139 - ok
22:26:41.0296 2232        rupsd          (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\wencrservice.dll
22:26:41.0296 2232        rupsd ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:41.0296 2232        rupsd - detected Backdoor.Multi.ZAccess.gen (0)
22:26:41.0328 2232        s716obex        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\snapman.dll
22:26:41.0328 2232        s716obex ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:41.0328 2232        s716obex - detected Backdoor.Multi.ZAccess.gen (0)
22:26:41.0359 2232        SamSs          (afb8261b56cba0d86aeb6df682af9785) C:\WINDOWS\system32\lsass.exe
22:26:41.0437 2232        SamSs - ok
22:26:41.0468 2232        SCardSvr        (dcec079fad95d36c8dd5cb6d779dfe32) C:\WINDOWS\System32\SCardSvr.exe
22:26:41.0562 2232        SCardSvr - ok
22:26:41.0578 2232        ScFBPNT2        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\ohci1394.dll
22:26:41.0593 2232        ScFBPNT2 ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:41.0593 2232        ScFBPNT2 - detected Backdoor.Multi.ZAccess.gen (0)
22:26:41.0609 2232        Schedule        (a050194a44d7fa8d7186ed2f4e8367ae) C:\WINDOWS\system32\schedsvc.dll
22:26:41.0718 2232        Schedule - ok
22:26:41.0750 2232        se2Cnd5        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\navex15.dll
22:26:41.0750 2232        se2Cnd5 ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:41.0750 2232        se2Cnd5 - detected Backdoor.Multi.ZAccess.gen (0)
22:26:41.0765 2232        se45mgmt        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\mcdbus.dll
22:26:41.0765 2232        se45mgmt ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:41.0765 2232        se45mgmt - detected Backdoor.Multi.ZAccess.gen (0)
22:26:41.0781 2232        se45unic        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\opcenum.dll
22:26:41.0781 2232        se45unic ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:41.0781 2232        se45unic - detected Backdoor.Multi.ZAccess.gen (0)
22:26:41.0796 2232        se59nd5        (b89cfbe8cb247b57d8c10adaa66b462b) C:\WINDOWS\system32\carboniteservice.dll
22:26:41.0796 2232        se59nd5 ( Backdoor.Multi.ZAccess.gen ) - infected
22:26:41.0796 2232        se59nd5 - detected Backdoor.Multi.ZAccess.gen (0)
22:26:41.0812 2232        Secdrv          (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys
22:26:41.0906 2232        Secdrv - ok
22:26:41.0921 2232        seclogon        (bee4cfd1d48c23b44cf4b974b0b79b2b) C:\WINDOWS\System32\seclogon.dll
22:26:42.0000 2232        seclogon - ok
22:26:42.0015 2232        SENS            (2aac9b6ed9eddffb721d6452e34d67e3) C:\WINDOWS\system32\sens.dll
22:26:42.0109 2232        SENS - ok
22:26:42.0140 2232        Sentinel        (8627c992b8a80504fc477b2e8ff8ec4f) C:\WINDOWS\System32\Drivers\SENTINEL.SYS
22:26:42.0156 2232        Sentinel ( UnsignedFile.Multi.Generic ) - warning
22:26:42.0156 2232        Sentinel - detected UnsignedFile.Multi.Generic (1)
22:26:42.0171 2232        serenum        (0f29512ccd6bead730039fb4bd2c85ce) C:\WINDOWS\system32\DRIVERS\serenum.sys
22:26:42.0265 2232        serenum - ok
22:26:42.0281 2232        Serial          (cf24eb4f0412c82bcd1f4f35a025e31d) C:\WINDOWS\system32\DRIVERS\serial.sys
22:26:42.0375 2232        Serial - ok
22:26:42.0406 2232        sfdrv01        (4c0d673281178cb496011a2e28571fc8) C:\WINDOWS\system32\drivers\sfdrv01.sys
22:26:42.0421 2232        sfdrv01 ( UnsignedFile.Multi.Generic ) - warning
22:26:42.0421 2232        sfdrv01 - detected UnsignedFile.Multi.Generic (1)
22:26:42.0421 2232        sfhlp02        (15be2b5e4dc5b8623cf167720682abc9) C:\WINDOWS\system32\drivers\sfhlp02.sys
22:26:42.0437 2232        sfhlp02 ( UnsignedFile.Multi.Generic ) - warning
22:26:42.0437 2232        sfhlp02 - detected UnsignedFile.Multi.Generic (1)
22:26:42.0453 2232        Sfloppy        (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys
22:26:42.0546 2232        Sfloppy - ok
22:26:42.0578 2232        SharedAccess    (cad058d5f8b889a87ca3eb3cf624dcef) C:\WINDOWS\System32\ipnathlp.dll
22:26:42.0687 2232        SharedAccess - ok
22:26:42.0703 2232        ShellHWDetection (40602ebfbe06aa075c8e4560743f6883) C:\WINDOWS\System32\shsvcs.dll
22:26:42.0796 2232        ShellHWDetection - ok
22:26:42.0812 2232        Simbad - ok
22:26:42.0843 2232        SLIP            (866d538ebe33709a5c9f5c62b73b7d14) C:\WINDOWS\system32\DRIVERS\SLIP.sys
22:26:42.0937 2232        SLIP - ok
22:26:42.0953 2232        Sparrow - ok
22:26:42.0968 2232        splitter        (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys
22:26:43.0062 2232        splitter - ok
22:26:43.0078 2232        Spooler        (39356a9cdb6753a6d13a4072a9f5a4bb) C:\WINDOWS\system32\spoolsv.exe
22:26:43.0171 2232        Spooler - ok
22:26:43.0234 2232        sptd            (6b4f64aaecc805bc32d1aec763385160) C:\WINDOWS\system32\Drivers\sptd.sys
22:26:43.0234 2232        Suspicious file (NoAccess): C:\WINDOWS\system32\Drivers\sptd.sys. md5: 6b4f64aaecc805bc32d1aec763385160
22:26:43.0234 2232        sptd ( LockedFile.Multi.Generic ) - warning
22:26:43.0234 2232        sptd - detected LockedFile.Multi.Generic (1)
22:26:43.0250 2232        sr              (50fa898f8c032796d3b1b9951bb5a90f) C:\WINDOWS\system32\DRIVERS\sr.sys
22:26:43.0328 2232        sr - ok
22:26:43.0359 2232        srservice      (fe77a85495065f3ad59c5c65b6c54182) C:\WINDOWS\System32\srsvc.dll
22:26:43.0453 2232        srservice - ok
22:26:43.0484 2232        Srv            (5252605079810904e31c332e241cd59b) C:\WINDOWS\system32\DRIVERS\srv.sys
22:26:43.0562 2232        Srv - ok
22:26:43.0593 2232        ssadbus        (406776fe3c2b66796bac1a7afb9ac8a1) C:\WINDOWS\system32\DRIVERS\ssadbus.sys
22:26:43.0625 2232        ssadbus - ok
22:26:43.0656 2232        ssadmdfl        (b19532d015a5d295e2aa34bb521202cf) C:\WINDOWS\system32\DRIVERS\ssadmdfl.sys
22:26:43.0703 2232        ssadmdfl - ok
22:26:43.0718 2232        ssadmdm        (2aebf9108e6f435458b9499c27394da4) C:\WINDOWS\system32\DRIVERS\ssadmdm.sys
22:26:43.0750 2232        ssadmdm - ok
22:26:43.0781 2232        sscdbus        (ffe42941e0326c322f40b0b79a46493c) C:\WINDOWS\system32\DRIVERS\sscdbus.sys
22:26:43.0796 2232        sscdbus - ok
22:26:43.0828 2232        sscdmdfl        (a68e7d87adfbb8c50d88cd58230c6819) C:\WINDOWS\system32\DRIVERS\sscdmdfl.sys
22:26:43.0843 2232        sscdmdfl - ok
22:26:43.0859 2232        sscdmdm        (b534b24151281856ec2f69ed3d6d60dd) C:\WINDOWS\system32\DRIVERS\sscdmdm.sys
22:26:43.0875 2232        sscdmdm - ok
22:26:43.0921 2232        SSDPSRV        (4df5b05dfaec29e13e1ed6f6ee12c500) C:\WINDOWS\System32\ssdpsrv.dll
22:26:44.0031 2232        SSDPSRV - ok
22:26:44.0046 2232        ssmdrv          (a36ee93698802cd899f98bfd553d8185) C:\WINDOWS\system32\DRIVERS\ssmdrv.sys
22:26:44.0046 2232        ssmdrv - ok
22:26:44.0078 2232        stisvc          (bc2c5985611c5356b24aeb370953ded9) C:\WINDOWS\system32\wiaservc.dll
22:26:44.0187 2232        stisvc - ok
22:26:44.0218 2232        StMp3Rec        (833ac40f6e7be17951d6d9a956829547) C:\WINDOWS\system32\Drivers\StMp3Rec.sys
22:26:44.0234 2232        StMp3Rec - ok
22:26:44.0250 2232        streamip        (77813007ba6265c4b6098187e6ed79d2) C:\WINDOWS\system32\DRIVERS\StreamIP.sys
22:26:44.0343 2232        streamip - ok
22:26:44.0359 2232        swenum          (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys
22:26:44.0437 2232        swenum - ok
22:26:44.0468 2232        swmidi          (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys
22:26:44.0562 2232        swmidi - ok
22:26:44.0578 2232        SwPrv - ok
22:26:44.0578 2232        symc810 - ok
22:26:44.0593 2232        symc8xx - ok
22:26:44.0593 2232        sym_hi - ok
22:26:44.0609 2232        sym_u3 - ok
22:26:44.0625 2232        sysaudio        (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys
22:26:44.0703 2232        sysaudio - ok
22:26:44.0734 2232        SysmonLog      (2903fffa2523926d6219428040dce6b9) C:\WINDOWS\system32\smlogsvc.exe
22:26:44.0828 2232        SysmonLog - ok
22:26:44.0875 2232        TapiSrv        (05903cac4b98908d55ea5774775b382e) C:\WINDOWS\System32\tapisrv.dll
22:26:44.0968 2232        TapiSrv - ok
22:26:44.0968 2232        tbiosdrv - ok
22:26:45.0000 2232        Tcpip          (93ea8d04ec73a85db02eb8805988f733) C:\WINDOWS\system32\DRIVERS\tcpip.sys
22:26:45.0109 2232        Tcpip - ok
22:26:45.0125 2232        TDPIPE          (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys
22:26:45.0218 2232        TDPIPE - ok
22:26:45.0218 2232        TDTCP          (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys
22:26:45.0312 2232        TDTCP - ok
22:26:45.0312 2232        TermDD          (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys
22:26:45.0406 2232        TermDD - ok
22:26:45.0453 2232        TermService    (b7de02c863d8f5a005a7bf375375a6a4) C:\WINDOWS\System32\termsrv.dll
22:26:45.0546 2232        TermService - ok
22:26:45.0562 2232        tgsrvc_smartagent - ok
22:26:45.0578 2232        Themes          (40602ebfbe06aa075c8e4560743f6883) C:\WINDOWS\System32\shsvcs.dll
22:26:45.0656 2232        Themes - ok
22:26:45.0687 2232        TlntSvr        (03681a1ce77f51586903869a5ab1deab) C:\WINDOWS\System32\tlntsvr.exe
22:26:45.0765 2232        TlntSvr - ok
22:26:45.0781 2232        TosIde - ok
22:26:45.0796 2232        TrkWks          (626504572b175867f30f3215c04b3e2f) C:\WINDOWS\system32\trkwks.dll
22:26:45.0890 2232        TrkWks - ok
22:26:45.0906 2232        Udfs            (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys
22:26:46.0000 2232        Udfs - ok
22:26:46.0000 2232        ultra - ok
22:26:46.0046 2232        Update          (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys
22:26:46.0156 2232        Update - ok
22:26:46.0187 2232        upnphost        (1dfd8975d8c89214b98d9387c1125b49) C:\WINDOWS\System32\upnphost.dll
22:26:46.0281 2232        upnphost - ok
22:26:46.0296 2232        UPS            (9b11e6118958e63e1fef129466e2bda7) C:\WINDOWS\System32\ups.exe
22:26:46.0390 2232        UPS - ok
22:26:46.0390 2232        upsentry_smart - ok
22:26:46.0406 2232        USB28xxBGA - ok
22:26:46.0421 2232        usbaudio        (e919708db44ed8543a7c017953148330) C:\WINDOWS\system32\drivers\usbaudio.sys
22:26:46.0500 2232        usbaudio - ok
22:26:46.0515 2232        usbccgp        (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys
22:26:46.0609 2232        usbccgp - ok
22:26:46.0625 2232        usbehci        (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys
22:26:46.0703 2232        usbehci - ok
22:26:46.0718 2232        usbhub          (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys
22:26:46.0796 2232        usbhub - ok
22:26:46.0828 2232        usbprint        (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys
22:26:46.0906 2232        usbprint - ok
22:26:46.0921 2232        usbscan        (a0b8cf9deb1184fbdd20784a58fa75d4) C:\WINDOWS\system32\DRIVERS\usbscan.sys
22:26:47.0000 2232        usbscan - ok
22:26:47.0015 2232        USBSTOR        (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
22:26:47.0093 2232        USBSTOR - ok
22:26:47.0125 2232        usbuhci        (26496f9dee2d787fc3e61ad54821ffe6) C:\WINDOWS\system32\DRIVERS\usbuhci.sys
22:26:47.0203 2232        usbuhci - ok
22:26:47.0203 2232        vc5secs - ok
22:26:47.0218 2232        VClone          (2cc2660b3ec3434c88d2c808dd7937d4) C:\WINDOWS\system32\DRIVERS\VClone.sys
22:26:47.0234 2232        VClone ( UnsignedFile.Multi.Generic ) - warning
22:26:47.0234 2232        VClone - detected UnsignedFile.Multi.Generic (1)
22:26:47.0250 2232        VgaSave        (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys
22:26:47.0343 2232        VgaSave - ok
22:26:47.0359 2232        viaagp1        (4b039bbd037b01f5db5a144c837f283a) C:\WINDOWS\system32\DRIVERS\viaagp1.sys
22:26:47.0375 2232        viaagp1 - ok
22:26:47.0390 2232        ViaIde          (a5d8b6c8d43786d4215c1df6fab0aae0) C:\WINDOWS\system32\DRIVERS\viaidexp.sys
22:26:47.0390 2232        ViaIde - ok
22:26:47.0406 2232        viasraid        (ebe101c01d80a42868f57b327be1b564) C:\WINDOWS\system32\DRIVERS\viasraid.sys
22:26:47.0421 2232        viasraid - ok
22:26:47.0437 2232        VICESYS - ok
22:26:47.0437 2232        VolSnap        (a5a712f4e880874a477af790b5186e1d) C:\WINDOWS\system32\drivers\VolSnap.sys
22:26:47.0531 2232        VolSnap - ok
22:26:47.0531 2232        VRcore - ok
22:26:47.0578 2232        vsdatant        (0354ba3a5ba5e28cc247eb5f5dd8793c) C:\WINDOWS\system32\vsdatant.sys
22:26:47.0609 2232        vsdatant - ok
22:26:47.0640 2232        VSS            (68f106273be29e7b7ef8266977268e78) C:\WINDOWS\System32\vssvc.exe
22:26:47.0734 2232        VSS - ok
22:26:47.0750 2232        w200mgmt - ok
22:26:47.0781 2232        W32Time        (7b353059e665f8b7ad2bbeaef597cf45) C:\WINDOWS\System32\w32time.dll
22:26:47.0890 2232        W32Time - ok
22:26:47.0906 2232        W700mgmt - ok
22:26:47.0921 2232        Wanarp          (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys
22:26:48.0000 2232        Wanarp - ok
22:26:48.0000 2232        wanatw - ok
22:26:48.0046 2232        Wdf01000        (fd47474bd21794508af449d9d91af6e6) C:\WINDOWS\system32\DRIVERS\Wdf01000.sys
22:26:48.0093 2232        Wdf01000 - ok
22:26:48.0093 2232        WDICA - ok
22:26:48.0125 2232        wdmaud          (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys
22:26:48.0203 2232        wdmaud - ok
22:26:48.0218 2232        WebClient      (81727c9873e3905a2ffc1ebd07265002) C:\WINDOWS\System32\webclnt.dll
22:26:48.0312 2232        WebClient - ok
22:26:48.0328 2232        wencrservice - ok
22:26:48.0328 2232        wfxsvc - ok
22:26:48.0390 2232        winmgmt        (6f3f3973d97714cc5f906a19fe883729) C:\WINDOWS\system32\wbem\WMIsvc.dll
22:26:48.0484 2232        winmgmt - ok
22:26:48.0500 2232        winsshd - ok
22:26:48.0515 2232        wlancig - ok
22:26:48.0531 2232        WmdmPmSN        (c51b4a5c05a5475708e3c81c7765b71d) C:\WINDOWS\system32\MsPMSNSv.dll
22:26:48.0578 2232        WmdmPmSN - ok
22:26:48.0625 2232        Wmi            (53e1ccf332a2f40b5e08476921cd8b44) C:\WINDOWS\System32\advapi32.dll
22:26:48.0718 2232        Wmi - ok
22:26:48.0734 2232        WmiApSrv        (93908111ba57a6e60ec2fa2de202105c) C:\WINDOWS\System32\wbem\wmiapsrv.exe
22:26:48.0843 2232        WmiApSrv - ok
22:26:48.0859 2232        WpdUsb          (cf4def1bf66f06964dc0d91844239104) C:\WINDOWS\system32\Drivers\wpdusb.sys
22:26:48.0875 2232        WpdUsb - ok
22:26:48.0875 2232        WSTCODEC        (c98b39829c2bbd34e454150633c62c78) C:\WINDOWS\system32\DRIVERS\WSTCODEC.SYS
22:26:48.0968 2232        WSTCODEC - ok
22:26:48.0984 2232        wuauserv        (7b4fe05202aa6bf9f4dfd0e6a0d8a085) C:\WINDOWS\system32\wuauserv.dll
22:26:49.0078 2232        wuauserv - ok
22:26:49.0093 2232        WudfPf          (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys
22:26:49.0125 2232        WudfPf - ok
22:26:49.0140 2232        WudfRd          (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys
22:26:49.0156 2232        WudfRd - ok
22:26:49.0171 2232        WudfSvc        (05231c04253c5bc30b26cbaae680ed89) C:\WINDOWS\System32\WUDFSvc.dll
22:26:49.0187 2232        WudfSvc - ok
22:26:49.0203 2232        xaudioservice - ok
22:26:49.0218 2232        xmlprov        (0ada34871a2e1cd2caafed1237a47750) C:\WINDOWS\System32\xmlprov.dll
22:26:49.0328 2232        xmlprov - ok
22:26:49.0359 2232        yukonwxp        (a8d429e2268792638cffc57552c5e736) C:\WINDOWS\system32\DRIVERS\yk51x86.sys
22:26:49.0406 2232        yukonwxp - ok
22:26:49.0421 2232        ZSMC302        (0bae542716cf2ef4b453392a5da28278) C:\WINDOWS\system32\Drivers\usbvm302.sys
22:26:49.0453 2232        ZSMC302 - ok
22:26:49.0468 2232        ZY202_XP - ok
22:26:49.0500 2232        MBR (0x1B8)    (72b8ce41af0de751c946802b3ed844b4) \Device\Harddisk0\DR0
22:26:49.0968 2232        \Device\Harddisk0\DR0 - ok
22:26:50.0000 2232        MBR (0x1B8)    (973e9ba32fdbb305c552ed3e1ebf0686) \Device\Harddisk1\DR4
22:26:50.0093 2232        \Device\Harddisk1\DR4 - ok
22:26:50.0093 2232        Boot (0x1200)  (90e78075b49377c8abfe714e3ab5e585) \Device\Harddisk0\DR0\Partition0
22:26:50.0109 2232        \Device\Harddisk0\DR0\Partition0 - ok
22:26:50.0125 2232        Boot (0x1200)  (c56af859c8cdccf9809e475466567fcc) \Device\Harddisk0\DR0\Partition1
22:26:50.0125 2232        \Device\Harddisk0\DR0\Partition1 - ok
22:26:50.0140 2232        Boot (0x1200)  (fb0246fb6dee9af0e59dec7daf3af378) \Device\Harddisk0\DR0\Partition2
22:26:50.0140 2232        \Device\Harddisk0\DR0\Partition2 - ok
22:26:50.0156 2232        Boot (0x1200)  (be3b1d04c0d6a9acdcbb19911fef43a1) \Device\Harddisk1\DR4\Partition0
22:26:50.0156 2232        \Device\Harddisk1\DR4\Partition0 - ok
22:26:50.0156 2232        ============================================================
22:26:50.0156 2232        Scan finished
22:26:50.0156 2232        ============================================================
22:26:50.0265 2300        Detected object count: 76
22:26:50.0265 2300        Actual detected object count: 76
22:29:35.0406 2300        a016mdm ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0406 2300        a016mdm ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0406 2300        acdservice ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0406 2300        acdservice ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0421 2300        AdfuUd ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0421 2300        AdfuUd ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0421 2300        AFD ( Virus.Win32.ZAccess.g ) - skipped by user
22:29:35.0421 2300        AFD ( Virus.Win32.ZAccess.g ) - User select action: Skip
22:29:35.0421 2300        agentsrv ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0421 2300        agentsrv ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0421 2300        aslm75 ( UnsignedFile.Multi.Generic ) - skipped by user
22:29:35.0421 2300        aslm75 ( UnsignedFile.Multi.Generic ) - User select action: Skip
22:29:35.0421 2300        astcc ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0421 2300        astcc ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0437 2300        Ati HotKey Poller ( UnsignedFile.Multi.Generic ) - skipped by user
22:29:35.0437 2300        Ati HotKey Poller ( UnsignedFile.Multi.Generic ) - User select action: Skip
22:29:35.0437 2300        ATI Smart ( UnsignedFile.Multi.Generic ) - skipped by user
22:29:35.0437 2300        ATI Smart ( UnsignedFile.Multi.Generic ) - User select action: Skip
22:29:35.0437 2300        ati2mtag ( UnsignedFile.Multi.Generic ) - skipped by user
22:29:35.0437 2300        ati2mtag ( UnsignedFile.Multi.Generic ) - User select action: Skip
22:29:35.0437 2300        bdfsfltr ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0437 2300        bdfsfltr ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0453 2300        besclient ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0453 2300        besclient ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0453 2300        bh611 ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0453 2300        bh611 ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0453 2300        bthusb ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0453 2300        bthusb ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0453 2300        BVRPMPR5 ( UnsignedFile.Multi.Generic ) - skipped by user
22:29:35.0453 2300        BVRPMPR5 ( UnsignedFile.Multi.Generic ) - User select action: Skip
22:29:35.0453 2300        c-dillasrv ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0453 2300        c-dillasrv ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0468 2300        CamAv ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0468 2300        CamAv ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0468 2300        ctusfsyn ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0468 2300        ctusfsyn ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0468 2300        CVPNDRVA ( UnsignedFile.Multi.Generic ) - skipped by user
22:29:35.0468 2300        CVPNDRVA ( UnsignedFile.Multi.Generic ) - User select action: Skip
22:29:35.0468 2300        DCamUSBMke ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0468 2300        DCamUSBMke ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0468 2300        digisptiservice ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0468 2300        digisptiservice ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0484 2300        dlartl_n ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0484 2300        dlartl_n ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0484 2300        dnserver32 ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0484 2300        dnserver32 ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0484 2300        DSDrvNT ( UnsignedFile.Multi.Generic ) - skipped by user
22:29:35.0484 2300        DSDrvNT ( UnsignedFile.Multi.Generic ) - User select action: Skip
22:29:35.0484 2300        elbydelay ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0484 2300        elbydelay ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0500 2300        enecbpth ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0500 2300        enecbpth ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0500 2300        ENTECH ( UnsignedFile.Multi.Generic ) - skipped by user
22:29:35.0500 2300        ENTECH ( UnsignedFile.Multi.Generic ) - User select action: Skip
22:29:35.0500 2300        enxpsvr ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0500 2300        enxpsvr ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0500 2300        EPOWER ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0500 2300        EPOWER ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0500 2300        epsonbidirectionalagent ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0500 2300        epsonbidirectionalagent ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0515 2300        FirebirdServerMAGIXInstance ( UnsignedFile.Multi.Generic ) - skipped by user
22:29:35.0515 2300        FirebirdServerMAGIXInstance ( UnsignedFile.Multi.Generic ) - User select action: Skip
22:29:35.0515 2300        FLEXnet Licensing Service ( UnsignedFile.Multi.Generic ) - skipped by user
22:29:35.0515 2300        FLEXnet Licensing Service ( UnsignedFile.Multi.Generic ) - User select action: Skip
22:29:35.0515 2300        framework ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0515 2300        framework ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0515 2300        GameConsoleService ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0515 2300        GameConsoleService ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0515 2300        gs30s ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0515 2300        gs30s ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0531 2300        GTF32BUS ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0531 2300        GTF32BUS ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0531 2300        HpqKbFiltr ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0531 2300        HpqKbFiltr ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0531 2300        hpwirelessmgr ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0531 2300        hpwirelessmgr ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0531 2300        IDriverT ( UnsignedFile.Multi.Generic ) - skipped by user
22:29:35.0531 2300        IDriverT ( UnsignedFile.Multi.Generic ) - User select action: Skip
22:29:35.0531 2300        igateway ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0531 2300        igateway ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0546 2300        imap4d32 ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0546 2300        imap4d32 ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0546 2300        incdrec ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0546 2300        incdrec ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0546 2300        ipodsrv ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0546 2300        ipodsrv ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0546 2300        livesrv ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0546 2300        livesrv ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0562 2300        lktimesync ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0562 2300        lktimesync ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0562 2300        lvselsus ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0562 2300        lvselsus ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0562 2300        mvdcodec ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0562 2300        mvdcodec ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0562 2300        nalntservice ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0562 2300        nalntservice ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0562 2300        netmnt ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0562 2300        netmnt ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0578 2300        NICSer_WPC54G ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0578 2300        NICSer_WPC54G ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0578 2300        NinjaUSB ( UnsignedFile.Multi.Generic ) - skipped by user
22:29:35.0578 2300        NinjaUSB ( UnsignedFile.Multi.Generic ) - User select action: Skip
22:29:35.0578 2300        ntgrip ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0578 2300        ntgrip ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0578 2300        ONSIO ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0578 2300        ONSIO ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0578 2300        oracleorahometnslistener ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0578 2300        oracleorahometnslistener ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0593 2300        PCLEPCI ( UnsignedFile.Multi.Generic ) - skipped by user
22:29:35.0593 2300        PCLEPCI ( UnsignedFile.Multi.Generic ) - User select action: Skip
22:29:35.0593 2300        pcouffin ( UnsignedFile.Multi.Generic ) - skipped by user
22:29:35.0593 2300        pcouffin ( UnsignedFile.Multi.Generic ) - User select action: Skip
22:29:35.0593 2300        pdlncbas ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0593 2300        pdlncbas ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0593 2300        pensup ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0593 2300        pensup ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0593 2300        personalsecuredriveservice ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0593 2300        personalsecuredriveservice ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0593 2300        Pfc ( UnsignedFile.Multi.Generic ) - skipped by user
22:29:35.0593 2300        Pfc ( UnsignedFile.Multi.Generic ) - User select action: Skip
22:29:35.0609 2300        picturetaker ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0609 2300        picturetaker ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0609 2300        proxyserverservice ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0609 2300        proxyserverservice ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0609 2300        rimsptsk ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0609 2300        rimsptsk ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0609 2300        roxupnpserver ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0609 2300        roxupnpserver ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0609 2300        rupsd ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0609 2300        rupsd ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0625 2300        s716obex ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0625 2300        s716obex ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0625 2300        ScFBPNT2 ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0625 2300        ScFBPNT2 ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0625 2300        se2Cnd5 ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0625 2300        se2Cnd5 ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0625 2300        se45mgmt ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0625 2300        se45mgmt ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0625 2300        se45unic ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0625 2300        se45unic ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0640 2300        se59nd5 ( Backdoor.Multi.ZAccess.gen ) - skipped by user
22:29:35.0640 2300        se59nd5 ( Backdoor.Multi.ZAccess.gen ) - User select action: Skip
22:29:35.0640 2300        Sentinel ( UnsignedFile.Multi.Generic ) - skipped by user
22:29:35.0640 2300        Sentinel ( UnsignedFile.Multi.Generic ) - User select action: Skip
22:29:35.0640 2300        sfdrv01 ( UnsignedFile.Multi.Generic ) - skipped by user
22:29:35.0640 2300        sfdrv01 ( UnsignedFile.Multi.Generic ) - User select action: Skip
22:29:35.0640 2300        sfhlp02 ( UnsignedFile.Multi.Generic ) - skipped by user
22:29:35.0640 2300        sfhlp02 ( UnsignedFile.Multi.Generic ) - User select action: Skip
22:29:35.0640 2300        sptd ( LockedFile.Multi.Generic ) - skipped by user
22:29:35.0640 2300        sptd ( LockedFile.Multi.Generic ) - User select action: Skip
22:29:35.0640 2300        VClone ( UnsignedFile.Multi.Generic ) - skipped by user
22:29:35.0640 2300        VClone ( UnsignedFile.Multi.Generic ) - User select action: Skip


Was kann ich als nächstes noch machen?

cosinus 31.05.2012 19:46

Die MovedFiles hast du in den Uploadchannel noch nicht hochgeladen. Oder gab es da Probleme?

schwonz 31.05.2012 20:39

Sorry, vorhin vergessen, weil ich dachte WinXP fährt gar nicht hoch. Hat eben wieder 5min gedauert...

Datei ist jetzt im UploadChannel hochgeladen!

cosinus 31.05.2012 21:08

Bitte nun routinemäßig einen Vollscan mit malwarebytes machen und Log posten. =>ALLE lokalen Datenträger (außer CD/DVD) überprüfen lassen!
Denk daran, dass Malwarebytes vor jedem Scan manuell aktualisiert werden muss! Außerdem müssen alle Funde entfernt werden.

Falls Logs aus älteren Scans mit Malwarebytes vorhanden sind, bitte auch davon alle posten!



ESET Online Scanner

  • Hier findest du eine bebilderte Anleitung zu ESET Online Scanner
  • Lade und starte Eset Online Scanner
  • Setze einen Haken bei Ja, ich bin mit den Nutzungsbedingungen einverstanden und klicke auf Starten.
  • Aktiviere die "Erkennung von eventuell unerwünschten Anwendungen" und wähle folgende Einstellungen.
  • Klicke auf Starten.
  • Die Signaturen werden heruntergeladen, der Scan beginnt automatisch.
  • Klicke am Ende des Suchlaufs auf Fertig stellen.
  • Schließe das Fenster von ESET.
  • Explorer öffnen.
  • C:\Programme\Eset\EsetOnlineScanner\log.txt (bei 64 Bit auch C:\Programme (x86)\Eset\EsetOnlineScanner\log.txt) suchen und mit Deinem Editor öffnen (bebildert).
  • Logfile hier posten.
  • Deinstallation: Systemsteuerung => Software / Programme deinstallieren => Eset Online Scanner V3 entfernen.
  • Manuell folgenden Ordner löschen und Papierkorb leeren => C:\Programme\Eset





Bitte alles nach Möglichkeit hier in CODE-Tags posten.

Wird so gemacht:

[code] hier steht das Log [/code]

Und das ganze sieht dann so aus:

Code:

hier steht das Log

schwonz 31.05.2012 21:50

Leider klappt die Aktualisierung von Malwarebytes nicht. Die letzte Aktualisierung war am 04.04.2012.
Ich lasse jetzt trotzdem den FullScan laufen und werde die Ergebnisse posten.

Gibt es aber ansonsten auch eine Möglichkeit, von einer vertrauenswürdigen Seite die aktuellen Malwarebytes-Virusdatenbank über einen anderen PC herunterzuladen? Ich habe da bei google was gefunden, aber eine 7 MB .exe-Datei erscheint mir nicht sonderlich vertrauenswürdig...

Hier schonmal der Malwarebytes (ohne Update) Log:
Code:

Malwarebytes Anti-Malware (Test) 1.61.0.1400
www.malwarebytes.org

Datenbank Version: v2012.04.04.08

Windows XP Service Pack 3 x86 FAT
Internet Explorer 8.0.6001.18702
Administrator :: PC [Administrator]

Schutz: Aktiviert

01.06.2012 00:48:14
mbam-log-2012-06-01 (01-40-06).txt

Art des Suchlaufs: Vollständiger Suchlauf
Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM
Deaktivierte Suchlaufeinstellungen: P2P
Durchsuchte Objekte: 395844
Laufzeit: 51 Minute(n), 16 Sekunde(n)

Infizierte Speicherprozesse: 0
(Keine bösartigen Objekte gefunden)

Infizierte Speichermodule: 0
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungsschlüssel: 2
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\prh (Trojan.Banker) -> Keine Aktion durchgeführt.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\tst (Trojan.Banker) -> Keine Aktion durchgeführt.

Infizierte Registrierungswerte: 0
(Keine bösartigen Objekte gefunden)

Infizierte Dateiobjekte der Registrierung: 3
HKLM\SOFTWARE\Microsoft\Security Center|AntiVirusDisableNotify (PUM.Disabled.SecurityCenter) -> Bösartig: (1) Gut: (0) -> Keine Aktion durchgeführt.
HKLM\SOFTWARE\Microsoft\Security Center|FirewallDisableNotify (PUM.Disabled.SecurityCenter) -> Bösartig: (1) Gut: (0) -> Keine Aktion durchgeführt.
HKLM\SOFTWARE\Microsoft\Security Center|UpdatesDisableNotify (PUM.Disabled.SecurityCenter) -> Bösartig: (1) Gut: (0) -> Keine Aktion durchgeführt.

Infizierte Verzeichnisse: 0
(Keine bösartigen Objekte gefunden)

Infizierte Dateien: 18
C:\WINDOWS\system32\mcdbus.dll (Rootkit.0Access) -> Keine Aktion durchgeführt.
C:\WINDOWS\system32\opcenum.dll (Rootkit.0Access) -> Keine Aktion durchgeführt.
C:\WINDOWS\assembly\GAC_MSIL\Desktop.ini (Rootkit.0Access) -> Keine Aktion durchgeführt.
C:\WINDOWS\system32\apfiltrservice.dll (Rootkit.0Access) -> Keine Aktion durchgeführt.
C:\WINDOWS\system32\ntsyslog.dll (Rootkit.0Access) -> Keine Aktion durchgeführt.
C:\WINDOWS\system32\cwcspud.dll (Rootkit.0Access) -> Keine Aktion durchgeführt.
C:\WINDOWS\system32\rdpcdd.dll (Rootkit.0Access) -> Keine Aktion durchgeführt.
C:\WINDOWS\system32\xnacc.dll (Rootkit.0Access) -> Keine Aktion durchgeführt.
C:\WINDOWS\system32\enum1394.dll (Rootkit.0Access) -> Keine Aktion durchgeführt.
D:\Installationen\Nero\Vista\Ahead.Nero.v7.5.9.0\keygen.exe (RiskWare.Tool.CK) -> Keine Aktion durchgeführt.
F:\S.T.A.L.K.E.R. - Shadow of Chernobyl\trainer.exe (Trojan.Downloader) -> Keine Aktion durchgeführt.
C:\WINDOWS\system32\appconf32.exe (Trojan.Banker) -> Keine Aktion durchgeführt.
C:\WINDOWS\system32\AcroIEHelpe.txt (Malware.Trace) -> Keine Aktion durchgeführt.

C:\WINDOWS\system32\ups.dll (Trojan.Agent) -> Keine Aktion durchgeführt.
C:\Dokumente und Einstellungen\Administrator\Lokale Einstellungen\Temp\{E9C1E1AC-C9B2-4c85-94DE-9C1518918D02}.tlb (Rootkit.Zeroaccess) -> Keine Aktion

durchgeführt.
C:\Dokumente und Einstellungen\LocalService\Lokale Einstellungen\Temp\{E9C1E1AC-C9B2-4c85-94DE-9C1518918D02}.tlb (Rootkit.Zeroaccess) -> Keine Aktion

durchgeführt.
C:\Dokumente und Einstellungen\NetworkService\Lokale Einstellungen\Temp\{E9C1E1AC-C9B2-4c85-94DE-9C1518918D02}.tlb (Rootkit.Zeroaccess) -> Keine Aktion

durchgeführt.
C:\WINDOWS\Temp\{E9C1E1AC-C9B2-4c85-94DE-9C1518918D02}.tlb (Rootkit.Zeroaccess) -> Keine Aktion durchgeführt.

(Ende)

Ältere Logs habe ich leider nicht.

Ich habe mit dem Rechner keine Internetverbindung mehr. Deswegen konnte ich auch keine Updates für Malwarebytes herunterladen. Unten rechts in der Taskleiste steht jetzt immer das Zeichen für "Netzwerkadresse beziehen".
Im Internet Explorer kann ich also auch auf keine Adresse zugreifen und daher auch nicht den ESET Test machen...

Was kann ich tun?

cosinus 01.06.2012 11:46

Zitat:

D:\Installationen\Nero\Vista\Ahead.Nero.v7.5.9.0\keygen.exe (RiskWare.Tool.CK)
Dein System ist hinüber, hier eine Ursache!

Zitat:

Gibt es aber ansonsten auch eine Möglichkeit, von einer vertrauenswürdigen Seite
Warum hast du denn illegale Software (keygen) drauf wenn du sonst so viel Wert auf etwas Vertrauenswürdiges legst?

:pfui:

Siehe auch => http://www.trojaner-board.de/95393-c...-software.html

Falls wir Hinweise auf illegal erworbene Software finden, werden wir den Support ohne jegliche Diskussion beenden.

Cracks/Keygens sind zu 99,9% gefährliche Schädlinge, mit denen man nicht spaßen sollte. Ausserdem sind diese illegal und wir unterstützen die Verwendung von geklauter Software nicht. Somit beschränkt sich der Support auf Anleitung zur kompletten Neuinstallation!!

Dass illegale Cracks und Keygens im Wesentlichen dazu dienen, Malware zu verbreiten ist kein Geheimnis und muss jedem klar sein!


In Zukunft Finger weg von: Softonic, Registry-Bereinigern und illegalem Zeugs Cracks/Keygens/Serials

schwonz 01.06.2012 14:51

ok, das klang ja nach einer vernichtenden Aussage "System ist hinüber".

War mir nicht bewusst, dass ich da einen Keygen an Bord habe, aber so ist das nun mal, wenn man sich Software von einem Freund installieren lässt.

Egal, Cosinus, trotzdem vielen Dank für die Mühe bis hierhin! Ihr seid super!

cosinus 01.06.2012 15:02

Naja, hinüber zB deswegen => C:\WINDOWS\system32\mcdbus.dll (Rootkit.0Access)
Mit dme 0Access ist nicht zu spaßen und ob Windows selbst nach einer erfolgreichen Bereinigung noch tadellos läuft ist die nächste Frage

Zitat:

wenn man sich Software von einem Freund installieren lässt.
Hm naja, du solltest doch aufpassen und nachfragen was angebliche Freunde mit deinem Rechner anstellen wollen


Alle Zeitangaben in WEZ +1. Es ist jetzt 14:41 Uhr.

Copyright ©2000-2025, Trojaner-Board


Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55