ho trovato il logo di emsisoft:
Emsisoft Anti-Malware - Versione 6.0
Ultimo aggiornamento: 13/12/2011 14:31:46
Impostazioni scansione:
Tipo scansione: Completa
Oggetti: Rootkit, Memoria, Tracce, C:\
Archivio scansioni: On
Scansione ADS: On
Scansione avviata: 13/12/2011 14:33:49
c:\programmi\dyngate rilevati: Trace.File.dyngate!E1
c:\programmi\enigma software group rilevati: Trace.File.spyhunter!E1
Value: hkey_local_machine\software\enigmasoftwaregroup\spyhunter\spyhunterconfig
homepage_flags rilevati: Trace.Registry.spyhunter!E1
Value: hkey_local_machine\software\enigmasoftwaregroup\spyhunter\spyhunterconfig
ie_homepage rilevati: Trace.Registry.spyhunter!E1
c:\programmi\dyngate\license.txt rilevati: Trace.File.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
clientic rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
apppath rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
clientid rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
clientidmaster rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
connected rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
gateway rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
gatewayallowed rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
gatewayname rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
internallistenport rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
keytransfer rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
licensetype rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
licenseverifier rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
listenhttp rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
logging rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
proxy_exceptions rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
proxy_ip rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
proxy_type rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
serverpassword rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
showtraymenu rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
totalsessions rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
totaltraffickilobytes rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
usedns rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
useudp rilevati: Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
version rilevati: Trace.Registry.dyngate!E1
Key: hkey_classes_root\.vnc rilevati: Trace.Registry.vnc.commoncomponents!E1
C:\System Volume Information\_restore{7A57BB11-3DA9-445B-AB95-BFFDFDDA690B}\RP1\A0000087.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\System Volume Information\_restore{7A57BB11-3DA9-445B-AB95-BFFDFDDA690B}\RP1\A0000083.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\System Volume Information\_restore{7A57BB11-3DA9-445B-AB95-BFFDFDDA690B}\RP1\A0000081.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\System Volume Information\_restore{7A57BB11-3DA9-445B-AB95-BFFDFDDA690B}\RP1\A0000088.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\System Volume Information\_restore{7A57BB11-3DA9-445B-AB95-BFFDFDDA690B}\RP1\A0000102.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\System Volume Information\_restore{7A57BB11-3DA9-445B-AB95-BFFDFDDA690B}\RP1\A0000096.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\System Volume Information\_restore{7A57BB11-3DA9-445B-AB95-BFFDFDDA690B}\RP1\A0000103.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\Sigla\Sigla_Cronta\inquiero.exe rilevati: Virus.Win32.Heur!E2
C:\Sigla\siglapp_mirem_3.173\inquiero.exe rilevati: Virus.Win32.Heur!E2
C:\Sigla\MYGDS_rizzi_sede\inquiero.exe rilevati: Virus.Win32.Heur!E2
C:\MYGDS_tutto\MYGDS_FEA\inquiero.exe rilevati: Virus.Win32.Heur!E2
C:\MYGDS_tutto\MYGDS_DUOMO\inquiero.exe rilevati: Virus.Win32.Heur!E2
C:\MYGDS_tutto\MYGDS_caccia_SEDE\inquiero.exe rilevati: Virus.Win32.Heur!E2
C:\fnetBonafe\FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\fnetBonafe\FNETSClient.rar -> FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\fnetBonafe\fnet.rar -> FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\fnetBonafe\FNETSClient.exe27_2 rilevati: Trojan.Crypt.Delf.F!E2
C:\fnetBonafe\old version\FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\fnetBonafe\old version\FNETSLocal.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\fnet\fnet.7z -> FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\fnet\fnetETHOS.old.rar -> FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\fnet\FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\fnet\old version\FNETSLocal.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\fnet\old version\FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\fnet\fnetETHOS.old\FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\Documents and Settings\Diego.PC-DIEGO\Desktop\Scambio\fnet.rar -> FNET\FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\Documents and Settings\Diego.PC-DIEGO\Desktop\Scambio\D_TEST\fnet\fnetETHOS.old.rar -> FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\Documents and Settings\Diego.PC-DIEGO\Desktop\Scambio\D_TEST\d_test.rar -> fnet\fnetETHOS.old\FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\Documents and Settings\Diego.PC-DIEGO\Desktop\Scambio\D_TEST\d_test.rar -> fnet\fnetETHOS.old.rar -> FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\Documents and Settings\Diego.PC-DIEGO\Desktop\Scambio\D_TEST\d_test.rar -> fnet\fnetETHOS.old.rar rilevati: Trojan.Crypt.Delf.F!E2
C:\Documents and Settings\Diego.PC-DIEGO\Desktop\Scambio\D_TEST\d_test.rar -> fnet\FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\Documents and Settings\Diego.PC-DIEGO\Desktop\Scambio\D_TEST\d_test.rar -> fnet\old version\FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\Documents and Settings\Diego.PC-DIEGO\Desktop\Scambio\D_TEST\d_test.rar -> fnet\old version\FNETSLocal.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\Documents and Settings\Diego.PC-DIEGO\Desktop\Logs & Releases\Logs\Rossetti\000\MYGDS_gdom.rar -> inquiero.exe rilevati: Virus.Win32.Heur!E2
Scansionati 619792
Rilevato 64
Fine scansione: 13/12/2011 16:29:50
Tempo scansione: 1:56:01
Key: hkey_classes_root\.vnc In quarantena Trace.Registry.vnc.commoncomponents!E1
Value: hkey_local_machine\software\dyngate\router
clientic In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
apppath In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
clientid In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
clientidmaster In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
connected In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
gateway In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
gatewayallowed In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
gatewayname In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
internallistenport In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
keytransfer In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
licensetype In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
licenseverifier In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
listenhttp In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
logging In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
proxy_exceptions In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
proxy_ip In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
proxy_type In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
serverpassword In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
showtraymenu In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
totalsessions In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
totaltraffickilobytes In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
usedns In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
useudp In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\dyngate\router
version In quarantena Trace.Registry.dyngate!E1
Value: hkey_local_machine\software\enigmasoftwaregroup\spyhunter\spyhunterconfig
homepage_flags In quarantena Trace.Registry.spyhunter!E1
Value: hkey_local_machine\software\enigmasoftwaregroup\spyhunter\spyhunterconfig
ie_homepage In quarantena Trace.Registry.spyhunter!E1
c:\programmi\enigma software group In quarantena Trace.File.spyhunter!E1
c:\programmi\dyngate In quarantena Trace.File.dyngate!E1
c:\programmi\dyngate\license.txt In quarantena Trace.File.dyngate!E1
In quarantena 30
Ultimo aggiornamento: 13/12/2011 14:31:46
Impostazioni scansione:
Tipo scansione: Completa
Oggetti: Rootkit, Memoria, Tracce, C:\
Archivio scansioni: On
Scansione ADS: On
Scansione avviata: 13/12/2011 14:33:49
c:\programmi\dyngate rilevati: Trace.File.dyngate!E1
c:\programmi\enigma software group rilevati: Trace.File.spyhunter!E1
Value: hkey_local_machine\software\enigmasoftwaregroup\spyhunter\spyhunterconfig

Value: hkey_local_machine\software\enigmasoftwaregroup\spyhunter\spyhunterconfig

c:\programmi\dyngate\license.txt rilevati: Trace.File.dyngate!E1
Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Key: hkey_classes_root\.vnc rilevati: Trace.Registry.vnc.commoncomponents!E1
C:\System Volume Information\_restore{7A57BB11-3DA9-445B-AB95-BFFDFDDA690B}\RP1\A0000087.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\System Volume Information\_restore{7A57BB11-3DA9-445B-AB95-BFFDFDDA690B}\RP1\A0000083.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\System Volume Information\_restore{7A57BB11-3DA9-445B-AB95-BFFDFDDA690B}\RP1\A0000081.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\System Volume Information\_restore{7A57BB11-3DA9-445B-AB95-BFFDFDDA690B}\RP1\A0000088.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\System Volume Information\_restore{7A57BB11-3DA9-445B-AB95-BFFDFDDA690B}\RP1\A0000102.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\System Volume Information\_restore{7A57BB11-3DA9-445B-AB95-BFFDFDDA690B}\RP1\A0000096.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\System Volume Information\_restore{7A57BB11-3DA9-445B-AB95-BFFDFDDA690B}\RP1\A0000103.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\Sigla\Sigla_Cronta\inquiero.exe rilevati: Virus.Win32.Heur!E2
C:\Sigla\siglapp_mirem_3.173\inquiero.exe rilevati: Virus.Win32.Heur!E2
C:\Sigla\MYGDS_rizzi_sede\inquiero.exe rilevati: Virus.Win32.Heur!E2
C:\MYGDS_tutto\MYGDS_FEA\inquiero.exe rilevati: Virus.Win32.Heur!E2
C:\MYGDS_tutto\MYGDS_DUOMO\inquiero.exe rilevati: Virus.Win32.Heur!E2
C:\MYGDS_tutto\MYGDS_caccia_SEDE\inquiero.exe rilevati: Virus.Win32.Heur!E2
C:\fnetBonafe\FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\fnetBonafe\FNETSClient.rar -> FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\fnetBonafe\fnet.rar -> FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\fnetBonafe\FNETSClient.exe27_2 rilevati: Trojan.Crypt.Delf.F!E2
C:\fnetBonafe\old version\FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\fnetBonafe\old version\FNETSLocal.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\fnet\fnet.7z -> FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\fnet\fnetETHOS.old.rar -> FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\fnet\FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\fnet\old version\FNETSLocal.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\fnet\old version\FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\fnet\fnetETHOS.old\FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\Documents and Settings\Diego.PC-DIEGO\Desktop\Scambio\fnet.rar -> FNET\FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\Documents and Settings\Diego.PC-DIEGO\Desktop\Scambio\D_TEST\fnet\fnetETHOS.old.rar -> FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\Documents and Settings\Diego.PC-DIEGO\Desktop\Scambio\D_TEST\d_test.rar -> fnet\fnetETHOS.old\FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\Documents and Settings\Diego.PC-DIEGO\Desktop\Scambio\D_TEST\d_test.rar -> fnet\fnetETHOS.old.rar -> FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\Documents and Settings\Diego.PC-DIEGO\Desktop\Scambio\D_TEST\d_test.rar -> fnet\fnetETHOS.old.rar rilevati: Trojan.Crypt.Delf.F!E2
C:\Documents and Settings\Diego.PC-DIEGO\Desktop\Scambio\D_TEST\d_test.rar -> fnet\FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\Documents and Settings\Diego.PC-DIEGO\Desktop\Scambio\D_TEST\d_test.rar -> fnet\old version\FNETSClient.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\Documents and Settings\Diego.PC-DIEGO\Desktop\Scambio\D_TEST\d_test.rar -> fnet\old version\FNETSLocal.exe rilevati: Trojan.Crypt.Delf.F!E2
C:\Documents and Settings\Diego.PC-DIEGO\Desktop\Logs & Releases\Logs\Rossetti\000\MYGDS_gdom.rar -> inquiero.exe rilevati: Virus.Win32.Heur!E2
Scansionati 619792
Rilevato 64
Fine scansione: 13/12/2011 16:29:50
Tempo scansione: 1:56:01
Key: hkey_classes_root\.vnc In quarantena Trace.Registry.vnc.commoncomponents!E1
Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\dyngate\router

Value: hkey_local_machine\software\enigmasoftwaregroup\spyhunter\spyhunterconfig

Value: hkey_local_machine\software\enigmasoftwaregroup\spyhunter\spyhunterconfig

c:\programmi\enigma software group In quarantena Trace.File.spyhunter!E1
c:\programmi\dyngate In quarantena Trace.File.dyngate!E1
c:\programmi\dyngate\license.txt In quarantena Trace.File.dyngate!E1
In quarantena 30
TDSSKiller non mi ha trovato nulla né minaccioso né sospettoso.
Invece per quanto riguarda GMER, l'ho settato, fatto partire, e si blocca sulla scansione di C:\windows\drivers\sentynel.sys (se non sbaglio) provo a riavviare il pc e lanciare nuovamente la scansione quella lì.