Hallo
habe das Gefühl das ich nicht alleine bin mit mein lapi...
wäre toll wenn sich mal einer diese log-datei anschauen könnte und mich entweder beruhigen kann oder mir im fall der fälle helfen kann es wieder los zu werden
Code:
Alles auswählen Aufklappen ATTFilter
GMER 2.1.19357 - hxxp://www.gmer.net
Rootkit scan 2015-11-13 13:30:47
Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP2T0L0-4 WDC_WD1600BEVT-22ZCT0 rev.11.01A11 149,05GB
Running: Gmer-19357.exe; Driver: C:\Users\Leon\AppData\Local\Temp\pwtdrpow.sys
---- Kernel code sections - GMER 2.1 ----
.text C:\Windows\System32\win32k.sys!W32pServiceTable fffff96000125200 7 bytes [80, 65, F3, FF, 41, 73, F0]
.text C:\Windows\System32\win32k.sys!W32pServiceTable + 8 fffff96000125208 3 bytes [C0, 06, 02]
---- User code sections - GMER 2.1 ----
.text C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe[1076] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000074ad1401 2 bytes JMP 74d8b21b C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe[1076] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000074ad1419 2 bytes JMP 74d8b346 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe[1076] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000074ad1431 2 bytes JMP 74e08fd1 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe[1076] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 0000000074ad144a 2 bytes CALL 74d6489d C:\Windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe[1076] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 0000000074ad14dd 2 bytes JMP 74e088c4 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe[1076] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 0000000074ad14f5 2 bytes JMP 74e08aa0 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe[1076] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 0000000074ad150d 2 bytes JMP 74e087ba C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe[1076] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000074ad1525 2 bytes JMP 74e08b8a C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe[1076] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 0000000074ad153d 2 bytes JMP 74d7fca8 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe[1076] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000074ad1555 2 bytes JMP 74d868ef C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe[1076] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 0000000074ad156d 2 bytes JMP 74e09089 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe[1076] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000074ad1585 2 bytes JMP 74e08bea C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe[1076] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 0000000074ad159d 2 bytes JMP 74e0877e C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe[1076] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 0000000074ad15b5 2 bytes JMP 74d7fd41 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe[1076] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 0000000074ad15cd 2 bytes JMP 74d8b2dc C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe[1076] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 0000000074ad16b2 2 bytes JMP 74e08f4c C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe[1076] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 0000000074ad16bd 2 bytes JMP 74e08713 C:\Windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\QIP 2012\qip.exe[3356] C:\Windows\syswow64\kernel32.dll!CreateThread + 28 0000000074d634a1 4 bytes {CALL 0xffffffff8b6f0948}
.text C:\Users\Leon\Downloads\Gmer-19357.exe[2728] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000074ad1401 2 bytes JMP 74d8b21b C:\Windows\syswow64\kernel32.dll
.text C:\Users\Leon\Downloads\Gmer-19357.exe[2728] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000074ad1419 2 bytes JMP 74d8b346 C:\Windows\syswow64\kernel32.dll
.text C:\Users\Leon\Downloads\Gmer-19357.exe[2728] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000074ad1431 2 bytes JMP 74e08fd1 C:\Windows\syswow64\kernel32.dll
.text C:\Users\Leon\Downloads\Gmer-19357.exe[2728] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 0000000074ad144a 2 bytes CALL 74d6489d C:\Windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Users\Leon\Downloads\Gmer-19357.exe[2728] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 0000000074ad14dd 2 bytes JMP 74e088c4 C:\Windows\syswow64\kernel32.dll
.text C:\Users\Leon\Downloads\Gmer-19357.exe[2728] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 0000000074ad14f5 2 bytes JMP 74e08aa0 C:\Windows\syswow64\kernel32.dll
.text C:\Users\Leon\Downloads\Gmer-19357.exe[2728] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 0000000074ad150d 2 bytes JMP 74e087ba C:\Windows\syswow64\kernel32.dll
.text C:\Users\Leon\Downloads\Gmer-19357.exe[2728] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000074ad1525 2 bytes JMP 74e08b8a C:\Windows\syswow64\kernel32.dll
.text C:\Users\Leon\Downloads\Gmer-19357.exe[2728] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 0000000074ad153d 2 bytes JMP 74d7fca8 C:\Windows\syswow64\kernel32.dll
.text C:\Users\Leon\Downloads\Gmer-19357.exe[2728] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000074ad1555 2 bytes JMP 74d868ef C:\Windows\syswow64\kernel32.dll
.text C:\Users\Leon\Downloads\Gmer-19357.exe[2728] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 0000000074ad156d 2 bytes JMP 74e09089 C:\Windows\syswow64\kernel32.dll
.text C:\Users\Leon\Downloads\Gmer-19357.exe[2728] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000074ad1585 2 bytes JMP 74e08bea C:\Windows\syswow64\kernel32.dll
.text C:\Users\Leon\Downloads\Gmer-19357.exe[2728] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 0000000074ad159d 2 bytes JMP 74e0877e C:\Windows\syswow64\kernel32.dll
.text C:\Users\Leon\Downloads\Gmer-19357.exe[2728] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 0000000074ad15b5 2 bytes JMP 74d7fd41 C:\Windows\syswow64\kernel32.dll
.text C:\Users\Leon\Downloads\Gmer-19357.exe[2728] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 0000000074ad15cd 2 bytes JMP 74d8b2dc C:\Windows\syswow64\kernel32.dll
.text C:\Users\Leon\Downloads\Gmer-19357.exe[2728] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 0000000074ad16b2 2 bytes JMP 74e08f4c C:\Windows\syswow64\kernel32.dll
.text C:\Users\Leon\Downloads\Gmer-19357.exe[2728] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 0000000074ad16bd 2 bytes JMP 74e08713 C:\Windows\syswow64\kernel32.dll
---- Kernel IAT/EAT - GMER 2.1 ----
IAT C:\Windows\System32\win32k.sys[ntoskrnl.exe!KeUserModeCallback] [fffff88001944824] \SystemRoot\system32\DRIVERS\360Box64.sys [.text]
---- Threads - GMER 2.1 ----
Thread C:\Windows\System32\svchost.exe [960:2092] 000007fef63544d0
Thread C:\Windows\System32\svchost.exe [960:2968] 000007fef6dd89b8
Thread C:\Windows\System32\svchost.exe [960:3820] 000007fef90f3efc
Thread C:\Windows\System32\svchost.exe [960:3512] 000007fef35d8a4c
Thread C:\Windows\system32\svchost.exe [1016:3388] 000007fefad84164
Thread C:\Windows\system32\svchost.exe [1016:3400] 000007fef6281ab0
Thread C:\Windows\system32\svchost.exe [1132:2800] 000007fef3450098
Thread C:\Windows\system32\svchost.exe [1132:2692] 000007fef6f05170
Thread C:\Windows\System32\spoolsv.exe [1432:2192] 000007fef3b810c8
Thread C:\Windows\System32\spoolsv.exe [1432:2324] 000007fef3b46144
Thread C:\Windows\System32\spoolsv.exe [1432:2188] 000007fefab25fd0
Thread C:\Windows\System32\spoolsv.exe [1432:2524] 000007fef3b23438
Thread C:\Windows\System32\spoolsv.exe [1432:1796] 000007fefab263ec
Thread C:\Windows\System32\spoolsv.exe [1432:1520] 000007fef6205e5c
Thread C:\Windows\system32\taskhost.exe [1544:2100] 000007fef9442740
Thread C:\Windows\system32\taskhost.exe [1544:2116] 000007fef8e11010
Thread C:\Windows\system32\taskhost.exe [1544:3972] 000007fef6f05170
Thread C:\Windows\System32\svchost.exe [2632:804] 000007fef77e9688
Thread C:\Windows\System32\svchost.exe [3768:3528] 000007fef6f05170
---- Processes - GMER 2.1 ----
Library C:\??\C:\Program Files (x86)\360\Total Security\safemon\SafeWrapper.dll (*** suspicious ***) @ C:\Windows\Explorer.EXE [1808] 0000000071e20000
---- Registry - GMER 2.1 ----
Reg HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted@C:\Program Files (x86)\SOFTONIC INTERNACIONAL S.A. \xa9 1997-2015\Windows_Repair_Professional\tweaking.com_windows_repair_aio_setup.exe 1
---- EOF - GMER 2.1 ----