nescio180 | 10.03.2013 20:12 | Hallo Matthias,
vielen Dank für die schnelle Antwort.
gmer ist beim ersten mal abgestüzt, kein bluescreen, nur das Programm ist abgestürzt. Habe es dann nochmal ohne den Haken bei "Devices" laufen lassen. Dann hats geklappt.
OTL und Extras log waren zu lang, deshalb im Anhang in einer rar.
defogger log: Code:
defogger_disable by jpshortstuff (23.02.10.1)
Log created at 20:39 on 08/03/2013 (***)
Checking for autostart values...
HKCU\~\Run values retrieved.
HKLM\~\Run values retrieved.
Checking for services/drivers...
-=E.O.F=-
gmer log:
GMER Logfile: Code:
GMER 2.1.19155 - hxxp://www.gmer.net
Rootkit scan 2013-03-10 19:55:51
Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1 TOSHIBA_ rev.GJ00 465,76GB
Running: gmer_2.1.19155.exe; Driver: C:\Users\***\AppData\Local\Temp\ugtyrpod.sys
---- User code sections - GMER 2.1 ----
.text C:\Windows\system32\svchost.exe[364] C:\Windows\SYSTEM32\ntdll.dll!NtClose 0000000077c21400 5 bytes [FF, 25, 00, 00, 00]
.text C:\Windows\system32\svchost.exe[364] C:\Windows\SYSTEM32\ntdll.dll!NtClose + 6 0000000077c21406 8 bytes [30, 07, 41, 01, 00, 00, 00, ...]
.text C:\Windows\system32\svchost.exe[364] C:\Windows\SYSTEM32\ntdll.dll!NtQueryVirtualMemory 0000000077c21540 5 bytes [FF, 25, 00, 00, 00]
.text C:\Windows\system32\svchost.exe[364] C:\Windows\SYSTEM32\ntdll.dll!NtQueryVirtualMemory + 6 0000000077c21546 8 bytes [80, 07, 41, 01, 00, 00, 00, ...]
.text C:\Windows\system32\svchost.exe[364] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 0000000077c21590 5 bytes [FF, 25, 00, 00, 00]
.text C:\Windows\system32\svchost.exe[364] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection + 6 0000000077c21596 8 bytes [D0, 02, 41, 01, 00, 00, 00, ...]
.text C:\Windows\system32\svchost.exe[364] C:\Windows\SYSTEM32\ntdll.dll!NtUnmapViewOfSection 0000000077c215b0 5 bytes [FF, 25, 00, 00, 00]
.text C:\Windows\system32\svchost.exe[364] C:\Windows\SYSTEM32\ntdll.dll!NtUnmapViewOfSection + 6 0000000077c215b6 8 bytes [C0, 03, 41, 01, 00, 00, 00, ...]
.text C:\Windows\system32\svchost.exe[364] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile 0000000077c21640 5 bytes [FF, 25, 00, 00, 00]
.text C:\Windows\system32\svchost.exe[364] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile + 6 0000000077c21646 8 bytes [90, 06, 41, 01, 00, 00, 00, ...]
.text C:\Windows\system32\svchost.exe[364] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection 0000000077c21680 5 bytes [FF, 25, 00, 00, 00]
.text C:\Windows\system32\svchost.exe[364] C:\Windows\SYSTEM32\ntdll.dll!NtOpenSection + 6 0000000077c21686 8 bytes [C0, 01, 41, 01, 00, 00, 00, ...]
.text C:\Windows\system32\svchost.exe[364] C:\Windows\SYSTEM32\ntdll.dll!NtQueryAttributesFile 0000000077c216e0 5 bytes [FF, 25, 00, 00, 00]
.text C:\Windows\system32\svchost.exe[364] C:\Windows\SYSTEM32\ntdll.dll!NtQueryAttributesFile + 6 0000000077c216e6 8 bytes [E0, 05, 41, 01, 00, 00, 00, ...]
.text C:\Windows\system32\svchost.exe[364] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection 0000000077c217b0 5 bytes [FF, 25, 00, 00, 00]
.text C:\Windows\system32\svchost.exe[364] C:\Windows\SYSTEM32\ntdll.dll!NtCreateSection + 6 0000000077c217b6 8 bytes [30, 02, 41, 01, 00, 00, 00, ...]
.text C:\Windows\system32\svchost.exe[364] C:\Windows\SYSTEM32\ntdll.dll!NtQuerySection 0000000077c21820 5 bytes [FF, 25, 00, 00, 00]
.text C:\Windows\system32\svchost.exe[364] C:\Windows\SYSTEM32\ntdll.dll!NtQuerySection + 6 0000000077c21826 8 bytes [20, 04, 41, 01, 00, 00, 00, ...]
.text C:\Program Files (x86)\SONY\VAIO Event Service\VESMgr.exe[2920] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 00000000754f1465 2 bytes [4F, 75]
.text C:\Program Files (x86)\SONY\VAIO Event Service\VESMgr.exe[2920] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000754f14bb 2 bytes [4F, 75]
.text ... * 2
.text C:\Program Files (x86)\Common Files\Sony Shared\VAIO Content Folder Watcher\VCFw.exe[2980] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 00000000754f1465 2 bytes [4F, 75]
.text C:\Program Files (x86)\Common Files\Sony Shared\VAIO Content Folder Watcher\VCFw.exe[2980] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000754f14bb 2 bytes [4F, 75]
.text ... * 2
.text C:\Program Files (x86)\SONY\VAIO Event Service\VESMgrSub.exe[3124] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 00000000754f1465 2 bytes [4F, 75]
.text C:\Program Files (x86)\SONY\VAIO Event Service\VESMgrSub.exe[3124] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000754f14bb 2 bytes [4F, 75]
.text ... * 2
.text C:\Program Files (x86)\TechSmith\Snagit 10\SnagPriv.exe[5376] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 00000000754f1465 2 bytes [4F, 75]
.text C:\Program Files (x86)\TechSmith\Snagit 10\SnagPriv.exe[5376] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000754f14bb 2 bytes [4F, 75]
.text ... * 2
.text C:\Program Files (x86)\ArcSoft\Magic-i Visual Effects 2\Magic-i Visual Effects.exe[5188] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 00000000754f1465 2 bytes [4F, 75]
.text C:\Program Files (x86)\ArcSoft\Magic-i Visual Effects 2\Magic-i Visual Effects.exe[5188] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000754f14bb 2 bytes [4F, 75]
.text ... * 2
.text C:\Program Files (x86)\ArcSoft\Magic-i Visual Effects 2\Magic-i Visual Effects.exe[5188] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdWaitForVerticalBlank + 195 0000000072491b41 2 bytes [49, 72]
.text C:\Program Files (x86)\ArcSoft\Magic-i Visual Effects 2\Magic-i Visual Effects.exe[5188] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdWaitForVerticalBlank + 362 0000000072491be8 2 bytes [49, 72]
.text C:\Program Files (x86)\ArcSoft\Magic-i Visual Effects 2\Magic-i Visual Effects.exe[5188] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdWaitForVerticalBlank + 418 0000000072491c20 2 bytes [49, 72]
.text C:\Program Files (x86)\ArcSoft\Magic-i Visual Effects 2\Magic-i Visual Effects.exe[5188] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdWaitForVerticalBlank + 596 0000000072491cd2 2 bytes [49, 72]
.text C:\Program Files (x86)\ArcSoft\Magic-i Visual Effects 2\Magic-i Visual Effects.exe[5188] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdWaitForVerticalBlank + 628 0000000072491cf2 2 bytes [49, 72]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5160] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 00000000754f1465 2 bytes [4F, 75]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5160] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000754f14bb 2 bytes [4F, 75]
.text ... * 2
---- Processes - GMER 2.1 ----
Library C:\Windows\system32\n7som.dll (*** suspicious ***) @ C:\Windows\system32\svchost.exe [364] 00000000073e0000
---- Registry - GMER 2.1 ----
Reg HKLM\SYSTEM\CurrentControlSet\services\BTHPORT\Parameters\Keys\0c6076a27b10
Reg HKLM\SYSTEM\CurrentControlSet\services\BTHPORT\Parameters\Keys\f07bcbd3eda5
Reg HKLM\SYSTEM\CurrentControlSet\services\BTHPORT\Parameters\Keys\f07bcbd3eda5@18879605d302 0xAB 0x0C 0x3D 0x77 ...
Reg HKLM\SYSTEM\CurrentControlSet\services\BTHPORT\Parameters\Keys\f07bcbd3eda5@002237060825 0x6E 0x1D 0x56 0x1B ...
Reg HKLM\SYSTEM\ControlSet002\services\BTHPORT\Parameters\Keys\0c6076a27b10 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\services\BTHPORT\Parameters\Keys\f07bcbd3eda5 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\services\BTHPORT\Parameters\Keys\f07bcbd3eda5@18879605d302 0xAB 0x0C 0x3D 0x77 ...
Reg HKLM\SYSTEM\ControlSet002\services\BTHPORT\Parameters\Keys\f07bcbd3eda5@002237060825 0x6E 0x1D 0x56 0x1B ...
Reg HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{4FB468B2-62C3-58AD-DDC0-4E978D0D8DFD}
Reg HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{4FB468B2-62C3-58AD-DDC0-4E978D0D8DFD}@gaomjklehaeeaa 0x61 0x63 0x62 0x6D ...
Reg HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{EDE32328-8F72-6421-3361-3BF5AC680F4A}
Reg HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{EDE32328-8F72-6421-3361-3BF5AC680F4A}@iakocningcencfbmcj 0x6A 0x61 0x67 0x70 ...
Reg HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{EDE32328-8F72-6421-3361-3BF5AC680F4A}@haepigmfnjloniol 0x6A 0x61 0x67 0x70 ...
---- EOF - GMER 2.1 ---- --- --- --- |