Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

cant open ınternet page.cant work gmer,cant open hi jack this


  • This topic is locked This topic is locked
6 replies to this topic

#1 thunderbolt006

thunderbolt006

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:02:46 PM

Posted 06 February 2013 - 06:08 AM

Hi first of all my english isnt enough so soryy about this.

My normal internet doesnt work ı open internet with chrome and I opened gmer but in the middle always stop and mouse very very slowy moving also ı opened hijackthis in the middle also stopped.Could you help me?


Attached Files



BC AdBot (Login to Remove)

 


#2 nasdaq

nasdaq

  • Malware Response Team
  • 40,464 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:02:46 PM

Posted 09 February 2013 - 09:59 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.
 
If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps.
===
 
Please download ComboFix from any of the links below, and save it to your desktop. For information regarding this download, please visit this web page: http://www.bleepingcomputer.com/combofix/how-to-use-combofix
 
 
* IMPORTANT !!! Save ComboFix.exe to your Desktop
 
IMPORTANT....
 
1. Close any open browsers.
 
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
 
3. Do not install any other programs until this if fixed.
 
How to : Disable Anti-virus and Firewall...
http://www.bleepingcomputer.com/forums/topic114351.html
 
Double click on ComboFix.exe & follow the prompts.
  • When finished, it will produce a report for you.
  • Please post the C:\ComboFix.txt
Note:
Do not mouse click ComboFix's window while it's running. That may cause it to stall
 
Note: If you have difficulty properly disabling your protective programs, refer to this link --> http://www.bleepingcomputer.com/forums/topic114351.html
 
 
Note: If after running ComboFix you get this error message "Illegal operation attempted on a registry key that has been marked for deletion." when attempting to run a program all you need to do is restart the computer to reset the registry.
===
 
Third party programs if not up to date can be the cause infiltration of an infection.
 
Please run this security check for my review.
 
Download Security Check by screen317 from here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.
===
 
Search and delete the AdWare, PUP (Potentially Unwanted Program) installed on your computer.
 
Please download AdwCleaner by Xplode onto your Desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Delete tab follow the prompts.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleaner[Rn].txt (n is a number).
  •  
    Please post the logs for my review.


    #3 thunderbolt006

    thunderbolt006
    • Topic Starter

    • Members
    • 3 posts
    • OFFLINE
    •  
    • Local time:02:46 PM

    Posted 09 February 2013 - 03:46 PM

    Hello nasdag

     

    I tried to take your logs but one of them give mistake others log  ok.Thnk you very much for your helping

    Hata! Google Chrome screen317.spywareinfoforum.org sitesine bağlanamadı

     

     

     

    ComboFix 13-02-07.02 - SERDAR ŞAD 09.02.2013  22:15:05.1.2 - x86
    Microsoft Windows 7 Starter   6.1.7601.1.1254.90.1055.18.1909.1230 [GMT 2:00]
    Running from: c:\users\SERDAR ÌAD\Desktop\ComboFix.exe
    AV: Norton Internet Security *Disabled/Updated* {63DF5164-9100-186D-2187-8DC619EFD8BF}
    FW: Norton Internet Security *Disabled* {5BE4D041-DB6F-1935-0AD8-24F3E73C9FC4}
    SP: Norton Internet Security *Disabled/Updated* {D8BEB080-B73A-17E3-1B37-B6B462689202}
    SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
     * Created a new restore point
    .
    .
    (((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    c:\users\SERDAR ŞAD\AppData\Roaming\Microsoft\Windows\Recent\Comfy Cakes.pif
    c:\windows\system32\x86
    c:\windows\system32\x86\chklogo6.exe
    c:\windows\system32\x86\chklogo6.wtl
    c:\windows\system32\x86\chklogo6_faileddrivers.txt
    c:\windows\system32\x86\wttlog.dll
    .
    .
    (((((((((((((((((((((((((   Files Created from 2013-01-09 to 2013-02-09  )))))))))))))))))))))))))))))))
    .
    .
    2013-02-09 20:21 . 2013-02-09 20:21    --------    d-----w-    c:\users\Default\AppData\Local\temp
    2013-02-09 20:17 . 2013-02-09 20:17    --------    d-----w-    c:\users\SERDAR ŞAD\AppData\Local\CrashDumps
    2013-02-08 16:57 . 2013-02-08 16:57    --------    d-----w-    c:\program files\ESET
    2013-02-05 08:43 . 2013-02-05 08:45    --------    d-----w-    c:\program files\Common Files\Symantec Shared
    2013-02-05 08:43 . 2013-02-05 08:43    142496    ----a-w-    c:\windows\system32\drivers\SYMEVENT.SYS
    2013-02-05 08:43 . 2013-02-05 08:43    --------    d-----w-    c:\program files\Symantec
    2013-02-05 08:42 . 2013-02-06 09:30    --------    d-----w-    c:\windows\system32\drivers\NIS
    2013-02-05 08:42 . 2013-02-05 08:42    --------    d-----w-    c:\program files\Norton Internet Security
    2013-02-05 08:42 . 2013-02-05 08:43    --------    d-----w-    c:\programdata\Norton
    2013-02-05 08:41 . 2013-02-05 08:41    --------    d-----w-    c:\program files\NortonInstaller
    2013-02-02 14:00 . 2013-02-02 14:00    --------    d-----w-    c:\users\SERDAR ŞAD\Doctor Web
    2013-02-01 08:13 . 2013-02-09 11:47    --------    d-----w-    c:\windows\system32\catroot2
    2013-01-31 12:04 . 2013-01-31 12:04    --------    d-----w-    C:\RegBackup
    2013-01-31 11:48 . 2013-01-31 12:10    181064    ----a-w-    c:\windows\PSEXESVC.EXE
    2013-01-31 11:47 . 2013-01-31 12:05    --------    d-----w-    C:\Tweaking.com_Windows_Repair_Logs
    2013-01-31 10:19 . 2013-01-31 10:19    --------    d-----w-    c:\program files\Malwarebytes' Anti-Malware
    2013-01-31 10:19 . 2012-12-14 14:49    21104    ----a-w-    c:\windows\system32\drivers\mbam.sys
    2013-01-31 10:19 . 2013-01-31 10:19    --------    d-----w-    c:\users\SERDAR ŞAD\AppData\Local\Programs
    2013-01-16 20:29 . 2013-02-08 07:48    74096    ----a-w-    c:\windows\system32\FlashPlayerCPLApp.cpl
    2013-01-16 20:29 . 2013-02-08 07:48    697712    ----a-w-    c:\windows\system32\FlashPlayerApp.exe
    .
    .
    .
    ((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    2013-01-30 10:53 . 2011-03-01 13:07    232336    ------w-    c:\windows\system32\MpSigStub.exe
    2013-01-06 15:45 . 2013-01-06 15:45    0    ----a-w-    c:\windows\system32\sho9C24.tmp
    2012-12-16 14:13 . 2012-12-21 03:50    295424    ----a-w-    c:\windows\system32\atmfd.dll
    2012-12-16 14:13 . 2012-12-21 03:50    34304    ----a-w-    c:\windows\system32\atmlib.dll
    2012-12-10 00:47 . 2012-12-10 00:47    0    ----a-w-    c:\windows\system32\sho2002.tmp
    2012-12-07 12:26 . 2013-01-09 21:03    308736    ----a-w-    c:\windows\system32\Wpc.dll
    2012-12-07 12:20 . 2013-01-09 21:03    2576384    ----a-w-    c:\windows\system32\gameux.dll
    2012-12-07 10:46 . 2013-01-09 21:03    43520    ----a-w-    c:\windows\system32\csrr.rs
    2012-12-07 10:46 . 2013-01-09 21:03    30720    ----a-w-    c:\windows\system32\usk.rs
    2012-12-07 10:46 . 2013-01-09 21:03    45568    ----a-w-    c:\windows\system32\oflc-nz.rs
    2012-12-07 10:46 . 2013-01-09 21:03    44544    ----a-w-    c:\windows\system32\pegibbfc.rs
    2012-12-07 10:46 . 2013-01-09 21:03    20480    ----a-w-    c:\windows\system32\pegi-pt.rs
    2012-12-07 10:46 . 2013-01-09 21:03    23552    ----a-w-    c:\windows\system32\oflc.rs
    2012-12-07 10:46 . 2013-01-09 21:03    20480    ----a-w-    c:\windows\system32\pegi-fi.rs
    2012-12-07 10:46 . 2013-01-09 21:03    46592    ----a-w-    c:\windows\system32\fpb.rs
    2012-12-07 10:46 . 2013-01-09 21:03    20480    ----a-w-    c:\windows\system32\pegi.rs
    2012-12-07 10:46 . 2013-01-09 21:03    21504    ----a-w-    c:\windows\system32\grb.rs
    2012-12-07 10:46 . 2013-01-09 21:03    40960    ----a-w-    c:\windows\system32\cob-au.rs
    2012-12-07 10:46 . 2013-01-09 21:03    15360    ----a-w-    c:\windows\system32\djctq.rs
    2012-12-07 10:46 . 2013-01-09 21:03    55296    ----a-w-    c:\windows\system32\cero.rs
    2012-12-07 10:46 . 2013-01-09 21:03    51712    ----a-w-    c:\windows\system32\esrb.rs
    2012-11-30 04:53 . 2013-01-09 21:05    169984    ----a-w-    c:\windows\system32\winsrv.dll
    2012-11-30 04:47 . 2013-01-09 21:05    293376    ----a-w-    c:\windows\system32\KernelBase.dll
    2012-11-30 04:45 . 2013-01-09 21:05    4608    ---ha-w-    c:\windows\system32\api-ms-win-core-processthreads-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    4096    ---ha-w-    c:\windows\system32\api-ms-win-core-sysinfo-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    4096    ---ha-w-    c:\windows\system32\api-ms-win-core-synch-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    4096    ---ha-w-    c:\windows\system32\api-ms-win-core-misc-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    4096    ---ha-w-    c:\windows\system32\api-ms-win-core-localregistry-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    3584    ---ha-w-    c:\windows\system32\api-ms-win-core-processenvironment-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    3584    ---ha-w-    c:\windows\system32\api-ms-win-core-namedpipe-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    3584    ---ha-w-    c:\windows\system32\api-ms-win-core-memory-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    3584    ---ha-w-    c:\windows\system32\api-ms-win-core-libraryloader-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    3584    ---ha-w-    c:\windows\system32\api-ms-win-core-interlocked-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    3584    ---ha-w-    c:\windows\system32\api-ms-win-core-heap-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    3072    ---ha-w-    c:\windows\system32\api-ms-win-core-string-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    3072    ---ha-w-    c:\windows\system32\api-ms-win-core-profile-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    3072    ---ha-w-    c:\windows\system32\api-ms-win-core-io-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    4096    ---ha-w-    c:\windows\system32\api-ms-win-core-localization-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    3072    ---ha-w-    c:\windows\system32\api-ms-win-core-rtlsupport-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    5120    ---ha-w-    c:\windows\system32\api-ms-win-core-file-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    3072    ---ha-w-    c:\windows\system32\api-ms-win-core-errorhandling-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    3072    ---ha-w-    c:\windows\system32\api-ms-win-core-delayload-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    3072    ---ha-w-    c:\windows\system32\api-ms-win-core-handle-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    3072    ---ha-w-    c:\windows\system32\api-ms-win-core-fibers-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    3072    ---ha-w-    c:\windows\system32\api-ms-win-core-debug-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    3072    ---ha-w-    c:\windows\system32\api-ms-win-core-datetime-l1-1-0.dll
    2012-11-30 04:45 . 2013-01-09 21:05    3072    ---ha-w-    c:\windows\system32\api-ms-win-core-console-l1-1-0.dll
    2012-11-30 02:55 . 2013-01-09 21:05    271360    ----a-w-    c:\windows\system32\conhost.exe
    2012-11-30 02:38 . 2013-01-09 21:05    6144    ---ha-w-    c:\windows\system32\api-ms-win-security-base-l1-1-0.dll
    2012-11-30 02:38 . 2013-01-09 21:05    4608    ---ha-w-    c:\windows\system32\api-ms-win-core-threadpool-l1-1-0.dll
    2012-11-30 02:38 . 2013-01-09 21:05    3584    ---ha-w-    c:\windows\system32\api-ms-win-core-xstate-l1-1-0.dll
    2012-11-30 02:38 . 2013-01-09 21:05    3072    ---ha-w-    c:\windows\system32\api-ms-win-core-util-l1-1-0.dll
    2012-11-23 02:56 . 2013-01-09 21:11    2345984    ----a-w-    c:\windows\system32\win32k.sys
    2012-11-23 02:48 . 2013-01-09 21:01    49152    ----a-w-    c:\windows\system32\taskhost.exe
    2012-11-22 04:45 . 2013-01-09 21:11    626688    ----a-w-    c:\windows\system32\usp10.dll
    2012-11-20 04:51 . 2013-01-09 21:01    220160    ----a-w-    c:\windows\system32\ncrypt.dll
    2012-11-12 11:52 . 2012-12-11 22:48    1638912    ----a-w-    c:\windows\system32\mshtml.tlb
    2012-11-11 21:40 . 2012-11-11 21:40    0    ----a-w-    c:\windows\system32\sho9952.tmp
    .
    .
    (((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
    .
    .
    *Note* empty entries & legit default entries are not shown 
    REGEDIT4
    .
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
    "{91397D20-1446-11D4-8AF4-0040CA1127B6}"= "c:\program files\Yandex\YandexBarIE\yndbar.dll" [2012-03-05 8921400]
    .
    [HKEY_CLASSES_ROOT\clsid\{91397d20-1446-11d4-8af4-0040ca1127b6}]
    [HKEY_CLASSES_ROOT\Yandex.Toolbar.1]
    [HKEY_CLASSES_ROOT\TypeLib\{91397D13-1446-11D4-8AF4-0040CA1127B6}]
    [HKEY_CLASSES_ROOT\Yandex.Toolbar]
    .
    [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\Webbrowser]
    "{91397D20-1446-11D4-8AF4-0040CA1127B6}"= "c:\program files\Yandex\YandexBarIE\yndbar.dll" [2012-03-05 8921400]
    .
    [HKEY_CLASSES_ROOT\clsid\{91397d20-1446-11d4-8af4-0040ca1127b6}]
    [HKEY_CLASSES_ROOT\Yandex.Toolbar.1]
    [HKEY_CLASSES_ROOT\TypeLib\{91397D13-1446-11D4-8AF4-0040CA1127B6}]
    [HKEY_CLASSES_ROOT\Yandex.Toolbar]
    .
    [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2011-10-26 39408]
    "SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2012-02-03 4617600]
    "Facebook Update"="c:\users\SERDAR ŞAD\AppData\Local\Facebook\Update\FacebookUpdate.exe" [2012-09-10 138096]
    "DAEMON Tools Lite"="c:\program files\DAEMON Tools Lite\DTLite.exe" [2012-04-17 3671872]
    "Octoshape Streaming Services"="c:\users\SERDAR ŞAD\AppData\Roaming\Octoshape\Octoshape Streaming Services\OctoshapeClient.exe" [2011-03-24 107800]
    .
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
    "Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 10.0\Reader\Reader_sl.exe" [2010-11-10 35736]
    "Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2010-11-10 932288]
    "RemoteControl8"="c:\program files\CyberLink\PowerDVD8\PDVD8Serv.exe" [2008-10-17 91432]
    "PDVD8LanguageShortcut"="c:\program files\CyberLink\PowerDVD8\Language\Language.exe" [2007-12-14 50472]
    "UpdatePSTShortCut"="c:\program files\CyberLink\DVD Suite\MUITransfer\MUIStartMenu.exe" [2009-03-20 210216]
    "IgfxTray"="c:\windows\system32\igfxtray.exe" [2010-04-26 136216]
    "HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2010-04-26 171032]
    "Persistence"="c:\windows\system32\igfxpers.exe" [2010-04-26 169496]
    "RtHDVCpl"="c:\program files\Realtek\Audio\HDA\RtHDVCpl.exe" [2010-06-14 9288296]
    "SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2010-01-22 1684776]
    "AmIcoSinglun"="c:\program files\AmIcoSingLun\AmIcoSinglun.exe" [2009-07-31 233472]
    .
    [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
    "ConsentPromptBehaviorAdmin"= 5 (0x5)
    "ConsentPromptBehaviorUser"= 3 (0x3)
    "EnableUIADesktopToggle"= 0 (0x0)
    .
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
    @=""
    .
    R0 DwProt;DrWeb Protection;c:\windows\system32\drivers\dwprot.sys [x]
    R1 hcwvfqgx;hcwvfqgx;c:\windows\system32\drivers\hcwvfqgx.sys [x]
    R1 iqcbymlm;iqcbymlm;c:\windows\system32\drivers\iqcbymlm.sys [x]
    R1 MpKsl3c3e60d7;MpKsl3c3e60d7;c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{341EE8AD-EA4B-4602-9D0F-5B37C0CE320A}\MpKsl3c3e60d7.sys [x]
    R3 174101E6;174101E6;c:\users\serdar şad\appdata\local\temp\174101E6.sys [x]
    R3 AmUStor;AM USB Stroage Driver;c:\windows\system32\drivers\AmUStor.SYS [x]
    R3 BTCOM;Bluetooth Serial port driver;c:\windows\system32\DRIVERS\btcomport.sys [x]
    R3 BTCOMBUS;Bluetooth Serial Port Bus Service;c:\windows\system32\Drivers\btcombus.sys [x]
    R3 btnetBUs;Bluetooth PAN Bus Service;c:\windows\system32\Drivers\btnetBus.sys [x]
    R3 IvtBtBUs;IVT Bluetooth Bus Service;c:\windows\system32\Drivers\IvtBtBus.sys [x]
    R3 taphss6;Anchorfree HSS VPN Adapter;c:\windows\system32\DRIVERS\taphss6.sys [x]
    R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [x]
    R3 TsUsbGD;%TsUsbGD.DeviceDesc.Generic%;c:\windows\system32\drivers\TsUsbGD.sys [x]
    R4 wlcrasvc;Windows Live Mesh remote connections service;c:\program files\Windows Live\Mesh\wlcrasvc.exe [x]
    S0 BtHidBus;Bluetooth HID Bus Service;c:\windows\System32\Drivers\BtHidBus.sys [x]
    S0 SymDS;Symantec Data Store;c:\windows\system32\drivers\NIS\1402010.016\SYMDS.SYS [x]
    S0 SymEFA;Symantec Extended File Attributes;c:\windows\system32\drivers\NIS\1402010.016\SYMEFA.SYS [x]
    S1 BHDrvx86;BHDrvx86;c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NIS_20.1.0.24\Definitions\BASHDefs\20130116.013\BHDrvx86.sys [x]
    S1 ccSet_NIS;Norton Internet Security Settings Manager;c:\windows\system32\drivers\NIS\1402010.016\ccSetx86.sys [x]
    S1 dtsoftbus01;DAEMON Tools Virtual Bus Driver;c:\windows\system32\DRIVERS\dtsoftbus01.sys [x]
    S1 IDSVix86;IDSVix86;c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NIS_20.1.0.24\Definitions\IPSDefs\20130208.001\IDSvix86.sys [x]
    S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [x]
    S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [x]
    S1 SymIRON;Symantec Iron Driver;c:\windows\system32\drivers\NIS\1402010.016\Ironx86.SYS [x]
    S1 SymNetS;Symantec Network Security WFP Driver;c:\windows\System32\Drivers\NIS\1402010.016\SYMNETS.SYS [x]
    S2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCORE.EXE [x]
    S2 cvhsvc;Client Virtualization Handler;c:\program files\Common Files\Microsoft Shared\Virtualization Handler\CVHSVC.EXE [x]
    S2 GFNEXSrv;GFNEX Service;c:\program files\PHotkey\GFNEXSrv.exe [x]
    S2 MBAMScheduler;MBAMScheduler;c:\program files\Malwarebytes' Anti-Malware\mbamscheduler.exe [x]
    S2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [x]
    S2 NIS;Norton Internet Security;c:\program files\Norton Internet Security\Engine\20.2.1.22\ccSvcHst.exe [x]
    S2 PEGAGFN;PEGAGFN;c:\program files\PHotkey\PEGAGFN.sys [x]
    S2 sftlist;Application Virtualization Client;c:\program files\Microsoft Application Virtualization Client\sftlist.exe [x]
    S2 TeamViewer6;TeamViewer 6;c:\program files\TeamViewer\Version6\TeamViewer_Service.exe [x]
    S2 UNS;Intel® Management & Security Application User Notification Service;c:\program files\Intel\Intel® Management Engine Components\UNS\UNS.exe [x]
    S3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [x]
    S3 Impcd;Impcd;c:\windows\system32\DRIVERS\Impcd.sys [x]
    S3 IntcDAud;Intel® Ekran İçin Ses;c:\windows\system32\DRIVERS\IntcDAud.sys [x]
    S3 L1C;NDIS Miniport Driver for Atheros AR813x/AR815x PCI-E Ethernet Controller;c:\windows\system32\DRIVERS\L1C62x86.sys [x]
    S3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [x]
    S3 NETw5s32;Windows 7 32 Bit için Intel® Wireless WiFi Link Bağdaştırıcı Sürücüsü ;c:\windows\system32\DRIVERS\NETw5s32.sys [x]
    S3 rtsuvc;Realtek USB 2.0 PC Camera;c:\windows\system32\DRIVERS\rtsuvc.sys [x]
    S3 Sftfs;Sftfs;c:\windows\system32\DRIVERS\Sftfslh.sys [x]
    S3 Sftplay;Sftplay;c:\windows\system32\DRIVERS\Sftplaylh.sys [x]
    S3 Sftredir;Sftredir;c:\windows\system32\DRIVERS\Sftredirlh.sys [x]
    S3 Sftvol;Sftvol;c:\windows\system32\DRIVERS\Sftvollh.sys [x]
    S3 sftvsa;Application Virtualization Service Agent;c:\program files\Microsoft Application Virtualization Client\sftvsa.exe [x]
    .
    .
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
    LocalServiceAndNoImpersonation    REG_MULTI_SZ       SSDPSRV upnphost SCardSvr TBS FontCache fdrespub AppIDSvc QWAVE wcncsvc
    .
    Contents of the 'Scheduled Tasks' folder
    .
    2013-02-09 c:\windows\Tasks\Adobe Flash Player Updater.job
    - c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2013-01-16 07:49]
    .
    2013-02-09 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2011-10-26 21:55]
    .
    2013-02-09 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
    - c:\program files\Google\Update\GoogleUpdate.exe [2011-10-26 21:55]
    .
    .
    ------- Supplementary Scan -------
    .
    uStart Page = hxxp://www.google.com.tr/
    TCP: DhcpNameServer = 62.248.80.164 62.248.80.163
    TCP: Interfaces\{752800EC-7B0D-47E7-99C5-6660606B1964}: NameServer = 208.67.222.222,208.67.220.220
    TCP: Interfaces\{752800EC-7B0D-47E7-99C5-6660606B1964}\4545E454450275966496: NameServer = 208.67.222.222,208.67.220.220
    TCP: Interfaces\{752800EC-7B0D-47E7-99C5-6660606B1964}\E457D6E457D60516E6F6271613: NameServer = 208.67.222.222,208.67.220.220
    .
    - - - - ORPHANS REMOVED - - - -
    .
    WebBrowser-{BF7380FA-E3B4-4DB2-AF3E-9D8783A45BFC} - (no file)
    AddRemove-{3C3901C5-3455-3E0A-A214-0B093A5070A6}.KB2468871 - c:\windows\Microsoft.NET\Framework\v4.0.30319\SetupCache\Client\setup.exe
    AddRemove-{3C3901C5-3455-3E0A-A214-0B093A5070A6}.KB2478663 - c:\windows\Microsoft.NET\Framework\v4.0.30319\SetupCache\Client\setup.exe
    AddRemove-{3C3901C5-3455-3E0A-A214-0B093A5070A6}.KB2518870 - c:\windows\Microsoft.NET\Framework\v4.0.30319\SetupCache\Client\setup.exe
    AddRemove-{3C3901C5-3455-3E0A-A214-0B093A5070A6}.KB2533523 - c:\windows\Microsoft.NET\Framework\v4.0.30319\SetupCache\Client\setup.exe
    AddRemove-{3C3901C5-3455-3E0A-A214-0B093A5070A6}.KB2539636 - c:\windows\Microsoft.NET\Framework\v4.0.30319\SetupCache\Client\setup.exe
    AddRemove-{3C3901C5-3455-3E0A-A214-0B093A5070A6}.KB2572078 - c:\windows\Microsoft.NET\Framework\v4.0.30319\SetupCache\Client\setup.exe
    AddRemove-{3C3901C5-3455-3E0A-A214-0B093A5070A6}.KB2600217 - c:\windows\Microsoft.NET\Framework\v4.0.30319\SetupCache\Client\setup.exe
    AddRemove-{3C3901C5-3455-3E0A-A214-0B093A5070A6}.KB2604121 - c:\windows\Microsoft.NET\Framework\v4.0.30319\SetupCache\Client\setup.exe
    AddRemove-{3C3901C5-3455-3E0A-A214-0B093A5070A6}.KB2633870 - c:\windows\Microsoft.NET\Framework\v4.0.30319\SetupCache\Client\setup.exe
    AddRemove-{3C3901C5-3455-3E0A-A214-0B093A5070A6}.KB2656351 - c:\windows\Microsoft.NET\Framework\v4.0.30319\SetupCache\Client\setup.exe
    AddRemove-{3C3901C5-3455-3E0A-A214-0B093A5070A6}.KB2656368 - c:\windows\Microsoft.NET\Framework\v4.0.30319\SetupCache\Client\setup.exe
    AddRemove-{3C3901C5-3455-3E0A-A214-0B093A5070A6}.KB2656368v2 - c:\windows\Microsoft.NET\Framework\v4.0.30319\SetupCache\Client\setup.exe
    AddRemove-{3C3901C5-3455-3E0A-A214-0B093A5070A6}.KB2656405 - c:\windows\Microsoft.NET\Framework\v4.0.30319\SetupCache\Client\setup.exe
    AddRemove-{3C3901C5-3455-3E0A-A214-0B093A5070A6}.KB2686827 - c:\windows\Microsoft.NET\Framework\v4.0.30319\SetupCache\Client\setup.exe
    AddRemove-{3C3901C5-3455-3E0A-A214-0B093A5070A6}.KB2729449 - c:\windows\Microsoft.NET\Framework\v4.0.30319\SetupCache\Client\setup.exe
    AddRemove-{3C3901C5-3455-3E0A-A214-0B093A5070A6}.KB2737019 - c:\windows\Microsoft.NET\Framework\v4.0.30319\SetupCache\Client\setup.exe
    AddRemove-{3C3901C5-3455-3E0A-A214-0B093A5070A6}.KB2742595 - c:\windows\Microsoft.NET\Framework\v4.0.30319\SetupCache\Client\setup.exe
    AddRemove-{B1EEC87C-E30F-3BAD-9D3C-F225873EC0CF}.KB2478663 - c:\windows\Microsoft.NET\Framework\v4.0.30319\SetupCache\ClientLP\setup.exe
    AddRemove-{B1EEC87C-E30F-3BAD-9D3C-F225873EC0CF}.KB2518870 - c:\windows\Microsoft.NET\Framework\v4.0.30319\SetupCache\ClientLP\setup.exe
    .
    .
    .
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\NIS]
    "ImagePath"="\"c:\program files\Norton Internet Security\Engine\20.2.1.22\ccSvcHst.exe\" /s \"NIS\" /m \"c:\program files\Norton Internet Security\Engine\20.2.1.22\diMaster.dll\" /prefetch:1"
    .
    --------------------- LOCKED REGISTRY KEYS ---------------------
    .
    [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
    @Denied: (Full) (Everyone)
    .
    Completion time: 2013-02-09  22:23:50
    ComboFix-quarantined-files.txt  2013-02-09 20:23
    .
    Pre-Run: 115.858.874.368 bayt boş
    Post-Run: 115.712.901.120 bayt boş
    .
    - - End Of File - - 188473BA71B69E246DABE60E24DD1341
     
     
     
     
     
    # AdwCleaner v2.111 - Bu rapor 09/02/2013 tarihinde 22:36:21'te olusturuldu
    # Son güncelleme 05/02/2013 tarihinde, Xplode tarafindan
    # Isletim sistemi : Windows 7 Starter Service Pack 1 (32 bits)
    # Kullanici : SERDAR ŞAD - SERDARŞAD
    # Mod : Normal
    # Dosya konumu : C:\Users\SERDAR ŞAD\Desktop\adwcleaner.exe
    # Seçenek [Sil]
     
     
    ***** [Servisler] *****
     
     
    ***** [Dosyalar / Klasörler] *****
     
     
    ***** [Registry] *****
     
     
    ***** [Browser'lar] *****
     
    -\\ Internet Explorer v8.0.7601.17514
     
    [OK] Registry temiz.
     
    -\\ Google Chrome v23.0.1271.95
     
    Dosya : C:\Users\SERDAR ŞAD\AppData\Local\Google\Chrome\User Data\Default\Preferences
     
    [OK] Dosya temiz.
     
    -\\ Chromium vw_on_all_tabs:true}
     
    Dosya : C:\Users\SERDAR ŞAD\AppData\Local\Chromium\User Data\Default\Preferences
     
    [OK] Dosya temiz.
     
    -\\ Opera v [Versiyon tespit edilemedi]
     
    Dosya : C:\Users\SERDAR ŞAD\AppData\Roaming\Opera\Opera\operaprefs.ini
     
    [OK] Dosya temiz.
     
    *************************
     
    AdwCleaner[R1].txt - [4001 octets] - [08/02/2013 18:45:38]
    AdwCleaner[R2].txt - [4061 octets] - [08/02/2013 18:46:09]
    AdwCleaner[R3].txt - [1289 octets] - [09/02/2013 22:35:59]
    AdwCleaner[S1].txt - [3623 octets] - [08/02/2013 18:46:18]
    AdwCleaner[S2].txt - [1220 octets] - [09/02/2013 22:36:21]
     
    ########## EOF - C:\AdwCleaner[S2].txt - [1280 octets] ##########
     
     
    RogueKiller V8.4.4 [Feb  5 2013] by Tigzy
    mail : tigzyRK<at>gmail<dot>com
     
    Operating System : Windows 7 (6.1.7601 Service Pack 1) 32 bits version
    Started in : Normal mode
    User : SERDAR ŞAD [Admin rights]
    Mode : Scan -- Date : 02/08/2013 18:44:37
    | ARK || MBR |
     
    ¤¤¤ Bad processes : 0 ¤¤¤
     
    ¤¤¤ Registry Entries : 2 ¤¤¤
    [HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
    [HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
     
    ¤¤¤ Particular Files / Folders: ¤¤¤
     
    ¤¤¤ Driver : [LOADED] ¤¤¤
    SSDT[13] : NtAlertResumeThread @ 0x8311BC99 -> HOOKED (Unknown @ 0x883828C0)
    SSDT[14] : NtAlertThread @ 0x8306EBE0 -> HOOKED (Unknown @ 0x883829A0)
    SSDT[19] : NtAllocateVirtualMemory @ 0x83067BEC -> HOOKED (Unknown @ 0x8837DEF0)
    SSDT[22] : NtAlpcConnectPort @ 0x830B344E -> HOOKED (Unknown @ 0x87B868D0)
    SSDT[43] : NtAssignProcessToJobObject @ 0x8303CFEE -> HOOKED (Unknown @ 0x8838AC88)
    SSDT[74] : NtCreateMutant @ 0x8304E2B2 -> HOOKED (Unknown @ 0x88382610)
    SSDT[86] : NtCreateSymbolicLinkObject @ 0x8303F911 -> HOOKED (Unknown @ 0x8838A9A8)
    SSDT[87] : NtCreateThread @ 0x83119ECA -> HOOKED (Unknown @ 0x87875D20)
    SSDT[88] : NtCreateThreadEx @ 0x830AE36B -> HOOKED (Unknown @ 0x8838AA98)
    SSDT[96] : NtDebugActiveProcess @ 0x830EBD9A -> HOOKED (Unknown @ 0x8838AD68)
    SSDT[111] : NtDuplicateObject @ 0x8306F67A -> HOOKED (Unknown @ 0x88386468)
    SSDT[131] : NtFreeVirtualMemory @ 0x82EF5AEC -> HOOKED (Unknown @ 0x8837DCC8)
    SSDT[145] : NtImpersonateAnonymousToken @ 0x830338E0 -> HOOKED (Unknown @ 0x88382700)
    SSDT[147] : NtImpersonateThread @ 0x830B784C -> HOOKED (Unknown @ 0x883827E0)
    SSDT[155] : NtLoadDriver @ 0x83003C20 -> HOOKED (Unknown @ 0x87B8F7E8)
    SSDT[168] : NtMapViewOfSection @ 0x83084532 -> HOOKED (Unknown @ 0x88382FB0)
    SSDT[177] : NtOpenEvent @ 0x8304DCAE -> HOOKED (Unknown @ 0x88382530)
    SSDT[190] : NtOpenProcess @ 0x8304FAF8 -> HOOKED (Unknown @ 0x883874A8)
    SSDT[191] : NtOpenProcessToken @ 0x830A223F -> HOOKED (Unknown @ 0x88387428)
    SSDT[194] : NtOpenSection @ 0x830A78BB -> HOOKED (Unknown @ 0x8838AF90)
    SSDT[198] : NtOpenThread @ 0x8309BFC3 -> HOOKED (Unknown @ 0x88386538)
    SSDT[215] : NtProtectVirtualMemory @ 0x830805A1 -> HOOKED (Unknown @ 0x8838AB98)
    SSDT[304] : NtResumeThread @ 0x830AE592 -> HOOKED (Unknown @ 0x88382A80)
    SSDT[316] : NtSetContextThread @ 0x8311B745 -> HOOKED (Unknown @ 0x88382D20)
    SSDT[333] : NtSetInformationProcess @ 0x8307678D -> HOOKED (Unknown @ 0x88382E00)
    SSDT[350] : NtSetSystemInformation @ 0x8308C29A -> HOOKED (Unknown @ 0x8838AE48)
    SSDT[366] : NtSuspendProcess @ 0x8311BBD3 -> HOOKED (Unknown @ 0x88382450)
    SSDT[367] : NtSuspendThread @ 0x830D3085 -> HOOKED (Unknown @ 0x88382B60)
    SSDT[370] : NtTerminateProcess @ 0x83098BFB -> HOOKED (Unknown @ 0x883800C0)
    SSDT[371] : unknown @ 0x830B6584 -> HOOKED (Unknown @ 0x88382C40)
    SSDT[385] : NtUnmapViewOfSection @ 0x830A287A -> HOOKED (Unknown @ 0x88382EF0)
    SSDT[399] : NtWriteVirtualMemory @ 0x8309D958 -> HOOKED (Unknown @ 0x8837DDB8)
    S_SSDT[318] : NtUserAttachThreadInput -> HOOKED (Unknown @ 0x9A5EEA30)
    S_SSDT[402] : NtUserGetAsyncKeyState -> HOOKED (Unknown @ 0x9B65B938)
    S_SSDT[434] : NtUserGetKeyboardState -> HOOKED (Unknown @ 0x9B65BB40)
    S_SSDT[436] : NtUserGetKeyState -> HOOKED (Unknown @ 0x9B6AABD0)
    S_SSDT[448] : NtUserGetRawInputData -> HOOKED (Unknown @ 0x9B6AD8C0)
    S_SSDT[490] : NtUserMessageCall -> HOOKED (Unknown @ 0x9B6A7AF0)
    S_SSDT[508] : NtUserPostMessage -> HOOKED (Unknown @ 0x9B628A40)
    S_SSDT[509] : NtUserPostThreadMessage -> HOOKED (Unknown @ 0x9B6A7BC0)
    S_SSDT[585] : NtUserSetWindowsHookEx -> HOOKED (Unknown @ 0x9B6A8ED0)
    S_SSDT[588] : NtUserSetWinEventHook -> HOOKED (Unknown @ 0x9B639910)
     
    ¤¤¤ HOSTS File: ¤¤¤
    --> C:\Windows\system32\drivers\etc\hosts
     
    127.0.0.1       localhost
     
     
    ¤¤¤ MBR Check: ¤¤¤
     
    +++++ PhysicalDrive0: TOSHIBA MK3276GSX +++++
    --- User ---
    [MBR] 1fc95a37b30392d07a3e8cac19944777
    [BSP] 4ae81261ee762cb3f8568f473ef2cf22 : Windows 7/8 MBR Code
    Partition table:
    0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 10000 Mo
    1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 20482048 | Size: 148243 Mo
    2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 324083712 | Size: 146999 Mo
    User = LL1 ... OK!
    User = LL2 ... OK!
     
    Finished : << RKreport[1]_S_02082013_02d1844.txt >>
    RKreport[1]_S_02082013_02d1844.txt
     
     
     
    RogueKiller V8.4.4 [Feb  5 2013] by Tigzy
    mail : tigzyRK<at>gmail<dot>com
     
    Operating System : Windows 7 (6.1.7601 Service Pack 1) 32 bits version
    Started in : Normal mode
    User : SERDAR ŞAD [Admin rights]
    Mode : Remove -- Date : 02/08/2013 18:44:58
    | ARK || MBR |
     
    ¤¤¤ Bad processes : 0 ¤¤¤
     
    ¤¤¤ Registry Entries : 2 ¤¤¤
    [HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
    [HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)
     
    ¤¤¤ Particular Files / Folders: ¤¤¤
     
    ¤¤¤ Driver : [LOADED] ¤¤¤
    SSDT[13] : NtAlertResumeThread @ 0x8311BC99 -> HOOKED (Unknown @ 0x883828C0)
    SSDT[14] : NtAlertThread @ 0x8306EBE0 -> HOOKED (Unknown @ 0x883829A0)
    SSDT[19] : NtAllocateVirtualMemory @ 0x83067BEC -> HOOKED (Unknown @ 0x8837DEF0)
    SSDT[22] : NtAlpcConnectPort @ 0x830B344E -> HOOKED (Unknown @ 0x87B868D0)
    SSDT[43] : NtAssignProcessToJobObject @ 0x8303CFEE -> HOOKED (Unknown @ 0x8838AC88)
    SSDT[74] : NtCreateMutant @ 0x8304E2B2 -> HOOKED (Unknown @ 0x88382610)
    SSDT[86] : NtCreateSymbolicLinkObject @ 0x8303F911 -> HOOKED (Unknown @ 0x8838A9A8)
    SSDT[87] : NtCreateThread @ 0x83119ECA -> HOOKED (Unknown @ 0x87875D20)
    SSDT[88] : NtCreateThreadEx @ 0x830AE36B -> HOOKED (Unknown @ 0x8838AA98)
    SSDT[96] : NtDebugActiveProcess @ 0x830EBD9A -> HOOKED (Unknown @ 0x8838AD68)
    SSDT[111] : NtDuplicateObject @ 0x8306F67A -> HOOKED (Unknown @ 0x88386468)
    SSDT[131] : NtFreeVirtualMemory @ 0x82EF5AEC -> HOOKED (Unknown @ 0x8837DCC8)
    SSDT[145] : NtImpersonateAnonymousToken @ 0x830338E0 -> HOOKED (Unknown @ 0x88382700)
    SSDT[147] : NtImpersonateThread @ 0x830B784C -> HOOKED (Unknown @ 0x883827E0)
    SSDT[155] : NtLoadDriver @ 0x83003C20 -> HOOKED (Unknown @ 0x87B8F7E8)
    SSDT[168] : NtMapViewOfSection @ 0x83084532 -> HOOKED (Unknown @ 0x88382FB0)
    SSDT[177] : NtOpenEvent @ 0x8304DCAE -> HOOKED (Unknown @ 0x88382530)
    SSDT[190] : NtOpenProcess @ 0x8304FAF8 -> HOOKED (Unknown @ 0x883874A8)
    SSDT[191] : NtOpenProcessToken @ 0x830A223F -> HOOKED (Unknown @ 0x88387428)
    SSDT[194] : NtOpenSection @ 0x830A78BB -> HOOKED (Unknown @ 0x8838AF90)
    SSDT[198] : NtOpenThread @ 0x8309BFC3 -> HOOKED (Unknown @ 0x88386538)
    SSDT[215] : NtProtectVirtualMemory @ 0x830805A1 -> HOOKED (Unknown @ 0x8838AB98)
    SSDT[304] : NtResumeThread @ 0x830AE592 -> HOOKED (Unknown @ 0x88382A80)
    SSDT[316] : NtSetContextThread @ 0x8311B745 -> HOOKED (Unknown @ 0x88382D20)
    SSDT[333] : NtSetInformationProcess @ 0x8307678D -> HOOKED (Unknown @ 0x88382E00)
    SSDT[350] : NtSetSystemInformation @ 0x8308C29A -> HOOKED (Unknown @ 0x8838AE48)
    SSDT[366] : NtSuspendProcess @ 0x8311BBD3 -> HOOKED (Unknown @ 0x88382450)
    SSDT[367] : NtSuspendThread @ 0x830D3085 -> HOOKED (Unknown @ 0x88382B60)
    SSDT[370] : NtTerminateProcess @ 0x83098BFB -> HOOKED (Unknown @ 0x883800C0)
    SSDT[371] : unknown @ 0x830B6584 -> HOOKED (Unknown @ 0x88382C40)
    SSDT[385] : NtUnmapViewOfSection @ 0x830A287A -> HOOKED (Unknown @ 0x88382EF0)
    SSDT[399] : NtWriteVirtualMemory @ 0x8309D958 -> HOOKED (Unknown @ 0x8837DDB8)
    S_SSDT[318] : NtUserAttachThreadInput -> HOOKED (Unknown @ 0x9A5EEA30)
    S_SSDT[402] : NtUserGetAsyncKeyState -> HOOKED (Unknown @ 0x9B65B938)
    S_SSDT[434] : NtUserGetKeyboardState -> HOOKED (Unknown @ 0x9B65BB40)
    S_SSDT[436] : NtUserGetKeyState -> HOOKED (Unknown @ 0x9B6AABD0)
    S_SSDT[448] : NtUserGetRawInputData -> HOOKED (Unknown @ 0x9B6AD8C0)
    S_SSDT[490] : NtUserMessageCall -> HOOKED (Unknown @ 0x9B6A7AF0)
    S_SSDT[508] : NtUserPostMessage -> HOOKED (Unknown @ 0x9B628A40)
    S_SSDT[509] : NtUserPostThreadMessage -> HOOKED (Unknown @ 0x9B6A7BC0)
    S_SSDT[585] : NtUserSetWindowsHookEx -> HOOKED (Unknown @ 0x9B6A8ED0)
    S_SSDT[588] : NtUserSetWinEventHook -> HOOKED (Unknown @ 0x9B639910)
     
    ¤¤¤ HOSTS File: ¤¤¤
    --> C:\Windows\system32\drivers\etc\hosts
     
    127.0.0.1       localhost
     
     
    ¤¤¤ MBR Check: ¤¤¤
     
    +++++ PhysicalDrive0: TOSHIBA MK3276GSX +++++
    --- User ---
    [MBR] 1fc95a37b30392d07a3e8cac19944777
    [BSP] 4ae81261ee762cb3f8568f473ef2cf22 : Windows 7/8 MBR Code
    Partition table:
    0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 10000 Mo
    1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 20482048 | Size: 148243 Mo
    2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 324083712 | Size: 146999 Mo
    User = LL1 ... OK!
    User = LL2 ... OK!
     
    Finished : << RKreport[2]_D_02082013_02d1844.txt >>
    RKreport[1]_S_02082013_02d1844.txt ; RKreport[2]_D_02082013_02d1844.txt
     
     
    RogueKiller V8.4.4 [Feb  5 2013] by Tigzy
    mail : tigzyRK<at>gmail<dot>com
     
    Operating System : Windows 7 (6.1.7601 Service Pack 1) 32 bits version
    Started in : Normal mode
    User : SERDAR ŞAD [Admin rights]
    Mode : Remove -- Date : 02/08/2013 18:45:09
    | ARK || MBR |
     
    ¤¤¤ Bad processes : 0 ¤¤¤
     
    ¤¤¤ Registry Entries : 0 ¤¤¤
     
    ¤¤¤ Particular Files / Folders: ¤¤¤
     
    ¤¤¤ Driver : [LOADED] ¤¤¤
    SSDT[13] : NtAlertResumeThread @ 0x8311BC99 -> HOOKED (Unknown @ 0x883828C0)
    SSDT[14] : NtAlertThread @ 0x8306EBE0 -> HOOKED (Unknown @ 0x883829A0)
    SSDT[19] : NtAllocateVirtualMemory @ 0x83067BEC -> HOOKED (Unknown @ 0x8837DEF0)
    SSDT[22] : NtAlpcConnectPort @ 0x830B344E -> HOOKED (Unknown @ 0x87B868D0)
    SSDT[43] : NtAssignProcessToJobObject @ 0x8303CFEE -> HOOKED (Unknown @ 0x8838AC88)
    SSDT[74] : NtCreateMutant @ 0x8304E2B2 -> HOOKED (Unknown @ 0x88382610)
    SSDT[86] : NtCreateSymbolicLinkObject @ 0x8303F911 -> HOOKED (Unknown @ 0x8838A9A8)
    SSDT[87] : NtCreateThread @ 0x83119ECA -> HOOKED (Unknown @ 0x87875D20)
    SSDT[88] : NtCreateThreadEx @ 0x830AE36B -> HOOKED (Unknown @ 0x8838AA98)
    SSDT[96] : NtDebugActiveProcess @ 0x830EBD9A -> HOOKED (Unknown @ 0x8838AD68)
    SSDT[111] : NtDuplicateObject @ 0x8306F67A -> HOOKED (Unknown @ 0x88386468)
    SSDT[131] : NtFreeVirtualMemory @ 0x82EF5AEC -> HOOKED (Unknown @ 0x8837DCC8)
    SSDT[145] : NtImpersonateAnonymousToken @ 0x830338E0 -> HOOKED (Unknown @ 0x88382700)
    SSDT[147] : NtImpersonateThread @ 0x830B784C -> HOOKED (Unknown @ 0x883827E0)
    SSDT[155] : NtLoadDriver @ 0x83003C20 -> HOOKED (Unknown @ 0x87B8F7E8)
    SSDT[168] : NtMapViewOfSection @ 0x83084532 -> HOOKED (Unknown @ 0x88382FB0)
    SSDT[177] : NtOpenEvent @ 0x8304DCAE -> HOOKED (Unknown @ 0x88382530)
    SSDT[190] : NtOpenProcess @ 0x8304FAF8 -> HOOKED (Unknown @ 0x883874A8)
    SSDT[191] : NtOpenProcessToken @ 0x830A223F -> HOOKED (Unknown @ 0x88387428)
    SSDT[194] : NtOpenSection @ 0x830A78BB -> HOOKED (Unknown @ 0x8838AF90)
    SSDT[198] : NtOpenThread @ 0x8309BFC3 -> HOOKED (Unknown @ 0x88386538)
    SSDT[215] : NtProtectVirtualMemory @ 0x830805A1 -> HOOKED (Unknown @ 0x8838AB98)
    SSDT[304] : NtResumeThread @ 0x830AE592 -> HOOKED (Unknown @ 0x88382A80)
    SSDT[316] : NtSetContextThread @ 0x8311B745 -> HOOKED (Unknown @ 0x88382D20)
    SSDT[333] : NtSetInformationProcess @ 0x8307678D -> HOOKED (Unknown @ 0x88382E00)
    SSDT[350] : NtSetSystemInformation @ 0x8308C29A -> HOOKED (Unknown @ 0x8838AE48)
    SSDT[366] : NtSuspendProcess @ 0x8311BBD3 -> HOOKED (Unknown @ 0x88382450)
    SSDT[367] : NtSuspendThread @ 0x830D3085 -> HOOKED (Unknown @ 0x88382B60)
    SSDT[370] : NtTerminateProcess @ 0x83098BFB -> HOOKED (Unknown @ 0x883800C0)
    SSDT[371] : unknown @ 0x830B6584 -> HOOKED (Unknown @ 0x88382C40)
    SSDT[385] : NtUnmapViewOfSection @ 0x830A287A -> HOOKED (Unknown @ 0x88382EF0)
    SSDT[399] : NtWriteVirtualMemory @ 0x8309D958 -> HOOKED (Unknown @ 0x8837DDB8)
    S_SSDT[318] : NtUserAttachThreadInput -> HOOKED (Unknown @ 0x9A5EEA30)
    S_SSDT[402] : NtUserGetAsyncKeyState -> HOOKED (Unknown @ 0x9B65B938)
    S_SSDT[434] : NtUserGetKeyboardState -> HOOKED (Unknown @ 0x9B65BB40)
    S_SSDT[436] : NtUserGetKeyState -> HOOKED (Unknown @ 0x9B6AABD0)
    S_SSDT[448] : NtUserGetRawInputData -> HOOKED (Unknown @ 0x9B6AD8C0)
    S_SSDT[490] : NtUserMessageCall -> HOOKED (Unknown @ 0x9B6A7AF0)
    S_SSDT[508] : NtUserPostMessage -> HOOKED (Unknown @ 0x9B628A40)
    S_SSDT[509] : NtUserPostThreadMessage -> HOOKED (Unknown @ 0x9B6A7BC0)
    S_SSDT[585] : NtUserSetWindowsHookEx -> HOOKED (Unknown @ 0x9B6A8ED0)
    S_SSDT[588] : NtUserSetWinEventHook -> HOOKED (Unknown @ 0x9B639910)
     
    ¤¤¤ HOSTS File: ¤¤¤
    --> C:\Windows\system32\drivers\etc\hosts
     
    127.0.0.1       localhost
     
     
    ¤¤¤ MBR Check: ¤¤¤
     
    +++++ PhysicalDrive0: TOSHIBA MK
     


    #4 nasdaq

    nasdaq

    • Malware Response Team
    • 40,464 posts
    • ONLINE
    •  
    • Gender:Male
    • Location:Montreal, QC. Canada
    • Local time:02:46 PM

    Posted 10 February 2013 - 08:16 AM

    What are the remaining problems?



    #5 thunderbolt006

    thunderbolt006
    • Topic Starter

    • Members
    • 3 posts
    • OFFLINE
    •  
    • Local time:02:46 PM

    Posted 10 February 2013 - 07:19 PM

    Thank you very much for your helping I think  Everything is ok.



    #6 nasdaq

    nasdaq

    • Malware Response Team
    • 40,464 posts
    • ONLINE
    •  
    • Gender:Male
    • Location:Montreal, QC. Canada
    • Local time:02:46 PM

    Posted 11 February 2013 - 08:24 AM

    Glad we could help.
     
    Time for some housekeeping
    The following will implement some cleanup procedures as well as reset  System Restore points:
     
    Click Start > Run  and copy/paste the following bold text into the Run box and click OK:
     
    ComboFix /Uninstall 
    ===
     
    To remove AdwCleaner.
     
    Please double click on AdwCleaner.exe to run the tool.
    Click on Uninstall.
    Confirm with Yes.
     
    If you decide to keep the AdwCleaner tool make sure delete your version and download the latest before running it.
     
    Delete the other tools we used.
    You can Keep the DDS tool as most forum will ask to see a log before suggesting a fix.
     
    Surf Safely, and Think Prevention!
    ===


    #7 nasdaq

    nasdaq

    • Malware Response Team
    • 40,464 posts
    • ONLINE
    •  
    • Gender:Male
    • Location:Montreal, QC. Canada
    • Local time:02:46 PM

    Posted 11 February 2013 - 08:24 AM

    It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.




    0 user(s) are reading this topic

    0 members, 0 guests, 0 anonymous users