Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

psactive.exe


  • This topic is locked This topic is locked
17 replies to this topic

#1 thirdkray

thirdkray

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:07:49 AM

Posted 25 October 2013 - 11:33 PM

Avast has been constantly detecting win/sys32/psactive as part of some sort of rootkit Win32 evo-gen which is their default “I dunno” generic.The psactive.exe file in my sys32 is (on right click) a legitimate windows file and in the right place.

 

Coincidentally (or is it) a persistent boot call error for the non existent pschmdrf.dll that has been plaguing me forever, and apparently unsolvable as covered extensively without result in the following thread, has now miraculously disappeared::

 

http://www.bleepingcomputer.com/forums/t/393472/win-xpcannot-find-fictitious-dll/page-2?hl=%2Bpsactive#entry2238805

 

Maybe Avast has been the problem all along? It keeps requesting to delete psactive.exe, doesn’t actually delete the file when it says it did, won’t place it in the virus chest when that action is selected and it says it has, then performs a pointless boot scan that finds nothing. Now I feel like a bit of a twit for complaining about free software.

 

Here is a further clusterbomb of ambiguous conflicting results from metascan:

AegisLab

No threat detected

Agnitum

No threat detected

Ahnlab

Win-Trojan/Agent.8192.Z

Antiy

No threat detected

AVG

Generic7_c.AGFB

Avira

TR/Drop.Yoader.A.22

BitDefender

Trojan.Generic.7219697

ByteHero

No threat detected

ClamWin

Win.Trojan.Agent-27809

Commtouch

No threat detected

Emsisoft

Win32.SuspectCrc!E2

ESET

No threat detected

F-prot

No threat detected

F-secure

Trojan.Generic.7219697

Filseclab

TrojanDrop.Agent.cck.yxgo

Fortinet

No threat detected

Hauri

Backdoor.Win32.A.Agent.3584

Ikarus

Win32.SuspectCrc

Jiangmin

TrojanDropper.Microjoin.anl

K7

No threat detected

Kaspersky

No threat detected

Kingsoft

No threat detected

Lavasoft

Trojan.Generic.7219697

Malwarebytes

No threat detected

McAfee

Artemis!55F52BA64E49 trojan

Microsoft

Unknown Threat

NANO

Trojan.Win32.Microjoin.frsfp

NetGate

No threat detected

Norman

winpe/Suspicious_Gen4.BKRYJ

nProtect

Trojan/W32.Agent.5120.CU

Preventon

No threat detected

QuickHeal

TrojanDropper.Microjoin.hfg

STOPzilla

No threat detected

SUPERAntiSpyware

No threat detected

Symantec

No threat detected

Systweak

trojan.agent

ThreatTrack

Trojan.Win32.Generic!BT

TotalDefense

No threat detected

TrendMicro

No threat detected

TrendMicroHouseCall

No threat detected

VirIT

No threat detected

VirusBlokAda

���virus_nameTrojanDropper.Microjoin

Zillya!

No threat detected

 

The computer exhibits no other suspicious activity whatsoever apart from the daily avast alert. I lean towards trusting Kapersky + Malwarebytes + Fprot. Any thoughts?

 

 

 

 



BC AdBot (Login to Remove)

 


#2 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:49 AM

Posted 30 October 2013 - 11:35 PM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

step1.gif In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/511902 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

step2.gifIf you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from the following link if you no longer have it available and save it to your destop.

    DDS.com Download Link
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control can be found HERE.

As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#3 thirdkray

thirdkray
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:07:49 AM

Posted 31 October 2013 - 08:26 AM

Yes I have a non OEM WinXP cd. This started after an Avast update.

 

DDS (Ver_2012-11-20.01) - NTFS_x86
Internet Explorer: 8.0.6001.18702  BrowserJavaVersion: 10.45.2
Run by p at 2:14:30 on 2013-11-01
Microsoft Windows XP Professional  5.1.2600.3.1252.1.1033.18.1919.868 [GMT 13:00]
.
AV: Lavasoft Ad-Watch Live! Anti-Virus *Disabled/Updated* {A1C4F2E0-7FDE-4917-AFAE-013EFC3EDE33}
AV: avast! Antivirus *Enabled/Updated* {7591DB91-41F0-48A3-B128-1A293FD8233D}
.
============== Running Processes ================
.
C:\Program Files\Windows Defender\MsMpEng.exe
C:\Program Files\Alwil Software\Avast5\AvastSvc.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Java\jre7\bin\jqs.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\CDBurnerXP\NMSAccessU.exe
C:\WINDOWS\system32\Fast.exe
C:\WINDOWS\System32\alg.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Microsoft Hardware\Keyboard\type32.exe
C:\WINDOWS\system32\taskswitch.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Program Files\Alwil Software\Avast5\avastUI.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Mozilla Firefox\plugin-container.exe
C:\DOCUME~1\p\LOCALS~1\Temp\nsj8.tmp\ns9.tmp
C:\DOCUME~1\p\LOCALS~1\Temp\nsj8.tmp\MBR.DAT
C:\WINDOWS\system32\taskmgr.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\WINDOWS\system32\svchost.exe -k DcomLaunch
C:\WINDOWS\system32\svchost.exe -k rpcss
C:\WINDOWS\system32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k NetworkService
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\system32\svchost.exe -k imgsvc
.
============== Pseudo HJT Report ===============
.
uStart Page = about:blank
uProxyOverride = <local>
BHO: AutorunsDisabled - <orphaned>
BHO: Java™ Plug-In SSV Helper: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - c:\program files\java\jre7\bin\ssv.dll
BHO: Windows Live Sign-in Helper: {9030D464-4C02-4ABF-8ECC-5164760863C6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - c:\program files\java\jre7\bin\jp2ssv.dll
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
mRun: [IntelliType] "c:\program files\microsoft hardware\keyboard\type32.exe"
mRun: [CoolSwitch] c:\windows\system32\taskswitch.exe
mRun: [FastUser] c:\windows\system32\fast.exe
mRun: [RTHDCPL] RTHDCPL.EXE
mRun: [SkyTel] SkyTel.EXE
mRun: [avast] "c:\program files\alwil software\avast5\avastUI.exe" /nogui
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRunOnce: [20131030] c:\program files\alwil software\avast5\setup\emupdate\8f1012fd-61ba-4341-ae76-acf9b4e312d5.exe /check
dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE
dRun: [DWQueuedReporting] "c:\progra~1\common~1\micros~1\dw\dwtrig20.exe" -t
uPolicies-Explorer: NoDriveTypeAutoRun = dword:129
uPolicies-Explorer: NoDriveAutoRun = dword:67108863
mPolicies-Explorer: NoDriveTypeAutoRun = dword:323
mPolicies-Explorer: NoDriveAutoRun = dword:67108863
mPolicies-Windows\System: Allow-LogonScript-NetbiosDisabled = dword:1
mPolicies-Explorer: NoDriveTypeAutoRun = dword:323
mPolicies-Explorer: NoDriveAutoRun = dword:67108863
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office10\EXCEL.EXE/3000
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} - hxxp://www.update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1210312202125
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.7.0/jinstall-1_7_0_05-windows-i586.cab
DPF: {CAFEEFAC-0017-0000-0005-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.7.0/jinstall-1_7_0_05-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.7.0/jinstall-1_7_0_05-windows-i586.cab
TCP: NameServer = 192.168.1.1
TCP: Interfaces\{0587B373-D2DA-4E08-9689-49FFA6784C9A} : DHCPNameServer = 192.168.1.1
Handler: belarc - {6318E0AB-2E93-11D1-B8ED-00608CC9A71F} - c:\program files\belarc\advisor\system\BAVoilaX.dll
Handler: cdo - {CD00020A-8B95-11D1-82DB-00C04FB1625D} - c:\program files\common files\microsoft shared\web folders\PKMCDO.DLL
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\program files\common files\skype\Skype4COM.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\p\application data\mozilla\firefox\profiles\ijr4eq46.default-1382536298890\
FF - prefs.js: browser.startup.homepage - hxxp://www.ighome.com/
FF - plugin: c:\documents and settings\p\local settings\application data\google\update\1.3.21.165\npGoogleUpdate3.dll
FF - plugin: c:\documents and settings\p\local settings\application data\unity\webplayer\loader\npUnity3D32.dll
FF - plugin: c:\program files\adobe\reader 11.0\reader\air\nppdf32.dll
FF - plugin: c:\program files\divx\divx ovs helper\npovshelper.dll
FF - plugin: c:\program files\google\google earth\plugin\npgeplugin.dll
FF - plugin: c:\program files\google\google updater\2.4.1536.6592\npCIDetect13.dll
FF - plugin: c:\program files\google\update\1.3.21.165\npGoogleUpdate3.dll
FF - plugin: c:\program files\java\jre7\bin\dtplugin\npdeployJava1.dll
FF - plugin: c:\program files\java\jre7\bin\plugin2\npjp2.dll
FF - plugin: c:\program files\microsoft silverlight\5.1.20913.0\npctrlui.dll
FF - plugin: c:\windows\system32\adobe\director\np32dsw_1203133.dll
FF - plugin: c:\windows\system32\macromed\flash\NPSWF32_11_9_900_117.dll
FF - ExtSQL: 2013-10-24 02:56; {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}; c:\documents and settings\p\application data\mozilla\firefox\profiles\ijr4eq46.default-1382536298890\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi
FF - ExtSQL: 2013-10-24 02:56; {3d7eb24f-2740-49df-8937-200b1cc08f8a}; c:\documents and settings\p\application data\mozilla\firefox\profiles\ijr4eq46.default-1382536298890\extensions\{3d7eb24f-2740-49df-8937-200b1cc08f8a}
.
============= SERVICES / DRIVERS ===============
.
R0 aswRvrt;aswRvrt;c:\windows\system32\drivers\aswRvrt.sys [2013-3-31 49376]
R0 aswVmm;aswVmm;c:\windows\system32\drivers\aswVmm.sys [2013-3-31 175176]
R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2010-6-4 64512]
R1 aswSnx;aswSnx;c:\windows\system32\drivers\aswSnx.sys [2011-3-5 770344]
R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [2008-5-8 369584]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2008-5-8 29816]
R2 aswMonFlt;aswMonFlt;c:\windows\system32\drivers\aswMonFlt.sys [2013-3-31 66336]
R2 avast! Antivirus;avast! Antivirus;c:\program files\alwil software\avast5\AvastSvc.exe [2010-7-10 46808]
R2 WinDefend;Windows Defender;c:\program files\windows defender\MsMpEng.exe [2006-11-3 13592]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 SHARSHTL;Shuttle Sharer;c:\windows\system32\drivers\sharshtl.sys --> c:\windows\system32\drivers\sharshtl.sys [?]
S3 adxapie;adxapie;\??\c:\docume~1\p\locals~1\temp\adxapie.sys --> c:\docume~1\p\locals~1\temp\adxapie.sys [?]
S3 FTLUND;Lundinova Filter Driver;c:\windows\system32\drivers\ftlund.sys [2003-2-24 6828]
S3 Lavasoft Kernexplorer;Lavasoft helper driver;\??\c:\program files\lavasoft\ad-aware\kernexplorer.sys --> c:\program files\lavasoft\ad-aware\KernExplorer.sys [?]
S3 MEMSWEEP2;MEMSWEEP2;\??\c:\windows\system32\8.tmp --> c:\windows\system32\8.tmp [?]
S3 PROCEXP150;PROCEXP150;\??\c:\windows\system32\drivers\procexp150.sys --> c:\windows\system32\drivers\PROCEXP150.SYS [?]
S3 PSSDK42;PSSDK42;c:\windows\system32\drivers\pssdk42.sys [2011-11-27 38976]
S3 PSSDKLBF;PSSDKLBF;c:\windows\system32\drivers\pssdklbf.sys [2011-11-27 53312]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2013-7-20 754856]
S4 epstwnt;epstwnt;c:\windows\system32\drivers\epstwnt.mpd --> c:\windows\system32\drivers\epstwnt.mpd [?]
S4 PASW;Process Activation Service;c:\windows\system32\psactive.exe [2011-4-20 5120]
.
=============== Created Last 30 ================
.
2013-10-29 12:56:37    7796464    ----a-w-    c:\documents and settings\all users\application data\microsoft\windows defender\definition updates\{69c2159a-8bf2-4a2c-a594-3d224ae3c839}\mpengine.dll
2013-10-17 06:44:24    145408    ----a-w-    c:\windows\system32\javacpl.cpl
2013-10-17 06:44:16    94632    ----a-w-    c:\windows\system32\WindowsAccessBridge.dll
2013-10-15 10:54:22    25088    -c----w-    c:\windows\system32\dllcache\hidparse.sys
2013-10-15 10:51:10    60160    -c----w-    c:\windows\system32\dllcache\usbaudio.sys
2013-10-15 10:51:10    46848    -c----w-    c:\windows\system32\dllcache\irbus.sys
2013-10-15 10:51:10    123008    -c----w-    c:\windows\system32\dllcache\usbvideo.sys
2013-10-15 10:49:23    5376    -c----w-    c:\windows\system32\dllcache\usbd.sys
2013-10-15 10:49:23    32384    -c----w-    c:\windows\system32\dllcache\usbccgp.sys
2013-10-15 10:49:23    30336    -c----w-    c:\windows\system32\dllcache\usbehci.sys
2013-10-15 10:49:22    144128    -c----w-    c:\windows\system32\dllcache\usbport.sys
.
==================== Find3M  ====================
.
2013-10-14 08:39:15    71048    ----a-w-    c:\windows\system32\FlashPlayerCPLApp.cpl
2013-10-14 08:39:15    692616    ----a-w-    c:\windows\system32\FlashPlayerApp.exe
2013-09-23 18:33:58    920064    ----a-w-    c:\windows\system32\wininet.dll
2013-09-23 18:33:57    43520    ----a-w-    c:\windows\system32\licmgr10.dll
2013-09-23 18:33:57    1469440    ----a-w-    c:\windows\system32\inetcpl.cpl
2013-09-23 18:33:56    18944    ----a-w-    c:\windows\system32\corpol.dll
2013-09-23 18:06:48    385024    ----a-w-    c:\windows\system32\html.iec
2013-09-18 20:08:56    94208    ----a-w-    c:\windows\system32\dpl100.dll
2013-09-03 01:35:12    238872    ------w-    c:\windows\system32\MpSigStub.exe
2013-08-29 01:31:44    1878656    ----a-w-    c:\windows\system32\win32k.sys
2013-08-26 09:13:02    354656    ----a-w-    c:\windows\system32\DivXControlPanelApplet.cpl
2013-08-09 01:56:45    386560    ----a-w-    c:\windows\system32\themeui.dll
2013-08-09 00:55:08    144128    ----a-w-    c:\windows\system32\drivers\usbport.sys
2013-08-09 00:55:07    32384    ----a-w-    c:\windows\system32\drivers\usbccgp.sys
2013-08-09 00:55:06    5376    ----a-w-    c:\windows\system32\drivers\usbd.sys
2013-08-05 13:30:32    1289728    ----a-w-    c:\windows\system32\ole32.dll
2009-12-06 17:18:14    26624    --sh--w-    c:\windows\bfcs2.dll
.
============= FINISH:  2:16:37.31 ===============
 



#4 nasdaq

nasdaq

  • Malware Response Team
  • 40,197 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:07:49 AM

Posted 31 October 2013 - 01:33 PM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps.
===

--RogueKiller--
  • Download & SAVE to your Desktop RogueKiller for 32bit or Roguekiller for 64bit
  • Quit all programs that you may have started.
  • Please disconnect any USB or external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select "Run as Administrator to start"
  • For Windows XP, double-click to start.
  • Wait until Prescan has finished ...
  • Then Click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • click on "delete"
  • Wait until the Status box shows "Deleting Finished"
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • The log should be found in RKreport[1].txt on your Desktop
  • Exit/Close RogueKiller+
===

Please download AdwCleaner by Xplode onto your Desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Click the Report button and the report will open in Notepad.
IMPORTANT
  • If you click the Clean button all items listed in the report will be removed.
If you find some false positive items or programs that you wish to keep, Close the AdwCleaner windows.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Check off the element(s) you wish to keep.
  • Click on the Clean button follow the prompts.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleaner[Sn].txt (n is a number).
===

thisisujrt.gif Please download
Junkware Removal Tool to your Desktop.
  • Please close your security software to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista or 7, right-mouse click it and select Run as administrator.
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete, depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your Desktop and will automatically open.
  • Please post the contents of JRT.txt into your reply.
===

Please download ComboFix from one of these locations:
Link 1
Link 2
IMPORTANT !!! Save ComboFix.exe to your Desktop
  • Disable your Anti-Virus and Anti-Spyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
  • Some Rookit infection may damage your boot sector. The Windows Recovery Console may be needed to restore it. Do not bypass this installation. You may regret it.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.
RcAuto1.gif
Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:
whatnext.png
Click on Yes, to continue scanning for malware.
When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Note: If you have difficulty properly disabling your protection programs, refer to this link --> http://www.bleepingcomputer.com/forums/topic114351.html

Do not mouse click ComboFix's window while it's running. That may cause it to stall

Note: If after running ComboFix you get this error message "Illegal operation attempted on a registry key that has been marked for deletion." when attempting to run a program all you need to do is restart the computer to reset the registry.
===

Please paste the logs in your next reply, DO NOT ATTACH THEM
Let me know what problem persists.

#5 thirdkray

thirdkray
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:07:49 AM

Posted 01 November 2013 - 01:16 AM

Logs here. Nothing significant really. I dont know why Combofix picks on atapi.sys maybe force of habit it did the same thing last time I ran it.

 

The popup from Avast persists as initially posted.

 

The system is regularly cleaned with Malwarebytes, CCleaner, TFC.exe (Oldtimer), free space is wiped, HijackThis is checked etc etc etc.

 

ROGUEKILLER

 

RogueKiller V8.7.6 [Oct 28 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.adlice.com/forum/
Website : http://www.adlice.com/softwares/roguekiller/
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows XP (5.1.2600 Service Pack 3) 32 bits version
Started in : Normal mode
User : p [Admin rights]
Mode : Remove -- Date : 11/01/2013 18:09:12
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 1 ¤¤¤
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

¤¤¤ Scheduled tasks : 0 ¤¤¤

¤¤¤ Startup Entries : 0 ¤¤¤

¤¤¤ Web browsers : 0 ¤¤¤

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤

¤¤¤ External Hives: ¤¤¤

¤¤¤ Infection :  ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts


127.0.0.1       localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) WDC WD1600AAJS-00PSA0 +++++
--- User ---
[MBR] 0bfda30ea98f1c68ced1fabe5db94209
[BSP] 67ddf0f7d0fe51634dbb34702bf495a1 : Windows XP MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 152617 Mo
User = LL1 ... OK!
User = LL2 ... OK!

+++++ PhysicalDrive1: (\\.\PHYSICALDRIVE1 @ USB) DSE MicroDrive 4GB USB Device +++++
--- User ---
[MBR] 4dc21f7be7e4e9fd11cccc24e82b8bc3
[BSP] ec038f3ca5091360f60d743d6f1c7fdb : MBR Code unknown
Partition table:
0 - [XXXXXX] FAT32 (0x0b) [VISIBLE] Offset (sectors): 576 | Size: 3965 Mo
User = LL1 ... OK!
Error reading LL2 MBR!

Finished : << RKreport[0]_D_11012013_180912.txt >>
RKreport[0]_S_11012013_180745.txt

 

ADWCLEANER

 

# AdwCleaner v3.010 - Report created 01/11/2013 at 18:22:05
# Updated 20/10/2013 by Xplode
# Operating System : Microsoft Windows XP Service Pack 3 (32 bits)
# Username : p - PARROT
# Running from : C:\Documents and Settings\p\Desktop\adwcleaner.exe
# Option : Clean

***** [ Services ] *****


***** [ Files / Folders ] *****

Folder Deleted : C:\Documents and Settings\All Users\Application Data\Trymedia
Folder Deleted : C:\Documents and Settings\All Users\Application Data\AlawarWrapper
File Deleted : C:\END

***** [ Shortcuts ] *****


***** [ Registry ] *****

Key Deleted : HKLM\SOFTWARE\Classes\IMsiDe1egate.Application.1
Key Deleted : HKLM\SOFTWARE\Classes\protector_dll.protectorbho
Key Deleted : HKLM\SOFTWARE\Classes\protector_dll.protectorbho.1
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{898EA8C8-E7FF-479B-8935-AEC46303B9E5}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{AE805869-2E5C-4ED4-8F7B-F1F7851A4497}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{898EA8C8-E7FF-479B-8935-AEC46303B9E5}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{AE805869-2E5C-4ED4-8F7B-F1F7851A4497}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{171DEBEB-C3D4-40B7-AC73-056A5EBA4A7E}
Key Deleted : HKCU\Software\Conduit
Key Deleted : HKCU\Software\YahooPartnerToolbar
Key Deleted : HKLM\Software\Viewpoint

***** [ Browsers ] *****

-\\ Internet Explorer v8.0.6001.18702


-\\ Mozilla Firefox v24.0 (en-GB)

[ File : C:\Documents and Settings\p\Application Data\Mozilla\Firefox\profiles\ijr4eq46.default-1382536298890\prefs.js ]


-\\ Google Chrome v

[ File : C:\Documents and Settings\p\Local Settings\Application Data\Google\Chrome\User Data\Default\preferences ]


*************************

AdwCleaner[R0].txt - [2191 octets] - [01/11/2013 18:11:30]
AdwCleaner[S0].txt - [2153 octets] - [01/11/2013 18:22:05]

########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [2213 octets] ##########

 

(The C:\END file deleted here was 0 bytes)

 

 

 

JUNKWARE REMOVAL TOOL

 

Junkware Removal Tool (JRT) by Thisisu
Version: 6.0.7 (10.15.2013:3)
OS: Microsoft Windows XP x86
Ran by p on Fri 01/11/2013 at 18:28:33.03
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values



~~~ Registry Keys



~~~ Files



~~~ Folders



~~~ Chrome

Successfully deleted: [Folder] C:\Documents and Settings\p\Local Settings\Application Data\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Fri 01/11/2013 at 18:33:57.35
End of JRT log

 

COMBOFIX

 

ComboFix 13-11-01.01 - p 01/11/2013  18:39:43.5.2 - x86
Microsoft Windows XP Professional  5.1.2600.3.1252.1.1033.18.1919.1380 [GMT 13:00]
Running from: c:\documents and settings\p\Desktop\ComboFix.exe
AV: avast! Antivirus *Disabled/Updated* {7591DB91-41F0-48A3-B128-1A293FD8233D}
AV: Lavasoft Ad-Watch Live! Anti-Virus *Disabled/Updated* {A1C4F2E0-7FDE-4917-AFAE-013EFC3EDE33}
 * Created a new restore point
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\p\WINDOWS
c:\windows\iun6002.exe
c:\windows\system32\PowerToyReadme.htm
c:\windows\wininit.ini
.
Infected copy of c:\windows\system32\Drivers\atapi.sys was found and disinfected
Restored copy from - c:\windows\ERDNT\cache\atapi.sys
.
.
(((((((((((((((((((((((((   Files Created from 2013-10-01 to 2013-11-01  )))))))))))))))))))))))))))))))
.
.
2013-11-01 05:11 . 2013-11-01 05:22    --------    d-----w-    C:\AdwCleaner
2013-10-29 12:56 . 2013-10-14 06:39    7796464    ----a-w-    c:\documents and settings\All Users\Application Data\Microsoft\Windows Defender\Definition Updates\{69C2159A-8BF2-4A2C-A594-3D224AE3C839}\mpengine.dll
2013-10-18 17:05 . 2013-10-18 17:12    --------    d-----w-    c:\program files\Mozilla Thunderbird
2013-10-17 06:44 . 2013-10-17 06:44    --------    d-----w-    c:\program files\Common Files\Java
2013-10-17 06:44 . 2013-10-07 18:29    145408    ----a-w-    c:\windows\system32\javacpl.cpl
2013-10-17 06:44 . 2013-10-07 18:50    94632    ----a-w-    c:\windows\system32\WindowsAccessBridge.dll
2013-10-15 10:54 . 2013-07-03 02:12    25088    -c----w-    c:\windows\system32\dllcache\hidparse.sys
2013-10-15 10:51 . 2013-07-17 00:58    123008    -c----w-    c:\windows\system32\dllcache\usbvideo.sys
2013-10-15 10:51 . 2013-07-17 00:58    46848    -c----w-    c:\windows\system32\dllcache\irbus.sys
2013-10-15 10:51 . 2013-07-17 00:58    60160    -c----w-    c:\windows\system32\dllcache\usbaudio.sys
2013-10-15 10:49 . 2013-08-09 00:55    32384    -c----w-    c:\windows\system32\dllcache\usbccgp.sys
2013-10-15 10:49 . 2013-08-09 00:55    5376    -c----w-    c:\windows\system32\dllcache\usbd.sys
2013-10-15 10:49 . 2009-03-18 11:02    30336    -c----w-    c:\windows\system32\dllcache\usbehci.sys
2013-10-15 10:49 . 2013-08-09 00:55    144128    -c----w-    c:\windows\system32\dllcache\usbport.sys
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-10-14 08:39 . 2012-05-15 04:42    692616    ----a-w-    c:\windows\system32\FlashPlayerApp.exe
2013-10-14 08:39 . 2011-05-22 09:16    71048    ----a-w-    c:\windows\system32\FlashPlayerCPLApp.cpl
2013-10-14 06:39 . 2008-05-09 10:22    7796464    ----a-w-    c:\documents and settings\All Users\Application Data\Microsoft\Windows Defender\Definition Updates\Backup\mpengine.dll
2013-09-23 18:33 . 2004-08-04 12:00    920064    ----a-w-    c:\windows\system32\wininet.dll
2013-09-23 18:33 . 2004-08-04 12:00    43520    ----a-w-    c:\windows\system32\licmgr10.dll
2013-09-23 18:33 . 2004-08-04 12:00    1469440    ----a-w-    c:\windows\system32\inetcpl.cpl
2013-09-23 18:33 . 2004-08-04 12:00    18944    ----a-w-    c:\windows\system32\corpol.dll
2013-09-23 18:06 . 2004-08-04 12:00    385024    ----a-w-    c:\windows\system32\html.iec
2013-09-18 20:08 . 2013-09-18 20:08    94208    ----a-w-    c:\windows\system32\dpl100.dll
2013-09-03 01:35 . 2009-10-03 03:51    238872    ------w-    c:\windows\system32\MpSigStub.exe
2013-08-29 01:31 . 2004-08-04 12:00    1878656    ----a-w-    c:\windows\system32\win32k.sys
2013-08-26 09:13 . 2013-08-26 09:13    354656    ----a-w-    c:\windows\system32\DivXControlPanelApplet.cpl
2013-08-09 01:56 . 2004-08-04 12:00    386560    ----a-w-    c:\windows\system32\themeui.dll
2013-08-09 00:55 . 2004-08-04 12:00    144128    ----a-w-    c:\windows\system32\drivers\usbport.sys
2013-08-09 00:55 . 2004-08-04 12:00    32384    ----a-w-    c:\windows\system32\drivers\usbccgp.sys
2013-08-09 00:55 . 2004-08-04 12:00    5376    ----a-w-    c:\windows\system32\drivers\usbd.sys
2013-08-05 13:30 . 2004-08-04 12:00    1289728    ----a-w-    c:\windows\system32\ole32.dll
2009-12-06 17:18    26624    --sh--w-    c:\windows\bfcs2.dll
.
.
------- Sigcheck -------
Note: Unsigned files aren't necessarily malware.
.
[7] 2004-08-04 . DA1F27D85E0D1525F6621372E7B685E9 . 4224 . . [5.1.2600.0] . . c:\windows\system32\dllcache\beep.sys
.
c:\windows\System32\drivers\beep.sys ... is missing !!
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\00avast]
@="{472083B0-C522-11CF-8763-00608CC02F24}"
[HKEY_CLASSES_ROOT\CLSID\{472083B0-C522-11CF-8763-00608CC02F24}]
2013-05-09 08:58    121968    ----a-w-    c:\program files\Alwil Software\Avast5\ashShell.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\GDriveBlacklistedOverlay]
@="{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D42}"
[HKEY_CLASSES_ROOT\CLSID\{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D42}]
2013-09-25 04:37    579024    ----a-w-    c:\program files\Google\Drive\googledrivesync32.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\GDriveSharedEditOverlay]
@="{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D44}"
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\GDriveSharedOverlay]
@="{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D44}"
[HKEY_CLASSES_ROOT\CLSID\{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D44}]
2013-09-25 04:37    579024    ----a-w-    c:\program files\Google\Drive\googledrivesync32.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\GDriveSharedEditOverlay]
@="{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D44}"
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\GDriveSharedOverlay]
@="{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D44}"
[HKEY_CLASSES_ROOT\CLSID\{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D44}]
2013-09-25 04:37    579024    ----a-w-    c:\program files\Google\Drive\googledrivesync32.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\GDriveSharedViewOverlay]
@="{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D43}"
[HKEY_CLASSES_ROOT\CLSID\{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D43}]
2013-09-25 04:37    579024    ----a-w-    c:\program files\Google\Drive\googledrivesync32.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\GDriveSyncedOverlay]
@="{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D40}"
[HKEY_CLASSES_ROOT\CLSID\{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D40}]
2013-09-25 04:37    579024    ----a-w-    c:\program files\Google\Drive\googledrivesync32.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\GDriveSyncingOverlay]
@="{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D41}"
[HKEY_CLASSES_ROOT\CLSID\{81539FE6-33C7-4CE7-90C7-1C7B8F2F2D41}]
2013-09-25 04:37    579024    ----a-w-    c:\program files\Google\Drive\googledrivesync32.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IntelliType"="c:\program files\Microsoft Hardware\Keyboard\type32.exe" [2002-03-21 94208]
"CoolSwitch"="c:\windows\system32\taskswitch.exe" [2001-10-08 45632]
"FastUser"="c:\windows\system32\fast.exe" [2001-10-08 49216]
"RTHDCPL"="RTHDCPL.EXE" [2007-09-26 16844800]
"SkyTel"="SkyTel.EXE" [2007-08-02 1826816]
"avast"="c:\program files\Alwil Software\Avast5\avastUI.exe" [2013-05-09 4858968]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2013-07-01 254336]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-13 15360]
"DWQueuedReporting"="c:\progra~1\COMMON~1\MICROS~1\DW\dwtrig20.exe" [2007-03-13 39264]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WinDefend]
@="Service"
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Adobe Gamma Loader.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Adobe Gamma Loader.lnk
backup=c:\windows\pss\Adobe Gamma Loader.lnkCommon Startup
.
[HKLM\~\startupfolder\C:^Documents and Settings^All Users^Start Menu^Programs^Startup^Phone Connection Monitor.lnk]
path=c:\documents and settings\All Users\Start Menu\Programs\Startup\Phone Connection Monitor.lnk
backup=c:\windows\pss\Phone Connection Monitor.lnkCommon Startup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2013-05-11 10:37    958576    ----a-w-    c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DivXMediaServer]
2013-08-21 09:19    450560    ----a-w-    c:\program files\DivX\DivX Media Server\DivXMediaServer.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DivXUpdate]
2013-08-29 00:23    1861968    ----a-w-    c:\program files\DivX\DivX Update\DivXUpdate.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Google Update]
2012-07-06 06:08    116648    ----atw-    c:\documents and settings\p\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Trillian\\trillian.exe"=
"c:\\cows\\cows.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Soulseek\\slsk.exe"=
"c:\\Program Files\\WS_FTP\\WS_FTP95.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\deepinvent\\MailStore Home\\MailStoreDesktopServices.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"=
"c:\\Program Files\\Windows Live\\Messenger\\livecall.exe"=
"c:\\Program Files\\Skype\\Plugin Manager\\skypePM.exe"=
"c:\\WINDOWS\\system32\\dpvsetup.exe"=
"c:\\Program Files\\Winamp\\winamp.exe"=
"c:\\WINDOWS\\system32\\javaw.exe"=
"c:\\Program Files\\Intuwave Ltd\\Shared\\mRouterRunTime\\mRouterRuntime.exe"=
"c:\\Program Files\\Java\\jre7\\bin\\java.exe"=
"c:\\Program Files\\SoulseekQt\\SoulseekQt.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
.
R0 aswRvrt;aswRvrt;c:\windows\system32\drivers\aswRvrt.sys [31/03/2013 6:21 p.m. 49376]
R0 aswVmm;aswVmm;c:\windows\system32\drivers\aswVmm.sys [31/03/2013 6:21 p.m. 175176]
R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [4/06/2010 9:37 p.m. 64512]
R1 aswSnx;aswSnx;c:\windows\system32\drivers\aswSnx.sys [5/03/2011 1:24 a.m. 770344]
R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [8/05/2008 11:11 p.m. 369584]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [8/05/2008 11:11 p.m. 29816]
R2 aswMonFlt;aswMonFlt;c:\windows\system32\drivers\aswMonFlt.sys [31/03/2013 6:21 p.m. 66336]
R2 WinDefend;Windows Defender;c:\program files\Windows Defender\MsMpEng.exe [3/11/2006 8:19 p.m. 13592]
S2 SHARSHTL;Shuttle Sharer;c:\windows\system32\Drivers\sharshtl.sys --> c:\windows\system32\Drivers\sharshtl.sys [?]
S3 adxapie;adxapie;\??\c:\docume~1\p\LOCALS~1\Temp\adxapie.sys --> c:\docume~1\p\LOCALS~1\Temp\adxapie.sys [?]
S3 FTLUND;Lundinova Filter Driver;c:\windows\system32\drivers\ftlund.sys [24/02/2003 10:36 a.m. 6828]
S3 Lavasoft Kernexplorer;Lavasoft helper driver;\??\c:\program files\Lavasoft\Ad-Aware\KernExplorer.sys --> c:\program files\Lavasoft\Ad-Aware\KernExplorer.sys [?]
S3 MEMSWEEP2;MEMSWEEP2;\??\c:\windows\system32\8.tmp --> c:\windows\system32\8.tmp [?]
S3 PROCEXP150;PROCEXP150;\??\c:\windows\system32\Drivers\PROCEXP150.SYS --> c:\windows\system32\Drivers\PROCEXP150.SYS [?]
S3 PSSDK42;PSSDK42;c:\windows\system32\drivers\pssdk42.sys [27/11/2011 12:41 a.m. 38976]
S3 PSSDKLBF;PSSDKLBF;c:\windows\system32\drivers\pssdklbf.sys [27/11/2011 12:41 a.m. 53312]
S4 epstwnt;epstwnt;c:\windows\system32\Drivers\epstwnt.mpd --> c:\windows\system32\Drivers\epstwnt.mpd [?]
S4 PASW;Process Activation Service;c:\windows\system32\psactive.exe [20/04/2011 5:00 a.m. 5120]
.
Contents of the 'Scheduled Tasks' folder
.
2013-11-01 c:\windows\Tasks\avast! Emergency Update.job
- c:\program files\Alwil Software\Avast5\AvastEmUpdate.exe [2012-12-27 08:58]
.
2013-11-01 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2012-04-08 10:07]
.
2013-11-01 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2012-04-08 10:07]
.
2013-11-01 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2052111302-1482476501-839522115-1003Core.job
- c:\documents and settings\p\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2012-07-06 06:08]
.
2013-11-01 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2052111302-1482476501-839522115-1003UA.job
- c:\documents and settings\p\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2012-07-06 06:08]
.
2013-11-01 c:\windows\Tasks\MP Scheduled Scan.job
- c:\program files\Windows Defender\MpCmdRun.exe [2006-11-03 07:20]
.
.
------- Supplementary Scan -------
.
uStart Page = about:blank
uInternet Settings,ProxyOverride = <local>
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.1
FF - ProfilePath - c:\documents and settings\p\Application Data\Mozilla\Firefox\Profiles\ijr4eq46.default-1382536298890\
FF - prefs.js: browser.startup.homepage - hxxp://www.ighome.com/
FF - ExtSQL: 2013-10-24 02:56; {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}; c:\documents and settings\p\Application Data\Mozilla\Firefox\Profiles\ijr4eq46.default-1382536298890\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi
FF - ExtSQL: 2013-10-24 02:56; {3d7eb24f-2740-49df-8937-200b1cc08f8a}; c:\documents and settings\p\Application Data\Mozilla\Firefox\Profiles\ijr4eq46.default-1382536298890\extensions\{3d7eb24f-2740-49df-8937-200b1cc08f8a}
.
- - - - ORPHANS REMOVED - - - -
.
SafeBoot-Lavasoft Ad-Aware Service
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-11-01 18:49
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...  
.
scanning hidden autostart entries ...
.
scanning hidden files ...  
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\System\ControlSet003\Services\epstwnt]
"ImagePath"="System32\Drivers\epstwnt.mpd"
.
[HKEY_LOCAL_MACHINE\System\ControlSet003\Services\MEMSWEEP2]
"ImagePath"="\??\c:\windows\system32\8.tmp"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-2052111302-1482476501-839522115-1003\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2052111302-1482476501-839522115-1003\Software\SecuROM\!CAUTION! NEVER A OR CHANGE ANY KEY*]
"??"=hex:f8,f2,76,32,01,ce,6d,9a,fd,01,0d,26,65,cc,99,62,f8,a1,f8,3e,76,b7,61,
   96,cb,85,35,50,36,ae,ff,9d,96,57,7a,f6,2d,fa,ba,40,82,3b,bd,d4,c0,ec,2e,3f,\
"??"=hex:70,38,c8,96,1e,5a,1d,a2,14,69,5c,df,b0,db,73,90
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_9_900_117_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_9_900_117_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\System\ControlSet003\Enum\LPTENUM\KyoceraFS-1000\5&17839986&0&LPT1.4]
@Denied: (C D) (Everyone)
"DeviceDesc"="Kyocera FS-1000"
"LocationInformation"="LPT1.4"
"Capabilities"=dword:00000040
"ConfigFlags"=dword:00000400
"HardwareID"=multi:"LPTENUM\\KyoceraFS-1000CDB9\00KyoceraFS-1000CDB9\00\00"
"ClassGUID"="{4D36E979-E325-11CE-BFC1-08002BE10318}"
"Class"="Printer"
"Driver"="{4D36E979-E325-11CE-BFC1-08002BE10318}\\0000"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(736)
c:\windows\system32\iac25_32.ax
c:\windows\system32\l3codecp.acm
c:\windows\system32\vorbis.acm
c:\windows\system32\divxa32.acm
c:\windows\system32\imc32.acm
c:\windows\system32\ac3acm.acm
c:\windows\system32\lameACM.acm
c:\windows\system32\IEFRAME.dll
.
- - - - - - - > 'explorer.exe'(2876)
c:\windows\system32\WININET.dll
c:\program files\Google\Drive\googledrivesync32.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Alwil Software\Avast5\AvastSvc.exe
c:\program files\Java\jre7\bin\jqs.exe
c:\program files\Common Files\LightScribe\LSSrvc.exe
c:\program files\CDBurnerXP\NMSAccessU.exe
c:\windows\RTHDCPL.EXE
.
**************************************************************************
.
Completion time: 2013-11-01  18:54:51 - machine was rebooted
ComboFix-quarantined-files.txt  2013-11-01 05:54
ComboFix2.txt  2011-05-08 15:15
ComboFix3.txt  2011-05-05 12:24
ComboFix4.txt  2011-05-05 12:05
ComboFix5.txt  2013-11-01 05:37
.
Pre-Run: 47,209,402,368 bytes free
Post-Run: 47,675,756,544 bytes free
.
- - End Of File - - 3DB95F3D6DBC8671CF2613A2086BF3F5
8F558EB6672622401DA993E1E865C861



 



#6 nasdaq

nasdaq

  • Malware Response Team
  • 40,197 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:07:49 AM

Posted 01 November 2013 - 07:46 AM

Lets check the validity of these files
atapi.sys
beep.sys
psactive.exe


Please download SystemLook from one of the links below and save it to your Desktop.
Download Mirror #1
Download Mirror #2


If your operating system is 64 bit download this tool:
SystemLook_x64.exe
  • Double-click SystemLook.exe
  • to run it.
  • Copy and paste the content
  • of the following bold text into the main textfield:
    :filefind
    atapi.sys
    beep.sys
    psactive.exe
  • Click the Look button to start the scan.
  • When finished, a notepad window will open with the results of the scan. Please post this log in your next reply.[/*
  • Note: The log can also be found on your Desktop entitled SystemLook.txt.


#7 thirdkray

thirdkray
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:07:49 AM

Posted 01 November 2013 - 08:31 AM

SystemLook 30.07.11 by jpshortstuff
Log created at 02:28 on 02/11/2013 by p
Administrator - Elevation successful

========== filefind ==========

Searching for "atapi.sys"
C:\WINDOWS\ERDNT\cache\atapi.sys    --a---- 96512 bytes    [14:07 03/05/2011]    [12:10 13/04/2008] 9F3A2F5AA6875C72BF062C712CFA2674
C:\WINDOWS\ServicePackFiles\i386\atapi.sys    ------- 96512 bytes    [09:49 09/05/2008]    [12:10 13/04/2008] 9F3A2F5AA6875C72BF062C712CFA2674
C:\WINDOWS\system32\drivers\atapi.sys    --a---- 96512 bytes    [12:00 04/08/2004]    [12:10 13/04/2008] 9F3A2F5AA6875C72BF062C712CFA2674

Searching for "beep.sys"
C:\WINDOWS\system32\dllcache\beep.sys    --a--c- 4224 bytes    [12:00 04/08/2004]    [12:00 04/08/2004] DA1F27D85E0D1525F6621372E7B685E9

Searching for "psactive.exe"
C:\WINDOWS\system32\psactive.exe    --a---- 5120 bytes    [16:00 19/04/2011]    [00:00 01/08/2006] 55F52BA64E49784B7B7059799DAF3B85

-= EOF =-



#8 nasdaq

nasdaq

  • Malware Response Team
  • 40,197 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:07:49 AM

Posted 01 November 2013 - 09:30 AM

Open notepad and copy/paste the text in the quote box below into it:
 
FCOPY::
C:\WINDOWS\ServicePackFiles\i386\atapi.sys | C:\WINDOWS\system32\drivers\atapi.sys
C:\WINDOWS\system32\dllcache\beep.sys | c:\windows\System32\drivers\beep.sys

Save this as CFScript.txt on your desktop.

CFScriptB-4.gif

Referring to the picture above, drag CFScript into ComboFix.exe
Then post the resultant log.
===

I have nothing to compare the psactive.exe file.
Some versions have been seen to be malware. Lets check it out.

>>> Run Jotti's malware scan: Please copy this line (in bold):
C:\WINDOWS\system32\psactive.exe
  • Go to Jotti's malware scan
  • and click the Browse button,
  • A window will open, right-click in the File name field and choose Paste.
  • Click the Submit button and let the scan run uninterrupted.
  • At the end right-click the Permalink button and choose "Copy the link". Capture.JPG
  • Open Notepad (Start => All Programs => Accessories) and click "Edition" => "Paste".
Please copy and paste these Permalink in your next reply.
If Jotti is busy, please go to http://www.virustotal.com


Let me know what problem persists.

#9 thirdkray

thirdkray
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:07:49 AM

Posted 01 November 2013 - 09:49 AM

http://virusscan.jotti.org/en-gb/scanresult/ae940ba25ad4c0a7f7579a315501866143dc7a6a

 

Looks similar to my initial Metascan post. I am leaning towards this being just an AV glitch war.

 

I will do the Combofix on the other two tomorrow



#10 nasdaq

nasdaq

  • Malware Response Team
  • 40,197 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:07:49 AM

Posted 01 November 2013 - 10:27 AM

11 out of 26 have reported malware.

http://virusscan.jotti.org/en-gb/scanresult/ae940ba25ad4c0a7f7579a315501866143dc7a6a
===

Have you ever tried to disable that service and see if you need it?
S4 PASW;Process Activation Service;c:\windows\system32\psactive.exe

#11 thirdkray

thirdkray
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:07:49 AM

Posted 01 November 2013 - 09:51 PM

No I havent tried to disable it. I can't find a decent description of its function even on Microsoft.com.

 

Actually, I was thinking of just changing AV's.

 

Avast used to be good but now its all bells, whistles, popups and purchase suggestions. After it says it has deleted it, the file is still present. Then on right click scan, Avast says NO THREAT FOUND. That's just fickle.

 

Malwarebytes also reports no problem on right click scan of psactive.exe.

 

A similar percentage of Metascan reported malware but I haven't managed to find a decent malware database to see what other files or registry keys should be present if there is an infection involved with any of those flagged malware titles. The internet is flooded with sites that flag psactive.exe then just want you to download another piece of anti malware software.

 

There's always Linux ;)



#12 thirdkray

thirdkray
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:07:49 AM

Posted 02 November 2013 - 04:49 AM

Process Activation Service is disabled



#13 nasdaq

nasdaq

  • Malware Response Team
  • 40,197 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:07:49 AM

Posted 02 November 2013 - 07:31 AM

Install Microsoft Security Essentials.
http://windows.microsoft.com/en-ca/windows/security-essentials-download

Use this utilily to remove Avast.
AVAST Uninstall Utility
http://www.avast.com/uninstall-utility

Install MSE.
Run it and see if it reports psactive.exe as bad.

===

Run this scan and post the log for my review.

Download Security Check by screen317 from here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.
===

#14 thirdkray

thirdkray
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:07:49 AM

Posted 02 November 2013 - 10:54 AM

MSE detected psactive.exe as TrojanDropper w32/Yoader.A which appears to be their generic. I allowed it to quarantine. Where does it log?

 

Microsoft does not recommend running MSE without a third party AV installed.

 

Results of screen317's Security Check version 0.99.76  
 Windows XP Service Pack 3 x86   
 Internet Explorer 8  
``````````````Antivirus/Firewall Check:``````````````
 Windows Firewall Enabled!  
Lavasoft Ad-Watch Live! Anti-Virus   
Microsoft Security Essentials        
avast! Antivirus                     
 Antivirus up to date! (On Access scanning disabled!)
`````````Anti-malware/Other Utilities Check:`````````
 Ad-Aware
 Out of date HijackThis  installed!
 Windows Defender    
 Malwarebytes Anti-Malware version 1.75.0.1300  
 HijackThis 1.99.1    
 CCleaner     
 Temp File Cleaner   
 JavaFX 2.1.1    
 Java 7 Update 45  
 Adobe Flash Player     11.9.900.117  
 Adobe Reader XI  
 Mozilla Firefox (24.0)
 Mozilla Thunderbird (24.0.1)
````````Process Check: objlist.exe by Laurent````````  
 Microsoft Security Essentials MSMpEng.exe
 Microsoft Security Essentials msseces.exe
 Ad-Aware AAWService.exe is disabled!
 Ad-Aware AAWTray.exe is disabled!
 Alwil Software Avast5 AvastSvc.exe  
 Alwil Software Avast5 avastUI.exe  
`````````````````System Health check`````````````````
 Total Fragmentation on Drive C:: 5%
````````````````````End of Log``````````````````````
 



#15 nasdaq

nasdaq

  • Malware Response Team
  • 40,197 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:07:49 AM

Posted 02 November 2013 - 12:24 PM

Remove the Process Activation service.

Open notepad and copy/paste the text in the quote box below into it:

File::
c:\windows\system32\psactive.exe

Driver::
PASW

ClearJavaCache::

Save this as CFScript.txt on your desktop.

CFScriptB-4.gif

Referring to the picture above, drag CFScript into ComboFix.exe
Then post the resultant log.

If something goes wrong we can restore it. Let me know.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users