Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

AVG reports 8 IRP hooks mainly in files named PCIIDEX. is this a false positive?


  • This topic is locked This topic is locked
8 replies to this topic

#1 eatdragon

eatdragon

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:41 AM

Posted 12 November 2013 - 06:29 PM

Mod Edit: Moved to appropriate forum ~~ boopme

Hi,
Firstly can I thank you for your time. Unfortunately AVG 2014 has reported that I have eight IRP hook rootkits which it cannot remove. Other Bleepingcomputer forum queries have reported IRP hook problems but their logs are different to mine so I wondered if I have a different problem and need a different solution?
I have attached logs from AVG, GMER and DDS logs
The AVG report is also below. I have also run RKILL which terminates three processes. After I run RKILL, I ran AVG and Malwarebytes again to see if they would now remove the rootkits but they were not able to.

AVG Report
"";"IRP hook, C:\WINDOWS\System32\drivers\intelide.sys IRP_MJ_POWER -> PCIIDEX.SYS +0x692, C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS";"Infected"

"";"IRP hook, C:\WINDOWS\System32\drivers\intelide.sys IRP_MJ_SYSTEM_CONTROL -> PCIIDEX.SYS PciIdeXDebugPrint+0x2DB4, C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS";"Infected"

"";"IRP hook, C:\WINDOWS\System32\drivers\intelide.sys IRP_MJ_PNP -> PCIIDEX.SYS PciIdeXDebugPrint+0x2D80, C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS";"Infected"

"";"IRP hook, C:\WINDOWS\System32\drivers\pciide.sys IRP_MJ_INTERNAL_DEVICE_CONTROL -> PCIIDEX.SYS PciIdeXDebugPrint+0x2E38, C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS";"Infected"

"";"IRP hook, C:\WINDOWS\System32\drivers\pciide.sys IRP_MJ_POWER -> PCIIDEX.SYS +0x692, C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS";"Infected"

"";"IRP hook, C:\WINDOWS\System32\drivers\pciide.sys IRP_MJ_SYSTEM_CONTROL -> PCIIDEX.SYS PciIdeXDebugPrint+0x2DB4, C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS";"Infected"

"";"IRP hook, C:\WINDOWS\System32\drivers\pciide.sys IRP_MJ_PNP -> PCIIDEX.SYS PciIdeXDebugPrint+0x2D80, C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS";"Infected"

"";"IRP hook, C:\WINDOWS\System32\drivers\intelide.sys IRP_MJ_INTERNAL_DEVICE_CONTROL -> PCIIDEX.SYS PciIdeXDebugPrint+0x2E38, C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS";"Infected"


RKILL - 3 lines from log
Checking for processes to terminate:

* C:\WINDOWS\system32\Ati2evxx.exe (PID: 1284) [WD-HEUR]
* C:\WINDOWS\system32\basfipm.exe (PID: 1964) [WD-HEUR]
* C:\WINDOWS\system32\drivers\CDAC11BA.EXE (PID: 412) [WD-HEUR]

3 proccesses terminated!

Attached Files


Edited by boopme, 12 November 2013 - 07:12 PM.


BC AdBot (Login to Remove)

 


#2 eatdragon

eatdragon
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:41 AM

Posted 16 November 2013 - 11:27 AM

Hello,

Excuse me for putting my request in the wrong forum, has anyone had a chance to see if this is a genuine problem or a false positive?

Thanks for your time

eatdragon



#3 nasdaq

nasdaq

  • Malware Response Team
  • 39,586 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:03:41 AM

Posted 17 November 2013 - 10:08 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps.
===

I see traces of Norton.
Download and run the Norton Removal Tool FOR THE PRODUCT YOU REMOVED.
https://www-secure.symantec.com/norton-support/jsp/help-solutions.jsp?docid=20080710133834EN&lg=english&ct=united+states&product=home&version=1&pvid=f-home&entsrc=redirect_pubweb
===

--RogueKiller--
  • Download & SAVE to your Desktop RogueKiller for 32bit or Roguekiller for 64bit
  • Quit all programs that you may have started.
  • Please disconnect any USB or external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select "Run as Administrator to start"
  • For Windows XP, double-click to start.
  • Wait until Prescan has finished ...
  • Then Click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • click on "delete"
  • Wait until the Status box shows "Deleting Finished"
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • The log should be found in RKreport[1].txt on your Desktop
  • Exit/Close RogueKiller+
==============

Please download AdwCleaner by Xplode onto your Desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Click the Report button and the report will open in Notepad.
IMPORTANT
  • If you click the Clean button all items listed in the report will be removed.
If you find some false positive items or programs that you wish to keep, Close the AdwCleaner windows.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Check off the element(s) you wish to keep.
  • Click on the Clean button follow the prompts.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleaner[Sn].txt (n is a number).
===

thisisujrt.gif Please download
Junkware Removal Tool to your Desktop.
  • Please close your security software to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista or 7, right-mouse click it and select Run as administrator.
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete, depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your Desktop and will automatically open.
  • Please post the contents of JRT.txt into your reply.
===

Please download ComboFix from one of these locations:
Link 1
Link 2
IMPORTANT !!! Save ComboFix.exe to your Desktop
  • Disable your Anti-Virus and Anti-Spyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools.
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.
  • Some Rookit infection may damage your boot sector. The Windows Recovery Console may be needed to restore it. Do not bypass this installation. You may regret it.
**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.
RcAuto1.gif
Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:
whatnext.png
Click on Yes, to continue scanning for malware.
When finished, it shall produce a log for you. Please include the C:\ComboFix.txt in your next reply.

Note: If you have difficulty properly disabling your protection programs, refer to this link --> http://www.bleepingcomputer.com/forums/topic114351.html

Do not mouse click ComboFix's window while it's running. That may cause it to stall

Note: If after running ComboFix you get this error message "Illegal operation attempted on a registry key that has been marked for deletion." when attempting to run a program all you need to do is restart the computer to reset the registry.
===

Please paste the logs in your next reply, DO NOT ATTACH THEM
Let me know what problem persists.

#4 eatdragon

eatdragon
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:41 AM

Posted 21 November 2013 - 06:29 PM

Nasdaq,
Thank you for your response I have done everything you have said

  • Ran Norton Removal
  • Ran Rogue Killer, report is:

RogueKiller V8.7.8 [Nov 14 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.adlice.com/forum/
Website : http://www.adlice.com/softwares/roguekiller/
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows XP (5.1.2600 Service Pack 3) 32 bits version
Started in : Normal mode
User : Rob [Admin rights]
Mode : Remove -- Date : 11/19/2013 23:08:28
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 2 ¤¤¤
[HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> DELETED
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-

08002B30309D} (1) -> REPLACED (0)

¤¤¤ Scheduled tasks : 0 ¤¤¤

¤¤¤ Startup Entries : 0 ¤¤¤

¤¤¤ Web browsers : 0 ¤¤¤

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤

¤¤¤ External Hives: ¤¤¤

¤¤¤ Infection :  ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts


127.0.0.1       localhost
127.0.0.1    www.007guard.com
127.0.0.1    007guard.com
127.0.0.1    008i.com
127.0.0.1    www.008k.com
127.0.0.1    008k.com
127.0.0.1    www.00hq.com
127.0.0.1    00hq.com
127.0.0.1    010402.com
127.0.0.1    www.032439.com
127.0.0.1    032439.com
127.0.0.1    www.0scan.com
127.0.0.1    0scan.com
127.0.0.1    www.1000gratisproben.com
127.0.0.1    1000gratisproben.com
127.0.0.1    www.1001namen.com
127.0.0.1    1001namen.com
127.0.0.1    100888290cs.com
127.0.0.1    www.100888290cs.com
127.0.0.1    100sexlinks.com
[...]


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) FUJITSU MHV2060AH +++++
--- User ---
[MBR] a5f9eded9de981e20b28d412eba8396b
[BSP] 11d467b9f31927f29d49c85858b51038 : Windows XP MBR Code
Partition table:
0 - [XXXXXX] DELL-UTIL (0xde) [VISIBLE] Offset (sectors): 63 | Size: 94 Mo
1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 192780 | Size: 57121 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[0]_D_11192013_230828.txt >>
RKreport[0]_S_11192013_230141.txt;RKreport[0]_S_11192013_230810.txt

  • Ran AdwCleaner. Report is;

RogueKiller V8.7.8 [Nov 14 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.adlice.com/forum/
Website : http://www.adlice.com/softwares/roguekiller/
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows XP (5.1.2600 Service Pack 3) 32 bits version
Started in : Normal mode
User : Rob [Admin rights]
Mode : Remove -- Date : 11/19/2013 23:08:28
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 2 ¤¤¤
[HJ POL][PUM] HKCU\[...]\System : DisableRegistryTools (0) -> DELETED
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-

08002B30309D} (1) -> REPLACED (0)

¤¤¤ Scheduled tasks : 0 ¤¤¤

¤¤¤ Startup Entries : 0 ¤¤¤

¤¤¤ Web browsers : 0 ¤¤¤

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤

¤¤¤ External Hives: ¤¤¤

¤¤¤ Infection :  ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts


127.0.0.1       localhost
127.0.0.1    www.007guard.com
127.0.0.1    007guard.com
127.0.0.1    008i.com
127.0.0.1    www.008k.com
127.0.0.1    008k.com
127.0.0.1    www.00hq.com
127.0.0.1    00hq.com
127.0.0.1    010402.com
127.0.0.1    www.032439.com
127.0.0.1    032439.com
127.0.0.1    www.0scan.com
127.0.0.1    0scan.com
127.0.0.1    www.1000gratisproben.com
127.0.0.1    1000gratisproben.com
127.0.0.1    www.1001namen.com
127.0.0.1    1001namen.com
127.0.0.1    100888290cs.com
127.0.0.1    www.100888290cs.com
127.0.0.1    100sexlinks.com
[...]


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) FUJITSU MHV2060AH +++++
--- User ---
[MBR] a5f9eded9de981e20b28d412eba8396b
[BSP] 11d467b9f31927f29d49c85858b51038 : Windows XP MBR Code
Partition table:
0 - [XXXXXX] DELL-UTIL (0xde) [VISIBLE] Offset (sectors): 63 | Size: 94 Mo
1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 192780 | Size: 57121 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[0]_D_11192013_230828.txt >>
RKreport[0]_S_11192013_230141.txt;RKreport[0]_S_11192013_230810.txt


  • Ran Junkware Removal tool. Report is 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.0.8 (11.05.2013:1)
OS: Microsoft Windows XP x86
Ran by Rob on 19/11/2013 at 23:42:42.20
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values

Successfully repaired: [Registry Value] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\\DisplayName
Successfully repaired: [Registry Value] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\\URL



~~~ Registry Keys

Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\AppDataLow\software\adawarebp
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{26F2921C-0469-4950-A652-BB9D1BD01678}



~~~ Files



~~~ Folders



~~~ FireFox

Failed to delete: [File] "C:\Program Files\Mozilla Firefox\searchplugins\avg_igeared.xml"


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 19/11/2013 at 23:51:17.21
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
  • Ran ComboFix. The report is
ComboFix 13-11-19.01 - Rob 20/11/2013   0:05.1.1 - x86
Microsoft Windows XP Professional 

5.1.2600.3.1252.44.1033.18.1535.860 [GMT 0:00]
Running from: c:\documents and settings\Rob\Desktop\ComboFix.exe
AV: Ad-Aware Antivirus *Disabled/Outdated*

{22CB8761-914A-11CF-B705-00AA0062CBB7}
FW: Ad-Aware Firewall *Disabled*

{9211320F-6C40-4035-BBDE-3C96ED504F33}
FW: ZoneAlarm Firewall *Enabled*

{829BDA32-94B3-44F4-8446-F8FCFF809F8B}
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions  

)))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\TEMP
c:\documents and settings\All Users\Application

Data\TEMP\AVG\avgmfapx.exe
c:\documents and settings\All Users\Application

Data\TEMP\AVG\avgmfarx.dll
c:\documents and settings\All Users\Application

Data\TEMP\AVG\avgntdumpx.exe
c:\documents and settings\All Users\Application

Data\TEMP\AVG\avgrunasx.exe
c:\documents and settings\All Users\Application

Data\TEMP\AVG\avi7.avg
c:\documents and settings\All Users\Application

Data\TEMP\AVG\compat.ini
c:\documents and settings\All Users\Application

Data\TEMP\AVG\htmlayout.dll
c:\documents and settings\All Users\Application

Data\TEMP\AVG\incavi.avm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_cz.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_da.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_es.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_fr.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_ge.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_hu.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_id.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_in.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_it.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_jp.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_ko.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_ms.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_nl.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_pb.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_pl.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_pt.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_ru.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_sc.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_sk.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_sp.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_tr.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_us.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_zh.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\license_zt.htm
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfaconf.txt
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfacz.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfada.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfaes.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfafr.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfage.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfahu.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfaid.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfain.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfait.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfajp.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfako.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfams.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfanl.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfapb.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfapl.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfapt.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfaru.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfasc.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfask.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfasp.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfatr.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfaus.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfavera.txt
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfaverx.txt
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfazh.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\mfazt.lns
c:\documents and settings\All Users\Application

Data\TEMP\AVG\microavi.avg
c:\documents and settings\All Users\Application

Data\TEMP\AVG\miniavi.avg
c:\documents and settings\All Users\Application

Data\TEMP\AVG\setup.exe
c:\documents and settings\All Users\Application

Data\TEMP\AVG\setup.ini
c:\documents and settings\Rob\WINDOWS
C:\LOG8B.tmp
c:\windows\system32\AutoRun.inf
c:\windows\system32\drivers\fad.sys
c:\windows\system32\FlashPlayerApp.exe
c:\windows\system32\SET148.tmp
c:\windows\system32\SET163.tmp
c:\windows\system32\SET165.tmp
c:\windows\system32\SET174.tmp
c:\windows\system32\SET198.tmp
c:\windows\system32\STEC3.sys
c:\windows\wininit.ini
.
.
(((((((((((((((((((((((((((((((((((((((   Drivers/Services  

)))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Legacy_STEC3
-------\Service_STEC3
.
.
(((((((((((((((((((((((((   Files Created from 2013-10-20 to 2013-11-20 

)))))))))))))))))))))))))))))))
.
.
2013-11-19 23:41 . 2013-11-19 23:41    --------    d-----w-   

c:\windows\ERUNT
2013-11-19 19:57 . 2013-11-19 23:25    --------    d-----w-    C:\AdwCleaner
2013-11-16 19:42 . 2013-11-16 19:42    --------    d-----w-    c:\documents

and settings\Rob\Application Data\Lavasoft
2013-11-16 18:08 . 2013-11-16 18:08    --------    d-----w-    c:\program

files\Lavasoft
2013-11-16 18:06 . 2013-11-16 18:06    --------    d-----w-    c:\program

files\Common Files\Lavasoft
2013-11-16 17:58 . 2013-11-16 17:58    --------    d-----w-    c:\documents

and settings\All Users\Application Data\Lavasoft
2013-11-05 22:06 . 2013-11-05 22:06    --------    d-----w-    c:\documents

and settings\Rob\Application Data\BBCiPlayerDesktop
2013-11-05 21:46 . 2013-11-05 21:46    2196    ----a-w-   

C:\cc_20131105_214610.reg
2013-10-31 22:48 . 2013-10-31 22:48    --------    d-----w-    c:\documents

and settings\All Users\Application Data\Panda Security
2013-10-31 22:07 . 2013-10-31 22:07    274638    ----a-w-   

C:\cc_20131031_220707.reg
2013-10-31 21:06 . 2013-10-31 21:07    --------    d-----w-    c:\program

files\Panda USB Vaccine
2013-10-27 20:15 . 2013-11-17 02:19    --------    d-----w-    c:\program

files\Eraser
2013-10-27 19:49 . 2013-10-27 19:49    --------    d-----w-    c:\documents

and settings\Rob\Local Settings\Application Data\Eraser 6
2013-10-27 19:35 . 2013-10-27 19:40    --------    d-----w-    c:\documents

and settings\Rob\Application Data\ImgBurn
2013-10-27 16:49 . 2013-10-27 16:49    --------    d-----w-    c:\documents

and settings\Administrator\Application Data\Malwarebytes
2013-10-27 16:03 . 2013-10-27 16:03    --------    d-----w-    c:\documents

and settings\Administrator\Application Data\Sony Ericsson
2013-10-27 16:02 . 2013-10-27 16:02    --------    d-sh--w-    c:\documents

and settings\Administrator\IETldCache
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report  

))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-10-13 07:25 . 2004-08-11 16:00    920064    ----a-w-   

c:\windows\system32\wininet.dll
2013-10-13 07:25 . 2004-08-11 16:00    43520    ----a-w-   

c:\windows\system32\licmgr10.dll
2013-10-13 07:25 . 2004-08-11 16:00    1469440    ------w-   

c:\windows\system32\inetcpl.cpl
2013-10-13 07:24 . 2004-08-11 16:00    18944    ----a-w-   

c:\windows\system32\corpol.dll
2013-10-13 06:57 . 2004-08-11 16:00    385024    ----a-w-   

c:\windows\system32\html.iec
2013-10-12 15:56 . 2004-08-11 16:00    278528    ----a-w-   

c:\windows\system32\oakley.dll
2013-10-09 13:12 . 2004-08-11 16:00    287744    ----a-w-   

c:\windows\system32\gdi32.dll
2013-10-09 11:51 . 2011-05-16 17:15    71048    ----a-w-   

c:\windows\system32\FlashPlayerCPLApp.cpl
2013-10-07 10:59 . 2004-08-11 16:00    603136    ----a-w-   

c:\windows\system32\crypt32.dll
2013-10-05 01:14 . 2009-04-16 10:52    7168    ----a-w-   

c:\windows\system32\xpsp4res.dll
2013-08-29 01:31 . 2004-08-11 16:00    1878656    ----a-w-   

c:\windows\system32\win32k.sys
2013-08-29 00:56 . 2006-04-01 17:34    26240    ----a-w-   

c:\windows\system32\drivers\usbser.sys
2013-08-22 09:16 . 2013-05-18 12:10    13024    ----a-w-   

c:\windows\system32\drivers\SWDUMon.sys
.
.
------- Sigcheck -------
Note: Unsigned files aren't necessarily malware.
.
[7] 2008-04-13 . 9F3A2F5AA6875C72BF062C712CFA2674 . 96512 . .

[5.1.2600.5512] . . c:\windows\ServicePackFiles\i386\atapi.sys
[-] 2004-08-03 . CDFE4411A69C224BD1D11B2DA92DAC51 . 95360 . .

[5.1.2600.2180] . . c:\windows\$NtServicePackUninstall$\atapi.sys
[-] 2004-08-03 . CDFE4411A69C224BD1D11B2DA92DAC51 . 95360 . .

[5.1.2600.2180] . . c:\windows\system32\drivers\atapi.sys
[-] 2004-08-03 . CDFE4411A69C224BD1D11B2DA92DAC51 . 95360 . .

[5.1.2600.2180] . .

c:\windows\system32\ReinstallBackups\0005\DriverFiles\i386\atapi.sys
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points  

))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\ex

plorer\shelliconoverlayidentifiers\DropboxExt1]
@="{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314ED9-A251-47B7-93E1-CDD82E

34AF8B}]
2013-05-25 00:36    130736    ----a-w-    c:\documents and

settings\Rob\Application Data\Dropbox\bin\DropboxExt.19.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\ex

plorer\shelliconoverlayidentifiers\DropboxExt2]
@="{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314EDA-A251-47B7-93E1-CDD82E

34AF8B}]
2013-05-25 00:36    130736    ----a-w-    c:\documents and

settings\Rob\Application Data\Dropbox\bin\DropboxExt.19.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\ex

plorer\shelliconoverlayidentifiers\DropboxExt3]
@="{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314EDB-A251-47B7-93E1-CDD82E

34AF8B}]
2013-05-25 00:36    130736    ----a-w-    c:\documents and

settings\Rob\Application Data\Dropbox\bin\DropboxExt.19.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\ex

plorer\shelliconoverlayidentifiers\DropboxExt4]
@="{FB314EDC-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314EDC-A251-47B7-93E1-CDD82E

34AF8B}]
2013-05-25 00:36    130736    ----a-w-    c:\documents and

settings\Rob\Application Data\Dropbox\bin\DropboxExt.19.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersi

on\Run]
"Apoint"="c:\program files\Apoint\Apoint.exe" [2004-09-13 155648]
"ATIPTA"="c:\program files\ATI Technologies\ATI Control

Panel\atiptaxx.exe" [2005-01-11 344064]
"IntelWireless"="c:\program files\Intel\Wireless\Bin\ifrmewrk.exe"

[2004-10-30 385024]
"Dell QuickSet"="c:\program files\Dell\QuickSet\quickset.exe"

[2005-03-04 606208]
"BluetoothAuthenticationAgent"="bthprops.cpl" [2008-04-14 110592]
"ZoneAlarm Client"="c:\program files\Zone Labs\ZoneAlarm\zlclient.exe"

[2009-02-16 981384]
"IMJPMIG8.1"="c:\windows\IME\imjp8_1\IMJPMIG.EXE" [2004-08-03

208952]
"IMEKRMIG6.1"="c:\windows\ime\imkr6_1\IMEKRMIG.EXE" [2004-08-04

44032]
"MSPY2002"="c:\windows\system32\IME\PINTLGNT\ImScInst.exe"

[2004-08-03 59392]
"PHIME2002ASync"="c:\windows\system32\IME\TINTLGNT\TINTSETP.E

XE" [2004-08-03 455168]
"PHIME2002A"="c:\windows\system32\IME\TINTLGNT\TINTSETP.EXE"

[2004-08-03 455168]
"AdAwareTray"="c:\program files\Lavasoft\Ad-Aware Antivirus\Ad-Aware

Antivirus\11.0.4555.0\AdAwareTray.exe" [2013-10-18 2162008]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\

Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-14

15360]
.
c:\documents and settings\All Users\Start Menu\Programs\Startup\
AutoStart IR.lnk.disabled [2008-1-13 681]
BTTray.lnk.disabled [2005-9-6 681]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows

nt\currentversion\winlogon\notify\IntelWireless]
2004-09-07 15:08    110592    ----a-w-    c:\program

files\Intel\Wireless\Bin\LgNotify.dll
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session

manager]
BootExecute    REG_MULTI_SZ       autocheck autochk *\0 /sync

/restart\0 /sync /restart\0 /sync /restart\0 /sync /restart\0 /sync /restart\0

/sync /restart
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot

\Minimal\Wdf01000.sys]
@="Driver"
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared

tools\msconfig\startupreg\Eraser]
2012-05-22 08:13    980920    ----a-w-    c:\progra~1\Eraser\Eraser.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

-]
"BluetoothAuthenticationAgent"=rundll32.exe

bthprops.cpl,,BluetoothAuthenticationAgent
.
[HKEY_LOCAL_MACHINE\software\microsoft\security

center\Monitoring\ZoneLabsFirewall]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile

]
"EnableFirewall"= 0 (0x0)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile

\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\Program Files\\Messenger\\msmsgs.exe"=
"c:\\Program Files\\Google\\Google Talk\\googletalk.exe"=
"c:\\Program Files\\Kontiki\\KService.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Program Files\\Sony Ericsson\\Update Service\\Update

Service.exe"=
"c:\\Documents and Settings\\Rob\\Local Settings\\Application

Data\\Google\\Google Talk Plugin\\googletalkplugin.exe"=
"c:\\Documents and Settings\\Rob\\Application

Data\\Dropbox\\bin\\Dropbox.exe"=
"c:\\Program Files\\Bonjour\\mDNSResponder.exe"=
"c:\\Program Files\\Skype\\Phone\\Skype.exe"=
"c:\\Program Files\\Common Files\\Apple\\Apple Application

Support\\WebKit2WebProcess.exe"=
"c:\\Program Files\\iTunes\\iTunes.exe"=
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile

\GloballyOpenPorts\List]
"5353:UDP"= 5353:UDP:Bonjour Port 5353
.
R2 LavasoftAdAwareService11;Ad-Aware Service 11;c:\program

files\Lavasoft\Ad-Aware Antivirus\Ad-Aware

Antivirus\11.0.4555.0\AdAwareService.exe [18/10/2013 17:59 497744]
R2 Secunia Update Agent;Secunia Update Agent;c:\program

files\Secunia\PSI\sua.exe [26/11/2012 14:09 659040]
R3 GTIPCI21;GTIPCI21;c:\windows\system32\drivers\gtipci21.sys

[29/07/2005 12:00 80384]
R3 gzflt;gzflt;c:\program files\Lavasoft\Ad-Aware Antivirus\Antimalware

Engine\2.6.0.0\gzflt.sys [17/07/2013 18:10 154464]
R3 seehcri;Sony Ericsson seehcri Device

Driver;c:\windows\system32\drivers\seehcri.sys [26/09/2009 22:14

27632]
S3 ggflt;SEMC USB Flash Driver

Filter;c:\windows\system32\drivers\ggflt.sys [10/03/2010 15:28 13224]
S3 k510bus;Sony Ericsson K510 Driver driver

(WDM);c:\windows\system32\drivers\k510bus.sys [29/03/2009 15:42

58288]
S3 k510mdfl;Sony Ericsson K510 USB WMC Modem

Filter;c:\windows\system32\drivers\k510mdfl.sys [29/03/2009 15:42

8336]
S3 k510mdm;Sony Ericsson K510 USB WMC Modem

Driver;c:\windows\system32\drivers\k510mdm.sys [29/03/2009 15:42

94064]
S3 k510mgmt;Sony Ericsson K510 USB WMC Device Management

Drivers (WDM);c:\windows\system32\drivers\k510mgmt.sys [29/03/2009

15:42 85408]
S3 k510obex;Sony Ericsson K510 USB WMC OBEX

Interface;c:\windows\system32\drivers\k510obex.sys [29/03/2009 15:42

83344]
S3 nmwcdnsu;Nokia USB Flashing Phone

Parent;c:\windows\system32\drivers\nmwcdnsu.sys [29/07/2008 20:48

138112]
S3 nmwcdnsuc;Nokia USB Flashing

Generic;c:\windows\system32\drivers\nmwcdnsuc.sys [29/07/2008 20:48

8320]
S3 nosGetPlusHelper;getPlus® Helper

3004;c:\windows\System32\svchost.exe -k nosGetPlusHelper

[11/08/2004 16:00 14336]
S3 PSI;PSI;c:\windows\system32\drivers\psi_mf.sys [01/09/2010 08:30

15544]
S3 s0016bus;Sony Ericsson Device 0016 driver

(WDM);c:\windows\system32\drivers\s0016bus.sys [26/09/2009 22:13

89256]
S3 s0016mdfl;Sony Ericsson Device 0016 USB WMC Modem

Filter;c:\windows\system32\drivers\s0016mdfl.sys [26/09/2009 22:13

15016]
S3 s0016mdm;Sony Ericsson Device 0016 USB WMC Modem

Driver;c:\windows\system32\drivers\s0016mdm.sys [26/09/2009 22:13

120744]
S3 s0016mgmt;Sony Ericsson Device 0016 USB WMC Device

Management Drivers

(WDM);c:\windows\system32\drivers\s0016mgmt.sys [26/09/2009 22:13

114216]
S3 s0016nd5;Sony Ericsson Device 0016 USB Ethernet Emulation

SEMC0016 (NDIS);c:\windows\system32\drivers\s0016nd5.sys

[26/09/2009 22:13 25512]
S3 s0016obex;Sony Ericsson Device 0016 USB WMC OBEX

Interface;c:\windows\system32\drivers\s0016obex.sys [26/09/2009 22:13

110632]
S3 s0016unic;Sony Ericsson Device 0016 USB Ethernet Emulation

SEMC0016 (WDM);c:\windows\system32\drivers\s0016unic.sys

[26/09/2009 22:13 115752]
S3 Secunia PSI Agent;Secunia PSI Agent;c:\program

files\Secunia\PSI\psia.exe [26/11/2012 14:09 1225312]
S3 SWDUMon;SWDUMon;c:\windows\system32\drivers\SWDUMon.sys

[18/05/2013 12:10 13024]
S3 TomTomHOMEService;TomTomHOMEService;c:\program

files\TomTom HOME 2\TomTomHOMEService.exe [28/08/2012 07:41

92632]
S4 SkypeUpdate;Skype Updater;c:\program

files\Skype\Updater\Updater.exe [19/10/2012 16:14 160944]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows

nt\currentversion\svchost]
HPZ12    REG_MULTI_SZ       Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt    REG_MULTI_SZ       hpqcxs08 hpqddsvc
nosGetPlusHelper    REG_MULTI_SZ       nosGetPlusHelper
.
Contents of the 'Scheduled Tasks' folder
.
2013-11-20 c:\windows\Tasks\PandaUSBVaccine.job
- c:\program files\Panda USB Vaccine\RunInteractiveWin.exe

[2013-10-31 16:45]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com
uInternet Settings,ProxyOverride = *.local
IE: Convert link target to Adobe PDF - c:\program files\Adobe\Acrobat

7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert link target to existing PDF - c:\program files\Adobe\Acrobat

7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert selected links to Adobe PDF - c:\program

files\Adobe\Acrobat

7.0\Acrobat\AcroIEFavClient.dll/AcroIECaptureSelLinks.html
IE: Convert selected links to existing PDF - c:\program

files\Adobe\Acrobat

7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppendSelLinks.html
IE: Convert selection to Adobe PDF - c:\program files\Adobe\Acrobat

7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert selection to existing PDF - c:\program files\Adobe\Acrobat

7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: Convert to Adobe PDF - c:\program files\Adobe\Acrobat

7.0\Acrobat\AcroIEFavClient.dll/AcroIECapture.html
IE: Convert to existing PDF - c:\program files\Adobe\Acrobat

7.0\Acrobat\AcroIEFavClient.dll/AcroIEAppend.html
IE: E&xport to Microsoft Excel -

c:\progra~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.0.1
DPF: {CAFEEFAC-0016-0000-0024-ABCDEFFEDCBA}
FF - ProfilePath - c:\documents and settings\Rob\Application

Data\Mozilla\Firefox\Profiles\tmon4g0z.default\
FF - prefs.js: browser.startup.homepage -

hxxp://www.lightfortheday.com/
FF - ExtSQL: 2013-11-17 02:56;

{02450914-cdd9-410f-b1da-db004e18c671}; c:\documents and

settings\Rob\Application

Data\Mozilla\Firefox\Profiles\tmon4g0z.default\extensions\{02450914-cdd

9-410f-b1da-db004e18c671}.xpi
FF - ExtSQL: !HIDDEN! 2009-08-15 18:21;

{20a82645-c095-46ed-80e3-08825760534b};

c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation

Foundation\DotNetAssistantExtension
.
- - - - ORPHANS REMOVED - - - -
.
BHO-{A3BC75A2-1F87-4686-AA43-5347D756017C} - (no file)
Toolbar-10 - (no file)
AddRemove-Octoshape add-in for Adobe Flash Player - c:\documents

and settings\Rob\Application Data\Macromedia\Flash

Player\www.macromedia.com\bin\octoshape\octoshape.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by

Gmer, http://www.gmer.net
Rootkit scan 2013-11-20 00:31
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ... 
.
scanning hidden autostart entries ...
.
scanning hidden files ... 
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Intel\Wireless\Folders\¬ *«*]
"Path"="c:\\WINDOWS\\system32\\config\\systemprofile\\Application

Data\\Intel\\Wireless\\"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(832)
c:\windows\system32\Ati2evxx.dll
c:\program files\Intel\Wireless\Bin\LgNotify.dll
.
- - - - - - - > 'explorer.exe'(8008)
c:\windows\system32\WININET.dll
c:\program files\Common Files\Logitech\LVMVFM\LVPrcInj.dll
c:\documents and settings\Rob\Application

Data\Dropbox\bin\DropboxExt.19.dll
c:\progra~1\WINDOW~2\wmpband.dll
c:\windows\system32\msi.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\btncopy.dll
c:\program files\Nokia\Nokia PC Suite 7\phonebrowser.dll
c:\program files\Nokia\Nokia PC Suite 7\NGSCM.DLL
c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.5

0727.6195_x-ww_44262b86\MSVCR80.dll
c:\program files\Nokia\Nokia PC Suite 7\Lang\PhoneBrowser_eng.nlr
c:\program files\Nokia\Nokia PC Suite

7\Resource\PhoneBrowser_Nokia.ngr
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\Ati2evxx.exe
c:\program files\Intel\Wireless\Bin\EvtEng.exe
c:\program files\Intel\Wireless\Bin\S24EvMon.exe
c:\program files\Intel\Wireless\Bin\WLKeeper.exe
c:\windows\system32\LEXBCES.EXE
c:\windows\system32\LEXPPS.EXE
c:\program files\common files\logitech\lvmvfm\LVPrcSrv.exe
c:\windows\System32\SCardSvr.exe
c:\program files\Common Files\Apple\Mobile Device

Support\AppleMobileDeviceService.exe
c:\windows\system32\basfipm.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\WIDCOMM\Bluetooth Software\bin\btwdins.exe
c:\windows\system32\drivers\CDAC11BA.EXE
c:\program files\Intel\Wireless\Bin\ZcfgSvc.exe
c:\program files\Dell\NICCONFIGSVC\NICCONFIGSVC.exe
c:\program files\Intel\Wireless\Bin\RegSrvc.exe
c:\progra~1\Intel\Wireless\Bin\1XConfig.exe
c:\windows\system32\Ati2evxx.exe
c:\program files\Panda USB Vaccine\USBVaccine.exe
c:\windows\system32\wscntfy.exe
c:\windows\system32\rundll32.exe
c:\program files\Apoint\Apntex.exe
.
**************************************************************************
.
Completion time: 2013-11-20  00:42:00 - machine was rebooted
ComboFix-quarantined-files.txt  2013-11-20 00:41
.
Pre-Run: 10,739,658,752 bytes free
Post-Run: 11,756,699,648 bytes free
.
WindowsXP-KB310994-SP2-Pro-BootDisk-ENU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(2)\WINDOWS
[operating systems]
c:\cmdcons\BOOTSECT.DAT="Microsoft Windows Recovery Console"

/cmdcons
UnsupportedDebug="do not select this" /debug
multi(0)disk(0)rdisk(0)partition(2)\WINDOWS="Microsoft Windows XP

Professional" /noexecute=optin /fastdetect
.
- - End Of File - - 1A4508259625129183F97255ED35DE9A
8F558EB6672622401DA993E1E865C861

  • I thought I had accidentally bumped my answer on the forum, so that you guys would not answer for another day, so I also removed AVG and installed adaware anti-virus as well. I have therefore attached by latest DDS, GMER and Adaware Logs
Thanks again for all your help
 
Attached:
121121 Ad-Aware_Report_Full_Manual_2013-11-21T00-48-48.312500.xml
131120 GMER full scan.log
131119 dds.txt

 

Attached Files



#5 nasdaq

nasdaq

  • Malware Response Team
  • 39,586 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:03:41 AM

Posted 22 November 2013 - 09:03 AM


Nothing suspicious was found on your logs.

Please scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the esetonlinebtn.png button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer.
      Save it to your Desktop.
    • Double click on the esetsmartinstaller_enu.png to download the ESET Smart Installer. icon on your Desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.
===

Please run this security check for my review.

Download Security Check by screen317 from here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.
===

#6 eatdragon

eatdragon
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:41 AM

Posted 24 November 2013 - 04:43 PM

Hi Nasdaq,

I have carried out the two scans as requested

 

  • ESET log is

 

C:\Documents and Settings\Rob\My Documents\Bible

Software\Christian books PDFs and plain text\The-

Doctrine-of-Sanctification-by-A.W.-Pink.pdf.html    

JS/Agent.NJV trojan    cleaned by deleting -

quarantined
C:\Documents and Settings\Rob\My Documents\Downloads

\FoxitReader544.11281_enu_Setup.exe    multiple

threats    cleaned by deleting - quarantined
C:\Documents and Settings\Rob\My Documents\Downloads

\FoxitReader545.0124_enu_Setup.exe    multiple

threats    cleaned by deleting - quarantined
C:\Documents and Settings\Rob\My Documents\Downloads

\registrybooster.exe    Win32/RegistryBooster

application    cleaned by deleting - quarantined
C:\Documents and Settings\Rob\My Documents\_anti

virus\SetupImgBurn_2.5.8.0.exe    Win32/OpenCandy

application    cleaned by deleting - quarantined
 

 

  • Security Check by screen317 log is

 Results of screen317's Security Check version 0.99.77  
 Windows XP Service Pack 3 x86   
 Internet Explorer 8  
``````````````Antivirus/Firewall Check:``````````````
 Windows Firewall Disabled!  
Ad-Aware Antivirus   
 Antivirus up to date!  
`````````Anti-malware/Other Utilities Check:`````````
 Ad-Aware
 Secunia PSI (3.0.0.6001)   
 Malwarebytes Anti-Malware version 1.75.0.1300  
 CCleaner     
 Adobe Flash Player 10 Flash Player out of Date!
 Adobe Flash Player     11.9.900.117  
 Adobe Reader 7 Adobe Reader out of Date!
 Mozilla Firefox (25.0.1)
````````Process Check: objlist.exe by Laurent````````  
 Ad-Aware AAWService.exe is disabled!
 Ad-Aware AAWTray.exe is disabled!
 Lavasoft Ad-Aware Antivirus Ad-Aware Antivirus 11.0.4555.0\AdAwareService.exe
 Lavasoft Ad-Aware Antivirus Ad-Aware Antivirus 11.0.4555.0\AdAwareTray.exe
 Zone Labs ZoneAlarm zlclient.exe  
`````````````````System Health check`````````````````
 Total Fragmentation on Drive C:: 8%
````````````````````End of Log``````````````````````
 

 

I then uninstalled Adaware anitvirus and reinstalled AVG anti virus. AVG was the original antivirus software that reported the 8 IRP Hooks. Unfortunately AVG still reported that there are 8 IRP hooks in the pciidex.sys file.

  • Please see AVG report log

Whole Computer Scan
Medium priority;"8";"0";"8"
Folders selected for scanning:;"Scan whole computer"
Started:;"24/11/2013, 16:36:55"
Finished:;"24/11/2013, 21:07:51"
Total object scanned:;"334828"
User who launched the scan:;""

Status;"Priority";"Name";"Description";"Result"
Infected;"Medium";"IRP hook, C:\WINDOWS\System32\drivers\intelide.sys IRP_MJ_PNP -> PCIIDEX.SYS PciIdeXDebugPrint+0x2D80";"C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS";"Infected"
Infected;"Medium";"IRP hook, C:\WINDOWS\System32\drivers\intelide.sys IRP_MJ_INTERNAL_DEVICE_CONTROL -> PCIIDEX.SYS PciIdeXDebugPrint+0x2E38";"C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS";"Infected"
Infected;"Medium";"IRP hook, C:\WINDOWS\System32\drivers\pciide.sys IRP_MJ_PNP -> PCIIDEX.SYS PciIdeXDebugPrint+0x2D80";"C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS";"Infected"
Infected;"Medium";"IRP hook, C:\WINDOWS\System32\drivers\pciide.sys IRP_MJ_POWER -> PCIIDEX.SYS +0x692";"C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS";"Infected"
Infected;"Medium";"IRP hook, C:\WINDOWS\System32\drivers\pciide.sys IRP_MJ_INTERNAL_DEVICE_CONTROL -> PCIIDEX.SYS PciIdeXDebugPrint+0x2E38";"C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS";"Infected"
Infected;"Medium";"IRP hook, C:\WINDOWS\System32\drivers\pciide.sys IRP_MJ_SYSTEM_CONTROL -> PCIIDEX.SYS PciIdeXDebugPrint+0x2DB4";"C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS";"Infected"
Infected;"Medium";"IRP hook, C:\WINDOWS\System32\drivers\intelide.sys IRP_MJ_SYSTEM_CONTROL -> PCIIDEX.SYS PciIdeXDebugPrint+0x2DB4";"C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS";"Infected"
Infected;"Medium";"IRP hook, C:\WINDOWS\System32\drivers\intelide.sys IRP_MJ_POWER -> PCIIDEX.SYS +0x692";"C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS";"Infected"
 

I have checked the file at Jotti Virusscan and VirusTotal and they both respond with zero venders saying their is a problem, including AVG !. I suspect the file may be a false positive and have sent it to AVG to check if their virus scan is wrong. What do you think?

 

 

 

 



#7 nasdaq

nasdaq

  • Malware Response Team
  • 39,586 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:03:41 AM

Posted 25 November 2013 - 08:52 AM

Remove this old version of Flash using the Add/Remove Programs.

Adobe Flash Player 10 Flash Player out of Date!


===

Get the latest version of the Adobe Reader.
http://get.adobe.com/reader/
Before your download I suggest you unckeck the box on the top right "Yes, install McAfee Security Scan Plus - optional" this is not required if you are not a McAfee subscriber. While the installation is in progress you can also deny the installation of any other programs that may be suggested.

When installed remove your old version of the Reader using the Add/Remove Programs applet if present.
<<<>>>
 

I have checked the file at Jotti Virusscan and VirusTotal and they both respond with zero venders saying their is a problem, including AVG !. I suspect the file may be a false positive and have sent it to AVG to check if their virus scan is wrong. What do you think?

Sure looks like a false/positive.
Send the file to AVG for their review.
===

If all is well:

Time for some housekeeping
  • The following will implement some cleanup procedures as well as reset System Restore points:
  • Click Start > Run and copy/paste the following bold text into the Run box and click OK:
  • ComboFix /Uninstall
===


Please consider using these ideas to help secure your computer. While there is no way to guarantee safety when you use a computer, these steps will make it much less likely that you will need to endure another infection. While we really like to help people, we would rather help you protect yourself so that you won't need that help in the future.

Please either enable Automatic Updates under Start -> Control Panel -> Automatic Updates or get into the habit of checking Windows Update regularly. They usually have security updates every month. You can set Windows to notify you of Updates so that you can choose, but only do this if you believe you are able to understand which ones are needed. This is a crucial security measure.

Having an effective antivirus is a must for everyone.
In addition to many excellent commercial products there are plenty of good free antivirus programs available. I can recommend:

If you are satisfied with your current protection programs you can ignore the instructions on Antivirus or Firewall listed below.In addition to an antivirus I recommend using a firewall. A software firewall is a software program that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet. I can recommend one of the following free products:Please note: Many installer offer third-party downloads that are installed automatically when you do not uncheck certain checkboxes. While most of the time not being malicious you usually do not want these on your computer. Be careful during the installation process and you will avoid seeing tons of new unwanted toolbars in your favorite web browser.

Please consider installing and running some of the following programs; they are either free or have free versions of commercial programs:

Malwarebytes Anti-Malware (MBAM)
The free version of MBAM can be used to scan the system for traces of malware. Scanning your system regularly will make it harder for malware to reside on your system.
A tutorial on using MBAM can be found here.
Please Note: Only the paid for version has real time capabilities.

SpywareBlaster
A tutorial on using SpywareBlaster to prevent malware from ever installing on your computer may be found here.

Please keep these programs up-to-date and run them whenever you suspect a problem to prevent malware problems. A number of programs have resident protection and it is a good idea to run the resident protection of one of each type of program to maintain protection. However, it is important to run only one resident program of each type since they can conflict and become less effective. That means only one antivirus, firewall and scanning anti-spyware program at a time. Passive protectors, like SpywareBlaster can be run with any of them.

Note that there are a lot of rogue programs out there that want to scare you into giving them your money and some malware actually claims to be security programs. If you get a popup for a security program that you did not install yourself, do NOT click on it and ask for help immediately. It is very important to run an antivirus and firewall, but you can't always rely on reviews and ads for information. Ask in a security forum that you trust if you are not sure. If you are unsure and looking for anti-spyware programs, you can find out if it is a rogue here:A similar category of programs is now called "scareware." Scareware programs are active infections that will pop-up on your computer and tell you that you are infected. If you look closely, it will usually have a name that looks like it might be legitimate, but it is NOT one of the programs you installed. It tells you to click and install it right away. If you click on any part of it, including the 'X' to close it, you may actually help it infect your computer further. Keeping protection updated and running resident protection can help prevent these infections. If it happens anyway, get offline as quickly as you can. Pull the internet connection cable or shut down the computer if you have to. Contact someone to help by using another computer if possible. These programs are also sometimes called 'rogues', but they are different than the older version of rogues mentioned above.

Please keep your programs up to date. This applies to Java, Adobe Flashplayer, Adobe Reader and your Internet Browsers in particular. Vulnerabilities in these programs are often exploited in order to install malware on your PC. Visiting a prepared web page suffices to infect your system.

In general Firefox, Opera and Google Chrome are considered to be more secure than Internet Explorer. In addition there are many useful addons that can protect you from possible risks:
  • WOT will warn you when you try to visit sites with poor reputation. The reputation is based on user ratings and is usually very accurate.
  • Script Blocker can help blocking many attempts to infect your system via malicious websites by only allowing scripts at sites you trust.
  • NoScript is a popular Firefox addon,
  • ScriptNo a popular Google Chrome addon.
For much more useful information, please also read Tony Klein's excellent article: How did I get infected in the first place

Hopefully these steps will help to keep you error free. If you run into more difficulty, we will certainly do what we can to help.
===

#8 eatdragon

eatdragon
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:41 AM

Posted 25 November 2013 - 06:49 PM

Nasdaq

Thanks for your help. I have done all you suggested, apart from combofix seems to already have uninstalled. Once when I was rebooting I had the option to stop booting into some recovery mode, so perhaps it uninstalled there.

I have sent the PCIIDEX.sys to AVG see what they think.

Someone on another forum has suggested that it may be something to do with the Microsoft security update KB2862330. I don't know if this is true but I eventually managed to install KB2862330 by temporarily disabling the USB controllers and I still had the problem with PCIIDEX.sys.

Thanks again and I will report back on this when AVG get back to me.

Eatdragon



#9 nasdaq

nasdaq

  • Malware Response Team
  • 39,586 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:03:41 AM

Posted 01 December 2013 - 10:09 AM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users