AVG detecting IRP Hooks that won't remove?

AkemiMoonstar

New Member
Thread author
Verified
Feb 2, 2014
24
"";"IRP hook, C:\Windows\system32\DRIVERS\mouclass.sys IRP_MJ_READ -> EagleX64.sys +0x14CC0, C:\Windows\system32\drivers\EagleX64.sys";"Cannot be removed
The data is invalid."
"";"IRP hook, C:\Windows\system32\DRIVERS\mouclass.sys IRP_MJ_PNP -> EagleX64.sys +0x14F80, C:\Windows\system32\drivers\EagleX64.sys";"Cannot be removed
The data is invalid."
"";"IRP hook, C:\Windows\system32\DRIVERS\kbdclass.sys IRP_MJ_READ -> EagleX64.sys +0x131C0, C:\Windows\system32\drivers\EagleX64.sys";"Cannot be removed
The data is invalid."
"";"IRP hook, C:\Windows\system32\DRIVERS\kbdclass.sys IRP_MJ_PNP -> EagleX64.sys +0x134D0, C:\Windows\system32\drivers\EagleX64.sys";"Cannot be removed
The data is invalid."

It doesn't want to remove. :(

I will provide the scans shortly.
 

kuttus

Level 2
Verified
Oct 5, 2012
2,697
Hi and welcome to the malwaretips.com forums!

I'm Kuttus and I am going to try to assist you with your problem. Please take note of the below:
  • I will start working on your malware issues, this may or may not, solve other issues you have with your machine.
  • The fixes are specific to your problem and should only be used for this issue on this machine!
  • The process is not instant. Please continue to review my answers until I tell you your machine is clear. Absence of symptoms does not mean that everything is clear.
  • If you don't know, stop and ask! Don't keep going on.
  • Please reply to this thread. Do not start a new topic.
  • Refrain from running self fixes as this will hinder the malware removal process.
  • It may prove beneficial if you print of the following instructions or save them to notepad as I post them.
Your security programs may give warnings for some of the tools I will ask you to use. Be assured, any links I give are safe.


Before we start:
Please be aware that removing malware is a potentially hazardous undertaking. I will take care not to knowingly suggest courses of action that might damage your computer. However it is impossible for me to foresee all interactions that may happen between the software on your computer and those we'll use to clear you of infection, and I cannot guarantee the safety of your system. It is possible that we might encounter situations where the only recourse is to re-format and re-install your operating system, or to necessitate you taking your computer to a repair shop.

Because of this, I advise you to backup any personal files and folders before you start.
------------------------------------------------------------------------------------------------------------------------------
STEP 1: Run a scan with Farbar Recovery Scan Tool

Please download Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatibale with your system. If you are not sure which version applies to your system download both of them and try to run them.
Only one of them will run on your system, that will be the right version.


  • Double-click to run it. When the tool opens click Yes to disclaimer.
  • Press Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.

------------------------------------------------------------------------------------------------------------------------------
 

kuttus

Level 2
Verified
Oct 5, 2012
2,697
Upload a File to Virustotal
Please visit Virustotal.com
  • Click the Browse... button
  • Navigate to the file C:\Windows\system32\drivers\EagleX64.sys
  • Click the Open button
  • Click the Send button
  • Copy and paste the results back here please.

Then, upload another file:
  • Click the Browse... button
  • Navigate to the file C:\Windows\system32\DRIVERS\kbdclass.sys
  • Click the Open button
  • Click the Send button
  • Copy and paste the results back here please.
Like this way you have to upload all those suspected files you send to me.

C:\Windows\system32\DRIVERS\mouclass.sys
C:\Windows\system32\drivers\EagleX64.sys
C:\Windows\system32\DRIVERS\kbdclass.sys
 

kuttus

Level 2
Verified
Oct 5, 2012
2,697
It seems it is a False Positive from AVG. Those files seems to be clean only. For some reason AVG Detecting those files as bad wrongly.

We can do few more scans to make sure it is clean.

STEP 1: Run a scan with Junkware Removal Tool

Please download Junkware Removal Tool to your desktop from here
  • Turn off your antivirus software now to avoid potential conflicts
  • Double-click to run the tool. For Windows Vista or 7 users, right-click the file and select Run as Administrator
  • The tool will open and start scanning your system
  • Please be patient as this can take a while to complete depending on your system's specifications
  • On completion, a log (JRT.txt) will be saved to your desktop and will automatically open
  • Post the contents of JRT.txt into your next reply




STEP 2: Run a scan with AdwCleaner

  1. Download AdwCleaner from the below link.
    ADWCLEANER DOWNLAOD LINK (This link will automatically download Security Check on your computer)
  2. Close all open programs and internet browsers.
  3. Double click on adwcleaner.exe to run the tool.
  4. Click on Scan,then confirm each time with Ok.
  5. After the Scan is Over press on Clean ,then confirm each time with Ok.
  6. Your computer will be rebooted automatically. A text file will open after the restart.
  7. Please post the contents of that logfile with your next reply.
  8. You can find the logfile at C:\AdwCleaner[S1].txt as well.
------------------------------------------------------------------------------------------------------------------------------

Download Malwarebytes Anti-Rootkit from here to your Desktop
  • Unzip the contents to a folder on your Desktop.
  • Open the folder where the contents were unzipped and run mbar.exe
  • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
  • Make sure there is a check next to Create Restore Point and click the Cleanup button to remove any threats. Reboot if prompted to do so.
  • After the reboot, perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If there are threats, click Cleanup once more and reboot.
  • When done, please post the two logs in the MBAR folder(mbar-log.txt and system-log.txt)



Please download Malwarebytes' Anti-Malware to your desktop.
  • Double-click mbam-setup.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to
    • Update Malwarebytes' Anti-Malware
    • and Launch Malwarebytes' Anti-Malware
  • then click Finish.
  • If an update is found, it will download and install the latest version.
  • When it prompts you to try their 30-day trail, click decline
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidently close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt


 

kuttus

Level 2
Verified
Oct 5, 2012
2,697
STEP 1: Run a HitmanPro scan
  1. Download the latest official version of HitmanPro.
    HITMANPRO DOWNLOAD LINK(This link will open a download page in a new window from where you can download HitmanPro)
  2. Start HitmanPro bydouble clicking on the previously downloaded file.and then following the prompts.
    hpro4.png
  3. Once the scan is complete, a screen displaying all the malicious files that the program found will be shown as seen in the image below.After reviewing each malicious object clickNext.
    rsz_hpro5.png
  4. ClickActivate free licenseto start the free 30 days trial and remove the malicious files.
    hpro6.png
  5. HitmanPro will now start removing the infected objects, and in some instances, may suggest a reboot in order to completely remove the malware from your system. In this scenario, always confirm the reboot action to be on the safe side.

Add to your next reply, any log that HitmanPro might generate.

STEP 2: Run a scan with ESET Online Scanner
  1. Download ESET Online Scanner utility from the below link
    ESET ONLINE SCANNER DOWNLOAD LINK (This link will automatically download ESET Online Scanner on your computer.)
  2. Double click on the Eset installer program (esetsmartinstaller_enu.exe).
  3. Check Yes, I accept the Terms of Use
  4. Click the Start button.
  5. Check Scan archives
  6. Push the Start button.
  7. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  8. When the scan completes, push List of found threats
  9. Push Export to Text file and save the file to your desktop using a unique name, such as ESET Scan. Include the contents of this report in your next reply.Note - when ESET doesn't find any threats, no report will be created.
  10. Push the back button.
  11. Push Finish

STEP 3: Run a scan with Kaspersky Virus Removal Tool
  1. Download Kaspersky Virus Removal Tool from the below link and then double click on it to start this utility.
    KASPERSKY VIRUS REMOVAL TOOL (This link open an new webpage from where you can download Kaspersky Virus Removal Tool on your computer.)
  2. Follow the onscreen prompts until it is installed
  3. Click the Options button (the 'Gear' icon), then make sure only the following are ticked:
    • System Memory
    • Hidden startup objects
    • Disk boot sectors
    • Local Disk (C: )
    • Also any other drives (Removable that you may have)
  4. Then click on Actions on the left hand side
  5. Click Select Action, then make sure both Disinfect and Delete if disinfection fails are ticked
  6. Click on Automatic Scan
  7. Now click the Start Scanning button, to run the scan
  8. After the scan is complete, click the reports button ('Paper icon', next to the 'Gear' icon) on the right hand side
  9. Click Detected threats on the left
  10. Now click the Save button, and save it as kaslog.txt to your Desktop
  11. Please attach kaslog.txt in your next reply.
 

AkemiMoonstar

New Member
Thread author
Verified
Feb 2, 2014
24
I can only provide HitmanPro's log because the other two came up with nothing. Not even HMP says there's any threats but there's a log for you to review, at least.

Now if you'll excuse me, my next reply will probably be within many hours because I was up all night doing this and it's time for me to crash. :D

Good luck.

Also, I have a side question: Would it be a good idea to try Comodo?

Thanks.
 

Attachments

  • HitmanPro_20140210_0349.log
    28.7 KB · Views: 75

kuttus

Level 2
Verified
Oct 5, 2012
2,697
Now the logs seems to be fine, Are you facing any issues on your computer now?

You can use Comodo
 

AkemiMoonstar

New Member
Thread author
Verified
Feb 2, 2014
24
Now the logs seems to be fine, Are you facing any issues on your computer now?

You can use Comodo

None that I'm noticing. No weird processes or anything. If you want I can post a screenshot of my current processes? (By all users, of course.)

Last night I thought I saw a tab open up for a split second and then close but that was it. I don't know if that was one of the AV programs I downloaded for this or not but I should check my processes just in case.
 

AkemiMoonstar

New Member
Thread author
Verified
Feb 2, 2014
24
Then can you explain why my computer is using over 3GB of RAM when there's nothing even running? I'm a bit worried because I don't see my processes leading up to 3GB of usage.
 

kuttus

Level 2
Verified
Oct 5, 2012
2,697
Please open Task Manager and Goto Process. Sort the Process by Memory Usage. After that Send me a Screen Shots of that list.

To Take Screen Of Your Screen.
  1. Press PRINT SCREEN (Print Scr) key on Your Keyboard.
  2. Now Open MS Paint
  3. Open Paint by clicking the Start button
    4f6cbd09-148c-4dd8-b1f2-48f232a2fd33_47.png
    , clicking All Programs, clicking Accessories, and then clicking Paint.
  4. In MS Paint Click Edit, and then click Paste.
  5. After this Save the File on your computer by Clicking on File --> Save
Add this Saved File in your next Replay
 

AkemiMoonstar

New Member
Thread author
Verified
Feb 2, 2014
24
I'm currently defragging and running a scan with comodo, but even without those running, it still goes up to 3GB. Just saying.
 

Attachments

  • task manager 1.png
    task manager 1.png
    116.5 KB · Views: 129
  • task manager 2.png
    task manager 2.png
    119.2 KB · Views: 139
  • task manager 3.png
    task manager 3.png
    118.4 KB · Views: 120
  • task manager 4.png
    task manager 4.png
    117 KB · Views: 122

kuttus

Level 2
Verified
Oct 5, 2012
2,697
Please run Run Autoruns and send me the screenshots of the Tab Scheduled Task, Winlogon and Internet Explorer.


To Take Screen Of Your Screen.
  1. Press PRINT SCREEN (Print Scr) key on Your Keyboard.
  2. Now Open MS Paint
  3. Open Paint by clicking the Start button
    4f6cbd09-148c-4dd8-b1f2-48f232a2fd33_47.png
    , clicking All Programs, clicking Accessories, and then clicking Paint.
  4. In MS Paint Click Edit, and then click Paste.
  5. After this Save the File on your computer by Clicking on File --> Save
Add this Saved File in your next Replay
 

AkemiMoonstar

New Member
Thread author
Verified
Feb 2, 2014
24
Here you are.
 

Attachments

  • Autoruns 1.png
    Autoruns 1.png
    78.6 KB · Views: 122
  • Autoruns 2.png
    Autoruns 2.png
    77.3 KB · Views: 122
  • Autoruns 3.png
    Autoruns 3.png
    69 KB · Views: 123

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top