Jump to content

A2 free can't remove a poss Trojan

Recommended Posts

Hi Thanks for any help.

Did scan with A2 free and it found 2 Trojans. I cleaned one (it was before reading the directions here!). But Trojan.ATRAPS!IK seems to persist in an old game file 'OldOblivion' and A2 couldn't clean because it was write-protected. Dunno if it's a false pos?

I CC'd things then ran the progs you suggest and saved the logs. The A2 log is before all that was done.

Link to post
Share on other sites

Hi alban , welcome to the forum

The malware fighter will review log files you've attached.

The signatures are outdated. Please update a-squared and produce fresh Deep Scan report (you posted the Smart one). Explicitly choose the Deep type of scan

Close all browser session and run CCleaner prior to scanning as per instruction. You have may cookies detections They are harmless and never representing threats. They shoud've been removed by CCleaner.

The flaggings of oldblivion.exe and oldblivion.dll, belonging to the game could be False Positives, so if they are still flagged by a2 after rerunning the scan – irrespectively submit to EMSI developers for analysis from the detection list

Provide brief description of system's misbehaviour if any

My regards

Link to post
Share on other sites

The installed version of Java on this computer is out-dated. Install Java Runtime Environment (JRE) 6u17 available from Sun Microsystems.


Using Add or Remove Programs in the Control Panel; uninstall the following:

J2SE Runtime Environment 5.0 Update 3

Java 6 Update 13

Java 6 Update 3


c:\documents and settings\josh wells\application data\blitware\driverrobot\ 	detected: Trace.Directory.DriverRobot!A2
c:\documents and settings\josh wells\application data\blitware\driverrobot\licensing\ 	detected: Trace.Directory.DriverRobot!A2
c:\documents and settings\josh wells\application data\blitware\driverrobot\logs\ 	detected: Trace.Directory.DriverRobot!A2
c:\documents and settings\josh wells\application data\blitware\driverrobot\updates\ 	detected: Trace.Directory.DriverRobot!A2
c:\documents and settings\josh wells\application data\blitware\driverrobot\downloads\ 	detected: Trace.Directory.DriverRobot!A2
c:\windows\tasks\driver robot.job 	detected: Trace.File.DriverRobot!A2
c:\documents and settings\josh wells\application data\blitware\driverrobot\downloads\install_log.dat 	detected: Trace.File.DriverRobot!A2
c:\documents and settings\josh wells\application data\blitware\driverrobot\downloads\active_downloads.dat 	detected: Trace.File.DriverRobot!A2
Key: HKEY_LOCAL_MACHINE\software\Driver Robot 	detected: Trace.Registry.DriverRobot!A2

Driver Robot is a questionable program, and you should consider uninstalling Driver Robot.

Value: HKEY_CLASSES_ROOT\CLSID\{47F074AB-A6BB-4EB7-844A-7B206BB9E5C5}\InprocServer32 --> ThreadingModel 	detected: Trace.Registry.SurfSecret KeyPad 2.1!A2
Value: HKEY_CLASSES_ROOT\CLSID\{6B9CE32B-EC0A-4388-A04F-C534B05FB164}\InprocServer32 --> ThreadingModel 	detected: Trace.Registry.SurfSecret KeyPad 2.1!A2
Value: HKEY_CLASSES_ROOT\CLSID\{7CE2F294-568D-4BF1-B78F-49B703540201}\InprocServer32 --> ThreadingModel 	detected: Trace.Registry.SurfSecret KeyPad 2.1!A2
Value: HKEY_CLASSES_ROOT\CLSID\{C096C72A-809E-4B69-B590-2427C322B23C}\InprocServer32 --> ThreadingModel 	detected: Trace.Registry.SurfSecret KeyPad 2.1!A2
Value: HKEY_CLASSES_ROOT\CLSID\{EB98A02D-93CE-4F53-9231-3C8ED2B5CFCE}\InprocServer32 --> ThreadingModel 	detected: Trace.Registry.SurfSecret KeyPad 2.1!A2
Value: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{47F074AB-A6BB-4EB7-844A-7B206BB9E5C5}\InprocServer32 --> ThreadingModel 	detected: Trace.Registry.SurfSecret KeyPad 2.1!A2
Value: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6B9CE32B-EC0A-4388-A04F-C534B05FB164}\InprocServer32 --> ThreadingModel 	detected: Trace.Registry.SurfSecret KeyPad 2.1!A2
Value: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7CE2F294-568D-4BF1-B78F-49B703540201}\InprocServer32 --> ThreadingModel 	detected: Trace.Registry.SurfSecret KeyPad 2.1!A2
Value: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C096C72A-809E-4B69-B590-2427C322B23C}\InprocServer32 --> ThreadingModel 	detected: Trace.Registry.SurfSecret KeyPad 2.1!A2
Value: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{EB98A02D-93CE-4F53-9231-3C8ED2B5CFCE}\InprocServer32 --> ThreadingModel 	detected: Trace.Registry.SurfSecret KeyPad 2.1!A2

SurfSecret Keypad is considered Adware. You can continue to use this program, if you choose to do so.

C:\Program Files\Oldblivion\oldblivion.dll 	detected: Trojan.ATRAPS!IK
C:\Program Files\Oldblivion\oldblivion.exe 	detected: Trojan-PWS.Win32.Sinowal!IK
C:\Program Files\Oldblivion\oldblivion_0.11t7.exe/oldblivion.exe 	detected: Trojan-PWS.Win32.Sinowal!IK
C:\Program Files\Oldblivion\oldblivion_0.11t7.exe/oldblivion.dll 	detected: Trojan.ATRAPS!IK

These appppear to be False Position detections.


Copy the contents of the below quote box to Notepad; Save As FixReg.reg to your Desktop; make sure File Type: is set to All Files (*.*).



Close Notepad.

Locate FixReg.reg on your Desktop. Double-click on it and answer 'Yes' when asked if you want to merge with the registry.


Download Avenger from HERE and unzip to your desktop.

  • Run Avenger
  • Read the prompt that appears, and press OK
  • Copy & paste the following text in Input script Box:
    Files to delete:

    Then click "Execute".

  • You will be presented with 2 confirmation prompts. Select yes on each. Your system will reboot.
    Note: It is possible that Avenger will reboot your system TWICE.
  • Upon reboot, a command prompt window will appear on your screen for a few seconds, and then Avenger's log will open. Attach that log here in your next post.


Attach fresh logs for:

  • Avenger (C:\avenger.txt)
  • ISeeYouXP
  • HiJackFree

Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!

Link to post
Share on other sites

Your latest log indicates that you are using a keygen. You must remove all keygens and unlicensed software. No further malware removal assistance will be provided, until all illegal software has been removed from the system.

Link to post
Share on other sites


Thanks for that. Sorry for the hassle. I have removed those two things - I couldn't find them in Add/Remove progs so assumed they were just on his HDD and deleted them directly. If there's anything else please let me know what and I'll do the same. He never used them after the first view in any case - he tells me.

Have attached fresh logs and A2 Deep Scan was posted above.

I've updated Java. Shall I follow your instructions above?

Link to post
Share on other sites

Hi alban,

Please update a-squared and attach fresh Deep Scan report

Your last update and scan were performed 12/01/2010

Today is 17/01/

The Signatures are outdated and some files/Software were removed as you posted

My regards

Link to post
Share on other sites

Hi alban,

Please wait for the response from ShadowPuterDude

and don't do anything at the moment

I will comment only on two illegal items remaining

You removed some keygens/cracks files for Audio Software like Novation V-Station Software Syntitesizer and VST PlugIns for Guitar Rig

but the following items remain as in the last report

C:\Music Stuff\FruityLoops plugins-full pack (All plugins)\FruityLoop DX 10-synth-ok.zip/Fruity DX 10 for FruityLoops.exe detected: Trojan-PWS.Win32.Delf!IK

and FruityLoops Studio Producer Edition v4.01

most likely should be found as installed Software in Add/Remove


Since there is a suspect of Zlob infection that is necessary to get rid of all unwanted video/audio related Software. The said infection usually related to video and audio encoding, and respective "special" (so to speak) PlugIns that actually bringing Zlob to the users, being tricked.

Link to post
Share on other sites

Download ComboFix from one of these locations:

Save as Combo-Fix.exe during the download. ComboFix must be renamed before you download to your Desktop

Link 1

Link 2

* IMPORTANT !!! Save Combo-Fix to your Desktop

  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools
    See HERE for help
  • Double click on ComboFix.exe & follow the prompts.
  • As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.
  • Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.


Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:


Click on Yes, to continue scanning for malware.

When finished, ComboFix will produce a log.


1. Do not mouseclick combofix's window while it's running. That may cause it to stall!

2. Remember to re-enable your anti-virus and anti-spyware before reconnecting to the Internet.


Attach fresh logs for:

  • ComboFix (C:\combofix.txt)
  • a-squared Free/Anti-Malware
  • ISeeYouXP

Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!

Link to post
Share on other sites



Ok - deleted all the rubbish in the music folder after uninstalling the progs etc.

Combofix found a rootkit.

PC seems to be running OK. Only now XP says 'No firewall'. XP's was turned off. Turned it on but prob not the best one. Had something turned it off? - funny it wasn't flagged up before.

Link to post
Share on other sites

Download to the System32 folder:

- Stealth MBR rootkit detector by Gmer

Do the following

Start -> Run

type cmd

Click "OK"

The Command Console will open

Enter the following command, at the Command Pompt. The quotes are required.

Press the Enter Key after each command

mbr.exe -f (there is a space between the .exe and -f)

Wait for the above command to finish then type:


The Command Console will close.


Download and Run Scan with GMER

We will use GMER to scan for rootkits.

  • Please download GMER from one of the following locations, and save it to your desktop:

    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop. Unzip/extract the file to its own folder. (Click here for information on how to do this if not sure. Win 2000 users click here.

  • Double click gmerRandomIcon.png or gmerDesktopIcon.png on your desktop. If you are using Vista, please right-click and select run as administrator
  • When you have done this, close all running programs.
    There is a small chance this application may crash your computer so save any work you have open.
  • Allow the gmer.sys driver to load if asked.

If it detects rootkit activity, you will receive a prompt to run a full scan. Click NO.

  • In the right panel, you will see several boxes that have been checked. Please UNCHECK the following:
    • Sections
    • IAT/EAT
    • Drives/Partition other than Systemdrive (typically C:\)
    • Show all (Don't miss this one!)

    [*]Click on btnScan.png and wait for the scan to finish.

    [*]If you see a rootkit warning window, click OK.

    [*]Push btnSave.png and save the logfile to your desktop.

    [*]Attach the GMER log.

If GMER doesn't work in Normal Mode try running it in Safe Mode

Note: Do Not run any program while GMER is running

*Note*: Rootkit scans often produce false positives. Do NOT take any actions on "<--- ROOKIT" entries

Link to post
Share on other sites

Download avz4.zip from here

  • Unzip it to your desktop to a folder named avz4
  • Double click on AVZ.exe to run it.
  • Run an update by clicking the Auto Update button on the Right of the Log window: AVZupdate.jpg
  • Click Start to begin the update

Note: If you receive an error message, chose a different source, then click Start again

  • After the update, from the "File" menu, choose "Standard Scripts"
  • Put a check next to item 2: Advanced System Investigation
  • Click Execute selected scripts
  • At the next prompt, click the OK button
  • Let the scan run and click "OK" when the completion prompt pops up
  • Now Close out of the Standard Scripts window, and exit AVZ
  • Navigate to the avz4 folder and locate the folder LOG
  • Inside the LOG folder you will find virusinfo_syscheck.htm and virusinfo_syscheck.zip
  • Attach the Compressed file, virusinfo_syscheck.zip, to your next reply.

Link to post
Share on other sites

Hi again

My son has returned for his stuff and will be moving his PC to Oxford! Can he continue this thread under my login or should he first register and continue under his name - just afraid that the latter will confuse things more!


Link to post
Share on other sites

Hi alban,

It is necessary to continue in this thread. One case one thread.

He can use your login.

If the delay before the next reply is expected to be more than 72 hours - please tell so the thread can be temporarily locked.

As soon as he is ready to continue please PM and request reopening.

My regards

Link to post
Share on other sites

  • Close all windows then double click on AVZ.exe
  • Click File > Custom scripts
  • Copy & paste the contents of the following codebox in the box in the program
    SearchRootkit(true, true);
    RegKeyParamDel('HKEY_LOCAL_MACHINE','SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 3','$DLL');
    RegKeyParamDel('HKEY_LOCAL_MACHINE','SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 2','$DLL');
    RegKeyParamDel('HKEY_LOCAL_MACHINE','SYSTEM\CurrentControlSet\Services\WinTrust\SubjectPackages\MS Subjects 1','$DLL');

  • Note: When you run the script, your PC will be restarted
  • Click Run
  • Restart your PC if it doesn't do it automatically.

Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!

Link to post
Share on other sites

Download -->> OTL <<-- to your desktop.

  • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
  • When the window appears, underneath Output at the top change it to Minimal Output.
  • Check the boxes beside LOP Check and Purity Check.
  • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
    • When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt.
      Note: These logs can be located in the OTL. folder on you C:\ drive if they fail to open automatically.
    • Attach both logs with your next reply.

Link to post
Share on other sites

Run OTL.exe

  • Copy/paste the following text written inside of the code box into the Custom Scans/Fixes box located at the bottom of OTL
    O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - No CLSID value found.
    O7 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    O10 - Protocol_Catalog9\Catalog_Entries\000000000001 -  File not found
    O10 - Protocol_Catalog9\Catalog_Entries\000000000002 -  File not found
    O10 - Protocol_Catalog9\Catalog_Entries\000000000003 -  File not found
    O10 - Protocol_Catalog9\Catalog_Entries\000000000009 -  File not found
    [start explorer]

  • Then click the Run Fix button at the top
  • Let the program run unhindered. OTL will reboot the system when it is done
  • Attach the new OTL log.

Link to post
Share on other sites

Unless you are having problems from Malware it is time to do the final steps.

Now to remove most of the tools that we have used in fixing your machine:

  • Make sure you have an Internet Connection.
  • Download OTC to your desktop and run it
  • A list of tool components used in the cleanup of malware will be downloaded.
  • If your Firewall or Real Time protection attempts to block OTC to reach the Internet, please allow the application to do so.
  • Click Yes to begin the cleanup process and remove these components, including this application.
  • You will be asked to reboot the machine to finish the cleanup process. If you are asked to reboot the machine choose Yes.

Delete everything in C:\!KillBox (If I didn't have you use KillBox, then this won't be present)

Delete the following from your Desktop (If they exist)
















Anything else I had you use

Delete the following files: (If they exist)



Delete the following folders: (If they exist)






Empty the Recycle Bin

Run CCleaner

Turn off System restore to flush all your restore points then turn system restore back on. See How To Enable and Disable System Restore.

Inside the ISeeYouXP folder, locate and double-click HideIT.bat (C:\ISeeYouXP\HideIT.bat). This will return viewing of Hidden and System Files and Folders to the default settings.

Delete C:\ISeeYouXP

You can delete and uninstall any programs I had you download, that you do not wish to keep on the system.

Run Windows Update and update your Windows Operating System.

Run the Secunia Online Software Inspector, this will inspect your system for software that is out-of-date and in need of updating. Update anything program/application detected as being out-dated.

Articles to read:

Protect Yourself From Malware: Tools And Tips

How to keep you and your Windows PC happy

Web, email, chat, password and kids safety

That should take care of everything.

Safe Surfing!

Link to post
Share on other sites

Thread Closed

Reason: Resolved

The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on your system could result in damaging the Operating System beyond repair. Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.

All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE, if you don't we are just going to send you back to this thread

Link to post
Share on other sites
This topic is now closed to further replies.
  • Recently Browsing   0 members

    No registered users viewing this page.

  • Create New...