Gib

Question about old malware continued...

Recommended Posts

Hello, I first started a-squared free then avenger!

Logfile of The Avenger Version 2.0, (c) by Swandog46
http://swandog46.geekstogo.com

Platform:  Windows XP

*******************

Script file opened successfully.
Script file read successfully.

Backups directory opened successfully at C:\Avenger

*******************

Beginning to process script file:

Rootkit scan active.
No rootkits found!

File "c:\windows\Installer\19da1f55.msi" deleted successfully.
File "C:\Program Files\Gamevance\gamevance32.exe" deleted successfully.
Folder "C:\Program Files\Gamevance" deleted successfully.

Completed script processing.

*******************

Finished!  Terminate.

Share this post


Link to post
Share on other sites
a-squared Free - Version 4.5
Last update: 9/27/2009 8:11:13 PM

Scan settings:

Scan type: Deep Scan
Objects: Memory, Traces, Cookies, C:\
Scan archives: On
Heuristics: Off
ADS Scan: On

Scan start:	10/1/2009 8:47:59 PM

[760] C:\WINDOWS\system32\OLEPRO32.DLL 	detected: Trojan.Win32.Patched!IK
C:\Documents and Settings\user1\Cookies\[email protected][1].txt 	detected: Trace.TrackingCookie.247realmedia!A2
C:\Documents and Settings\user1\Cookies\[email protected][1].txt 	detected: Trace.TrackingCookie.advertising!A2
C:\Documents and Settings\user1\Cookies\[email protected][1].txt 	detected: Trace.TrackingCookie.atdmt!A2
C:\Documents and Settings\user1\Cookies\[email protected][1].txt 	detected: Trace.TrackingCookie.burstnet!A2
C:\Documents and Settings\user1\Cookies\[email protected][1].txt 	detected: Trace.TrackingCookie.data.coremetrics!A2
C:\Documents and Settings\user1\Cookies\[email protected][1].txt 	detected: Trace.TrackingCookie.forms.net!A2
C:\Documents and Settings\user1\Cookies\[email protected][1].txt 	detected: Trace.TrackingCookie.link!A2
C:\Documents and Settings\user1\Cookies\[email protected][2].txt 	detected: Trace.TrackingCookie.media!A2
C:\Documents and Settings\user1\Cookies\[email protected][1].txt 	detected: Trace.TrackingCookie.rub!A2
C:\Documents and Settings\user1\Cookies\[email protected][1].txt 	detected: Trace.TrackingCookie.server.iad.livepers!A2
C:\Documents and Settings\user1\Cookies\[email protected][1].txt 	detected: Trace.TrackingCookie.specificclick!A2
C:\Documents and Settings\user1\Cookies\[email protected][1].txt 	detected: Trace.TrackingCookie.statcounter!A2
C:\Documents and Settings\user1\Cookies\[email protected][2].txt 	detected: Trace.TrackingCookie.zedo!A2
C:\Program Files\Gamevance\gamevance32.exe 	detected: AdWare.Win32.GameVance!IK
C:\Qoobox\Quarantine\C\Program Files\Gamevance\gvtl.dll.vir 	detected: AdWare.Win32.GameVance!IK
C:\System Volume Information\_restore{82DFFAA2-C91F-4360-9684-34F9FC2503F2}\RP29\A0042395.dll 	detected: AdWare.Win32.GameVance!IK
C:\WINDOWS\ServicePackFiles\i386\olepro32.dll 	detected: Trojan.Win32.Patched!IK
C:\WINDOWS\SoftwareDistribution\Download\29fac2778ef9276807b5af52b3f981b9\spuninst.exe 	detected: P2P-Worm.Win32.Bacteraloh!IK
C:\WINDOWS\SoftwareDistribution\Download\35d340428a8f32f0a91986e753c6e613\spuninst.exe 	detected: P2P-Worm.Win32.Bacteraloh!IK
C:\WINDOWS\SoftwareDistribution\Download\561c9bea035f5195ab841bef0d7c79b4\spuninst.exe 	detected: P2P-Worm.Win32.Bacteraloh!IK
C:\WINDOWS\SoftwareDistribution\Download\626eacb7c8acf36c15d9f790ff9b994b\spuninst.exe 	detected: P2P-Worm.Win32.Bacteraloh!IK
C:\WINDOWS\SoftwareDistribution\Download\c1fd7fbb2b63f1c80fc27f2df1ef6fcd\spuninst.exe 	detected: P2P-Worm.Win32.Bacteraloh!IK
C:\WINDOWS\SoftwareDistribution\Download\dfeddbe03266add4998ad4eea2bf3073\spuninst.exe 	detected: P2P-Worm.Win32.Bacteraloh!IK
C:\WINDOWS\SoftwareDistribution\Download\f296928eb21d756b3a2e1cf07fba47dd\spuninst.exe 	detected: P2P-Worm.Win32.Bacteraloh!IK
C:\WINDOWS\system32\olepro32.dll 	detected: Trojan.Win32.Patched!IK

Scanned

Files: 	46561
Traces: 	630701
Cookies: 	463
Processes: 	34

Found

Files: 	12
Traces: 	0
Cookies: 	13
Processes: 	1
Registry keys: 	0

Scan end:	10/2/2009 12:01:36 AM
Scan time:	3:13:37

Share this post


Link to post
Share on other sites

Hi Gib,

Why the Last Update of a-squared is still from

9/27/2009
???

The detection of C:\WINDOWS\system32\OLEPRO32.DLL is a definite FP as far as I know and that was fixed

Have you ran ATF Cleaner before the scan?

There are cookies in the report and those are harmless and are not threats

Anyway, please Update a2; re-scan; and post fresh report

My regards

P.S. disable the resident of your AV while running a2 Deep Scan in order to reduce scanning time. Only 46561 files were Deep scanned (???) - that is a bit strange.

Share this post


Link to post
Share on other sites

Alright, NEW REPORT! Sorry it took so long.

a-squared Free - Version 4.5
Last update: 10/2/2009 10:08:09 AM

Scan settings:

Scan type: Deep Scan
Objects: Memory, Traces, Cookies, C:\
Scan archives: On
Heuristics: Off
ADS Scan: On

Scan start:	10/2/2009 11:02:28 AM

C:\Documents and Settings\user1\Cookies\[email protected][1].txt 	detected: Trace.TrackingCookie.advertising!A2
C:\Documents and Settings\user1\Cookies\[email protected][1].txt 	detected: Trace.TrackingCookie.data.coremetrics!A2
C:\Documents and Settings\user1\Cookies\[email protected][1].txt 	detected: Trace.TrackingCookie.doubleclick!A2
C:\Documents and Settings\user1\Cookies\[email protected][1].txt 	detected: Trace.TrackingCookie.forms.net!A2
C:\Documents and Settings\user1\Cookies\[email protected][1].txt 	detected: Trace.TrackingCookie.link!A2
C:\Documents and Settings\user1\Cookies\[email protected][2].txt 	detected: Trace.TrackingCookie.media!A2
C:\Documents and Settings\user1\Cookies\[email protected][1].txt 	detected: Trace.TrackingCookie.rub!A2
C:\Documents and Settings\user1\Cookies\[email protected][1].txt 	detected: Trace.TrackingCookie.server.iad.livepers!A2
C:\Documents and Settings\user1\Cookies\[email protected][1].txt 	detected: Trace.TrackingCookie.specificclick!A2
C:\Documents and Settings\user1\Cookies\[email protected][1].txt 	detected: Trace.TrackingCookie.statcounter!A2
C:\Documents and Settings\user1\Cookies\[email protected][1].txt 	detected: Trace.TrackingCookie.zedo!A2
C:\Qoobox\Quarantine\C\Program Files\Gamevance\gvtl.dll.vir 	detected: AdWare.Win32.GameVance!IK
C:\System Volume Information\_restore{82DFFAA2-C91F-4360-9684-34F9FC2503F2}\RP29\A0042395.dll 	detected: AdWare.Win32.GameVance!IK

Scanned

Files: 	39768
Traces: 	643686
Cookies: 	166
Processes: 	38

Found

Files: 	2
Traces: 	0
Cookies: 	11
Processes: 	0
Registry keys: 	0

Scan end:	10/2/2009 4:06:50 PM
Scan time:	5:04:22

Share this post


Link to post
Share on other sites

Your logs look fine.

Unless you are having problems from Malware it is time to do the final steps.

If you used ComboFix, uninstall ComboFix:

  • Click START then RUN and enter the below into the run box and then click OK. (Use only the command of the same name as your copy of combofix.)
  • AvoidTDSS /u or combofix /u
    Note: The space before /u, must be there.
    This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
  • Delete the C:\AvoidTDSS or C:\ComboFix folder from combofix.
    Delete everything in C:\!KillBox

Delete the following from your Desktop (If they exist)

Avenger.exe

Avenger.txt

Avenger.zip

DisableAutoRuns.reg

FixMe.reg

FixReg.reg

ISeeYouXP.exe

ISeeYouXP.lnk

ISeeYouXP.txt

Anything else I had you use

Delete the following: (If they exist)

C:\Avenger.txt

C:\Avenger

C:\ComboFix.txt

C:\ComboFix

C:\SDFix

C:\Qoobox

You can delete and uninstall any programs I had you download, that you do not wish to keep on the system.

Empty the Recycle Bin

Run ATF Cleaner

In the ISeeYouXP folder double-click HideIT.bat.

Turn off System restore to flush all your restore points then turn system restore back on.

To manually turn off System Restore, follow these steps:

1. Click Start, right-click My Computer, and then click Properties.

2. Click the System Restore tab.

3. Click to select the Turn off System Restore check box (or the Turn off System Restore on all drives check box), and then click OK.

4 Click Yes when you receive the prompt to the turn off System Restore.

To turn on System Restore, follow these steps:

1. Click Start, right-click My Computer, and then click Properties.

2. Click the System Restore tab.

3. Click to clear the Turn off System Restore check box (or the Turn off System Restore on all drives check box), and then click OK.

Delete C:\ISeeYouXP

Run Windows Update and update your Windows Operating System.

Run the Secunia Online Software Inspector, this will inspect your system for software that is out-of-date and in need of updating. Update anything program/application detected as being out-dated.

That should take care of everything.

Safe Surfing!

Share this post


Link to post
Share on other sites

I still have my a2 running, should I go ahead and delete the files that are on the report?

Share this post


Link to post
Share on other sites

I still have my a2 running, should I go ahead and delete the files that are on the report?

Hi Gib,

Please follow the last instruction by ShadowPuterDude ( "final steps" )

That will clear Restore Point and there is a deletion of the folder with previously quarantined file as a result of running removal Utilities.

Cookies are not threats and they are harmless.

My regards

Share this post


Link to post
Share on other sites

Ok, I've followed instructions, but why did I have to delete those programs?

Most of those Tools (if not all) must not be executed unless advised by the certified specialist according to the preliminary analysis of the circumstances.

Some of those Utilities are under constant development and may undergo changes.

Therefore blindly using them can be harmful

They should be re-downloaded and used when and if required together with provided (individual) instructions.

My regards

Share this post


Link to post
Share on other sites

Thread Closed

Reason: Resolved

The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on your system could result in damaging the Operating System beyond repair. Do Not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.

All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE, if you don't we are just going to send you back to this thread

Share this post


Link to post
Share on other sites
Guest
This topic is now closed to further replies.

  • Recently Browsing   0 members

    No registered users viewing this page.