Results 1 to 10 of 10

Thread: Uniblue Spyeraser - Trustworthy?

Hybrid View

  1. #1
    Walt Bilofsky Guest

    Re: Uniblue Spyeraser - Trustworthy?

    "Nick Skrepetos" <nskrepetos@yahoo.com> wrote:

    >
    >Walt Bilofsky wrote:
    >> Uniblue SpyEraser found a number of "threats" on my PC that were not
    >> detected by any other program I tried. Is this a cause for concern?
    >>
    >> I downloaded and ran the free (scan only) SpyEraser from
    >> http://www.liutilities.com/products/spyeraser/ . It found a lot of
    >> problems, and suggested that the product be purchased in order to
    >> clean them up.
    >>
    >> Among the threats it found were Screenspy, Mainpean Dialer, and
    >> AdultLinks QABar. I scanned my system with Norton Anti-Virus 2006,
    >> Spybot 1.3, and Ad-Aware SE Personal, and none of them found any of
    >> these (or anything else worth worrying about). The Symantec web site
    >> lists files and registry keys for these threats, none of which were
    >> present on my PC.
    >>
    >> SpyEraser also listed threats called NX Client, Viewpoint Media
    >> Toolbar, TinTel dialer, and VX2. Symantec doesn't list any of these
    >> as threats.
    >>
    >> So - what's going on here?
    >>
    >> P.S.: It wasn't so easy to uninstall SpyEraser, either. And when I
    >> got the uninstall to run without errors, it left the program files on
    >> the hard drive anyway.

    >
    >I am going to reserve official comment here - I would be interested in
    >seeing the LOG of EXACTLY what was detected. Can you post that here?
    >
    >Nick Skrepetos
    >SUPERAntiSpyware.com
    >http://www.superantispyware.com


    Sounds sensible, Nick.

    The log (omitting tracking cookies) is below, with my comments in
    brackets. Hope this is helpful.

    - Walt

    ==================

    Start Dateecember 26, 2006 at 09:28:03 PM

    End Dateecember 26, 2006 at 09:32:55 PM

    Total Time:4 Mins 52 Secs

    Detected Threats

    NX Client
    Details: NoMachine is useful for remote access and terminal services
    and is installed in companies such as HP, Google, IBM, Siemens,
    Motorola, SAP, Philips Semiconductors, Nokia, Verisign, VMWare,
    Novell, Symbio Technologies, Trolltech, Toshiba Electronics Europe,
    AXA Technology Services etc.
    Status:No Action taken
    Remote Control Software-Remote Control Software

    Infected registry keys/values detected
    hkey_local_machine\software\cygnus solutions\cygwin\program
    options\\
    hkey_local_machine\software\cygnus solutions\cygwin\mounts
    v2\\
    hkey_local_machine\software\cygnus solutions\\

    [ WALT: These keys are there, but the only values in them are the
    pathnames for my Cygwin directories, and one flag bit.]

    Tintel
    Details: Tintel is a program which makes long-distance phone calls or
    calls to 900 and 976 phone numbers without user’s knowledge. To
    connect, the computer must be connected to a phone line via a standard
    modem or ADSL. Cable or satellite users and users on network or behind
    a firewall are generally not affected. Tintel allows
    subscription-based websites to charge subscribers by billing the
    user's phone line.
    Status:No Action taken
    Dialer-Dialer

    Infected registry keys/values detected
    hkey_classes_root\.tcw\\

    [WALT: This registry key assigns the extension .tcw to Turbo Cad Win
    2.]

    ScreenSpy
    Details: ScreenSpy is a type of RAT spyware. Remote Administration
    Tool provides a complete control over the machine and it could be used
    for malicious purposes. It also tries to manipulate machine through a
    remote location on the internet. There are two types of components:
    one is on target machine and answer all the remote commands and second
    application that is used by the attacker to track the server
    applications.
    Status:No Action taken
    Key Logger-Key Logger

    Infected registry keys/values detected

    hkey_current_user\software\classes\clsid\{1efb6596-857c-11d1-b16a-00c0f0283628}\
    inprocserver32\\

    VX2
    Details: VX2 is a Browser Helper Object for InternetExplorer. It
    monitors web pages requested and data entered into forms and sends
    this information to its home server. It then displays pop-up
    advertisement windows based on the information. It can update itself
    and install other software. There are two variants of this parasite
    with different file and internal names, but both work identically. It
    also shares IE's memory context and has the capability to perform any
    action on the available windows and modules.
    Status:No Action taken
    Browser Helper-Browser Helper

    Infected registry keys/values detected
    hkey_local_machine\software\vendor

    [WALT: The value of the key "vendor" is "Dell", the manufacturer of my
    PC.]

    MainPean Dialer
    Details: MainPean Dialer is a program which makes long-distance phone
    calls or calls to 900 and 976 phone numbers without user’s knowledge.
    To connect, the computer must be connected to a phone line via a
    standard modem or ADSL. Cable or satellite users and users on network
    or behind a firewall are not affected.
    Status:No Action taken
    Dialer-Dialer

    Infected registry keys/values detected
    hkey_current_user\software\freeware\\

    [WALT: This key contains a subtree of keys for the freeware program
    VirtualDub.]

    NJStar
    Details: NJStar Asian Explorer is a FREE web browser created for
    reading Chinese, Japanese and Korean (CJK) web pages with intelligent
    NJStar CJK auto-detection technologies just like Microsoft Internet
    Explorer or Netscape. It gives a tension free CJK web surfing
    experience. Its use is in conjunction with the best-selling NJStar
    Communicator and it allow us to view, input and save CJK web pages
    with unprecedented control and ease.
    Status:No Action taken
    Adware-Adware

    Infected registry keys/values detected
    hkey_current_user\software\njstar\\

    [WALT: This browser helper is cited as Adware around the web. I
    installed the software for its Chinese keyboard input.]

    AdultLinks.QBar
    Details: AdultLinks QaBar combines links to porn and other sites to
    the Internet Explorer Favorite menu.It is also known as adware that
    shows what third-party is advertising on his computer. Ads could of
    various forms like, pop-ups, pop-unders, banners, or links embedded
    within web pages or parts of the Windows interface. Adware also helps
    in keeping track of browsing habits so that a record could be kept
    with the user.
    Status:No Action taken
    Browser Plugin-Browser Plugin

    Infected files detected
    c:\windows\downloaded program files\conflict.1\lssupctl.dll
    c:\windows\downloaded program files\conflict.1\lssupctl.inf
    c:\windows\downloaded program files\conflict.1\sdclicense.txt
    c:\windows\downloaded program files\conflict.1\symadata.dll
    c:\windows\downloaded program files\conflict.1\tgctlsi.dll
    c:\windows\downloaded program files\conflict.1\tgctlsi.inf
    c:\windows\downloaded program files\conflict.1\tgctlsr.dll
    c:\windows\downloaded program files\conflict.1\tgctlsr.inf
    Infected directories detected
    c:\windows\downloaded program files\conflict.1

    [WALT: tgctlst.inf starts off:
    ;SprtName=SupportSoft ScriptRunner Control
    ;SprtXpiName=SupportSoft ScriptRunner
    ;SprtJarName=SupportSoft/ScriptRunner
    ;SprtEmbedType=application/x-SupportSoft-ScriptRunner-Plugin

    I see an LsSupCtl.dll but no matching inf file. sdclicense.txt is a
    license from support.com.]


  2. #2
    Nick Skrepetos Guest

    Re: Uniblue Spyeraser - Trustworthy?


    Walt Bilofsky wrote:
    > "Nick Skrepetos" <nskrepetos@yahoo.com> wrote:
    >
    > >
    > >Walt Bilofsky wrote:
    > >> Uniblue SpyEraser found a number of "threats" on my PC that were not
    > >> detected by any other program I tried. Is this a cause for concern?
    > >>
    > >> I downloaded and ran the free (scan only) SpyEraser from
    > >> http://www.liutilities.com/products/spyeraser/ . It found a lot of
    > >> problems, and suggested that the product be purchased in order to
    > >> clean them up.
    > >>
    > >> Among the threats it found were Screenspy, Mainpean Dialer, and
    > >> AdultLinks QABar. I scanned my system with Norton Anti-Virus 2006,
    > >> Spybot 1.3, and Ad-Aware SE Personal, and none of them found any of
    > >> these (or anything else worth worrying about). The Symantec web site
    > >> lists files and registry keys for these threats, none of which were
    > >> present on my PC.
    > >>
    > >> SpyEraser also listed threats called NX Client, Viewpoint Media
    > >> Toolbar, TinTel dialer, and VX2. Symantec doesn't list any of these
    > >> as threats.
    > >>
    > >> So - what's going on here?
    > >>
    > >> P.S.: It wasn't so easy to uninstall SpyEraser, either. And when I
    > >> got the uninstall to run without errors, it left the program files on
    > >> the hard drive anyway.

    > >
    > >I am going to reserve official comment here - I would be interested in
    > >seeing the LOG of EXACTLY what was detected. Can you post that here?
    > >
    > >Nick Skrepetos
    > >SUPERAntiSpyware.com
    > >http://www.superantispyware.com

    >
    > Sounds sensible, Nick.
    >
    > The log (omitting tracking cookies) is below, with my comments in
    > brackets. Hope this is helpful.
    >
    > - Walt
    >
    > ==================
    >
    > Start Dateecember 26, 2006 at 09:28:03 PM
    >
    > End Dateecember 26, 2006 at 09:32:55 PM
    >
    > Total Time:4 Mins 52 Secs
    >
    > Detected Threats
    >
    > NX Client
    > Details: NoMachine is useful for remote access and terminal services
    > and is installed in companies such as HP, Google, IBM, Siemens,
    > Motorola, SAP, Philips Semiconductors, Nokia, Verisign, VMWare,
    > Novell, Symbio Technologies, Trolltech, Toshiba Electronics Europe,
    > AXA Technology Services etc.
    > Status:No Action taken
    > Remote Control Software-Remote Control Software
    >
    > Infected registry keys/values detected
    > hkey_local_machine\software\cygnus solutions\cygwin\program
    > options\\
    > hkey_local_machine\software\cygnus solutions\cygwin\mounts
    > v2\\
    > hkey_local_machine\software\cygnus solutions\\
    >
    > [ WALT: These keys are there, but the only values in them are the
    > pathnames for my Cygwin directories, and one flag bit.]
    >
    > Tintel
    > Details: Tintel is a program which makes long-distance phone calls or
    > calls to 900 and 976 phone numbers without user's knowledge. To
    > connect, the computer must be connected to a phone line via a standard
    > modem or ADSL. Cable or satellite users and users on network or behind
    > a firewall are generally not affected. Tintel allows
    > subscription-based websites to charge subscribers by billing the
    > user's phone line.
    > Status:No Action taken
    > Dialer-Dialer
    >
    > Infected registry keys/values detected
    > hkey_classes_root\.tcw\\
    >
    > [WALT: This registry key assigns the extension .tcw to Turbo Cad Win
    > 2.]
    >
    > ScreenSpy
    > Details: ScreenSpy is a type of RAT spyware. Remote Administration
    > Tool provides a complete control over the machine and it could be used
    > for malicious purposes. It also tries to manipulate machine through a
    > remote location on the internet. There are two types of components:
    > one is on target machine and answer all the remote commands and second
    > application that is used by the attacker to track the server
    > applications.
    > Status:No Action taken
    > Key Logger-Key Logger
    >
    > Infected registry keys/values detected
    >
    > hkey_current_user\software\classes\clsid\{1efb6596-857c-11d1-b16a-00c0f0283628}\
    > inprocserver32\\
    >
    > VX2
    > Details: VX2 is a Browser Helper Object for InternetExplorer. It
    > monitors web pages requested and data entered into forms and sends
    > this information to its home server. It then displays pop-up
    > advertisement windows based on the information. It can update itself
    > and install other software. There are two variants of this parasite
    > with different file and internal names, but both work identically. It
    > also shares IE's memory context and has the capability to perform any
    > action on the available windows and modules.
    > Status:No Action taken
    > Browser Helper-Browser Helper
    >
    > Infected registry keys/values detected
    > hkey_local_machine\software\vendor
    >
    > [WALT: The value of the key "vendor" is "Dell", the manufacturer of my
    > PC.]
    >
    > MainPean Dialer
    > Details: MainPean Dialer is a program which makes long-distance phone
    > calls or calls to 900 and 976 phone numbers without user's knowledge.
    > To connect, the computer must be connected to a phone line via a
    > standard modem or ADSL. Cable or satellite users and users on network
    > or behind a firewall are not affected.
    > Status:No Action taken
    > Dialer-Dialer
    >
    > Infected registry keys/values detected
    > hkey_current_user\software\freeware\\
    >
    > [WALT: This key contains a subtree of keys for the freeware program
    > VirtualDub.]
    >
    > NJStar
    > Details: NJStar Asian Explorer is a FREE web browser created for
    > reading Chinese, Japanese and Korean (CJK) web pages with intelligent
    > NJStar CJK auto-detection technologies just like Microsoft Internet
    > Explorer or Netscape. It gives a tension free CJK web surfing
    > experience. Its use is in conjunction with the best-selling NJStar
    > Communicator and it allow us to view, input and save CJK web pages
    > with unprecedented control and ease.
    > Status:No Action taken
    > Adware-Adware
    >
    > Infected registry keys/values detected
    > hkey_current_user\software\njstar\\
    >
    > [WALT: This browser helper is cited as Adware around the web. I
    > installed the software for its Chinese keyboard input.]
    >
    > AdultLinks.QBar
    > Details: AdultLinks QaBar combines links to porn and other sites to
    > the Internet Explorer Favorite menu.It is also known as adware that
    > shows what third-party is advertising on his computer. Ads could of
    > various forms like, pop-ups, pop-unders, banners, or links embedded
    > within web pages or parts of the Windows interface. Adware also helps
    > in keeping track of browsing habits so that a record could be kept
    > with the user.
    > Status:No Action taken
    > Browser Plugin-Browser Plugin
    >
    > Infected files detected
    > c:\windows\downloaded program files\conflict.1\lssupctl.dll
    > c:\windows\downloaded program files\conflict.1\lssupctl.inf
    > c:\windows\downloaded program files\conflict.1\sdclicense.txt
    > c:\windows\downloaded program files\conflict.1\symadata.dll
    > c:\windows\downloaded program files\conflict.1\tgctlsi.dll
    > c:\windows\downloaded program files\conflict.1\tgctlsi.inf
    > c:\windows\downloaded program files\conflict.1\tgctlsr.dll
    > c:\windows\downloaded program files\conflict.1\tgctlsr.inf
    > Infected directories detected
    > c:\windows\downloaded program files\conflict.1
    >
    > [WALT: tgctlst.inf starts off:
    > ;SprtName=SupportSoft ScriptRunner Control
    > ;SprtXpiName=SupportSoft ScriptRunner
    > ;SprtJarName=SupportSoft/ScriptRunner
    > ;SprtEmbedType=application/x-SupportSoft-ScriptRunner-Plugin
    >
    > I see an LsSupCtl.dll but no matching inf file. sdclicense.txt is a
    > license from support.com.]


    Walt - much as I suspected - a whole bunch of what appear to be false
    positives. That's quite a few on single non-infected system. SpyEraser
    was detecting SUPERAntiSpyware as a "rogue" product - they corrected
    that as soon as I found out about the detection.

    Nick Skrepetos
    SUPERAntiSpyware.com
    http://www.superantispyware.com


  3. #3
    Walt Bilofsky Guest

    Re: Uniblue Spyeraser - Trustworthy?

    "Nick Skrepetos" <nskrepetos@yahoo.com> wrote:

    >
    >Walt Bilofsky wrote:
    >> "Nick Skrepetos" <nskrepetos@yahoo.com> wrote:
    >>
    >> >
    >> >Walt Bilofsky wrote:
    >> >> Uniblue SpyEraser found a number of "threats" on my PC that were not
    >> >> detected by any other program I tried. Is this a cause for concern?
    >> >>
    >> >> I downloaded and ran the free (scan only) SpyEraser from
    >> >> http://www.liutilities.com/products/spyeraser/ . It found a lot of
    >> >> problems, and suggested that the product be purchased in order to
    >> >> clean them up.
    >> >>
    >> >> Among the threats it found were Screenspy, Mainpean Dialer, and
    >> >> AdultLinks QABar. I scanned my system with Norton Anti-Virus 2006,
    >> >> Spybot 1.3, and Ad-Aware SE Personal, and none of them found any of
    >> >> these (or anything else worth worrying about). The Symantec web site
    >> >> lists files and registry keys for these threats, none of which were
    >> >> present on my PC.
    >> >>
    >> >> SpyEraser also listed threats called NX Client, Viewpoint Media
    >> >> Toolbar, TinTel dialer, and VX2. Symantec doesn't list any of these
    >> >> as threats.
    >> >>
    >> >> So - what's going on here?
    >> >>
    >> >> P.S.: It wasn't so easy to uninstall SpyEraser, either. And when I
    >> >> got the uninstall to run without errors, it left the program files on
    >> >> the hard drive anyway.
    >> >
    >> >I am going to reserve official comment here - I would be interested in
    >> >seeing the LOG of EXACTLY what was detected. Can you post that here?
    >> >
    >> >Nick Skrepetos
    >> >SUPERAntiSpyware.com
    >> >http://www.superantispyware.com

    >>
    >> Sounds sensible, Nick.
    >>
    >> The log (omitting tracking cookies) is below, with my comments in
    >> brackets. Hope this is helpful.
    >>
    >> - Walt
    >>
    >> ==================
    >>
    >> Start Dateecember 26, 2006 at 09:28:03 PM
    >>
    >> End Dateecember 26, 2006 at 09:32:55 PM
    >>
    >> Total Time:4 Mins 52 Secs
    >>
    >> Detected Threats
    >>
    >> NX Client
    >> Details: NoMachine is useful for remote access and terminal services
    >> and is installed in companies such as HP, Google, IBM, Siemens,
    >> Motorola, SAP, Philips Semiconductors, Nokia, Verisign, VMWare,
    >> Novell, Symbio Technologies, Trolltech, Toshiba Electronics Europe,
    >> AXA Technology Services etc.
    >> Status:No Action taken
    >> Remote Control Software-Remote Control Software
    >>
    >> Infected registry keys/values detected
    >> hkey_local_machine\software\cygnus solutions\cygwin\program
    >> options\\
    >> hkey_local_machine\software\cygnus solutions\cygwin\mounts
    >> v2\\
    >> hkey_local_machine\software\cygnus solutions\\
    >>
    >> [ WALT: These keys are there, but the only values in them are the
    >> pathnames for my Cygwin directories, and one flag bit.]
    >>
    >> Tintel
    >> Details: Tintel is a program which makes long-distance phone calls or
    >> calls to 900 and 976 phone numbers without user's knowledge. To
    >> connect, the computer must be connected to a phone line via a standard
    >> modem or ADSL. Cable or satellite users and users on network or behind
    >> a firewall are generally not affected. Tintel allows
    >> subscription-based websites to charge subscribers by billing the
    >> user's phone line.
    >> Status:No Action taken
    >> Dialer-Dialer
    >>
    >> Infected registry keys/values detected
    >> hkey_classes_root\.tcw\\
    >>
    >> [WALT: This registry key assigns the extension .tcw to Turbo Cad Win
    >> 2.]
    >>
    >> ScreenSpy
    >> Details: ScreenSpy is a type of RAT spyware. Remote Administration
    >> Tool provides a complete control over the machine and it could be used
    >> for malicious purposes. It also tries to manipulate machine through a
    >> remote location on the internet. There are two types of components:
    >> one is on target machine and answer all the remote commands and second
    >> application that is used by the attacker to track the server
    >> applications.
    >> Status:No Action taken
    >> Key Logger-Key Logger
    >>
    >> Infected registry keys/values detected
    >>
    >> hkey_current_user\software\classes\clsid\{1efb6596-857c-11d1-b16a-00c0f0283628}\
    >> inprocserver32\\
    >>
    >> VX2
    >> Details: VX2 is a Browser Helper Object for InternetExplorer. It
    >> monitors web pages requested and data entered into forms and sends
    >> this information to its home server. It then displays pop-up
    >> advertisement windows based on the information. It can update itself
    >> and install other software. There are two variants of this parasite
    >> with different file and internal names, but both work identically. It
    >> also shares IE's memory context and has the capability to perform any
    >> action on the available windows and modules.
    >> Status:No Action taken
    >> Browser Helper-Browser Helper
    >>
    >> Infected registry keys/values detected
    >> hkey_local_machine\software\vendor
    >>
    >> [WALT: The value of the key "vendor" is "Dell", the manufacturer of my
    >> PC.]
    >>
    >> MainPean Dialer
    >> Details: MainPean Dialer is a program which makes long-distance phone
    >> calls or calls to 900 and 976 phone numbers without user's knowledge.
    >> To connect, the computer must be connected to a phone line via a
    >> standard modem or ADSL. Cable or satellite users and users on network
    >> or behind a firewall are not affected.
    >> Status:No Action taken
    >> Dialer-Dialer
    >>
    >> Infected registry keys/values detected
    >> hkey_current_user\software\freeware\\
    >>
    >> [WALT: This key contains a subtree of keys for the freeware program
    >> VirtualDub.]
    >>
    >> NJStar
    >> Details: NJStar Asian Explorer is a FREE web browser created for
    >> reading Chinese, Japanese and Korean (CJK) web pages with intelligent
    >> NJStar CJK auto-detection technologies just like Microsoft Internet
    >> Explorer or Netscape. It gives a tension free CJK web surfing
    >> experience. Its use is in conjunction with the best-selling NJStar
    >> Communicator and it allow us to view, input and save CJK web pages
    >> with unprecedented control and ease.
    >> Status:No Action taken
    >> Adware-Adware
    >>
    >> Infected registry keys/values detected
    >> hkey_current_user\software\njstar\\
    >>
    >> [WALT: This browser helper is cited as Adware around the web. I
    >> installed the software for its Chinese keyboard input.]
    >>
    >> AdultLinks.QBar
    >> Details: AdultLinks QaBar combines links to porn and other sites to
    >> the Internet Explorer Favorite menu.It is also known as adware that
    >> shows what third-party is advertising on his computer. Ads could of
    >> various forms like, pop-ups, pop-unders, banners, or links embedded
    >> within web pages or parts of the Windows interface. Adware also helps
    >> in keeping track of browsing habits so that a record could be kept
    >> with the user.
    >> Status:No Action taken
    >> Browser Plugin-Browser Plugin
    >>
    >> Infected files detected
    >> c:\windows\downloaded program files\conflict.1\lssupctl.dll
    >> c:\windows\downloaded program files\conflict.1\lssupctl.inf
    >> c:\windows\downloaded program files\conflict.1\sdclicense.txt
    >> c:\windows\downloaded program files\conflict.1\symadata.dll
    >> c:\windows\downloaded program files\conflict.1\tgctlsi.dll
    >> c:\windows\downloaded program files\conflict.1\tgctlsi.inf
    >> c:\windows\downloaded program files\conflict.1\tgctlsr.dll
    >> c:\windows\downloaded program files\conflict.1\tgctlsr.inf
    >> Infected directories detected
    >> c:\windows\downloaded program files\conflict.1
    >>
    >> [WALT: tgctlst.inf starts off:
    >> ;SprtName=SupportSoft ScriptRunner Control
    >> ;SprtXpiName=SupportSoft ScriptRunner
    >> ;SprtJarName=SupportSoft/ScriptRunner
    >> ;SprtEmbedType=application/x-SupportSoft-ScriptRunner-Plugin
    >>
    >> I see an LsSupCtl.dll but no matching inf file. sdclicense.txt is a
    >> license from support.com.]

    >
    >Walt - much as I suspected - a whole bunch of what appear to be false
    >positives. That's quite a few on single non-infected system. SpyEraser
    >was detecting SUPERAntiSpyware as a "rogue" product - they corrected
    >that as soon as I found out about the detection.
    >
    >Nick Skrepetos
    >SUPERAntiSpyware.com
    >http://www.superantispyware.com


    Thanks, Nick.

    I am no expert on anti spyware - perhaps an intelligent though not
    knowledgeable consumer. And it's hard to impute motivation rather
    than a lack of diligence, especially when the cost of a false negative
    is much higher than a false positive.

    Nevertheless, I think an average computer user would have seen the
    results SpyEraser gave, and rushed in a panic to buy the full version
    that does cleanup. This would be lucrative for the manufacturer.

    And I wonder if any of my programs would have stopped working had I
    purchased the full version of SpyEraser and asked it to remove all the
    "spyware" from my system.

    - Walt

  4. #4
    Dustin Cook Guest

    Re: Uniblue Spyeraser - Trustworthy?

    Walt Bilofsky <bilofsky@toolworks.com> wrote in
    news:c385p2hu5dcptgvcujuu0cvhhcigiuc49u@4ax.com:

    > "Nick Skrepetos" <nskrepetos@yahoo.com> wrote:
    >
    >>
    >>Walt Bilofsky wrote:
    >>> "Nick Skrepetos" <nskrepetos@yahoo.com> wrote:
    >>>
    >>> >
    >>> >Walt Bilofsky wrote:
    >>> >> Uniblue SpyEraser found a number of "threats" on my PC that were
    >>> >> not detected by any other program I tried. Is this a cause for
    >>> >> concern?
    >>> >>
    >>> >> I downloaded and ran the free (scan only) SpyEraser from
    >>> >> http://www.liutilities.com/products/spyeraser/ . It found a lot
    >>> >> of problems, and suggested that the product be purchased in order
    >>> >> to clean them up.
    >>> >>
    >>> >> Among the threats it found were Screenspy, Mainpean Dialer, and
    >>> >> AdultLinks QABar. I scanned my system with Norton Anti-Virus
    >>> >> 2006, Spybot 1.3, and Ad-Aware SE Personal, and none of them
    >>> >> found any of these (or anything else worth worrying about). The
    >>> >> Symantec web site lists files and registry keys for these
    >>> >> threats, none of which were present on my PC.
    >>> >>
    >>> >> SpyEraser also listed threats called NX Client, Viewpoint Media
    >>> >> Toolbar, TinTel dialer, and VX2. Symantec doesn't list any of
    >>> >> these as threats.
    >>> >>
    >>> >> So - what's going on here?
    >>> >>
    >>> >> P.S.: It wasn't so easy to uninstall SpyEraser, either. And when
    >>> >> I got the uninstall to run without errors, it left the program
    >>> >> files on the hard drive anyway.
    >>> >
    >>> >I am going to reserve official comment here - I would be interested
    >>> >in seeing the LOG of EXACTLY what was detected. Can you post that
    >>> >here?
    >>> >
    >>> >Nick Skrepetos
    >>> >SUPERAntiSpyware.com
    >>> >http://www.superantispyware.com
    >>>
    >>> Sounds sensible, Nick.
    >>>
    >>> The log (omitting tracking cookies) is below, with my comments in
    >>> brackets. Hope this is helpful.
    >>>
    >>> - Walt
    >>>
    >>> ==================
    >>>
    >>> Start Dateecember 26, 2006 at 09:28:03 PM
    >>>
    >>> End Dateecember 26, 2006 at 09:32:55 PM
    >>>
    >>> Total Time:4 Mins 52 Secs
    >>>
    >>> Detected Threats
    >>>
    >>> NX Client
    >>> Details: NoMachine is useful for remote access and terminal services
    >>> and is installed in companies such as HP, Google, IBM, Siemens,
    >>> Motorola, SAP, Philips Semiconductors, Nokia, Verisign, VMWare,
    >>> Novell, Symbio Technologies, Trolltech, Toshiba Electronics Europe,
    >>> AXA Technology Services etc.
    >>> Status:No Action taken
    >>> Remote Control Software-Remote Control Software
    >>>
    >>> Infected registry keys/values detected
    >>> hkey_local_machine\software\cygnus solutions\cygwin\program
    >>> options\\
    >>> hkey_local_machine\software\cygnus solutions\cygwin\mounts
    >>> v2\\
    >>> hkey_local_machine\software\cygnus solutions\\
    >>>
    >>> [ WALT: These keys are there, but the only values in them are the
    >>> pathnames for my Cygwin directories, and one flag bit.]
    >>>
    >>> Tintel
    >>> Details: Tintel is a program which makes long-distance phone calls
    >>> or calls to 900 and 976 phone numbers without user's knowledge. To
    >>> connect, the computer must be connected to a phone line via a
    >>> standard modem or ADSL. Cable or satellite users and users on
    >>> network or behind a firewall are generally not affected. Tintel
    >>> allows subscription-based websites to charge subscribers by billing
    >>> the user's phone line.
    >>> Status:No Action taken
    >>> Dialer-Dialer
    >>>
    >>> Infected registry keys/values detected
    >>> hkey_classes_root\.tcw\\
    >>>
    >>> [WALT: This registry key assigns the extension .tcw to Turbo Cad Win
    >>> 2.]
    >>>
    >>> ScreenSpy
    >>> Details: ScreenSpy is a type of RAT spyware. Remote Administration
    >>> Tool provides a complete control over the machine and it could be
    >>> used for malicious purposes. It also tries to manipulate machine
    >>> through a remote location on the internet. There are two types of
    >>> components: one is on target machine and answer all the remote
    >>> commands and second application that is used by the attacker to
    >>> track the server applications.
    >>> Status:No Action taken
    >>> Key Logger-Key Logger
    >>>
    >>> Infected registry keys/values detected
    >>>
    >>> hkey_current_user\software\classes\clsid\{1efb6596-857c-11d1-b16a-00c
    >>> 0f0283628}\ inprocserver32\\
    >>>
    >>> VX2
    >>> Details: VX2 is a Browser Helper Object for InternetExplorer. It
    >>> monitors web pages requested and data entered into forms and sends
    >>> this information to its home server. It then displays pop-up
    >>> advertisement windows based on the information. It can update itself
    >>> and install other software. There are two variants of this parasite
    >>> with different file and internal names, but both work identically.
    >>> It also shares IE's memory context and has the capability to perform
    >>> any action on the available windows and modules.
    >>> Status:No Action taken
    >>> Browser Helper-Browser Helper
    >>>
    >>> Infected registry keys/values detected
    >>> hkey_local_machine\software\vendor
    >>>
    >>> [WALT: The value of the key "vendor" is "Dell", the manufacturer of
    >>> my PC.]
    >>>
    >>> MainPean Dialer
    >>> Details: MainPean Dialer is a program which makes long-distance
    >>> phone calls or calls to 900 and 976 phone numbers without user's
    >>> knowledge. To connect, the computer must be connected to a phone
    >>> line via a standard modem or ADSL. Cable or satellite users and
    >>> users on network or behind a firewall are not affected.
    >>> Status:No Action taken
    >>> Dialer-Dialer
    >>>
    >>> Infected registry keys/values detected
    >>> hkey_current_user\software\freeware\\
    >>>
    >>> [WALT: This key contains a subtree of keys for the freeware program
    >>> VirtualDub.]
    >>>
    >>> NJStar
    >>> Details: NJStar Asian Explorer is a FREE web browser created for
    >>> reading Chinese, Japanese and Korean (CJK) web pages with
    >>> intelligent NJStar CJK auto-detection technologies just like
    >>> Microsoft Internet Explorer or Netscape. It gives a tension free CJK
    >>> web surfing experience. Its use is in conjunction with the
    >>> best-selling NJStar Communicator and it allow us to view, input and
    >>> save CJK web pages with unprecedented control and ease.
    >>> Status:No Action taken
    >>> Adware-Adware
    >>>
    >>> Infected registry keys/values detected
    >>> hkey_current_user\software\njstar\\
    >>>
    >>> [WALT: This browser helper is cited as Adware around the web. I
    >>> installed the software for its Chinese keyboard input.]
    >>>
    >>> AdultLinks.QBar
    >>> Details: AdultLinks QaBar combines links to porn and other sites to
    >>> the Internet Explorer Favorite menu.It is also known as adware that
    >>> shows what third-party is advertising on his computer. Ads could of
    >>> various forms like, pop-ups, pop-unders, banners, or links embedded
    >>> within web pages or parts of the Windows interface. Adware also
    >>> helps in keeping track of browsing habits so that a record could be
    >>> kept with the user.
    >>> Status:No Action taken
    >>> Browser Plugin-Browser Plugin
    >>>
    >>> Infected files detected
    >>> c:\windows\downloaded program files\conflict.1\lssupctl.dll
    >>> c:\windows\downloaded program files\conflict.1\lssupctl.inf
    >>> c:\windows\downloaded program files\conflict.1\sdclicense.txt
    >>> c:\windows\downloaded program files\conflict.1\symadata.dll
    >>> c:\windows\downloaded program files\conflict.1\tgctlsi.dll
    >>> c:\windows\downloaded program files\conflict.1\tgctlsi.inf
    >>> c:\windows\downloaded program files\conflict.1\tgctlsr.dll
    >>> c:\windows\downloaded program files\conflict.1\tgctlsr.inf
    >>> Infected directories detected
    >>> c:\windows\downloaded program files\conflict.1
    >>>
    >>> [WALT: tgctlst.inf starts off:
    >>> ;SprtName=SupportSoft ScriptRunner Control
    >>> ;SprtXpiName=SupportSoft ScriptRunner
    >>> ;SprtJarName=SupportSoft/ScriptRunner
    >>> ;SprtEmbedType=application/x-SupportSoft-ScriptRunner-Plugin
    >>>
    >>> I see an LsSupCtl.dll but no matching inf file. sdclicense.txt is a
    >>> license from support.com.]

    >>
    >>Walt - much as I suspected - a whole bunch of what appear to be false
    >>positives. That's quite a few on single non-infected system. SpyEraser
    >>was detecting SUPERAntiSpyware as a "rogue" product - they corrected
    >>that as soon as I found out about the detection.
    >>
    >>Nick Skrepetos
    >>SUPERAntiSpyware.com
    >>http://www.superantispyware.com

    >
    > Thanks, Nick.
    >
    > I am no expert on anti spyware - perhaps an intelligent though not
    > knowledgeable consumer. And it's hard to impute motivation rather
    > than a lack of diligence, especially when the cost of a false negative
    > is much higher than a false positive.
    >
    > Nevertheless, I think an average computer user would have seen the
    > results SpyEraser gave, and rushed in a panic to buy the full version
    > that does cleanup. This would be lucrative for the manufacturer.
    >
    > And I wonder if any of my programs would have stopped working had I
    > purchased the full version of SpyEraser and asked it to remove all the
    > "spyware" from my system.
    >
    > - Walt
    >


    virtualdub wouldn't really appreciate the registry keys deleted..


    --
    Dustin Cook
    Author of BugHunter - MalWare Removal Tool -V2.0
    web: http://bughunter.it-mate.co.uk
    email: bughunter.dustin@gmail.com.removethis
    Last updated: January 4th, 2007

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •