Results 1 to 10 of 10

Thread: Uniblue Spyeraser - Trustworthy?

Hybrid View

  1. #1
    Nick Skrepetos Guest

    Re: Uniblue Spyeraser - Trustworthy?


    Walt Bilofsky wrote:
    > "Nick Skrepetos" <nskrepetos@yahoo.com> wrote:
    >
    > >
    > >Walt Bilofsky wrote:
    > >> Uniblue SpyEraser found a number of "threats" on my PC that were not
    > >> detected by any other program I tried. Is this a cause for concern?
    > >>
    > >> I downloaded and ran the free (scan only) SpyEraser from
    > >> http://www.liutilities.com/products/spyeraser/ . It found a lot of
    > >> problems, and suggested that the product be purchased in order to
    > >> clean them up.
    > >>
    > >> Among the threats it found were Screenspy, Mainpean Dialer, and
    > >> AdultLinks QABar. I scanned my system with Norton Anti-Virus 2006,
    > >> Spybot 1.3, and Ad-Aware SE Personal, and none of them found any of
    > >> these (or anything else worth worrying about). The Symantec web site
    > >> lists files and registry keys for these threats, none of which were
    > >> present on my PC.
    > >>
    > >> SpyEraser also listed threats called NX Client, Viewpoint Media
    > >> Toolbar, TinTel dialer, and VX2. Symantec doesn't list any of these
    > >> as threats.
    > >>
    > >> So - what's going on here?
    > >>
    > >> P.S.: It wasn't so easy to uninstall SpyEraser, either. And when I
    > >> got the uninstall to run without errors, it left the program files on
    > >> the hard drive anyway.

    > >
    > >I am going to reserve official comment here - I would be interested in
    > >seeing the LOG of EXACTLY what was detected. Can you post that here?
    > >
    > >Nick Skrepetos
    > >SUPERAntiSpyware.com
    > >http://www.superantispyware.com

    >
    > Sounds sensible, Nick.
    >
    > The log (omitting tracking cookies) is below, with my comments in
    > brackets. Hope this is helpful.
    >
    > - Walt
    >
    > ==================
    >
    > Start Dateecember 26, 2006 at 09:28:03 PM
    >
    > End Dateecember 26, 2006 at 09:32:55 PM
    >
    > Total Time:4 Mins 52 Secs
    >
    > Detected Threats
    >
    > NX Client
    > Details: NoMachine is useful for remote access and terminal services
    > and is installed in companies such as HP, Google, IBM, Siemens,
    > Motorola, SAP, Philips Semiconductors, Nokia, Verisign, VMWare,
    > Novell, Symbio Technologies, Trolltech, Toshiba Electronics Europe,
    > AXA Technology Services etc.
    > Status:No Action taken
    > Remote Control Software-Remote Control Software
    >
    > Infected registry keys/values detected
    > hkey_local_machine\software\cygnus solutions\cygwin\program
    > options\\
    > hkey_local_machine\software\cygnus solutions\cygwin\mounts
    > v2\\
    > hkey_local_machine\software\cygnus solutions\\
    >
    > [ WALT: These keys are there, but the only values in them are the
    > pathnames for my Cygwin directories, and one flag bit.]
    >
    > Tintel
    > Details: Tintel is a program which makes long-distance phone calls or
    > calls to 900 and 976 phone numbers without user's knowledge. To
    > connect, the computer must be connected to a phone line via a standard
    > modem or ADSL. Cable or satellite users and users on network or behind
    > a firewall are generally not affected. Tintel allows
    > subscription-based websites to charge subscribers by billing the
    > user's phone line.
    > Status:No Action taken
    > Dialer-Dialer
    >
    > Infected registry keys/values detected
    > hkey_classes_root\.tcw\\
    >
    > [WALT: This registry key assigns the extension .tcw to Turbo Cad Win
    > 2.]
    >
    > ScreenSpy
    > Details: ScreenSpy is a type of RAT spyware. Remote Administration
    > Tool provides a complete control over the machine and it could be used
    > for malicious purposes. It also tries to manipulate machine through a
    > remote location on the internet. There are two types of components:
    > one is on target machine and answer all the remote commands and second
    > application that is used by the attacker to track the server
    > applications.
    > Status:No Action taken
    > Key Logger-Key Logger
    >
    > Infected registry keys/values detected
    >
    > hkey_current_user\software\classes\clsid\{1efb6596-857c-11d1-b16a-00c0f0283628}\
    > inprocserver32\\
    >
    > VX2
    > Details: VX2 is a Browser Helper Object for InternetExplorer. It
    > monitors web pages requested and data entered into forms and sends
    > this information to its home server. It then displays pop-up
    > advertisement windows based on the information. It can update itself
    > and install other software. There are two variants of this parasite
    > with different file and internal names, but both work identically. It
    > also shares IE's memory context and has the capability to perform any
    > action on the available windows and modules.
    > Status:No Action taken
    > Browser Helper-Browser Helper
    >
    > Infected registry keys/values detected
    > hkey_local_machine\software\vendor
    >
    > [WALT: The value of the key "vendor" is "Dell", the manufacturer of my
    > PC.]
    >
    > MainPean Dialer
    > Details: MainPean Dialer is a program which makes long-distance phone
    > calls or calls to 900 and 976 phone numbers without user's knowledge.
    > To connect, the computer must be connected to a phone line via a
    > standard modem or ADSL. Cable or satellite users and users on network
    > or behind a firewall are not affected.
    > Status:No Action taken
    > Dialer-Dialer
    >
    > Infected registry keys/values detected
    > hkey_current_user\software\freeware\\
    >
    > [WALT: This key contains a subtree of keys for the freeware program
    > VirtualDub.]
    >
    > NJStar
    > Details: NJStar Asian Explorer is a FREE web browser created for
    > reading Chinese, Japanese and Korean (CJK) web pages with intelligent
    > NJStar CJK auto-detection technologies just like Microsoft Internet
    > Explorer or Netscape. It gives a tension free CJK web surfing
    > experience. Its use is in conjunction with the best-selling NJStar
    > Communicator and it allow us to view, input and save CJK web pages
    > with unprecedented control and ease.
    > Status:No Action taken
    > Adware-Adware
    >
    > Infected registry keys/values detected
    > hkey_current_user\software\njstar\\
    >
    > [WALT: This browser helper is cited as Adware around the web. I
    > installed the software for its Chinese keyboard input.]
    >
    > AdultLinks.QBar
    > Details: AdultLinks QaBar combines links to porn and other sites to
    > the Internet Explorer Favorite menu.It is also known as adware that
    > shows what third-party is advertising on his computer. Ads could of
    > various forms like, pop-ups, pop-unders, banners, or links embedded
    > within web pages or parts of the Windows interface. Adware also helps
    > in keeping track of browsing habits so that a record could be kept
    > with the user.
    > Status:No Action taken
    > Browser Plugin-Browser Plugin
    >
    > Infected files detected
    > c:\windows\downloaded program files\conflict.1\lssupctl.dll
    > c:\windows\downloaded program files\conflict.1\lssupctl.inf
    > c:\windows\downloaded program files\conflict.1\sdclicense.txt
    > c:\windows\downloaded program files\conflict.1\symadata.dll
    > c:\windows\downloaded program files\conflict.1\tgctlsi.dll
    > c:\windows\downloaded program files\conflict.1\tgctlsi.inf
    > c:\windows\downloaded program files\conflict.1\tgctlsr.dll
    > c:\windows\downloaded program files\conflict.1\tgctlsr.inf
    > Infected directories detected
    > c:\windows\downloaded program files\conflict.1
    >
    > [WALT: tgctlst.inf starts off:
    > ;SprtName=SupportSoft ScriptRunner Control
    > ;SprtXpiName=SupportSoft ScriptRunner
    > ;SprtJarName=SupportSoft/ScriptRunner
    > ;SprtEmbedType=application/x-SupportSoft-ScriptRunner-Plugin
    >
    > I see an LsSupCtl.dll but no matching inf file. sdclicense.txt is a
    > license from support.com.]


    Walt - much as I suspected - a whole bunch of what appear to be false
    positives. That's quite a few on single non-infected system. SpyEraser
    was detecting SUPERAntiSpyware as a "rogue" product - they corrected
    that as soon as I found out about the detection.

    Nick Skrepetos
    SUPERAntiSpyware.com
    http://www.superantispyware.com


  2. #2
    Walt Bilofsky Guest

    Re: Uniblue Spyeraser - Trustworthy?

    "Nick Skrepetos" <nskrepetos@yahoo.com> wrote:

    >
    >Walt Bilofsky wrote:
    >> "Nick Skrepetos" <nskrepetos@yahoo.com> wrote:
    >>
    >> >
    >> >Walt Bilofsky wrote:
    >> >> Uniblue SpyEraser found a number of "threats" on my PC that were not
    >> >> detected by any other program I tried. Is this a cause for concern?
    >> >>
    >> >> I downloaded and ran the free (scan only) SpyEraser from
    >> >> http://www.liutilities.com/products/spyeraser/ . It found a lot of
    >> >> problems, and suggested that the product be purchased in order to
    >> >> clean them up.
    >> >>
    >> >> Among the threats it found were Screenspy, Mainpean Dialer, and
    >> >> AdultLinks QABar. I scanned my system with Norton Anti-Virus 2006,
    >> >> Spybot 1.3, and Ad-Aware SE Personal, and none of them found any of
    >> >> these (or anything else worth worrying about). The Symantec web site
    >> >> lists files and registry keys for these threats, none of which were
    >> >> present on my PC.
    >> >>
    >> >> SpyEraser also listed threats called NX Client, Viewpoint Media
    >> >> Toolbar, TinTel dialer, and VX2. Symantec doesn't list any of these
    >> >> as threats.
    >> >>
    >> >> So - what's going on here?
    >> >>
    >> >> P.S.: It wasn't so easy to uninstall SpyEraser, either. And when I
    >> >> got the uninstall to run without errors, it left the program files on
    >> >> the hard drive anyway.
    >> >
    >> >I am going to reserve official comment here - I would be interested in
    >> >seeing the LOG of EXACTLY what was detected. Can you post that here?
    >> >
    >> >Nick Skrepetos
    >> >SUPERAntiSpyware.com
    >> >http://www.superantispyware.com

    >>
    >> Sounds sensible, Nick.
    >>
    >> The log (omitting tracking cookies) is below, with my comments in
    >> brackets. Hope this is helpful.
    >>
    >> - Walt
    >>
    >> ==================
    >>
    >> Start Dateecember 26, 2006 at 09:28:03 PM
    >>
    >> End Dateecember 26, 2006 at 09:32:55 PM
    >>
    >> Total Time:4 Mins 52 Secs
    >>
    >> Detected Threats
    >>
    >> NX Client
    >> Details: NoMachine is useful for remote access and terminal services
    >> and is installed in companies such as HP, Google, IBM, Siemens,
    >> Motorola, SAP, Philips Semiconductors, Nokia, Verisign, VMWare,
    >> Novell, Symbio Technologies, Trolltech, Toshiba Electronics Europe,
    >> AXA Technology Services etc.
    >> Status:No Action taken
    >> Remote Control Software-Remote Control Software
    >>
    >> Infected registry keys/values detected
    >> hkey_local_machine\software\cygnus solutions\cygwin\program
    >> options\\
    >> hkey_local_machine\software\cygnus solutions\cygwin\mounts
    >> v2\\
    >> hkey_local_machine\software\cygnus solutions\\
    >>
    >> [ WALT: These keys are there, but the only values in them are the
    >> pathnames for my Cygwin directories, and one flag bit.]
    >>
    >> Tintel
    >> Details: Tintel is a program which makes long-distance phone calls or
    >> calls to 900 and 976 phone numbers without user's knowledge. To
    >> connect, the computer must be connected to a phone line via a standard
    >> modem or ADSL. Cable or satellite users and users on network or behind
    >> a firewall are generally not affected. Tintel allows
    >> subscription-based websites to charge subscribers by billing the
    >> user's phone line.
    >> Status:No Action taken
    >> Dialer-Dialer
    >>
    >> Infected registry keys/values detected
    >> hkey_classes_root\.tcw\\
    >>
    >> [WALT: This registry key assigns the extension .tcw to Turbo Cad Win
    >> 2.]
    >>
    >> ScreenSpy
    >> Details: ScreenSpy is a type of RAT spyware. Remote Administration
    >> Tool provides a complete control over the machine and it could be used
    >> for malicious purposes. It also tries to manipulate machine through a
    >> remote location on the internet. There are two types of components:
    >> one is on target machine and answer all the remote commands and second
    >> application that is used by the attacker to track the server
    >> applications.
    >> Status:No Action taken
    >> Key Logger-Key Logger
    >>
    >> Infected registry keys/values detected
    >>
    >> hkey_current_user\software\classes\clsid\{1efb6596-857c-11d1-b16a-00c0f0283628}\
    >> inprocserver32\\
    >>
    >> VX2
    >> Details: VX2 is a Browser Helper Object for InternetExplorer. It
    >> monitors web pages requested and data entered into forms and sends
    >> this information to its home server. It then displays pop-up
    >> advertisement windows based on the information. It can update itself
    >> and install other software. There are two variants of this parasite
    >> with different file and internal names, but both work identically. It
    >> also shares IE's memory context and has the capability to perform any
    >> action on the available windows and modules.
    >> Status:No Action taken
    >> Browser Helper-Browser Helper
    >>
    >> Infected registry keys/values detected
    >> hkey_local_machine\software\vendor
    >>
    >> [WALT: The value of the key "vendor" is "Dell", the manufacturer of my
    >> PC.]
    >>
    >> MainPean Dialer
    >> Details: MainPean Dialer is a program which makes long-distance phone
    >> calls or calls to 900 and 976 phone numbers without user's knowledge.
    >> To connect, the computer must be connected to a phone line via a
    >> standard modem or ADSL. Cable or satellite users and users on network
    >> or behind a firewall are not affected.
    >> Status:No Action taken
    >> Dialer-Dialer
    >>
    >> Infected registry keys/values detected
    >> hkey_current_user\software\freeware\\
    >>
    >> [WALT: This key contains a subtree of keys for the freeware program
    >> VirtualDub.]
    >>
    >> NJStar
    >> Details: NJStar Asian Explorer is a FREE web browser created for
    >> reading Chinese, Japanese and Korean (CJK) web pages with intelligent
    >> NJStar CJK auto-detection technologies just like Microsoft Internet
    >> Explorer or Netscape. It gives a tension free CJK web surfing
    >> experience. Its use is in conjunction with the best-selling NJStar
    >> Communicator and it allow us to view, input and save CJK web pages
    >> with unprecedented control and ease.
    >> Status:No Action taken
    >> Adware-Adware
    >>
    >> Infected registry keys/values detected
    >> hkey_current_user\software\njstar\\
    >>
    >> [WALT: This browser helper is cited as Adware around the web. I
    >> installed the software for its Chinese keyboard input.]
    >>
    >> AdultLinks.QBar
    >> Details: AdultLinks QaBar combines links to porn and other sites to
    >> the Internet Explorer Favorite menu.It is also known as adware that
    >> shows what third-party is advertising on his computer. Ads could of
    >> various forms like, pop-ups, pop-unders, banners, or links embedded
    >> within web pages or parts of the Windows interface. Adware also helps
    >> in keeping track of browsing habits so that a record could be kept
    >> with the user.
    >> Status:No Action taken
    >> Browser Plugin-Browser Plugin
    >>
    >> Infected files detected
    >> c:\windows\downloaded program files\conflict.1\lssupctl.dll
    >> c:\windows\downloaded program files\conflict.1\lssupctl.inf
    >> c:\windows\downloaded program files\conflict.1\sdclicense.txt
    >> c:\windows\downloaded program files\conflict.1\symadata.dll
    >> c:\windows\downloaded program files\conflict.1\tgctlsi.dll
    >> c:\windows\downloaded program files\conflict.1\tgctlsi.inf
    >> c:\windows\downloaded program files\conflict.1\tgctlsr.dll
    >> c:\windows\downloaded program files\conflict.1\tgctlsr.inf
    >> Infected directories detected
    >> c:\windows\downloaded program files\conflict.1
    >>
    >> [WALT: tgctlst.inf starts off:
    >> ;SprtName=SupportSoft ScriptRunner Control
    >> ;SprtXpiName=SupportSoft ScriptRunner
    >> ;SprtJarName=SupportSoft/ScriptRunner
    >> ;SprtEmbedType=application/x-SupportSoft-ScriptRunner-Plugin
    >>
    >> I see an LsSupCtl.dll but no matching inf file. sdclicense.txt is a
    >> license from support.com.]

    >
    >Walt - much as I suspected - a whole bunch of what appear to be false
    >positives. That's quite a few on single non-infected system. SpyEraser
    >was detecting SUPERAntiSpyware as a "rogue" product - they corrected
    >that as soon as I found out about the detection.
    >
    >Nick Skrepetos
    >SUPERAntiSpyware.com
    >http://www.superantispyware.com


    Thanks, Nick.

    I am no expert on anti spyware - perhaps an intelligent though not
    knowledgeable consumer. And it's hard to impute motivation rather
    than a lack of diligence, especially when the cost of a false negative
    is much higher than a false positive.

    Nevertheless, I think an average computer user would have seen the
    results SpyEraser gave, and rushed in a panic to buy the full version
    that does cleanup. This would be lucrative for the manufacturer.

    And I wonder if any of my programs would have stopped working had I
    purchased the full version of SpyEraser and asked it to remove all the
    "spyware" from my system.

    - Walt

  3. #3
    Dustin Cook Guest

    Re: Uniblue Spyeraser - Trustworthy?

    Walt Bilofsky <bilofsky@toolworks.com> wrote in
    news:c385p2hu5dcptgvcujuu0cvhhcigiuc49u@4ax.com:

    > "Nick Skrepetos" <nskrepetos@yahoo.com> wrote:
    >
    >>
    >>Walt Bilofsky wrote:
    >>> "Nick Skrepetos" <nskrepetos@yahoo.com> wrote:
    >>>
    >>> >
    >>> >Walt Bilofsky wrote:
    >>> >> Uniblue SpyEraser found a number of "threats" on my PC that were
    >>> >> not detected by any other program I tried. Is this a cause for
    >>> >> concern?
    >>> >>
    >>> >> I downloaded and ran the free (scan only) SpyEraser from
    >>> >> http://www.liutilities.com/products/spyeraser/ . It found a lot
    >>> >> of problems, and suggested that the product be purchased in order
    >>> >> to clean them up.
    >>> >>
    >>> >> Among the threats it found were Screenspy, Mainpean Dialer, and
    >>> >> AdultLinks QABar. I scanned my system with Norton Anti-Virus
    >>> >> 2006, Spybot 1.3, and Ad-Aware SE Personal, and none of them
    >>> >> found any of these (or anything else worth worrying about). The
    >>> >> Symantec web site lists files and registry keys for these
    >>> >> threats, none of which were present on my PC.
    >>> >>
    >>> >> SpyEraser also listed threats called NX Client, Viewpoint Media
    >>> >> Toolbar, TinTel dialer, and VX2. Symantec doesn't list any of
    >>> >> these as threats.
    >>> >>
    >>> >> So - what's going on here?
    >>> >>
    >>> >> P.S.: It wasn't so easy to uninstall SpyEraser, either. And when
    >>> >> I got the uninstall to run without errors, it left the program
    >>> >> files on the hard drive anyway.
    >>> >
    >>> >I am going to reserve official comment here - I would be interested
    >>> >in seeing the LOG of EXACTLY what was detected. Can you post that
    >>> >here?
    >>> >
    >>> >Nick Skrepetos
    >>> >SUPERAntiSpyware.com
    >>> >http://www.superantispyware.com
    >>>
    >>> Sounds sensible, Nick.
    >>>
    >>> The log (omitting tracking cookies) is below, with my comments in
    >>> brackets. Hope this is helpful.
    >>>
    >>> - Walt
    >>>
    >>> ==================
    >>>
    >>> Start Dateecember 26, 2006 at 09:28:03 PM
    >>>
    >>> End Dateecember 26, 2006 at 09:32:55 PM
    >>>
    >>> Total Time:4 Mins 52 Secs
    >>>
    >>> Detected Threats
    >>>
    >>> NX Client
    >>> Details: NoMachine is useful for remote access and terminal services
    >>> and is installed in companies such as HP, Google, IBM, Siemens,
    >>> Motorola, SAP, Philips Semiconductors, Nokia, Verisign, VMWare,
    >>> Novell, Symbio Technologies, Trolltech, Toshiba Electronics Europe,
    >>> AXA Technology Services etc.
    >>> Status:No Action taken
    >>> Remote Control Software-Remote Control Software
    >>>
    >>> Infected registry keys/values detected
    >>> hkey_local_machine\software\cygnus solutions\cygwin\program
    >>> options\\
    >>> hkey_local_machine\software\cygnus solutions\cygwin\mounts
    >>> v2\\
    >>> hkey_local_machine\software\cygnus solutions\\
    >>>
    >>> [ WALT: These keys are there, but the only values in them are the
    >>> pathnames for my Cygwin directories, and one flag bit.]
    >>>
    >>> Tintel
    >>> Details: Tintel is a program which makes long-distance phone calls
    >>> or calls to 900 and 976 phone numbers without user's knowledge. To
    >>> connect, the computer must be connected to a phone line via a
    >>> standard modem or ADSL. Cable or satellite users and users on
    >>> network or behind a firewall are generally not affected. Tintel
    >>> allows subscription-based websites to charge subscribers by billing
    >>> the user's phone line.
    >>> Status:No Action taken
    >>> Dialer-Dialer
    >>>
    >>> Infected registry keys/values detected
    >>> hkey_classes_root\.tcw\\
    >>>
    >>> [WALT: This registry key assigns the extension .tcw to Turbo Cad Win
    >>> 2.]
    >>>
    >>> ScreenSpy
    >>> Details: ScreenSpy is a type of RAT spyware. Remote Administration
    >>> Tool provides a complete control over the machine and it could be
    >>> used for malicious purposes. It also tries to manipulate machine
    >>> through a remote location on the internet. There are two types of
    >>> components: one is on target machine and answer all the remote
    >>> commands and second application that is used by the attacker to
    >>> track the server applications.
    >>> Status:No Action taken
    >>> Key Logger-Key Logger
    >>>
    >>> Infected registry keys/values detected
    >>>
    >>> hkey_current_user\software\classes\clsid\{1efb6596-857c-11d1-b16a-00c
    >>> 0f0283628}\ inprocserver32\\
    >>>
    >>> VX2
    >>> Details: VX2 is a Browser Helper Object for InternetExplorer. It
    >>> monitors web pages requested and data entered into forms and sends
    >>> this information to its home server. It then displays pop-up
    >>> advertisement windows based on the information. It can update itself
    >>> and install other software. There are two variants of this parasite
    >>> with different file and internal names, but both work identically.
    >>> It also shares IE's memory context and has the capability to perform
    >>> any action on the available windows and modules.
    >>> Status:No Action taken
    >>> Browser Helper-Browser Helper
    >>>
    >>> Infected registry keys/values detected
    >>> hkey_local_machine\software\vendor
    >>>
    >>> [WALT: The value of the key "vendor" is "Dell", the manufacturer of
    >>> my PC.]
    >>>
    >>> MainPean Dialer
    >>> Details: MainPean Dialer is a program which makes long-distance
    >>> phone calls or calls to 900 and 976 phone numbers without user's
    >>> knowledge. To connect, the computer must be connected to a phone
    >>> line via a standard modem or ADSL. Cable or satellite users and
    >>> users on network or behind a firewall are not affected.
    >>> Status:No Action taken
    >>> Dialer-Dialer
    >>>
    >>> Infected registry keys/values detected
    >>> hkey_current_user\software\freeware\\
    >>>
    >>> [WALT: This key contains a subtree of keys for the freeware program
    >>> VirtualDub.]
    >>>
    >>> NJStar
    >>> Details: NJStar Asian Explorer is a FREE web browser created for
    >>> reading Chinese, Japanese and Korean (CJK) web pages with
    >>> intelligent NJStar CJK auto-detection technologies just like
    >>> Microsoft Internet Explorer or Netscape. It gives a tension free CJK
    >>> web surfing experience. Its use is in conjunction with the
    >>> best-selling NJStar Communicator and it allow us to view, input and
    >>> save CJK web pages with unprecedented control and ease.
    >>> Status:No Action taken
    >>> Adware-Adware
    >>>
    >>> Infected registry keys/values detected
    >>> hkey_current_user\software\njstar\\
    >>>
    >>> [WALT: This browser helper is cited as Adware around the web. I
    >>> installed the software for its Chinese keyboard input.]
    >>>
    >>> AdultLinks.QBar
    >>> Details: AdultLinks QaBar combines links to porn and other sites to
    >>> the Internet Explorer Favorite menu.It is also known as adware that
    >>> shows what third-party is advertising on his computer. Ads could of
    >>> various forms like, pop-ups, pop-unders, banners, or links embedded
    >>> within web pages or parts of the Windows interface. Adware also
    >>> helps in keeping track of browsing habits so that a record could be
    >>> kept with the user.
    >>> Status:No Action taken
    >>> Browser Plugin-Browser Plugin
    >>>
    >>> Infected files detected
    >>> c:\windows\downloaded program files\conflict.1\lssupctl.dll
    >>> c:\windows\downloaded program files\conflict.1\lssupctl.inf
    >>> c:\windows\downloaded program files\conflict.1\sdclicense.txt
    >>> c:\windows\downloaded program files\conflict.1\symadata.dll
    >>> c:\windows\downloaded program files\conflict.1\tgctlsi.dll
    >>> c:\windows\downloaded program files\conflict.1\tgctlsi.inf
    >>> c:\windows\downloaded program files\conflict.1\tgctlsr.dll
    >>> c:\windows\downloaded program files\conflict.1\tgctlsr.inf
    >>> Infected directories detected
    >>> c:\windows\downloaded program files\conflict.1
    >>>
    >>> [WALT: tgctlst.inf starts off:
    >>> ;SprtName=SupportSoft ScriptRunner Control
    >>> ;SprtXpiName=SupportSoft ScriptRunner
    >>> ;SprtJarName=SupportSoft/ScriptRunner
    >>> ;SprtEmbedType=application/x-SupportSoft-ScriptRunner-Plugin
    >>>
    >>> I see an LsSupCtl.dll but no matching inf file. sdclicense.txt is a
    >>> license from support.com.]

    >>
    >>Walt - much as I suspected - a whole bunch of what appear to be false
    >>positives. That's quite a few on single non-infected system. SpyEraser
    >>was detecting SUPERAntiSpyware as a "rogue" product - they corrected
    >>that as soon as I found out about the detection.
    >>
    >>Nick Skrepetos
    >>SUPERAntiSpyware.com
    >>http://www.superantispyware.com

    >
    > Thanks, Nick.
    >
    > I am no expert on anti spyware - perhaps an intelligent though not
    > knowledgeable consumer. And it's hard to impute motivation rather
    > than a lack of diligence, especially when the cost of a false negative
    > is much higher than a false positive.
    >
    > Nevertheless, I think an average computer user would have seen the
    > results SpyEraser gave, and rushed in a panic to buy the full version
    > that does cleanup. This would be lucrative for the manufacturer.
    >
    > And I wonder if any of my programs would have stopped working had I
    > purchased the full version of SpyEraser and asked it to remove all the
    > "spyware" from my system.
    >
    > - Walt
    >


    virtualdub wouldn't really appreciate the registry keys deleted..


    --
    Dustin Cook
    Author of BugHunter - MalWare Removal Tool -V2.0
    web: http://bughunter.it-mate.co.uk
    email: bughunter.dustin@gmail.com.removethis
    Last updated: January 4th, 2007

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •