Ace Spy problem

Discussion in 'Malware Help (A Specialist Will Reply)' started by geek_love, May 7, 2008.

  1. geek_love

    geek_love Private E-2

    I ran a CA Yahoo! Anti-Spy scan two days ago and it detected Ace Spy 3.8 on my computer (Acer Aspire 9410Z laptop running Vista Home Premium). Before removing it, I ran full scans using SpyBot S&D, Windows Defender, AVG Anti-Spyware, and Avast! Antivirus - none of which detected the Ace Spy. I used CA to remove the Ace Spy, and now CA scans do not detect it, so I seem to be clean. I subsequently downloaded and ran SuperAntispyware, which found nothing. But I'm now wondering:

    1. It's my understanding that somone must have physical access to a computer to load Ace Spy. Is this true? No one but me has physical access to my computer. Could it have snuck onto my computer when I downloaded something online?

    2. CA indicated that Ace Spy was located in three registry keys, which are still there. Does the fact that they're still there indicate that the malware is still on my computer, or could those keys have been "cleaned" of the malware?

    3. Is it significant that the other scans I ran before removing the Ace Spy didn't find it?

    Also:

    4. My System Restore has stopped working. I can make it work by running it in Safe Mode - and, yes, I know it works better in Safe Mode, anyway - but I've never had a problem running it normally. I've searched online and found many people whose Restore has stopped working, but no solutions other than "run it in Safe Mode." Why would it stop working, is there a fix, and could this problem be connected to the malware problem?

    Thank you to anyone with the time and patience to respond to these concerns!
     
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Do you have a log that shows exactly what was found and removed. A false positive is not out of the question.

    Yes this is a commercial program that would have to be installed; however if your PC had a security issue that allowed external access into it, it could have been installed remotely but this is unlikely since hackers don't normal buy programs to hack computers.

    Again attaching a log that shows exactly what it is finding would be more helpful.

    There are many reasons for System Restore to stop working. Most of them are not malware related especially if you can run it in safe boot mode. This is more of a topic for the Software Forum.


    We can check your PC for malware issues! If you want to do this, please follow the instructions in the below link and attach the requested logs when you finish these instructions.

    READ & RUN ME FIRST. Malware Removal Guide
     
  3. geek_love

    geek_love Private E-2

    Hello and thank you for responding. I'm not sure this will be helpful, but I thought I'd do this before going through the READ & RUN ME FIRST process. I don't have a log of the scan, but I did note the registry keys for future reference. The CA scan simply listed the malware as "Ace Spy 3.8" and noted that it appeared in the following registry keys:

    hkey_classses_root\interface\{4d6cc9b0-df77-11cf-8e74-00a0c90f26f8}\typelib
    hkey_classses_root\interface\{27395f87-0c0c-101b-a3c9-08002b2f49fb}\typelib
    hkey_classses_root\clsid\{27395f85-0c0c-101b-a3c9-08002b2f49fb}\inprocserver32

    As I stated before, the keys themselves remain in my registry.

    Your statement that a false positive is possible is intriguing, surprising, and frankly somewhat comforting, given that the alternative involves someone breaking into my apartment solely for the purpose of putting a keylogger on my computer - something that would be, to say the least, odd. I'm boring. I don't even have a crazy ex-girlfriend. Is there a short answer as to why the scan would falsely recognize a specific piece of malware?

    In any case, if you think it best for me to do the full check, I'm happy to. I just want to be sure my computer's completely clean.

    Again, thank you.
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Those registry keys may be part of AceSpy. Thus it may not be a false positive. However the last those keys also show to be related to what the below link from McAfee gives from fm-systems.com. Which means it could still be a false positive

    http://www.siteadvisor.com/sites/fm-systems.com/downloads/1335684/

    Right now I'm still betting false positive. However just in case.....read on.

    Are you absolutely sure no one else uses this PC? Has anyone else had access to it in the past? If it is really installed and has been put in stealth mode, it may not show all files. Have you looked in Add/Remove programs for it? You may want to read the below just as an FYI:

    http://www.acespy.net/faq.html

    As stated above those registry keys do seem to be related to AceSpy. Whether it is really installed or not remains to be seen. Yes I think it would be a good idea to run the complete READ & RUN ME so we can collect more info. However as noted above, a good commercial keylogger that is put in stealth mode will hide from view.
     
  5. geek_love

    geek_love Private E-2

    Okay, I'll get to work on the READ & RUN ME. In the meantime:

    Yes, I'm sure no one else has ever had access to my computer.

    AceSpy is not listed in my Add/Remove programs, nor does a search of my computer locate it.

    I do frequent scans with the CA Anti-spy, just because it only takes a few seconds. I had done a couple on Monday afternoon and the only things that showed up were tracking cookies. Then Monday night I did another scan and the AceSpy appeared. During that interim I was alone with my computer. (I'd downloaded a movie online in that interim from a McAfee Site Advisor green site. That was how I thought at first that it had made its way onto my computer.) Could the AceSpy have been on my computer for some indefinite time before that, but, for some reason, wasn't detected by any scans?

    Also, you wrote: I think it would be a good idea to run the complete READ & RUN ME so we can collect more info. However as noted above, a good commercial keylogger that is put in stealth mode will hide from view.

    Does that mean that if it's on my computer, it still might not show up on the READ & RUN ME? If that's the case, then, in the end, how would I be sure it's gone?
     
  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I still think it is a false positive. As I showed you in the link in my last message, the registry keys belong to other software. An update/change to CA may be why all of a sudden it is showing up.

    Possibly it would not show. However some of the scanners could also show the same FALSE information that CA is showing. After looking at your logs would know more but I still pretty sure at this point you are getting incorrect info from CA.
     
  7. geek_love

    geek_love Private E-2

    Here are three of the scan logs.
     

    Attached Files:

  8. geek_love

    geek_love Private E-2

    Here's the ComboFix log. (And the CF quarantine log, as well - don't know if you need it.) One note: after ComboFix rebooted my machine, the blue window - saying that the window would close in a few seconds and a log would pop up - stayed up for about twenty minutes. I checked to see if there was a log in my C drive - there was - so I closed the window manually. Please let me know if I need to run the scan again.

    (And per your note about a CA change - I did update the scanner recently, perhaps during that same time period.)

    Thank you for this help.
     

    Attached Files:

  9. geek_love

    geek_love Private E-2

    Hi, Chas. I know I'm bumping myself, but I can't get back to this until tomorrow, anyway. Thought I'd let you know that my CA scan is, as of this afternoon, turning up:

    1. Bifrost: hkey_current_user\software\wget
    2. KaZaA: hkey_current_user\software\kazaa

    And while we're at it, if you look at this and the scan logs and still feel that my CA scan has just started turning up false positives now for some reason, do you have a fix for it? Would there be any point in my continuing to use it? If not, which anti-spyware programs should I depend on? (Along with Windows Defender, I currently have the free versions of AVG, Spybot S & D, Threatfire, and avast! Antivirus.)
     
  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Did you fix these? These are not major issues and should easily be removed.

    Your logs are clean. You have a case of false positives as far as I can tell with the key logger.

    I stongly recommend that you not use Sandboxie and Threatfire. Personally I would not use either but if you like the way the work and are use to dealing with complexities they can add then its up to you. But using both could lead to problems.

    Also if you are going to keep CA Antispyware, you should disable the built-in Windows Defender that comes with Vista.

    There is no such thing as a fix for false positives. They happen and you have to learn to live with them since most programs have them. Some more than others. The closest you can come to fixing them is to report them to the software company and hope that they eventually fix them.

    You should uninstall SUPERAntiSpyware now since we don't need it anymore and you already have AVG Antispyware as an additional scanner.
     
  11. geek_love

    geek_love Private E-2

    First, thank you for going over the logs and for your advice on this matter. It's good to know that my system hasn't been compromised.

    Second, I'll remove the SUPERAntiSpyware, but should I remove the Malwarebytes, ComboFix, and MGTools, as well?

    Third, I noticed in the hijackthis log - which I'm admittedly really inexperienced with - the entry "013 - Gopher Prefix:" This is okay?

    Finally, I have a few questions regarding your last comments. I'll ask them here, but if you think it better I'll post them to the software forum.

    Why should I not use Sandboxie and Threatfire? Did you mean both together, or either one? I'm unaware of their added "complexities." What are the problems they can cause? I'm certainly open to getting rid of them if it's better to do so - I just thought they were good extra protection.

    The CA scan has up until recently been simply a very quick way to remove tracking cookies. But since it found the Bifrost and KaZaA - which were found by none of the other scanning I did for the READ & RUN - I'm thinking I should keep it. (Unless those were false positives as well!)

    I looked into disabling Windows Defender, which doesn't seem to be of much use, anyway, but when I go into its Tools, then its Options, I'm not presented with the option for disabling it - I seem to be missing something there. I haven't encountered any problems before, but is it an issue that I have real-time protection from Defender, Threatfire, and avast! Antivirus all at the same time?

    Again, thank you!
     
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You can keep Malwarebytes since it is a great backup scanner and does not use any system resources until you run it. The rest will be covered in my final instructions further down.

    Normal!

    I was saying both together since I was worried about the the sandbox effect from Sandboxie and how Threatfire would view this. If you don't notice any conflicts or issues with it then perhaps it is fine.

    Some people have problems understanding when they are in the sandbox or not in the sandbox and often wonder what happened to things they thought they saved or set up. They are gone when the sandbox is closed (like after the next reboot). Again if you are not having problems working within the bounds of the sandbox and it has not cause any confusion for you then it is fine.

    Also if you do not feel you are suffering any performance degradation from having Sanboxie and Threatfire running, then perhaps they are fine for you.

    Cookie are not problems that you need to worry about as you will read in my final steps. And even so, you don't need a complex scanner like CA to remove them. All browsers have built-in abilities to remove cookies and tools like CCleaner are even better since they will allow you to selectively choose which cookies to keep when you cleanup. That way you don't loose passwords and automatic login capabilites.

    They were just minor inactive registry keys that may have been around for a long time.

    It is an issue to have Windows Defender and anothe realtime antispyware tool like CA working against each other similar to what happens when multiple antivirus tools are installed. It leads to conflicts, difficulties to properly detect and remove malware, wastes system resources and can make manual removal steps like we do in forums more difficult.

    Disabling Windows Defender is not as straight forward as it used to be when it could be uninstalled. See this: Disabling & Enabling Windows Defender in Vista

    The above link shows you have to disable and also how to enable it again should you decide to use it again at a later time.


    If you are not having any other malware problems, it is time to do our final steps:
    1. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop & renamed it like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\cf" /u
        • Notes: The space between the cf" and the /u, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
      • Delete the C:\cf folder from combofix.
    2. If we used SmitFraudFix, you can delete all files and folders related to it now including the c:\rapport.txt log.
    3. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    4. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Go to add/remove programs and uninstall HijackThis.
    6. You can delete the C:\MGtools folder and the C:\MGtools.exe file. You can also delete the C:\MGlogs.zip
    7. If you are running Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning steps in the READ ME for your Window version and see the steps to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     
  13. geek_love

    geek_love Private E-2

    Done and done. Thank you very much for all the help!
     
  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome. Surf safely!
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds