Curious malware issue - need help

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by jbr613, Jul 3, 2009.

  1. jbr613

    jbr613 Private E-2

    I haven't noticed any problems with my system, but recently, when downloading some software (from www.gammadyne.com, a reliable site), I got the following message from the proprietor of the site:
    "I can see from our logs that when you used an activation for our software yesterday, malware on your computer repeated the HTTP request that is used to perform the activation... I'm afraid I do not know what the malware is. It seems to record HTTP requests, and then another IP address (150.70.84.26) repeats the request... Although our system automatically blocked the bogus request, I strongly recommend sweeping your computer for malware."​

    I run a pretty tight system, with AV, firewall, Ad-Aware and Pest Patrol. Since receiving this message, I've added SAS.

    I followed the MG Malware removal process and am attaching the appropriate logs. Any help would be greatly appreciated.

    Jon R.
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    Your logs are mostly clean other than a bunch of DLL files ComboFix removed. The oreans32.sys driver removed by SUPERAntiSpyware and ComboFix may be part of a protection scheme or file packer used by some game that you play. These will have to be restored from quarantine if you find that one of your games does not work anymore. Many programs falsely detect this driver and registry key as a problem. Yes it could be used by malware, but in some cases, it is from valid games that a person has installed and I assume this is true for you.

    As far as the message is concerned, I would say it is possibly due to the Proxy Service in your TrendMicro AV since the 150.70.84.26 IP Address belongs to TrendMicro in Japan.

    Note: You should not be using Ad-Aware's Ad-Watch, Pest Patrol and Spybot's Teatimer. You should remove all but one of these. If I had to choose, I would suggest uninstalling Ad-Aware (all versions even the old version you have installed) completely and then just disable Teatimer and keep Pest Patrol.
     
  3. jbr613

    jbr613 Private E-2

    Thanks for the insight. How can you tell that the IP belongs to Trend Micro? That would certainly set my mind at ease. But neither a NetSol nor an APNIC whois showed that to me.

    Jon
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.

    Put in in here: http://cqcounter.com/whois/
     
  5. jbr613

    jbr613 Private E-2

    Thanks chaslang. Let's consider this issue closed!

    Jon
     
  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You're welcome.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we used Pocket Killbox during your cleanup, do the below
      • Run Pocket Killbox and select File, Cleanup, Delete All Backups
    3. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /u
        • Notes: The space between the combofix" and the /u, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    6. Go to add/remove programs and uninstall HijackThis.
    7. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    8. If you are running Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures in step 3 the READ ME for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    9. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds