Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Avira detecting virus in Clamwin portable


  • Please log in to reply
1 reply to this topic

#1 joe blow

joe blow

  • Members
  • 78 posts
  • OFFLINE
  •  
  • Local time:11:45 AM

Posted 19 August 2009 - 07:28 PM

Hi.

Avira antivir detects the following,

[DETECTION] Contains recognition pattern of the HTML/Crypted.Gen HTML script virus

in the following file of Clamwin portable,

C:\aaa\ClamWinPortable\Data\db\daily.cld

I downloaded Clamwin from a link on the Clamwin web site and I am sure it is clean. Malwarebytes does not detect any problems, neither does Clamwin, no supprise.
Avira does not have a problem with the Clamwin .exe and even when I right click on the suspicious file and scan with Avira it comes back clean. It only finds a problem
when I do a full scan.

The file is a bit too big for me to upload to Virustotal, my connection is too slow. Do you think that this is just a false positive? I am worried that if I let Avira do anything
with the file it will stop Clamwin from working.

Here is the full log from Avira.

Avira AntiVir Personal
Report file date: Wednesday, August 19, 2009 20:58

Scanning for 1647178 virus strains and unwanted programs.

Licensee : Avira AntiVir Personal - FREE Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows XP
Windows version : (Service Pack 3) [5.1.2600]
Boot mode : Save mode
Username : Owner
Computer name : LA-FRXTA9G0LG3A

Version information:
BUILD.DAT : 9.0.0.407 17961 Bytes 7/29/2009 10:34:00
AVSCAN.EXE : 9.0.3.7 466689 Bytes 8/7/2009 07:10:24
AVSCAN.DLL : 9.0.3.0 40705 Bytes 2/27/2009 01:58:24
LUKE.DLL : 9.0.3.2 209665 Bytes 2/20/2009 02:35:49
LUKERES.DLL : 9.0.2.0 12033 Bytes 2/27/2009 01:58:52
ANTIVIR0.VDF : 7.1.0.0 15603712 Bytes 10/27/2008 03:30:36
ANTIVIR1.VDF : 7.1.4.132 5707264 Bytes 6/24/2009 08:44:44
ANTIVIR2.VDF : 7.1.5.88 2668032 Bytes 8/10/2009 10:50:01
ANTIVIR3.VDF : 7.1.5.132 398848 Bytes 8/18/2009 05:54:11
Engineversion : 8.2.1.3
AEVDF.DLL : 8.1.1.1 106868 Bytes 4/30/2009 02:52:04
AESCRIPT.DLL : 8.1.2.25 459130 Bytes 8/13/2009 09:37:22
AESCN.DLL : 8.1.2.4 127348 Bytes 7/23/2009 08:56:23
AERDL.DLL : 8.1.2.4 430452 Bytes 7/23/2009 08:56:10
AEPACK.DLL : 8.1.3.18 401783 Bytes 5/27/2009 07:07:20
AEOFFICE.DLL : 8.1.0.38 196987 Bytes 7/23/2009 08:55:25
AEHEUR.DLL : 8.1.0.155 1921400 Bytes 8/19/2009 05:58:41
AEHELP.DLL : 8.1.6.0 233846 Bytes 8/19/2009 05:55:11
AEGEN.DLL : 8.1.1.57 356725 Bytes 8/19/2009 05:54:49
AEEMU.DLL : 8.1.0.9 393588 Bytes 10/9/2008 05:32:40
AECORE.DLL : 8.1.7.6 184694 Bytes 7/23/2009 08:51:24
AEBB.DLL : 8.1.0.3 53618 Bytes 10/9/2008 05:32:40
AVWINLL.DLL : 9.0.0.3 18177 Bytes 12/11/2008 23:47:59
AVPREF.DLL : 9.0.0.1 43777 Bytes 12/5/2008 01:32:15
AVREP.DLL : 8.0.0.3 155905 Bytes 1/20/2009 05:34:28
AVREG.DLL : 9.0.0.0 36609 Bytes 12/5/2008 01:32:09
AVARKT.DLL : 9.0.0.3 292609 Bytes 3/24/2009 06:05:41
AVEVTLOG.DLL : 9.0.0.7 167169 Bytes 1/30/2009 01:37:08
SQLITE3.DLL : 3.6.1.0 326401 Bytes 1/28/2009 06:03:49
SMTPLIB.DLL : 9.2.0.25 28417 Bytes 2/1/2009 23:21:33
NETNT.DLL : 9.0.0.0 11521 Bytes 12/5/2008 01:32:10
RCIMAGE.DLL : 9.0.0.25 2438913 Bytes 5/15/2009 06:39:58
RCTEXT.DLL : 9.0.37.0 86785 Bytes 4/17/2009 01:19:48

Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: c:\program files\avira\antivir desktop\sysscan.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:,
Process scan........................: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium

Start of the scan: Wednesday, August 19, 2009 20:58

Starting search for hidden objects.
The driver could not be initialized.

The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
11 processes with 11 modules were scanned

Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!

Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!

Starting to scan executable files (registry).
The registry was scanned ( '50' files ).


Starting the file scan:

Begin scan in 'C:\'
C:\pagefile.sys
[WARNING] The file could not be opened!
[NOTE] This file is a Windows system file.
[NOTE] This file cannot be opened for scanning.
C:\aaa\ClamWinPortable\Data\db\daily.cld
[DETECTION] Contains recognition pattern of the HTML/Crypted.Gen HTML script virus

Beginning disinfection:
C:\aaa\ClamWinPortable\Data\db\daily.cld
[DETECTION] Contains recognition pattern of the HTML/Crypted.Gen HTML script virus
[WARNING] The file was ignored!


End of the scan: Wednesday, August 19, 2009 21:26
Used time: 20:35 Minute(s)

The scan has been done completely.

1481 Scanned directories
59939 Files were scanned
1 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
0 Files were moved to quarantine
0 Files were renamed
1 Files cannot be scanned
59937 Files not concerned
601 Archives were scanned
2 Warnings
1 Notes

Thanks for any help.

BC AdBot (Login to Remove)

 


#2 Guest_superbird_*

Guest_superbird_*

  • Guests
  • OFFLINE
  •  

Posted 26 August 2009 - 03:15 PM

Hi,

I am sorry for the delay in posting to you. We have a large community, with hundreds of topics being created every day.

Do you still need help with your problem?

- If not, please tell me also.

- If so, please tell me what problems you have exactly at the moment. Also, do this:

Please download Malwarebytes Anti-Malware and save it to your desktop.
alternate download link 1
alternate download link 2

MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users