Hello today I thought I would d/l Malwarebytes and scan my system just to see if it detected anything that Comodo may have missed.
Anyway the result scan said I had a Rogue.DriveCleaner
Hi hailong.■■■■…I think I have submitted the file to you…I exported the file from regedit to my docs and then submitted it to you and virus total…virus total came up clean so maybe a fp from malwarebytes??.
Please let me know if you have recieved the file and the results .
Thanks
Nick
the registry entry and the corresponding reg file is unlikely to be malicious in itself.
It appear that MBAM detected a registry remnant/leftover of DriveCleaner though it didn’t report any executable which could be submitted for analysis (maybe the files aren’t there anymore)
According to some HjackThis and SAS logs posted elsewhere on Internet the 2d2bee6e-3c9a-4d58-b9ec-458edb28d0f6 GUID correspond to a component installed in Internet Explorer “Downloaded Program Files” special folder.
Malware.DriveCleaner
HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{2D2BEE6E-3C9A-4D58-B9EC-458EDB28D0F6}
HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{2D2BEE6E-3C9A-4D58-B9EC-458EDB28D0F6}#SystemComponent
HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{2D2BEE6E-3C9A-4D58-B9EC-458EDB28D0F6}#Installer
HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{2D2BEE6E-3C9A-4D58-B9EC-458EDB28D0F6}\Contains
HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{2D2BEE6E-3C9A-4D58-B9EC-458EDB28D0F6}\Contains\Files
HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{2D2BEE6E-3C9A-4D58-B9EC-458EDB28D0F6}\Contains\Files#C:\WINDOWS\Downloaded Program Files\UDC6_0001_D19M1908NetInstaller.exe
HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{2D2BEE6E-3C9A-4D58-B9EC-458EDB28D0F6}\DownloadInformation
HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{2D2BEE6E-3C9A-4D58-B9EC-458EDB28D0F6}\DownloadInformation#CODEBASE
HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{2D2BEE6E-3C9A-4D58-B9EC-458EDB28D0F6}\DownloadInformation#INF
HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{2D2BEE6E-3C9A-4D58-B9EC-458EDB28D0F6}\InstalledVersion
HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{2D2BEE6E-3C9A-4D58-B9EC-458EDB28D0F6}\InstalledVersion#LastModified
Opening “Downloaded Program Files” folder it is possible to look at the properties of the components installed (it will list also legitimate components) and to remove them but not to copy them.
In order to copy the content of that folder it should be needed to use the cmd prompt and several commands.
cd \
cd %windir%\Downloaded Program Files
md C:\foldercopy
xcopy /s . C:\foldercopy
dir /s > C:\foldercopy\list.txt
these command should create a foldercopy folder on C (C:\foldercopy) containing all files and a list (list.txt)
[url=http://msdn.microsoft.com/en-us/library/dd433050(VS.85).aspx]HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats[/url] apparently contain only statistics info and in IE8 is used to restrict ActiveX on a per site basis (AllowedDomains).
Though HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats{2d2bee6e-3c9a-4d58-b9ec-458edb28d0f6} could be indication of DriveCleaner it is not as much relevant if the corresponding component has been already removed.
It looks MBAM did not detect the component so it is likely that DriveCleaner files have been removed but in order to confirm this manually require some additional steps.
Ok Thanks Endymion…what do you suggest I do to confirm for sure?..I must point out that I am not experienced when it comes to removing nasties as I do try to keep a tight ship (thx to Comodo) so usually nasties don’t get a chance to infect my system.
Your advice would be appreciated
Thanks
Nick
p.s. I have a folder copy of d/l prog files if that is still relevant?
If you copied the download folder you can submit those files to virustotal.
You can also access Downloaded Program Files normally and check the packages properties to see if there is one with the {2d2bee6e-3c9a-4d58-b9ec-458edb28d0f6} guid
eg: the above image show the properties of the flash player component, including its guid.
You can also manually create a restore point ad then use regedit.exe to confirm if HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units{2D2BEE6E-3C9A-4D58-B9EC-458EDB28D0F6} is still there.
HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units{2D2BEE6E-3C9A-4D58-B9EC-458EDB28D0F6}\Contains\Files should point to the actual file location of DriveCleaner component