Antimalware Software
-
A Former User last edited by
Thank you.
Day 1: feels quite neat.
Haven't customised any settings yet, apart from the quarantine period (a trifle) - due to some uncertainty about the issue in question and alike. I'll update you how it's going (won't forget asking questions). -
A Former User last edited by
I'll update you how it's going (won't forget asking questions).
No full reports today - I was just playing with that "Copy to clipboard" & Co. for the first time, etc.
However, I'll cite every item.Did a full scan last night.
Started early, late night yesterday - for MSE performed full scan for hours and hours and hours (sorry, my disk space is populated).
Surpisingly (as I only learned late in the morning), the AV spent only couple of hours and counted items scanned manifold less than MSE. However, it found 8 threats (some of them seem very likely to have sat there o'k in the MSE days) - of medium and high risk this time.They were of two types, ordered in 6 lines.
The first group was adware:
the names were 1) Adware.Agent, 2) Installerex/WebPick (fs), 3) Click run software (v) and 4) Iminent (fs)
-
just in case somebody knows something about this stuff.
They were assessed as of 2/5 risk level and quarantined.The second group was named Trojans.
There were three (or four?) items, their names seemed being the same - "Trojan.Win32.Generic!BT".
I'd like to extend on this now...
Yes, this first one was deleted, I'd obtained it myself from some video site perhaps in case I needed it, never started though: its path (containing file name) wasC:\Documents and Settings[myaccount]\{My Docs}\...)\iLividSetupV1.exe
.
The second (or third?) one's path wasC:\WINDOWS\$NtUninstallKB2808735$\win32k.sys
, and I'd like to hear your word about it.
The last (or something) one's path was to my other logical disk where I'd stored some archives:D:\Software\SoftonicDownloader7179.exe
. The strange thing is that I remember obtaining and using it myself to download and install my first Opera browser** And I can't remember any trouble following or deriving from that/since that... The thing, if I remember it all right, sat there for years (quite literally), etc...
No idea.
Anybody?Yes, these second group items (seem all) were of a high risk level, however by default, the lines had "quarantine" suggestions, IIRC.
Strange thing - maybe a glitch: IIRC, I changed ALL the flags to "Delete", but deleted did definitely appear only one, first item in that group - the others got quarantined...
Well, I'll see about this supposed glitch further, if I have an occasion.That's all for now.
Thanks for your reading this*:)* -
blackbird71 last edited by
The win32k.sys file is almost certainly a legitimate file, since it was part of the KB2808735 Windows security update issued in April 2013 (KB2808735). Your AV found it in the normal KB uninstaller folder for that update, and most likely mis-identified it because it's a KB-removal restoration file and thus not located in the place the normal, in-use win32k.sys file version is found (c:\windows\system32\win32k.sys). The normal win32k.sys file is a critical Windows driver file, and is noted in the MS13-036 bulletin as having been modified in the KB2808735 update - so it's normal for a copy to appear in that update's uninstall folder. However, there is malware (ZeroAcess rootkit) that has been known to copy the file's name to obscure its payload, but that fake file is usually found in some web-accessible or user-account folder. My best guess is that your AV simply found the legitimate KB restoration file copy in a non-system32 folder and flagged it. In other words, it was a false positive. You probably should restore the file and mark it to be skipped by future scans in case you ever need to remove the KB update for some reason.
Softonic down-loader files have a bad reputation for bundling 3rd-party, sometimes-nasty crapware along with the desired download. My guess is that your AV flags such down-loaders almost automatically by name because of the crap they occasionally carry along with them. I'd personally dump anything Softonic-related simply on general principles .
I'd be careful about simply letting the AV immediately delete any files, but especially system-name files (like win32k.sys); in fact, some AVs will only ever quarantine system-name files because of the serious consequences of mis-identifying and destroying a legitimate and critical Windows file. In the case of win32K, for example, that would be true since removing the active version of the file in the system32 folder would probably lead quickly to a blue-screen failure. The best practice is always to set the AV to simply quarantine problematic files wherever possible, so that you can restore them if the system breaks somehow after their removal. Only after manually analyzing a quarantined file name and where it was found will I go on to delete it from the quarantine folder. Your search engine is your friend for this. If in doubt, leave it quarantined rather than deleting it. Some system or apps breakages may only show up after several hours or more of usage.
-
A Former User last edited by
The last (or something) one's path was to my other logical disk where I'd stored some archives: D:\Software\SoftonicDownloader7179.exe. The strange thing is that I remember obtaining and using it myself to download and install my first Opera browser And I can't remember any trouble following or deriving from that/since that... The thing, if I remember it all right, sat there for years (quite literally), etc...
No idea.
Anybody?I knew I had that 'SoftonicDownloader' somewhere on my USB drives too, back-ups.
It seems I've got a guess about the situation with it.
It might be that it's a sorta container for "something else" - namely Opera setup, which is deemed "irrelevant" by the AV - thus tricky/roguish, right?
Hence it might be the file is no threat - especially that it sat for years while the AV came the other day.Now a question.
The AV suggested to quarantine that file on that USB too - and I accepted: I got curious - HOW ON EARTH can a piece of software handle isolation of a file which is obviously not on the system most of the time?
Now to your recent comment, Blackbird.
You probably should restore the file and mark it to be skipped by future scans in case you ever need to remove the KB update for some reason.
How do I do that exactly?
List the file's path in exceptions?The best practice is always to set the AV to simply quarantine problematic files wherever possible, so that you can restore them if the system breaks somehow after their removal.
That's right. I'll adjust the settings...
Only after manually analyzing a quarantined file name and where it was found will I go on to delete it from the quarantine folder. Your search engine is your friend for this. If in doubt, leave it quarantined rather than deleting it. Some system or apps breakages may only show up after several hours or more of usage.
So far so good.
But how do I do that analysing? Where do I start? What should I look for?
-
A Former User last edited by
I have a guess...
Maybe that MSE knew what it was doing? Maybe it knew it was a good file - while the new, "third party" AV does not?
-
blackbird71 last edited by
Different AVs will work in different ways. Some use "heuristics" which are behavioral analysis of how a file works; others use signature analysis of a file's bit patterns; and so on. Probably MSE didn't analyze things quite as intensively as your current AV does, or didn't look at things the same way. That's why the AV testing labs (like AV Comparatives) get different detection results and different false-positive results for different AV products.
In many cases, AVs will let you un-quarantine a detected file, in which case you would restore it to its original place using the AV. If not, I'm not sure how you proceed using that particular AV to get it out of quarantine.
As far as analysing a questionable file using a search engine, I usually search first for just the filename itself and see what's out there. If it has a legitimate use, then I try searching for the filename plus a word like "virus" or "malware" and see what comes up. Ideally, you want results from places like bleepingcomputer, sevenforums, wilders, malwarebytes, or something equally reputable.
-
A Former User last edited by
As far as analysing a questionable file using a search engine, I usually search first for just the filename itself and see what's out there. If it has a legitimate use, then I try searching for the filename plus a word like "virus" or "malware" and see what comes up. Ideally, you want results from places like bleepingcomputer, sevenforums, wilders, malwarebytes, or something equally reputable.
But if its filename is the same either way - how do you know if your PARTICULAR file is good or bad?
Or aren't they the same? Just similar?If in doubt, leave it quarantined rather than deleting it. Some system or apps breakages may only show up after several hours or more of usage.
How long a period should it take tops to await a possible failure?
-
A Former User last edited by
Some use "heuristics" which are behavioral analysis of how a file works; others use signature analysis of a file's bit patterns; and so on.
There is some "heuristics" there in - whatever it's called, no "signature" it seems...
Does it make this one more trustworthy than that one?
-
blackbird71 last edited by
I posted a reply earlier, but it's currently being held for moderation. ;_; Sometimes dodging around the spam filters in these forums is like running through a shooting gallery... most shots miss, but every once in a while you get nailed - for reasons you're never quite sure about.
-
blackbird71 last edited by
It's not just the filename that matters. After all, one can name any file with any name, but that doesn't mean it's actually that pretended file. What matters as much as the name is where it is located. If a system-name file is sitting off in some abnormal or unrelated folder, that's a warning signal. In this case, the normal location for the win32k.sys file is the \windows\system32 folder... or perhaps in the uninstall folder for a KB update that modified the normal file once upon a time. If it were located anywhere else, you could be looking at an imposter. I'm only guessing, but I believe that's kind of what your AV did... it found the win32k file in a place it didn't expect and isolated it, not realizing that it could legitimately also be in a KB uninstall folder.
As you might now realize, none of this is necessarily an exact science. It involves digging, logic, and a sense of what ought to be where. Searching the Internet can help supply information to aid the analysis process in cases like win32k.sys, but the user still needs to check multiple references and cross-compare what they say to assemble a clearer picture. One could always hope that an AV might be perfect in detecting all threats and never giving a false alarm or false positive. But there simply is no such animal. The more automatic and comprehensive the AV engine, the more likely of a false positive trashing a system - and there are numbers of such stories where exactly that happened. The more the user himself gets involved in the final determination of a questionable file, the better his chances of avoiding his system being trashed, but the more work and analysis ends up in his lap.
As far as how long to wait before emptying out the quarantine folder, there is no magic answer. In fact, if you have hard-drive space, there's no reason to empty it at all - the files trapped there are indeed trapped and neutralized from breaking out. My own tendency is to leave them there for several months or more. Frankly, my AV typically only traps a file every so many months anyhow. At some point in the near future, yours ought to do the same. However, YMMV.
Most modern AVs use a combination of signatures and heuristics, with a few also adding in some crowd-voting features for filename reputation. My own opinion is that relying on heuristics alone isn't the safest approach, but others might disagree. Admittedly, signature detection can be misled by encrypting or obfuscating elements of a malware file to alter its signature(s), but signature-detection still acts to weed out much of the universe of malware that doesn't apply such hiding techniques. Heuristics are behavioral analysis of a file... but behavior can be obfuscated too, if the code writer is smart enough. At the end of the day, I advocate using layered security: a good firewall (especially outgoing traffic), a decent AV (meaning one that scores reasonably high in a reputable independent AV testing lab report, available free online), occasional system security scans using alternative tools (like Malwarebytes, AdwCleaner, etc), keeping the system and its apps fully patched, and safe hex. The last element is perhaps the most critical, though typically the most under-rated. If one browses constantly in "harm's way", then the odds of running into something both nasty and hard-to-detect increase considerably. Safe hex also means scanning ANY downloaded file before ever running it on the system - even supposed graphics files.
-
A Former User last edited by
After all, one can name any file with any name, but that doesn't mean it's actually that pretended file. What matters as much as the name is where it is located. If a system-name file is sitting off in some abnormal or unrelated folder, that's a warning signal. In this case, the normal location for the win32k.sys file is the \windows\system32 folder... or perhaps in the uninstall folder for a KB update that modified the normal file once upon a time. If it were located anywhere else, you could be looking at an imposter.
- One shall see which folder it is (was?) in.
- One could try finding the same name file in the PROPER folder (should the name be the same?). If there IS one, that other, detected one is an impostor (right?).
Do I think in the right direction?
-
A Former User last edited by
...and safe hex.
What the heck is that?
Safe hex also means scanning ANY downloaded file before ever running it on the system - even supposed graphics files.
I do.
...a good firewall (especially outgoing traffic)...
Why outgoing?
-
A Former User last edited by
As far as how long to wait before emptying out the quarantine folder, there is no magic answer. In fact, if you have hard-drive space, there's no reason to empty it at all - the files trapped there are indeed trapped and neutralized from breaking out. My own tendency is to leave them there for several months or more. Frankly, my AV typically only traps a file every so many months anyhow. At some point in the near future, yours ought to do the same. However, YMMV.
Well, my limitations are that the trial ends not further than in a month - then it's definitely uncertain.
What's
YMMV
? -
blackbird71 last edited by
Yes, you're thinking in the right direction, although sometimes a system file may be in more than one legitimate place, depending on the nature of the file. If that's the case, usually the search-result websites that explain things will note the various places it might legitimately appear. However, as you've seen, in the case of files altered by Windows updates, pre-update versions of those files may appear in some of the update uninstall folders as well, and most of the time, the reference websites won't mention that. As I've noted, the unavoidable uncertainty in some of this is a key reason to quarantine rather than immediately delete.
Safe hex is a slang term that describes the habitual user practice of employing safe techniques in one's use of computers, especially when online or downloading. (Hex refers to the hexadecimal numerical representation usually used in computer files.) It means using caution and common sense when exposing a computer to outside data, being careful not to browse much, if at all, at questionable websites of the type known to be infested with malicious exploits (porn, warez, and so on). It means being extremely careful before opening downloaded files, being sure to first scan them with onboard AV and/or other tools, and perhaps even sending them up for evaluation by VirusTotal or something similar. It means not clicking on whatever pops up when accessing some website without a good understanding of what is going on. It also means USING layers of security protection on the system and local network (if any), not just having such protection installed but unused. The biggest problem with safe hex is consistently applying it... human nature it to continually make exceptions, such that the secure habits can easily become riddled with dangerous exception habits.
YMMV is an advertising disclaimer from automobile ads that make all sorts of fuel economy promises, but conclude by saying "your mileage may vary". It has come to mean that end results may be somewhat different for different people and situations, depending on variable factors unique to how they do things compared with others.
-
A Former User last edited by
- One shall see which folder it is (was?) in.
- One could try finding the same name file in the PROPER folder (should the name be the same?). If there IS one, that other, detected one is an impostor (right?).
Do I think in the right direction?
Yes, you're thinking in the right direction, although sometimes a system file may be in more than one legitimate place, depending on the nature of the file. If that's the case, usually the search-result websites that explain things will note the various places it might legitimately appear. However, as you've seen, in the case of files altered by Windows updates, pre-update versions of those files may appear in some of the update uninstall folders as well, and most of the time, the reference websites won't mention that. As I've noted, the unavoidable uncertainty in some of this is a key reason to quarantine rather than immediately delete.
So, to copy its - path or filename? And go search by it in order to find out what/which folder(s) it's o'k for it to appear. Etc.
Right? -
blackbird71 last edited by
Depending on how your AV works, the win32k.sys file should be directly restorable to its original location via a user quarantine control somewhere in the AV panel itself. The original AV message was that the file's original path was C:\WINDOWS$NtUninstallKB2808735$\win32k.sys, but it would have been moved by the AV to an AV-owned quarantine folder and converted to a special AV binary format to keep the malware disabled, even if directly copied out of the quarantine folder. This is an anti-malware practice of most AVs. For the file to be restored, the AV itself must be used to reverse the special quarantine format and put the file back where it came from. The whole purpose of "quarantine" is to isolate, but not delete, a potentially malicious file until further determination of its nature and its fate can be made.
As a note of caution, if there are any quarantined files you want to restore, be sure and do it before your trial version either expires or is uninstalled. It alone holds the keys to restoring its own quarantined files, since not all AVs use the same quarantine format.
FYI, the latest Tuesday Windows patches (9 June) contain another update for WinXP computers involving win32k.sys:
KB3057839 kernel-mode drivers. This may or may not cause a repeat of the AV quarantining of the previous win32k.sys file from whatever uninstallation backup the new KB creates. -
A Former User last edited by
What is this folder -
C:\WINDOWS\$NtUninstallKB2808735$
? Do the dollar characters mean something? Like it's hidden?
FYI, the latest Tuesday Windows patches contain another update for WinXP computers involving win32k.sys:
KB3057839 kernel-mode drivers. This may or may not cause a repeat of the AV quarantining of the win32k.sys file from whatever uninstallation backup the new KB creates.Yeah, I noticed that update.
And it is very useful: I guess if it finds that 'threat' again, I'll be likely to consider the case "false positive".
Do you think the update must've replaced that missing file and the already captured one could be left to demise or not?
And a question stays - how do you usually whitelist stuff? Shall I input the exact, whole path to whatever it is?
In the presumed case of not restoring the previous, quarantined file, I guess I could simplyallow
the new one - should/when it occurs in the next sweep? -
A Former User last edited by
As a note of caution, if there are any quarantined files you want to restore, be sure and do it before your trial version either expires or is uninstalled. It alone holds the keys to restoring its own quarantined files, since not all AVs use the same quarantine format.
Thanks, I'll bear it in mind**
-
blackbird71 last edited by
The "$NtUninstall..." file name prefix tells the system that it's a backup folder containing the original files changed by the associated Windows update. There are corresponding links in the registry to direct where each of those files actually came from, so that uninstalling the update puts the original files back in the right places. It's been a while since I've explored this, but the $NtUninstall folders might indeed be hidden folders. I keep all my systems set to always show all the hidden stuff, and I don't recall whether these were in that category.
The Windows update would have replaced the original win32k.sys file in the Windows system folder with an updated file version, and moved the original win32k file into the $NtUninstall file, plus creating registry links showing what it had done. Apparently your AV found the file there, pulled it out, and quarantined it into its own AV folder, probably because the AV didn't expect to find a win32k.sys file copy outside of the normal system folder. Since the now-quarantined copy was simply the old or earlier version of the win32k.sys file, it would only be of value if you needed to uninstall that particular update which replaced it in the first place. But if you install the just-posted 3057839 update, that update will replace whatever win32k.sys version is currently in the Windows system folder with a still-newer version of win32k.sys. So reverting all the way back to the file copy the AV pulled out of the $NtUninstall folder is unlikely to ever happen, hence it probably doesn't matter whether you un-quarantine it or not.
The details of how you whitelist a file depends on the AV you're using. But I think it's going to be very hard to whitelist for a future file that has yet to be moved by some future Windows update into an as-yet-not-named uninstall folder. There simply are too many important files that can be replaced by updates, and there are an infinite combination of update numbers that might be used to construct the uninstall folder name. Given that WinXP updates are "going away" due to the obsolesence of the OS, probably the entire issue of the AV quarantining Windows update uninstall file elements will also fade away, as long as you're still using XP.
-
A Former User last edited by
Apparently your AV found the file there, pulled it out, and quarantined it into its own AV folder, probably because the AV didn't expect to find a win32k.sys file copy outside of the normal system folder.
Isn't
C:\WINDOWS\
a normal system folder?But I think it's going to be very hard to whitelist for a future file that has yet to be moved by some future Windows update into an as-yet-not-named uninstall folder. There simply are too many important files that can be replaced by updates, and there are an infinite combination of update numbers that might be used to construct the uninstall folder name.
Perhaps I'll just allow the file this next time, and see what happens*:)*
Given that WinXP updates are "going away" due to the obsolesence of the OS, probably the entire issue of the AV quarantining Windows update uninstall file elements will also fade away, as long as you're still using XP.
Right. Plus the potential "obsolescence" of the AV itself...
Besides, I think I might consider moving away when (if?) IT fades away right?