Automated virus / spyware removal script: June 2010 (BROKEN)

Page 3 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

Schadenfroh

Elite Member
Mar 8, 2003
38,416
4
0
December 2007 Script
New:
  • scott's suggestion regarding Trend Micro
  • Panda's command line scanner (as of this post, Panda's scanner can detect / remove 2,677,122 viruses)
  • HTML readme instead of a .txt file, pictures, links and more detailed instructions included! (improvements suggested by NYCSTE2003)

Considering:
  • Removal of Trend Micro's scanner from qclean and qscanonly (as it is not the full virus library, only select malware)
 

Schadenfroh

Elite Member
Mar 8, 2003
38,416
4
0
The fixed December 2007 script is now in the OP. Panda should automatically remove infected files now without user intervention if the user uses clean or qclean. Panda will run and generate a log (but not remove anything) if the user uses qscanonly or scanonly.

I also replaced the old readme.txt file with an html file that will be much easier to work with (has links, pictures, and more detailed instructions).

Panda's command line scanner is mistakenly identified as a possible virus by antivir (and possibly others). Avira confirmed that it is a false positive and Panda says that they will have the problem fixed in the next update (where other AVs will not mistakenly think that it might be a virus)

Happy testing and give feedback!
 

Cellulose

Senior member
May 14, 2007
360
0
76
Thanks,

My only problem is CCleaner is only 4 files not a bunch of DLLs

Probably just a silly mistake by me somewhere

 

Schadenfroh

Elite Member
Mar 8, 2003
38,416
4
0
Originally posted by: Knobjockey
My only problem is CCleaner is only 4 files not a bunch of DLLs

Just redownloaded it from MG and crapcleaner's website and it looks like what I have in the screen shot when I extract it. What compression tool did you use to extract it with? I was using 7-zip.
 

Schadenfroh

Elite Member
Mar 8, 2003
38,416
4
0
I have a December 2007 R2 in the works, testing it now (mechanically, I only changed some folder names, moved the images for the readme into its on folder, but still checking to see if it works fine (to see if I screwed a .cmd file in the process)).

The primary reason for the R2 will be to update the readme.html to add clarity (for example to CrapCleaner, as pointed out by Knobjockey), content, and fix a few minor mistakes in the instructions.

EDIT: It is now in the OP

Can anyone give me any thoughts into possible legal issues that might arise if I am considering the writing of a Java application to automatically download (and/or update) the applications above from the developer's website and to extract the files into the folders for you? Said application would be freeware / opensource of course. (maybe put the license for the product in front of the user in a popup before it is download and force the user to either agree to it or not download / include that application in the script)?
 

Schadenfroh

Elite Member
Mar 8, 2003
38,416
4
0
Working on an overhaul for the January 2008, please note the issues in the OP and I strongly suggest that you use only "qclean" and "qscanonly" for now.

Plans for Jan 2008
  • Removal of Sophos (others should handle it, the sophos command line scanner only has a very limited amount of malware that it actually scans for)
  • Limiting the archive recursion depth of ClamWin, and thus vastly improving speed.
  • Removing "qclean" and "qscanonly" options
  • fixes mentioned in OP

Let me know your input on what you want in Jan 2008.

Update: Tests are going better than I thought and a good deal of problems have been fixed in my new test script (major revision), Jan 2008 update may come out before January

Fixed your dates- Oak
 

Schadenfroh

Elite Member
Mar 8, 2003
38,416
4
0
The update the the script that I planned for January was completed and tested much quicker than I had thought. Therefore, I now have the major update to the script package for you to use in December rather than January:

Changes in the January 2008 release
  • Sophos removed (Sophos only scanned for a limited number of viruses, the others in the package should be able to handle them fine. Sophos was one of the slower scanners (and the most limited))
  • ClamWin is now much more usable (far faster with new arguments that limit the archive recursion depth)
  • ClamWin no longer falsely detects Panda's definitions as malware (added it to the ignore list on ClamWin)
  • Removed qClean and qScanOnly options (now that Sophos is gone and ClamWin completes in a reasonable amount of time)
  • ScanOnly no longer makes Clam remove infected processes that are running in memory (adjusted arguments)
  • ClamWin no longer deletes large archives (adjusted arguments)
  • Panda now scans all extension types (adjusted arguments)
  • Removed password on .zip archive
  • Updates / fixes to readme.html
  • Asquared no longer scans for traces (/t argument), removed due to a a significant amount of false positives on my test machines. Let me know your thoughts on this, I was reluctant to remove it.
  • Minor fixes / updates here and there

Enjoy and do give feedback and/or recommendations on freeware (to home users) command line tools to add!

Merry Christmas!
 

Schadenfroh

Elite Member
Mar 8, 2003
38,416
4
0
I have noticed that about Mcafee betas. Every so often they have a bad zip file out there. It will clear up the next time they update it.

Update: looks like Mcafee fixed it, just downloaded it, tested / verified it with 7-zip, then extracted it, seems to work now
 

Schadenfroh

Elite Member
Mar 8, 2003
38,416
4
0
I wanted to get some thoughts from you guys on this, as I have been very reluctant to add the following to the script.

As you know, there are several antirootkit tools from reputable vendors (Trend Micro, Sophos, Panda, etc.) that offer both scan and autoremove capabilities that would work with this script. I am afraid of the consequences of false positives / removals gone bad with such tools.

What do you guys think about adding such tools to the script? Or maybe a separate script just for the antirootkit tools to scan and report (no removal)?
 

FLegman

Member
Jul 26, 2007
98
0
0
Greetings Schadenfroh,

I have tested the latest release of your Script and it does a very good job.
However the ClamWinportable doesn't seem to launch. I ran the script on 2 different machines and both ClamResults files have empty records.

Speaking of Rootkits scanner script, it will be good to have it separate, as this current script takes a very long time for the scan to complete. 5 Hours+ for me on the second machine (only 40 Gigabyte drive, but 6 accounts !!!).

During the scanning there is a prompt to press a key to continue, either to launch the next scan engine or to decide what to do with a suspicious file (i was on scan only mode). This makes mandatory(?) to keep an eye on what's going on.

I ran a rootkit scan too but only the next day (i was "knocked out" by the 5Hours Sentinel position).
And here to i was prompted to decide what to do with the suspicious findings. I used Rootkit Reveal and it trigered Antivir during the scan.

I used your script in conjunction with rootkit reveal in an attempt to bust something Big deeply rooted in one the systems i configured, but the outcome is mixed. I explain:

The Facts
1>> i configured a second hand system(1) delivered raw with XP Pro preinstalled.
2>> i planned to use real vnc to maintain the system(1)
3>> I had port issues with commodo on both ends, so i uninstalled it from the remote machine(1) and unabled the windows firewall and made connection attempts to my listening viewer on machine(2)
4>>Once i physically got back to machine(2), commodo logs showed 2 other attemps(blocked) made from different ip addresses, different from machine(1) isp pool addresses).
This happened 1 hour after my attempts which were also logged, and another attempt was made deep in the night.

The assumptions
My constant paranoia mood scalated to schizophrenia. Needless to add that that night was the longuest of my life...
My scenario was the techies from the second hand computer shop have planted a rootkit.
Next morning i rushed to machine(1) and started my endless scannings.

Scan outcome
1 a Riskware.AdTool.Win32.Zango.e (Asquare)
2 the Puper trojan + Adware-ZangoSA (McAfee)
3 spyware :Adware/Zango (Panda)

All these in limited users accounts.
The rootkit scan results show discrepanties that seem "normal", from what i could read on their website and from searches i made on google.

The Configuration & my questions
Machine(1) is connected to the internet thru Ethernet and there is no Lan.
One Administrator's Account (Renamed) and the rest is limited accounts.
Avira Antivirus
Windows Firewall

Could those detected malwares transmit keystroks or data regarding the other computer i was trying to access even though they were located on a limited account.
Were the blocked attempts from commodo just normal port triggering ?


Merry Christmas & Happy New Year,
Thank you for your imput.





 

Schadenfroh

Elite Member
Mar 8, 2003
38,416
4
0
Thanks for the feedback, FLegman:sun:

However the ClamWinportable doesn't seem to launch. I ran the script on 2 different machines and both ClamResults files have empty records.
There may have been an update to ClamWinPortable that breaks it, I will check it out later on my virtual machine with the latest build from their website. Although my test machine is having some hardware trouble, that might delay testing. Perhaps you extracted it with a compression utility rather than installing it to that folder?

Update: Just reinstalled it used the scanonly on my main machine, clamwin portable worked correctly and the log (which contained what it should have) was displayed at the conclusion.

During the scanning there is a prompt to press a key to continue, either to launch the next scan engine or to decide what to do with a suspicious file (i was on scan only mode). This makes mandatory(?) to keep an eye on what's going on.
Do you recall which scanner prompted you? There could be a mistake with a command line argument somewhere that arises in certain conditions, which hopefully I can correct. You should not have to do anything after you start running either script until it is time to review and analyze the logs.

The rootkit scan results show discrepancies that seem "normal", from what i could read on their website and from searches i made on google.
I have not used RootKitRevealer in a while, but there are some discrepancies that can appear on a clean system, feel free to post them for review if you wish.

One Administrator's Account (Renamed) and the rest is limited accounts.
Was it passworded?




Medea and mechBgon will probably be able to answer your other questions better (they might notice it sooner if you start your own separate thread about it), posting a hijackthis log of the machine may help.

Thanks again FLegman for testing it!
 

Schadenfroh

Elite Member
Mar 8, 2003
38,416
4
0
Bingo, I found the problem you were having in that the script in scanonly was not fully automated. The TrendMicro portion of the script was missing an argument, I have corrected it and after I have tested it, I will upload it. A way to fix it yourself has been posted in the OP for now, after you put that new argument in there, "scanonly" will be fully automatic once it starts. Thanks for pointing this out FLegman.
 

Schadenfroh

Elite Member
Mar 8, 2003
38,416
4
0
Fixed script now uploaded and linked to in the OP.


Changes:
  • Updated readme to be clearer in regards to CrapCleaner and ClamWin.
  • Fixed argument in "ScanOnly" that resulted in TrendMicro not being fully automated (thanks FLegman)
 

Schadenfroh

Elite Member
Mar 8, 2003
38,416
4
0
Fixed script now uploaded and linked in the OP.

Changes:
  • Found and fixed yet another argument in "ScanOnly" with Panda that may result in it not being fully automated under certain conditions(thanks FLegman)

Let me know if either script is not automated once you type either "clean" or "scanonly" both should not require intervention once you start
 

Mojoed

Diamond Member
Jul 20, 2004
4,473
1
81
Thanks Schadenfroh!

Your latest update fixed the issue I was having with ScanOnly. Previously it was bombing at the start of Panda. That -auto switch you added to Panda fixed the problem for me. Everything working great now.

Your hard work is very much appreciated. Thanks again! :beer:
 

manly

Lifer
Jan 25, 2000
11,367
2,375
136
Downloading now...

Can this knock out a trojan that is already active when Windows loads? I wasn't successful with VundoFix because Vundo was already running by the time the scanner gets to it. Even re-running the scanner immediately upon reboot didn't work. I thought I was able to delete the offensive .dll in the Recovery Console, but it's definitely reloading itself from somewhere.

Although I'm confident it's still fixable, I'm pretty close to just reinstalling Windows. The only thing holding me back is I'd probably want to pick up a new ATA hard drive first just for convenience.

Edit:
I'm taking my chances w/ clean. ClamWin is awfully slow, taking longer than all others combined; is it even any good?
 

poisonthewell

Senior member
Jun 10, 2005
406
0
0
Wow, GREAT tool - thanks Shad!! I'm a beginner with regard to cleaning infected PCs, so I'm not sure whether I should post my results here or look elsewhere (suggestions welcome!!).

A friend brought me his Dell P4 and it was basically naked - no antivirus, nothing to protect from malware, spyware, etc (I really mean it when I say naked) so I installed Avira Antivir, Spybot, Windows Defender and Ad-Aware. Needless to say each program found issues. From there I found this thread, downloaded everything and ran w/ clean. Started around 1:30 PM and when I went to bed at midnight Clam was still running. Anyway, I saved all the logs, here they are:

Trend Micro (I only included the error entries)
Panda
McAfee
Clam
A2

I'll post Avira, Spybot, Win Defender and Ad-Aware logs when they are done running. Any initial help/thoughts are appreciated!

 

Schadenfroh

Elite Member
Mar 8, 2003
38,416
4
0
@Manly
This script only launches applications with arguments that I have found to not conflict with one another, provide solid detection ability and run automatically without user intervention, it is up to those programs launched by it to knock stuff out.

Clamwin's detection rate can be reviewed in some of the tests linked in the antivirus detection rate thread. Some people have requested that it be removed due to the time that it takes to scan, in a future script release, I will probably lower the archive recursion depth limit argument.


@poisonthewell

Sorry to hear about your friend's PC and thanks for testing / posting the results log. I have noticed some false positives with Panda that appeared on one of my known clean test systems that are also present in the results log you posted. I have submitted copies of these files to Panda in hopes that they will fix them. In a future update to the script, I will lower the heuristic sensitivity argument to (hopefully) eliminate more false positives.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |