On 7/22/2015 7:23 AM, JD Ackle wrote: > Hello, > > Currently, ClamAV run from Linux reports Docx.Exploit.CVE_2015_1770 in my > Windows 8.1 install, in files: > - pageFile.sys > - Windows/System32/config/SOFTWARE (a piece of the Windows registry) > > If I understand it correctly, pageFile.sys works much like a Linux swap, > hence basically containing RAM dumps. After removing the file from the > Windows system and booting to it I noticed Windows just made a new one when > needed, as I expected. Thus I am actually using that file as a checkpoint to > track whether the system is clean or not - whether the virus appears in the > volatile memory when Windows is run. > When I first noticed the infection, pageFile.sys did not get infected upon a > Windows startup without logging on a user (it would however otherwise, > regardless of whether the user was and administrator or a regular one). > > I noticed the infection on Windows/System32/config/SOFTWARE later and moved > it to Linux to try and fix it - even though I was not really sure how to do > it. Upon giving up on the later plan I simply tried booting onto Windows > which failed. Since copying the SOFTWARE file back in, pageFile.sys now > becomes infected even if I don't logon any user. > I presume the reason for this may be that the file lost its Windows > permission upon being copied to my Linux install and is now world-accessible, > thus being run by the system even before an allowed user is logged on...? > > On another hand, I am hesitant to consider this a false positive as ClamAV > did detect another virus in my Windows system: > - Program Files (x86)/Hewlett-Packard/Shared/WizLink.exe: Win.Worm.Tenga-113 > FOUND > I don't need that file at all, so I simply deleted and no further infections > of that virus have been detected since. My Windows install was running > considerably slow (specially network-related tasks) before removing that file > and seems to have picked back up on its speed, so I am assuming the said > virus was indeed, at least for the most common use of that system, been > removed. > However, I'm not sure whether this worm and the Docx.Exploit.CVE_2015_1770 > are not related...? > > No other infections were detected by ClamAV on the affected system and Norton > Internet Security, which I have installed and running on Windows, doesn't > seem to have ever noticed anything. > > So that's basically the full story. > At this moment, I would like to know how can I remove > Docx.Exploit.CVE_2015_1770 from Windows/System32/config/SOFTWARE (any > particular key or value I should be looking for?), so that I'm sure it's not > its loading into RAM at startup that's making its signature appear on > /pageFile.sys. > > Thanks in advance, > JD Ackle > _______________________________________________ > Help us build a comprehensive ClamAV guide: > https://github.com/vrtadmin/clamav-faq > > http://www.clamav.net/contact.html#ml >
I would suspect a false positive if a MS Office document virus is reported in anything other than an MS Office document. _______________________________________________ Help us build a comprehensive ClamAV guide: https://github.com/vrtadmin/clamav-faq http://www.clamav.net/contact.html#ml