Jump to content


  • Posts

  • Joined

  • Last visited

Posts posted by TonyKlein

  1. 2 hours ago, safespace-superhero said:


    You're absolutely right. But simply do it when scan results are ready:


    Uncheck related registry keys and values, then

    From the documentation:

    If any threats are not selected to be moved to Quarantine, you will be prompted to Ignore OnceIgnore Always, or CancelIgnore Once will result in the threat once again being reported as a threat during the next scan execution. Ignore Always causes the threat to be added to Exclusions. A threat which has been added to Exclusions will no longer be reported as a threat unless there is reason to believe that it has been tampered with.

    You can of course also tell MBAM to ignore PUPS altogether, although it's no recommended 



  2. Other than changing their 'target' or deleting them, not really.   If you change the CLSID itself, it in effect becomes a new CLSID/GUID, which equals adding a brand new one.


    Of course, aside from CLSIDs, malware can and does add, add to, and change many other Registry keys, values and data.


    For example, have a look at Pieter's excellent Malware Removal Guides as well as at the Collection of Autostart Locations topic in my signature

  3. which ways does malware have to use an existing CLSID for itself?



    Simply by having the InProcServer subkey for the existing CLSID point to an executable file of the malware itself.


    Let's take as an example the way a legitimate browser helper object is registered;  here's the principle of how that goes:


    Windows Registry Editor Version 5.00


    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{724d43a9-0d85-11d4-9908-00400523e39a}]

    @="RoboForm BHO"


    @="RoboForm Toolbar Helper"


    @="C:\\Program Files\\Siber Systems\\AI RoboForm\\roboform.dll"



    This ensures that roboform.dll is loaded every time an instance of Internet Explorer is launched.



    You can replace the path of roboform.dll by the path of a malware dll, and that dll will then be loaded instead.




  4. HI Jenn,


    A CLSID, according to Microsoft, is a "globally unique identifier that identifies a COM class object”,  if you wish a "social security number"  for a Windows or third party software application or component thereof, a particular system folder, etcetera



    CLSIDs are used by Windows to identify software components without having to know their "name". They can also be used by software applications to identify a computer, file or other item



    If you're asking whether malware can change/use/affect a CLSID, the answer is yes:  malware, just like legitimate software,  can modify the registry, ie adding, deleting or modifying components, and of course that includes CLSIDs.


    To give one example,  you'll be familiar with the "Open With" context menu entry you get when right-clicking a file. In the Registry it looks as follows:

    [HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\Open With]

    The {09799AFB-AD67-11d1-ABCD-00C04FC30936} Class ID refers to a subkey of the same name in HKEY_CLASSES_ROOT\CLSID, whose InProcServer subkey holds the path to the context handler's dll, in this case Shell32.dll.

    Now this method can also be used by malware, for example


    The InProcServer subkey to HKEY_CLASSES_ROOT\CLSID\{f1445181-385e-4b9f-ba55-4fec86b25d01} will then show the path to a  'rogue' dll that's loaded into memory.



    So malware, just like regular software can certainly add new CLSIDs where it wants or modify the 'target' of existing ones.




  5. Do you know if it Usually Shows in msconfig/startup as it's Not Showing in mine , or is there a way to get it to show in startup

    FYI, The new version no longer relies on the Registry's 'Run' keys to start a component, but instead it now uses services, which is why you won't find it in Msconfig/Startup, even if correctly installed.
  6. There is an AddLyrics adware variant that installs browser extensions by that name; which incidentally would appear to be confirmed by what you say MBAM quarantined. 


    Variants are detected by MBAM as Pup.Optional.ShowPassword, PUP.Optional.ViewPassword and so on.


    BTW, if that's the culprit, it's is just adware that will come bundled with various third party software or as part of an adware bundle, not a password stealer, so no worries there

    I suggest you create a post in the Malware Removal forum, so that one of the analysts can take a closer look.

Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.