TonyKlein

Experts
  • Content count

    1,921
  • Joined

  • Last visited

About TonyKlein

  • Rank
    Forum Deity

Contact Methods

  • ICQ
    0

Profile Information

  • Location
    The Netherlands

Recent Profile Visitors

16,532 profile views
  1. Congrats, MBAM team and WTG, Filipos!
  2. Other than changing their 'target' or deleting them, not really. If you change the CLSID itself, it in effect becomes a new CLSID/GUID, which equals adding a brand new one. Of course, aside from CLSIDs, malware can and does add, add to, and change many other Registry keys, values and data. For example, have a look at Pieter's excellent Malware Removal Guides as well as at the Collection of Autostart Locations topic in my signature
  3. np, glad to have helped. Have fun (but be careful!)
  4. Simply by having the InProcServer subkey for the existing CLSID point to an executable file of the malware itself. Let's take as an example the way a legitimate browser helper object is registered; here's the principle of how that goes: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{724d43a9-0d85-11d4-9908-00400523e39a}] @="RoboForm BHO" [HKEY_CLASSES_ROOT\CLSID\{724d43a9-0d85-11d4-9908-00400523e39a}] @="RoboForm Toolbar Helper" [HKEY_CLASSES_ROOT\CLSID\{724d43a9-0d85-11d4-9908-00400523e39a}\InprocServer32] @="C:\\Program Files\\Siber Systems\\AI RoboForm\\roboform.dll" This ensures that roboform.dll is loaded every time an instance of Internet Explorer is launched. You can replace the path of roboform.dll by the path of a malware dll, and that dll will then be loaded instead.
  5. HI Jenn, A CLSID, according to Microsoft, is a "globally unique identifier that identifies a COM class object”, if you wish a "social security number" for a Windows or third party software application or component thereof, a particular system folder, etcetera If you're asking whether malware can change/use/affect a CLSID, the answer is yes: malware, just like legitimate software, can modify the registry, ie adding, deleting or modifying components, and of course that includes CLSIDs. To give one example, you'll be familiar with the "Open With" context menu entry you get when right-clicking a file. In the Registry it looks as follows: [HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\Open With] @="{09799AFB-AD67-11d1-ABCD-00C04FC30936}" The {09799AFB-AD67-11d1-ABCD-00C04FC30936} Class ID refers to a subkey of the same name in HKEY_CLASSES_ROOT\CLSID, whose InProcServer subkey holds the path to the context handler's dll, in this case Shell32.dll. Now this method can also be used by malware, for example HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\gxmmxn] @="{f1445181-385e-4b9f-ba55-4fec86b25d01} The InProcServer subkey to HKEY_CLASSES_ROOT\CLSID\{f1445181-385e-4b9f-ba55-4fec86b25d01} will then show the path to a 'rogue' dll that's loaded into memory. So malware, just like regular software can certainly add new CLSIDs where it wants or modify the 'target' of existing ones.
  6. Additionally, after a hard reset, it's never a bad idea to have Windows check your disk for errors: Check your hard disk for errors in Windows 7 How to perform disk error checking in Windows XP How to Run Disk Error Checking in Windows 8
  7. You're very welcome; glad we were able to clear this up for you
  8. FYI, The new version no longer relies on the Registry's 'Run' keys to start a component, but instead it now uses services, which is why you won't find it in Msconfig/Startup, even if correctly installed.
  9. Its not in the Macromedia registry key; if you look closely, you will see that it has its own own proprietary registry key underneath the Macromedia key The Macromedia key has a 'plus' next to it, which, if you click it, will reveal its subkeys.
  10. Not only that, but that particular adware hasn't been seen 'in the wild' for six or more years ago, so, combined with the fact that according to yourself Norton removed the detection shortly afterwards, you can be sure it was a FP...
  11. It's just one of the many customizing options in Windows, nothing bad about it.
  12. There is an AddLyrics adware variant that installs browser extensions by that name; which incidentally would appear to be confirmed by what you say MBAM quarantined. Variants are detected by MBAM as Pup.Optional.ShowPassword, PUP.Optional.ViewPassword and so on. BTW, if that's the culprit, it's is just adware that will come bundled with various third party software or as part of an adware bundle, not a password stealer, so no worries there I suggest you create a post in the Malware Removal forum, so that one of the analysts can take a closer look.
  13. As for the cascading windows, right-click on the Taskbar and uncheck "Cascade Windows". As for the file extensions, see How to show or hide file name extensions in Windows Explorer Note that it is generally considered useful to be able to see file extensions, as that way you're in a better position to tell whether a file is an executable, an image file or something else
  14. np, you're very welcome.
  15. Hijackthis.nl is a trustworthy Dutch language security and malware removal site, 'CarlosTurco' doesn't have a "Trusted Advisor" title at Malwarebytes for no reason, and the tools he asked you to downlaoad are totally legit. Do please go ahead and follow his advice!