Java Jive
2023-07-26 10:36:29 UTC
This is the run key from the registry of one of my W7 PCs ...
www.macfh.co.uk/Temp/RunKey.jpg
... and by way of confirmation here's an export of it ...
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"EEventManager"="\"C:\\Program Files (x86)\\Epson Software\\Event
Manager\\EEventManager.exe\""
... however ...
9:50:31 D:\Temp>reg query
"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ETDCtrl REG_EXPAND_SZ C:\Program
Files\Elantech\ETDCtrl.exe
IgfxTray REG_SZ C:\Windows\system32\igfxtray.exe
HotKeysCmds REG_SZ C:\Windows\system32\hkcmd.exe
Persistence REG_SZ C:\Windows\system32\igfxpers.exe
Malwarebytes TrayApp REG_SZ C:\PROGRAMS\MALWAREBYTES
ANTIMALWARE\mbamtray.exe
SynTPEnh REG_SZ C:\Program
Files\Synaptics\SynTP\SynTPEnh.exe
nwiz REG_SZ C:\Program Files\NVIDIA
Corporation\nview\nwiz.exe /installquiet
... so WTF is going on? A rootkit? But a scan by MalwareBytes finds
only a false positive uninstaller file (so a file only loaded into
memory and run when uninstalling the relevant program, which would
delete itself anyway) ...
Malwarebytes
www.malwarebytes.com
-Log Details-
Scan Date: 7/26/23
Scan Time: 10:32 AM
Log File: 6642e258-2b97-11ee-8208-001c2346ddc2.json
-Software Information-
Version: 4.5.32.271
Components Version: 1.0.2051
Update Package Version: 1.0.72995
License: Free
-System Information-
OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Charles-P1\Cruachan
-Scan Summary-
Scan Type: Threat Scan
Scan Initiated By: Manual
Result: Completed
Objects Scanned: 248688
Threats Detected: 2
Threats Quarantined: 0
Time Elapsed: 4 min, 9 sec
-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled <-- Note this!
Heuristics: Enabled
PUP: Detect
PUM: Detect
-Scan Details-
Process: 0
(No malicious items detected)
Module: 0
(No malicious items detected)
Registry Key: 1
Adware.DotDo,
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\FLAC,
No Action By User, 5824, 924227, , , , , ,
Registry Value: 0
(No malicious items detected)
Registry Data: 0
(No malicious items detected)
Data Stream: 0
(No malicious items detected)
Folder: 0
(No malicious items detected)
File: 1
Adware.DotDo, C:\PROGRAM FILES (X86)\FLAC\UNINSTALL.EXE, No Action
By User, 5824, 924227, 1.0.72995, , ame, ,
B7E822162FE81D4A8F2025B9329D425C,
F3DA78D3670C50DE2D71C32FAD129484F8672FFE11ADAB980757E72B3E3497CD
Physical Sector: 0
(No malicious items detected)
WMI: 0
(No malicious items detected)
(end)
... however that file is genuine, it's the uninstall program for a FLAC
encoder/decoder which allows Windows Media Player to play FLAC files,
has been on my builds since 2k/XP days, more than a decade, and is a
false positive ...
https://www.virustotal.com/gui/file/f3da78d3670c50de2d71c32fad129484f8672ffe11adab980757e72b3e3497cd
Any suggestions as to why the REG command line program finds a different
set of run keys from those actually listed in the registry? I do
recognise most or all of the 'spurious' keys found, nearly all of them
relate to hardware in some way, and may have existed at some time, but
long since were deleted:
ETDCtrl Touchpad driver listed in TaskMgr as running
IgfxTray Graphics driver and ...
HotKeysCmds ... Hotkey switcher and ...
Persistence ... graphics driver for a *different* PC
(I think all three previously deleted)
Malwarebytes No explanation needed
(also I think previously deleted, because I have
other runtime protection and tend to use MB only as
a back up scanner when there is a specific problem,
as now.)
SynTPEnh Touchpad driver and ...
nwiz ... graphics driver for a third PC
(again I think both previously deleted)
www.macfh.co.uk/Temp/RunKey.jpg
... and by way of confirmation here's an export of it ...
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"EEventManager"="\"C:\\Program Files (x86)\\Epson Software\\Event
Manager\\EEventManager.exe\""
... however ...
9:50:31 D:\Temp>reg query
"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ETDCtrl REG_EXPAND_SZ C:\Program
Files\Elantech\ETDCtrl.exe
IgfxTray REG_SZ C:\Windows\system32\igfxtray.exe
HotKeysCmds REG_SZ C:\Windows\system32\hkcmd.exe
Persistence REG_SZ C:\Windows\system32\igfxpers.exe
Malwarebytes TrayApp REG_SZ C:\PROGRAMS\MALWAREBYTES
ANTIMALWARE\mbamtray.exe
SynTPEnh REG_SZ C:\Program
Files\Synaptics\SynTP\SynTPEnh.exe
nwiz REG_SZ C:\Program Files\NVIDIA
Corporation\nview\nwiz.exe /installquiet
... so WTF is going on? A rootkit? But a scan by MalwareBytes finds
only a false positive uninstaller file (so a file only loaded into
memory and run when uninstalling the relevant program, which would
delete itself anyway) ...
Malwarebytes
www.malwarebytes.com
-Log Details-
Scan Date: 7/26/23
Scan Time: 10:32 AM
Log File: 6642e258-2b97-11ee-8208-001c2346ddc2.json
-Software Information-
Version: 4.5.32.271
Components Version: 1.0.2051
Update Package Version: 1.0.72995
License: Free
-System Information-
OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Charles-P1\Cruachan
-Scan Summary-
Scan Type: Threat Scan
Scan Initiated By: Manual
Result: Completed
Objects Scanned: 248688
Threats Detected: 2
Threats Quarantined: 0
Time Elapsed: 4 min, 9 sec
-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled <-- Note this!
Heuristics: Enabled
PUP: Detect
PUM: Detect
-Scan Details-
Process: 0
(No malicious items detected)
Module: 0
(No malicious items detected)
Registry Key: 1
Adware.DotDo,
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\FLAC,
No Action By User, 5824, 924227, , , , , ,
Registry Value: 0
(No malicious items detected)
Registry Data: 0
(No malicious items detected)
Data Stream: 0
(No malicious items detected)
Folder: 0
(No malicious items detected)
File: 1
Adware.DotDo, C:\PROGRAM FILES (X86)\FLAC\UNINSTALL.EXE, No Action
By User, 5824, 924227, 1.0.72995, , ame, ,
B7E822162FE81D4A8F2025B9329D425C,
F3DA78D3670C50DE2D71C32FAD129484F8672FFE11ADAB980757E72B3E3497CD
Physical Sector: 0
(No malicious items detected)
WMI: 0
(No malicious items detected)
(end)
... however that file is genuine, it's the uninstall program for a FLAC
encoder/decoder which allows Windows Media Player to play FLAC files,
has been on my builds since 2k/XP days, more than a decade, and is a
false positive ...
https://www.virustotal.com/gui/file/f3da78d3670c50de2d71c32fad129484f8672ffe11adab980757e72b3e3497cd
Any suggestions as to why the REG command line program finds a different
set of run keys from those actually listed in the registry? I do
recognise most or all of the 'spurious' keys found, nearly all of them
relate to hardware in some way, and may have existed at some time, but
long since were deleted:
ETDCtrl Touchpad driver listed in TaskMgr as running
IgfxTray Graphics driver and ...
HotKeysCmds ... Hotkey switcher and ...
Persistence ... graphics driver for a *different* PC
(I think all three previously deleted)
Malwarebytes No explanation needed
(also I think previously deleted, because I have
other runtime protection and tend to use MB only as
a back up scanner when there is a specific problem,
as now.)
SynTPEnh Touchpad driver and ...
nwiz ... graphics driver for a third PC
(again I think both previously deleted)
--
Fake news kills!
I may be contacted via the contact address given on my website:
www.macfh.co.uk
Fake news kills!
I may be contacted via the contact address given on my website:
www.macfh.co.uk