Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Flagged by RogueKiller - are these registry entries harmless ?


  • Please log in to reply
3 replies to this topic

#1 mangurian

mangurian

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:01:03 PM

Posted 15 August 2014 - 10:54 AM

http://www.pbase.com/nupbase/image/156991920/original.jpg



BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,112 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:03 PM

Posted 15 August 2014 - 06:30 PM

A Potentially Unwanted Modifcation (PUM) is considered potentially unwanted because the program making the detection cannot determine if the modification was set by the user, a legitimate program or by malware.

Some security tools will detect certain registry key modifications (i.e. StartMenu, Desktop, SecurityCenter, HomePageControl, NewStartPanel, Internet Explorer HomePage/StartPage, etc and various other Windows registry policies) but cannot determine if they were made intentionally by the user or by malware. Since that is the case, the tool may flag these changes to ensure the user is aware of the modification(s). The program developers assume that advanced users know if they disabled such keys and understand the detection.

In most cases if you recognize the PUM, you can ignore the detection. If you don't recognize the detection, then you may need to investigate further as to what program or malware made the modification(s).

Usually when a computer is infected with malware there will be indications (signs of infection) that something is wrong.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 noknojon

noknojon

  • Banned
  • 10,871 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Local time:04:03 AM

Posted 16 August 2014 - 04:17 AM

Although I do not use the program, or even know if it is on your desktop, start here >>>

 

>>> This program, or the fact it came from CNET may be the "suspect" item mentioned !!!!

 

Check the link above, and see if you use this program.

 

The post of yours is not complete as it is only a partial log, so follow the instructions in ==>This Guide<== starting at Step 6.
Once the proper logs are created, then make a NEW TOPIC and post it to Trojan,/ Malware Removal Area



#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,112 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:02:03 PM

Posted 16 August 2014 - 04:32 PM

I really don't see the need to post a DDS log in the Malware Removal Logs forum just yet for a handful of PUM registry entries detected by RogueKiller. We need more information from mangurian.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users