Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Assistance w/ interpreting RogueKiller scan results...

  • This topic is locked This topic is locked
2 replies to this topic

#1 0point7


  • Members
  • 1 posts
  • Local time:07:41 AM

Posted 04 June 2017 - 09:16 PM

      I'm unsure if this was the appropriate place to post but, as the title suggests, I'm seeking help to interpret the results from a RogueKiller scan (earlier today 6-4-17). The scan produced 10 items that may potentially be dangerous; of these 10, I recognize a few as personal modifications (such as firefox addon & config entries). I'm only moderately concerned with the Registry: IE Settings, as I do not ever use IE- so unless I'm oblivious to any danger here, my query lies in the remaining entries (see image below; entries in question are checked, but I have not removed them and will not until advised of how to proceed). To offer some context here in the situation, I don't really experience many performance issues, and I have not noticed any problematic areas indicative of mal/ransom/ad/spy-ware; I'm just somewhat obsessive in viewing taskmanager for any processes/startups/details/services that are running or present outside of those within my immediate knowledge which are necessary and/or recognizable as such. In my most recent observation of startups in CCCleaner, I noticed the item which turned out to be the 'suspicious path' entry below (when I noticed it, I began searching for what it was, which led me to RogueKiller, and thus the results below). Scans by Defender, as well as Malwarebytes, do not flag anything (literally, since I've not excluded any programs/files/folders/etc., nor have I whitelisted any for them to ignore). I'm curious in these entries but with caution, lest I find out that they could be critical, and removing any only initiates  'BlueScreenOfDeath". Any help is much appreciated and I await your response.
                                                     Thank you for your time,
                           (Update: I tried to post with the actual image and could not, so here are the text results instead; please note the areas marked in bold gray italics) 
RogueKiller V12.11.0.0 (x64) [May 29 2017] (Free) by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : https://forum.adlice.com
Website : http://www.adlice.com/download/roguekiller/
Blog : http://www.adlice.com

Operating System : Windows 8.1 (6.3.9600) 64 bits version
Started in : Normal mode
User : Shane [Administrator]
Started from : C:\Program Files\RogueKiller\RogueKiller64.exe
Mode : Scan -- Date : 06/04/2017 19:09:22 (Duration : 00:33:29)

¤¤¤ Processes : 0 ¤¤¤

¤¤¤ Registry : 5 ¤¤¤
[PUP.Gen1] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{0A7D6F3C-F2AB-48ED-BE23-99791BFF87D6} -> Found
[PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-1094836658-577675240-2189340612-1002\Software\Microsoft\Internet Explorer\Main | Default_Page_URL :
[PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-1094836658-577675240-2189340612-1002\Software\Microsoft\Internet Explorer\Main | Default_Page_URL :
[PUM.StartMenu] (X64) HKEY_USERS\S-1-5-21-1094836658-577675240-2189340612-1002\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_TrackProgs : 0  -> Found
[PUM.StartMenu] (X86) HKEY_USERS\S-1-5-21-1094836658-577675240-2189340612-1002\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_TrackProgs : 0  -> Found

¤¤¤ Tasks : 1 ¤¤¤
[Suspicious.Path] \UninstallDDS-C960901F-CE14-4DE1-9729-1305F719A337 -- C:\Windows\TEMP\DeleteFolderTask.exe -> Found

¤¤¤ Files : 1 ¤¤¤
[PUP.AutoIt.Gen][File] C:\Program Files (x86)\Dell Backup and Recovery\qttool lite.exe -> Found

¤¤¤ WMI : 0 ¤¤¤

¤¤¤ Hosts File : 0 ¤¤¤

¤¤¤ Antirootkit : 0 (Driver: Loaded) ¤¤¤

¤¤¤ Web browsers : 3 ¤¤¤
[PUP.Gen2][Firefox:Addon] 8nkki751.default : Video Resumer [videoresumer@jetpack] -> Found
[PUM.Proxy][Firefox:Config] 8nkki751.default : user_pref("network.proxy.type", 4); -> Found
[PUM.HomePage][Firefox:Config] 8nkki751.default : user_pref("browser.startup.homepage", "https://mycampus.argosy.edu/portal/server.pt/mypage/home_page/200"); -> Found

¤¤¤ MBR Check : ¤¤¤
+++++ PhysicalDrive0: TOSHIBA MQ01ABF050 SATA Disk Device +++++
--- User ---
[MBR] a960e2f58678b459d0b9109d59c7ac1c
[BSP] 85656f47045c33114ac2229d32aeb9a0 : Empty|VT.Unknown MBR Code
Partition table:
0 - [MAN-MOUNT] EFI system partition | Offset (sectors): 2048 | Size: 500 MB
1 - [SYSTEM][MAN-MOUNT] Basic data partition | Offset (sectors): 1026048 | Size: 40 MB
2 - [MAN-MOUNT] Microsoft reserved partition | Offset (sectors): 1107968 | Size: 128 MB
3 - [SYSTEM][MAN-MOUNT] Basic data partition | Offset (sectors): 1370112 | Size: 750 MB
4 - Basic data partition | Offset (sectors): 2906112 | Size: 466936 MB
5 - [SYSTEM][MAN-MOUNT] Microsoft recovery partition | Offset (sectors): 959191040 | Size: 8584 MB
User = LL1 ... OK
User = LL2 ... OK


Edit: Moved topic from Am I Infected to the more appropriate forum. ~ Animal

BC AdBot (Login to Remove)


#2 nasdaq


  • Malware Response Team
  • 40,200 posts
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:08:41 AM

Posted 08 June 2017 - 08:01 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.

No malware was identified by RogueKiller.

This is a Potentially Unwanted Program.

[PUP.Gen1] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{0A7D6F3C-F2AB-48ED-BE23-99791BFF87D6} -> Found

This is from Amazon.
Amazon 1Button App (HKLM-x32\...\{0A7D6F3C-F2AB-48ED-BE23-99791BFF87D6})
Your call if you want to keep it.

This is a False positive. If it was bad it would have been flagged by Malwarebytes.
[PUP.AutoIt.Gen][File] C:\Program Files (x86)\Dell Backup and Recovery\qttool lite.exe -> Found

If you have any issues with this computer run this program and post the logs for my review.

Download the version of this tool for your operating system.
Farbar Recovery Scan Tool (64 bit)
Farbar Recovery Scan Tool (32 bit)
and save it to a folder on your computer's Desktop.
Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.

How to attach a file to your reply:
In the Reply section in the bottom of the topic Click the "more reply Options" button.

Attach the file.
Select the "Choose a File" navigate to the location of the File.
Click the file you wish to Attach.
Click Attach this file.
Click the Add reply button.

#3 nasdaq


  • Malware Response Team
  • 40,200 posts
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:08:41 AM

Posted 14 June 2017 - 07:31 AM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Please include a link to your topic in the Private Message. Thank you.

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users