virus remediation training

Transcription

virus remediation training
VIRUS
REMEDIATION
TRAINING
Copyright © 2015 by The Virus Doctor™
All rights reserved
Copyright © 2015, The Virus Doctor™. All rights reserved
Table of Contents
SESSION 1: INTRODUCTION ..........................................................................................
Slides from PowerPoint presentation ..................................................................... 1
UNDERSTANDING THE WINDOWS REGISTRY ................................................................ 9
History and evolution of the Registry .................................................................... 11
The role of the Registry in today’s Operating Systems .......................................... 11
Internal structure of the Registry .......................................................................... 12
Hives and files ...................................................................................................... 12
Editing the Registry, using Regedit and Regedt32.................................................. 13
HKEYs, Keys, and Subkeys ..................................................................................... 15
Using Regedit in Windows XP and subsequent versions ........................................ 16
The Menu Bar in Regedit ...................................................................................... 17
The File Menu ......................................................................................................... 17
How to safely make changes to the Registry ......................................................... 17
The Edit Menu ........................................................................................................ 19
How to effectively use the Find command in Regedit ............................................ 21
How to add Keys and Values to the Registry ......................................................... 22
Data Types used in the Registry ............................................................................ 23
Back to the Menu Bar ........................................................................................... 26
The View Menu ....................................................................................................... 26
The Favorites Menu ................................................................................................ 26
The purpose and function of Control Sets in the Registry ...................................... 27
Working with Users in the Registry ....................................................................... 29
Registry backup and recovery techniques ............................................................. 29
Dealing with missing or corrupted Hives ............................................................... 30
Recovering from the Blue Screen of Death (BSOD) ................................................ 31
Emergency recovery of the Registry if you don’t have a backup ............................ 33
“Bulletproofing” the Registry to keep it safe ......................................................... 33
The role of Group Policies in the Registry .............................................................. 33
How and when to use Permissions to protect the Registry .................................... 37
Windows Services, svchost.exe, and the Registry .................................................. 37
Working with Msconfig and other Registry utility programs ................................. 37
Remote Registry Editing and how it works ............................................................ 40
SESSION 3: VIRUS REPAIR METHODOLOGY ............................................................... 43
Methodology for Malware Remediation – Overview............................................. 45
Copyright © 2015, The Virus Doctor™. All rights reserved
How to find and identify active malicious processes ............................................. 46
Most-likely malware today ................................................................................... 46
How to terminate rogue software......................................................................... 47
How to find traditional viruses, worms, and Trojan horses ................................... 49
Tracking down traditional malware ...................................................................... 54
How to terminate the malicious processes ........................................................... 58
How to determine the activation method ............................................................. 59
How and where malware is loaded ....................................................................... 59
Understanding the Run Keys – what’s normal, what’s not .................................... 60
Other “hiding places” where malware may be loaded .......................................... 63
Another useful tool to reveal “hiding places” in the Registry ................................ 69
Dealing with Rootkits ........................................................................................... 70
Running an automated Scan to remove all traces of malware ............................... 72
Exceptional Situations .......................................................................................... 73
Browser Hijackers ................................................................................................. 73
Recommended software tools that may help ........................................................ 75
Dealing with difficult situations caused by malware: ............................................ 76
 Your anti-virus program has been disabled and can’t be reinstalled ............. 76
 You can’t access any anti-virus vendor’s web site .......................................... 76
 You can’t connect to the Internet at all .......................................................... 76
 You can’t run Task Manager ........................................................................... 77
 You can’t run Regedit ...................................................................................... 77
 You don’t have a Run command on your Start Button................................... 77
 You can’t access a Command Prompt ............................................................. 78
 You can’t see Display Properties ..................................................................... 78
 You can’t run specific programs, especially MalwareBytes and similar antimalware programs ................................................................................................. 78
 You can’t run any .exe file ............................................................................... 79
Extreme Situations ............................................................................................... 79
Re-Imaging as an Option ....................................................................................... 81
Appendix B -- Point solutions for specific infections ................................................... 85
Appendix C -- Processes found in Task Manager ....................................................... 113
Appendix D -- Registry Differences by Operating System .......................................... 115
SESSION 4: THE VIRUS REPAIR TOOLKIT and LAB SESSION ...................................... 117
Copyright © 2015, The Virus Doctor™. All rights reserved
SESSION 1:
INTRODUCTION
UNDERSTANDING THE
WINDOWS REGISTRY
Copyright © 2015, The Virus Doctor™. All rights reserved
Copyright © 2015, The Virus Doctor™. All rights reserved
History and evolution of the Registry
The Registry as we know it today first took on its current form in Windows NT 3.51.
Windows 95 used a similar design, but a completely different internal structure, which
was continued into Windows 98 and Windows ME.
Windows NT 4.0 enhanced the architecture of the earlier NT design but retained the
same general design. This structure remains essentially unchanged through the
subsequent NT-based Operating Systems, which include Windows 2000, Windows XP,
Vista, Windows 7, Windows 8, and Windows Server 2003, 2008, and 2012.
The role of the Registry in today’s Operating Systems
The Registry serves as a central repository of everything that is known about the
Windows environment on that computer. It contains these general categories of
information:
 All the details of the hardware installed, including features, settings, options,
drivers, and resource usage
 All software installed, including default settings, file locations, etc.
 All users defined, including privilege levels, programs available, desktops,
preferences, settings, etc.
 All components of the Operating System, services, settings, configuration, user
interface, startup options, etc.
 Much, much more!
The Registry has been described as “the Subconscious of Windows.” As a general
statement, any time a Windows Operating System will not start correctly, the underlying
cause can be traced to a problem with the Registry.
Other than infection by malware, in almost every case, the source of a problem with the
Registry is caused by one of the following events:
 Hardware installation or removal didn’t complete properly
 Software installation or removal didn’t complete properly
 A manual Registry edit wasn’t done properly
Copyright © 2015, The Virus Doctor™. All rights reserved
11
Considering the high stakes involved, it is recommended that you back up the Registry
before taking any of these actions. Detailed procedures for Registry backup and restore
options are presented later in this document.
While Microsoft doesn’t provide a lot of public information about the Registry, there is
an article in their KnowledgeBase at http://support.microsoft.com that gives a good
overview. The article is as follows:
 256986 – Windows Registry information for advanced users
Internal structure of the Registry
The internal structure of the Registry falls into one of two categories. Windows
95/98/ME used a simple structure of two files + a Virtual Registry; all of the NT-based
Operating Systems organize the Registry into a much more complex and secure
structure composed of multiple Hives.
While the internal structure of the Registry is completely different between the two
major branches of the Windows Operating Systems, the external representation is
virtually identical among all versions of Windows. In most cases we are dealing with the
external view of the Registry and need not be concerned about its actual internal
structure.
Hives and files
The Registry in the Windows 9X Operating Systems is made up primarily of two files:
 System.dat
 User.dat
The System.dat file is by far the larger of the two. It contains everything that is known
about the hardware, software, services, applications, and anything else about the
Windows environment. This file is typically in the range of 1.5 to 4 MB in size.
The User.dat file is much smaller than System.dat, but contains essential information as
well. The contents of this file are all the user-specific settings, including privilege levels,
programs available, desktops, preferences, settings, etc.
12
Copyright © 2015, The Virus Doctor™. All rights reserved
Since the Windows 9X Operating Systems are rarely used these days, this document will
not go into any further detail on this aspect of its internal Registry structure.
All of the Windows NT-based Operating Systems organize the Registry into a set of
Hives; each Hive is composed of multiple files. This is a much more complex internal
structure than that used in the 9X Operating Systems, but it also provides for much
greater security, granularity, and increased recovery options in case of Registry
corruption.
Hives “look like” folders, in Windows Explorer. In turn, the files contained in each Hive
look like any other files on the hard drive. The exact number of Hives will vary from one
version of Windows to another, and there are also some differences in the Hive
structure between factory-installed (OEM) versions of Windows vs. retail installations or
upgrades.
In a typical Windows XP installation, the following Hives will be included:





C:\Windows\System32\Config\System
C:\Windows\System32\Config\Software
C:\Windows\System32\Config\Sam
C:\Windows\System32\Config\Security
C:\Windows\System32\Config\Default
A detailed description of the Hives and their locations in the various Operating Systems
can be found in the previously-referenced article in the Microsoft KnowledgeBase:
 256986 – Windows registry information for advanced users
Editing the Registry, using Regedit and Regedt32
Any time you need to examine the contents of the Registry or change any of the Keys or
Subkeys, the program you will normally use is Regedit.exe if the system in question is
running Windows 95/98/ME, XP, Vista, Windows 7, Windows 8, Windows Server 2003,
2008, or 2012, or later versions of the Operating System.
If you are dealing with a system running Windows NT 4.0 or Windows 2000, there is an
additional Registry Editor named Regedt32.exe. It is critical to know when to use which
Registry Editor in either of those Operating Systems.
Copyright © 2015, The Virus Doctor™. All rights reserved
13
Regedit contains a more modern, more powerful Find capability than the older
Regedt32. But it may not correctly handle the extended Data Types in Windows NT or
Windows 2000. With that potential problem in mind, you should not use Regedit.exe to
make changes to the Registry in either of these older Operating Systems; the older,
“clunkier” Regedt32 will safely modify any Data Type.
You may safely use Regedit.exe to Find information in the Registry of a Windows NT 4.0
or 2000 system, but if you need to Modify an entry, exit Regedit and open Regedt32 to
make the changes.
There have actually been three different versions of Regedit.exe, according to the
Operating System in use:
 Windows 95/98/ME
 Windows NT 4.0 or Windows 2000
 Windows XP, Vista, Windows 7, Windows 8, Server 2003, 2008, or 2012
Another difference, other than the visual appearance of the program, is the handling of
Permissions. The Windows 9X versions of Regedit did not allow any setting of
Permissions; in Windows NT and 2000, Permissions were set in Regedt32 only.
Regedit.exe in Windows XP and later versions includes Permissions.
A significant change to Regedit came into play with the 64-bit versions of Windows. The
Registry in these versions is divided into 32-bit and 64-bit keys. Many of the 32-bit keys
have the same names as their 64-bit counterparts, and vice versa. By default the 64-bit
version of Regedit displays the 64-bit keys.
You can display the 32-bit keys in either of two ways:
 In the 64-bit Regedit, navigate to HKLM\Software\WOW6432Node\, followed by
the desired 32-bit key
 From a Run command or the Open box, type %systemroot%\syswow64\regedit,
and then click OK; this command will open the 32-bit version of Regedit.
You can find additional information about the 32-bit and 64-bit keys and Regedit in the
following article in the Microsoft KnowledgeBase:
 305097 – How to view the system Registry by using 64-bit versions of Windows
14
Copyright © 2015, The Virus Doctor™. All rights reserved
One final note on the subject, you may still Run Regedt32.exe on a Windows XP or later
system. But in spite of appearances, this is now simply a shortcut to Regedit.exe. Note
also that the correct spelling of Regedt32.exe does not include the letter “i.” Back in the
days when this program was developed, file names were limited to a maximum of 8
characters + a 3-character extension, or file type. This nomenclature was referred to as
“8.3 file names,” which you will still see referenced occasionally in today’s Registry.
HKEYs, Keys, and Subkeys
Regardless of the Operating System in use, the external view of the Registry, as seen
through Regedit or Regedt32, appears mostly identical among all versions. These
Registry editors organize the structure into a series of top-level Keys, as follows:





HKEY_CLASSES_ROOT, abbreviated as HKCR
HKEY_CURRENT_USER, abbreviated as HKCU
HKEY_LOCAL_MACHINE, abbreviated as HKLM
HKEY_USERS, abbreviated as HKU
HKEY_CURRENT_CONFIG, abbreviated as HKCC
Regedit on a Windows 9X machine will show a sixth top-level HKEY, as follows:
 HKEY_DYN_DATA, abbreviated as HKDD
This key is a pointer to the Virtual Registry, which only exists in the 9X Operating
Systems. The presence of six top-level Keys is the only obvious indication in Regedit that
the Registry being edited is from a Windows 9X machine, rather than an NT-based OS.
The top-level Keys are sometimes referred to as Root Keys, or as Handles. Some authors
give the origin of the term HKEY as Handle Keys; according to the Microsoft TechNet
service, the prefix HKEY is their shorthand way of writing “Hierarchy.” In other words,
the HKEYs represent the hierarchy of entries in the Registry.
Each Key, or HKEY, is further subdivided into multiple Subkeys, which may be further
broken down into additional Subkeys. Some of the Subkeys you will be working with in
the Registry may be 5 layers deep, or possibly even deeper.
Note that the HKEYs do not map directly to the Hives referenced earlier. The only direct
correlations between HKEYs and Hives are HKLM to the Hardware Hive and HKU to the
User Hive; HKCR and HKCC are pointers into HKLM, and HKCU is a pointer into HKU.
Copyright © 2015, The Virus Doctor™. All rights reserved
15
Using Regedit in Windows XP and subsequent versions
As an entry point to a discussion of the Registry, open Regedit and click on the + sign
next to the following Keys in the left-hand pane:




HKEY_LOCAL_MACHINE
SOFTWARE
Microsoft
Windows NT
Then click on the Subkey CurrentVersion. Your results should look similar to this:
By double-clicking on the field “RegisteredOrganization” in the right-hand pane, you can
change the name of your organization or company. If this step was missed in the initial
setup of Windows on this computer, or if the Organization’s name has changed since
then, this is the direct way of correcting that value.
Similarly, if the person using this computer is no longer the one whose name appears in
the “RegisteredOwner” field, you can change it as well. Both of these fields are optional
as far as Windows is concerned, so even blank values are perfectly acceptable.
16
Copyright © 2015, The Virus Doctor™. All rights reserved
When new hardware or software is installed, these are the Values that will be used by
default to populate the corresponding entries in the new section of the Registry related
to that new hardware or software.
On the other hand, changing these Values does not cause any other corresponding
values to be changed in other Subkeys of the Registry. In the discussion of the Find
command, later in this document, we will offer a technique to semi-automate the
process of changing every occurrence of the Value of one RegisteredOrganization or
RegisteredOwner to another when this situation arises.
The Menu Bar in Regedit
The File Menu
Like most Windows programs, Regedit in Windows XP and later versions of Windows
begins with the File menu. The older versions of Regedit named the first entry Registry
instead of File, but the modern versions use the standard naming convention.
The first two entries in the File menu are Import… and Export… These serve a very
useful purpose as a simple backup method before making changes to the Registry.
How to safely make changes to the Registry
The first step in safely changing any entry in the Registry is to create a backup of that
Key or Subkey. Here is the step-by-step procedure you may want to follow:






Navigate to the desired Subkey
From the File menu, choose Export…
Change the “Save in:” to Desktop (from the drop-down menu)
Enter a meaningful name for “File name:”
Click “Save”
Minimize Regedit and verify that a new icon appears on the Desktop with the File
name you specified
This exported Registry file will have an extension of .reg. It is a plain text file, and it can
be opened in Notepad. Here is a typical .reg file:
Copyright © 2015, The Virus Doctor™. All rights reserved
17
Note the the first line of any .reg file will contain the identifier “Windows Registry Editor
Version 5.00,” and it will be followed by a blank line. These two lines are used by
Regedit to verify that this is actually an exported Registry file when you attempt to
import the file. Or the first line may simply contain the literal “REGEDIT4” instead of this
text string.
Then you are ready to Modify the selected Subkey, knowing that you can restore the
original value if necessary. Continue as follows:




Make the desired change to the selected Subkey
Test the change to determine whether it produced the desired results
If not, double-click on the desktop icon to import the previous value
Repeat as necessary
Any time you are making changes to the Registry, you want to be sure you can Undo any
changes in case of a problem. Regedit itself provides very little protection against
operator error, so it is your responsibility to create a fallback position.
The next two entries in the File menu are Load Hive… and Unload Hive… These will be
inactive options (grayed out) unless you have previously selected
HKEY_LOCAL_MACHINE or HKEY_USERS.
18
Copyright © 2015, The Virus Doctor™. All rights reserved
One purpose of these options is to replace a missing or corrupted Hive with a knowngood version from another source. If you regularly make backup copies of your Hives,
this could be a useful option; in most cases you are not likely to have such backups.
Another use of this option is to examine the hives on the hard drive of another
(presumably infected) computer. With HKLM or HKU selected in Regedit, choose Load
Hive and point to the desired hive. You will be asked to assign a name to this external
hive; once it is loaded, you may examine it in the same way you would look into the
local Registry.
The next pair of entries in the File menu are Connect Network Registry… and Disconnect
Network Registry… These options give you the ability to see, or even change, the
Registry on another computer connected to your network. This approach is described in
more detail in this document in the section “Remote Registry Editing and how it works.”
Next is the Print… menu, which is found on the File menu of most applications. While
this serves a useful purpose, use it with care! Even when you are many layers deep in
the Registry, Printing that Subkey could produce an enormous volume of paper.
The Edit Menu
The next entry on the Menu Bar is Edit, again following the standard used by most
Windows applications. But while this Edit menu is similar to that found in many
applications, there are some important differences as well.
The Edit menu is context-sensitive, meaning that the options it offers will vary
depending upon your current location in Regedit. Different selections will appear when
you are on the left-hand side of the bar vs. the right-hand side. And to a limited extent,
the options even change depending on the Key or Subkey selected.
When a Name is selected in the right-hand pane of Regedit, the first entry in the Edit
menu is Modify, followed by Modify Binary Data. Double-clicking on the Name field is
the same as choosing Modify from this Edit menu selection. The steps involved in
modifying Registry data were covered earlier in this document in the section “How to
safely make changes to the Registry.”
When a Key or Subkey is selected in the left-hand pane of Regedit, the first entry in the
Edit menu is the option to create New Keys, Subkeys, or Values. This is most commonly
Copyright © 2015, The Virus Doctor™. All rights reserved
19
used by vendors of hardware or software to add a section to the Registry to support
their products. The average user, or even the average technical-support person,
normally will not be creating new entries in the Registry.
Unlike many programs, Windows doesn’t necessarily try to make sense of every entry in
the Registry. Windows looks for certain key values but ignores any entries for which it
does not have a specific need. So, you may create any New entries you like, but it’s not
a good idea to clutter the Registry with extraneous data.
The procedure for creating New Keys, Subkeys, or Values will be covered later in this
section, along with some explanation of when you may need to do that.
The next entry in the Edit menu is Permissions… This gives you the ability to specify who
has what type of access to a given Key or Subkey in the Registry. Removing permissions
from certain Keys is one way to protect the Registry against unwanted changes.
The next two entries in the Edit menu are Delete and Rename. Deleting any Registry
entry always carries some degree of risk, so you want to be judicious with this option. A
safer approach is to Rename the entry and verify that the change produces the desired
results. Then you may go back and Delete it if you choose.
As a safety feature, you will note that Delete and Rename are unavailable when one of
the top-level HKEYs is selected. These options only apply to Subkeys below the HKEYs.
One thing you will not find on the Edit menu in Regedit are the traditional options for
Cut, Copy, and Paste. The closest entry to that is Copy Key Name, which is rarely of any
value. The structure of the Registry does not allow for moving a branch from one place
to another.
On the other hand, if there is a specific string of text or some other value that you need
to copy or move to another location in the Registry, that can be accomplished by use of
the Ctrl-key combinations that work with most Windows applications.
In that case, you simply select the string you want and use Ctrl-C to Copy or Ctrl-X to
Cut; then go to the new location and use Ctrl-V to Paste, and you have saved yourself
some re-typing.
Another familiar entry on the Edit menu that is not present in Regedit is Undo. Even
using Ctrl-Z will not undo a change in Regedit. This omission is one more reminder of
the importance of creating your own backup before making changes to the Registry.
20
Copyright © 2015, The Virus Doctor™. All rights reserved
The final pair of entries on the Edit menu are Find… and Find Next. The following
section details effective use of these options.
How to effectively use the Find command in Regedit
There may be times you know something must be contained in the Registry, but you
have no idea where it is, or what it is called. This is the time to use the Find command
from the Edit menu of Regedit.
There are several techniques you can use to more effectively achieve the results you
want from your Find:
 If you know generally which Key contains the desired value, click on that Key first.
 If the object of your Search will be found in the Data field, deselecting the options
to search in Keys and Values will make the Search go faster.
 Qualify your search term as much as possible; for example, instead of a generic
device name, look in Device Manager to see the specific product name and
search on it.
 Be prepared to use F3 (Find Next) frequently, as many Values are duplicated in
multiple Keys and Subkeys.
 In most cases you can ignore entries that occur in Subkeys that contain the
initials “MRU.” This stands for Most Recently Used, and most of these entries will
be showing the most recent Find results, or something similar that is unlikely to
be relevant to the problem at hand.
 Always wait for the Find command to end normally, saying “Finished searching
through the Registry.” This may take a few minutes, and it may appear that
nothing is happening during the Find process; there is no progress bar and little
hard drive activity, although the CPU Usage will remain near 100% during the
Find process.
If you ever have the need to replace multiple entries with the same new Value, here is a
technique you can use to semi-automate the process:
 Navigate to the first occurrence of the Value to be changed
 Double-click on that Name, which will open the Edit String with the Value
selected
 Change the Value to the desired new data, then click OK
 Double-click that Name again, to open the Edit String
Copyright © 2015, The Virus Doctor™. All rights reserved
21








Use Ctrl-C to Copy that value to the Windows Clipboard
Use the Find command to find the next occurrence of the old Value
Double-click on that Name, to open the Edit String
Use Ctrl-V to Paste the Clipboard contents into this Value, then click OK
Use F3 to Find the Next occurrence of the old Value
Double-click on that Name, to open the Edit String
Use Ctrl-V to Paste the Clipboard contents into this Value, then click OK
Repeat until all desired Values have been updated
How to add Keys and Values to the Registry
In some cases it may be necessary to add Keys or Subkeys to the Registry, or to add new
Values to existing Subkeys. This situation may arise in three common circumstances:
 Malware has deleted a required key, and you need to add it back
 The default value of a particular Subkey is being used, that key is not explicitly
coded in the Registry, and you need to assign it a different value
 You want to add non-Windows information to the Registry for any reason
The procedure is different, depending on the “side” of the Registry that needs to be
added. Adding a new Subkey is a multi-step procedure:
 Navigate to the Subkey under which the new entry should appear
 On the Edit menu, choose New and select Key
 Enter the desired name for the new Subkey
Now you will enter the appropriate Value(s) for this new Subkey, which will appear in
the right-hand pane of the Regedit window. This procedure will be the same for a new
Subkey or for adding one or more Values to an existing Subkey:
 On the Edit menu, choose New and then select the desired Data Type from the
list
 Enter the desired Name for that Value
 Double-click that Name and enter the desired Data
 Repeat if necessary to add more Values
22
Copyright © 2015, The Virus Doctor™. All rights reserved
Data Types used in the Registry
Early versions of the Registry included three possible types of data:
 REG_BINARY
 REG_DWORD
 REG_SZ
Windows NT 4.0 and the later NT-based Operating Systems include two additional data
types, although less frequently:
 REG_EXPAND_SZ
 REG_MULTI_SZ
The 64-bit versions of Windows include a new data type:
 REG_QWORD
REG_BINARY (Binary) fields consist of pairs of hexadecimal numbers, each with a value
of 0-9, a, b, c, d, e, or f. The values a through f represent decimal equivalents of 10
through 15, respectively. These fields may be any length, from one byte to 32 bytes or
longer in rare cases. An example of a Binary field can be found at
HKLM\Software\Microsoft\Windows NT\CurrentVersion\ DigitalProductID in the
following screen capture.
REG_DWORD (Doubleword) fields are always four bytes long, on doubleword
boundaries (addresses that end in 0, 4, 8, or c). They are expressed as 0x followed by
eight hexadecimal digits, then the equivalent decimal value enclosed in parentheses. An
example of a Dword field can be found at HKLM\Software\Microsoft\Windows NT\
CurrentVersion\InstallDate in the following screen capture.
REG_SZ (String) fields are composed of alphanumeric characters, such as names,
descriptions, files, paths, etc. These fields may be any length, from one byte to 32 bytes
or longer in some cases.
The SZ designates that this field is terminated internally by a Zero. An example of a
String field can be found at HKLM\Software\Microsoft\Windows NT\
CurrentVersion\SystemRoot in the following screen capture.
Copyright © 2015, The Virus Doctor™. All rights reserved
23
REG_EXPAND_SZ (Expandable String) fields are made up of alphanumeric characters
when there may be a need to expand the length of the field from an environment
variable, such as %SystemRoot%. Otherwise, fields of this Type are the same as regular
String fields, including the Zero terminator. An example of an Expandable String field
can be found at HKCR\txtfile\shell\open\command:
REG_MULTI_SZ (Multi-String) fields contain a series of strings, or multiple entries of
alphanumeric characters, arranged in tabular fashion. Once again, the field length is
variable and each one is terminated by a Zero. An example of a Multi-String field can be
found at HKLM\Software\Microsoft\Windows NT\ CurrentVersion\SvcHost:
24
Copyright © 2015, The Virus Doctor™. All rights reserved
In turn, the selected subkey contains multiple entries in tabular form, as in this example
of LocalService:
REG_QWORD (Quadword) fields are always eight bytes long, on quadword boundaries
(addresses that end in 0 or 8). They are expressed as 0x followed by 16 hexadecimal
digits, then the equivalent decimal value enclosed in parentheses. These are only
applicable to 64-bit versions of Windows. Here is an example:
Copyright © 2015, The Virus Doctor™. All rights reserved
25
Back to the Menu Bar
The View Menu
The View menu is pretty straightforward and similar to what you’ve seen in many
applications. The first selection, a toggle for Status Bar, is one you will normally want to
have selected. This shows the currently selected Key or Subkey and other useful
information in the bottom line of the Regedit window.
The next option, Split, lets you adjust the relative size of the two panes in Regedit. This
can also be accomplished by simply dragging the vertical bar between the panes to the
desired size.
Display Binary Data gives you a more detailed view of any entry, displaying its contents
in hexadecimal representation.
The final option on the View menu, Refresh, lets you ensure that what you are seeing in
the Regedit view is completely current. While you are looking at an area of the Registry,
it may have been changed as a result of normal activity on the system. To be sure you
are seeing the latest version, you may either choose this option or hit the F5 key.
The Favorites Menu
The Favorites menu was new in Regedit for Windows XP and has been carried forward
into the later versions of Windows as well. This gives you the ability to define branches
of the Registry you need to access on a regular basis, such as
HKLM\Software\Microsoft\Windows NT\CurrentVersion.
If you have some Favorites you use on a regular basis and would like to set them up on
other computers, you may export that Registry key to a thumb drive or your Virus
Repair Toolkit, then import them into the other computer. These Favorites are stored in
HKCU\Software\Microsoft\Windows\CurrentVersion\Applets\Regedit\Favorites.
26
Copyright © 2015, The Virus Doctor™. All rights reserved
The purpose and function of Control Sets in the Registry
Under HKLM\System\ you will find multiple Control Sets. The first one is normally
named ControlSet001, but the second may show up as ControlSet002 or ControlSet003.
These provide the capability to have multiple configurations of Windows XP at various
times.
The Control Set presently in use is shown as CurrentControlSet. This is actually a copy of
one of the numbered Control Sets, but it takes some digging to determine which is the
CurrentControlSet at any given time.
If you’re curious enough to take the time, you may navigate to
HKLM\System\CurrentControlSet\Control\IDConfigDB\CurrentConfig. The value shown
in that field represents the ControlSet number, ControlSet001 in this example:
Copyright © 2015, The Virus Doctor™. All rights reserved
27
One use of the multiple ControlSets is in case of a problem starting Windows. If you
encounter that situation, the Boot Menu offers several options to help resolve the
problem. One option to consider is the Last Known Good Configuration (LKG).
This option reloads the CurrentControlSet from the numbered ControlSet that was
active the last time Windows started successfully. It does not make any other changes
to the Registry.
If you ever want to verify which is the CurrentControlSet, there is another way to make
that determination. Here are the steps to follow:






In CurrentControlSet, note the value of a specific Subkey
Find that same Subkey under ControlSet002 or ControlSet003
Change the value of that Subkey
Look in CurrentControlSet to see whether that value is the same as above
If so, that was the CurrentControlSet
If not, ControlSet001 is the CurrentControlSet
Sometimes the numbering of the ControlSets is not as you would expect. While the first
one is normally named ControlSet001, it may actually be ControlSet002 or some other
number. Most systems contain two ControlSets, regardless of their numbers; some
contain three; and you may occasionally see many more than that, possibly two dozen
or more.
Further confusing the issue is the fact that all ControlSet numbers may not be
consecutive. One infected computer contained ControlSet001 through ControlSet026,
followed by ControlSet063. The reference in CurrentConfig shown above is the relative
position of that ControlSet in the list, starting with 1.
For more detailed information on ControlSets, a very old article in the Microsoft
KnowledgeBase is still available. It was written about Windows NT 3.51, but the
contents seem to apply to the later versions of NT-based Operating Systems as well:
 100010 – What are Control Sets? What is CurrentControlSet?
28
Copyright © 2015, The Virus Doctor™. All rights reserved
Working with Users in the Registry
As you might suspect, Users are defined in the Registry under HKEY_USERS. These
entries begin with .DEFAULT, which is the User Profile that is current before any User
logs onto Windows. This entry is followed by a string of entries in the format S-1-5something. These are known as Security IDs, or SIDs.
The first entries are used by various system functions. The entries starting with S-1-5-21
are the Users who have been defined on this computer. You can find a complete list of
Users in HKLM\Software\Microsoft\Windows NT\CurrentVersion\ProfileList.
For each entry in that Subkey that begins with S-1-5-21, look in the right-hand pane at
the data in ProfileImagePath. This entry will give you the path to that User Profile,
ending with the User’s name for that SID.
Registry backup and recovery techniques
Several methods are available to back up and restore the Registry in case of errors or
corruption. These are the most commonly used:
 Exporting selected Keys or Subkeys from Regedit
 Using System Restore to create Restore Points or restore from previous Restore
Points
 Making an Automatic System Recovery (ASR) backup and recovering from it
 Manually copying individual Hives
Copyright © 2015, The Virus Doctor™. All rights reserved
29
An article in the Microsoft KnowledgeBase explains some of the ways to back up and
restore the Registry in different versions of Windows. The article is as follows:
 322756 – How to back up and restore the Registry in Windows
Dealing with missing or corrupted Hives
Any time a Hive goes missing or becomes corrupted, the likelihood of successful
recovery is not very high. An article in the Microsoft KnowledgeBase covers one set of
procedures that could resolve the issue, with several variations depending upon the
exact circumstances of the problem.
This article deals with Windows XP, but there are similar articles that cover the other
versions of Windows. A search through the KnowledgeBase turns up additional articles
on the subject, but this is the most comprehensive. The article is as follows:
 307545 – How to recover from a corrupted Registry that prevents Windows XP
from starting
When a problem with a damaged Hive occurs, the most common symptom is an error
message at Windows startup. This message is in white text on a black background, and
may say “Windows XP could not start because the following file is missing or corrupt:”
followed by the name of the file. This will usually be
\WINDOWS\SYSTEM32\CONFIG\SYSTEM or
\WINDOWS\SYSTEM32\CONFIG\SOFTWARE.
In any of these cases, if you have manually copied the Hives recently, there is a good
chance of successful recovery. If not, the following procedure offers a fairly high
probability of recovering the corrupted Hive. You may save yourself some time and
trouble by following this procedure before trying the steps outlined in the article
referenced above:
In Recovery Console, follow these steps:
 chkdsk /r (Enter) – Be sure there is a space before the /r, and that is a forwardslash, not a backslash. This will run for a while, be patient!
 chkdsk /p (Enter)
 fixboot c: (Enter) – Assuming the hard drive is C:
 exit (Enter) – Computer will restart, hopefully with the Registry intact
30
Copyright © 2015, The Virus Doctor™. All rights reserved
Microsoft introduced two new tools to deal with some of these issues in Vista, and
these tools have been carried forward into Windows 7 and Windows 8. The first to try
in these cases is the Startup Repair option in the System Recovery Options dialog box.
If Startup Repair doesn’t resolve the issue, it’s time to move on to the other new tool,
Bootrec.exe. Its use is described in this article in the Microsoft KnowledgeBase:
 927392 – Use the Bootrec.exe tool in the Windows Recovery Environment to
troubleshoot and repair startup issues in Windows
Recovering from the Blue Screen of Death (BSOD)
There are many possible causes of BSOD, including some hardware failures and some
software issues. If a particular BSOD is caused by a software problem, it almost certainly
involves a Registry issue. A search of the Microsoft KnowledgeBase for “blue screen
error Windows XP” results in more than 500 articles, so it will probably be necessary to
dig deeper for the cause.
In some cases you will not see the BSOD because the computer reboots itself when such
an error occurs. If that happens, go to the Boot Menu (F8 at bootup time) and select
the option to “Disable automatic restart on system failures.” That change will allow you
to see the actual error message and start your diagnosis with more useful information.
One fairly common cause of BSOD errors involves corrupted Registry Hives and
produces the message “Windows XP Unmountable_Boot_Device Error.” This problem
frequently can be solved by using the procedure outlined above for repairs from the
Recovery Console.
Similarly, Vista, Windows 7, and Windows 8 computers with BSOD errors may respond
to the Startup Repair and Bootrec.exe procedures outlined above.
Ironically, another fairly common cause of BSOD involves corrupted installations of
popular anti-virus programs. Two of the most widely used A/V programs, Norton and
McAfee, have been known to cause this error. There are three symptoms that indicate
this is the cause of a particular BSOD:
 The BSOD occurs after the desktop is loaded, not immediately upon startup
 The Stop Code is 0x0000000A
 The error message is “IRQL_NOT_LESS_OR_EQUAL”
Copyright © 2015, The Virus Doctor™. All rights reserved
31
If your BSOD matches these symptoms, the easiest fix is to completely remove the
offending program. On another computer, download the removal tool from the
appropriate vendor’s web site and copy it to a USB drive or CD. Then reboot the BSOD
computer into Safe Mode with Command Prompt and run the removal tool.
Microsoft provides a tool you may download for help with BSOD issues. The tool is the
WinDBG Debugger, and its use is described in the following article:
 315263 – How to read the small memory dump files that Windows creates for
debugging
There is also an article in TechRepublic that outlines a detailed procedure for using this
program. The article title is How do I use WinDBG Debugger to troubleshoot a Blue
Screen of Death? You may download it from www.techrepublic.com.
Another tool that is helpful in recreating the BSOD screen is BlueScreenView, from
NirSoft, at http://www.nirsoft.net/utils/blue_screen_view.html. This free program lets
you view the Blue Screen messages as they originally appeared, and provides additional
information that may help you diagnose and resolve these errors.
In some extreme cases of Windows corruption it may be necessary to reinstall the
Operating System. It will frequently be possible to do a Repair Install, which is far less
destructive than a full installation. If you can accomplish a Repair Install, the Registry
will probably remain intact, and applications will not need to be reinstalled.
The following article describes the steps to follow in attempting a Repair Install of
Windows XP:
 978788 – How to perform an in-place upgrade (reinstallation) of Windows XP
A later change to this procedure applies if Internet Explorer 7 or 8 has been installed on
this system. If so, the browser must be uninstalled prior to reinstalling Windows XP.
The procedure to do this is outlined in the following article:
 917964 – How to perform a repair installation of Windows XP if a later version of
Internet Explorer is installed
32
Copyright © 2015, The Virus Doctor™. All rights reserved
Emergency recovery of the Registry if you don’t have a backup
When Windows XP was initially installed, a backup copy of the Hives was saved to the
C:\windows\repair folder. If you have no other usable backups of the Hives, it is
possible to recover from these copies. This usually is not a good solution, as the
restored Registry will not reflect any of the changes to the Registry since the initial
installation of Windows XP. But this is a less-destructive procedure than reformatting
the hard drive and reinstalling Windows from scratch.
The procedure for restoring the Hives from the Repair folder is included in the Microsoft
KB article referenced above, 307545. But it is important to note that this article does
not apply to OEM installations of Windows XP. If the computer that is experiencing the
problem came with the OEM version of Windows XP preinstalled from the
manufacturer, this procedure may not work as it would with the retail version. The
article describes the potential problem in more detail, to help you determine whether
this procedure is an option for you to consider.
“Bulletproofing” the Registry to keep it safe
There are a number of steps that should be taken to protect the Registry as much as
possible. Here are some options:






Remove Regedit.exe and Regedt32.exe from the local hard drive
Change the File Association for .reg files to open in Notepad instead of Regedit
Don’t let the user have Administrative Privileges
Don’t let the user have access to a Windows Boot Disk or a Windows Install CD
Don’t let the user have access to a network drive with Windows System files
Implement User Profiles and/or Group Policies to block access to the Registry
Editors
The role of Group Policies in the Registry
Group Policies are normally used to prevent the user from doing things that could
potentially harm the system or its Registry. But in some cases Group Policies may be
used maliciously to prevent the technician from finding or removing viruses or other
malevolent software.
Copyright © 2015, The Virus Doctor™. All rights reserved
33
Group Policy settings actually end up in the Registry, where they are applied at
Windows startup time. You can view and change Group Policy settings in any
Professional version of Windows, assuming you have the appropriate Permissions. The
Home editions of Windows do not include gpedit.msc, but the Home editions will honor
Group Policy settings in the Registry, however they were put there in the first place.
The most direct way to set Group Policies is to choose the Run command and enter
gpedit.msc, then click OK. This will take you to a screen that should look similar to this
(Windows XP):
Most of the Group Policies you will want to set fall under User
Configuration\Administrative Templates. One example is the Policy to “Prevent access
to Registry editing tools,” as shown here:
34
Copyright © 2015, The Virus Doctor™. All rights reserved
Double-clicking on that Setting opens the following dialog box:
Change the default value of Not Configured to Enabled, then click Apply, and this user
can no longer run Regedit.exe or Regedt32.exe. This is a protection you probably want
to include on most User logons.
Copyright © 2015, The Virus Doctor™. All rights reserved
35
There are more than 700 Group Policy settings in the modern versions of Windows,
including many that are likely to serve a useful purpose for large groups of Users. Each
Policy that is Enabled produces a corresponding entry (or entries) in the Registry. These
entries are found in one of the following Subkeys:
 HKCU\Software\Microsoft\Windows\CurrentVersion\Policies for entries under
User Configuration
 HKLM\Software\Microsoft\Windows\CurrentVersion\Policies for entries under
Computer Configuration
In addition to the Registry entries, Group Policy settings are stored in two .pol files.
These .pol files are examined at Windows startup time and loaded accordingly. At that
time the corresponding Registry keys are set as necessary to enforce the specified
policies. The file names are as follows:
 NTUser.pol for entries under User Configuration
 Registry.pol for entries under Computer Configuration
Group Policies may be defined on a local machine using Gpedit.msc as shown here, or
they may be handed down from a higher-level Domain Controller in a Client-Server
network. Any Policy may be set on the local machine, so long as it does not conflict with
a Policy handed down from higher up in the hierarchy of the network.
Most Group Policies will take effect as soon as the Apply button is clicked, or OK. But to
be sure all newly-enabled Policies are active, you may issue the following command
from a Run:
 gpupdate /force
In some cases all of the standard Group Policies may not appear in the Gpedit.msc
window. The most common reason for these omissions is the absence of the
corresponding .adm files that contain the options for those settings. A full discussion
and listing of the .adm files included in the various versions of Windows can be found in
the following Microsoft KnowledgeBase article:
 816662 – Recommendations for managing Group Policy administrative template
(.adm) files
36
Copyright © 2015, The Virus Doctor™. All rights reserved
The following article in the Microsoft KnowledgeBase describes some other possible
causes of those missing Policies, and how to get them back:
 555218 – Some Group Policy areas are missing from the Group Policy Editor
How and when to use Permissions to protect the Registry
While some Keys and Subkeys in the Registry must be updated frequently as Windows is
running and programs are opened and closed, many more should not be changed from
their initial values. In some cases it may be worth the effort to manually change the
Permissions on a given Subkey to prevent any changes from being made.
Permissions are set by Subkey, found on the Edit menu of Regedit in Windows XP and
later versions. They can be set differently for different users that are defined for a
particular computer, and may include the ability to Allow or Deny Full Control, Read, or
Special Permissions for each user.
Windows Services, svchost.exe, and the Registry
The Services that are defined in CurrentControlSet for a given computer are started
when Windows starts. Each Service is started by a process named Svchost.exe. Looking
in Task Manager, you will see multiple occurrences of Svchost.exe when Windows is
running. There will usually be at least 6 occurrences of Svchost.exe in Windows XP; in
Vista, Windows 7, or Windows 8 there may be as many as 12 or more.
Each Svchost.exe process is responsible for running one or more of the Windows
Services. A full description of the association of Services to Svchost.exe instances can be
found in the Microsoft KnowledgeBase, in the following article:
 314056 – A description of Svchost.exe in Windows XP Pro
Working with Msconfig and other Registry utility programs
Ever since Windows 98, with the exception of Windows 2000, Microsoft has provided a
safer way of working with the Run Keys than manually editing them in Regedit. The
Msconfig.exe utility program gives direct access to the entries found in the Run Keys in
HKLM and HKCU.
Copyright © 2015, The Virus Doctor™. All rights reserved
37
To open Msconfig.exe, simply type that file name into a Run command. This program
will open a window similar to this:
When the Startup tab is selected, as in the example above, all entries found in the Run
Keys under HKLM and HKCU are displayed. In 64-bit versions of Windows, the Run keys
under WOW6432Node will follow the HKCU entries. To keep an entry from starting at
Windows startup, uncheck that entry from the list. If you need to recover an entry at a
later time, you can simply recheck that box and the entry will be active again.
The “Location” column in Msconfig shows the location in the Registry where this Item
was found, starting with the top-level HKEY. Most of those entries will start with HKLM
or HKCU, but there may also be some Items with a Location of Startup or Common
Startup.
Startup or Common Startup designates that the item is in the Startup Folder instead of a
Run key. If you click on Start | Programs | Startup, you will see the Items that will start
with Windows but that are not contained in any of the Run keys.
Note that the columns for “Manufacturer” and “Date Disabled” were new with
Windows Vista and standard in Windows 7, but not included in the Windows XP version
of Msconfig. Windows 8 still includes Msconfig, but it is no longer used to specify the
programs to autostart with Windows.
38
Copyright © 2015, The Virus Doctor™. All rights reserved
When an entry is unchecked from Msconfig, that entry is moved to a different area of
the Registry. All of those disabled entries can be found in this Subkey:
 HKLM\Software\Microsoft\Shared Tools\Msconfig\Startupreg
The following example shows five entries that have been unchecked in Msconfig:
You will notice that the right-hand pane contains all the “pieces” that would be needed
to restore each entry to active status. This includes the executable name of the
program, including the full path to it, the top-level HKEY that originally contained it, and
the full path to the entry in the Registry.
Note also that this screen shot, from Windows 7, includes the date and time this entry
was disabled (“unchecked” in Msconfig). Those fields are MONTH, DAY, YEAR, HOUR,
MINUTE, and SECOND. These fields do not appear in this subkey in Windows XP, Server
2003, or previous versions of Windows.
In older versions of Windows that did not include Msconfig, there is another way of
deactivating an entry in a Run Key without actually deleting that entry. If you Edit the
entry you no longer want and place a semicolon (;) at the beginning of the Data entry,
that action will turn that line into a comment, or remark. It will still be there, but won’t
execute at Windows startup time. If you need to recover that entry, simply Edit it again,
remove the semicolon, click OK, and that entry will be active the next time Windows is
restarted.
Copyright © 2015, The Virus Doctor™. All rights reserved
39
Remote Registry Editing and how it works
Regedit allows for Remote Registry Editing, whereby one computer can access and
change the contents of the Registry on another computer across the network. This is
obviously a potentially useful feature to have; at the same time, it is just as obviously a
potentially dangerous feature to use.
If you have no need to have the Registry on a given computer accessed remotely, you
can easily disable that functionality. If you are doing Remote Registry Editing, it is
critical to follow the procedure carefully and double-check any changes you make to the
remote computer’s Registry. Creating a Restore Point or Registry Export is even more
important than the more typical environment of locally editing a Registry.
In order for Remote Registry Editing to work, several key pieces must be in place:
 The computers must be on a Client-Server network, with a Domain Controller to
authenticate users and permissions. This requirement excludes the Home
versions of Windows from participating, in either direction.
 Remote Registry Service must be running on the computer that is to be accessed
remotely
 Permissions must be granted for a specific User to access specific Keys or Subkeys
in the Registry of the remote computer
 The person doing the remote access must log on as the specified User with the
requisite Permissions
Once those pieces are in place, the steps to establish a Remote Registry Editing session
are fairly straightforward:




Open Regedit, logged on as the User who will be accessing the remote Registry
On the File Menu, choose Connect Network Registry
Select the name of the computer you need to access, then click OK
The Keys and Subkeys to which you have been granted Permission will display in
the left-hand pane of Regedit, under the Registry of your local computer
 View and Edit the contents of the remote Registry as needed
 On the File Menu, choose Disconnect Network Registry
 Exit Regedit
One critical point to bear in mind about Remote Registry Editing is that there is no
protection against the local User and the remote User making changes at the same time.
40
Copyright © 2015, The Virus Doctor™. All rights reserved
If the Users at both ends of the connection both have appropriate Permissions, this
shortcoming could lead to some undesired outcomes.
Accordingly, any Remote Registry Editing session should be completed as quickly as
possible to avoid such conflicts. And the final step, of Disconnecting the Network
Registry, is very important.
If you want to be sure nobody can access the Registry of a given computer remotely,
that functionality can be blocked in one easy step:
 Change the Startup Type of Remote Registry Service to Disabled
This is done through Control Panel | Administrative Tools | Services or by typing
in “services.msc” from the Run command. Scroll down to Remote Registry
Service, Stop the Service, then change the Startup Type to Disabled.
There are other methods that can be used to remotely edit the Registry on
another computer. These fall into several broad categories:
 Microsoft-provided utility programs, such as Terminal Services or Remote
Desktop
 Third-party utility programs, such as pcAnywhere, VNC, Dameware, and others
 Web-based remote access, such as GoToMyPC, GoToAssist, LogMeIn, and others
There is no one “best” solution, but these are some of the options that are available to
you.
Copyright © 2015, The Virus Doctor™. All rights reserved
41
42
Copyright © 2015, The Virus Doctor™. All rights reserved
SESSION 3:
VIRUS REPAIR
METHODOLOGY
Copyright © 2015, The Virus Doctor™. All rights reserved
43
44
Copyright © 2015, The Virus Doctor™. All rights reserved
Methodology for Malware Remediation – Overview
The procedure for cleaning an infected computer of malicious programs is very
straightforward. The following flowchart illustrates the process in simplified form:
Copyright © 2015, The Virus Doctor™. All rights reserved
45
How to find and identify active malicious processes
The first step in cleaning an infected computer is to determine the general type of infection it
involves. Most malicious software today falls into one of two broad categories:
 Traditional viruses, worms, and Trojan horses, which may display no obvious symptoms
of infection
 Rogue software, which generates frequent and annoying messages in attempts to
induce the user to purchase the bogus program. This category is further broken down
into three general types:
o Fake anti-virus software, claiming to have found infections on the computer
o Fake hardware diagnostics, claiming to have detected an impending hardware failure
(usually of the hard drive)
o Ransomware, claiming to be from a law-enforcement agency, and holding the
computer hostage until the user pays a “fine”
Most-likely malware today
The most common type of malware encountered since late 2009 and through 2014 falls into
the category of Rogue Software. This includes programs such as Antivirus 2010, XP Antivirus,
Total Security, Windows Recovery, and Internet Security 2012. These programs pop up, usually
at the time of Windows startup, and inform the user that their computer is infected. For a
price, generally in the range of $39.95 to $59.95, they offer to remove the infections.
A more recent variation on this approach pops up a different type of warning. Instead of
claiming to have found malware, programs such as Windows Recovery inform the user that
their hard drive is failing. To lend credibility to that claim, the user no longer sees the
programs and program groups that had been on that computer prior to the appearance of this
message.
One of the most widespread rogues since 2012 has been the FBI MoneyPak Ransomware, also
known as the Reveton Trojan. This malware takes over the user’s desktop and blocks access to
any programs or system functions until the user pays a “fine” to have the malware removed.
The first version of this malware demanded $100 in the U. S. Later variants have increased
that demand to $300.
The newest form of Ransomware first appeared in September, 2013 under the name of
CryptoLocker. Instead of blocking access to the desktop or the programs the user would
46
Copyright © 2015, The Virus Doctor™. All rights reserved
normally run, it encrypts all of the important data files and holds them “hostage” until the user
pays the ransom for the decryption key.
CryptoLocker was so widespread, so effective, and so profitable for its authors that it has
spawned a host of imitators. As of the first quarter of 2015, there have already been at least
10 similar pieces of malware released in the wild. You can find more details of this family of
Ransomware in Appendix B of this document.
If a computer is infected by one or more of these Rogues, you will want to clean those
infections before digging deeper to discover additional malware.
The following screen shot is an example of a typical message from Smart Fortress 2012:
If the computer in question shows symptoms such as this, continue with the following section
“How to terminate rogue software.” If not, skip to the section “How to find traditional viruses,
worms, and Trojan horses.”
How to terminate rogue software
These programs will usually initiate a realistic-looking scan and report detailed results, but they
are not legitimate. Even clicking on the Close button or the large red X in the top right corner
Copyright © 2015, The Virus Doctor™. All rights reserved
47
of the box will not get rid of the program; in many cases the entire box is a hyperlink, so it is
important not to click anywhere in that window.
If there is an entry for this dialog box showing in the Taskbar, the safest procedure is to rightclick and close the program from there. Alternatively, the key combination Alt-F4 may close
the program. Frequently it will not show up in the Taskbar, though, and the only safe way to
close the program is through Task Manager or Process Explorer. In Task Manager the rogue
program should appear on the Applications tab, where you can select it and End Task.
A common defense used by programs in this category is to block access to Task Manager,
Regedit, the Run command, the Command Prompt, and other tools that would normally be
used to remove the threat. If you encounter any of these issues, you may use the specific tools
included on the Virus Repair Toolkit to restore that functionality.
Another tool that may be useful to terminate rogue programs is rkill.exe, from
www.bleepingcomputer.com. You will find the download link on the Virus Repair Toolkit CD.
This program should end all processes associated with rogue security software but will not
prevent them from restarting the next time Windows is restarted.
Included in Appendix B of this document are specific procedures to deal with the most
common examples of rogue security software. If a rogue is active on the computer you are
troubleshooting, check Appendix B first for a solution specific to that malware.
If the rogue in question is not listed in Appendix B, you may apply either of two generic
solutions to remove it. We’ll start with the easier one:
1. Terminate the rogue by whatever means necessary (but do not click anywhere in the
rogue window
2. Perform a System Restore and roll back to a date and time before the rogue was active
(if necessary, re-boot into Safe Mode, Command Prompt and run System Restore from
that environment; the command is %systemroot%\system32\restore\rstrui.exe)
3. Run a Scan with MalwareBytes in Chameleon mode to find and remove the rogue and
any other malware traces it finds
If for any reason that generic procedure doesn’t remove the rogue, here is a slightly more
involved method that should take care of it:
1. Boot into Safe Mode, Command Prompt
2. From the Virus Repair Toolkit, run Enabletaskmgr.bat
3. From the Virus Repair Toolkit, run Enableregedit.bat
48
Copyright © 2015, The Virus Doctor™. All rights reserved
4. (Vista or later) From TechWARU, run Registry Investigator or (XP or older) From the
Virus Repair Toolkit, run Regstep.bat, and fix or restore Registry entries as necessary
5. Re-boot into Normal Mode and run a Scan with MalwareBytes in Chameleon mode to
find and remove the rogue and any other malware traces it finds
A surprisingly high percentage of rogues would actually be more correctly described as PUPs,
or Potentially Unwanted Programs. Although they exhibit behavior such as we normally
associate with malware, they may act like legitimate programs in some respects. Along those
lines, you may find them in the Add/Remove Programs listing and be able to remove them
from there. It’s at least worth a try!
How to find traditional viruses, worms, and Trojan horses
There is no one symptom that will always indicate a system is infected, and no sure sign that it
is not. Here are some common symptoms that could indicate the presence of malware:
 If any warning or error messages are appearing unexpectedly, that could be a symptom
of a malware infection
 If the computer is running unusually slowly, malware is a possible cause
 Start Task Manager and look on the Performance tab. With no applications running, the
CPU Usage should mostly remain less than 5%; in this example, you will notice there are
117 Processes running, so 20% is a reasonable number:
Copyright © 2015, The Virus Doctor™. All rights reserved
49
 If the computer being examined is running Windows XP or Windows Server 2003, check
the Network Connection icon in the System Tray for activity. Unless the computer is
actively communicating across the network, the lights in this icon should mostly remain
unlit.
 If the computer in question is running Vista, Windows 7, or Windows 8, you will not
have the convenient Network Connection icon to check; another alternative in these
later Operating Systems is to look at the Network tab of Task Manager and see whether
there is a significant amount of network traffic going to and from any or all of the
network adapters.
 The following example shows a laptop computer with a wireless adapter (top graph) and
a wired Ethernet connection (lower graph). You will notice that there is some activity on
both adapters, and the two graphs are completely different:
50
Copyright © 2015, The Virus Doctor™. All rights reserved
If any of these indicators reveal abnormal traffic, you will need to determine the nature of that
traffic and its source and/or destination. You can find the key pieces of this information by
using the netstat command, from a Command Prompt, with the –na parameters selected. The
results will be similar to this:
Copyright © 2015, The Virus Doctor™. All rights reserved
51
The first piece of information to examine in this listing is the Local Addresses. Any Reserved
addresses or Private addresses are probably normal and not indicative of malware activity.
These addresses are as follows:
 Reserved addresses:First octet is 0 or 127
 Private addresses: Class A –
Class B –
Class C –
10.0.0.0 through 10.255.255.255
172.16.0.0 through 172.31.255.255 or
169.254.0.0 through 169.254.255.255
192.168.0.0 through 192.168.255.255
The number following the colon in the Local Address or Foreign Address is the TCP Port being
used for this connection. While there are over 65,000 possible ports, fewer than 1,000 have
legitimate uses. Malware will typically use a port that is not otherwise assigned, to send and
receive data to and from the infected computer.
The listing of Port number assignments is maintained by IANA, the Internet Assigned Numbers
Authority. A complete listing of assigned Port numbers is located on the IANA web site, at
http://www.iana.org/assignments/port-numbers.
Any Foreign Address shown in the netstat listing represents a connection to an address outside
of the local computer. Any addresses that are not familiar should be checked out to determine
the owner of the site assigned that address. One resource for looking up TCP/IP addresses is
ARIN – the American Registry for Internet Numbers. Here is their home page, at www.arin.net:
52
Copyright © 2015, The Virus Doctor™. All rights reserved
In the top line of this web page, you may enter the IP address shown in the netstat listing, in
this example 209.85.225.103. Then click the > to the right of that box, and the owner of that
address will be revealed. In this case the address in question was assigned to Google, as shown
in the WHOIS record:
Copyright © 2015, The Virus Doctor™. All rights reserved
53
An investigation of all active connections shown in the netstat listing will uncover any malware
activity, whether there is any obvious network activity or not. Some malware is sophisticated
enough that it only sends data packets after some period of inactivity, making it less likely that
the user will notice that abrupt spike in traffic.
On the other hand, some computers that are tied into botnets may be programmed to send
data continuously, knowing that the connection could be discovered and deactivated at any
time. In other words, your mileage may vary.
Another useful option of the Netstat command is to use it with the –no parameters. This will
show all Active Connections, with their Local Address, Foreign Address, and the associated
Process ID. By cross-referencing that Process ID in Task Manager, you can determine which
process is responsible for each connection.
Tracking down traditional malware
When you have determined that a computer is infected, or have reason to believe it is, the
next step is to try and identify the infected Process(es). Most malware will show up on the
Processes tab of Task Manager, if you know what to look for.
There are several steps you can take to make your life easier in going through the Task
Manager Processes.
1.
2.
3.
4.
5.
6.
7.
8.
54
Make sure that only one user is logged on; if necessary, log off any other users
Check the box to “Show processes from all users”
Adjust the size of the Task Manager window to display as many entries as possible
Click the heading for Image Name, to sort the entries alphabetically
Using Alt-PrtSc, copy the Processes window to the Clipboard
Paste this window into a Microsoft Word document (or your preferred word processor)
If all Processes didn’t fit on a single screen, scroll down and repeat
When done, print out this document
Copyright © 2015, The Virus Doctor™. All rights reserved
The Task Manager shown here probably doesn’t look exactly the same as the Task Manager
you are looking at right now. There are two possible reasons for those differences:
 Windows XP, Server 2003, and older versions did not include the Command Line or
Description fields
 Some of the fields shown here are not in the default view; you will need to go to the
View menu of Task Manager and click on Select Columns… There you may select PID,
Command Line, and Description if they are not already checked; you may see other
columns you’d like to monitor as well.
The most tedious part of this process is going through the Processes and making a
determination of which are legitimate and which are questionable. As you go through this
process many times on multiple computers it becomes easier and requires less time to
complete. You will also come to recognize which Processes are normal and their intended
function, especially if you work on many systems that are the same make and model, with the
same applications installed on them.
There is an additional program that can be very helpful in identifying the individual Processes,
their purpose, and the company that produced them. This program, Process Explorer, was
developed by Sysinternals, which is now owned by Microsoft. You can download it from the
Copyright © 2015, The Virus Doctor™. All rights reserved
55
Microsoft web site, www.microsoft.com, free of charge. The full download link is included on
the Virus Repair Toolkit CD-ROM.
Process Explorer gives a more detailed breakdown than Task Manager of all Processes that are
running at any given time. In the following example, you will notice that most of the listed
Processes include a Description. This will help you determine whether the Process is legitimate
or malware.
If there is no Description shown for any running Process, that omission bears further
investigation. The Process may be legitimate, but you really need more information to make
that determination. Your favorite search engine should probably be the next stop.
Note that Task Manager in Windows Vista, Windows 7, and Windows 8 includes some of the
information found in Process Explorer, such as the Description and Command Line. Also, rightclicking on a Process now gives you a new option, “Open File Location.” Task Manager in
Windows XP does not include these features.
Recent enhancements to Process Explorer include additional columns that can be useful in
troubleshooting suspected malware. In this example, Autostart Location and VirusTotal
columns are included.
Autostart Location identifies the Registry key that caused this process to be started; VirusTotal
shows the historical analysis of each process by VirusTotal. The designation 0/54, for example,
indicates that 54 of the sites monitored by VirusTotal had this program in their database, and
none identified it as malicious; on the other hand, a later entry with a designation of 1/46,
indicates that one of the 46 sites with this process listed thought it was malicious.
56
Copyright © 2015, The Virus Doctor™. All rights reserved
The author of Process Explorer and the other tools from Sysinternals is Mark Russinovich, who
is now an employee of Microsoft. He has made several outstanding presentations at Microsoft
Tech-Ed conferences over the past few years. His latest, titled Malware Hunting with the
Sysinternals Tools, was presented at TechEd North America 2014. That session runs one hour
and 26 minutes, and can be viewed here:
http://video.ch9.ms/sessions/teched/na/2014/DCIM-B368.mp4.
For those Processes you could not sufficiently identify with Process Explorer, the next step is to
use a Web site that provides details of the most common entries. One of the most complete
and reliable is www.answersthatwork.com, and that is the recommended starting point.
This site contains alphabetical listings of over 3,000 Processes that may show up in Task
Manager, a description of those it recognizes, and recommendations as to whether they are
required, optional, or problematic. In the great majority of cases you can safely follow the
recommendations from this site.
There are two additional web sites that have received favorable reviews for their ability to
identify Processes found in Task Manager. These are www.systemlookup.com and
www.kephyr.com. Between these three sites, you should be able to identify most Processes.
Copyright © 2015, The Virus Doctor™. All rights reserved
57
Another web site offers a potentially useful analysis of programs you may find in Control Panel
under Add/Remove Programs. This site is www.shouldiremoveit.com, and it lists the top
10,000 installed programs on Windows computers. It also allows you to search for a specific
program and gives you more details so that you can decide whether to remove it or not. This
site is especially helpful for dealing with PUPs (Potentially Unwanted Programs), which are not
necessarily malware but may have been installed without the user’s permission.
If you are suspicious of a particular Process that is running on an infected system, there is
another web site that will allow you to upload that file and have it scanned by multiple antimalware engines. This site, referenced earlier in the discussion of Process Explorer, is
www.virustotal.com.
For any Processes that are not listed in any of these sites, your next option is to search for
those processes using your favorite search engine. The first page of “hits” should give you a
pretty good idea whether this particular entry is normal or malicious.
As you go through this process, you may want to create and maintain your own database or
spreadsheet listing the Processes you have found and identified, whether they are normal,
required or optional, legitimate or malicious, and any more details you may need to recall.
Having such a reference will reduce the time required to diagnose other computers in the
future.
Here are some suggested fields for such a database:






Executable name
Description
Company name
Application or Device associated with process
Legitimate or Malicious
Required or not
A sample spreadsheet with such a listing of Processes is included in this document as Appendix
C. The .xls file for this spreadsheet is included on the Virus Repair Toolkit, so you may use it in
your diagnostic efforts and update it with the Processes you encounter on various computers.
How to terminate the malicious processes
If you determine that a Process is malicious or unnecessary, you have several options for
terminating it. In most cases the preferred program for this purpose is Task Manager.
58
Copyright © 2015, The Virus Doctor™. All rights reserved
In Task Manager, look first on the Applications tab. If the undesired program appears there,
select it and click on “End Task.” In most cases you will need to return to the Processes tab,
select the target program and End Process from there. You may terminate all processes
associated with this program by choosing “End Process Tree” instead.
If Task Manager is not available, or if you prefer, you can End Task on processes by using
Process Explorer as an alternative. The icon in the Toolbar just to the left of the binoculars in
the above example is used to stop that process. When a Process is selected, this icon is active
and the “X” is a bright red.
Regardless of the method used to terminate a process, it may return on its own in short order.
Some sophisticated malware monitors the system to determine whether that malicious
process has been terminated; if so, it may be restarted automatically.
After terminating a process, your next objective comes in two parts:
 Determine that the system is stable, and in fact the terminated process is not required
 Verify that the terminated process stays terminated and does not restart on its own
How to determine the activation method
Once you’ve identified and terminated any malevolent Processes, the next step is to determine
how and where they are being invoked, and remove those activators. There are many places
this could be happening.
How and where malware is loaded
Early viruses that infected Windows-based computers were most commonly invoked in the .ini
files, win.ini and system.ini. These files are no longer used in the more recent versions of
Windows, so it is not likely these files are the source of an infection today.
There are multiple files that may be used to start a virus or spyware. Some of these are also
remnants of older versions of Windows, but will still serve the same function today if present.
The most common example you may encounter is Winstart.bat.
Copyright © 2015, The Virus Doctor™. All rights reserved
59
If you click on the Start button and select Programs (or All Programs), you will find a Startup
folder. Every entry in that folder will be started every time Windows starts. In most cases this
will be the desired behavior, but some malware will start from this folder as well.
By far the most likely place for malware to be invoked is in the Registry of Windows itself.
There are many Keys in the Registry that may be used for this purpose, and this workbook will
list the most frequently used such Keys.
A good starting point for tracking down the malware is the Find option in Regedit. Do a Find
for the program in question, including the file type, or extension, such as badguy.exe. In most
cases this will take you to the Subkey in the Registry that is responsible for starting this
program.
When you find the suspicious entry in the Registry, look for the Path to this executable code. If
it is contained in a Temp folder, that is highly suspicious. And it may be as easy to remove as
running a Disk Cleanup and deleting all Temporary files and Temporary Internet files. Or it may
not be that simple!
On the other hand, if a program was suspicious but you find the Path is that of a legitimate
application or hardware device, it may be legitimate after all. Again, this is an imperfect
process.
Understanding the Run Keys – what’s normal, what’s not
There may be as many as 13 Run Keys in the Registry of a given computer. These Keys are the
mechanism Microsoft intended vendors to use for the purpose of starting their applications
when Windows starts. But this is one of the most likely starting points for much of the
malware found on today’s computers.
These Run Keys fall into three broad categories. The first set consists of five Keys under HKLM,
as follows:





HKLM\Software\Microsoft\Windows\CurrentVersion\Run
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices
HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnceEx
Note that the RunServices subkeys do not belong in Windows XP, or any NT-based version of
Windows. They were a normal part of the Windows 9X Operating Systems, but were never
60
Copyright © 2015, The Virus Doctor™. All rights reserved
included in any of the newer versions of Windows. But the producers of malware have
discovered these subkeys and sometimes use them to start their nasty deeds.
The presence of one of these subkeys will vary depending upon the version of Windows
involved. The RunOnceEx subkey is no longer included by Microsoft in Windows 7, Windows 8,
or Windows Server 2008. But the malware developers may include these subkeys in the newer
Operating Systems, and they will be executed if present.
Appendix D of this document lists this and other differences in the Registry from one version of
Windows to the next. Bear in mind that these differences reflect the Microsoft-provided
contents, which may be overridden by malware.
There are similar entries under HKCU, with one notable exception. These are the Run keys you
may find under HKCU:




HKCU\Software\Microsoft\Windows\CurrentVersion\Run
HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices
HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKCU\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
The 64-bit versions of Windows contain a third area in the Registry with additional Run keys.
These subkeys also fall under HKLM, as follows:




HKLM\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
HKLM\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices
HKLM\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
HKLM\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServicesOnce
You will note there is no RunOnceEx entry under the HKCU or the WOW6432Node keys. Just
as discussed with the Run keys under HKLM, the RunServices and RunServicesOnce subkeys
should not appear under HKCU or WOW6432Node.
Regardless of the specific subkey involved, the effect is the same. At Windows startup time,
every entry in all of these subkeys is started. The entries in HKLM start regardless of who is
logged onto that machine; the entries in HKCU start only when this specific user logs on. Thus,
you may have a computer that has different Processes running when different users are logged
on. Here is an example of the Run keys under the HKLM branch of the Registry:
Copyright © 2015, The Virus Doctor™. All rights reserved
61
As you go through the entries in the right-hand pane of the Run keys, you will recognize many
legitimate programs. But in the process, you may come across some that are clearly
malevolent or at least unnecessary. You want to remove those entries.
Here are examples of some types of entries you will want to remove:
 Known viruses and spyware, such as msblast.exe, load.exe, or optimize.exe
 Unnecessary registration reminders, such as remind, remind32, register, or
register32.exe
 Any non-.exe file, especially files with extensions .bat, .com, .pif, or .reg
 Files in c:\Windows\System32 folder other than known good Windows components
 Files located in Temp folders or Temporary Internet Files
 File names that are all numeric or that are in folders whose names are all numeric
 File names that don’t spell anything or recognizable abbreviations
 File names that begin with an Underscore, for example _ix4.exe
 File names not found in Google search
 Files with today’s date
 Files that are unusually small, i.e. 4 KB or less
The easiest, safest way to remove those entries is by using Msconfig.exe and unchecking the
corresponding box for undesired items. But be aware, some of the more sophisticated
malware will detect that you have unchecked that box and will re-check it without your
permission.
62
Copyright © 2015, The Virus Doctor™. All rights reserved
Other “hiding places” where malware may be loaded
As malware has become more sophisticated, the creators have become more devious in
methods they use to invoke the infected code. Especially since the advent of Msconfig.exe, the
authors of viruses and spyware know that more users will simply remove the offenders with a
few mouse clicks. Accordingly, they have discovered an increasing number of less obvious
“hiding places” to start their dirty deeds with less likelihood of being detected and removed.
One area of the Registry that is frequently compromised by modern malware involves File
Associations, or the mechanism for handling the various file types, or extensions, that may be
encountered. Most vulnerable is the processing of .exe files, which is defined in two separate
subkeys under HKCR.
The first entry to examine is HKCR\.exe, which should look similar to this example:
The Data contained in the (Default) entry contains the name of the Registry subkey under
HKCR that provides the detailed information for properly handling this file type. Note that the
correct value of this key for the .exe entry is exefile, as shown here.
In turn, the HKCR\exefile entry should look similar to this example:
The default entry shown here represents the normal processing for an .exe file; any value other
than this string of special characters indicates that the entry has been compromised by
Copyright © 2015, The Virus Doctor™. All rights reserved
63
malware. Note that the second entry, IsolatedCommand, will not be present on Windows XP,
Server 2003, or earlier versions of Windows.
Some other subkeys that are subject to the same vulnerabilities include the following:






.bat
.com
.hta
.pif
.reg
.scr
HKCR\batfile\shell\open\command
HKCR\comfile\shell\open\command
HKCR\htafile\shell\open\command
HKCR\piffile\shell\open\command
HKCR\regfile\shell\open\command
HKCR\scrfile\shell\open\command
All of these subkeys, with the exception of Htafile, Regfile, and Scrfile, should contain only the
Default entry, with a Value of “%1” %*. The most likely to be infected is the exefile entry, but
no file type is immune to this type of attack. Another recent change in malware behavior is the
addition of new file types, directed to act as if they were .exe or other vulnerable file types.
If the Value of any of these entries (other than Htafile or Regfile) contains an executable file
name, that is almost surely malware and should be removed. Simply resetting the Value of the
entry to the default shown above will stop the damage caused by any malware using this
technique.
The Htafile entry is slightly different. It should also contain only the Default entry, but the
correct value is C:\WINDOWS\system32\mshta.exe, followed by the same string of special
characters; on a 64-bit system the path will be C:\WINDOWS\SysWOW64\mshta.exe. The
Regfile entry is different still. It should also contain only the Default entry, but the correct
value is regedit.exe “%1”. Finally, the Scrfile value should be “%1” /S.
Unlike the HKCR\exefile\shell\open\command subkey, these additional file types in
Windows Vista, Windows 7, Windows 8, and Server 2008 or 2012 do not contain the
IsolatedCommand entry with the same contents as the (Default) entry.
Another Key that is frequently used to load malware is HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon. This key contains multiple vulnerabilities in Windows XP and
Windows Server 2003, in at least the following Values. Some of these values have been
removed in the later versions of Windows, but malware could have added them back in:
 Shell should have a value of Explorer.exe; any other value for this entry, or multiple
entries, would be a sure sign of infection.
 Even if the Shell entry appears normal, double-click that Value and be sure the data
contained in that entry actually matches what is being displayed; it may not!
64
Copyright © 2015, The Virus Doctor™. All rights reserved
 Also in the Shell entry, look to the end of the contents; in some cases the malware entry
will be preceded by enough spaces (blanks) to put the malware past your field of view.
 One more method sometimes used by malware is to place an infected Explorer.exe in a
different folder and change the Shell entry to point to that version instead of the
original program provided by Microsoft; if a Path is shown in this entry, it is likely to an
infected version of Explorer.exe.
 UIHost should have a value of logonui.exe; any other value would be highly suspicious.
 Userinit should have a value of C:\Windows\System32\userinit.exe, with the comma on
the end being normal; but if there is a second entry following the comma, there is a high
likelihood it is malicious. This could be a legitimate logon script or some other such
code, but it definitely should be checked out.
 The Notify subkey under Winlogon contains entries for .dll files that are to be loaded at
Windows startup time; some malware will insert itself into this area where it is unlikely
to be detected. There will normally be between 10 and 13 entries under Notify, as
shown in the following screen shot:
Another recent variation is that some malware adds a subkey under HKCU, as
HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon. The Shell entry in
this subkey may be set to a value of cmd.exe or some other executable program. But in any
event, this entry does not belong and should be deleted.
There are two additional subkeys under HKCU that have been added or compromised by
recent strains of malware: HKCU\Software\Microsoft\Command Processor; the Autorun
entry in this subkey may be set to a malicious .exe file. Also, in a special case,
HKCU\Software\Microsoft\IntelliType Pro may be misused to start a malicious .exe file;
the AppSpecific entry in this subkey contains the name of the malicious file.
Copyright © 2015, The Virus Doctor™. All rights reserved
65
There are several more subkeys that may be used to invoke malware, such as the obscure
HKLM\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad,
as shown here:
The entries shown in this example are normal; if the machine you’re examining has any
additional entries in the right-hand pane of this window, they may be malicious.
There is a little-known area of the Registry that is sometimes used by malware to block
execution of a specific program, such as regedit.ext or taskmgr.exe. This is the Image File
Execution Options subkey, as seen in the following screen shot:
66
Copyright © 2015, The Virus Doctor™. All rights reserved
The full path to this subkey is HKLM\Software\Microsoft\Windows NT\CurrentVersion\
Image File Execution Options. You will note that, in spite of the name, this subkey has
nothing to do with traditional image files, such as .jpg or .bmp. In fact, it is not directly related
to file associations in any way.
By adding entries to this subkey, the malware can prevent any program from running,
regardless of how it is invoked. Even if you find the desired .exe file and double-click on it, you
will receive a “file not found” message if that file is included in this subkey.
There is another set of subkeys that may be modified by malware to invoke a virus or spyware
at Windows startup. These subkeys define the default folders to be used for various functions.
The first one is HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell
Folders, which should look similar to this:
If you find any of these Values different from the defaults shown here on an infected
computer, resetting them to these Values should resolve that piece of the problem. Also,
there may be a Value named Startup in the right-hand pane, which is not present in the above
example. Such an entry could also point to the location of malware.
Farther down in the left-hand pane is a similar entry for User Shell Folders, which also may
have been compromised.
Copyright © 2015, The Virus Doctor™. All rights reserved
67
These same subkeys will also exist under HKCU.
The final area in the Registry that is commonly used to invoke malware is in the ControlSets
under Services. The full Key is HKLM\System\CurrentControlSet\Services, as shown here:
The damage may take two different forms. In some cases, the malware will be added as a
Service in this subkey and is likely to go unnoticed; in other cases, a legitimate Service will be
compromised with bad data that serves the purpose of the malware.
One example of such a compromise would be in the tcpip service, where the legitimate DNS
Server address may be changed to one that is controlled by the author of the virus or malware.
Another technique that is sometimes used to start malware is to put the malicious code into a
Scheduled Task, with a starting time that may not be obvious to the user. If you have found
and removed all the malicious entries from the Registry keys covered thus far, you might want
to look into the Scheduled Tasks for any additional entries.
There is one more area, outside of the Registry, that is sometimes used to invoke malware.
This technique usually results in the entire Desktop being turned into one big hyperlink to a
malicious web site. This infection method is only applicable to Windows XP and earlier
versions of Windows.
68
Copyright © 2015, The Virus Doctor™. All rights reserved
If you go into Display Properties and select the Desktop tab, then choose Customize Desktop…
This will take you to Desktop Items, where you select the Web tab. If a Web page appears in
that window, and it’s not something you selected, that is the source of this problem.
Unchecking that box should resolve this issue.
As an additional step in cases such as this, it is recommended that you find the .html file
referenced on the Web tab and delete it. Renaming that file to a different extension would
have the same effect and may be a safer alternative.
Another useful tool to reveal “hiding places” in the Registry
Another program developed by Sysinternals is Autoruns, which shows all the Registry Keys that
can be used to cause programs or processes to start automatically. As you can tell from the
scroll bar in the following example, there are hundreds of entries tracked by this program.
There are two reasons for the large number of Keys displayed by Autoruns. One reason is the
redundancy and duplication inherent in the Registry structure itself. Another is the listing of all
Copyright © 2015, The Virus Doctor™. All rights reserved
69
Services in all Control Sets. Every Service is vulnerable to attack by malware, but only a few are
common targets.
Like Process Explorer, Autoruns.exe can be downloaded from the Microsoft web site,
www.microsoft.com, free of charge. There are actually two versions of this program; in
addition to autoruns.exe, shown here, autorunsc.exe displays similar information but from a
Command Prompt.
Dealing with Rootkits
Rootkits are a more sophisticated breed of malware that leaves no obvious traces to be
detected with the naked eye. These programs infect the core components of Windows itself,
so that no new Processes are visible in Task Manager.
Most of the major anti-virus software includes rootkit detection, and for a time the better
products would successfully detect and remove most rootkits. That success rate changed
dramatically in late 2009, though, when the first TDL3 rootkits appeared. These are also known
as TDSS, Tidserv, or Alureon rootkits.
This new generation of rootkits avoids detection and removal by most anti-virus software and
effectively mask most of their symptoms. They sometimes infect .sys files, such as ansi.sys,
atapi.sys, pci.sys, etc.
There are at least four possible symptoms of a TDL3 rootkit infection:
1. When clicking on a link from a search result, a new browser window will open to a
random web site. This usually appears to be a legitimate site, although not related to
the search that preceded it.
2. Windows Update (or Microsoft Update) usually will not run successfully. More
specifically, these failures may take either of two forms: You may see the generic error
message “Internet Explorer cannot display the webpage” or you might receive the
Microsoft Update-specific error message “The website has encountered a problem and
cannot display the page you are trying to view,” with an associated Error number
0x80072EFF.
3. Immediately following a download (especially of an anti-malware program, such as
MalwareBytes), a window pops up from the System Tray indicating that the file you just
downloaded was infected by a virus, so it has been deleted.
70
Copyright © 2015, The Virus Doctor™. All rights reserved
4. A radio station may begin playing through the computer, even with no browser window
open. This may be music, talk, or commercials, and it may be in English or some other
language. But in any event, the user did not ask for it.
If no unsolicited browser windows are opening and a computer can receive Windows Updates,
it likely is not infected by one of these rootkits.
By the middle of 2010 the anti-virus vendors were aware of the TDL3 rootkits and began to
incorporate detection of this malware into their products. This major update is one more good
reason to be sure that all computers are protected by current versions of anti-virus software.
In mid-2011, TDL4 rootkits began appearing “in the wild.” As might be expected, this latest
generation is more effective at avoiding detection and may not be removed by older versions
of anti-malware programs.
One interesting twist with the TDL4 rootkits is the addition of anti-virus functionality within the
malware itself. These infections remove other common viruses, so that the user is less likely to
know the computer is infected. If the user doesn’t realize the computer is infected, he/she has
no reason to call in a technician to check it out. Thus the infection remains, and the producer
of the malware continues to reap a profit.
In addition to all the general anti-malware programs on the market, there are also targeted
anti-rootkit programs that may be helpful in these specific situations. Here are some
examples:











aswMBR.exe, from avast.com
BitDefender Removal Tools, from BitDefender.com, 32-bit and 64-bit versions
FixTDSS.exe, from Symantec.com
GMER, from www.gmer.net; detects and removes rootkits in latest versions
HitmanPro, from SurfRight, in the Netherlands (www.surfright.nl)
MalwareBytes Anti-Rootkit, from MalwareBytes (www.malwarebytes.org)
Panda Anti-Rootkit, from Panda (www.pandasecurity.com), last updated 2007
Rootkit Buster, from Trend Micro (www.trendmicro.com)
Rootkit Revealer, from Microsoft (originally developed by Sysinternals)
Sophos Anti-Rootkit, from Sophos (www.sophos.com)
TDSSKiller, from Kaspersky (www.kaspersky.com)
While no single procedure is effective in identifying and removing all rootkits, this is a
recommended sequence of tools and manual repairs that will handle most infections of this
type:
Copyright © 2015, The Virus Doctor™. All rights reserved
71
1. Scan with TDSSKiller, check results. Write down any infections found, let TDSSKiller fix
them.
2. Scan with HitmanPro, check results. Let HitmanPro delete or quarantine any rootkits,
but nothing else.
3. If one or more .sys files are still infected, copy those files from a non-infected computer
running the same version of Windows.
4. Scan with MalwareBytes Anti-Rootkit, let it fix any rootkit infections found.
5. If rootkit infection is still present, scan with other anti-rootkit programs listed above for
confirmation and possible repairs.
Running an automated Scan to remove all traces of malware
Some viruses and spyware create multiple files and Registry entries to activate the malware
and execute the payload intended by the author of that malware. Even though it is possible to
manually find all of those entries and remove them, that is not the most practical approach.
At this stage of the diagnostic process it is appropriate to run scans for malware with one or
more trusted programs. Before running any scans, though, you can resolve some problems
and reduce the time required for the scan by removing unnecessary files from the hard drive.
You may use the Disk Cleanup program provided by Microsoft for this purpose, or Ccleaner,
which you may download using the link on the Virus Repair Toolkit CD. This program removes
more files than the Microsoft offering, and optionally cleans selected Registry entries as well.
For the sake of this procedure it is recommended that you not use Ccleaner for any Registry
changes.
An important exception to this recommended procedure involves specific rogue security
programs. If a computer is infected by Windows Recovery or similar malware that hides
programs and program groups, or data files, DO NOT run any program or procedure that
removes Temp files. Doing so could remove your ability to restore the programs as required.
Having found and removed the most obvious symptoms and components of the malware, your
final step is to run a Deep Scan with trusted anti-virus and anti-malware software. In most
cases MalwareBytes is the first choice for effective detection and removal of all types of
malware.
You can sometimes (but not always) increase the likelihood of detecting all malware present
on the system by booting into Safe Mode and running the Deep Scan in that environment. This
72
Copyright © 2015, The Virus Doctor™. All rights reserved
extra precaution will reduce the chance that a virus or spyware will remain hidden or
reactivate itself after you have removed it.
The Virus Repair Toolkit contains links to download MalwareBytes and other programs that
may also be helpful in virus and malware remediation. If you are comfortable with a particular
program and have realized successful results from it, by all means keep using it until it no
longer serves its intended purpose.
Exceptional Situations
The methodology covered in this workbook thus far will resolve the great majority of malware
issues you are likely to encounter. But with the increasing sophistication of malware authors,
you will sometimes find situations that do not respond to this approach.
The remainder of this document covers unusual circumstances that are characteristic of some
recent malware attacks and their defense mechanisms. These additional procedures and tools
are available to you if necessary.
Browser Hijackers
Browser Hijackers are sometimes difficult to fully remove. Browser Hijackers typically modify
the way the Internet Browser program works in two specific areas:
 The Home Page is changed to one other than what is desired, typically a pornographic
site, a gambling site, or a search page different from your normal search selection
 Additional Toolbars may be installed, without the option to deselect them
In the majority of cases, the steps already discussed will eliminate this form of malware; if not,
there are two recent variations in the infection vector for this type of malware that may
require manual removal:
 An increasing number of browser hijackers come through browser plug-ins, usually with
legitimate-sounding names or purposes; they may claim to be video or audio codecs or
Facebook Themes.
 A common technique used by recent browser hijackers is to modify the shortcut to the
browser itself, e.g. iexplore.exe http://www.hijackedpage.com; in most cases you can
simply delete the URL or .html document referenced, and the problem will be solved.
Note that this technique is normally used for all browsers installed on that computer.
Copyright © 2015, The Virus Doctor™. All rights reserved
73
When browser hijackers first became a problem, there were two software tools that were
helpful in the process of removing them. Both of these programs are still available free of
charge and can be downloaded from Trend Micro, at www.trendmicro.com:
 CWShredder
 HijackThis
Microsoft has an article in their KnowledgeBase related to Browser Hijackings and possible
ways to fix these problems. The article is as follows:
 320159 – Home page setting changes unexpectedly, or you cannot change your home
page setting
74
Copyright © 2015, The Virus Doctor™. All rights reserved
Recommended software tools that may help
There are some virus and malware removal tools that are very effective; others are marginally
effective or completely outdated; and some are actually malware themselves. We discussed
scareware, or rogue security software, early in this workbook.
There are numerous examples of software that is outdated against today’s threats, including
several programs that were at one time very effective. Rather than listing specific programs in
this document, the general rule is that you need not waste your time using any anti-malware
product that is not mentioned by name in this course.
These programs may also be helpful in detecting and removing the current generation of
malware and PUPs:










AdwCleaner
D7, includes Killemall.scr to terminate all but required Windows Processes
dBug, similar to Killemall.scr but faster and more flexible
Emsisoft Anti-Malware 9.0
Farbar Recovery Scan Tool (FRST)
Junkware Removal Tool (JRT)
RogueKiller
TechSuite, from RepairTech
VIPRE, from ThreatTrack Security, Inc. (formerly GFI Software)
VIPRE Rescue, for badly infected computers
Many encrypting ransomware programs, such as CryptoLocker, are effective at avoiding
detection by traditional anti-malware and Internet Security programs. To fill this void and
provide additional protection, three new programs have been introduced that, as of this
writing, seem to be effective in blocking this type of infection. They are as follows:
 CryptoPrevent, from FoolishIT (developer of D7, referenced above)
 HitmanPro.Alert, from Surfright
 MalwareBytes Anti-Exploit
There are two additional programs that are primarily marketed to end-users who want to do
their own malware repairs. These could serve a useful purpose for us as well, so you may want
to include one or both of them in your Virus Repair Toolkit. Here they are:
 GrimeFighter, from Avast, (formerly Jumpshot), www.avast.com/en-us/grimefighter
 FixMeStick, from www.fixmestick.com
Copyright © 2015, The Virus Doctor™. All rights reserved
75
Dealing with difficult situations caused by malware:
 Your anti-virus program has been disabled and can’t be reinstalled
Determine which Process is blocking access to the program and remove it. This is also a
good example of a time to run VIPRE Rescue, either in Safe Mode or from a Command
Prompt.
 You can’t access any anti-virus vendor’s web site
Check the Hosts file for URLs being redirected to specific IP addresses, restore default
Hosts file if necessary. The Hosts file will normally be found in c:\Windows\System32\
drivers\etc and in most cases should contain just one entry. This is shown as localhost,
going to an IP address of 127.0.0.1. If the Hosts file on the infected computer contains
multiple entries, especially to anti-virus or security sites, those entries need to be
removed.
If Spybot Search and Destroy with the TeaTimer option was installed on the infected
computer, it may have added multiple entries to the Hosts file – possibly 10,000 URLs or
more. These are no longer needed, nor is the Spybot program, so it should be
uninstalled.
If malware was responsible for the Hosts file entries, there will probably be about 100
URLs included. Most of these will be for anti-virus and security vendors, but in some
cases Google and other search engines will be blocked as well.
Before replacing the Hosts file with the default, you may want to rename the existing
one to Hosts.Bad or some other name. It’s possible there were some legitimate entries
in there that you may need to add back to the default Hosts file.
 You can’t connect to the Internet at all
To prevent this infected computer from accessing the Internet, some malware will
change the LAN Settings to use a Proxy Server, with a bogus address. In Internet
Explorer, Under Internet Options, on the Connections tab, click on LAN Settings. If the
box is checked for “Use a Proxy Server,” uncheck it and that should solve the
connectivity problem. If a Proxy Server is actually being used, be sure the Address and
Port are entered correctly.
76
Copyright © 2015, The Virus Doctor™. All rights reserved
Some of the more persistent malware will attempt to keep changing the Proxy Server
settings. If you make these changes and still can’t connect, check the settings again to
be sure they haven’t been changed back. It may be necessary to repeat this process
several times until the malware has been defeated.
If no Proxy Server has been set, or if the settings appear to be legitimate, the next step
may be to run the Internet Connection Wizard to re-establish the correct settings for
this computer’s Internet connection. Another option would be to run VIPRE Rescue,
either in Safe Mode or from a Command Prompt.
 You can’t run Task Manager
Most likely being blocked by a Group Policy; run enabletastkmgr.bat from the Virus
Repair Toolkit or enter the following lines from a Command Prompt to fix that setting:
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v
DisableTaskMgr /t REG_DWORD /d 0 /f
REG add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v
DisableTaskMgr /t REG_DWORD /d 0 /f
 You can’t run Regedit
Several possible causes and solutions:
 May be blocked by a Group Policy; run enableregedit.bat from the Virus Repair
Toolkit or enter the following line from a Command Prompt to fix that setting:
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v
DisableRegistryTools /t REG_DWORD /d 0 /f
 Try running regedt32 instead
 Try renaming Regedit.exe to Regedit.com
 Try renaming Regedit.exe to Yourname.com
 You don’t have a Run command on your Start Button
Most likely being blocked by a Group Policy; run enablerun.bat from the Virus Repair
Toolkit or enter the following lines from a Command Prompt to override that setting:
Copyright © 2015, The Virus Doctor™. All rights reserved
77
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v
NoRun /t REG_DWORD /d 0
REG add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v
NoRun /t REG_DWORD /d 0
If the Run command no longer shows up on the Start button, but it has not been
removed by a Group Policy, check the Taskbar settings. Right-click on an empty area of
the Taskbar and select Properties | Start Menu | Customize. On the Advanced tab, go
through the list of Start menu items until you find the Run command (near the end). Be
sure there is a check mark in that box, and the Run command will reappear.
 You can’t access a Command Prompt
Most likely being blocked by a Group Policy; run enablecommand.bat from the Virus
Repair Toolkit or enter the following line from a Run command to override that setting:
REG add HKCU\Software\ Microsoft\Windows\CurrentVersion\Policies\System /v
DisableCMD /t REG_DWORD /d 0 /f
 You can’t see Display Properties
Most likely being blocked by a Group Policy; run enabledisprop.bat from the Virus
Repair Toolkit or enter the following line from a Command Prompt to fix that setting:
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v
NoDispCPL /t REG_DWORD /d 0 /f
 You can’t run specific programs, especially MalwareBytes and similar antimalware programs
In some cases you may be able to run the program by renaming it to a slightly different
name, or changing the file type to .com instead of .exe.
Most likely blocked by a Group Policy; run unblockapps.bat from the Virus Repair Toolkit
or enter the following lines from a Command Prompt to override that setting:
REG delete HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v
DisallowRun /f
78
Copyright © 2015, The Virus Doctor™. All rights reserved
REG delete HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\
DisallowRun /va /f
Following successful removal of these Registry entries, use Group Policy Editor
(gpedit.msc) to prevent recurrence. Go to User Configuration | Administrative
Templates | System and change the State of “Don’t run specified Windows applications”
to Not Configured.
 You can’t run any .exe file
Most likely caused by deleted Subkey for exefile; double-click on Exefile fix.reg from the
Virus Repair Toolkit or enter the following line from a Command Prompt to recreate that
Subkey:
REG add HKCR\Exefile\Shell\Open\Command /t REG_SZ /ve /d “\”%1\” %*”
(Vista, Windows 7, Windows 8, or Windows Server 2008 only, add the following line):
REG add HKCR\Exefile\Shell\Open\Command /v IsolatedCommand /t REG_SZ /d
“\”%1\” %*”
Also, Symantec has a file that will reset the Shell\Open\Command values and some of
the Winlogon entries back to their default settings. That file is named UnHookExec.inf,
and you may download it from here, with full instructions and Warnings:
http://www.symantec.com/norton/security_response/writeup.jsp?docid=2004-0506140532-99
Extreme Situations
 In some cases the malware may detect that it has been removed and keep regenerating
itself, usually with the same file name in the same folder. Several steps may be
necessary to defeat this behavior:
o Change the Permissions to Read-Only on the Registry Subkey that invokes the
malevolent program.
o Change the Attributes of the malevolent program, removing Hidden, Read-Only, and
System Attributes if necessary, so that you can delete the file
o After deleting the file, create a folder of the same name in its place; this will keep a
new file from being created in that name.
Copyright © 2015, The Virus Doctor™. All rights reserved
79
 If you are unable to run MalwareBytes, VIPRE, VIPRE Rescue, or any other anti-malware
program but the computer is running reasonably well, you may want to connect the
infected computer via network to a known-good machine with a current version of one
of these programs and scan from there. This is a potentially risky approach, as it is
possible the infection could spread to the computer that is performing the scan.
 In the same scenario, but if you are not able to connect via network or choose not to do
so, it may be necessary to remove the hard drive from the infected machine and attach
it to the known-good machine with current malware protection and scan it from there.
The same caution applies as in the previous case.
 In some rare cases you may not be able to delete malevolent files from the hard drive
when Windows is running, even at a Command Prompt. Or you may not even be able to
see the infected files. To deal with those situations it may be necessary to boot from a
non-Windows Operating System.
There are a number of bootable, non-Windows CDs from which to choose. Some of the
more popular choices include Bart-PE, The Ultimate Boot CD, Hirens, Knoppix, or other
Linux variants.
Microsoft also offers the ability to create a bootable CD for use in cases of severe
malware infections, as do some anti-virus vendors. In this category AVG and Kaspersky
provide this functionality free of charge.
Links to download these CDs are included on the Virus Repair Toolkit.
80
Copyright © 2015, The Virus Doctor™. All rights reserved
Re-Imaging as an Option
In some cases it may seem that re-imaging the hard drive may be the most cost-effective
method of dealing with a severely corrupted system. That may be the case, provided certain
conditions are met:




A recent image of the desired hard drive contents and configuration is available
All programs in use on this machine are included on the image
Little or no data is stored on this local machine
The user has made no significant changes to the Desktop, default settings, etc.
If all of these conditions are true, re-imaging may be the way to go. But if you choose to take
this route, the process may be much more complicated and time-consuming than anticipated.
In order to ensure that the re-imaged hard drive provides the same functionality and
appearance as the user had prior to the malware infestation, all of these steps may be
necessary:












Back up all data from all User Profiles on that computer
Start with the original image from the computer manufacturer
Apply all Service Packs and Windows Updates
Install and update anti-virus, anti-spyware, and firewall software
Update all ancillary software, such as Adobe Reader and Flash, Java, Media Players, etc.
Install all applications from installation media (CDs or DVDs)
Install all applications that were originally downloaded
Install and update drivers for all hardware and external devices such as printers,
cameras, PDAs, external hard drives, etc.
Restore all User Profiles and all data files in each Profile
Set up and configure Internet and e-mail settings and options
Define default settings in Windows and all applications
Arrange desktop icons to meet user’s expectations
For a more detailed discussion of the steps involved in a successful re-imaging, Microsoft has a
series of 7 articles in their KnowledgeBase that you may find helpful. The first article in the
series is this one:
 896526 – Reinstalling Windows XP Home (Part 1): Introduction
This article, in turn, contains links to the remaining six parts of the overall procedure. Similar
articles are available with the details of the more recent versions of Windows. Going through
Copyright © 2015, The Virus Doctor™. All rights reserved
81
this entire process manually could easily require 6-8 hours of hands-on work, and the end
result usually will not match the user’s expectations.
There is another program that has received high marks for making this process more efficient
and more inclusive. That program is Fab’s AutoBackup 5 Pro, from Fab’s Corner at
www.fpnet.fr (this is a French company). Many techs seem to prefer the earlier Version 4, if
you can still find it. It is less expensive and uses a traditional GUI, whereas Version 5 has the
look of the Windows 8 Metro interface and may not be as intuitive to use.
Even the cost of Version 5 is nominal, at 45 Euros, but Version 4 sold for 30 Euros. If you use
this program once, it has pretty much paid for itself. At current exchange rates, 45 Euros
equates to about $60 US.
As of January, 2015 the latest release is Version 6. It is said to have “a bunch of fixes and
improvements,” and the price remains at 45 Euros.
82
Copyright © 2015, The Virus Doctor™. All rights reserved
Appendix A -- Virus Remediation Training Procedure, Step by Step
A. Deal with rogue, if present
1.
2.
3.
4.
2.
3.
4.
5.
6.
2.
3.
4.
Check Appendix B of VRT Workbook for specific solution
(Generic Solution 1 starts here)
Terminate rogue by whatever means necessary (do not click anywhere in rogue window)
System Restore to date and time before rogue was active (if necessary, re-boot into Safe Mode,
Command Prompt and run System Restore from that environment)
Run MalwareBytes in Chameleon mode to find and remove rogue and any other infections found
(Generic Solution 2 starts here, if Generic Solution 1 doesn’t work)
Boot into Safe Mode, Command Prompt
From Virus Repair Toolkit, run Enabletaskmgr.bat
From Virus Repair Toolkit, run Enableregedit.bat
(Vista or later) From TechWARU, run Registry Investigator or (XP or older) From Virus Repair
Toolkit, run Regstep.bat, and fix or restore Registry entries as necessary
Re-boot, run MalwareBytes Chameleon to find and remove rogue and any other infections found
(Generic Solution 3 starts here, if Generic Solution 2 doesn’t work)
Boot from Kickstart thumb drive (Change Boot Sequence if necessary)
Let HitmanPro run to completion, Quarantine any rootkits, bootkits, or threats found in Boot
Sector, Master Boot Record, or Track 0 of hard drive
Remove Kickstart thumb drive and boot normally from hard drive
B. Identify and remove traditional malware
1.
2.
3.
4.
5.
6.
7.
8.
9.
Open Task Manager and look for any malicious or suspicious processes running
If Task Manager won’t run, run Enabletaskmgr.bat from Virus Repair Toolkit
End Process Tree on each process identified in previous step, record process name
Open Regedit, find activation point for each of these processes and delete it
If Regedit won’t run, run Enableregedit.bat from Virus Repair Toolkit
Run Process Explorer, look for malicious processes in VirusTotal column
Handle these processes the same as those found manually using Task Manager
If you didn’t do Step A5 (above), do it now
Re-boot normally, scan with MalwareBytes and remove any infections and PUPs found
C. Find and remove any rootkit infections
1.
2.
3.
4.
5.
Are there obvious symptoms of rootkit (Google redirects, infected download, radio playing)? If
so, go to Step 3.
Perform a manual Windows Update. If that works, probably no rootkit present  Done. May
continue with Steps 3-5 for added confidence that there is no rootkit infection.
Run TDSSKiller, from Kaspersky; before starting scan, click on “Change Parameters” and be sure
that all three boxes under “Additional options” are checked. Let it fix any rootkit infections it
finds, then re-boot normally.
Scan with HitmanPro, let it Quarantine any rootkits it finds; don’t let it delete any files, and don’t
quarantine anything but rootkits.
If HitmanPro found and quarantined any rootkits, re-boot one last time and verify that all
symptoms of infection are gone.
Copyright © 2015, The Virus Doctor™. All rights reserved
83
84
Copyright © 2015, The Virus Doctor™. All rights reserved
Appendix B -- Point solutions for specific infections
Security Tool Scareware:
1. From the Virus Repair Toolkit, run Process Explorer. If the program will not run
successfully from the CD, it may be necessary to take the following additional steps:
 Copy the program procexp.exe from the CD to a new folder on the hard drive. Do
not copy it to the Desktop, the Windows folder, or any subfolder under Windows.
 Rename the copied procexp.exe to explorer.exe
 From a Command Prompt, go to the folder that contains the renamed explorer.exe
and run it
2. Disable any processes that are named (random number).exe, such as 12345678.exe, etc.
3. Run MalwareBytes and do a Quick Scan to find and remove Security Tool. Do not reboot
the system prior to full removal, otherwise the process will load again. In that case,
repeat Step 2 to disable the process.
Note: This procedure is adapted from an article on About.com by Mary Landesman.
Copyright © 2015, The Virus Doctor™. All rights reserved
85
Internet Security 2010 Scareware:
1.
2.
3.
4.
5.
Open Regedit and select HKEY_CLASSES_ROOT
Open Task Manager and select the Processes tab
Look for av.exe or ave.exe and End Process on whichever is present
Return to Regedit and do a Find for the executable that was found in Step 3
If av.exe or ave.exe is found in a \Shell\Open\Command under Exefile, double-click on
the file Exefile fix.reg from the Virus Repair Toolkit and, when prompted, confirm that
you want to import that key
6. Hit F3 to Find Next
7. If any more entries for av.exe or ave.exe are found under HKCR, double-click on the file
UnHookExec.inf from the Virus Repair Toolkit
8. Close Regedit
9. Click Start | Run | then type %appdata% and press Enter. This will open Windows
Explorer to the Application Data folder for the current user. Verify that the Windows
Explorer options are set to show all Hidden Files, System Files, and Files in System
Folders, then Search that folder for av.exe or ave.exe and delete the file(s) if found.
10. If you are unable to delete the malicious file(s), these additional steps may be required:
 From a Command Prompt, navigate to the current user’s Application Data folder
 Type in the following command: attrib –r –h –s *.* to remove the Read-Only,
Hidden, and System attributes from the files in that folder
 Return to Step 9
Note: This procedure is adapted from an article on About.com by Mary Landesman.
86
Copyright © 2015, The Virus Doctor™. All rights reserved
Antivirus8 or Antivirus 8:
1. Copy the file Mbam-setup.exe from the Virus Repair Toolkit to the desktop of the
infected computer.
2. Rename the file on the desktop to iexplore.exe.
3. Close all programs and any open windows.
4. Double-click on the iexplore.exe icon to install MalwareBytes.
5. At the end of the MalwareBytes installation, uncheck both of the boxes that are
selected by default, then click Finish.
6. Do not re-boot the computer.
7. Look in C:\Program Files\Malwarebytes’ Anti-Malware\ for mbam.exe.
8. Rename mbam.exe to iexplore.exe.
9. Double-click on iexplore.exe to run MalwareBytes.
10. Click on the Update tab and click on Check for Updates.
11. If MalwareBytes does not successfully download the latest updates, follow the
procedure described in the Virus Repair Toolkit documentation to obtain the latest
definitions.
12. Click on the Scanner tab and choose Perform Full Scan, then click on the Scan button.
13. When the scan has completed, click on Show Results. At least one entry should show up
as Rogue.Antivirus8.
14. Click on Remove Selected. If it indicates a reboot is required after removing these
items, reboot and let Windows come up normally.
15. Uninstall MalwareBytes with the modified file names. If you want to reinstall it for
future use, leave the default file names in place.
Note: This procedure is adapted from a procedure found in www.bleepingcomputer.com.
Copyright © 2015, The Virus Doctor™. All rights reserved
87
Total Security:
1. With the Virus Repair Toolkit in the CD drive of the infected computer, open it with
Windows Explorer.
2. Double-click on the ProcessExplorer tab.
3. Copy the file procexp.exe to the desktop of the infected computer.
4. Rename that file to iexplore.exe.
5. Double-click on the iexplore.exe icon to run Process Explorer.
6. In Process Explorer, look for a file named tsc.exe or an all-numeric file name. The Total
Security program will show a shield or padlock icon next to the file name.
7. Click on that process, then click on the red X in the toolbar to kill that process. Click Yes
when it asks whether you are sure.
8. Copy the file Mbam-setup.exe from the Virus Repair Toolkit to the desktop of the
infected computer.
9. Close all programs and any open windows.
10. Double-click the file Mbam-setup.exe on the desktop to install MalwareBytes on the
infected computer.
11. At the end of the MalwareBytes installation, leave both of the boxes checked that are
selected by default, then click Finish. The MalwareBytes program will open.
12. Click on the Scanner tab and choose Perform Quick Scan, then click on the Scan button.
13. When the scan has completed, click on Show Results. At least one entry should show up
as Rogue.Total.Security.
14. Click on Remove Selected. If it indicates a reboot is required after removing these
items, reboot and let Windows come up normally.
Note: This procedure is adapted from a procedure found in www.bleepingcomputer.com.
88
Copyright © 2015, The Virus Doctor™. All rights reserved
Virus Protection New Age of Antivirus Software:
These solutions were derived from the following article:
http://en.kioskea.net/forum/affich-295938-virus-protection-2010-new-age-crap
1. Boot the computer into Safe mode with Command Prompt.
2. At the Command Prompt type Explorer.exe and Press Enter. Windows Explorer opens.
Locate the file fix.inf on the Virus Repair Toolkit CD, right-click and select Install. Close
Windows Explorer.
3. In the Command Prompt type shutdown -r and press Enter. The computer will be
rebooted.
4. Install MalwareBytes Anti-malware (MBAM). Update definitions and perform a Quick
Scan. This should remove most malware, if not all. Perform a Deep Scan to be sure.
Or, an alternative version:
1.
2.
3.
4.
Boot into Safe Mode, Command Prompt
From the Virus Repair Toolkit CD, run the batch file enableregedit.bat
Re-Boot into Safe Mode with Networking
Run Regedit and navigate to
HKLM\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon
5. Change the Shell entry to Explorer.exe
6. Install MalwareBytes, update definitions (from Virus Repair Toolkit CD), and perform a
Quick Scan
7. Boot into normal mode, perform a Deep Scan with MalwareBytes if desired
Copyright © 2015, The Virus Doctor™. All rights reserved
89
Windows Recovery:
The following procedure is based on work done by www.bleepingcomputer.com, with some
adjustments for alumni of the Virus Remediation Training. The full procedure is available at
this location: http://www.bleepingcomputer.com/virus-removal/remove-windows-xprecovery.
1. In Task Manager, find and End Process on Processes associated with this malware.
There may be two of these processes running – one will have an all-numeric filename,
and the other will be 11 to 13 characters in length, with a mix of Caps and lower-case
letters and possibly numbers as well.
2. If Task Manager won’t run, use the Enabletaskmgr.bat program from the Virus Repair
Toolkit to restore that functionality. Or, use Process Explorer for this step.
3. Download and run the latest version of rkill.exe, from this location:
http://www.bleepingcomputer.com/download/anti-virus/rkill.
4. Do not restart Windows.
5. Install MalwareBytes, then manually update the definitions using the procedure
outlined in the Virus Repair Toolkit.
6. Run a Quick Scan with MalwareBytes, and have it Remove all selected items.
7. Restart Windows if required for MalwareBytes to finish removing detected threats.
8. Download and run the latest version of unhide.exe, from this location:
http://download.bleepingcomputer.com/grinler/unhide.exe.
9. The following Registry keys should have been removed by Unhide.exe. If not, examine
the contents for these values. If the values match what is shown here, either delete
those entries or change the values to the correct settings. For example, in HKCU and
HKLM, …DisableTaskMgr should have a value of 0.
 HKCU\Software\Microsoft\Internet Explorer\Download – CheckExeSignatures = ‘no’
 HKCU\Software\Microsoft\Internet Explorer\Main – Use FormSuggest = ‘yes’
 HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced –
Hidden = 0
90
Copyright © 2015, The Virus Doctor™. All rights reserved
 HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced –
ShowSuperHidden = 0
 HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings –
CertificateRevocation = 0
 HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings –
WarnonBadCertRecving = 0
 HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop –
NoChangingWallpaper = 1
 HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations –
LowRiskFileTypes = ‘{hq:/s’s:/ign:/uyu: … /kqf:/
 HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments –
SaveZoneInformation = 1
 HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer –
NoDesktop = 1
 HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System –
DisableTaskMgr = 1
 HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System –
DisableTaskMgr = 1
10. Open and remove these files, then remove them from the Recycle Bin:
 %AppData%\Microsoft\[random.exe]
 Note: Appears to be mislabeled, in example on Windows XP computer 4 files were
found in c:\Documents and Settings\All Users\Application Data, at same level as
Microsoft. Example files included 15654708 and 15654708.exe,
dsPRWEQVDghDN.exe and PLAcgIBC9DAX
The latest version of Unhide.exe should restore all program menus and shortcuts to their
original locations. If not, the final steps will be different for Windows XP than for Vista,
Windows 7 or 8. Choose one of the following procedures, depending upon the OS in use.
In case of Windows XP, copy the entire content of this folder:
C:\DOCUME~1\user_name\LOCALS~1\Temp\smtmp\1
to C:\Documents and Settings\All Users\Start Menu
and the entire content of this folder:
C:\DOCUME~1\user_name\LOCALS~1\Temp\smtmp\1\Programs
Copyright © 2015, The Virus Doctor™. All rights reserved
91
to C:\Documents and Settings\All Users\Start Menu\Programs
and the entire content of this folder:
C:\DOCUME~1\user_name\LOCALS~1\Temp\smtmp\2
to C:\Documents and Settings\user_name\Application Data\Microsoft\Internet Explorer\Quick
Launch
and the entire content of this folder:
C:\DOCUME~1\user_name\LOCALS~1\Temp\smtmp\4
to C:\Documents and Settings\All Users\Desktop
In case of Vista, Windows 7, or Windows 8, copy the entire content of this folder:
C:\Users\user_name\AppData\Local\Temp\smtmp\1
to C:\Program Data\Start Menu
and the entire content of this folder:
C:\Users\user_name\AppData\Local\Temp\smtmp\1\Programs
to C:\Program Data\Start Menu\Programs
and the entire content of this folder:
C:\Users\user_name\AppData\Local \Temp\smtmp\2
to C:\Users\user_name\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch
and the entire content of this folder (if found):
C:\Users\user_name\AppData\Local \Temp\smtmp\3
to C:\Users\user_name\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User
Pinned\Taskbar
and the entire content of this folder:
C:\Users\user_name\AppData\Local\Temp\smtmp\4
to C:\Program Data\Desktop
11. Run a Deep Scan in MalwareBytes to make sure no more infections are detected.
12. Check for Rootkit activity using the procedures covered in the Virus Remediation
Training, and remove if found.
92
Copyright © 2015, The Virus Doctor™. All rights reserved
Win 7 Internet Security 2012:
This rogue security program goes by at least 15 different names, depending partially upon the
version of Windows on which it is running. The first part of the name will be XP, Vista, or Win
7, accordingly. The last part will be 2012, and the middle will be Antispyware, Antivirus,
Security, Home Security, or Internet Security.
Unlike many programs of its type, this rogue may only show its symptoms to one user defined
on the infected computer. Other users may see no visible signs of infection, but the rogue
does infect them in less-obvious ways.
The following procedure is based on work done by www.bleepingcomputer.com, with some
adjustments for alumni of the Virus Remediation Training. The full procedure is available at
this location: http://www.bleepingcomputer.com/virus-removal/remove-win-7-antispyware2012.
1. On a clean computer, download the file FixNCR.reg from this location:
http://download.bleepingcomputer.com/reg/FixNCR.reg.
2. Copy FixNCR.reg to a removable device, insert that device into the infected computer,
and double-click the file’s icon.
3. Allow the data to be merged into the Registry of the infected computer.
4. In Task Manager, find and End Process on Processes associated with this malware. The
main process will be three random letters such as kdn.exe.
5. Download the latest version of rkill.exe, from this location:
http://www.bleepingcomputer.com/download/anti-virus/rkill. Download the version
named iexplore.exe, save it to the Desktop, and run it from there.
6. Install the latest version of MalwareBytes, then manually update the definitions using
the procedure outlined in the Virus Repair Toolkit.
7. Run a Quick Scan with MalwareBytes, and have it Remove all selected items.
8. If necessary to complete the MalwareBytes cleanup, restart Windows in Normal Mode
and log in as the user who was infected.
9. Check for Rootkit activity using the procedures covered in the Virus Remediation
Training, and remove if found.
10. Run a Deep Scan in MalwareBytes to make sure no more infections are detected.
Copyright © 2015, The Virus Doctor™. All rights reserved
93
System Fix:
The rogue security program named System Fix is a variant of Windows Recovery and similar
members of the Fake HDD family of rogues. The following procedure is based on work done by
www.bleepingcomputer.com, with some adjustments for alumni of the Virus Remediation
Training. The full procedure is available at this location:
http://www.bleepingcomputer.com/virus-removal/remove-system-fix.
1. Boot into Safe Mode with Networking and log in as the user who is infected by Sytem
Fix.
2. From the Virus Repair Toolkit, run Enabletaskmgr.bat to restore access to Task Manager.
3. Run Enablecommand.bat, Enablerun.bat, and Enableregedit.bat as required.
4. Do not run Disk Cleanup, Ccleaner, ComboFix, or any program that deletes Temp files.
5. In Task Manager, find and End Process on Processes associated with this malware.
There may be two of these processes running – one will have an all-numeric filename,
and the other will be 11 to 13 characters in length, with a mix of Caps and lower-case
letters and possibly numbers as well.
6. Download the latest version of rkill.exe, from this location:
http://www.bleepingcomputer.com/download/anti-virus/rkill. Download the version
named iexplore.exe, save it to the Desktop, and run it from there.
7. Install the latest version of MalwareBytes, then manually update the definitions using
the procedure outlined in the Virus Repair Toolkit.
8. Run a Quick Scan with MalwareBytes, and have it Remove all selected items.
9. Restart Windows into Normal Mode and log in as the user who was infected.
10. Download and run the latest version of unhide.exe, from this location:
http://download.bleepingcomputer.com/grinler/unhide.exe. This program will run for a
while, as it is changing the attributes of thousands of files.
11. Verify that all program groups and programs are visible and accessible.
12. Restore the desktop wallpaper and/or theme as required.
13. Check for Rootkit activity using the procedures covered in the Virus Remediation
Training, and remove if found.
14. Run a Deep Scan in MalwareBytes to make sure no more infections are detected.
94
Copyright © 2015, The Virus Doctor™. All rights reserved
Smart Fortress, Live Security Platinum, or System Progressive Protection:
The rogue security programs named Smart Fortress or Live Security Platinum are almost
identical variants of Windows Recovery and similar members of the Fake HDD family of rogues.
The following procedure is based on work done by www.bleepingcomputer.com, with some
adjustments for alumni of the Virus Remediation Training. The full article on Smart Fortress is
here: http://www.bleepingcomputer.com/virus-removal/remove-smart-fortress-2012, and
Live Security Platinum is here: http://www.bleepingcomputer.com/virus-removal/remove-livesecurity-platinum.
1. Boot into Safe Mode with Networking and log in as the user who is infected by the
rogue.
2. Open the browser of your choice and go to this URL:
http://www.bleepingcomputer.com/download/fixexec/. Click on the Download
Renamed Version button and save the file to the Desktop.
3. Double-click the icon on the Desktop to repair the infected Registry.
4. If you can’t connect to the Internet, check for a Proxy Server and uncheck that box in
LAN Connections.
5. Install the latest version of MalwareBytes, then manually update the definitions using
the procedure outlined in the Virus Repair Toolkit.
6. Run a Quick Scan with MalwareBytes, and have it Remove all selected items.
7. Restart Windows into Normal Mode and log in as the user who was infected.
8. Check for Rootkit activity using the procedures covered in the Virus Remediation
Training, and remove if found.
9. Run a Deep Scan in MalwareBytes to make sure no more infections are detected.
Note: A recent variation on this rogue is named System Progressive Protection. It responds to
two simpler methods of removal. You may follow either of these procedures:
 Enter a Registration Code AA39754E-715219CE. This will remove the rogue from view,
but the system is still infected. Pick up with Step 5 above.
 Perform a System Restore to a date and time prior to the appearance of System
Progressive Protection. Pick up with Step 5 above.
Copyright © 2015, The Virus Doctor™. All rights reserved
95
S.M.A.R.T. HDD:
The rogue security program named S.M.A.R.T. HDD is a variant of Windows Recovery and
similar members of the Fake HDD family of rogues. The following procedure is based on work
done by www.briteccomputers.co.uk, with some adjustments for alumni of the Virus
Remediation Training.
1. Boot into Safe Mode with Networking and log in as the user who is infected by
2.
3.
4.
5.
6.
7.
S.M.A.R.T. HDD.
From the Virus Repair Toolkit, run Enabletaskmgr.bat if necessary to restore access to
Task Manager.
Run Enablecommand.bat, Enablerun.bat, and Enableregedit.bat as required.
Do not run Disk Cleanup, Ccleaner, ComboFix, or any program that deletes Temp files.
In Task Manager or Process Explorer, find and End Process on Processes associated with
this malware. There will probably be one such process running – it will be 11 to 15
characters in length, with a mix of Caps and lower-case letters and possibly numbers
and special characters as well.
Find and delete the Smart HDD folder, the .exe and related files
Open Regedit, look for the .exe file in all of the following keys and delete if found:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce
8. Install the latest version of MalwareBytes, then manually update the definitions using
the procedure outlined in the Virus Repair Toolkit.
9. Run a Quick Scan with MalwareBytes, and have it Remove all selected items.
10. If all programs and program groups are not visible, download and run the latest version
of unhide.exe, from this location:
http://download.bleepingcomputer.com/grinler/unhide.exe. This program will run for
a while, as it is changing the attributes of thousands of files.
11. Verify that all program groups and programs are visible and accessible.
12. Restart Windows into Normal Mode and log in as the user who was infected.
13. Restore the desktop wallpaper and/or theme as required.
14. Check for Rootkit activity using the procedures covered in the Virus Remediation
Training, and remove if found.
15. Run a Deep Scan in MalwareBytes to make sure no more infections are detected.
96
Copyright © 2015, The Virus Doctor™. All rights reserved
FBI MoneyPak Ransomware or the Reveton Trojan, aka
Computer Crime and Intellectual Property Section
Department of Justice
ICE Cyber Crime Center:
This family of rogues has become the most widespread malware in recent history, and they are
especially persistent. They block any other programs from running, and the normal Windows
desktop is replaced by the threatening screen demanding payment via MoneyPak.
There have been at least four generations of this malware to date, and a different procedure
may be required to remove each of them. The following methods will remove all known
variants of this malware from infected computers. They should be used in the order indicated,
starting with Method 1 and continuing through the remaining approaches as required.
Method 1
Some of the early strains of this malware would allow you to boot into Safe Mode With
Networking. If that is the case, this simple procedure should remove the infection:
1.
2.
3.
4.
5.
Restore the computer to a date and time prior to the onset of the infection
Install MalwareBytes, update the definitions, and perform a Quick Scan
Let MalwareBytes quarantine any infected files it finds
Re-boot and verify that the infection is no longer present
Go to the “Common conclusion” section, below
Method 2
If the malware allows you to boot into Safe Mode With Networking but the procedure outlined
in Method 1 does not resolve the issue, the following procedure is effective in dealing with the
second generation of this malware. This procedure was developed by The Virus Doctor™ and is
available only to alumni of the Virus Remediation Training. It should remove the infection in
less than 30 minutes:
1.
2.
3.
4.
Boot into Safe Mode with Command Prompt
From the Virus Repair Toolkit, run the program enableregedit.bat
From the Virus Repair Toolkit, run the program enabletaskmgr.bat
From the Virus Repair Toolkit, run the program regstep.bat (in Windows XP) or regstep –
Win7.bat (in Vista, Windows 7, or Windows 8)
Copyright © 2015, The Virus Doctor™. All rights reserved
97
5. When regstep reaches HKCU\Software\Microsoft\Windows\CurrentVersion\Run, look in
the right-hand pane for an unusual-looking entry, such as hnNPUrMR21XBMJ2. The
value of this entry will be a random-named .exe file in the %UserProfile%\Application
Data folder, such as Ii0Nm8sy.exe. Double-click this entry, insert a semicolon and a
blank space before the current contents, and click OK. Write down the name of this
entry and the full path to the .exe file, then close Regedit.
6. When regstep reaches HKLM\Software\Microsoft\Windows\CurrentVersion\Run, look
in the right-hand pane for the same entry as was found in HKCU. Double-click this entry,
insert a semicolon and a blank space before the current contents, click OK, then close
Regedit.
7. When regstep reaches HKLM\Software\Microsoft\Windows NT\CurrentVersion\
Winlogon, look in the right-hand pane for the Shell entry. The value of this entry will
probably be the same as the malicious .exe file found in both Run keys. If so, change it
to Explorer.exe (in Windows XP) or explorer.exe (in Vista, Windows 7, or Windows 8),
then close Regedit.
8. When regstep reaches HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\
Explorer, look in the right-hand pane for an entry named NoDesktop. If this has a value
of 1, change it to 0. Then look in HKCU\Software\Microsoft\Windows\CurrentVersion\
Policies\System for entries named Disableregistrytools and DisableTaskMgr. Both of
these entries should have been set to values of 0 by the commands executed in Steps 2
and 3 of this procedure, but if either shows a value of 1, change it to 0, then close
Regedit.
9. When regstep has finished, navigate to the location of the executable file as found in
Step 5 of this procedure, then delete that file.
10. In the folder that contained the malicious .exe file, use the md command to create a
new folder with the same name as the executable, including the .exe extension.
11. Shut down and restart into Normal Mode.
12. Install the latest version of MalwareBytes and update the definitions.
13. Run a Quick Scan with MalwareBytes, and have it Remove all selected items, then
restart in Normal Mode.
14. If there are no icons showing on the desktop, right-click on the desktop, go to Properties
| Arrange Icons By | Show Desktop Icons.
15. Go to the “Common conclusion” section, below
Note: %UserProfile% refers to the current user's profile folder. By default, this is
C:\Documents and Settings\<Current User> for Windows 2000/XP, C:\Users\<Current User> for
Windows Vista/7/8, and c:\winnt\profiles\<Current User> for Windows NT.
98
Copyright © 2015, The Virus Doctor™. All rights reserved
Method 3
The latest variants of this malware modify the Master Boot Record in such a way as to prevent
the use of the F8 key at Windows startup time to enter the Advanced Boot Options. If this is
the strain you’re dealing with, it will be necessary to boot from a USB thumb drive that will
automatically launch a program to remove the infection.
*** Note ***
This procedure presently is not compatible with Windows 8. A separate procedure for
Windows 8 computers infected by this strain of the FBI MoneyPak virus is included at the end
of this writeup.
The following procedure is adapted from a writeup in Bleeping Computer, shortened and
modified to take advantage of tools that are included in the Virus Repair Toolkit. You may find
the original procedure at http://www.bleepingcomputer.com/virus-removal/remove-icecyber-crime-center-ransomware if you need any further details of the steps outlined here.
1. Download the latest version of HitmanPro.Kickstart from this address:
http://www.surfright.nl/en/downloads. You will download the 32-bit or 64-bit version
to match the computer you are downloading the program onto; the Windows version
installed on the infected computer does not factor into this decision.
2. When the download is complete, you will create a bootable USB thumb drive to be used
on the infected computer. The contents of this thumb drive will be completely erased,
so use one with no important data on it. Any size thumb drive from 1 GB and up will
work for this purpose. Insert the thumb drive and continue to the next step.
3. Double-click the appropriate executable file downloaded in Step 1 above. The file name
will be either HitmanPro.exe (for 32-bit versions of Windows) or HitmanPro_x64.exe (for
64-bit versions of Windows).
4. At the bottom of the start screen you will see an unlabeled icon next to the Settings
button. If you hover over this icon, you’ll see it says “Create HitmanPro.Kickstart USB
flash drive.” Click on this icon.
5. Click on the desired thumb drive, then click on Install Kickstart.
6. You will be given a final warning that the USB flash drive will be erased. To proceed,
click on the Yes button.
7. The program will download the necessary files and make the thumb drive bootable.
When the process has completed, click on the Close button to close Kickstart.
8. Remove the thumb drive from the computer, turn off the infected computer, and insert
the thumb drive into it.
Copyright © 2015, The Virus Doctor™. All rights reserved
99
9. Power on the infected computer and modify the Boot Sequence if necessary to boot
first from a USB device.
10. You should see the Kickstart Boot Menu, with three options. If you do not, make sure
the USB drive is first in the boot sequence. From that boot menu, choose Option 1.
11. When Windows starts, log on normally if required. At that point the malware will start
as it has been since the computer became infected. After a brief period of time (usually
15-20 seconds, could be as long as one minute or so), the HitmanPro window will
appear on top of the ransomware. Click on the Next button to start the cleaning
process.
12. On the HitmanPro Setup screen, choose the option “No, I only want to perform a onetime scan to check this computer,” then click on the Next button.
13. HitmanPro will now scan the computer for infections and show its results as it
encounters malware. If the background of the screen turns red during the scan, that
indicates it has found malicious software that is significant. The total scan time is
usually less than 5 minutes.
14. Click on the Next button to have HitmanPro remove the detected infections. When it is
done you will see a Removal Results screen that shows the status of the infections that
were identified and removed. Click Next on this screen, and then Reboot on the next
screen.
15. The system should now boot into the normal Windows environment. The user should
log in as normal, and the malware will be gone. The normal desktop, wallpaper, and
icons should be intact, and all programs should run as they did prior to the infection.
16. On some variants of this malware, the user is taken to a Command Prompt window
instead of the normal desktop. If that happens, in the Command Prompt window type
explorer.exe, followed by the Enter key.
17. Once the desktop appears normally, run the program fixshell.bat from the Virus Repair
Toolkit. This will ensure that the desktop comes up immediately the next time Windows
is restarted.
18. Restart Windows and verify that everything is back to normal functionality.
19. Go to the “Common conclusion” section, below
Method 4
This is a variation on Method 3 that may be necessary in especially persistent versions of this
family of malware. If you have been following the steps in Method 3, but the Ransomware
screen reappears during Step 13, you may need to use the Force Breach mode of Kickstart.
In this case you will follow Steps 1 through 10 as described in Method 3. As soon as you have
selected Boot Option 1 from the Kickstart Boot Menu, press and hold the left CTRL key until
HitmanPro starts. This enables the Force Breach mode, which terminates all non-essential
100
Copyright © 2015, The Virus Doctor™. All rights reserved
Windows applications. You can verify if this mode is enabled by looking at the bottom of the
HitmanPro screen. That line should say “Force Breach: HitmanPro terminated nn processes.”
The number nn may be anywhere from 5 to 30 processes.
If a logon is required when starting Windows, logon normally and then immediately press and
hold the left CTRL key until HitmanPro starts.
In either case, once you have verified that you are in Forced Breach mode, continue the
process from Method 3 at Step 11.
Common Conclusion
 Check for Rootkit activity using the procedures covered in the Virus Remediation
Training, and remove if found.
 Run a Deep Scan in MalwareBytes to make sure no more infections are detected.
Windows 8 computers infected with the FBI MoneyPak ransomware
If a computer running Windows 8 is infected by malware in this family, the first step is to
enable the Advanced Boot Options and determine whether you can boot the machine into Safe
Mode With Networking or Safe Mode Command Prompt. The procedure for accessing these
options is outlined in this Workbook in the section “Random Troubleshooting Techniques.”
If you are able to boot the infected Windows 8 computer into Safe Mode, there is a good
chance that Method 1 or Method 2 will work to remove the malware. If not, the procedure
will be a bit more involved.
The exact steps may vary a bit, but here is the general approach:
 Boot from a bootable CD, DVD, or USB thumb drive (but not a Kickstart thumb drive)
 Run the appropriate version of HitmanPro from a CD, DVD, or USB thumb drive
 Pick up with Step 12 in the Method 3 procedure outlined above
Copyright © 2015, The Virus Doctor™. All rights reserved
101
CryptoLocker Update
In October, 2013 I wrote about what was then the newest and most widespread malware
infecting computers worldwide, known as CryptoLocker. At the time I referred to it as “GameChanging Malware.” You may read that blog post here:
http://www.thevirusdoc.com/blog/cryptolocker-game-changing-malware.
There have been quite a few developments along these lines since then, and this type of
malware has become one of the most destructive threats of all time. Most of these
developments have been of what we would have to consider a negative variety, but there is
also a ray of good news thrown in for some victims of a CryptoLocker infection. First, here is a
review of the evolution of encrypting ransomware over the past year.
Evolution of encrypting ransomware, September, 2013 – September, 2014
Just about the time the original CryptoLocker was starting to make a significant impact (and a
lot of money for its authors), a variation appeared that looked very much like the original. The
infection methods were the same, the encryption was apparently done in the same way, and
the message that showed up on the infected computer was almost identical to the original.
There were only two obvious differences.
The original CryptoLocker initially set a price of $100 for the decryption key; this imitator
demanded $300. But by that time the original authors had also raised their price to the same
$300. The original gave the victim two options for paying the ransom – either a MoneyPak
non-refundable debit card or payment in Bitcoin; the imitator would only accept payment via
Bitcoin.
But on further analysis, several anti-virus vendors determined that this imitator was most likely
produced by a totally different programmer or, more likely, programming team. They
discovered that it was written in a different programming language from the original, and
many other differences became apparent upon disassembly of the program and comparison to
the original.
Since then, at least 6 similar programs have been released into the wild with a CryptoLockertype payload. These are known generically as encrypting ransomware, and they continue to
spread and evolve into even more-sophisticated threats. Most of these variants are obviously
different programs, produced by different programming groups, each with its own twist on the
distribution, payment amount and payment mechanism, and the message that is displayed
after the user’s data files have been encrypted.
102
Copyright © 2015, The Virus Doctor™. All rights reserved
These are the names that have surfaced to date:








CryptoLocker
CryptoLocker II (my name for the original imitator, referenced above)
PrisonLocker, aka PowerLocker
CryptoDefense
CryptorBit
CryptoWall
CTB Locker, aka Critroni
TorLocker
Infection vectors
Unfortunately, the way this category of malware spreads makes it difficult for traditional antivirus and anti-spyware programs to detect and block them from successfully installing on
computers running any version of Windows. At a minimum, a full Internet Security Suite is
necessary in order to give most users even marginally adequate protection.
Most of these infections are contracted in the usual way, by the user opening an e-mail
attachment that launches the malware. These attachments are most typically .pdf or .zip files,
but they may be .exe or .com files, or some other file type that would normally be considered
benign.
The subject of these e-mail messages may be a failed delivery notification that appears to
come from the Post Office, UPS, DHL, or FedEx; some may claim that the attachment is a
recorded voicemail message, or some other legitimate-sounding reason the user should open
it. As always, user behavior frequently plays a pivotal role in the infection sequence; user
training and security awareness may reduce the likelihood of infection.
As with so many other infections in the past few years, this malware sometimes comes in the
form of a “drive-by download” that may be triggered by the user being sent to an infected web
site or clicking on an infected link in an e-mail message. This method may take advantage of
known vulnerabilities in ancillary programs such as Java, Adobe Reader, and Flash.
Accordingly, it’s even more important than ever to make sure that these programs are kept upto-date. And of course, it’s critical that Windows and all installed applications stay updated as
well. We must assume that Windows XP is more vulnerable to these infections than the newer
versions of Windows, since Microsoft no longer updates that Operating System.
Copyright © 2015, The Virus Doctor™. All rights reserved
103
Protection against these threats
As a direct response to these attacks, at least three software vendors have created products
specifically designed to block infection by this type of malware. Some are offered free of
charge, while others carry a nominal cost. None of these programs will conflict with installed
anti-virus or Internet Security programs, but they may conflict with one another. So, choose
one:
The first entrant in this category was CryptoPrevent, from Foolish IT (www.foolishit.com), the
creators of the D7 software suite. The original version is still free, but they now also offer a
Premium Edition, with additional features and capabilities, for $15.00 U.S. for a permanent
license.
Another long-established, reputable vendor of anti-malware software, MalwareBytes
(www.malwarebytes.org), has come out with a similar program called MalwareBytes AntiExploit. They also offer a free version and a Premium Edition, which provides additional
protection and will protect up to three computers, for $24.95 U.S. per year.
The other entrant in this arena is Surfright (www.surfright.nl), the producers of HitmanPro.
Their free program, HitmanPro.Alert, was originally intended to block banking Trojans and
similar attacks, and compromises of any Internet browsers on the targeted computer. This
program has been updated to include CryptoGuard, specifically to protect against encrypting
ransomware.
A later variant of malware in this category, CTB Locker (or Critroni), was released in mid-July,
2014. Although the end result is similar to the other variants discussed here, this infection is
more sophisticated and different enough that it may not be detected or blocked by the
products listed above. The author of CryptoPrevent tells me that Version 6.x (and later) does
protect against the known variants of CTB Locker, but only through detection of its signature.
At this point he cannot guarantee that future variants of CTB Locker will be detected, especially
in the first few days after they are released. I have not received a response from either of the
other listed vendors with regard to their handling of CTB Locker.
Encrypting ransomware on other (non-Windows) platforms
To wrap up the “bad news” aspect of this update, there is another recent development in the
field of encrypting ransomware. That is the spread of these attacks to additional hardware
platforms, beyond the Windows Operating Systems. A popular Network-Attached Storage
(NAS) system is now being targeted, as are smartphones and tablets running the Android
Operating System.
104
Copyright © 2015, The Virus Doctor™. All rights reserved
Apple users seem to be immune to this category of malware thus far. I have heard no reports
of Macs, iPads or iPhones being targeted for CryptoLocker-type attacks. That’s not to say it
couldn’t (or won’t) happen, but as far as I know it hasn’t been an issue yet.
The good news
Early in this article I promised a ray of good news, so here it is. In August, 2014, two software
vendors announced jointly that they have developed a program that may be able to decrypt
files that were encrypted by the original CryptoLocker. They are offering this program free of
charge to anyone who still has those encrypted files and wants to recover them.
The companies are FireEye (www.fireeye.com), of Milpitas, California, USA and Fox-IT
(www.fox-it.com), of Delft, The Netherlands. It’s important to note that these companies do
not claim to have “cracked the code” to decrypt these files; rather, they gained access to some
of the servers that contained the private keys used by the original CryptoLocker infection.
Through some clever detective work and reverse-engineering, they developed a program
(DecryptCryptoLocker) that may be used to decrypt these encrypted files. Here is a link with
the details of how this procedure works: https://www.decryptcryptolocker.com/. While there
is a good chance this program will let you recover these files, it is not a “silver bullet.” Here are
some possible obstacles that may prevent it from working in specific cases:
 The procedure is only known to work on the original CryptoLocker infections; it could
apply to later variants and imitators, but I would consider that to be unlikely
 There is no guarantee that the servers accessed by FireEye and Fox-IT contained all of
the private keys used by the CryptoLocker authors
 The original CryptoLocker was effectively brought down in late May, 2014; any
infections since that date are unlikely to use the same set of private keys
Even so, this procedure is a welcome piece of good news and a significant win by the good
guys! FireEye and Fox-IT deserve a lot of credit for the great work they devoted to this
solution. And if you still have encrypted files you need to recover, it’s definitely worth the
effort to try the procedure and see whether it works for you.
I’ll be very interested in hearing of your results and any further details you may be able to
provide on the process. Good luck!
Copyright © 2015, The Virus Doctor™. All rights reserved
105
Poweliks Update
Background
Poweliks is one of the most widespread pieces of malware infecting computers in recent
months. It first appeared in early August, 2014 and has been spreading rapidly since October.
This virus is very different from most in one important respect – it does not leave a malicious
file on the infected computer. Instead, the malicious code is injected directly into the Registry
by a Trojan dropper; once that injection is done, the dropper file is deleted.
As a result of this infection sequence, traditional anti-virus and anti-malware programs that
scan the hard drive looking for infected files will not detect Poweliks. Unless a given scanning
program knows exactly what to look for, it will erroneously pronounce a Poweliks-infected
computer “clean.”
Symptoms
It’s easy to recognize the symptoms of a Poweliks infection:




Multiple dllhost.exe processes are running
CPU utilization is very high
There is a large amount of network traffic
Computer is running slowly as a result of these behaviors
More recent variants of Poweliks also disable the ability to download files, by using a “Custom”
Security setting. It has also been reported that the infection creates a large number of files in
the Temp folder and the Temporary Internet Files folder. This symptom has not been
discussed or confirmed by any anti-virus vendors to my knowledge, but the logs I saw from one
infected computer revealed almost 300,000 files in these folders – for a total size in excess of 9
GB.
Another case that was suspected to be a Poweliks infection turned out not to be. The tech
who reported it saw multiple Conhost.exe processes running and suspected this might be a
variant of the typical Poweliks infection. On further investigation, it appears that these
processes were associated with Kaseya, which was a legitimate program running on that
computer.
106
Copyright © 2015, The Virus Doctor™. All rights reserved
How it operates
(This description is based in part on the writeup of Poweliks by Adlice Software, creators of the
RogueKiller program.)
The payload is stored in an encrypted Registry Value, and loaded at boot time by that subkey
calling a rundll32.exe process on an encrypted Javascript payload. Once the payload is loaded
in rundll32.exe, it tries to execute an embedded Powershell script in interactive mode (no UI).
That Powershell script contains a base64-encoded payload (another one) which will be injected
into a dllhost.exe process (the persistent item), which will be zombified and act as a Trojan
downloader for other infections. The dllhost.exe injected thread is also responsible for
protecting the Registry Value (persistence item) by recreating it when removed.
Where it is found
The payload of Poweliks has been found in two different areas of the Registry. In either case
the Subkey name and the Value name are injected with unicode characters, so that the highlevel API cannot read them and remove them. Said another way, that technique prevents the
tech from being able to delete those entries in Regedit or most other Registry-editing tools.
The first generation of Poweliks infections appeared in the Run subkey under
HKEY_CURRENT_USER. Later (and current) Poweliks samples have been found in HKEY_
CURRENT_USER \Software\classes\clsid\{73E709EA-5D93-4B2E-BBB0-99B7938DA9E4}\
LocalServer32 or HKEY_ CURRENT_USER \Software\classes\clsid\{AB8902B4-09CA-4bb6-B78DA8F59079A8D5}\LocalServer32, but they actually could use any clsid subkey in the future.
Note that most legitimate Clsid entries will be found under HKEY_LOCAL_MACHINE, not
HKEY_CURRENT_USER. These legitimate subkeys will also be found at
HKEY_CLASSES_ROOT\clsid\{...}.
Easy way to determine whether a computer is infected by Poweliks
Since the behavior of this infection has been consistent, regardless of the Registry subkey used
or the exact payload, it is easy to detect its presence. In every case the first of two infected
entries will begin with the value “rundll32.exe javascript:””. A simple Find in Regedit will reveal
that instruction sequence if it is present. Here is all that needs to go into that Find command:
Copyright © 2015, The Virus Doctor™. All rights reserved
107
Be sure you are at the top of the Registry tree before you enter this Find command. If you
reach the end of the Registry without finding that sequence, the computer is not infected by
Poweliks.
How to remove a Poweliks infection
One problem with Poweliks removal is that the infected computer may be running so slowly
that you could spend a lot of time waiting for each step to complete. There is one simple step
you can take that will greatly reduce the CPU utilization of the Poweliks processes – disconnect
the computer from the network (wired or wireless). Since much of the payload involves
attempted communications with the Command and Control Server, breaking that connection
will immediately produce a significant performance improvement.
If downloads have been blocked, you can restore that functionality by going into Internet
Options | Security tab | Custom level... | Downloads (Enable) or by changing the Security level
for this zone back to Medium-high.
In the time since Poweliks first appeared, many articles and blog posts have been written,
procedures documented, and tools produced by various software vendors to help in the
removal process. The quality and effectiveness of these different methods ranges from poor to
very good, and some vendors have updated their tools and procedures as they have learned
more about how Poweliks operates and how it protects itself.
Based on feedback I have received from quite a few graduates of my Virus Remediation
Training program, as well as my own hands-on work on several Poweliks-infected computers,
these are the best solutions I have found to date:
1. ESET offers a free Poweliks removal tool, at
http://www.eset.com/int/download/utilities/detail/family/252/. Everyone I have talked
108
Copyright © 2015, The Virus Doctor™. All rights reserved
with who has used this tool reports that it successfully removed the infection, with
minimal effort.
2. MalwareBytes reports that the latest version of their MalwareBytes Anti-Rootkit
program detects and removes Poweliks infections. Note that this is NOT the standard
MalwareBytes Anti-Malware that we have all been using for long time; that program,
good as it is, does not deal effectively with Poweliks. Also note that MBAR is still in Beta
testing, as it has been for a long time. I normally do not recommend use of any
programs in Beta, but I make a significant exception in this case. You can download it
here: http://downloads.malwarebytes.org/file/mbar. Here is a link to a discussion on
Poweliks removal in a MalwareBytes forum:
https://forums.malwarebytes.org/index.php?/topic/160693-removal-instructions-forpoweliks/.
Feedback from my alumni who have used this program on Poweliks infections does not
reflect 100% success, but it’s possible some of them may not have followed the
instructions carefully, or they may have tried the program before the Poweliks removal
code was included in it.
3. The first solution I distributed involved use of RogueKiller, from Adlice Software. That
procedure was effective, if a bit involved. RogueKiller has since updated their program
to automatically terminate the dllhost.exe processes, so it is no longer necessary to
perform that step manually if you want to stick with RogueKiller for removal. Their
article (updated 11/21/14), and the link to download the program, are here:
http://www.adlice.com/poweliks-removal-with-roguekiller/.
4. By all accounts I’ve heard, the Farbar Recovery Scan Tool is effective in finding and
removing Poweliks infections. It is also the most confusing to use (for me, at least!),
thus its placement at #4 on this list. You may download it from Bleeping Computer
here: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/.
These solutions are listed in the order of my preference, based on reported results, ease of
use, and least time required. Any of them should work to find and remove these infections, so
it comes down to a matter of personal preference.
Additional resources
Most of the major anti-virus and anti-malware vendors have information about Poweliks on
their web sites, although some of it is pretty dated (and thus inaccurate) by now. Here are
Copyright © 2015, The Virus Doctor™. All rights reserved
109
some of those details, if you want to do further research on your own. These vendors are
listed in alphabetical order, with no preference expressed or intended on my part.
 BitDefender – A search for Poweliks on their web site produces no hits. A second-hand
conversation with one of their techs confirms that they are aware of Poweliks, but my
phone calls and e-mails requesting further information have not been answered.
 Emsisoft – I received a detailed response to my questions from a Malware Analyst at
Emsisoft, which was greatly appreciated. Emsisoft has historically been one of the first
vendors to detect and effectively deal with emerging malware threats. With regard to
Poweliks, the response indicated that “Emsisoft’s behavior blocker detects code
injection and can block installation of the malware.” On the other hand, the analyst
follows up by saying, “While Emsisoft products successfully detect Poweliks during
installation, at this moment removal after a scan is not yet guaranteed. We are
currently working on a safe and reliable way to incorporate this into our engine (rather
than adding a solution that might put the system at risk).” I appreciate their candor in
this regard, and this response reinforces my high regard for Emsisoft.
 ESET – In addition to their removal tool mentioned above, they have confirmed to me
that their normal anti-virus program protects against Poweliks infections.
 Kaspersky – A search for Poweliks on their web site produces no hits. A second-hand
conversation with one of their techs confirms that they are aware of Poweliks, but my
phone calls and e-mails requesting further information have not been answered.
 Sophos – One of the first vendors to document Poweliks and its behavior. Their article is
here: http://www.sophos.com/en-us/support/knowledgebase/121370.aspx, although it
has not been updated since September 29. In my own experience of trying their
procedure on two infected computers, I was not successful on either. It’s possible that I
did not give their scanner enough time to complete, and their procedure made no
mention of the need to terminate the running dllhost.exe processes.
 Symantec – They offer a manual removal procedure for Poweliks, and a removal tool,
which you can find here:
http://www.symantec.com/security_response/writeup.jsp?docid=2014-080408-561499&tabid=3. While one of my alumni reported successful removal by following the
manual procedure, it seems unnecessarily complex and time-consuming to me. If the
removal tool works, that is probably a better and faster solution.
110
Copyright © 2015, The Virus Doctor™. All rights reserved
Conclusion
Poweliks has presented an unusual challenge in several respects, especially when it was first
introduced and the concept of “file-less” malware was unknown. As it has become more
widespread, some vendors have developed more effective responses to it. I will continue to
keep you updated as we learn more about this infection.
Copyright © 2015, The Virus Doctor™. All rights reserved
111
112
Copyright © 2015, The Virus Doctor™. All rights reserved
Appendix C -- Processes found in Task Manager
L/
M
Required
?
AOL
L
No
AOLacsd.exe
AOL
L
aolsoftware.exe
AOLSP
Scheduler.exe
AOL
L
AOL Spyware Protection
AOL
L
No
aoltpspd.exe
AOL Top Speed
AOL
L
Yes
aoltray.exe
AOL Systray Icon
AOL
L
No
aoltsmon.exe
AOL Top Speed Monitor
AOL
L
Yes
Process Name
Description
Company
anotify.exe
AOL Update Popup
BrccMCtl.exe
Brother
BrMfcMon.exe
Brother
BrMfcWnd.exe
Brother
Application/Device
ccEvtMgr.exe
Event Manager
Symantec
L
Yes
ccSetMgr.exe
Settings Manager
Symantec
L
Yes
cmd.exe
Command Prompt
Microsoft
L
No
companion.exe
AOL Companion
AOL
L
No
csrss.exe
Client Server Runtime Subsystem
Microsoft
L
Yes
ctfmon.exe
MS Office Language Bar
Microsoft
L
Yes
DefWatch.exe
Definitions Watch
Symantec
L
Yes
explorer.exe
Windows Desktop
Microsoft
L
Yes
g2comm.exe
GoToMyPC
Citrix
g2pre.exe
GoToMyPC
Citrix
g2svc.exe
GoToMyPC
Citrix
g2tray.exe
GoToMyPC
Citrix
hpcmpmgr.exe
Windows Update?
or Windows Explorer
Hewlett-Packard
hpqtra08.exe
HP Digital Imaging Monitor
Hewlett-Packard
L
Yes
hpsysdrv.exe
HP System Recovery
Hewlett-Packard
L
No
hpwuschd2.exe
HP Windows Updates Scheduler
Hewlett-Packard
L
No
kbd.exe
Hewlett-Packard
L
No
lsass.exe
HP Keyboard Manager
Local Security Authentication
Server
Microsoft
L
Yes
MDM.EXE
Machine Debug Manager
Microsoft
L
Yes
Nvidia Driver Service
Nvidia
L
No
Dispatcher Service
PDF Complete,
L
Yes
net.exe
NILaunch.exe
nvsvc32.exe
OneTouch.exe
pdfsvc.exe
Print to PDF Complete
Copyright © 2015, The Virus Doctor™. All rights reserved
113
Process Name
Description
Company
Application/Device
L/
M
Required
?
Inc.
pptd40nt.exe
Print to Desktop
ScanSoft
PaperPort
L
No
qbdagent2002.exe
Delivery Agent
QuickBooks
L
No
RetroExpress.exe
Retrospect Express
L
No
Retrorun.exe
Retrospect Backup Scheduler
Intuit
Dantz
Development
Dantz
Development
L
No
Rtvscan.exe
Real-Time Virus Scan
Symantec
L
Yes
rundll32.exe
Run DLL as an App
Microsoft
L
Yes
SBAMSvc.exe
VIPRE
Sunbelt Software
L
Yes
SBAMTray.exe
VIPRE Systray Icon
Sunbelt Software
L
Yes
SavRoam.exe
SBPIMSvc.exe
Sunbelt Software
services.exe
Services Control Manager
Microsoft
L
Yes
smss.exe
Session Manager Subsystem
Microsoft
L
Yes
spoolsv.exe
Spooler Service
Microsoft
L
Yes
svchost.exe
Service Host
Microsoft
L
Yes
System
Operating System Kernel
Microsoft
L
Yes
System Idle Process
Idle Time
Microsoft
L
Yes
taskmgr.exe
Task Manager
Microsoft
L
Yes
tfswctrl.exe
Drive Letter Assignment
Hewlett-Packard
L
No
winlogon.exe
User Logon
Microsoft
L
Yes
WINWORD.EXE
MS Word
Microsoft
L
No
L
Yes
wmiapsrv.exe
114
WMI API
Microsoft
Printing or faxing
CD writing
Performance
information
Copyright © 2015, The Virus Doctor™. All rights reserved
Appendix D -- Registry Differences by Operating System
Key/Subkey
Windows XP
Server 2003
Vista
Server 2008 or
Server 2012
Windows 7,
Windows 8 or 8.1
Top of Registry keys
My Computer
My Computer
Computer
Computer
Computer
HKCR\exefile\shell\open\command
(Default) entry
(Default) entry
(Default) entry +
IsolatedCommand
(Default) entry +
IsolatedCommand
(Default) entry +
IsolatedCommand
HKCR\regedit\shell\open\command
regedit.exe %1
regedit.exe %1
regedit.exe "%1"
regedit.exe "%1"
regedit.exe "%1"
HKCR\regfile\shell\open\command
regedit.exe "%1"
regedit.exe "%1"
regedit.exe "%1"
regedit.exe "%1"
regedit.exe "%1"
HKLM\Software\Microsoft\Windows\
CurrentVersion\RunOnceEx
Yes
Yes
Yes
No
No
HKLM\Software\Microsoft\Windows\
CurrentVersion\ShellServiceObject
DelayLoad
HKLM\Software\Microsoft\Windows
NT \CurrentVersion\Winlogon\Shell
HKLM\Software\Microsoft\Windows
NT \CurrentVersion\Winlogon\System
HKLM\Software\Microsoft\Windows
NT \CurrentVersion\Winlogon\UIHost
HKLM\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon\Notify
Display Properties | Customize
Desktop
4 - 5 entries
4 - 5 entries
WebCheck only
WebCheck only
WebCheck only
Explorer.exe
Explorer.exe
Explorer.exe
explorer.exe
explorer.exe
Yes (no Data)
Yes (no Data)
No
No
No
logonui.exe
logonui.exe
No
No
No
10 - 13 entries
10 - 13 entries
0 - 3 entries
0 - 3 entries
0 - 3 entries
Yes
Yes
No
No
No
Copyright © 2015, The Virus Doctor™. All rights reserved
115
116
Copyright © 2015, The Virus Doctor™. All rights reserved
SESSION 4:
THE VIRUS REPAIR TOOLKIT
and LAB SESSION
Copyright © 2015, The Virus Doctor™. All rights reserved
117
118
Copyright © 2015, The Virus Doctor™. All rights reserved
Contents of the Virus Repair Toolkit
The Virus Repair Toolkit contains all of the software tools you are likely to need in order
to repair any malware infestation. While you may want to carry these tools on a USB
thumb drive, the CD-ROM version is preferable for three reasons:
1. You can usually boot from a CD-ROM, but may not be able to boot from a USB
drive. The Virus Repair Toolkit as distributed is not bootable, but you may copy
its contents onto a bootable CD you have created.
2. In many cases of malware removal it will be necessary to boot the computer into
Safe Mode. You may not be able to access a USB drive in Safe Mode, but should
always be able to access a CD or DVD drive.
3. If a virus is active on a computer, it may try to infect any additional drives
connected to the system or the network. A USB drive would be susceptible to
such infection, but not a CD-ROM disk.
The files on this CD come from various sources, and in some cases you will want to
download the most recent versions of those files before attempting the repair. These
are the included files, and their sources, in various categories:
The following files are general utilities that are useful in dealing with malware-related
issues:
 Autoruns by SysInternals – Download from http://technet.microsoft.com/enus/sysinternals/bb963902.
 CCleaner – Download from http://www.ccleaner.com/download.
 Personal Software Inspector by Secunia – Scans for outdated and vulnerable
system components and add-ons; download from
http://secunia.com/vulnerability_scanning/personal/.
 Process Explorer by SysInternals – Download from
http://technet.microsoft.com/en-us/sysinternals/bb896653.
You may want to copy these system files from a known-good computer running the
same version of Windows as the machine that is infected:
Copyright © 2015, The Virus Doctor™. All rights reserved
119




Gpedit.msc – Copy from C:\Windows\System32
Msconfig.exe – Copy from C:\Windows
Regedit.exe – Copy from C:\Windows
Tasklist.exe – Copy from C:\Windows\System32; not included in Windows Home
versions, but may be copied onto such a system
The following files contain the default values:
 Default Hosts file to reset any URL to IP Address translation
 Default Ntuser.pol file to restore Local Group Policies for this User
 Default Registry.pol file to restore Local Group Policies for this Computer
The following programs may be useful for detecting and removing malware:
 AdwCleaner – May be useful in finding and removing adware, toolbars, PUPs, and
browser hijackers. Download from
http://www.bleepingcomputer.com/download/adwcleaner/.
 ComboFix – *** DO NOT USE ***. While this program served a useful purpose at
one time, it has always been risky to use. Even Bleeping Computer, the usual
source of downloading ComboFix, warns that it should be used only at the
direction of, and under the supervision of, a technician trained by Bleeping
Computer. With the range of other, safer tools available to you today and
covered in this workshop, there is no longer any good reason to risk the possible
bad outcome of running ComboFix.
 D7 – A set of tools that can be useful in detecting and removing malware;
download from http://www.foolishit.com/d7/.
 dBug – A tiny utility that serves the same purpose as Killemall in Windows, also
from FoolishIT at https://www.foolishit.com/vb6-projects/dbug/.
 Emsisoft Anti-Malware 9.0 – Full-featured anti-virus program offering active
protection; download from http://www.emsisoft.com/en/.
 Farbar Recovery Scan Tool (FRST) – May help diagnose malware issues.
Download from Bleeping Computer at
http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/.
120
Copyright © 2015, The Virus Doctor™. All rights reserved
 HijackThis – Helps repair browser hijackings; download from
http://www.trendmicro.com/ftp/products/hijackthis/HiJackThis.msi.
 Junkware Removal Tool (JRT) – May be useful in finding and removing adware,
toolbars, and PUPs, including the Ask Toolbar and Conduit. Download from
Bleeping Computer at http://www.bleepingcomputer.com/download/junkwareremoval-tool/.
 Killemall – Program included in D7 to terminate all but required Windows
Processes; you may download killemall.scr alone for free, from
https://www.foolishit.com/vb6-projects/killemall/.
 MalwareBytes – First choice for scanning an infected computer for viruses and
spyware; download from
http://www.malwarebytes.org/products/malwarebytes_free
If the infected computer is not connected to the Internet, you can manually
download the Current Definitions using the following procedure: On a working
(uninfected) computer, copy the following files to a flash drive:
o Rules.ref and Database.conf (in the Configuration folder)
The location of these files will be different, depending upon the Operating
System:
Windows XP and 2000: C:\Documents and Settings\All Users\Application
Data\Malwarebytes\Malwarebytes' Anti-Malware\
Windows Vista, 7 and 8: C:\Program Data\Malwarebytes\Malwarebytes
Anti-Malware\
Paste the copied files from the flash drive into the appropriate locations on the
infected computer. That computer will then have the updated definitions.
 Microsoft Malicious Software Removal Tool – download from
http://www.microsoft.com/en-us/download/details.aspx?id=16
 Rkill.exe – This program will kill processes associated with rogue security
software, but will sometimes terminate legitimate processes as well; use with
care. Download from http://download.bleepingcomputer.com/grinler/rkill.exe.
Copyright © 2015, The Virus Doctor™. All rights reserved
121
 RogueKiller – A security tool that can be used to terminate and remove malicious
processes and programs from infected computers. It has the ability to remove
infections such as ZeroAccess, TDSS, rogues, and Ransomware. Download from
http://www.bleepingcomputer.com/download/roguekiller/.
 SuperAntiSpyware Portable Scanner – Another malware removal tool; download
from http://www.superantispyware.com/portablescanner.html.
 Symantec Malware Removal Tools – If you know what malware has infected a
system, one of the free removal tools for that specific program may be effective.
This is a link to the entire list:
http://www.symantec.com/norton/security_response/removaltools.jsp.
 TechSuite, from RepairTech – This is a set of tools that can be helpful with several
aspects of malware detection and removal. It now includes a program called
Registry Investigator, which was developed to the specifications defined by The
Virus Doctor. The vendor offers a discount to graduates of the Virus Remediation
Training workshop; ask them for details. https://repairtechsolutions.com/.
 VIPRERescue – This is a self-contained version of VIPRE that will run from Safe
Mode, Command Prompt Only; download from http://live.sunbeltsoftware.com/.
The following programs provide additional protection against infections that may avoid
detection by most anti-virus and anti-malware programs. They are specifically intended
to block exploits such as those used by CryptoLocker and similar encrypting
Ransomware:
 CryptoPrevent – Download from https://www.foolishit.com/vb6projects/cryptoprevent/
 HitmanPro.Alert – Download from http://www.surfright.nl/en/downloads/
 MalwareBytes Anti-Exploit Premium – Download from
http://www.malwarebytes.org/antiexploit/premium/
The following programs may be helpful in dealing with Rootkit infections:
 aswMBR.exe, from Avast. Download from Bleeping Computer, at
http://www.bleepingcomputer.com/download/aswmbr/.
122
Copyright © 2015, The Virus Doctor™. All rights reserved
 TDL4 Rootkit Removal Tools by BitDefender – Two programs available, one for
32-bit versions of Windows and one for 64-bit versions; download from
http://www.malwarecity.com/blog/free-removal-tool-for-tdl4-available-now1106.html.
 GMER – Will detect rootkit activity, most recent versions will remove or repair
such infections; download from http://www.gmer.net/.
 TDSS Killer – Highly regarded rootkit detection and removal tool, from Kaspersky;
download from http://support.kaspersky.com/viruses/solutions?qid=208280684.
 MalwareBytes Anti-Rootkit (Mbar.exe) – This program is still in beta, as it has
been for a long time. But it comes from a reputable vendor with a good track
record, and seems to include enough “undo” capabilities to make it safe to use.
Download from http://www.malwarebytes.org/products/mbar/.
 Rootkit Revealer – Originally developed by Sysinternals, now available from
Microsoft; published in 2006, but may still be useful in some cases of rootkit
infection. Download from http://technet.microsoft.com/enus/sysinternals/bb897445.aspx.
 Panda Cloud Cleaner – Replaces Panda Anti-Rootkit; download from
http://www.pandasecurity.com/usa/enterprise/support/card?id=1672.
 Sophos Anti-Rootkit – Another rootkit removal tool, from a reputable vendor of
anti-virus software; download from http://www.sophos.com/products/freetools/sophos-anti-rootkit.html.
 HitmanPro – Detects and repairs rootkits, has nice user interface but in some
cases the repairs could lead to additional problems; download from
http://www.surfright.nl/en.
 Symantec FixTDSS – download from
http://www.symantec.com/content/en/us/global/removal_tool/threat_writeups
/ fixTDSS.exe
 Trend Micro Rootkit Buster – download from
http://downloadcenter.trendmicro.com/
index.php?regs=NABU&clk=result_page&clkval=drop_list&catid=6&prodid=155.
Copyright © 2015, The Virus Doctor™. All rights reserved
123
The following files step you through the possible infection points of their respective
Operating Systems, taking you directly to the specified file, directory, or Registry key:
 Regstep.bat – Run this batch file in Windows XP or Windows Server 2003 to
manually inspect the Registry for symptoms of malware infection.
 Regstep – Win7.bat – Run this batch file in Windows Vista, Windows 7, Windows
8, or Windows Server 2008 to manually inspect the Registry for symptoms of
malware infection; must Run as Administrator (right-click and choose this option,
even if you are already logged on as Administrator).
The following files are used to repair specific damage caused by malware infections.
Double-click on each one to perform the indicated function. Unless otherwise noted, all
were developed and are Copyright by Viruseminars.com:
 Exefile Fix.reg – Import this Registry file in Windows XP or Windows Server 2003
if no .exe files will run.
 Exefile Fix Win7.reg – Import this Registry file in Windows Vista, Windows 7,
Windows 8, or Windows Server 2008 if no .exe files will run; must Run as
Administrator (right-click and choose this option, even if you are already logged
on as Administrator).
 BAT files to fix the following symptoms:
o Enablecommand.bat – Run this batch file if you can’t access the Command
prompt
o Enabledisprop.bat – Run this batch file if you can’t access the Display
Properties
o Enableregedit.bat – Run this batch file if you can’t run Regedit
o Enablerun.bat – Run this batch file if you can’t access the Run command
o Enabletaskmgr.bat – Run this batch file if you can’t run Task Manager
o Fixshell.bat – Run this batch file to restore Winlogon entries to correct values
o Unblockapps.bat – Run this batch file if you can’t run specific programs
124
Copyright © 2015, The Virus Doctor™. All rights reserved
The following links take you to sites where you may download bootable CD images to
boot into non-Windows Operating Systems:
 AVG Rescue CD – Download from http://www.avg.com/ie-en/avg-rescue-cd
 Avast! 2014 Rescue Disk – Download from http://www.avast.com/enus/faq.php?article=AVKB114
 Avira Antivir Rescue System Boot CD – Download from
http://www.avira.com/en/support-download-avira-antivir-rescue-system
 Bart-PE – Download from http://download.cnet.com/BartPE-Bootable-LiveWindows-CD-DVD/3000-2094_4-10611131.html
 Hiren’s BootCD – Download from http://www.hirensbootcd.org/tag/downloadhirens-bootcd/
 Kaspersky Rescue Disk 10 – download from
http://support.kaspersky.com/viruses/rescuedisk/main?qid=208286084.
 Knoppix – Download from http://www.knoppix.net/
 The Ultimate Boot CD – Download from http://www.ultimatebootcd.com/; while
this is one of the original bootable CDs, recent reports indicate may have outlived
its usefulness.
A recent entry in the arena of bootable CDs is from Microsoft, known as Windows
Defender Offline. Note that this is a completely different program from the antispyware product by Microsoft bearing a similar name. This program appears to be an
updated version of Microsoft Standalone System Sweeper.
The program can be used to create a bootable CD, DVD, or USB thumb drive with
current malware definitions. You may find more details here:
http://windows.microsoft.com/en-US/windows/what-is-windows-defender-offline.
One final resource may be useful if you are suspicious of a particular file. This site will
give you the legitimate MD5 and SHA1 Hash values for a given Windows System file, so
that you can compare those to the file in question:
http://spybotupdates.biz/files/filealyz2.0.3.50.exe#hash(md5:11664F19C467EFE118F015DF966CD3AF)
Copyright © 2015, The Virus Doctor™. All rights reserved
125