- Thread starter
- #21
V
Volodymyr Shcherbyna
Yes, autoruns requires installation.
In your case, I would boot the machine with \DEBUG switch, attach debugger
and set breakpoints on file system functions (CreateFile, ...ReadFile,
WriteFile), module management function (LoadLibrary, ...) and started
investigations of what is going on on a system, but this way requires some
low level knowledge...
--
V
This posting is provided "AS IS" with no warranties, and confers no
rights.
"John" <a> wrote in message news:uGkBS0iWIHA.4868@TK2MSFTNGP03.phx.gbl...
> That is what I thought too. This crapware hooks itself to system files to
> make sure it's loaded on every system startup, no matter what mode we get
> into. What's interesting is the fact that the HD is not accessible when
> installed on a clean system. I've also tried using BartPE boot CD. I can't
> see the drive either. I'm thinking perhaps the trojan might have changed
> HD partition tables???
>
> Does Autoruns require installation? Does it run in Safe Mode without
> installation? I try to avoid getting into normal mode. Why? Because the
> system takes a few minutes to respond to a single mouse click. It has
> become almost unusable. Forget about installing/removing software. It
> might take hours to install a single software.
>
>
> "Volodymyr Shcherbyna" <v_scherbina@online.mvps.org> wrote in message
> news:uhNlRPiWIHA.2000@TK2MSFTNGP05.phx.gbl...
>> Simple deletion of files is not enought. This crap uses interesting
>> techniques of injection into system. Usually, it registers itself as a
>> shell-addon, which becomes active when you open my computer, or any
>> folder. So I'd suggest you to download autoruns from sysinternals.com,
>> and check all add-ons for shell.
>>
>> --
>> V
>> "John" <a> wrote in message news:uqYli6hWIHA.1208@TK2MSFTNGP03.phx.gbl...
>>>I have a Windows XP Home SP2 PC infected with Vundo trojan. Norton AV
>>>detects it but can't remove it. I've used Vundo removal tools from a few
>>>sites. None can remove it. I've also done manual removal by deleting
>>>files and registry entries. That does not work either (and yes I always
>>>boot into safe mode).
>>>
>>> Here's a list of things that I have done (Note: I do all my virus
>>> removal work in Safe Mode. Never in normal mode):
>>>
>>> - Boot into Safe Mode.
>>>
>>> - Use VundoFix from atribune.org to scan and clean Vundo. It detects and
>>> deletes a few files. Some malicious DLLS (for example GEBXVTT.DLL in
>>> C:\Windows\System32) can not be deleted (in use by other program).
>>>
>>> - Restart the system and use NTFS4DOS from free-av.com to (clean) boot
>>> into command prompt with NTFS support to remove malicious DLL files
>>> created by the trojan. Delete all infected files that VundoFix fails to
>>> delete in safe mode. All bad files are successfully deleted.
>>>
>>> - Restart the system into Safe Mode. Malicious files gets recreated.
>>> They're back in place.
>>>
>>> - Use regedit in Safe Mode. Delete registry keys that should be there (I
>>> know they're created by trojan). Key gets recreated in a split second as
>>> soon as I delete it. This is why I know the trojan is alive in safe
>>> mode.
>>>
>>> - Remove the (infected) HD and install the HD in a clean PC as secondary
>>> master. Then boot the PC (primary master - clean OS with Antivir virus
>>> software installed). The system detects a new HD but does not assign a
>>> drive letter. This means I can't access the data in the HD. Windows Disk
>>> Management shows the new HD but does not 'mount' it or assign a drive
>>> letter.
>>>
>>> I run out of ideas. My last resort would be reformat HD and reinstall
>>> the OS but I don't want to lose the data. If I back it up, I'm afraid
>>> the trojan will reinfect the PC when data is restored.
>>>
>>> Anyone has any ideas? Thanks.
>>>
>>
>>
>
>
In your case, I would boot the machine with \DEBUG switch, attach debugger
and set breakpoints on file system functions (CreateFile, ...ReadFile,
WriteFile), module management function (LoadLibrary, ...) and started
investigations of what is going on on a system, but this way requires some
low level knowledge...
--
V
This posting is provided "AS IS" with no warranties, and confers no
rights.
"John" <a> wrote in message news:uGkBS0iWIHA.4868@TK2MSFTNGP03.phx.gbl...
> That is what I thought too. This crapware hooks itself to system files to
> make sure it's loaded on every system startup, no matter what mode we get
> into. What's interesting is the fact that the HD is not accessible when
> installed on a clean system. I've also tried using BartPE boot CD. I can't
> see the drive either. I'm thinking perhaps the trojan might have changed
> HD partition tables???
>
> Does Autoruns require installation? Does it run in Safe Mode without
> installation? I try to avoid getting into normal mode. Why? Because the
> system takes a few minutes to respond to a single mouse click. It has
> become almost unusable. Forget about installing/removing software. It
> might take hours to install a single software.
>
>
> "Volodymyr Shcherbyna" <v_scherbina@online.mvps.org> wrote in message
> news:uhNlRPiWIHA.2000@TK2MSFTNGP05.phx.gbl...
>> Simple deletion of files is not enought. This crap uses interesting
>> techniques of injection into system. Usually, it registers itself as a
>> shell-addon, which becomes active when you open my computer, or any
>> folder. So I'd suggest you to download autoruns from sysinternals.com,
>> and check all add-ons for shell.
>>
>> --
>> V
>> "John" <a> wrote in message news:uqYli6hWIHA.1208@TK2MSFTNGP03.phx.gbl...
>>>I have a Windows XP Home SP2 PC infected with Vundo trojan. Norton AV
>>>detects it but can't remove it. I've used Vundo removal tools from a few
>>>sites. None can remove it. I've also done manual removal by deleting
>>>files and registry entries. That does not work either (and yes I always
>>>boot into safe mode).
>>>
>>> Here's a list of things that I have done (Note: I do all my virus
>>> removal work in Safe Mode. Never in normal mode):
>>>
>>> - Boot into Safe Mode.
>>>
>>> - Use VundoFix from atribune.org to scan and clean Vundo. It detects and
>>> deletes a few files. Some malicious DLLS (for example GEBXVTT.DLL in
>>> C:\Windows\System32) can not be deleted (in use by other program).
>>>
>>> - Restart the system and use NTFS4DOS from free-av.com to (clean) boot
>>> into command prompt with NTFS support to remove malicious DLL files
>>> created by the trojan. Delete all infected files that VundoFix fails to
>>> delete in safe mode. All bad files are successfully deleted.
>>>
>>> - Restart the system into Safe Mode. Malicious files gets recreated.
>>> They're back in place.
>>>
>>> - Use regedit in Safe Mode. Delete registry keys that should be there (I
>>> know they're created by trojan). Key gets recreated in a split second as
>>> soon as I delete it. This is why I know the trojan is alive in safe
>>> mode.
>>>
>>> - Remove the (infected) HD and install the HD in a clean PC as secondary
>>> master. Then boot the PC (primary master - clean OS with Antivir virus
>>> software installed). The system detects a new HD but does not assign a
>>> drive letter. This means I can't access the data in the HD. Windows Disk
>>> Management shows the new HD but does not 'mount' it or assign a drive
>>> letter.
>>>
>>> I run out of ideas. My last resort would be reformat HD and reinstall
>>> the OS but I don't want to lose the data. If I back it up, I'm afraid
>>> the trojan will reinfect the PC when data is restored.
>>>
>>> Anyone has any ideas? Thanks.
>>>
>>
>>
>
>