This little app seems to do very well against exe killing rogue AV's.
http://www.sur-la-toile.com/RogueKiller/
http://www.sur-la-toile.com/RogueKiller/
A forum for reverse engineering, OS internals and malware analysis
RogueKiller V3.9.0 by Tigzy
contact at !http://www.sur-la-toile.com
mail: tigzyRK<at>gmail<dot>com
Feedback: !http://www.sur-la-toile.com/discussion- ... ntees.html
Operating System: Windows XP (5.1.2600 Service Pack 2) 32 bits version
Started in : Normal mode
User: Administrator [Admin rights]
Mode: Remove -- Time : 07/02/2011 08:20:15
Bad processes:
Killed c:\documents and settings\administrator\application data\cncyim.exe
Deregistred:
HKCU\...\Winlogon\ Shell : C:\Documents and Settings\Administrator\Application Data\cncyim.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe -> svchost.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe -> svchost.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe -> svchost.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe -> svchost.exe
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe -> svchost.exe
HOSTS File:
127.0.0.1 localhost
Finished
RogueKiller V3.9.0 by Tigzy
contact at !http://www.sur-la-toile.com
mail: tigzyRK<at>gmail<dot>com
Feedback: !http://www.sur-la-toile.com/discussion- ... ntees.html
Operating System: Windows XP (5.1.2600 Service Pack 2) 32 bits version
Started in : Normal mode
User: Administrator [Admin rights]
Mode: Remove -- Time : 07/02/2011 08:59:54
Bad processes:
Deregistred:
HKLM\SYSTEM\ControlSet001\services\userinit -> \\.\globalroot\systemroot\system32\us?rinit.exe
HKLM\SYSTEM\ControlSet002\services\userinit -> \\.\globalroot\systemroot\system32\us?rinit.exe
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_USERINIT ->
HOSTS File:
127.0.0.1 localhost
Finished
With two last (IS 2011 and Windows Problems Detector), maybe renaming roguekiller to something like explorer.exe/iexplore.exe can help?Yes, It works with that tips, cause most of rogues keep system file execution at startup (for system stabiity). So most of system file name could work (explorer.exe, winlogon.exe, userninit.exe, ...)
but succeeded on the second attempt with the rogue not showing up on reboot.@Xylitol: We spend some time by emailing each other, but some informations could be useful for everyone here.... ;)
RogueKiller V3.7.0 by TigzyAll the secret is in the last line, where the wbem DLL is replaced by an infected DLL, which reactivate the vbma driver.
contact at http://www.sur-la-toile.com
mail: tigzy44<at>hotmail<dot>fr
Feedback: http://www.sur-la-toile.com/discussion- ... ntees.html
Operating System: Windows XP (5.1.2600 Service Pack 3) version 32 bits
Mode: Remove -- Time : 05/01/2011 08:01:57
Bad processes:
Killed svchost.exe
Deregistred:
HKLM\SYSTEM\ControlSet001\services\userinit -> \\.\globalroot\systemroot\system32\us?rinit.exe
HKLM\SYSTEM\ControlSet001\services\vbma3c79 ->
HKLM\SYSTEM\ControlSet001\services\kxtoykoc -> Base
HKLM\SYSTEM\ControlSet002\services\userinit -> \\.\globalroot\systemroot\system32\us?rinit.exe
HKLM\SYSTEM\ControlSet002\services\vbma3c79 ->
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_KXTOYKOC ->
HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_USERINIT ->
HKCR\CLSID\{4FA18276-912A-11D1-AD9B-00C04FD8FDFF}\InprocServer32: winSxS\x86_Microsoft.Windows.Shell.HWEventDetector_6595b64144ccf1df_5.2.2.3_x-ww_5390e909\shsvcs.dll
Fichier HOSTS:
127.0.0.1 localhost
::1 localhost
Finished
Tigzy wrote: EDIT: Anyone got a sample of Windows problem detector?Windows Wise Protection