You’ll see this on several tabs, but this is the most frequently used. It merely runs every function and program that is checked, in that order.
d7 Auto (on the Malware tab ONLY) also has the feature that if d7 crashes or the system restarts, d7 will automatically pick up where it left off (as best as it can) the next time the system (or d7) restarts.
Also at the top you have the option to save your checked configuration to a profile (use the Default name, or give it one of your own.) Multiple profiles can be saved. Hint: save your most used profile in the top hierarchical alpha-numeric naming order, so it loads automatically when d7 starts up.
Pre-Removal and Post-Removal Items
Some of these may require a little explanation. When inside the d7 interface, rest the mouse cursor over the top of the label (e.g. Reset Hidden Volume) to see the tooltiptext popup, further explaining what a function does.
Each of these items, (with one exception), will be unchecked after the item is run in d7 Auto Mode.
- Custom Apps – These are configurable with your own apps, via d7 > d7 Config > Custom Apps
- Reset Hidden Volume – This option unhides all files (hidden by malware) on the target partition, in the case of the Malware tab that is the operating system partition.
- Kill Rename Ops – This deletes the PendingFileRenameOperation value in the registry that renames/deletes files on reboot.
- Fix File Associations – Import default values for the shell to launch EXE, COM, BAT, CMD, SCR, and REG files. These locations in the registry are HKCR\xxx\Shell\Open\Command where xxx = exefile, comfile, etc.
- Remove Policies – This deletes all registry values relating to Windows group policy settings – often used by malware. In a domain environment, this is safe to use, but on a subsequent login you may want to do a gpupdate /force to refresh all policies on the computer that are *supposed* to be there.
- Clear Proxy Settings – Now works with Firefox!
- Purge System Restore – Deletes all but the last 3 restore points on Windows XP. I leave the last three to give you something to work with incase you need to restore a registry backup for some reason.
- Reset Networking – Performs these commands:
- Deletes Winsock registry keys on Windows XP.
- netsh winsock reset
- netsh winsock reset catalog
- netsh interface ip reset c:int-resetlog.txt
- netsh interface reset all
- netsh interface ip delete arpcache
- ipconfig /flushdns
- ipconfig /registerdns
- Reinstalls TCP/IP on Windows XP
- ipconfig /release all
- ipconfig /renew all
d7 Pre-Malware Scan and Malware Scan Behavior
*** Note: in d7II, the newer version of MalwareScan is dubbed dFunk, however in bringing it to the d7x Platform code we expect to integrate this into KillEmAll.
Here’s a quick breakdown of what is done.
- The registry hives of all user profiles on the system are loaded.
- The OPTIONAL Pre-Malware Scan deletes blacklisted file and registry objects, by name. Nothing fancy, just crude name/location checking. Nothing here for random or evolving names, unfortunately, but works great for frequently removed adware or junk programs.
- The Malware Scan window runs a check every time you click a node to the left. These are all registry entries and file system locations that I used to check by hand. Ugh.
- The Malware Scan window only reports items that do not appear in the whitelists. The theory behind this is that once you know something is good, why be bothered with it cluttering up your lists. If you really want to see everything, you have the option of deleting the whitelists in the Defs folder.
- Whitelists and Blacklists are kept in plain text format, however there is a crude definition editor for the lists.
- Whitelists and Blacklists are created and maintained by whoever uses d7 (that’s you.) In the Malware Scan window you have the option to whitelist and blacklist certain items.
- Functionality is provided to “Update” or MERGE the the definition files. It is designed to be a centralized location like a network share, where you can store and sync with a master copy of the definition files. Using this method, you can easily keep in sync your definitions from your flash drive, or other locations, or with other technicians and their definitions.
- d7 whitelist/blacklist definitions ARE NOT DESIGNED TO UPDATED OR MAINTAINED BY ME, ONLY BY YOU! I do not release updates to the definition files, that’s up to you. You may use the sample definition files provided in the d7 download for your reference, or delete them if you don’t trust them, and you will create your own over time and d7 usage.
d7 Malware Scan Registry Search Locations
Due to the nature of Malware Scan’s whitelisting, most of these nodes on the left will be empty, (that’s a good thing.)
Not every registry location where malware can hide is searched, but I’m off to a decent start. Here is a quick explanation of the search locations Malware Scan can find in each section:
- Misc – These entries give you the option to manually change the value, and a backup is also created of the existing value. Note that you must hit the Apply Changes button to save any changes made.
- Gina DLL value (usually blank)
- AppInit_DLLs value (usually blank)
- UIHost value (usually logonui.exe)
- System value (usually blank)
- Userinit value (usually userinit.exe)
- HKLM and HKCU Shell values (ya know, explorer.exe should be the only thing here, and normally there is no defined HKCU Shell value.)
- Misc2 – More entries where you can manually change the value. Note that you must hit the Apply button to save any changes made.
- Taskman value (usually blank) this value, if present, launches an alternate program when you CTRL-ALT-DELETE
- Magnifier value (usually magnify.exe)
- Narrator value (usually narrator.exe)
- On Screen Keyboard value (usually osk.exe)
- Run Keys – This screen contains all entries populated from the SOFTWARE\Microsoft\Windows\CurrentVersion under HKLM, HKCU, and all user profile registry hives. Registry keys queried are the Run, RunOnce, and Policies\Explorer\Run
- Services – This screen obviously contains all entries found in HKLM\System\CurrentControlSet and ControlSet00x keys \Services subkey.
- Enum\Root – This screen pulls it’s data from HKLM\System\CurrentControlSet and ControlSet00x keys in the Enum\Root subkey. (I apologize for not including a more comprehensive whitelist for this section, as I only recently added detection of this area.)
- BHOs – SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects
- BootExecute – The HKLM\System\CurrentControlSet (and ControlSet00x) ControlSession Manager BootExecute value.
- IFEO – Image File Execution Options. This entry located in HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options and contains debugger values for legitimate applications. This is a bit of a clone of my other function, the IFEO Modifier which has it’s own launcher in D7 (and is it’s own project, please visit the project page on www.d7xtech.com for more information on this registry location and it’s potential uses for malware, AND for US.)
- KnownDLLs – This key is located in HKLM\CurrentControlSet (and ControlSet00x) \Control\Session Manager\KnownDlls
- LoadRun – These are the legacy values Load and Run located in HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
- LogonNotify – Subkeys of HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify
- Safe Mode Svcs – These are services that load in safe mode. The subkeys here are located in HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot (\Minimal and \Network) which are really pointers for the standard services.
- Scheduled Tasks – HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
- ShellExecuteHooks – HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks
- Shell Value – Same as on Misc node, however this one scans all Shell values for all user profiles on the system.
- SSODL – HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
- StartMenuInternet – This displays the values that control launching your default web browser from the Start Menu. Malware often places itself in these keys before the legitimate entry. There is no delete or repair function in D7 here, just open the registry path and fix the value manually if it contains a rogue entry.
d7 Malware Scan File System Search Locations
Items here that appear in RED aren’t necessarily bad, they are just hidden in the file system. Any file that wants to hide itself in my opinion is worth a better look than a file that stands out in the open.
- Hosts File – This one is a no brainer, right?
- Task Scheduler – Not to be confused with the registry location Scheduled Tasks, these are the file system objects (*.job) that represent items in the Windows Task Scheduler.
- Startup Folders – The Startup folder (ya know, in the start menu) of each user, and the All Users profile is scanned here.
- Out of Place Files – Here is where it actually gets a little interesting. This concept feature searches for files that just don’t seem like they should belong where they are. Most of these locations can contain legitimate objects in subdirectories, but they don’t rarely contain legitimate objects in these directories themselves, usually it’s malware in my experience. So I have d7 just check for anything “out of place” …Specifically, it finds *.EXE, *.DLL, *.SYS, and *.DAT in these locations (but NOT in their subdirs):
- %userprofile%\Application Data
- %userprofile%\Local Settings\Application Data
- It hits up the above locations in each user profile, also in the %allusersprofile% (and program data of course)
- %program files%
- %program files(x86)%
- Temp Dir – This checks for *.EXE and *.DLL in the temp directories and their subs of each user profile and Windows\Temp. There might be a lot of legitimate stuff in there, UNLESS you used the delete temp files function PRIOR to checking this area. If you did, then what’s left is running / in-use and maybe you should take a closer look.
- Find New Files… – This function searches for all new files (by default within the past 30 days) in the Windows, Windows\System32, and all user profile app data and temp folders.
- Windows Dir, System32 and System32\Drivers – This is more of an experiment, but has proven helpful. By applying whitelisting to every file found in these directories, you are left with hopefully few results. (I wish I could say this for the System32 scan) but hopefully in those results you’ll see some malware if present. This is my answer to Find New Files… not finding malware that has modified it’s date/time stamp.
- ADS (Quick) – Scans for alternate data streams in the following locations:
- Windows directory (no subdirs)
- Windows\System32 directory (with sudirs)
- ProgramData (if exist, with subdirs)
- %userprofile%\Application Data (for each user profile)
- %userprofile%\Application Data\Local Settings\Application Data (for each user profile)
- %userprofile%\Appdata (for each user profile)
- ADS (Full) – Scans for alternate data streams on the entire volume.
CryptoPrevent v18.104.22.168 just released! v22.214.171.124 Fixed an issue sending email with Office 365 SMTP...
d7x v23.1.12 Release Notes Resolved an issue where DataGrab would backup everything except your...
d7x v22.8.10 Release Notes Resolved an issue with the “Reset Networking” and “Repair Winsock”...
d7x v22.8.9 Release Notes Resolved an issue with the “Set Time Zone” feature on...
d7x and Tweaky – Set Time Zone issue with Windows 11 (UPDATED Aug 9th 2022) UPDATE: this issue has been resolved in d7x v22.8.9 and...
d7x v22.2.23 Release Notes It appears that d7x was not applying hidden file and...
d7x v22.1.16 and v22.1.17 Release Notes Added Microsoft OneDrive integration for d7x Reports storage (see the...
d7x v22.1.15 Release Notes Added a user requested option to change the Info Report...
d7x v22.1.14 Release Notes A new ‘d7x Release Notes (RSS)‘ window will display the...
d7x v22.1.7 Release Notes Added new d7x feature to show system info on the...