- The Birth of Spyware
- How Can I Tell If I Have Spyware?
- How Do I Choose a Spyware Scanner?
- Sites to Avoid
- System Admin Information
- Detecting Spyware Processes In MS Windows-Based Machines
- Detecting Spyware Autostart Methods in MS Windows-based Machines
- Configuring Internet Explorer for Network Users
- Using a Hosts File to Block Spyware-Infected Hosts
- Spyware and Security Resources
Detecting Spyware Autostart Methods in MS Windows-based Machines
Removing the autostart method is one of the most important steps in disinfection. If a system admin can remove the malware entry from autostart method used, the malware will fail to execute on reboot (even if the executable files have not been removed).
Following is a list of commonly used autostart methods for malware:
Autostart Folder
All items in the autostart folder will autostart.
Win.ini
[windows] load=malware.exe run=malware.exe
System.ini
[boot] Shell=Explorer.exe malware.exe
Autoexec.bat
c:\malware.exe
Registry Shell Open
[HKEY_CLASSES_ROOT\exefile\shell\open\command] [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\open\command]
A key with the value "%1 %*", will be executed each time you execute an .exe file. "malware.exe %1 %*" .
Alternate Registry Keys
[HKEY_CLASSES_ROOT\.exe] @="myexefile"] [HKEY_LOCAL_MACHINE\Software\CLASSES\myexefile\shell\open\command\ @="malwaree.exe %1 %*"] winstart.bat
A batch file that autostarts with Windows.
Main Registry
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices] [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce] [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run] [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce] [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run] [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce] [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServices]
wininit.ini
This file is called upon when windows loads, it is then deleted.
CAUTION
When editing system.ini, pay careful attention to the Shell=Explorer.exe malware.exe line. Delete only the malware entry. Do not delete Explorer.exe; if you do, the system will not boot into windows.
An invaluable tool for system admins is Start_ups.exe. This program features more than 4000 different startup entries, and many are malware. System admins can use this tool to search for suspected spyware startup entriesavoiding damage caused by deleting legitimate entries. A non-OS-specific HTML version can be downloaded here; it has all the features of the executable, but can be run on all operating systems (that support HTML).