Find and remove Malware with Sysinternals Tools - Part 3
In the third and final part of this series, I will show you how to use the Process Monitor tool to detect changes made by malware to the registry and file system .
In part one and part two of this three-part series, we showed you how to use Process Explorer and Autoruns to identify malicious software on Windows systems. Now the new version of Process Explorer (v15.01) has been released this month, you can download it to use its latest version here.
This new version uses less memory, it effectively displays GPU usage and allows you to restart the service. In addition, performance charts also have a more beautiful interface.
Install and use Process Monitor
Process Monitor replaces the old FileMon and RegMon tools, which combine and upgrade the functions of both tools. The current version of Process Monitor is v2.95 and you can download it here.
So what can you do with Process Monitor? This tool is used to capture all real-time data about processes on a computer, including image paths, command lines, users, session IDs and process relationships. With great filtering, you won't have to worry about losing information when setting up filters. With the information obtained, you can analyze the malware found and determine what it is and how to remove it.
You can download and install Process Monitor on your computer (about 1.26 MB). Process Monitor will install a device driver to capture information, then display it in a user-friendly graphical interface. As shown in Figure 1, Process Monitor displays a flow of information for each activity that occurs on the system. By default, the columns shown here include the time, process name and PID, the operation it directs, the path, the result of the activity and the details of the operation (in the picture, we have hidden information). Message path because it contains identification information about user accounts, computer names and domain names.
Figure 1
You can add more columns to get more information about applications, events, and processes, as shown in Figure 2.
Figure 2
The amount of information that Process Monitor provides is very much because there are so many processes running in the background on a Windows system. That means that we need to filter if we want to capture information related to the task of finding malware. Interestingly, the Process Monitor filters restrict what will be displayed, not what is captured. So all data will still be captured but you only see what you need. So you can display entries that match the process name, user, specific time of the day, etc. Many options are shown in Figure 3.
Figure 3
It is possible to create multiple filters to find entries, such as entries created by a particular process at a specific time of the day or may also choose other conditions. This versatility significantly enhances the ability to detect events without being distracted by too many other irrelevant information.
There are many useful buttons on the toolbar that allow you to display registry actions, network actions, file system actions, processes and events, etc. You can take notes and set timelines. need to record to limit the total number of stored events.
When a malware program automatically installs on your system, it extracts files to different locations on the hard drive, copies the driver file to the Windows system directory, adds keys to the Windows registry, and so on. Monitor, you can identify what is creating those files and what appears again after you have deleted, or what are creating suspicious registry entries.
To find out what a process is suspecting, you first need to set up filters to display entries for the process with that name. You can further filter the results or you can review each result line to show what the process is doing. For example, you can choose to display only registry access events to determine what registry keys the process is accessing, changing or adding. Then check that registry value to find out the effect of the changes that are taking place. You can check the file system access entries to find out what files are being taken by a process, or which files are being deleted or added to the system.
It may be easier to review information in other programs, such as Excel or Office. In addition, you can save a copy of information under one of those formats. In that case, you can export the data to a .CSV or .XML file using the 'save to file' option (you can also save the file as the original Process Monitor format, .PML, if you want to open it. re it in Process Monitor.
Process Monitor can be used together with Process Explorer and AutoRuns creates a set of powerful tools in monitoring and removing malware from the system.
What happens if the Sysinternals tool doesn't work?
As I have demonstrated in this three-part series, Sysinternals tools are great help in finding and killing malware, especially useful when using 'zero day' days, when not yet There are new signatures provided by anti-malware vendors. However, sometimes Sysinternals tools do not work because the malware author has thoroughly studied and knows how to bypass these popular tools (as well as commercial anti-virus and anti-malware products) to infiltrate your system. Now you can use Process Explorer, Process Monitor or Autoruns to find the malicious process.
Conclude
In this three-part series, I showed you how to use tools like Process Explorer, Autoruns and Process Monitor to find and kill malware. Besides the free Sysinternals tools, it also provides good support for anyone who wants to learn more about malicious code and wants to exclude it from their system. All can be downloaded for free from the Microsoft website.
You should read it
- What is SysInternals? What are SysInternals Tools used for on Windows?
- How to scan viruses on Windows with Process Explorer
- Is Explorer.exe a virus?
- Why is the security tool only quarantined rather than deleting infected content?
- How to restart the Windows Explorer.exe process
- Microsoft released the Linux version of Sysinternals
- Besides Windows Defender, should users install other anti-virus and anti-malware software?
- What is malware analysis? How are the steps taken?
May be interested
- How to Clean a Computer of Malwarethis wikihow teaches you how to find and remove malware from your windows or mac computer. typically speaking, an antivirus scan will be enough to remove most major threats to your computer. if you're having trouble with your malware...
- 5 types of malware on Androidmalware or malware can affect mobile devices as well as computers. a little bit of knowledge and proper precautions can protect you from threats like ransomware and sextortion scam.
- Some simple tricks to deal with Malwaremalware seems to become more and more intelligent and causes more incalculable consequences than before. installing malware detection tools (malwarebytes, hijackthis, combofix ...) on the computer is not a redundant task. but in some cases, for many reasons (blocked by malware itself) these tools are
- Remove root malware (malware) on Windows 10 computersif pop-up windows are displayed on your windows 10 computer screen or your computer is redirected to advertising windows, it is likely that your computer has adware or chapters. unexpected process of attack.
- Warning: 5 million Samsung, OPPO, Vivo smartphones ... are infected with malware and this is how to check and removea large-scale malware distribution campaign has just been discovered and it is affecting nearly 5 million smartphones of major brands worldwide including honor, huawei, xiaomi, oppo, vivo, samsung and gionee.
- What is FormBook Malware? How to remove?if you manage sensitive data, you should be concerned about the formbook malware. once on a network or pc, this information-stealing malware can cause irreparable damage to your company.
- What is Safe Malware? Why is it so dangerous?remote access trojan (rat) is a type of malware that allows hackers to monitor and control the victim's computer or network.
- Completely remove URL Mal Virus - http://107.170.47.181url: mal is one of the most dangerous dns related to advertising platform. it has the address is http://107.170.47.181. url: mal is created by free software from unwanted programs (pup). url: mal appears on your computer, then your computer will appear a series of ads. its purpose is to trick users into clicking on links to make a profit.
- How to use Malwarebytes Anti-Malware to scan and remove malwaremalwarebytes anti-malware is one of the leading antivirus and computer protection software available today. with the ability to detect and remove malware, trojans, ransomware, adware, and other security threats, malwarebytes helps keep your personal data safe.
- Instructions for removing malware from Steamif popup windows and advertisements appear on the steam game platform, chances are that adware and unwanted programs have intruded your system.