A forum for reverse engineering, OS internals and malware analysis 

Forum for discussion about kernel-mode development.
 #8343  by EP_X0FF
 Tue Aug 30, 2011 7:46 am
Depends on what you want to delete, where and when.
 #8382  by StriderH2
 Fri Sep 02, 2011 3:38 am
What to delete: trojan dlls hooked to winlogon.exe. (The ones that prohibit registry changes for the Pending File Rename Operations value).
Where:
Before the Logon screen- Pre-installation environment.
Automatic <--services start at logon
Demand <-- Manual registration and activation of service
Boot <-- Hard disk
System

How:
1. Create a list of files to delete
2. have the driver read from the file at boot
3. Delete all the files listed in the text


It deletes the file I want when I start the service on Demand and when logged in.
The problem is that when I run OSR loader to have this service scheduled for Boot or System, it says that the file(list to read from) cannot be found when I attempt to test the service.
 #8383  by EP_X0FF
 Fri Sep 02, 2011 3:43 am
StriderH2 wrote:What to delete: trojan dlls hooked to winlogon.exe. (The ones that prohibit registry changes for the Pending File Rename Operations value).
You can try native application. It will be loaded after most of system initialization but before Win32 init.
I.e. have a look on PageDefrag or Autochk.
 #8384  by StriderH2
 Fri Sep 02, 2011 4:41 am
EP_X0FF wrote:
StriderH2 wrote:What to delete: trojan dlls hooked to winlogon.exe. (The ones that prohibit registry changes for the Pending File Rename Operations value).
You can try native application. It will be loaded after most of system initialization but before Win32 init.
I.e. have a look on PageDefrag or Autochk.
Good idea,I should have seen that earlier hahah.
Thanks!