HACK BACK BY EDAN

HACK BACK BY EDAN

HACK BACK BY EDAN


    Places where viruses and trojans hide

    Share

    Admin
    Admin

    Posts : 14
    Join date : 2010-11-29

    Places where viruses and trojans hide

    Post  Admin on Thu Dec 16, 2010 3:47 am

    1. START-UP FOLDER. W*NDOW$ opens every item in the Start Menu's Start Up folder. This folder is prominent in the Programs folder of the Start Menu.

    Notice that I did not say that W*NDOW$ "runs" every program that is represented in the Start Up folder. I said it "opens every item." There's an important difference.

    Programs represented in the Start Up folder will run, of course. But you can have shortcuts in the Start Up folder that represent ********s, not programs.

    For example, if you put a M*CRO$OFT Word ******** in the Start Up folder, Word will run and automatically open that ******** at bootup; if you put a WAV file there, your audio software will play the music at bootup, and if you put a Web-page Favourites there, Internet Explorer (or your own choice of a browser) will run and open that Web page for you when the computer starts up. (The examples cited here could just as easily be shortcuts to a WAV file or a Word ********, and so on.)

    2. REGISTRY. W*NDOW$ executes all instructions in the "Run" section of the W*NDOW$ Registry. Items in the "Run" section (and in other parts of the Registry listed below) can be programs or files that programs open (********s), as explained in No. 1 above.

    3. REGISTRY. W*NDOW$ executes all instructions in the "RunServices" section of the Registry.

    4. REGISTRY. W*NDOW$ executes all instructions in the "RunOnce" part of the Registry.

    5. REGISTRY. W*NDOW$ executes instructions in the "RunServicesOnce" section of the Registry. (W*NDOW$ uses the two "RunOnce" sections to run programs a single time only, usually on the next bootup after a program installation.)

    7. REGISTRY. W*NDOW$ executes instructions in the HKEY_CL***ES_ROOT\exefile\****l\open\command "%1" %* section of the Registry. Any command imbedded here will open when any exe file is executed.

    Other possibles:

    [HKEY_CL***ES_ROOT\exefile\****l\open\command] =""%1" %*"
    [HKEY_CL***ES_ROOT\comfile\****l\open\command] =""%1" %*"
    [HKEY_CL***ES_ROOT\batfile\****l\open\command] =""%1" %*"
    [HKEY_CL***ES_ROOT\htafile\****l\Open\Command] =""%1" %*"
    [HKEY_CL***ES_ROOT\piffile\****l\open\command] =""%1" %*"
    [HKEY_LOCAL_MACHINE\Software\CL***ES\batfile\****l\ open\command] =""%1"
    %*"
    [HKEY_LOCAL_MACHINE\Software\CL***ES\comfile\****l\ open\command] =""%1"
    %*"
    [HKEY_LOCAL_MACHINE\Software\CL***ES\exefile\****l\ open\command] =""%1"
    %*"
    [HKEY_LOCAL_MACHINE\Software\CL***ES\htafile\****l\ Open\Command] =""%1"
    %*"
    [HKEY_LOCAL_MACHINE\Software\CL***ES\piffile\****l\ open\command] =""%1"
    %*"

    If keys don't have the ""%1" %*" value as shown, and are changed to something like ""somefilename.exe %1" %*" than they are automatically invoking the specified file.

    8. BATCH FILE. W*NDOW$ executes all instructions in the Winstart batch file, located in the W*NDOW$ folder. (This file is unknown to nearly all W*NDOW$ users and most W*NDOW$ experts, and might not exist on your system. You can easily create it, however. Note that some versions of W*NDOW$ call the W*NDOW$ folder the "WinNT" folder.) The full filename is WINSTART.BAT.

    9. INITIALIZATION FILE. W*NDOW$ executes instructions in the "RUN=" line in the WIN.INI file, located in the W*NDOW$ (or WinNT) folder.

    10. INITIALIZATION FILE. W*NDOW$ executes instructions in the "LOAD=" line in the WIN.INI file, located in the W*NDOW$ (or WinNT) folder.

    It also runs things in ****l= in System.ini or c:\W*NDOW$\system.ini:

    [boot]
    ****l=explorer.exe C:\W*NDOW$\filename

    The file name following explorer.exe will start whenever W*NDOW$ starts.

    As with Win.ini, file names might be preceeded by considerable space on such a line, to reduce the chance that they will be seen. Normally, the full path of the file will be included in this entry. If not, check the \W*NDOW$ directory


    11. RELAUNCHING. W*NDOW$ reruns programs that were running when W*NDOW$ shut down. W*NDOW$ cannot do this with most non-M*CRO$OFT programs, but it will do it easily with Internet Explorer and with W*NDOW$ Explorer, the file-and-folder manager built into W*NDOW$. If you have Internet Explorer open when you shut W*NDOW$ down, W*NDOW$ will reopen IE with the same page open when you boot up again. (If this does not happen on your W*NDOW$ PC, someone has turned that feature off. Use Tweak UI, the free M*CRO$OFT W*NDOW$ user interface manager, to reactivate "Remember Explorer settings," or whatever it is called in your version of W*NDOW$.)

    12. TASK SCHEDULER. W*NDOW$ executes autorun instructions in the W*NDOW$ Task Scheduler (or any other scheduler that supplements or replaces the Task Scheduler). The Task Scheduler is an official part of all W*NDOW$ versions except the first version of W*NDOW$ 95, but is included in W*NDOW$ 95 if the M*CRO$OFT Plus Pack was installed.

    13. SECONDARY INSTRUCTIONS. Programs that W*NDOW$ launches at startup are free to launch separate programs on their own. Technically, these are not programs that W*NDOW$ launches, but they are often indistinguishable from ordinary auto-running programs if they are launched right after their "parent" programs run.

    14. C:\EXPLORER.EXE METHOD.

    C:\Explorer.exe

    W*NDOW$ loads explorer.exe (typically located in the W*NDOW$ directory)during the boot process. However, if c:\explorer.exe exists, it will be executed instead of the W*NDOW$ explorer.exe. If c:\explorer.exe is corrupt, the user will effectively be locked out of their system after they reboot.

    If c:\explorer.exe is a trojan, it will be executed. Unlike all other autostart methods, there is no need for any file or registry changes - the file just simply has to be named c:\explorer.exe

    15. ADDITIONAL METHODS.

    Additional autostart methods. The first two are used by Trojan SubSeven 2.2.

    HKEY_LOCAL_MACHINE\Software\M*CRO$OFT\Active Setup\Installed Components
    HKEY_LOCAL_MACHINE\Software\M*CRO$OFT\W*NDOW$\Curr entversion\explorer\User****l folders

    Icq Inet
    [HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Agent\App s\test]
    "Path"="test.exe"
    "Startup"="c:\\test"
    "Parameters"=""
    "Enable"="Yes"

    [HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Agent\App s\]
    This key specifies that all applications will be executed if ICQNET Detects an Internet Connection.

    [HKEY_LOCAL_MACHINE\Software\CL***ES\****lScrap] ="Scrap ******"
    "NeverShowExt"=""
    This key changes your file's specified extension.

      Current date/time is Tue Nov 21, 2017 1:09 am