Let's look for clues about the programs running on your PC at startup. You need a basic understanding of the components of the Windows operating system, such as the registry.
Live Windows VM
Sysinternals
The startup locations are configured as startup applications, as well as the full list of file system and registry locations available for startup settings. Startup locations include login entries, Explorer add-ons, and Internet Explorer add-ons, including Browser Helper Objects (BHO). ), Appinit DLLs, image hijacks, boot run images, Winlogon notification DLLs, Windows and Winsock layered service providers, media codecs and more. The autoruns app is excellent for this purpose.
Malware can use persistence techniques to maintain its existence on a compromised network. Persistence techniques can ensure that a hacker can retain access to a system even after rebooting, changing credentials, or other similar interruptions that would otherwise disconnect them. This includes replacing or changing code, inserting startup code, and other actions that an attacker could take on the system. Ensure persistence. The following list describes some common persistence techniques.
Regedit is a utility that can be used to hide and run programs that are automatically triggered by the RunOnce keys.
A task can be scheduled to run a malicious payload at system startup.
Malware can register a service with a binary path that points to a malicious executable program on the hard drive.
Malware can persist through a home folder. All executable files in the folder will run at startup.
Common DLLs running in any process can get infected.
MBR can be manipulated to load malware on reboot.
Try to find clues about persistent programs using the Autoruns application included in the Sysinternals Toolkit. Download and install Autoruns from here: https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns You must absolutely install Autoruns. The executable can be run directly by double-clicking the "Run Now From" link. Autoruns divides the view into several tabs. Use the All tab for a simple search.
Use autorun to find programs that are marked to run but are no longer installed. If a program is registered to run in the registry at startup, but has been removed without removing the key, the computer will keep trying to run it. These programs are highlighted in yellow. Note that the programs shown in the example may be different for each new system you use. Look for registry keys that contain startup locations (at least three keys). In Autoruns, switch to the Login tab, which lists all the programs activated by the login service. Note that this must be done to filter the output. Triggers can also make programs run automatically. Common registry keys on every computer include
HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\
The Login tab lists information about the programs that the login service activates. In this case, look at the folders. Most Windows versions include: Look for "Not Reviewed" in the Publisher column for each application. During automatic runs, the software labeled "Not Checked" is displayed in red. These are software applications whose publisher is unknown. While unverified software is not necessarily malicious, it should still be verified.
- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup
- C:\Users\JohnD\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Thank you!