Tech Support Forum banner
Not open for further replies.
1 - 4 of 4 Posts

· Registered
1,483 Posts
Discussion Starter · #1 ·
Is it possible to hide a virus that well ...there is nothing in start up, Nortons doesnt find it and free online scanners dont find it, there is nothing in any other start up -including things like autoexe.bat and the proper reg key...HKLM....Current version/Run ...ect

Just wondering???:rolleyes:

any thoughts....or does EVERYTHING that starts up on boot up show up somewhere???

If so where???

· Registered
1,274 Posts
Okay... I don't have the answer to your question, but I do have something to throw into the mix.... some viruses are capable of melding themselves into normal system files...Norty is lazy when it comes to this, and I doubt internet searches are presumtuous enough to scan system files that are already in use. Plus all it takes is a reference inside one of these system files with real names to trigger say a memory only virus. ( gotta hate the crap that hides in your RAM) Atleast as far as I know there isn't anything that hides in idle processes...that'd suck!

· hey
10,244 Posts
All Known and (so called) Unknown Autostart Methods

1. Autostart folder
C:\windows\start menu\programs\startup {english}
C:\windows\Menu Démarrer\Programmes\Démarrage {french}
C:\windows\All Users\Menu Iniciar\Programas\Iniciar { Portuguese, Brasilian }

This Autostart Directory is saved in :
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
Startup="C:\windows\start menu\programs\startup"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders]
Startup="C:\windows\start menu\programs\startup"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer\User Shell Folders]
"Common Startup"="C:\windows\start menu\programs\startup"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer\Shell Folders]
"Common Startup"="C:\windows\start menu\programs\startup"

By setting it to anything other then C:\windows\start menu\programs\startup will lead to
execution of ALL and EVERY executable inside set directory.
As of 10/03/2001 Subseven 2.2 now uses this method.

2. Win.ini

3. System.ini
Shell=Explorer.exe file.exe

4. c:\windows\winstart.bat
Note behaves like an usual BAT file. Used for copying deleting specific files.
Autostarts everytime.

5. Registry

6. c:\windows\wininit.ini
Often Used by Setup-Programs when the file exists it is run ONCE and then is deleted by windows.
Example content of wininit.ini :
This example sends c:\windows\picture.exe to NUL, which means that it is being deleted.
This requires no interactivity with the user and runs totaly stealth.

7. Autoexec.bat
Starts everytime at Dos Level.

8. Registry Shell Spawning
[HKEY_CLASSES_ROOT\exefile\shell\open\command] @="\"%1\" %*"
[HKEY_CLASSES_ROOT\comfile\shell\open\command] @="\"%1\" %*"
[HKEY_CLASSES_ROOT\batfile\shell\open\command] @="\"%1\" %*"
[HKEY_CLASSES_ROOT\htafile\Shell\Open\Command] @="\"%1\" %*"
[HKEY_CLASSES_ROOT\piffile\shell\open\command] @="\"%1\" %*"
[HKEY_LOCAL_MACHINE\Software\CLASSES\batfile\shell\open\command] @="\"%1\" %*"
[HKEY_LOCAL_MACHINE\Software\CLASSES\comfile\shell\open\command] @="\"%1\" %*"
[HKEY_LOCAL_MACHINE\Software\CLASSES\exefile\shell\open\command] @="\"%1\" %*"
[HKEY_LOCAL_MACHINE\Software\CLASSES\htafile\Shell\Open\Command] @="\"%1\" %*"
[HKEY_LOCAL_MACHINE\Software\CLASSES\piffile\shell\open\command] @="\"%1\" %*"

The key should have a value of Value "%1 %*", if this is changed to "server.exe %1 %*",
the server.exe is executed EVERYTIME an exe/pif/com/bat/hta is executed.

Known as Unkown Starting Method and is currently used by Subseven.

9. Icq Inet
This key includes all the APPS which are executed IF ICQNET Detects an Internet Connection.

10. Explorer start-up

Windows 95,98,ME
Explorer.exe is started through a system.ini entry,
the entry itself contains no path information so if c:\explorer.exe exists it will be started
instead of c:\$winpath\explorer.exe.

Windows NT/2000
The Windows Shell is the familiar desktop that's used for interacting with Windows.
During system startup, Windows NT 4.0 and Windows 2000 consult the "Shell" registry entry,
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell,
to determine the name of the executable that should be loaded as the Shell.
By default, this value specifies Explorer.exe.

The problem has to do with the search order that occurs when system startup is in process.
Whenever a registry entry specifies the name of a code module, but does it using a relative path,
Windows initiates a search process to find the code. The search order is as follows:

- Search the current directory.
- If the code isn't found, search the directories specified in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Environment\Path, in the order in which they are specified.
- If the code isn't found, search the directories specified in HKEY_CURRENT_USER\Environment\Path, in the order in which they are specified.

More info :
Patch :

General :
If a trojan installs itself as c:\explorer no run keys or other start-up entries are needed.
If c:\explorer.exe is a corrupted file the user will be locked out of the system.
Affects all windows version as of today.

11. Active-X Component
HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\Installed Components\KeyName
Believe it or not, this does start filename.exe BEFORE the shell and any other Program normaly started over the Run Keys.

Misc Information
[HKEY_LOCAL_MACHINE\Software\CLASSES\ShellScrap] @="Scrap object"
The NeverShowExt key has the function to HIDE the real extension of the file (here) SHS.
This means if you rename a file as "Girl.jpg.shs" it displays as "Girl.jpg" in all programs including Explorer.
Your registry should be full of NeverShowExt keys, simply delte the key to get the real extension to show up.

· Registered
1,483 Posts
Discussion Starter · #4 · (Edited)
OK your finger hurt after that one FPRIVATE "TYPE=PICT;ALT="

and now we know where to start....others add in if you have more...??

Can a process run under NT 2000 or XP without showing up in processes??

Not having more then weird quirks but I thought I explore a little...and I read an article (this month CPU magazine) about a program that is like a lo-jack....if it is stolen...the next im the crook uses it on the internet it reports back to your email with the other uses IP, email so you can follow up with their IP and the's the don't see it doesn't show up anywhere...even if you delete the partition or FDISK the drive.....IT STILL WORKS....the only way to remove it is by registering and getting the remove program from the company...Imagine if this is possible....the VIRUS to end all would go through hard drives faster then a nice big magnet
1 - 4 of 4 Posts
Not open for further replies.