Sunday, July 1, 2012


FIND LOCATIONS: MALWARE


Almost all malware will install in similar directories in order to execute and propagate throughout a victim’s computer. These are some of the more common directories in which malware will install itself on Microsoft Windows (multiple versions)

  • ApplicationData%\Microsoft\
  • %System%\[FileName].dll
  • %Program Files%\Internet Explorer\[ FileName].dll
  • %Program Files%\Movie Maker\[ FileName].dll
  • %All Users Application Data%\[ FileName].dll
  • %Temp%\[ FileName].dll
  • %System%\[ FileName].tmp
  • %Temp%\[ FileName].tmp

Affecting Processes of all malware will attempt to hook system and user processes in order to operate behind the scenes and also attempt to prevent the victim from quickly identifying its activity. These are typical system and user processes affected by malware found.

  • explorer.exe
  • services.exe
  • svchost.exe


This is will attempt to disable operating system features in order to continue to execute and propagate.

  • Windows Automatic Update Service (wuauserv)
  • Background Intelligent Transfer Service (BITS)
  • Windows Security Center Service (wscsvc)
  • Windows Defender Service (WinDefend)
  • Error Reporting Service (ERSvc)
  • Windows Error Reporting Service (WerSvc)


Here are some of most common Registry locations where malware will install itself on a victim’s computer in order to execute and propagate.

  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\
  • HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\

No comments:

Post a Comment