Download: gmer.net
Features:
- SSDT hook detection
- Hidden process detection
- Hidden service detection
- Hidden file detection
- Hidden registry key detection
Usage:
1. Run as Administrator
2. Click "Scan"
3. Review red-highlighted items
4. Export log for analysis
RKill
Download: bleepingcomputer.com/download/rkill/
Purpose: Terminates malicious processes before scanning
Usage:
1. Download renamed version (iexplore.exe)
2. Run as Administrator
3. Do not reboot immediately
4. Run full antivirus scan after
Install: Windows SDK
Command: windbg -z memory.dmp
Common commands:
!analyze -v
!process 0 0
!drivers
!devobj
!irpfind
Cross-View Analysis
Process Comparison
# API-based process list
tasklist /v > api_processes.txt
# Raw memory process list (requires tools)
# Compare with GMER/Volatility output
# PowerShell process details
Get-Process | Select-Object Name, Id, Path, Company | Export-Csv processes.csv
Driver Verification
# List loaded drivers
driverquery /v > drivers.txt
# Check driver signatures
Get-AuthenticodeSignature -FilePath C:\Windows\System32\drivers\*.sys
# Verify with System File Checker
sfc /scannow
1. Boot into Safe Mode with Networking
- Shift + Restart → Troubleshoot → Startup Settings → Safe Mode
2. Disable System Restore (prevents reinfection)
- System Properties → System Protection → Configure → Disable
3. Run RKill to stop malicious processes
4. Run TDSSKiller for bootkit detection
5. Run GMER for kernel-mode detection
6. Run Malwarebytes full scan
7. Check scheduled tasks
- taskschd.msc → Review all tasks for suspicious entries
8. Check services
- services.msc → Review for unknown services
9. Verify hosts file
- notepad C:\Windows\System32\drivers\etc\hosts
10. Check DNS settings
- ipconfig /all → Verify DNS servers
Advanced: Offline Scanning
1. Create Windows PE boot USB
- Use Windows ADK or Rufus with WinPE
2. Boot from USB
3. Run scans from clean environment:
- Mount infected drive as secondary
- Scan with portable antivirus
- Check for rootkits in offline registry
4. Clean MBR if infected:
- bootrec /fixmbr
- bootrec /fixboot
- bootrec /scanos
- bootrec /rebuildbcd
Nuclear Option: Complete Eradication
Secure Erase and Rebuild
1. Boot from Windows installation media
2. Open Command Prompt (Shift+F10)
3. Diskpart commands:
diskpart
list disk
select disk 0
clean all
exit
4. Reflash UEFI firmware:
- Download latest firmware from manufacturer
- Use USB flashback or DOS flash utility
- Clear CMOS after flash
5. Reinstall Windows from verified media
6. Restore data from clean backups only
- Do not restore executables
- Scan all documents before opening