On Mon, 28 Sep 2020 09:01:41 -0000 (UTC), Arlen Holder wrote:
> I can't believe I made the sophomoric mistake of installing DriverPack!
> o (
https://drp.su/en) <== don't install this!
This might be a good starter for a tutorial on manual malware deletion!
I think I've "mostly" maybe hopefully deleted the driverpack software.
a. I manually wiped out the last system restore point it created
b. I manually wiped out the registry keys (I think) it created
c. I manually wiped out the directories (I think) it created
As per these instructions:
o DriverPack - virus
<
https://www.bleepingcomputer.com/forums/t/692661/driverpack-virus/>
o Driver Updaters: Digital Snake Oil, Part 2
<
https://blog.malwarebytes.com/cybercrime/2015/06/driver-updaters-digital-snake-oil-part-2/>
o Never Download a Driver-Updating Utility; They're Worse Than Useless
<
https://www.howtogeek.com/198758/never-download-a-driver-updating-utility-theyre-worse-than-useless/>
In summary, I wiped out the system restore point using these commands:
o Win+R > cmd {control+shift+enter}
vssadmin list shadows
vssadmin delete shadows /Shadow={41e23906-ad53-4697-b51c-6d219224f753}
I wiped out the DriverPack registry keys using these registry favorites:
o Favorites = Uninstall locations 1of4
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\]
(which didn't seem to have any driverpack related keyvalue pairs)
o Favorites = Uninstall locations 2of4
[HKEY_CURRENT_USER\Software\]
Which had the following seemingly driverpack related keys:
Computer\HKEY_CURRENT_USER\SOFTWARE\drpsu
Computer\HKEY_CURRENT_USER\SOFTWARE\DRP
o Favorites = Uninstall locations 3of4
[HKEY_LOCAL_MACHINE\SOFTWARE\]
(which didn't seem to have any driverpack related keyvalue pairs)
o Favorites = Uninstall locations 4of4
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce\]
(which didn't seem to have any driverpack related keyvalue pairs)
I wiped out these two directories which (I think) are DriverPack created:
%appdata%\DriverPackCloud\
%appdata%\iDRPSu\
C:\Users\x\AppData\Local\Temp\DriverPack-20200926225216
And this directory seemed to contain (somehow) the driverpack installer:
%programfiles%\DIFX\01D44FC288378CAC\dpinst64.exe
Name: dpinst64.exe
Size: 686968 bytes (670 KiB)
SHA256: A1BC71AA06E133C76D05C2B0068C3FBA278DC2494CB47CE6065BBAC72893E857
And the tasks in the Windows task directory:
%windir%\Tasks\At1.job
Doublechecking in the Task Scheduler:
o Win+R > taskschd.msc /s
In addition, I ran a few scans:
o Spybot didn't find anything
But Malwarebytes found seven items I had manually missed!
o MalwareBytes <
https://blog.malwarebytes.com/detections/pup-optional-driverpack/
-Log Details-
Objects Scanned: 277639
Threats Detected: 7
Registry Key: 2
PUP.Optional.DriverPack,
HKU\S-1-5-21-1978554282-384915032-812892281-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET
SETTINGS\ZONEMAP\DOMAINS\
drp.su, No Action By User, 632, 472299, 1.0.30520,
, ame, , , PUP.Optional.DriverPack, HKLM\SOFTWARE\WOW6432NODE\DRPSU, No
Action By User, 632, 472300, 1.0.30520, , ame, , ,
Registry Value: 3
PUP.Optional.DriverPack.BITSRST,
HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{78CE9FF6-3182-4B5A-AE5D-7CF5EA3EDF5C},
No Action By User, 5941, 820524, 1.0.30520, , ame, , ,
PUP.Optional.DriverPack.BITSRST,
HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{A4BC7F29-AC10-416F-9BF0-5A53F8E82FD8},
No Action By User, 5941, 820531, 1.0.30520, , ame, , ,
PUP.Optional.DriverPack, HKLM\SOFTWARE\WOW6432NODE\DRPSU|CLIENTID, No
Action By User, 632, 472300, 1.0.30520, , ame, , ,
Folder: 1
PUP.Optional.DriverPack.BITSRST,
C:\USERS\%USERNAME%\APPDATA\LOCAL\TEMP\DriverPack-20200926225216, No Action
By User, 5941, 820525, 1.0.30520, , ame, , ,
File: 1
PUP.Optional.DriverPack.BITSRST,
C:\USERS\%USERNAME%\APPDATA\LOCAL\TEMP\DriverPack-20200926225216\drp.css,
No Action By User, 5941, 820525, 1.0.30520, , ame, ,
D576AACE1958756A57D402D546F1EC87,
F6D7D4DDC2991B52EB6FFC9404DABF853E60DA92EEABEC0F18F5C5736B16C0D0
In summary, these are some of the steps that one could use for malware
deletion when the normal methods don't work.