There are instances wherein registry remnants are left after a Trend Micro product has cleaned or quarantined a file. There is also a possibility that the malware payload can modify local security policies of the machine that restrict certain functionalities (i.e. Task Manager).
Usually, malware remnants or security policies are restored automatically by a Trend Micro product. However, there are times when this should be triggered manually. The malware remnants can still be cleaned and changes in system policies can still be restored using GeneriClean.
OfficeScan 10 and Worry-Free Business Security (WFBS)
In OfficeScan 10, GeneriClean (GC) is called every time a malware is detected – whether the malware is running or not. Therefore, if the malware has been deleted by VSAPI, the GeneriClean will still (1) undo the changes made by the malware and/or (2) restore the system policies.
OfficeScan 8.0 and ServerProtect for Windows (SPNT)
In OfficeScan 8.0, GeneriClean is called whenever the malware cannot be cleaned. If the malware already executed itself on the system and VSAPI is able to delete the file, it will not call the GeneriClean and is likely to have malware remnants and/or changes in system policies.
This document aims to help Trend Micro customers on how to manually clean up registry remnants or restore local security policies.
To clean malware remnants and/or restore system policies, please follow the steps below.
To restore system policies and clean the registry remnants left by malware when the files have already been cleaned up by a scan (i.e. real-time or manual scan):
- Go to the folder where the TSC.EXE file is located.
The default locations are:
- OfficeScan: C:\Program Files\Trend Micro\OfficeScan Client
- WFBS/Client Server Security Agent: C:\Program Files\Trend Micro\Client Server Security Agent
- SPNT: C:\Program Files\Trend\Sprotect
- Create the DEADLINKS.INI file if it does not exist yet.
- Add the “[MAL_FILE]” entry on the first line.
- Add the following on the next line:
DEADLINKSFILE=<malware full path and filename>
For example:
DEADLINKSFILE=C:\test\bad.exe
- Save and close the file.
- Run TSC.EXE.
- Restart the system for the policies to take effect.
If the files and registry remnants of the malware have already been cleaned up, but certain functionalities still do not work on the machine (i.e. Task Manager), then please do the following:
- Go to the folder when the TSC.EXE file is located.
The default locations are:
- OfficeScan: C:\Program Files\Trend Micro\OfficeScan Client
- WFBS/Client Server Security Agent: C:\Program Files\Trend Micro\Client Server Security Agent
- SPNT: C:\Program Files\Trend\Sprotect
- Create the DEADLINKS.INI file if it does not exist yet.
- Add the “[MAL_FILE]” entry on the first line.
- Add the “DEADLINKSFILE=” parameter on the next line.
- Save and close the file.
- Run TSC.EXE.
- Restart the system for the policies to take effect.