Solved

Manually choosing block in System Control

  • 21 October 2014
  • 34 replies
  • 155 views

Userlevel 2
If I install a peice of PUA that is undetected by WSA and set to monitor, couldn't I therorectically choose 'block' to revert the changes of this PUA? If so, this would seem to be a much easier and more thorough way of uninstalling unwanted software (if done right of course).
 
That was just an example above for future reference.
icon

Best answer by DanP 27 October 2014, 16:18

View original

34 replies

Userlevel 2
@ wrote:
@ wrote:
Setting to block does initiate a roll back. In a previous reply, I tested the rollback with a not well known application called Focus Writer (simple word type program). I made a doc on the desktop from Focus Writer, set the process to block, and my file dissappeared due to the rollback procedure.
I guess my question is now: 
When does the journaling start?
Ex: I install a PUA app. Its gets auto set to Monitor. Does journaling start after the installation or before?
If it is before, then the above test I did didn't work because the rollback procedure did not delete the installation files of Foucs Writer, only the changes the program did after installation.
Thanks!
Journalling should start when an Unknown process enters memory and is Monitored. 
 
Only the changes made by the monitored process will be journalled, so only those changes would be rolled back.
 
Using what you saw  with Focus Writer as an example, journalling and rollback worked as would be expected. The Monitored file was the Focus Writer application file, which created the document, so the change of the created document was rolled back. Since that process did not create the installation files, those files would not be deleted.
 
If you wanted to remove the installation files, you would need to go to Manual Threat Removal, and select the installation file for Focus Writer. If the installer was monitored and journalled, the changes made by the installer would rolled back. 
 
-Dan
 
Yes, thank you. That clears it up. I didn't know about Manual Threat Removal also.
Userlevel 7
Thanks DanP!  I THINK I am starting to understand it a lot better....  :)
Userlevel 7
Badge +35
@ wrote:
Setting to block does initiate a roll back. In a previous reply, I tested the rollback with a not well known application called Focus Writer (simple word type program). I made a doc on the desktop from Focus Writer, set the process to block, and my file dissappeared due to the rollback procedure.
I guess my question is now: 
When does the journaling start?
Ex: I install a PUA app. Its gets auto set to Monitor. Does journaling start after the installation or before?
If it is before, then the above test I did didn't work because the rollback procedure did not delete the installation files of Foucs Writer, only the changes the program did after installation.
Thanks!
Journalling should start when an Unknown process enters memory and is Monitored. 
 
Only the changes made by the monitored process will be journalled, so only those changes would be rolled back.
 
Using what you saw  with Focus Writer as an example, journalling and rollback worked as would be expected. The Monitored file was the Focus Writer application file, which created the document, so the change of the created document was rolled back. Since that process did not create the installation files, those files would not be deleted.
 
If you wanted to remove the installation files, you would need to go to Manual Threat Removal, and select the installation file for Focus Writer. If the installer was monitored and journalled, the changes made by the installer would rolled back. 
 
-Dan
 
Userlevel 2
@ wrote:
Hi mar122999
 
I understand what you are asking which is essentailly what I paraphrased in my last post above.  I still believe that a manually initiated change from 'Monitor' to 'Block' will not initiate the rollback function even if the 'Monitor' was set automatically.  I believe that it is WSA itself that has to make that change for the rollback to be initiated...but we have no official answer so let's try to get it from someone else who may be able to advise... @  would you be able to advise on this point, please...it would be extremely useful either way to know what occurs in these circumstances/how the feature works or does not work in relation to the above scenario.
 
Regards, Baldrick
 
 
Setting to block does initiate a roll back. In a previous reply, I tested the rollback with a not well known application called Focus Writer (simple word type program). I made a doc on the desktop from Focus Writer, set the process to block, and my file dissappeared due to the rollback procedure.
 
I guess my question is now: 
 
When does the journaling start?
 
Ex: I install a PUA app. Its gets auto set to Monitor. Does journaling start after the installation or before?
 
If it is before, then the above test I did didn't work because the rollback procedure did not delete the installation files of Foucs Writer, only the changes the program did after installation.
 
Thanks!
Userlevel 7
Hi mar122999
 
I understand what you are asking which is essentailly what I paraphrased in my last post above.  I still believe that a manually initiated change from 'Monitor' to 'Block' will not initiate the rollback function even if the 'Monitor' was set automatically.  I believe that it is WSA itself that has to make that change for the rollback to be initiated...but we have no official answer so let's try to get it from someone else who may be able to advise... @  would you be able to advise on this point, please...it would be extremely useful either way to know what occurs in these circumstances/how the feature works or does not work in relation to the above scenario.
 
Regards, Baldrick
 
 
Userlevel 2
@ wrote:
I've been thinking a bit about this one, and going back to the OP in this thread, the question was about setting an undetected PUA to Monitor and the Block in order to use the rollback feature in order to uninstall the software.
 
With most PUAs - and most programs in general - it is the installer that makes the changes that you would want to roll back. In the case of most PUAs, the Process that would be set to Monitor and then block may not be making changes to the system, so there would not be anything to be rolled back. 
 
-Dan
 
Well, I was refering to the fact that if WSA marks a PUA on install as 'monitor' (user not doing it). Or any file really...I would like to have the ability to utilize the rollback feature to the best of my ability if of course I know what I am doing.
 
If a piece of malware, pua, ...whatever installs and I know for a fact that this file is bad...I check the System Control menu and see that it was classifeded as 'monitored' by WSA. Instead of scanning with Malwarebytes, calling WSA support, etc. I could therorectically just block the file, and rollback any actions it may have performed (which would be hard to determine if it did any at all...better safe than sorry), and then scan with a third party program to make sure the remnants are clear. This method doesn't seem detrimental as long as you are blocking the right programs.
Userlevel 7
Good question Daniel!
 
Again, I know some of the material we are discussing here is  beyond the average user, but we do get questions on it and it would REALLY help the more advanced users here to be able to really fully understand it for our own use, but also in trying to answer questions on the Forum.  We can answer much more accurately if we understand more fully.
 
Thanks you Dan for all the info so far!
Userlevel 7
Badge +56
Yeppers I agree in the case of the OP it would not rollback because it's after the fact! @ can we get some info on the SafeStart Sandbox could a user run a program inside the sandbox to test programs and use it to remove all traces of the program like in the case of testing a program to see if you want to keep it or not? http://www.webroot.com/En_US/SecureAnywhere/PC/WSA_PC_Help.htm#C10_SystemControl/CH10c_UsingSafeStart.htm
 
Daniel ;)
 

Userlevel 7
@ wrote:
I've been thinking a bit about this one, and going back to the OP in this thread, the question was about setting an undetected PUA to Monitor and the Block in order to use the rollback feature in order to uninstall the software.
 
With most PUAs - and most programs in general - it is the installer that makes the changes that you would want to roll back. In the case of most PUAs, the Process that would be set to Monitor and then block may not be making changes to the system, so there would not be anything to be rolled back. 
 
-Dan
Quite so, quite so.
 
While I was entirely wrong in my expectations of how the rollback worked, I was still correct in that in the case of the OP it would still not do what he wanted.
Userlevel 7
Hi Daniel...I am with you on that.  I do the same...;)
 
But more specifically if I, a user mark a file as 'Monitor', it journals, etc., and then I switch it to 'Block' (the OP asked..."couldn't I therorectically choose 'block' to revert the changes"...I believe that no rollback will or can occur.  That is what I would like to confirm, and also...if I have manually generated journals, as per the above method...if they remain on disk...in the apropriate directory, then could Support use them as part of a manually initiated rollback action...if such a thing is even possible?
 
C'est tout, mon ami...:D
 
Le Baldricque
Userlevel 7
Badge +35
I've been thinking a bit about this one, and going back to the OP in this thread, the question was about setting an undetected PUA to Monitor and the Block in order to use the rollback feature in order to uninstall the software.
 
With most PUAs - and most programs in general - it is the installer that makes the changes that you would want to roll back. In the case of most PUAs, the Process that would be set to Monitor and then block may not be making changes to the system, so there would not be anything to be rolled back. 
 
-Dan
Userlevel 7
Badge +56
Yes and I Agreed I don't even play with it, but only to set to Allow from Monitored when I know it's a safe Program and processes from an updated program and most times I contact support to get them Whitelisted and of courses if it's not good there are not going to Whitelist it they will mark it Bad and WSA will remove it. LOL
 
Daniel 😉
Userlevel 7
Hi Daniel, thanks...but this I know other than the last part and I am sure that I have seen a thread in which it was stated that WSA setting something to Monitor and a user doing that does not have the same end result in terms of the rollback...hence why Webroot do not recommend  (at least as I understand it, but perhaps incorrectly) that users set files to Monitor.
 
@ Roy...I think that it was in one of your post in a thread a good few months ago where I thought this was said...can you by any chance recall this and advise as to whether what I am saying is a delusion or not?
 
Many thanks
 
 
 
Baldrick
Userlevel 7
@ wrote:
David & Solly if you look at this video: https://community.webroot.com/t5/Webroot-Education/What-Happens-if-Webroot-quot-Misses-quot-a-Virus/ta-p/10202  Monitoring only starts when the file is Executed and able to rollback at the point of  Execution which allows the EXE file there right? Now the same you set a process to monitored then it starts watching what the process is doing then when you set it to block it rollsback to the time of the Monitoering started so in most cases like Dan & Roy said there are many levels of of monitering! I'm going to quote Roy from a post he posted at Wilders!
 
Daniel
That is what I was trying to say, but you phrased it quite better :)
 
 
Userlevel 7
Badge +56
David & Solly if you look at this video: https://community.webroot.com/t5/Webroot-Education/What-Happens-if-Webroot-quot-Misses-quot-a-Virus/ta-p/10202  Monitoring only starts when the file is Executed and able to rollback at the point of  Execution which allows the EXE file there right? Now the same you set a process to monitored then it starts watching what the process is doing then when you set it to block it rollsback to the time of the Monitoering started so in most cases like Dan & Roy said there are many levels of monitering! I'm going to quote Roy from a post he posted at Wilders!
 
"No you can add process to the Identity Shield if you so wish. I dont have the list of native apps that automatically handy at the moment. Any executed process that is unknown in our database will be journalled. If its determined that its bad its changes will be rolled back. This as I said earlier is only one component of our program.

For instance on my PC here, a new version of this application was released recently and its a new .EXE

Monitoring process E:gamesSteamsteamappscommonWar Thunderaces.exe [B2771208D7A3ABD19ADF7F1A7E797AB7]

The client is keeping an eye on what its doing. If it starts doing things that the client determines is bad (behaviour based) it can locally block it too in which case you may see:

Blocked process from accessing protected data C:
oymalwarevaultwebinstallerjd1.exe [Type: 11]"
Now from my scan log:
Fri 17-10-2014 21:38:23.0834 Monitoring process C:Program FilesVoodooShieldVoodooShieldService.exe [3504C7F055D5E2359F7888478AC74BB7]. Type: 3 (3479)
Fri 17-10-2014 21:38:23.0834 Monitoring process C:Program FilesVoodooShieldVoodooShieldService.exe [3504C7F055D5E2359F7888478AC74BB7]. Type: 4 (3479)
Fri 17-10-2014 21:38:23.0834 Monitoring process C:Program FilesVoodooShieldVoodooShieldService.exe [3504C7F055D5E2359F7888478AC74BB7]. Type: 6 (3479)
Fri 17-10-2014 21:38:23.0850 Monitoring process C:Program FilesVoodooShieldVoodooShield.exe [3F527670FE1BFE85E4F00F7183FFEFBE]. Type: 3 (3478)
Fri 17-10-2014 21:38:23.0850 Monitoring process C:Program FilesVoodooShieldVoodooShield.exe [3F527670FE1BFE85E4F00F7183FFEFBE]. Type: 4 (3478)
Fri 17-10-2014 21:38:23.0850 Monitoring process C:Program FilesVoodooShieldVoodooShield.exe [3F527670FE1BFE85E4F00F7183FFEFBE]. Type: 6 (3478)
See the different levels and even Roy showed Level 11 so it would depend on like they said already the Behaviour is taken into account from the Cloud. I don't think they are willing to explain the many levels in public as we don't want to give the malware writers any inside info!
I hope you can understand what I'm trying to say without saying more?
Daniel
Userlevel 7
From what DanP said here, it looks like if the user manually changes it from Monitor to Block, on that particular PC, and only that PC, WSA will now recognize the file as "bad", remove the file, and trigger the rollback for any changes made while the file was in Monitor status.  
 
This would trigger a "bad" determination, and rollback, only on the specific machine that has had the file manually marked as "Block".
 
 
Userlevel 7
Would it be possible for Dan or Roy to advise/clarify for us as to what happens if a user has manually sets a file to 'Monitor', and so limitation of activity/journalling commences...OK...but what happens if the user decides that the file is 'bad' and so sets it subsequently to 'Block'?  It is my understanding that, unlike when WSA determines a file should be blocks, does so and the rollback takes place, that in the case of the user 'determination' of maliciousness the rollback process does not start!  Is that correct?  
 
And if it is then could the user contact Support and they use the journalled information (held in the dbxxxx.dat files) to initiate a rollback.  As if neither of the above occur then there is a question as to what use there is to manually setting a file to 'Monitor'...yes, that will limit activity but in the end that is all if the journalled information cannot be used, etc.
 
Many thanks in anticipation.
 
Regards, Baldrick
Userlevel 7
@ wrote:
@ wrote:
@  In the event that the user changes the status from Monitor to Block, what would happen at that point?
Thanks :)
At that point the file would be determined Bad on the local machine, and the active process would be terminated. On a scan the cleanup/rollback process would start and any changes made by that file after it was set to monitor would be rolled back along with the generic cleanup routine.
 
-Dan
Perfect.. thanks!
 
I was in grave error above on my first reply then... I did not think the rollback would be automatically triggered.  Thank you VERY much for the clarifications @  and @   I do appreciate it!  
 
I know very well to NOT advise a general user to blindly go about blocking files... it is very dangerous if they happen to tag a Windows file... but at the same time I think it important that the more advanced users and members here have a GOOD understanding of it.  I did not..... 
 
I am not sure if I have a good understanding now, but at least it is a lot better than where I was yesterday at this time 🙂
Userlevel 7
Badge +35
@ wrote:
@  In the event that the user changes the status from Monitor to Block, what would happen at that point?
Thanks :)
At that point the file would be determined Bad on the local machine, and the active process would be terminated. On a scan the cleanup/rollback process would start and any changes made by that file after it was set to monitor would be rolled back along with the generic cleanup routine.
 
-Dan
Userlevel 7
@ wrote:
As soon as you set a file to block and close the window a scan Window will pop-up and the file will be removed. Another scan will then start to verify that its been removed. We only recommend that advanced users use this screen as you can cause all sorts of trouble if you start adding windows files to block.
 
I have seen it many a times where a user has googled "SVCHost" and seen somebody has said its a virus and to remove it. Yes its a common spoofed filename but its a legimate windows file! 
@ 
 
Oh I fully agree with that.... .Untold damage can, and does, happen.
 
What I was curious about was simply for the information of  advanced users, if the rollback function would be automatically triggered to undo any changes made whlie the file was in the Monitor status once the file was placed into Block status.
 
I too have seen WAY too many times when people start removing things that they don't know what it is, or what it does.  The number one rule is "If you do not know what it is or what it does, DO NOT TOUCH IT.
Userlevel 7
As soon as you set a file to block and close the window a scan Window will pop-up and the file will be removed. Another scan will then start to verify that its been removed. We only recommend that advanced users use this screen as you can cause all sorts of trouble if you start adding windows files to block.
 
I have seen it many a times where a user has googled "SVCHost" and seen somebody has said its a virus and to remove it. Yes its a common spoofed filename but its a legimate windows file! 
Userlevel 7
@ wrote:
@ 
Manually setting a file to Monitor would cause the file to be monitored and journaled from the point that the file was set to monitor. Only changes made by that file after it was set to monitor would be journaled and be able to be rolled back. 
 
Monitoring will limit program access. There are several different levels of monitoring that are based on the behavior of the file, so in the case of a file manually set to monitor this would be limited to the behavior of the file after being set to monitor. 
 
-Dan
 
 
@  In the event that the user changes the status from Monitor to Block, what would happen at that point?
 
Thanks 🙂
Userlevel 7
Badge +35
@ 
Manually setting a file to Monitor would cause the file to be monitored and journaled from the point that the file was set to monitor. Only changes made by that file after it was set to monitor would be journaled and be able to be rolled back. 
 
Monitoring will limit program access. There are several different levels of monitoring that are based on the behavior of the file, so in the case of a file manually set to monitor this would be limited to the behavior of the file after being set to monitor. 
 
-Dan
 
 
Userlevel 2
I just did a short test with a peice of odd software that I have in my collection (DVR program). WSA marked it for monitor. I then chose "block", scan/delete the file...but no rollback of the installation. I am guessing that Webroot will not rollback the program/folders/files/registry ...etc, but only the files created/changed AFTER installation of the program. I'm confused now lol.
 
 
UPDATE: I did another short test using a program called Focus Writer:
 
http://gottcode.org/focuswriter/
 
WSA marked as monitor, I open the program...create a doc and saved to desktop, blocked progam...scan/delete and during cleanup phase the file that I created dissapeared. So WSA doesn't delete the installed files of the program, only what it CREATES after installation. I guess ;P
 
So if you come across a computer with PUA/riskware/scareware ...etc., I'm glad that I can block, scan/delete, then uninstall the program to know that any changes done to the system (wallpaper change, homepage change, default search changed ...etc) would be rolled back (if the changes were done after installation...i'm not sure if changes during installation are rolled back). I guess a dev would have to answer when the journaling process starts.
Userlevel 2
@ wrote:
Another thing about this if the PUA came as a Bundle the Rollback might remove to the point of the installation of the program. And can go along the lines of this short video: https://community.webroot.com/t5/Webroot-Education/What-Happens-if-Webroot-quot-Misses-quot-a-Virus/ta-p/10202 but it would be nice to hear from some Webroot Threat Researchers on this or even the Developer of that feature? @ will know who!
 
Thanks,
 
Daniel ;)
That videos shows that manually marking it blocked, then scan/delete rolls the software back.
 
EDIT: see below

Reply