App Review Testing Orion Malware Cleaner Designed by Me

It is advised to take all reviews with a grain of salt. In extreme cases some reviews use dramatization for entertainment purposes.
Content created by
https://dai.ly/x9qqhfs

Trident

From Hawk Eye
Thread author
Verified
Top Poster
Developer
Well-known
Feb 7, 2023
4,138
26,615
5,089
hea-p.com
Content source
https://dai.ly/x9qqhfs
How well can a fully signatureless, heuristic-based cleaner eradicate malware from a Windows system?

Let's find out.

In step one, we are infecting the system with an infostealer and we are confirming the infection with Norton Power Eraser.



In step 2, after reboot, we scan with Norton Power Eraser again.



**********************
PowerShell transcript start
Start time: 20250917230028
Username: KATYA-LAPTOP\kgeor
RunAs User: KATYA-LAPTOP\kgeor
Configuration Name:
Machine: KATYA-LAPTOP (Microsoft Windows NT 10.0.26100.0)
Host Application: C:\Program Files\PowerShell\7\pwsh.dll
Process ID: 7772
PSVersion: 7.5.3
PSEdition: Core
GitCommitId: 7.5.3
OS: Microsoft Windows 10.0.26100
Platform: Win32NT
PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1, 6.0, 7.0
PSRemotingProtocolVersion: 2.3
SerializationVersion: 1.1.0.1
WSManStackVersion: 3.0
**********************
Transcript started, output file is C:\Users\kgeor\Documents\Orion_Logs\Orion_Remediation_Log_2025-09-17_23-00-28.log
7-Zip found at 'C:\Program Files\7-Zip\7z.exe'.
Quarantine IS ENABLED. Artifacts will be moved to a password-protected archive.
================================================================
Welcome to the Orion Standalone Remediation Tool v3.2
================================================================

This script will perform a multi-phase scan of your system for
suspicious artifacts commonly associated with malware.

A detailed log of this session will be saved to:
C:\Users\kgeor\Documents\Orion_Logs\Orion_Remediation_Log_2025-09-17_23-00-28.log
PowerShell 7+ detected. Parallel scanning enabled.

Please select a scan mode:
----------------------------------------------------------------
[ 10 ] Gentle Scan (Log Only) - Finds persistence & logs it.
[ 11 ] Gentle Scan (Remove) - Removes persistence config, leaves files.
----------------------------------------------------------------
[ 20 ] Elevated Scan (Log Only) - Finds files/persistence & logs.
[ 21 ] Elevated Scan (Remove) - Quarantines files & persistence.
----------------------------------------------------------------
[ 30 ] Aggressive Scan (Log Only)- Finds orphans, unsigned processes, etc & logs.
[ 31 ] Aggressive Scan (Remove) - Kills/Quarantines unsigned processes & orphaned folders.
----------------------------------------------------------------


Selected Mode: Aggressive Scan
Remove Actions: True

Press Enter to begin the scan...


--- PRE-FLIGHT CHECK: System Restore Point ---
It is highly recommended to create a System Restore Point before making changes.
Skipping System Restore Point creation.

--- AGGRESSIVE PHASE 1: Terminate Unsigned Running Processes ---

Found running processes that are not digitally signed:

Name ID Path
---- -- ----
Drive 8144 C:\Users\kgeor\AppData\Roaming\sys-driver\Drive.exe

WARNING: WARNING: Terminating these could cause instability if they are part of legitimate (but poorly written) software.
Terminated: Drive (PID: 8144)
Quarantined: C:\Users\kgeor\AppData\Roaming\sys-driver\Drive.exe
True

--- AGGRESSIVE PHASE 2: Clean Orphaned Application Folders ---
Scanning for orphaned application folders...

Found folders in Program Files/ProgramData that may not belong to installed software:

FullName CreationTime
-------- ------------
C:\ProgramData\Norton 17.9.2025 г. 22:59:47

WARNING: EXTREME CAUTION: This could delete shared components or drivers. Review carefully.
Quarantined: C:\ProgramData\Norton
True

--- PHASE 1: Hunting for Suspicious Payloads & Hidden Data ---
Scanning Public and Downloads folders...
Scanning ProgramData and AppData\Roaming for isolated, suspicious files...

Suspicious Files Found in common areas:

FullName
--------
C:\Users\kgeor\Downloads\f00591384ec47004189f26bd3766220e991c70987e0c130331a32c38e3411584\f00591384ec47004189f26bd3766…

Quarantined: C:\Users\kgeor\Downloads\f00591384ec47004189f26bd3766220e991c70987e0c130331a32c38e3411584\f00591384ec47004189f26bd3766220e991c70987e0c130331a32c38e3411584.exe
True

Scanning suspicious files for hidden data streams (ADS)...

--- PHASE 2: Hunting for Masquerading System Processes (Advanced) ---
Running parallel masquerading process scan...
No process masquerading detected in high-risk locations.

--- PHASE 3: Hunting for Suspicious Persistence Mechanisms ---
Sub-Phase 3a: Scanning Registry Run keys for suspicious entries...

Suspicious Run Key Entries Found:

KeyPath Name Value
------- ---- -----
Registry::CurrentUser\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Updater "C:\Users\kgeor\AppData\Roaming\sys-driver\
Drive.exe"
Registry::CurrentUser\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Updater "C:\Users\kgeor\AppData\Roaming\sys-driver\
Drive.exe"

PS>TerminatingError(Get-ItemProperty): "The running command stopped because the preference variable "ErrorActionPreference" or common parameter is set to Stop: Cannot find path 'CurrentUser\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' because it does not exist."
WARNING: Failed to process registry value 'Updater': Cannot find path 'CurrentUser\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' because it does not exist..Exception.Message
False
PS>TerminatingError(Get-ItemProperty): "The running command stopped because the preference variable "ErrorActionPreference" or common parameter is set to Stop: Cannot find path 'CurrentUser\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' because it does not exist."
WARNING: Failed to process registry value 'Updater': Cannot find path 'CurrentUser\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' because it does not exist..Exception.Message
False

Sub-Phase 3b: Scanning Scheduled Tasks for suspicious actions...
No suspicious Scheduled Tasks found.

Sub-Phase 3c: Scanning for suspicious WMI persistence...
No suspicious WMI persistence subscriptions found.

Sub-Phase 3d: Hunting for Suspicious Services...
No suspicious services found.

Sub-Phase 3e: Hunting for Suspicious BITS Jobs...
No suspicious BITS jobs found.

Sub-Phase 3f: Hunting for Office Macro Persistence...
No suspicious files found in Office startup locations.

--- PHASE 4: System Integrity & Hardening ---
Scanning for disabled system tools and critical services...
No disabled system tools or critical services found.

Scanning HOSTS file for potential network hijacks...
No active or suspicious HOSTS file entries found.

Scanning Firewall for suspicious outbound rules...
No suspicious outbound firewall rules found.

Scanning for suspicious Defender exclusions...
No suspicious Defender exclusions found.

--- PHASE 5: Proactive System Hygiene ---
Clearing Startup folders...
Cleared: C:\Users\kgeor\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
Cleared: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp
Clearing user temporary files...
PS>TerminatingError(Remove-Item): "The running command stopped because the preference variable "ErrorActionPreference" or common parameter is set to Stop: The process cannot access the file 'C:\Users\kgeor\AppData\Local\Temp\0632740e-220e-46a8-a9f4-7e1939299424.tmp' because it is being used by another process."
WARNING: Failed to clear Temp folder: The process cannot access the file 'C:\Users\kgeor\AppData\Local\Temp\0632740e-220e-46a8-a9f4-7e1939299424.tmp' because it is being used by another process..Exception.Message
Emptying Recycle Bin...
Recycle Bin emptied.

--- PHASE 6: Browser Reset ---
This step can remove malicious browser extensions and settings.
It will reset Chrome, Edge, and Firefox profiles by renaming their parent folders.
Your bookmarks and passwords should be preserved if you are signed into a browser account.
Skipping browser reset.

--- PHASE 7: System File Integrity Check & Updates ---
Skipping Windows Update check.

After a malware infection, it's possible that core system files were corrupted.
This final, optional step will use built-in Windows tools to scan for and repair any damage.
Skipping System File Integrity Check.

================================================================
Orion Remediation Script Finished
================================================================

Summary of Actions Taken:
- Quarantine enabled. Archive: C:\Users\kgeor\Documents\Orion_Logs\Orion_Quarantine_2025-09-17_23-00-28.zip
- Terminated unsigned process: Drive
- Quarantined unsigned process executable: C:\Users\kgeor\AppData\Roaming\sys-driver\Drive.exe
- Quarantined orphaned folder: C:\ProgramData\Norton
- Quarantined file: C:\Users\kgeor\Downloads\f00591384ec47004189f26bd3766220e991c70987e0c130331a32c38e3411584\f00591384ec47004189f26bd3766220e991c70987e0c130331a32c38e3411584.exe
- Cleared Startup folder: C:\Users\kgeor\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
- Cleared Startup folder: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp
- Emptied Recycle Bin

A quarantine archive has been created:
Path: C:\Users\kgeor\Documents\Orion_Logs\Orion_Quarantine_2025-09-17_23-00-28.zip
Password: susp


**********************
PowerShell transcript end
End time: 20250917230305
**********************

Please post any questions, comments and suggestions down bellow.
 
The reason I decided to leave as script and not as an executable with a nice UI is, the executable will be unsinged and highly suspicious.

By the way, Orion Malware Cleaner removed the original malware from downloads as well, whereas Power Eraser detected only the written/dropped files and registry entries, but did not offer to delete the initial file.
 
I would love to see a demo on a heavily infected system :)
It will remove quite a lot of malware, now it has improved quarantine function that attempts to take ownership of files before deletion and saves everything in a password-protected archive.

And a new report makes investigation easier.

1758158023695.png
 
The reason I decided to leave as script and not as an executable with a nice UI is, the executable will be unsinged and highly suspicious.

By the way, Orion Malware Cleaner removed the original malware from downloads as well, whereas Power Eraser detected only the written/dropped files and registry entries, but did not offer to delete the initial file.
Send the executable to China so they can place it on DoD JWICS