Worth reading? http://forum.avira.com/wbb/index.php?pa ... dID=145859
Jay
seCURE Connexion Consultant
seCURE Connexion Consultant
A forum for reverse engineering, OS internals and malware analysis
DragonMaster Jay wrote:Worth reading? http://forum.avira.com/wbb/index.php?pa ... dID=145859Yes, perhaps the AV companies should read and be faster to update their software.
HKEY_LOCAL_MACHINE\SYSTEM\Select | Default = 1
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\Session Manager
Value: PendingFileRenameOperations
Data: \??\C:\services.exe !\??\C:\windows\system32\services.exe
HKEY_LOCAL_MACHINE\SYSTEM\Select | Default = 2
rkhunter wrote:Guys, any idea why AV-guys not detected infected services.exe so far?
The file 'services.exe.vir' has been determined to be 'DAMAGED FILE (UNKNOWN)'. In particular this means that this file is damaged and not working properly. We could not find any malicious content. However the heuristic detection module may still detect this particular file even though it is damaged. In that case we will not adjust and remove detection for this damaged file.
DragonMaster Jay wrote:Anyone know a good tool for MBR dump...I haven't known why MBRCheck does not do dumps anymore.MBRFix
kmd wrote:oh lolz i start to believe in gostev words...Don't believe to Gostev, Kaspersky can't detect infected files and it payload as others...