Созданные ответы форума
-
АвторСообщения
-
Ну и что? Спецы….. Слабо помочь-то???
Проблемы с трафиком заметил в январе, заменил KIS 7 на KIS 2009, ничено не изменилось, в начале февраля установил НОД 32, то же самое.
Посылал вчера появляющиеся зараженные файлы в службу поддержки AVIRA? вот ответ:
Dear Sir or Madam,Thank you for your email to Avira’s virus lab.
Tracking number: INC00264753.We received the following archive files:
File ID Filename Size (Byte) Result
25264491 326.15 KB OKA listing of files contained inside archives alongside their results can be found below:
File ID Filename Size (Byte) Result
25264492 idzzwl.exe 328.78 KB MALWARE
4039214 khs 0 Byte KNOWN CLEANPlease find a detailed report concerning each individual sample below:
Filename Result
idzzwl.exe MALWAREThe file ‘idzzwl.exe’ has been determined to be ‘MALWARE’. Our analysts named the threat TR/Onlinegames.A3. The term «TR/» denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.Detection is added to our virus definition file (VDF) starting with version 7.01.01.57.
Filename Result
khs KNOWN CLEANThe file ‘khs’ has been determined to be ‘KNOWN CLEAN’. In particular this means that we could not find any malicious content. Please note that the file is part of ‘Microworld Technologies mailscan administrator 4.0.1.0’.
Alternatively you can see the analysis result here:
http://analysis.avira.com/samples/details.php?uniqueid=cm0yGrcEZZgJ3HBQM2xGhMIftxvNWzXh&incidentid=264753An overview of all your submissions can be found here:
http://analysis.avira.com/samples/details.php?uniqueid=cm0yGrcEZZgJ3HBQM2xGhMIftxvNWzXhWe recommend to use our upload form for further submissions. In case the result is known it will be shown in realtime to you. Furthermore files which are considered to be false positive suspictions can only be submitted using this method. http://analysis.avira.com/samples/index.php?lang=en
Please note: The detection of Spy/Adware is not available in the product «AntiVir PersonalEdition Classic». Please address specific questions to support@avira.com
Kind regards
Avira Virus Lab
Avira GmbH
Lindauer Str. 21, D-88069 Tettnang, Germany
Phone: +49 (0) 7542-500 0
Fax: +49 (0) 7542-525 10
Internet: http://www.avira.comCEO: Tjark Auerbach
Headquarter: Tettnang
Commercial register: AG Ulm HRB 630992
а вот GMER log:
GMER 1.0.14.14536 — http://www.gmer.net
Rootkit scan 2009-02-18 21:33:06
Windows 5.1.2600 Service Pack 2—- System — GMER 1.0.14 —-
SSDT sptd.sys ZwCreateKey [0xF73F10D0]
SSDT F7CCD1BC ZwCreateThread
SSDT sptd.sys ZwEnumerateKey [0xF73F6FB2]
SSDT sptd.sys ZwEnumerateValueKey [0xF73F7340]
SSDT sptd.sys ZwOpenKey [0xF73F10B0]
SSDT F7CCD1A8 ZwOpenProcess
SSDT F7CCD1AD ZwOpenThread
SSDT sptd.sys ZwQueryKey [0xF73F7418]
SSDT ??C:WINDOWSTEMPASFWHide ZwQuerySystemInformation [0xF703E486]
SSDT sptd.sys ZwQueryValueKey [0xF73F7298]
SSDT sptd.sys ZwSetValueKey [0xF73F74AA]
SSDT ??C:WINDOWSTEMPASFWHide ZwTerminateProcess [0xF703E6DA]
SSDT F7CCD1B2 ZwWriteVirtualMemory—- Kernel code sections — GMER 1.0.14 —-
.text ntkrnlpa.exe!ZwCallbackReturn + 25FA 8050161A 2 Bytes [ 3F, F7 ]
? C:WINDOWSsystem32driverssptd.sys Процесс не может получить доступ к файлу, так как этот файл занят другим процессом.
.text USBPORT.SYS!DllUnload F6E3C80C 5 Bytes JMP 867D21C8—- Kernel IAT/EAT — GMER 1.0.14 —-
IAT atapi.sys[HAL.dll!READ_PORT_UCHAR] [F73F1AD4] sptd.sys
IAT atapi.sys[HAL.dll!READ_PORT_BUFFER_USHORT] [F73F1C1A] sptd.sys
IAT atapi.sys[HAL.dll!READ_PORT_USHORT] [F73F1B9C] sptd.sys
IAT atapi.sys[HAL.dll!WRITE_PORT_BUFFER_USHORT] [F73F2748] sptd.sys
IAT atapi.sys[HAL.dll!WRITE_PORT_UCHAR] [F73F261E] sptd.sys—- Devices — GMER 1.0.14 —-
Device FileSystemFastfat FatCdrom 867D11E8
Device DriverNetBT DeviceNetBT_Tcpip_{2BFE5683-E690-40B1-97F6-168E9B7E452B} 86495618
Device DriverNetBT DeviceNetBT_Tcpip_{1618FC0E-C5C6-42DD-B18D-87F3A770FB9C} 86495618
Device Driverusbuhci DeviceUSBPDO-0 8623B1E8
Device Driverusbuhci DeviceUSBPDO-1 8623B1E8
Device Driverdmio DeviceDmControlDmIoDaemon 867661E8
Device Driverdmio DeviceDmControlDmConfig 867661E8
Device Driverdmio DeviceDmControlDmPnP 867661E8
Device Driverdmio DeviceDmControlDmInfo 867661E8
Device Driverusbehci DeviceUSBPDO-2 861803D0
Device Driverusbuhci DeviceUSBPDO-3 8623B1E8
Device Driverusbuhci DeviceUSBPDO-4 8623B1E8
Device Driverusbuhci DeviceUSBPDO-5 8623B1E8
Device Driverusbstor Device 0000070 863FE1E8
Device Driverusbuhci DeviceUSBPDO-6 8623B1E8
Device DriverFtdisk DeviceHarddiskVolume1 867D41E8AttachedDevice DriverFtdisk DeviceHarddiskVolume1 snapman.sys (Acronis Snapshot API/Acronis)
Device Driverusbehci DeviceUSBPDO-7 861803D0
Device Driverusbstor Device 0000071 863FE1E8
Device DriverFtdisk DeviceHarddiskVolume2 867D41E8AttachedDevice DriverFtdisk DeviceHarddiskVolume2 snapman.sys (Acronis Snapshot API/Acronis)
Device Driverusbstor Device 0000072 863FE1E8
Device DriverCdrom DeviceCdRom0 861771E8
Device DriverFtdisk DeviceHarddiskVolume3 867D41E8AttachedDevice DriverFtdisk DeviceHarddiskVolume3 snapman.sys (Acronis Snapshot API/Acronis)
Device Driverusbstor Device 0000073 863FE1E8
Device Driveratapi DeviceIdeIdePort0 867D31E8
Device Driveratapi DeviceIdeIdeDeviceP0T0L0-3 867D31E8
Device Driveratapi DeviceIdeIdePort1 867D31E8
Device Driveratapi DeviceIdeIdeDeviceP1T0L0-e 867D31E8
Device Driverusbstor Device 0000074 863FE1E8
Device Driverusbstor Device 0000075 863FE1E8
Device DriverNetBT DeviceNetBt_Wins_Export 86495618
Device DriverNetBT DeviceNetbiosSmb 86495618
Device Driverusbuhci DeviceUSBFDO-0 8623B1E8
Device Driverusbuhci DeviceUSBFDO-1 8623B1E8
Device FileSystemMRxSmb DeviceLanmanDatagramReceiver 86390790
Device Driverusbehci DeviceUSBFDO-2 861803D0
Device Driverusbuhci DeviceUSBFDO-3 8623B1E8
Device FileSystemMRxSmb DeviceLanmanRedirector 86390790
Device DriverFtdisk DeviceFtControl 867D41E8
Device Driverusbuhci DeviceUSBFDO-4 8623B1E8
Device Driverusbuhci DeviceUSBFDO-5 8623B1E8
Device Driverusbuhci DeviceUSBFDO-6 8623B1E8
Device Driverusbehci DeviceUSBFDO-7 861803D0
Device Driverviasraid DeviceScsiviasraid1 867651E8
Device Driverviasraid DeviceScsiviasraid1Port2Path0Target0Lun0 867651E8
Device FileSystemFastfat Fat 867D11E8AttachedDevice FileSystemFastfat Fat fltMgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
Device FileSystemCdfs Cdfs 8658D2A8
—- Registry — GMER 1.0.14 —-
Reg HKLMSYSTEMCurrentControlSetControlNetwork{4D36E972-E325-11CE-BFC1-08002BE10318}Descriptions@34484=484?4>4@4B4 ?4; 0404=484@4> 0424I484: 0404 ? 0404: 0454B4> 0424 1?2?3?
Reg HKLMSYSTEMCurrentControlSetControlNetwork{4D36E972-E325-11CE-BFC1-08002BE10318}Descriptions@34484=484?4>4@4B4 W A N ( L 002 T P ) 1?
Reg HKLMSYSTEMCurrentControlSetControlNetwork{4D36E972-E325-11CE-BFC1-08002BE10318}Descriptions@34484=484?4>4@4B4 W A N ( P P T P ) 1?
Reg HKLMSYSTEMCurrentControlSetControlNetwork{4D36E972-E325-11CE-BFC1-08002BE10318}Descriptions@34484=484?4>4@4B4 W A N ( P P P o E ) 1?
Reg HKLMSYSTEMCurrentControlSetControlNetwork{4D36E972-E325-11CE-BFC1-08002BE10318}Descriptions@374@4O4<4>494 ? 0404@ 0404;4; 0454;4L4=4K494 ?4>4@4B4 1?
Reg HKLMSYSTEMCurrentControlSetControlNetwork{4D36E972-E325-11CE-BFC1-08002BE10318}Descriptions@34484=484?4>4@4B4 W A N ( I P ) 1?
Reg HKLMSYSTEMCurrentControlSetControlNetwork{4D36E972-E325-11CE-BFC1-08002BE10318}Descriptions@#4A4B4@4>494A4B 0424>4 B l u e t o o t h ( ?4@4>4B4>4:4>4;4 R F C O M M T D I ) 1?
Reg HKLMSYSTEMCurrentControlSetServicesBTHPORTParametersKeys 00272c284d8
Reg HKLMSYSTEMCurrentControlSetServicesBTHPORTParametersKeys 00272c284d8@0012ee86b8bf 0xE9 0x31 0xB3 0x8E …
Reg HKLMSYSTEMCurrentControlSetServicesBTHPORTParametersKeys 00272c284d8@0018132de689 0xCF 0xC7 0x38 0x43 …
Reg HKLMSYSTEMCurrentControlSetServicesBTHPORTParametersKeys 00272c284d8@001f015dc9bf 0xE9 0x15 0xC4 0xED …
Reg HKLMSYSTEMCurrentControlSetServiceslanmanserverShares@244>4:4C4<