Показано с 1 по 2 из 2.

Is My System Clean?

  1. #1
    Junior Member Репутация
    Регистрация
    24.09.2010
    Сообщений
    1
    Вес репутации
    50

    Is My System Clean?

    Main script of analysis
    Windows version: Microsoft Windows XP, Build=2600, SP="Service Pack 3"
    System Restore: enabled
    1.1 Searching for user-mode API hooks
    Analysis: kernel32.dll, export table found in section .text
    IAT modification detected: CreateProcessA - 00BC0010<>7C80236B
    IAT modification detected: GetModuleFileNameA - 00BC0080<>7C80B56F
    IAT modification detected: GetModuleFileNameW - 00BC00F0<>7C80B475
    IAT modification detected: CreateProcessW - 00BC0160<>7C802336
    IAT modification detected: LoadLibraryW - 00BC0240<>7C80AEEB
    IAT modification detected: LoadLibraryA - 00BC0320<>7C801D7B
    IAT modification detected: GetProcAddress - 00BC0390<>7C80AE40
    IAT modification detected: FreeLibrary - 00BC0400<>7C80AC7E
    Analysis: ntdll.dll, export table found in section .text
    Analysis: user32.dll, export table found in section .text
    Analysis: advapi32.dll, export table found in section .text
    Analysis: ws2_32.dll, export table found in section .text
    Analysis: wininet.dll, export table found in section .text
    Analysis: rasapi32.dll, export table found in section .text
    Analysis: urlmon.dll, export table found in section .text
    Analysis: netapi32.dll, export table found in section .text
    1.2 Searching for kernel-mode API hooks
    Driver loaded successfully
    SDT found (RVA=085700)
    Kernel ntkrnlpa.exe found in memory at address 804D7000
    SDT = 8055C700
    KiST = 80504480 (284)
    Function NtCreateFile (25) - machine code modification Method of JmpTo. jmp B9DC51CCmfehidk.sys, driver recognized as trusted
    Function NtCreateKey (29) - machine code modification Method of JmpTo. jmp B9DC508Amfehidk.sys, driver recognized as trusted
    Function NtCreateProcess (2F) - machine code modification Method of JmpTo. jmp B9DC5024mfehidk.sys, driver recognized as trusted
    Function NtCreateProcessEx (30) - machine code modification Method of JmpTo. jmp B9DC5038mfehidk.sys, driver recognized as trusted
    Function NtDeleteKey (3F) - machine code modification Method of JmpTo. jmp B9DC509Emfehidk.sys, driver recognized as trusted
    Function NtDeleteValueKey (41) - machine code modification Method of JmpTo. jmp B9DC50CAmfehidk.sys, driver recognized as trusted
    Function NtEnumerateKey (47) - machine code modification Method of JmpTo. jmp B9DC5138mfehidk.sys, driver recognized as trusted
    Function NtEnumerateValueKey (49) - machine code modification Method of JmpTo. jmp B9DC5122mfehidk.sys, driver recognized as trusted
    Function NtLoadKey2 (63) - machine code modification Method of JmpTo. jmp B9DC514Emfehidk.sys, driver recognized as trusted
    Function NtMapViewOfSection (6C) - machine code modification Method of JmpTo. jmp B9DC520Cmfehidk.sys, driver recognized as trusted
    Function NtNotifyChangeKey (6F) - machine code modification Method of JmpTo. jmp B9DC517Amfehidk.sys, driver recognized as trusted
    Function NtOpenKey (77) - machine code modification Method of JmpTo. jmp B9DC5076mfehidk.sys, driver recognized as trusted
    Function NtOpenProcess (7A) - machine code modification Method of JmpTo. jmp B9DC4FE8mfehidk.sys, driver recognized as trusted
    Function NtOpenThread (80) - machine code modification Method of JmpTo. jmp B9DC4FFCmfehidk.sys, driver recognized as trusted
    Function NtProtectVirtualMemory (89) - machine code modification Method of JmpTo. jmp B9DC51E0mfehidk.sys, driver recognized as trusted
    Function NtQueryKey (A0) - machine code modification Method of JmpTo. jmp B9DC51B6mfehidk.sys, driver recognized as trusted
    Function NtQueryMultipleValueKey (A1) - machine code modification Method of JmpTo. jmp B9DC510Cmfehidk.sys, driver recognized as trusted
    Function NtQueryValueKey (B1) - machine code modification Method of JmpTo. jmp B9DC50F6mfehidk.sys, driver recognized as trusted
    Function NtRenameKey (C0) - machine code modification Method of JmpTo. jmp B9DC50B4mfehidk.sys, driver recognized as trusted
    Function NtReplaceKey (C1) - machine code modification Method of JmpTo. jmp B9DC51A2mfehidk.sys, driver recognized as trusted
    Function NtRestoreKey (CC) - machine code modification Method of JmpTo. jmp B9DC518Emfehidk.sys, driver recognized as trusted
    Function NtSetContextThread (D5) - machine code modification Method of JmpTo. jmp B9DC5062mfehidk.sys, driver recognized as trusted
    Function NtSetInformationProcess (E4) - machine code modification Method of JmpTo. jmp B9DC504Emfehidk.sys, driver recognized as trusted
    Function NtSetValueKey (F7) - machine code modification Method of JmpTo. jmp B9DC50E0mfehidk.sys, driver recognized as trusted
    Function NtTerminateProcess (101) - machine code modification Method of JmpTo. jmp B9DC523Bmfehidk.sys, driver recognized as trusted
    Function NtUnloadKey (107) - machine code modification Method of JmpTo. jmp B9DC5164mfehidk.sys, driver recognized as trusted
    Function NtUnmapViewOfSection (10B) - machine code modification Method of JmpTo. jmp B9DC5222mfehidk.sys, driver recognized as trusted
    Function NtYieldExecution (116) - machine code modification Method of JmpTo. jmp B9DC51F6mfehidk.sys, driver recognized as trusted
    Function NtCreateFile (80579084) - machine code modification Method of JmpTo. jmp B9DC51CC mfehidk.sys, driver recognized as trusted
    Function NtMapViewOfSection (805B1FE6) - machine code modification Method of JmpTo. jmp B9DC520C mfehidk.sys, driver recognized as trusted
    Function NtOpenProcess (805CB3FA) - machine code modification Method of JmpTo. jmp B9DC4FE8 mfehidk.sys, driver recognized as trusted
    Function NtOpenThread (805CB686) - machine code modification Method of JmpTo. jmp B9DC4FFC mfehidk.sys, driver recognized as trusted
    Function NtSetInformationProcess (805CDE44) - machine code modification Method of JmpTo. jmp B9DC504E mfehidk.sys, driver recognized as trusted
    Functions checked: 284, intercepted: 0, restored: 0
    1.3 Checking IDT and SYSENTER
    Analysis for CPU 1
    >>> Danger - possible CPU address substitution[1].IDT[06] = [B4C2316D] C:\WINDOWS\system32\drivers\Haspnt.sys, driver recognized as trusted
    >>> Danger - possible CPU address substitution[1].IDT[0E] = [B4C22FC2] C:\WINDOWS\system32\drivers\Haspnt.sys, driver recognized as trusted
    Analysis for CPU 2
    >>> Danger - possible CPU address substitution[2].IDT[06] = [B4C2316D] C:\WINDOWS\system32\drivers\Haspnt.sys, driver recognized as trusted
    >>> Danger - possible CPU address substitution[2].IDT[0E] = [B4C22FC2] C:\WINDOWS\system32\drivers\Haspnt.sys, driver recognized as trusted
    Checking IDT and SYSENTER - complete
    1.4 Searching for masking processes and drivers
    Checking not performed: extended monitoring driver (AVZPM) is not installed
    Driver loaded successfully
    1.5 Checking of IRP handlers
    Checking - complete
    >> Services: potentially dangerous service allowed: RemoteRegistry (Remote Registry)
    >> Services: potentially dangerous service allowed: TermService (Terminal Services)
    >> Services: potentially dangerous service allowed: SSDPSRV (SSDP Discovery Service)
    >> Services: potentially dangerous service allowed: Schedule (Task Scheduler)
    >> Services: potentially dangerous service allowed: mnmsrvc (NetMeeting Remote Desktop Sharing)
    >> Services: potentially dangerous service allowed: RDSessMgr (Remote Desktop Help Session Manager)
    > Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)!
    >> Security: disk drives' autorun is enabled
    >> Security: administrative shares (C$, D$ ...) are enabled
    >> Security: anonymous user access is enabled
    >> Security: sending Remote Assistant queries is enabled
    >> Disable HDD autorun
    >> Disable autorun from network drives
    >> Disable CD/DVD autorun
    >> Disable removable media autorun
    System Analysis in progress

    System Analysis - complete

  2. #2
    Administrator Репутация Репутация Репутация Репутация Репутация Репутация Репутация Репутация Репутация Репутация Репутация Аватар для olejah
    Регистрация
    08.03.2010
    Адрес
    Россия, Краснодар
    Сообщений
    11,760
    Вес репутации
    1296
    We need attached logfile in zip archive.

Похожие темы

  1. IT can clean up through clean tech
    От wise-wistful в разделе Offtopic
    Ответов: 1
    Последнее сообщение: 16.10.2020, 07:23
  2. help me to clean
    От Nitin в разделе Malware Removal Service
    Ответов: 0
    Последнее сообщение: 18.09.2010, 15:24
  3. Is my system clean - Worried about rootkits
    От stuartk в разделе Malware Removal Service
    Ответов: 7
    Последнее сообщение: 01.12.2009, 10:15
  4. is it clean?
    От jmattes в разделе Malware Removal Service
    Ответов: 2
    Последнее сообщение: 02.10.2009, 07:15
  5. Ответов: 8
    Последнее сообщение: 10.05.2008, 20:35

Свернуть/Развернуть Ваши права в разделе

  • Вы не можете создавать новые темы
  • Вы не можете отвечать в темах
  • Вы не можете прикреплять вложения
  • Вы не можете редактировать свои сообщения
  •  
Page generated in 0.01425 seconds with 19 queries