Analysis # Sample: ss32.exe ( a6e6d b453e73d) Analysis # /08/ :33 pm

Size: px
Start display at page:

Download "Analysis # Sample: ss32.exe ( a6e6d b453e73d) Analysis # /08/ :33 pm"

Transcription

1 Analysis # /08/ :33 pm 1/14

2 Table of Contents Analysis Summary... 3 Analysis Summary... 3 Digital Behavior Traits... 3 File Activity... 4 Stored Modified Files... 4 Created Mutexes... 5 Created Mutexes... 5 Registry Activity... 6 Created Keys... 6 Set Values... 7 Network Activity... 9 Network Events... 9 Network Traffic DNS Requests Screen Shots Virus Total Results /14

3 Analysis Summary Submitted File: ss32.exe MD5: a6e6d b453e73d File Size: File Type: PE32 executable for MS Windows (GUI) Intel Analysis Time: :33:04 Start Reason: AnalysisTarget Termination Reason: Timeout Start Time: Mon, 08 Jul :33: Termination Time: Mon, 08 Jul :34: Analysis Time: :33:04 Sandbox: XPSP3-00-0C-29-5E-B4-D8 Total Processes: 1 Sample Notes: Digital Behavior Traits Alters Windows Firewall Checks For Debugger Copies to Windows Could Not Load Creates DLL in System Creates EXE in System Creates Hidden File Creates Mutex Creates Service Deletes File in System Deletes Original Sample Hooks Keyboard Injected Code Makes Network Connection Modifies File in System Modifies Local DNS More than 5 Processes Opens Physical Memory Starts EXE in Documents Starts EXE in Recycle Starts EXE in System Windows/Run Registry Key Set 3/14

4 Stored Modified Files C:\Documents and Settings\Administrator\Application Data\v125.txt 4/14

5 Created Mutexes mutex Name: Local\ZonesCounterMutex Desired Access: DELETE READ_CONTROL SYNCHRONIZE WRITE_DAC WRITE_OWNER MUTEX_MODIFY_STATE Name: Local\ZoneAttributeCacheCounterMutex Desired Access: DELETE READ_CONTROL SYNCHRONIZE WRITE_DAC WRITE_OWNER MUTEX_MODIFY_STATE Name: Local\ZonesCacheCounterMutex Desired Access: DELETE READ_CONTROL SYNCHRONIZE WRITE_DAC WRITE_OWNER MUTEX_MODIFY_STATE 5/14

6 Created Keys key \REGISTRY\MACHINE\Software\Description\Microsoft\Rpc\UuidTemporaryData \REGISTRY\MACHINE\SOFTWARE\ \REGISTRY\MACHINE\SOFTWARE\Description\ \REGISTRY\MACHINE\SOFTWARE\Description\Microsoft\ \REGISTRY\MACHINE\SOFTWARE\Description\Microsoft\Rpc\ 6/14

7 Set Values key entversion\run Value: ss32.exe Value: ProxyBypass Value: IntranetName Value: UNCAsIntranet Value: AutoDetect Value: ProxyBypass Value: IntranetName Value: UNCAsIntranet Value: AutoDetect entversion\explorer\shell Folders Value: AppData Key Name: \REGISTRY\MACHINE\Software\Description\Microsoft\Rpc\UuidTemporaryData Value: NetworkAddress Key Name: \REGISTRY\MACHINE\Software\Description\Microsoft\Rpc\UuidTemporaryData 7/14

8 Value: NetworkAddressLocal 8/14

9 Network Events Remote IP Local IP HTTP Command GET /15aDtjB none 9/14

10 Network Traffic Remote IP Local IP Connection # /14

11 DNS Requests Request Result bit.ly mssql.maurosouza9899.kinghost.net /14

12 12/14

13 Virus Total Results Last Scanned: :24:28 MicroWorld-eScan: nprotect: CAT-QuickHeal: McAfee: Malwarebytes: TheHacker: K7GW: Trojan K7AntiVirus: Trojan NANO-Antivirus: F-Prot: Symantec: Norman: TotalDefense: Avast: esafe: ClamAV: Kaspersky: BitDefender: Gen:Variant.Symmi Agnitum: Suspicious!SA SUPERAntiSpyware: Emsisoft: Gen:Variant.Symmi (B) Comodo: DrWeb: VIPRE: AntiVir: TR/Crypt.TPM.Gen TrendMicro: McAfee-GW-Edition: Heuristic.BehavesLike.Win32.Suspicious-BAY.O Sophos: Jiangmin: Antiy-AVL: Kingsoft: Microsoft: ViRobot: AhnLab-V3: GData: Gen:Variant.Symmi Commtouch: ByteHero: PCTools: ESET-NOD32: Rising: Ikarus: Fortinet: AVG: Panda: 13/14

14 Powered by TCPDF ( Analysis # ThreatTrack Security, Inc. 33 North Garden Avenue, Suite 1200, Clearwater, Florida, USA Telephone: (855) Intl: +1(813) Sales@ThreatTrack.com Disclaimer ThreatTrack Security, Inc. All rights reserved. All product and company names herein may be trademarks of their respective owners. The information and content in this document is provided for informational purposes only and is provided as is with no warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. ThreatTrack Security, Inc. is not liable for any damages, including any consequential damages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the accuracy of the data provided, ThreatTrack Security makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out-of-date information, or errors. ThreatTrack Security makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in this document. If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical. 14/14

Analysis # Sample: Important_WellsFargo_Doc.exe (70e604777a66980bcc751dcb00eafee5) Analysis # /10/ :12 pm

Analysis # Sample: Important_WellsFargo_Doc.exe (70e604777a66980bcc751dcb00eafee5) Analysis # /10/ :12 pm Analysis # 31139 06/10/2013 14:12 pm 1/11 Table of Contents Analysis Summary... 3 Analysis Summary... 3 Digital Behavior Traits... 3 Created Mutexes... 4 Created Mutexes... 4 Registry Activity... 5 Created

More information

Analysis # Sample: Scan_ _29911.exe (8fcba93b00dba3d182b1228b529d3c9e) Analysis # /12/ :41 pm

Analysis # Sample: Scan_ _29911.exe (8fcba93b00dba3d182b1228b529d3c9e) Analysis # /12/ :41 pm Analysis # 31187 06/12/2013 18:41 pm 1/12 Table of Contents Analysis Summary... 3 Analysis Summary... 3 Digital Behavior Traits... 3 File Activity... 4 Deleted Files... 4 Created Mutexes... 5 Created Mutexes...

More information

Analysis # Sample: google_born_help.exe (584fe856bb348e0089f7b59ec31881a5) Analysis # /05/ :34 pm

Analysis # Sample: google_born_help.exe (584fe856bb348e0089f7b59ec31881a5) Analysis # /05/ :34 pm Analysis # 20972 10/05/2012 16:34 pm 1/14 Table of Contents Analysis Summary... 3 Analysis Summary... 3 Digital Behavior Traits... 3 File Activity... 4 Deleted Files... 4 Stored Modified Files... 5 Created

More information

Analysis # 1828 Sample: fax_ _ exe (4ba43f0b82f86efed437c8523f7a4dee) Analysis # /25/ :05 am

Analysis # 1828 Sample: fax_ _ exe (4ba43f0b82f86efed437c8523f7a4dee) Analysis # /25/ :05 am Analysis # 1828 07252014 10:05 am 114 Table of Contents Analysis Summary... 3 Analysis Summary... 3 Digital Behavior Traits... 3 File Activity... 4 Deleted Files... 4 Stored Modified Files... 5 Created

More information

Analysis # 2956 Sample: document_73128_91898_pdf.exe (5b94fb32ed60cb839ca4284f80ae3b16) Analysis # /10/ :34 am

Analysis # 2956 Sample: document_73128_91898_pdf.exe (5b94fb32ed60cb839ca4284f80ae3b16) Analysis # /10/ :34 am Analysis # 2956 10/10/2014 06:34 am 1/18 Table of Contents Analysis Summary... 3 Analysis Summary... 3 Digital Behavior Traits... 3 File Activity... 4 Deleted Files... 4 Stored Modified Files... 5 Created

More information

Lab 1: UPX Program Packer. From what we see here Netcat s MD5 is (AB41B1E2DB77CEBD9E EE3915D)

Lab 1: UPX Program Packer. From what we see here Netcat s MD5 is (AB41B1E2DB77CEBD9E EE3915D) Lab 1: UPX Program Packer Lets use UPX Program Packer on Netcat and see what we happens. First lets get the MD5 hash of Netcat and see what it looks like. From what we see here Netcat s MD5 is (AB41B1E2DB77CEBD9E2779110EE3915D)

More information

Language English. Server load. Suspicious file(s) to scan:

Language English. Server load. Suspicious file(s) to scan: Security risk found in message 'DHL customer services. You should get th... http://virscan.org/report/356346ab231bfab52fe5d0eaef8eb3f6.html 1 of 2 2/5/2010 11:11 AM Language English Server load Suspicious

More information

AhnLab-V AntiVir Antiy-AVL Avast

AhnLab-V AntiVir Antiy-AVL Avast VT Community Sign in Languages Virustotal is a service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus

More information

Malware Initial Findings Report (MIFR)

Malware Initial Findings Report (MIFR) US-CERT MIFR-10124171 1 of 41 Malware Initial Findings Report (MIFR) - 10124171 2017-05-14 Notification This report is provided "as is" for informational purposes only. The Department of Homeland Security

More information

A Study of the Relationship Between Antivirus Regressions and Label Changes

A Study of the Relationship Between Antivirus Regressions and Label Changes A Study of the Relationship Between Antivirus Regressions and Label Changes Ilir Gashi 1, Bertrand Sobesto 2, Stephen Mason 1, Vladimir Stankovic 1, and Michel Cukier 2 1 Centre for Software Reliability,

More information

City, University of London Institutional Repository

City, University of London Institutional Repository City Research Online City, University of London Institutional Repository Citation: Cukier, M., Gashi, I., Sobesto, B. & Stankovic, V. (2013). Does Malware Detection Improve With Diverse AntiVirus Products?

More information

PCSL. PCSL IT Consulting Institute. Windows Virus Cleaning Test Report 感染型病毒清除测试报告. Celebrating Technology Innovation

PCSL. PCSL IT Consulting Institute. Windows Virus Cleaning Test Report 感染型病毒清除测试报告. Celebrating Technology Innovation 2015 IT Consulting Institute ❷ Windows Virus Cleaning Test Report 感染型病毒清除测试报告 Celebrating Technology Innovation 报告目录 Table of Contents P1 P2 P3 测试背景 Background 测试流程 Test Process 待测软件 Tested Software P4

More information

UC Davis UC Davis Previously Published Works

UC Davis UC Davis Previously Published Works UC Davis UC Davis Previously Published Works Title Multiprocess Malware Permalink https://escholarship.org/uc/item/0v40f6h3 Authors Ramilli, Marco Bishop, Matt Sun, Shining Publication Date 2011-10-01

More information

1. I am a Computer Forensics Researcher with Kyrus Technology. I make this

1. I am a Computer Forensics Researcher with Kyrus Technology. I make this I, Jesse D. Kornblum, declare as follows: 1. I am a Computer Forensics Researcher with Kyrus Technology. I make this declaration in support of Plaintiffs Application For An Emergency Temporary Restraining

More information

China Region Malware Test 2010 May

China Region Malware Test 2010 May China Region Malware Test 2010 May Basic Introduction Test Time:May 4 th, 2010 Tester:PC Security Labs Test Platform:Windows XP SP3 Professional Simplified Chinese Test Methodology:On-demand scan (default

More information

Anti-Virus Comparative No.1

Anti-Virus Comparative No.1 Anti-Virus Comparative No.1 a) On-demand detection of virus/malware b) On-demand detection of dialers Shortened version Date of Test: 6 February 2004 (2004-02) Author: Andreas Clementi Website: http://www.av-comparatives.org

More information

RTTL Certification Test - March Language: English. March Last Revision: 8 th April

RTTL Certification Test - March Language: English. March Last Revision: 8 th April RTTL Certification Test March 2016 Language: English March 2016 Last Revision: 8 th April 2016-1 - Introduction 1 st AMTSO Real Time Threat List (RTTL) based certification test What is the RTTL? The Real-Time

More information

GFI product comparison: GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.5

GFI product comparison: GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.5 GFI product comparison: GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.5 Features GFI MailEssentials Symantec Mail Security for Microsoft Exchange 7.5 Integrates with Microsoft Exchange

More information

GFI product comparison: GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange

GFI product comparison: GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange GFI product comparison: GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange Features GFI MailEssentials Trend Micro ScanMail Suite for Microsoft Exchange Integrates with Microsoft

More information

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual GFI MailSecurity 2011 for Exchange/SMTP Administration & Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and

More information

GFI Product Comparison. GFI WebMonitor 2015 vs. McAfee Web Gateway

GFI Product Comparison. GFI WebMonitor 2015 vs. McAfee Web Gateway GFI Product Comparison GFI WebMonitor 2015 vs. McAfee Web Gateway Features GFI WebMonitor 2015 McAfee Web Gateway General features Platforms Windows servers and workstation OS Standalone proxy Win 7, 8,

More information

Acer LANScope Agent Acer LANScope Agent x64 Adaptive Security Analyzer 2.0 AEC TrustPort Antivirus

Acer LANScope Agent Acer LANScope Agent x64 Adaptive Security Analyzer 2.0 AEC TrustPort Antivirus Acer LANScope Agent 2.2.25.84 Acer LANScope Agent 2.2.25.84 x64 Adaptive Security Analyzer 2.0 AEC TrustPort Antivirus 2.8.0.2237 AEC TrustPort Personal Firewall 4.0.0.1305 AhnLab SpyZero 2007 and SmartUpdate

More information

Anti-Virus Comparative No.7

Anti-Virus Comparative No.7 Anti-Virus Comparative No.7 On-demand detection of malicious software Date: August 2005 (2005-08) Last revision of this report: 26 th August 2005 Author: Andreas Clementi Website: http://www.av-comparatives.org

More information

FILE :42: :44: Maldun. win7-sp1-x64 win7-sp1-x64 KVM :42: :44:39 10.

FILE :42: :44: Maldun. win7-sp1-x64 win7-sp1-x64 KVM :42: :44:39 10. FILE 2016-02-28 16:42:18 2016-02-28 16:44:39 141 1.4-Maldun win7-sp1-x64 win7-sp1-x64 KVM 2016-02-28 16:42:18 2016-02-28 16:44:39 10.0 invoice_copy_ppvpjb.js 9317 data CRC32 MD5 SHA1 SHA256 B05FA348 f12754f8912d54c1ede472fa56bfeec8

More information

GFI product comparison: GFI MailEssentials vs. Barracuda Spam Firewall

GFI product comparison: GFI MailEssentials vs. Barracuda Spam Firewall GFI product comparison: GFI MailEssentials vs. Barracuda Spam Firewall Features GFI MailEssentials Barracuda Spam Firewall Integrates with Microsoft Exchange Server 2007/2010/2013 Scans incoming and outgoing

More information

GFI product comparison: GFI MailEssentials vs. LogicNow - Control

GFI product comparison: GFI MailEssentials vs. LogicNow - Control GFI product comparison: GFI MailEssentials vs. LogicNow - ControlEmail Security GFI MailEssentials ControlEmail Number of Virus Engines 5 leading engines (Bitdefender, VIPRE, Avira, Kaspersky, McAfee)

More information

Why one virus engine is not enough

Why one virus engine is not enough GFI White Paper Why one virus engine is not enough Multiple virus engines are needed to reduce time lag between virus outbreak and signature update There is no single antivirus engine on the market that

More information

A glance into the Eye Pyramid

A glance into the Eye Pyramid A glance into the Eye Pyramid RĂZVAN OLTEANU Security Reasercher We keep you safe and we keep it simple. 01 Introduction On January 11, 2017 Italian news agency AGI, published a court order regarding cyber-attacks

More information

GFI Product Comparison. GFI MailEssentials vs Sophos PureMessage

GFI Product Comparison. GFI MailEssentials vs Sophos PureMessage GFI Product Comparison GFI MailEssentials vs PureMessage GFI MailEssentials Integrates with Microsoft Exchange Server 2003/2007/2010/2013 Scans incoming and outgoing emails Scans internal emails within

More information

Android Malware Detection Test 手机安全软件病毒检测率测试 Mar. Celebrating Technology Innovation

Android Malware Detection Test 手机安全软件病毒检测率测试 Mar. Celebrating Technology Innovation Android Malware Detection Test 手机安全软件病毒检测率测试 2016 Mar Celebrating Technology Innovation 报告目录 Table of Contents P1 P2 P2 测试背景测试流程待测软件 Background Test Process Tested Software P3 P5 P5 测试结果相关信息权利说明 Test Result

More information

Anti-Virus Comparative No.8

Anti-Virus Comparative No.8 Anti-Virus Comparative No.8 Proactive/retrospective test (on-demand detection of virus/malware) Date: November 2005 (2005-11) Last revision: 28 th November 2005 Author: Andreas Clementi Website: http://www.av-comparatives.org

More information

Security Industry Market Share Analysis

Security Industry Market Share Analysis Security Industry Market Share Analysis December 2010 Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This quarter s report includes

More information

GFI product comparison: GFI LanGuard 12 vs Microsoft Windows Intune (February 2015 Release)

GFI product comparison: GFI LanGuard 12 vs Microsoft Windows Intune (February 2015 Release) GFI product comparison: GFI LanGuard 12 vs Microsoft Windows Intune (February 2015 Release) General features Scheduled scans Agent-less Agent-based Integration with Active Directory Asset tracking Installs

More information

GFI product comparison: GFI MailEssentials vs. McAfee Security for Servers

GFI product comparison: GFI MailEssentials vs. McAfee Security for  Servers GFI product comparison: GFI MailEssentials vs. McAfee Security for Email Servers Features GFI MailEssentials McAfee Integrates with Microsoft Exchange Server 2003/2007/2010/2013 Scans incoming and outgoing

More information

Anti-Virus Comparative No.4

Anti-Virus Comparative No.4 Anti-Virus Comparative No.4 Proactive/retrospective test (on-demand detection of virus/malware) Date: November 2004 (2004-11) Last revision of this report: 1 st December 2004 Author: Andreas Clementi Website:

More information

Evaluation guide. Online Demo Evaluation Guide

Evaluation guide. Online Demo Evaluation Guide Evaluation guide Online Demo Evaluation Guide Contents Introduction 3 Start the Online Demo 3 Archiving Method icon on the Configuration screen 3 Archive Stores icon on the Configuration screen 3 Retention

More information

Honeypots observations and their usefulness

Honeypots observations and their usefulness Honeypots observations and their usefulness Gerard Wagener - TLP:WHITE CIRCL March 15, 2017 The Computer Incident Response Center Luxembourg (CIRCL) is a government-driven initiative designed to provide

More information

Products supported by ESAP FIREWALL PRODUCTS: Product Name. AOL Firewall (1.x) AOL Privacy Wall (2.x) AVG 8.0 [Firewall] (8.

Products supported by ESAP FIREWALL PRODUCTS: Product Name. AOL Firewall (1.x) AOL Privacy Wall (2.x) AVG 8.0 [Firewall] (8. Products supported by ESAP 1.4.0 FIREWALL PRODUCTS: Product Name AOL Firewall (1.x) AOL Privacy Wall (2.x) AVG 8.0 [Firewall] (8.x) AVG Firewall (7.x) AhnLab Security Pack (2.x) AhnLab V3 Internet Security

More information

Common Framework for Artifact Analysis Activities

Common Framework for Artifact Analysis Activities Common Framework for Artifact Analysis Activities European Union Agency for Network and Information Security www.enisa.europa.eu About ENISA The European Union Agency for Network and Information Security

More information

Evaluation Guide. The purpose of this document is to help evaluating users install and configure GFI EventsManager.

Evaluation Guide. The purpose of this document is to help evaluating users install and configure GFI EventsManager. Evaluation Guide The purpose of this document is to help evaluating users install and configure GFI EventsManager. Contents Introduction 3 System requirements 3 Hardware 3 Software 3 Step by step installation

More information

Anti-Virus Testing and AMTSO

Anti-Virus Testing and AMTSO Anti-Virus Testing and AMTSO Patrik Runald, Security Response Manager Helsinki Kuala Lumpur San Jose Tokyo London Paris Milan Hong Kong Mumbay Warsaw Munich Copenhagen Brussels Oulu Utrecht Oslo Stockholm

More information

WebShell AV signature bypass and identification C99 Webshell case study. Gil Cohen, CTO

WebShell AV signature bypass and identification C99 Webshell case study. Gil Cohen, CTO WebShell AV signature bypass and identification C99 Webshell case study Gil Cohen, CTO Agenda Endpoint anomaly detection - intro Signature based detection alone is not good How bad is it? C99 WebShell

More information

Security Industry Market Share Analysis

Security Industry Market Share Analysis Security Industry Market Share Analysis March 2011 Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This quarter s report includes

More information

Anti-Virus Comparative. Factsheet Business Test (August-September 2018) Last revision: 11 th October

Anti-Virus Comparative. Factsheet Business Test (August-September 2018) Last revision: 11 th October Anti-Virus Comparative Factsheet Business Test Language: English August-September 2018 Last revision: 11 th October 2018 https:// - 1 - Introduction This is a short fact sheet for our Business Main-Test

More information

Norton Internet Security 2008 Manual Uninstall Tools

Norton Internet Security 2008 Manual Uninstall Tools Norton Internet Security 2008 Manual Uninstall Tools To download, save and run the Norton Removal tool for versions 2003 to 2010, click Follow the on-screen instructions to uninstall Norton Internet Security.

More information

CELAES Eusebio Sanchez Rafael Revert

CELAES Eusebio Sanchez Rafael Revert CELAES 2018 Riesgos reales en la ciberseguridad de la banca y qué acciones tomar frente a nuevos ciberataques Eusebio Sanchez eusebio.sanchezrodriguez@citibanamex.com Rafael Revert Rafael.revert@cyttek.com

More information

Android Malware Detection Test 手机安全软件病毒检测率测试 Jun. Celebrating Technology Innovation

Android Malware Detection Test 手机安全软件病毒检测率测试 Jun. Celebrating Technology Innovation Android Malware Detection Test 手机安全软件病毒检测率测试 2016 Jun Celebrating Technology Innovation 报告目录 Table of Contents P1 P2 P2 测试背景测试流程待测软件 Background Test Process Tested Software P3 P5 P5 测试结果相关信息权利说明 Test Result

More information

Anti-Virus Comparative Summary Report 2008

Anti-Virus Comparative Summary Report 2008 Anti-Virus Comparative Summary Report 2008 Awards, winners, comments Date: December 2008 Last revision: 9 th December 2008 Website: http://www.av-comparatives.org 1. Introduction At the end of every year,

More information

A Day in the Life of a Security Analyst. Your Guides Jer Kong Tony Townsend UVa Information Security

A Day in the Life of a Security Analyst. Your Guides Jer Kong Tony Townsend UVa Information Security A Day in the Life of a Security Analyst Your Guides Jer Kong Tony Townsend UVa Information Security Many Differing Perceptions of Our Role What Our Mothers Think We Do What Our Wives and Kids Think We

More information

MOST TESTED. MOST AWARDED. KASPERSKY LAB PROTECTION.*

MOST TESTED. MOST AWARDED. KASPERSKY LAB PROTECTION.* Score of TOP 3 places MOST TESTED. MOST AWARDED. KASPERSKY LAB PROTECTION.* In 2017 Kaspersky Lab products participated in 86 independent tests and reviews. Our products were awarded 72 firsts and achieved

More information

PassMark S O F T W A R E

PassMark S O F T W A R E PassMark S O F T W A R E Antivirus, Internet Security and Total Security Products Performance Benchmarking (2009) Vista/Dual Core Hardware March 2009 Document: Antivirus, Internet Security and Total Security

More information

Destructive Malware 12 February 2015

Destructive Malware 12 February 2015 JOINT INDIC ATOR BULLETIN Distributed as TLP: GREEN Reference Number: JIB-14-20199C Destructive Malware 12 February 2015 DISCLAIMER: This bulletin is provided as is for informational purposes only. The

More information

AV-Comparatives. Support-Test (Germany) Test of German-Language Telephone Support Services for Windows Consumer Security Software 2016

AV-Comparatives. Support-Test (Germany) Test of German-Language Telephone Support Services for Windows Consumer Security Software 2016 AV-Comparatives Support-Test (Germany) Test of German-Language Telephone Support Services for Windows Consumer Security Software 2016 Language: English March 2016 Last Revision: 14 th April 2016 Commissioned

More information

Windows アンチウィルスインスペクタのサポートチャート

Windows アンチウィルスインスペクタのサポートチャート 1/46 ページ 索引 : ユーザ : エンドポイントセキュリティ : インスペクタ : アンチウィルスサポート表 : Windows アンチウィルスサポート表 > Windows アンチウィルスインスペクタのサポートチャート 今回のリリースでは FirePass は以下のアンチウィルスソフトウェアをサポートします テーブル内のプラスのサイン

More information

Android Malware Detection Test 手机安全软件病毒检测率测试 Dec. Celebrating Technology Innovation

Android Malware Detection Test 手机安全软件病毒检测率测试 Dec. Celebrating Technology Innovation Android Malware Detection Test 手机安全软件病毒检测率测试 2016 Dec Celebrating Technology Innovation 报告目录 Table of Contents P1 P2 P2 测试背景测试流程待测软件 Background Test Process Tested Software P3 P5 P5 测试结果相关信息权利说明 Test Result

More information

INCIDENT RESPONSE. Antiviral shortcomings with respect to real malware. Malware Detection. Gary Golomb

INCIDENT RESPONSE. Antiviral shortcomings with respect to real malware. Malware Detection. Gary Golomb INCIDENT RESPONSE Malware Detection Antiviral shortcomings with respect to real malware Gary Golomb President, Proventsure LLC, Baltimore, MD Jonathan Gross Senior

More information

SKD Labs Test Report. A Comparative Test on Anti-Malware Products in the China Region

SKD Labs Test Report. A Comparative Test on Anti-Malware Products in the China Region Test Report 2013 No.3 A Comparative Test on Anti-Malware Products in the China Region SKD Labs is a leading independent testing facility in the China market and specializes in functionality testing, performance

More information

Norton 360 vs trend micro vs mcafee vs symantec: which anti-virus solution is best

Norton 360 vs trend micro vs mcafee vs symantec: which anti-virus solution is best Norton 360 vs trend micro vs mcafee vs symantec: which anti-virus solution is best Search 4 days ago. However, Windows antivirus tools still play an important role in the enterprise security strategy..

More information

J. Vilmsi Tallinn Estonia Flak Installation Guide

J. Vilmsi Tallinn Estonia  Flak Installation Guide Flak Installation Guide Table of Contents Terms and Definitions... 3 Flak description... 4 Flak's functions... 4 System Requirements for Flak Device... 4 Installation of Drivers... 5 Device Compatibility

More information

JUNE Covering the global threat landscape VB100 CERTIFICATION REPORT JUNE 2018 INTRODUCTION DIVERSITY TEST THE VB100 SET-UP PRODUCTS & RESULTS

JUNE Covering the global threat landscape VB100 CERTIFICATION REPORT JUNE 2018 INTRODUCTION DIVERSITY TEST THE VB100 SET-UP PRODUCTS & RESULTS Covering the global threat landscape ISSN 1749-7027 VB100 CERTIFICATION REPORT Martijn Grooten INTRODUCTION Though in the ever-changing threat landscape anti-virus products have long ceased to be the only

More information

Norton Internet Security 2011 Removal Tool Windows 7

Norton Internet Security 2011 Removal Tool Windows 7 Norton Internet Security 2011 Removal Tool Windows 7 Reg: 18-Oct-2011 log) to make sure they uncheck items so that the tool WON'T remove what it has detected. I'm 24/7 Internet worker (my own things) and

More information

TERM OF REFERENCE PROVISION FOR DEVELOPMENT OF MyEMAS SYSTEM, CYBERSECURITY MALAYSIA

TERM OF REFERENCE PROVISION FOR DEVELOPMENT OF MyEMAS SYSTEM, CYBERSECURITY MALAYSIA 1.0 BACKGROUND 1.1 ycert proposed to develop an appliance system to enhance the LebahNet v2 (Phase I Data Collection) system for Cyber Threat Research Centre research activities relating to HoneyNet project.

More information

Identifying Rootkit Infections Using Data Mining

Identifying Rootkit Infections Using Data Mining Identifying Rootkit Infections Using Data Mining Author Wu, Xin-Wen, Lobo, Desmond, Watters, Paul Published 2 Conference Title Proceedings of The 2 International Conference on Information Science and Applications

More information

Accessing your Check Point VPN

Accessing your Check Point VPN NOTE: The VPN only provides remote access to the network, any required native applications will need to be compatible with your local system. STEP 1 Open your Internet Explorer web browser and enter the

More information

GFI Product comparison. vs. Archiver

GFI Product comparison. vs. Archiver GFI Product comparison Product GFI Archiver name vs. Symantec Product Enterprise namevault Archiver GFI Archiver With GFI Archiver, all company emails, calendar entries and files are automatically stored

More information

Abusing File Processing in Malware Detectors for Fun and Profit

Abusing File Processing in Malware Detectors for Fun and Profit 2012 IEEE Symposium on Security and Privacy Abusing File Processing in Malware Detectors for Fun and Profit Suman Jana and Vitaly Shmatikov The University of Texas at Austin Abstract We systematically

More information

PC SECURITY LABS COMPARATIVE TEST. Microsoft Office. Flash. August Remote code execution exploit. mitigations for popular applications

PC SECURITY LABS COMPARATIVE TEST. Microsoft Office. Flash. August Remote code execution exploit. mitigations for popular applications August 2014 PC SECURITY LABS COMPARATIVE TEST Remote code execution exploit mitigations for popular applications Microsoft Office Flash Silverlight QuickTime Internet Explorer Java Adobe Content 1. BACKGROUND...2

More information

MRG Effitas Real Time Protection Test Project, First Quarter Q MRG Effitas Real Time Protection Test Project, First Quarter (Q2 2013)

MRG Effitas Real Time Protection Test Project, First Quarter Q MRG Effitas Real Time Protection Test Project, First Quarter (Q2 2013) MRG Effitas Real Time Protection Test Project, First Quarter (Q2 2013) 1 Contents: Introduction 3 Security Applications Tested 3 Methodology used in the Test 4 Samples Used 5 Test Results 6 Conclusions

More information

How To Remove A Virus Manually Windows 7 Without Antivirus Security Pro

How To Remove A Virus Manually Windows 7 Without Antivirus Security Pro How To Remove A Virus Manually Windows 7 Without Antivirus Security Pro Security Defender is a fake antivirus program, it should not be trusted, since it is a The program usually installs on PCs without

More information

Intel Unite. Intel Unite Firewall Help Guide

Intel Unite. Intel Unite Firewall Help Guide Intel Unite Intel Unite Firewall Help Guide September 2015 Legal Disclaimers & Copyrights All information provided here is subject to change without notice. Contact your Intel representative to obtain

More information

OCTOBER Covering the global threat landscape VB100 CERTIFICATION REPORT OCTOBER 2018 INTRODUCTION DIVERSITY TEST PRODUCTS & RESULTS

OCTOBER Covering the global threat landscape VB100 CERTIFICATION REPORT OCTOBER 2018 INTRODUCTION DIVERSITY TEST PRODUCTS & RESULTS Covering the global threat landscape VB100 CERTIFICATION REPORT Martijn Grooten INTRODUCTION Virus Bulletin has been testing anti virus (or anti-malware) products for more than two decades. A lot has changed

More information

DECEMBER Covering the global threat landscape. VB100 CERTIFICATION REPORT DECEMBER 2018 Martijn Grooten INTRODUCTION DIVERSITY TEST

DECEMBER Covering the global threat landscape. VB100 CERTIFICATION REPORT DECEMBER 2018 Martijn Grooten INTRODUCTION DIVERSITY TEST Covering the global threat landscape VB100 CERTIFICATION REPORT Martijn Grooten INTRODUCTION Anti-virus has long stopped being the sole layer of defence against malware attacks. Given its more subtle role,

More information

Manually Remove Of Xp Internet Security Protect Virus Manually

Manually Remove Of Xp Internet Security Protect Virus Manually Manually Remove Of Xp Internet Security Protect Virus Manually We show you how to remove malware from a PC or laptop. You may also wish to read: Windows users: how to protect your PC from Check now: do

More information

Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes

Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes Altiris Symantec Endpoint Protection Integration Component 7.1 SP1 Release Notes The software described in this book is

More information

Reviewer Integration and Performance Measurement for Malware Detection

Reviewer Integration and Performance Measurement for Malware Detection Reviewer Integration and Performance Measurement for Malware Detection Brad Miller 1, Alex Kantchelian 2, Michael Carl Tschantz 3, Sadia Afroz 3, Rekha Bachwani 4, Riyaz Faizullabhoy 2, Ling Huang 5, Vaishaal

More information

Norton Antivirus 2008 Manual Update File Xp

Norton Antivirus 2008 Manual Update File Xp Norton Antivirus 2008 Manual Update File Xp It is possible that updates have been made to the original version after this document was translated and published. Symantec does not guarantee the accuracy.

More information

Obfuscation and (non-)detection of malicious PDF files. Jose Miguel Esparza

Obfuscation and (non-)detection of malicious PDF files. Jose Miguel Esparza Obfuscation and (non-)detection of malicious PDF files Jose Miguel Esparza Agenda Introduction to the PDF format Obfuscation and evasion techniques Obfuscation vs. Antivirus Obfuscation vs. Analysis tools

More information

Evaluating malwares obfuscation techniques against antimalware detection algorithms

Evaluating malwares obfuscation techniques against antimalware detection algorithms See discussions, stats, and author profiles for this publication at: http://www.researchgate.net/publication/274249693 Evaluating malwares obfuscation techniques against antimalware detection algorithms

More information

GFI Product comparison. vs. Archiver

GFI Product comparison. vs. Archiver GFI Product comparison Product GFI Archiver name vs. Reddoxx Product E-mail name Archiving Archiver GFI Archiver With GFI Archiver, all company emails, calendar entries and files are automatically stored

More information

FEBRUARY Covering the global threat landscape. VB100 COMPARATIVE REVIEW FEBRUARY 2018 Martijn Grooten INTRODUCTION RESULTS

FEBRUARY Covering the global threat landscape. VB100 COMPARATIVE REVIEW FEBRUARY 2018 Martijn Grooten INTRODUCTION RESULTS Covering the global threat landscape VB100 COMPARATIVE REVIEW Martijn Grooten INTRODUCTION Pick the odd one out: Fancy Bear; the Equation Group; the Lazarus Group; you. The answer is you with very few

More information

GFI Product comparison. vs. Archiver

GFI Product comparison. vs. Archiver GFI Product comparison Product GFI Archiver name vs. Product MailStore name Archiver GFI Archiver With GFI Archiver, all company emails, calendar entries and files are automatically stored in a central,

More information

Anti-Virus Comparative

Anti-Virus Comparative Anti-Virus Comparative Malware Protection Test Consumer Products File Detection Test with Execution including false alarm test Language: English March 2018 Last Revision: 13 th April 2018 Table of Contents

More information

Android Malware Detection Test 手机安全软件病毒检测率测试 Mar. Celebrating Technology Innovation

Android Malware Detection Test 手机安全软件病毒检测率测试 Mar. Celebrating Technology Innovation Android Malware Detection Test 手机安全软件病毒检测率测试 2017 Mar Celebrating Technology Innovation 报告目录 Table of Contents P1 P2 P2 测试背景测试流程待测软件 Background Test Process Tested Software P3 P5 P5 测试结果相关信息权利说明 Test Result

More information

Norton Antivirus 2010 Manual Removal Tool Windows 7

Norton Antivirus 2010 Manual Removal Tool Windows 7 Norton Antivirus 2010 Manual Removal Tool Windows 7 How to Completely Uninstall Norton/Symantec Products. completely from your machine, either so you may reinstall it or make sure everything is cleaned

More information

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0 Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

GlobalProtect OPSWAT Support Charts

GlobalProtect OPSWAT Support Charts GlobalProtect OPSWAT Support Charts GlobalProtect agent collects vendor-specific data about the end user security packages that are running on the computer (as compiled by the OPSWAT global partnership

More information

Blackhole Networks. an Underestimated Source for Information Leaks. Alexandre Dulaunoy CIRCL - TLP:WHITE FIRST2017. Team CIRCL - Team Restena

Blackhole Networks. an Underestimated Source for Information Leaks. Alexandre Dulaunoy CIRCL - TLP:WHITE FIRST2017. Team CIRCL - Team Restena Blackhole Networks an Underestimated Source for Information Leaks Alexandre Dulaunoy CIRCL - TLP:WHITE Team CIRCL - Team Restena FIRST2017 Motivation and background IP darkspace or black hole is Routable

More information

ForeScout CounterACT. Endpoint Support Compatibility Matrix. Updated: October 2018

ForeScout CounterACT. Endpoint Support Compatibility Matrix. Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility... 3

More information

ENTERPRISE ENDPOINT COMPARATIVE REPORT

ENTERPRISE ENDPOINT COMPARATIVE REPORT ENTERPRISE ENDPOINT COMPARATIVE REPORT SECURITY STACK: EXPLOITS Authors Randy Abrams, Thomas Skybakmoen Tested Products Bitdefender Endpoint Security v5.3 ESET Endpoint Antivirus v6.1 Fortinet FortiClient

More information

Anti-Virus Comparative

Anti-Virus Comparative Anti-Virus Comparative Performance Test Impact of Consumer Security Software on System Performance Language: English April 2018 Last Revision: 9 th May 2018-1 - Table of Contents 1. Introduction 3 2. Tested

More information

FILELESSMALW ARE PROTECTION TEST OCTOBER2017

FILELESSMALW ARE PROTECTION TEST OCTOBER2017 FILELESSMALW ARE PROTECTION TEST OCTOBER2017 1 / 12 INTRODUCTION In times of digitalization of each aspect of public and private life new and interesting techniques of bypassing protections are abundant.

More information

Technical factsheet Cloud Backup

Technical factsheet Cloud Backup Technical factsheet The Cloud Network - fast, reliable, automatic, offsite, secure backup and disaster recovery to make your life easier! No more worrying about on-premised backup failure, or anyone missing

More information

FAX DEVICE INSTALLATION MANUAL

FAX DEVICE INSTALLATION MANUAL FAX DEVICE INSTALLATION MANUAL Discusses what fax devices or communication software works with GFI FaxMaker and shows you how to configure GFI FaxMaker to use these options. The information and content

More information

CanSecWest/core06. Sascha Rommelfangen, Fred Arbogast. Zen and the art of collecting and analyzing malware

CanSecWest/core06. Sascha Rommelfangen, Fred Arbogast. Zen and the art of collecting and analyzing malware CanSecWest/core06 Zen and the art of collecting and analyzing malware Sascha Rommelfangen, Fred Arbogast Outline Introduction Setup to collect malware Statistics Analysis Live Demo Future development early

More information

COMPARATIVE REVIEW. WINDOWS SERVER 2003 John Hawes PLATFORM AND TEST SETS

COMPARATIVE REVIEW. WINDOWS SERVER 2003 John Hawes PLATFORM AND TEST SETS COMPARATIVE REVIEW WINDOWS SERVER 2003 John Hawes This month s platform is Windows Server 2003, which is not the very latest server offering from Microsoft indeed it has been succeeded by both Server 2008,

More information

MacOS Category Vendor Product data-loss-prevention CleverFiles Disk Drill data-loss-prevention Kovell Ventures Ltd. idoctor data-loss-prevention

MacOS Category Vendor Product data-loss-prevention CleverFiles Disk Drill data-loss-prevention Kovell Ventures Ltd. idoctor data-loss-prevention MacOS Category Vendor Product data-loss-prevention CleverFiles Disk Drill data-loss-prevention Kovell Ventures Ltd. idoctor data-loss-prevention imobie Inc. PhoneRescue patch-management Apple Inc. Software

More information

Network Performance Test. Business Security Software. Language: English August Last Revision: 11 th October

Network Performance Test. Business Security Software. Language: English August Last Revision: 11 th October Network Performance Test Business Security Software Language: English August 2016 Last Revision: 11 th October 2016 Test commissioned by the vendor - 1 - Introduction This report, commissioned by ESET,

More information

VB100 COMPARATIVE REVIEW ON WINDOWS 7 PRO

VB100 COMPARATIVE REVIEW ON WINDOWS 7 PRO AUGUST 2013 Covering the global threat landscape VB100 COMPARATIVE REVIEW ON WINDOWS 7 PRO ISSN 1749-7027 INTRODUCTION For this test we return to Windows 7 now the most popular desktop platform with its

More information

MRG Effitas Online Banking Browser Security Assessment Project Q Q1 2014

MRG Effitas Online Banking Browser Security Assessment Project Q Q1 2014 MRG Effitas Online Banking Browser Security Assessment Project Q3 2013 - Q1 2014 1 Contents Introduction... 3 The Purpose of this Report... 3 Tests Employed... 3 Security Applications Tested... 4 Methodology

More information

Anti Virus Comparative Performance Test (Suite Products) May 2012

Anti Virus Comparative Performance Test (Suite Products) May 2012 Anti Virus Comparative Performance Test (Suite Products) May 2012 Anti-Virus Comparative Performance Test (Suite Products) Impact of Internet Security Suites on System Performance Language: English May

More information