|
#1
|
||||
|
||||
![]() ![]() ![]() أفضل وأجدد أربع أدوات حمايه لحذف أصعب الفيروسات من الشركة العملاقة Kaspersky مع الشرح لكيفية أستخدامها ![]() ![]() Virus Removal Tools مباشرة ندخل على الموضوع للأنه معروف لدى الجميع من العنوان وهي أربع أدوات جديدة من الكاسبرسكاي لحماية وإزالة الفيروسات الخبيثة والمزعجة من جهازك وموضح نوعية الفيروس ومع أسم الأداة ![]() أولآ ![]() ![]() ![]() How to eliminate Trojan- Ransom.Win32.Rector In this section you will find recommendations how to fight malicious programs which cannot be disinfected by Kaspersky Lab's products. In order to disinfect/remove malicious programs you may have to modify the system registry or use an additional utility. If you failed to find the necessary information or you find these recommendations too complicated or inadequate, please send a request to the Technical Support service via the HelpDesk form. n Cybercriminals use Trojan-Ransom.Win32.Rector for disrupting normal performance of computers and for unauthorized modification of data making it unusable. Once the data has been “taken hostage” (blocked), its owner (user) receives a ransom demand. The victim is supposed to deliver the ransom in exchange for pirate's promise to send a utility that would restore the data or repair the PC. Kaspersky Lab specialists have developed a special utility for decrypting the data encrypted by Trojan-Ransom.Win32.Rector. The utility has a GUI. Do the following to decrypt files encrypted by Trojan-Ransom.Win32.Rector:
![]() ![]() أسم الأداه ![]() 2.3.0.0 New! أسم الفيروس Trojan-Ransom.Win32.Rector ![]() ثانيآ ![]() ![]() ![]() How to remove malware belonging to the family Rootkit.Win32.TDSS (aka Tidserv, TDSServ, Alureon)? In this section you will find recommendations how to fight malicious programs which cannot be disinfected by Kaspersky Lab's products. In order to disinfect/remove malicious programs you may have to modify the system registry or use an additional utility. If you failed to find the necessary information or you find these recommendations too complicated or inadequate, please send a request to the Technical Support service via the HelpDesk form. ![]() A rootkit is a program or a set of programs designed to obscure the fact that a system has been compromised. For Windows operating systems, the term rootkit stands for a program that infiltrates the system and hooks system functions (Windows API). By hooking and modifying low-level API functions, such malware can effectively hide its presence in a system. Moreover, rootkits as a rule are able to conceal in the system any processes, folders and files on a disk as well as registry keys described in its configuration. Many rootkits install own drivers and services (hidden as well) into the system. It is possible to disinfect a system infected with malware family Rootkit.Win32.TDSS using the utility TDSSKiller.exe. The utility has GUI. ![]() Disinfection of an infected system
-l - write log to a file.For example, if you want to scan the PC with a detailed log saved into the file report.txt (it will be created in the folder with TDSSKiller.exe), use the following command: TDSSKiller.exe -l report.txt Symptoms of an infection
Experienced users may try to monitor the following kernel function hooks:Symptoms of infection Rootkit.Win32.TDSS third generation (TDL3) An infection can be detected with utility Gmer. It detects replacement of a “device” object of the system driver atapi.sys. ![]() ![]() ![]() أسم ألأداة TDSSKiller ![]() 2.4.1.4 New! أسم الفيروس Rootkit.Win32.TDSS ![]() ثالثآ ![]() ![]() ![]() How to disinfect my computer from Virus.Win32.Sality? In this section you will find recommendations how to fight malicious programs which cannot be disinfected by Kaspersky Lab's products. In order to disinfect/remove malicious programs you may have to modify the system registry or use an additional utility. If you failed to find the necessary information or you find these recommendations too complicated or inadequate, please send a request to the Technical Support service via the HelpDesk form. ![]() ![]() ![]() In order to disinfect a computer from Virus.Win32.Sality, do the following: If infected computers are in the local network under domain control: Step 1. Preparation to disinfection:
![]() Step 2. Algorithm of computer disinfection. Computers on which you log on under a domain administrator rights should be disinfected first. Once these computers are disinfected, start disinfecting other computers in the network.
You can restore the registry branch SafeBoot which is needed for a PC to be able to boot in safe mode, by running SalityKiller.exe with parameter -j.Additional parameters to run SalityKiller.exe from command line: -p - scan a specific folder; -n - scan network disks; -r - scan flash drives, scan removable hard disks connected via USB and Fire Wire; -y - close the window when the utility finishes; -s - scan in "silent" mode (without opening console box); -l - write log to the file; -v - detailed logging (must be used in combination with -l); -x - restore possibility to view hidden and system files; -a - disable autorun from any devices; -j - restore the registry branch SafeBoot (if it is deleted, the PC will not be able to start up in Safe mode); -m - monitoring mode to protect the system from getting infected; -q - scan the system and then go to monitoring mode; -k – the utility will scan all disks, detect files autorun.inf created by the virus Virus.Win32.Sality and eliminate them. It will also delete the executable file linked by autorun.inf, even if such file has been already disinfected. ![]() أسم الأداة SalityKiller ![]() i 1.3.5 New! أسم الفيروس Virus.Win32.Sality.aa, ag, bh ![]() رابعآ ![]() ![]() ![]() How to secure your computer from malicious programs of Trojan-Spy.Win32.Zbot family In this section you will find recommendations how to fight malicious programs which cannot be disinfected by Kaspersky Lab's products. In order to disinfect/remove malicious programs you may have to modify the system registry or use an additional utility. If you failed to find the necessary information or you find these recommendations too complicated or inadequate, please send a request to the Technical Support service via the HelpDesk form. At present Kaspersky Lab analysts detect wide spread of Trojan programs of Trojan-Spy.Win32.Zbot family. These programs are used by cyber-criminals to steal any bank information from computers. As a rule the work of the malware cannot be visually traced and is thus hard to detect on a victim-computer which is not protected by an anti-virus program. Additionally these programs use rootkit technologies as self-defense to hide their executable files and processes. Programs of Trojan-Spy.Win32.Zbot family usually penetrate your computer when you visit infected Internet pages. However each cyber-criminal finds his own way how to use this malware and how to make it penetrate your computer. You can secure your computer and your personal data from Trojan-Spy.Win32.Zbot by installing anti-virus software onto your PC and by updating the program regularly so that it would “know” new modifications of Trojan-Spy.Win32.Zbot . Kaspersky Lab applications will prevent your computer from being infected by Trojan-Spy.Win32.Zbot, and if your PC is already infected, will delete any traces of infection. If you do not use any anti-virus programs you are strongly recommended to scan your computer for modifications of Trojan-Spy.Win32.Zbot with a special utility ZbotKiller.exe before you perform any online bank operations. If you detect any modifications, disinfect an infected system with the utility ZbotKiller.exe. This article describes where programs of the Trojan-Spy.Win32.Zbot family usually save their data (but these files may be hidden), and how the utility ZbotKiller.exe can be launched. Main symptoms of Trojan-Spy.Win32.Zbot infection 1. (One or several) files appear in the folders %windir%\system32 and %AppData%:
2. Links to the suspicious files mentioned above appear in the following system registry keys:
A special utility ZbotKiller.exe should be used to disinfect systems infected with malicious programs Trojan-Spy.Win32.Zbot. The utility:
To remove the malware locally 1. Download the archive ZbotKiller.zip and extract content into a separate folder on an infected (or potentially infected) computer.To remove the malware via Administration Kit: 1. Download the utility ZbotKiller.zip and extract content into a separate folder.Switches to manage the utility ZbotKiller.exe from the command prompt: -y - end program without pressing any keyFor example, in order to scan a computer and to generate and write a detailed report into a file report.txt (which will be created in the setup folder of the utility ZbotKiller.exe), use the following command: zbotkiller.exe -y -l report.txt -vThe parameter –y used in the command prompt will close the console window automatically once the utility work is over. ![]() أسم الأداة ZbotKiller ![]() ![]() 1.2.0.0 New! أسم الفيروس Trojan-Spy.Win32.Zbot ![]() أتمنى التوفيق والإستفاده للجميع في أمان الله أكثر... |
مواقع النشر (المفضلة) |
أدوات الموضوع | |
انواع عرض الموضوع | |
|
|
![]() |
||||
الموضوع | كاتب الموضوع | المنتدى | مشاركات | آخر مشاركة |
الأداه الرائعه لسحق وحذف أصعب الفيروسات Sophos Anti-Rootkit من الشركة المتخصصه في تقديم الحلول لحماية أجهزة الح | RSS | Arabic Rss | 0 | 10-18-2010 03:53 PM |
حصريآ أدوات الحمايةالجديدة من Kaspersky التي وضعها المختبر الخاص بالشركة العملاقة ووصى بها | RSS | Arabic Rss | 0 | 08-05-2010 05:42 PM |
أداة إزالة الفيروسات McAfee AVERT Stinger 10.0.1 المجانية من الشركة العملاقة مكافي | RSS | Arabic Rss | 0 | 07-25-2010 03:31 PM |
أداة إزالة الفيروسات McAfee AVERT Stinger 10.0.1 المجانية من الشركة العملاقة مكافي | RSS | Arabic Rss | 0 | 07-24-2010 09:40 PM |
اخر اصدارات الشركة العملاقة كاسبر لعام Kaspersky Internet Security 2011 | RSS | Arabic Rss | 0 | 06-10-2010 02:06 AM |
|