On 4/24/06, dave matthews <[EMAIL PROTECTED]> wrote:
>
> hi all,
>
>   RootkitRevealer flagged this file as a problem:
>
>   c:\Documents and Settings\myUserName\Application Data\Macromedia\Flash
> Player\macromedia.com\support\flashplayer\sys\#name.com.
>
>   Was able to delete all other files in this folder, this one resists
> deletion and renaming.  Tried deleting it using safe mode too... no luck.
>
>   Please notice the 'period' at the end of the file name, seems unique and
> no other files in the folder have one at the end of "com".
>
>   Googled the real company name and they seem to be a reputable Flash
> component seller, so i changed it to  "#name.com."  for this post.



How does RootkitRevealer work?

I think it scans your entire hard drive, once using standard windows calls,
and once using low level disk access. It then compares the two scans, to
look for files that are different between the two, which shows possibly that
a rootkit is trying to hide something.

However, this could produce false positives (ie, flag files that are
innocent), if the file changes inbetween the two scans. For example, say you
have a chat program, which logs to disk all incoming messages. If someone
sends you a message, after the first scan, but before the second, then
RootkitRevealer will detect a difference in the two scans, and flag your
chat file as something wrong with it.

However, the inability to delete/rename it seems odd. Try downloading
Process Explorer
http://www.sysinternals.com/Utilities/ProcessExplorer.htmland
searching to see what process is accessing that file. That might give
some further clues.

-David R
_______________________________________________
Flashcoders@chattyfig.figleaf.com
To change your subscription options or search the archive:
http://chattyfig.figleaf.com/mailman/listinfo/flashcoders

Brought to you by Fig Leaf Software
Premier Authorized Adobe Consulting and Training
http://www.figleaf.com
http://training.figleaf.com

Reply via email to