The test was performed on a specially-prepared VMware Workstation version 5.5.3 platform. A “clean” virtual machine with a Microsoft Windows XP SP2 operating system, with all the latest updates at the time of testing, was cloned for each malicious program sample.
The following antivirus programs participated in the test:
The following anti-rootkit products also participated:
A requirement for all the security software selected for testing was that it should include functionality not only for detecting rootkits in a system but also have the ability to remove them (deletion/renaming of files, deletion/renaming of registry keys/sections).
A rootkit was considered to be detected if the security software located its files, registry keys, processes or traces of its presence on the system (hooking API functions). A rootkit was considered to be neutralized if its system activity was completely eliminated by the security software.
Testing steps:
A dedicated clean virtual machine was used for each selected malicious program sample (step 1). After launching the antivirus or anti-rootkit program and performing the disinfection, the virtual machine was restored to its initial state at step 3.
Testing steps with proof-of-concept rootkits:
A dedicated clean virtual machine was used for each antivirus or anti-rootkit program (step 1). After the installation of a proof-of-concept rootkit and scanning, the machine was restored to its initial state.
Recent comments
49 weeks 1 day ago
2 years 1 week ago
2 years 2 weeks ago
2 years 5 weeks ago
2 years 15 weeks ago
2 years 19 weeks ago
2 years 19 weeks ago
2 years 19 weeks ago
2 years 34 weeks ago
2 years 45 weeks ago