<?xml version="1.0" encoding="UTF-8"?>

<rss version="2.0"
 xmlns:blogChannel="http://backend.userland.com/blogChannelModule"
>

<channel>
<title>Topic &#x27;Re: Possible rootkit?&#x27; in forum &#x27;Security&#x27; - dslreports.com</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20111138</link>
<description></description>
<language>en</language>
<pubDate>Thu, 24 Mar 2022 20:13:00 EDT</pubDate>
<lastBuildDate>Thu, 24 Mar 2022 20:13:00 EDT</lastBuildDate>

<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20147678</link>
<description><![CDATA[Elite posted : GMER isn't the greatest. It's actually a little buggy at times.<br><br>Further examination of your recent log looks like you may have  embedded-nulls in your registry. They're not a bad thing, they're just undeletable by RegEdit. Wouldn't surprise me if GMER couldn't delete them.<br><br>If you want to delete them, that's entirely up to you. It may or may not break something.<br><br>If you want to scan for embedded-nulls for the hell of it, download regdelnull from &raquo;<A HREF="http://technet.microsoft.com/en-us/sysinternals/bb897448.aspx" >technet.microsoft.com/en &middot;&middot;&middot; 448.aspx</A><br><small>--<br>QUAD!!!!</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20147678</guid>
<pubDate>Tue, 11 Mar 2008 16:44:05 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20146209</link>
<description><![CDATA[Name Game posted : I think in all your worry the main thing to understand is that they are APPROVED.<br><br>Autoruns displays shell extensions appearing in the registy key <br> <br>Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved<br> <br>It appears that the "Approved" restriction is only enforced if a certain Group Policy is set   Using another tool I found 3 non-Microsoft shell extensions (ones that I use often) that are not listed by Autoruns since they're not in the "Approved" subkey (in either HKLM or HKCU.)<br> <br>This also means that the method Autoruns uses to disable shell extensions by removing them from the "Approved" subkey doesn't actually disable them.  I've verified this.<br>*******************************<br><b>Only allow approved Shell extensions</b><br>User Configuration\Administrative Templates\Windows Components\Windows Explorer <br><br>Description<br>Directs Windows to start only the user interface extensions that the <b>system security or the user have approved.</b><br><br>When the system detects that the user is downloading an external program that runs as part of the Windows user interface, the system searches for a digital certificate or requests that the user approve the action. If you enable this policy, Windows only starts approved programs.<br><br>This policy is designed to protect the system from damage from programs that do not operate correctly or are intended to cause harm.<br><br> Tip<br><br>To view the approved user interface extensions for a system, start a registry editor (Regedt32 or Regedit). The system stores entries representing approved user interface extensions on a system in the following registry key:<br><br>HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved.<br><br>http://msdn2.microsoft.com/en-us/library/ms812054.aspx<br><br>**************************************<br><br>Now it is not possible for me to understand from what you have posted to date..just how you as a USER have your OS configured..especially when it comes to the Windows Firewall, Autoupdate, or other things in your Security Center, Muchless your OneCare. All of which are Microsoft approved thingies.<br><br>But those entires seem to all come down to user congfiration changes you might have made.<br><br>So people have suggested that if you want to track those entries down including the ones in that WEB FOLDER you do the following to see if it changes.<br><br>Turn on the SP2 firewall <br><br>* Disable or uncheck remote assistance & remote desktop in firewall advance setting<br><br>The theory is this...<br><br>Machines that are affected:<br><br>* These machines had auto-updates switched off<br><br>* Most have the firewall disabled. <br><br>* These errors more frequently in the daytime.<br><br>Solution<br><br>Enable your firewalls<br><br>Re-enable autoupdates. It's that easy. <br>Most people have it off, in hope of bypassing Microsofts recent anti-piracy move.<br><br>As for your ONECARE it requires certain two things turned on to work effectively.<br>Automatic Updates and Background Intelligent Transfer Service (BITS). The services can be switched off manually using the Windows services.msc utility. Normally, once disabled, they remain that way until the user manually turns them back on.<br><br>And that is then the problem and could be the reason for those entires that you see.  You have ONECARE..it is trying to do it's job.but is crippled.<br><br>You can read more about it here....<br><br>Microsoft OneCare Silently Changes Automatic Updates<br>Root of recent Windows Updates woes? Microsoft's OneCare security tool changes Automatic Update settings as it installs.<br><br>http://www.pcworld.com/article/id,138939/article.html<br><small>--<br>Gladiator Security Forum  http://www.gladiator-antivirus.com/ <br>Missing Kids<br> http://www.missingkids.com/</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20146209</guid>
<pubDate>Tue, 11 Mar 2008 12:26:51 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20145328</link>
<description><![CDATA[anon posted : I just had to delete the registry entry HKEY_USERS\S-1-5-21-1715567821-884357618-839522115-1004\Software\Microsoft\<br>Windows\CurrentVersion\Shell Extensions\Approved\{26910156-F8C6-3BCF-B410-E8F60C33D564} as it was an endless registry entry which made my advanced windows onecare hang on the registry scan and keep on scanning that entry. Whoever said that NIAP rootkit tools is bad is wrong! i had to use NIAP rootkit tool to delete the registry entry because gmer and nothing else could delete it. I wonder: Is it safe?]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20145328</guid>
<pubDate>Tue, 11 Mar 2008 09:41:28 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20141103</link>
<description><![CDATA[Elite posted : <div class="bquote"><small>said by cdavfrew :</small><br><br>Thanks for all your help Name Game. I would still like to ask if Vista becomes the new hot operating system, than will virus writers switch to designing malware for Vista and leave XP behind as a safe operating system? I mean, no one writes any malware for Windows 2000 anymore, do they?<br> </div>Any piece of malware that runs on XP, will also run on 2000. Most will also run on 98 and Vista.<br><small>--<br>QUAD!!!!</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20141103</guid>
<pubDate>Mon, 10 Mar 2008 15:06:21 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20139249</link>
<description><![CDATA[psicop posted : I'd also recommend you to consider other OS when accessing the Internet: Linux, Mac and others.<br><br>I still use Windows for other things.]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20139249</guid>
<pubDate>Mon, 10 Mar 2008 08:48:24 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20139111</link>
<description><![CDATA[anon posted : Thanks for all your help Name Game. I would still like to ask if Vista becomes the new hot operating system, than will virus writers switch to designing malware for Vista and leave XP behind as a safe operating system? I mean, no one writes any malware for Windows 2000 anymore, do they?]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20139111</guid>
<pubDate>Mon, 10 Mar 2008 07:56:49 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20135122</link>
<description><![CDATA[Name Game posted : That is correct..and glad you got it sorted out for you own concerns. I could have easily just said..don't worry about it..it's nothing to do with a real rootkit but that would not be helpful. This is why I post links and info to comfirm or deny findings so members get a chance for a second or third opinion.  :D<br><br>Rootkits are about the last stronghold the bad boys out there can attempt to compromise NT type OS and it is the least understood by the user.<br><br>There is hope on the horizon. To paraphrase a wise Russian  :D...<br><br>A new OS is better than security through obscurity. All these problems go away when the user can work from a truely restricted account. So your next purchase should be Windows Vista x64. It is the only system approach that can handle this NT madness we find out there. With it's fully restricted access to kernel mode part, new security model (with updated NTFS) and a fully isolated kernel with self-integrity control it will lead to the end of: personal firewalls, host intrusion prevention system, some antiviruses, sandboxes, and most of the utilities and executable packers.<br><br>It might still become a primary target for script-kiddies, malware writers etc.so it's bypassing will be a question of time. Windows already supports enough security model, but very few thrid party vendor or programmers use it. So <b>their stuff</b> on Vista will still be vulnerable.<br><small>--<br>Gladiator Security Forum  &raquo;<A HREF="http://www.gladiator-antivirus.com/" >www.gladiator-antivirus.com/</A> Missing Kids &raquo;<A HREF="http://www.missingkids.com/" >www.missingkids.com/</A></small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20135122</guid>
<pubDate>Sun, 09 Mar 2008 11:46:59 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20134578</link>
<description><![CDATA[anon posted : Thanks, Name Game for the help. Your last post has said that my problem is not malware related, and your second last post shows malware symptoms, which i do not have. So I must conclude that my problem is xp related, and not malware related.]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20134578</guid>
<pubDate>Sun, 09 Mar 2008 07:49:10 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20125223</link>
<description><![CDATA[Name Game posted : In this thread SUBs investigate that same area of Gmer and found the following starting with post #11<br>&raquo;<A HREF="http://www.techsupportforum.com/microsoft-support/windows-xp-support/112241-generic-host-win32-has-encountered-problem-needs-close.html" >www.techsupportforum.com &middot;&middot;&middot; ose.html</A><br><small>--<br>Gladiator Security Forum  &raquo;<A HREF="http://www.gladiator-antivirus.com/" >www.gladiator-antivirus.com/</A> Missing Kids &raquo;<A HREF="http://www.missingkids.com/" >www.missingkids.com/</A></small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20125223</guid>
<pubDate>Fri, 07 Mar 2008 11:30:13 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20124945</link>
<description><![CDATA[Name Game posted : BTW..if you want to see another GMER LOG that contains similar..<br><br>Reg \Registry\USER\S-1-5-21-854245398-1303643608-725345543-1004\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{EFB53EC6-C6D4-463D-048F-BFE428D3EDFA}@daahoanh 0x63 0x61 0x6F 0x70 ...<br>Reg \Registry\USER\S-1-5-21-854245398-1303643608-725345543-1004\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{EFB53EC6-C6D4-463D-048F-BFE428D3EDFA}@fanglohilpjc 0x62 0x61 0x64 0x61 ...<br>Reg \Registry\USER\S-1-5-21-854245398-1303643608-725345543-1004\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{EFB53EC6-C6D4-463D-048F-BFE428D3EDFA}@iakalpgmjkekhfhlnm 0x69 0x61 0x6E 0x70 ...<br>Reg \Registry\USER\S-1-5-21-854245398-1303643608-725345543-1004\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{EFB53EC6-C6D4-463D-048F-BFE428D3EDFA}@haiagiakjklhkilh 0x6A 0x61 0x6F 0x70 ...<br><br>and how an expert handled it see this thread..<br>post#46<br><br>&raquo;<A HREF="http://www.bleepingcomputer.com/forums/topic66206-40.html" >www.bleepingcomputer.com &middot;&middot;&middot; -40.html</A><br><small>--<br>Gladiator Security Forum  &raquo;<A HREF="http://www.gladiator-antivirus.com/" >www.gladiator-antivirus.com/</A> Missing Kids &raquo;<A HREF="http://www.missingkids.com/" >www.missingkids.com/</A></small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20124945</guid>
<pubDate>Fri, 07 Mar 2008 10:42:58 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20124839</link>
<description><![CDATA[Name Game posted : Kill Bill is a movie..was referencing it to our member <br>bcastner..who already posted in your thread and would be helping you there..I trust his ability and knowledge.<br>&raquo;<A HREF="/profile/693977">/profi &middot;&middot;&middot; e/693977</A><br>I also trust my brother-in-law Bob who just left for Guangzhou the other day..so if you are in China and close.  :D He would sort it out for Ya too.<br><small>--<br>Gladiator Security Forum  &raquo;<A HREF="http://www.gladiator-antivirus.com/" >www.gladiator-antivirus.com/</A> Missing Kids &raquo;<A HREF="http://www.missingkids.com/" >www.missingkids.com/</A></small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20124839</guid>
<pubDate>Fri, 07 Mar 2008 10:21:18 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20124777</link>
<description><![CDATA[anon posted : I am not gitwed. I borrowed gitwed's log because it was exactly the same as mine except for the dates and computer name and such. I have not posted a hijack this log because i have checked it myself and found nothing unusual, absolutely nothing even remotely mysterious. Thanks a lot for the help Name Game. Who is kill bill? <br><br>I have rescanned my computer with Antivir rootkit scan, and it detected nothing, because after I exported the registry entry as shown in previous posts, the registry entry changed to be disguised as something legitimate while having a deeper binary entry. <br><br>Here is my Gmer log:<br><br>GMER 1.0.14.14116 - http://www.gmer.net<br>Rootkit scan 2008-03-07 23:05:37<br>Windows 5.1.2600 Service Pack 2<br><br>---- Registry - GMER 1.0.14 ----<br><br>Reg  HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@s1                                                                                           771343423<br>Reg  HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg@s2                                                                                           285507792<br>Reg  HKLM\SOFTWARE\Classes\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC}@scansk                                                                    0x74 0xED 0xF2 0x38 ...<br>Reg  HKLM\SOFTWARE\Classes\CLSID\{879205d9-654a-4049-9120-bae47b054b4f}@Model                                                                     182<br>Reg  HKLM\SOFTWARE\Classes\CLSID\{879205d9-654a-4049-9120-bae47b054b4f}@Therad                                                                    21<br>Reg  HKLM\SOFTWARE\Classes\CLSID\{879205d9-654a-4049-9120-bae47b054b4f}@MData                                                                     0xCB 0x9B 0xAD 0xEF ...<br>Reg  HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\9040110900063D11C8EF10054038389C\Usage@HandWritingFiles  946301515<br>Reg  HKLM\SOFTWARE\Classes\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC}@scansk                                                                    0x74 0xED 0xF2 0x38 ...<br>Reg  HKLM\SOFTWARE\Classes\CLSID\{879205d9-654a-4049-9120-bae47b054b4f}@Model                                                                     182<br>Reg  HKLM\SOFTWARE\Classes\CLSID\{879205d9-654a-4049-9120-bae47b054b4f}@Therad                                                                    21<br>Reg  HKLM\SOFTWARE\Classes\CLSID\{879205d9-654a-4049-9120-bae47b054b4f}@MData                                                                     0xCB 0x9B 0xAD 0xEF ...<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\                                                                    <br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\@hakolggmepoiffaa                                                   0x61 0x62 0x70 0x70 ...<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\@hakolggmjpfjfabo                                                   0x70 0x62 0x70 0x70 ...<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\hQ&uuml;b                                                                                          <br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\hQ&uuml;b@&Iacute;\x2039&iacute;\x2039T\x20ac&oacute;`                                                                  1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\hQ&uuml;b@&Iacute;\x2039&iacute;\x2039\x201c\x008feQ                                                             1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\hQ&uuml;b@\20\x90\20n&ETH;c:y                                                                          1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\hQ&uuml;b@\26Y\1x&ETH;c:y                                                                              1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\hQ&uuml;b@&Ograve;czz                                                                                  1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\hQ&uuml;b@                                                                                  0<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\hQ&uuml;b@FC Input                                                                                 0<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\hQ&uuml;b@FC aid                                                                                   0<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\hQ&uuml;b@GB/GBK                                                                                   0<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b                                                                                          <br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@&Iacute;\x2039&iacute;\x2039T\x20ac&oacute;`                                                                  1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@&Iacute;\x2039&iacute;\x2039\x201c\x008feQ                                                             1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@\20\x90\20n&ETH;c:y                                                                          1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@\26Y\1x&ETH;c:y                                                                              1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@&Ograve;czz                                                                                  1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@                                                                                  0<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@FC Input                                                                                 1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@FC aid                                                                                   1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@GB/GBK                                                                                   0<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@\26\1x&aring;g&acirc;\x2039                                                                         -536803324<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@\26\1x&aring;g&acirc;\x2039\1x\x2022                                                               12<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Ntilde;&#144;&#1;x                                                                                          <br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Ntilde;&#144;&#1;x@&Iacute;\x2039&iacute;\x2039T\x20ac&oacute;`                                                                  1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Ntilde;&#144;&#1;x@&Iacute;\x2039&iacute;\x2039\x201c\x008feQ                                                             1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Ntilde;&#144;&#1;x@\20\x90\20n&ETH;c:y                                                                          1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Ntilde;&#144;&#1;x@\26Y\1x&ETH;c:y                                                                              1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Ntilde;&#144;&#1;x@&Ograve;czz                                                                                  0<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Ntilde;&#144;&#1;x@                                                                                  1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Ntilde;&#144;&#1;x@FC Input                                                                                 0<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Ntilde;&#144;&#1;x@FC aid                                                                                   0<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Ntilde;&#144;&#1;x@GB/GBK                                                                                   0<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\                                                                    <br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\@hakolggmepoiffaa                                                   0x61 0x62 0x70 0x70 ...<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\@hakolggmjpfjfabo                                                   0x70 0x62 0x70 0x70 ...<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\hQ&uuml;b                                                                                          <br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\hQ&uuml;b@&Iacute;\x2039&iacute;\x2039T\x20ac&oacute;`                                                                  1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\hQ&uuml;b@&Iacute;\x2039&iacute;\x2039\x201c\x008feQ                                                             1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\hQ&uuml;b@\20\x90\20n&ETH;c:y                                                                          1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\hQ&uuml;b@\26Y\1x&ETH;c:y                                                                              1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\hQ&uuml;b@&Ograve;czz                                                                                  1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\hQ&uuml;b@                                                                                  0<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\hQ&uuml;b@FC Input                                                                                 0<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\hQ&uuml;b@FC aid                                                                                   0<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\hQ&uuml;b@GB/GBK                                                                                   0<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b                                                                                          <br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@&Iacute;\x2039&iacute;\x2039T\x20ac&oacute;`                                                                  1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@&Iacute;\x2039&iacute;\x2039\x201c\x008feQ                                                             1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@\20\x90\20n&ETH;c:y                                                                          1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@\26Y\1x&ETH;c:y                                                                              1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@&Ograve;czz                                                                                  1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@                                                                                  0<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@FC Input                                                                                 1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@FC aid                                                                                   1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@GB/GBK                                                                                   0<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@\26\1x&aring;g&acirc;\x2039                                                                         -536803324<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Igrave;S&uuml;b@\26\1x&aring;g&acirc;\x2039\1x\x2022                                                               12<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Ntilde;&#144;&#1;x                                                                                          <br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Ntilde;&#144;&#1;x@&Iacute;\x2039&iacute;\x2039T\x20ac&oacute;`                                                                  1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Ntilde;&#144;&#1;x@&Iacute;\x2039&iacute;\x2039\x201c\x008feQ                                                             1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Ntilde;&#144;&#1;x@\20\x90\20n&ETH;c:y                                                                          1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Ntilde;&#144;&#1;x@\26Y\1x&ETH;c:y                                                                              1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Ntilde;&#144;&#1;x@&Ograve;czz                                                                                  0<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Ntilde;&#144;&#1;x@                                                                                  1<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Ntilde;&#144;&#1;x@FC Input                                                                                 0<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Ntilde;&#144;&#1;x@FC aid                                                                                   0<br>Reg  HKCU\Software\Microsoft\Windows\CurrentVersion\&Ntilde;&#144;&#1;x@GB/GBK                                                                                   0<br><br>---- EOF - GMER 1.0.14 ----]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20124777</guid>
<pubDate>Fri, 07 Mar 2008 10:11:04 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20124604</link>
<description><![CDATA[Name Game posted : Good going..I thought by the things you have posted you did do a good job at keeping you system safe. I still can't figure out if you are cdavfrew or gitwed or both.  :D..but I think they will get it sorted out for you at their forum..personally from the tools you have run now I do not think you are rooted..I do not know when Antivir lasted updated their proggie..but you might look into that.<br><br>You were offered to post a hijackthis log here at DSLR forum. You have not done this yet..<br>&raquo;<A HREF="/forum/cleanup">Security Cleanup</A><br><br>please do..because they have other tools they can use..besides just the highthis thingie..and they can FIND real rootkits..trust me..post the highthis log is just the first step.  ;)<br><br>We don't call him kill bill for nothing . :D He will make your 'rootkit' Bride wake up after a long coma..if one is really there. <br><small>--<br>Gladiator Security Forum  &raquo;<A HREF="http://www.gladiator-antivirus.com/" >www.gladiator-antivirus.com/</A> <br>Missing Kids<br> &raquo;<A HREF="http://www.missingkids.com/" >www.missingkids.com/</A></small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20124604</guid>
<pubDate>Fri, 07 Mar 2008 09:30:40 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20124524</link>
<description><![CDATA[anon posted : Yes, Name Game. I have been running registry cleaners, disk cleaners, defragmenters, and such for as long as I can remember. I use jv16 powertools, Tune up utilities, advanced onecare, premium booster, ccleaner, and regscrub for my registry cleaners and since the registry kesy are hidden, I see no way that registry cleaners can detect them unless they have rootkit detection modules. <br><br>I was wondering that if rootkit processes are stopped, shouldn't the hidden registry entries be unhidden as well? Well, I have no hidden processes, so does that mean that something else other than a hidden process is hiding the registry entries? So does that mean that I do not have a rootkit, but a legitimate software instead is creating the hidden registry entries?]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20124524</guid>
<pubDate>Fri, 07 Mar 2008 09:10:45 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20124513</link>
<description><![CDATA[Name Game posted : Ok I read your thread over at Antivir Forum.<br><br>&raquo;<A HREF="http://forum.avira.com/thread.php?threadid=34344" >forum.avira.com/thread.p &middot;&middot;&middot; id=34344</A><br><br>Question for you..did you check your PC to find out if you had that "rootkit" info because the other person posted..or had you previoulsy found it before he posted by coincidence ?<br><br>Because in that thread a member named<br><br><b>gitwed</b> <br>Gesperrter Nutzer <br><br>Registration Date: 02.03.2008<br>Posts: 5<br>Version: AntiVir PE Classic<br><br>Posted this log info on his scan.<br><br>AntiVir PersonalEdition Classic<br>Report file date: Sunday, March 02, 2008 14:35<br><br>Scanning for 1129035 virus strains and unwanted programs.<br><br>Licensed to: Avira AntiVir PersonalEdition Classic<br>Serial number: 0000149996-ADJIE-0001<br>Platform: Windows XP<br>Windows version: (Service Pack 2) [5.1.2600]<br>Username: samlim<br>Computer name: PERSONAL-DDDC93<br><br><b>So my qestion is..are you both gitwed and cdavfrew at that forum ????</b><br><br>&raquo;<A HREF="http://forum.avira.com/thread.php?postid=312890" >forum.avira.com/thread.p &middot;&middot;&middot; d=312890</A><br><small>--<br>Gladiator Security Forum  &raquo;<A HREF="http://www.gladiator-antivirus.com/" >www.gladiator-antivirus.com/</A> <br>Missing Kids<br> &raquo;<A HREF="http://www.missingkids.com/" >www.missingkids.com/</A></small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20124513</guid>
<pubDate>Fri, 07 Mar 2008 09:07:08 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20124349</link>
<description><![CDATA[Name Game posted : Thanks..BTW just because any of them find something "hidden" does not mean it is a rootkit.<br><br>BTW..I assume you have already run a reg cleaner..I would suggest RegSeeker by Hover Inc. Set it to clean the registry including the .exe..and see if it comes up with old stuff you can clean up including the things you are worried about. You will have a choice before cleaning them so it will not mess up your PC.<br><br>&raquo;<A HREF="http://www.hoverdesk.net/freeware.htm" >www.hoverdesk.net/freeware.htm</A>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20124349</guid>
<pubDate>Fri, 07 Mar 2008 08:02:43 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20124336</link>
<description><![CDATA[anon posted : Name Game,<br>I set my scan to a rootkit scan, so I didn't really have a choice. I have posted my problem on the Avira forum, but have recieved slow and little support. The reason why I don't format my computer is because, well, I don't like it. It takes way too much trouble if I only suspect a rootkit and not determine it. Yes, I am not a government officer or anything seriously important so I don't really care if people steal my information, only that I feel that it is a violation of my privacy and I don't like the idea of being infected. Besides, these hidden objects are not false positives because both gmer and niap detects the registry entries as hidden, and really, there is no false positive in rootkit scan.<br><br>And no, I do not have an X-box]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20124336</guid>
<pubDate>Fri, 07 Mar 2008 07:55:33 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20124294</link>
<description><![CDATA[Name Game posted : Curious here..if you had in the past or even now think you have a rootkit,why would you not reformat that system the correct way and then reinstall known good software ? Is it possible you have nothing important on the PC to be compromised in the first place ?<br>And have you contacted the Antivir folks with the info you found and got their opinion on whether it is a FP. That is the first place I would have gone.<br><br>When you did scan..did you have an option for these items to be off or on ?<br><br>Scan master boot sector..........: on<br>Scan boot sector.................: on<br>Scan memory......................: off<br>Process scan.....................: off<br>Scan registry....................: off<br>Search for rootkits..............: on<br>Scan all files...................: All files<br>Scan archives....................: on<br>Recursion depth..................: 20<br>Smart extensions.................: on<br><br>I see this was set for on<br><br>Macro heuristic..................: on<br>File heuristic...................: high<br><br><b>BTW..do you have an X-box</b>  :D  if so I know the reason then you might have FP's.<br><small>--<br>Gladiator Security Forum  &raquo;<A HREF="http://www.gladiator-antivirus.com/" >www.gladiator-antivirus.com/</A> Missing Kids &raquo;<A HREF="http://www.missingkids.com/" >www.missingkids.com/</A></small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20124294</guid>
<pubDate>Fri, 07 Mar 2008 07:40:11 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20124207</link>
<description><![CDATA[anon posted : I finally scanned with Gmer file scan and I found no hidden file scan or processes (I didn't scan for the rest). Does that mean that I have no rootkit, since rootkits need files to operate, and not registry entries alone? Perhaps the registry entries are traces left by rootkits installed on my computer before. <br><br>Should I use the in-built protection and monitoring program in Gmer? Is it good? Or is there another low-resource alternative?]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20124207</guid>
<pubDate>Fri, 07 Mar 2008 06:57:48 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20120562</link>
<description><![CDATA[Woody79_00 posted : Elite I have seen is very knowledgeable on rootkits. I myself have some experience in removing rootkits. Although i haven't done so in sometime. Even though i do fix computers as a side job, I have found removing rootkits from an infected system is not cost effective anymore.<br><br>Rootkits are becoming more complex, and removing them will become more difficult. The time will come to draw a line between removal and rebuild. I personally recommend rebuilding systems that are rootkited in lieu of removing the rootkit for various reasons.<br><br>1. What changes has the rootkit made to your system? even after you have removed the rootkit, there is no guratee that a backdoor of some sort is still not open on your system somewhere. Even if you take a month throughly go though the system and evaluate it from an It Professional standpoint there is no "guarantee" certain system changes will be reverted, or that you could even find the changes it has made all over your system. It is more cost effective to rebuild they system, or reimage it with a known clean backup.<br><br>This is the reason that I will rebuild a system, fully patch it behind a SPI Hardware Firewall(router) and then install Security software, then create a Image of the Drive with Acronis or what not on removable meida such as Dvd-R's....that way if the system is indeed rooted, i can format it, and reimage the drive from a known clean backup.<br><br>You can never be too sure in terms of security, make no mistake some rootkits make changes to your OP system that you may never find. Im not saying it is impossible to find these changes and fix them, im just saying its not cost effective to do so. Your greatest weapon against a rootkit is a known clean image, a backup on removable media that can't be tampered with.<br><br>Practicing Principle of Least Privedge(Limted user accounts, not admin accounts)<br><br>Using Hardware Based DEP on everything<br><br>Disabling Launching Programs and files in a iframe on your browser of choice<br><br>1 HIPS program<br><br>1 anti-virus, 1 antispyware, and 1 anti-trojan is really about all you can do. <br><br>The known clean image is your way of fighting back against these types of infections. Virtual machines are starting to get bypassed, just like eveyrhting else, nothing is a cure all. <br><br>I am a firm beliver that becareful of executing arbitrary code will go a long way in keep this garbage off your system. I never install or run anything im not 100% sure it is not malicious and even then, i doube check.<br><br>If i hear about a new piece of software, i research it 1st. I spend atleast a week finding out everything i can about these files, md5 has, sha1, comparing it to know results, using virus total and jotti to check them out, research, research, research. I then have a machine that has nothing but a virtual machine on it that i can flaten and restore anytime with debugging software on it that after my resarch i will test the application, install it, find out what reg keys it makes, what services it installs, where the files in question are installed, and i read the eula to a tee<br><br>Just researching things before you install i belive will go a long way to keeping your machine safe from things. <br><br>Now granted there are some sistes that have been hacked and will try to exploit you, but as long as you keep your system patched you should be ok as long as you don't fall for social engineering tactics. <br><br>But IMO its just not cost effective to remove rootkits anymore, just make a known clean backup of a fully patched system, and if the need ever arises, just restore it. its is my opinion that a router is almost the most important part of a person's security. If your primary firewall is on your pc, it is in the wrong place.<br><br>good day, and good luck to ya]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20120562</guid>
<pubDate>Thu, 06 Mar 2008 15:18:00 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20119331</link>
<description><![CDATA[Elite posted : IceSword is becoming outdated. It's not under active development anymore. I'd recommend GMER over IceSword.<br><small>--<br>QUAD!!!!</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20119331</guid>
<pubDate>Thu, 06 Mar 2008 12:31:29 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20117831</link>
<description><![CDATA[psicop posted : Scan your machine with <i>Icesword</i>. Here's a guide to it and a link to the latest version (1.22):<br><br>&raquo;<A HREF="http://www.castlecops.com/t165203-IceSword_Instructions_in_English_Illustrated.html" >www.castlecops.com/t1652 &middot;&middot;&middot; ted.html</A><br><br>Good luck.]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20117831</guid>
<pubDate>Thu, 06 Mar 2008 07:07:53 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20117508</link>
<description><![CDATA[anon posted : La Luna, I scanned with Hijack This, and nothing suspicious came out, because every item on that list is legitimate. I haven't scanned it yet with gmer file scan because I haven't had access to the computer yet (I'm out, using someone else's computer).]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20117508</guid>
<pubDate>Thu, 06 Mar 2008 03:02:19 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20117079</link>
<description><![CDATA[SipSizzurp posted : You both kick some <b>serious</b> malware ass. Each has a different collection of experiences as do we all, and will naturally have a different take on things from time to time. That is not such a deep concept is it ? Can't we just have a couple of six packs together and relax ? Pissing contests are for firemen.The OP has enough ammo to get himself going on the problem.]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20117079</guid>
<pubDate>Thu, 06 Mar 2008 00:08:19 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20117012</link>
<description><![CDATA[Elite posted : Now you're just adding fuel to the fire.<br><br>I helped the OP. I suggested a GMER scan.<br><br>As for Bill, I honestly don't care if he's an MS MVP or not. He didn't seem to know what he was talking about.<br><br>I think I've seen enough ARK logs to know when someone's infected or not. As for considering myself an authority, I'd go so far as to say I'm knowledgeable on the subject of rootkits (while being modest). I'm quite familiar with a good number of infections, and how they work. I might even have a few friends in the scene.<br><br>When I eventually write a rookit, I'll be sure to include a friendly shoutout to Bill via dbgprint.<br><small>--<br>QUAD!!!!</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20117012</guid>
<pubDate>Wed, 05 Mar 2008 23:52:50 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20116879</link>
<description><![CDATA[EGeezer posted : <div class="bquote"><small>said by <a href="/profile/698374" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=698374');">Elite</a>:</small><br><br>Regardless, I still think he's very ill-informed and that rootkits aren't his place.<br> </div> <br><br>I have yet to see anything you have posted that is either helpful to the OP or any proof of any of bcastner <A HREF="/useremail/u/693977"><i class='fa fa-user'></i></A>'s information being erroneous. <br><br>I'd also be interested in how one becomes the authority to determine what Bill's "place" is. The hey mod button is yours to use if you feel he's out of his "place". <br><br>To the OP, <br><br>I concur that going to the cleanup forum and going through the process will yield you more thorough and accurate analysis and resolution of any problems or false positives that may be uncovered. I suspect that bcastner <A HREF="/useremail/u/693977"><i class='fa fa-user'></i></A> will be there to help :) <br><small>--<br>Mayors of New York come from nowhere and go nowhere.<br>Wallace Sayre</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20116879</guid>
<pubDate>Wed, 05 Mar 2008 23:24:06 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20116877</link>
<description><![CDATA[La Luna posted : If you have followed all the self cleanup steps, but are still suspicious, you may need to post a HJT log in the Security Cleanup forum (follow the instructions for HJT in the Mandatory Steps list):<br><br>&raquo;<A HREF="/forum/cleanup">Security Cleanup</A>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20116877</guid>
<pubDate>Wed, 05 Mar 2008 23:23:57 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20116412</link>
<description><![CDATA[anon posted : I have scanned my computer according to La luna's advice, but nothing comes out. OBviously, if there is a rootkit, there would be no results. However, bcastner, when I opened the registry entry which seems to be legit using gmer, it still shows the same binary entry as it did before it changed, so i suspect that the registry entry is disguised as a legit entry but is actually harmful. I scanned with gmer registry scan and a lot more hidden registry objects appeared. I suspect that zonealarm pro might be behind this, but I'm not sure. I haven't scanned for hidden files yet, so I will do that soon.]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20116412</guid>
<pubDate>Wed, 05 Mar 2008 22:03:36 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20112737</link>
<description><![CDATA[bcastner posted : No.  I have more obnoxious userland rootkit examples.  I posted about one of the ones most prevelant at the moment.<br>In any case, your earlier comment was OT as far as I am concerned.  as La Luna reminded, the issue is helping the OP, not guesses as to how informed Bill Castner is about rootkits.]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20112737</guid>
<pubDate>Wed, 05 Mar 2008 12:20:19 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20112673</link>
<description><![CDATA[Elite posted : I suggested a GMER scan. It's more thorough than AntiVir AV's built in antirootkit module.<br><br>I also said your average usermode rootkit isn't that complex, but he went out of his way to post about the most obnoxious usermode rootkit he could find. I suggested one of my favorite kernel mode examples.<br><br>Regardless, I still think he's very ill-informed and that rootkits aren't his place.<br><small>--<br>QUAD!!!!</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20112673</guid>
<pubDate>Wed, 05 Mar 2008 12:11:19 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20112632</link>
<description><![CDATA[La Luna posted : <div class="bquote"><small>said by <a href="/profile/698374" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=698374');">Elite</a>:</small><br><br>That's a crappy rootkit, using dirty tricks.<br><br> </div>So his example is, in your opinion, a "crappy rootkit". And? <br><br>It still is an example of the point he was making. Or are we only talking about "non crappy rootkits"?  :hmm:<br><br>Anyway, arguing over crappy vs non crappy rootkits doesn't help the OP. He still needs to investigate further using more tools and possibly posting in the Cleanup forum.<br><small>--<br><b><A HREF="http://www.thereligionofpeace.com/">10,675 DEADLY TERROR ATTACKS SINCE 9/11</a></b>~~<b><A HREF="/forum/disco">TEAM DISCOVERY</a></b><br><i>Can't feel you anymore, don't need you anymore, don't believe you anymore, I don't need you anymore</i><br></small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20112632</guid>
<pubDate>Wed, 05 Mar 2008 12:06:01 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20112588</link>
<description><![CDATA[tempnexus posted : <div class="bquote"><small>said by <a href="/profile/693977" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=693977');">bcastner</a>:</small><br><br>Its crappy because it shows your earlier comment ill-informed?<br> </div>Aren't you familiar with the "incovenient truth" theory?<br>If the truth goes aginst what you just say then debunk it, call it names and then twist it to your favour. :)]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20112588</guid>
<pubDate>Wed, 05 Mar 2008 12:00:59 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20112540</link>
<description><![CDATA[bcastner posted : Its crappy because it shows your earlier comment ill-informed?]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20112540</guid>
<pubDate>Wed, 05 Mar 2008 11:54:33 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20112511</link>
<description><![CDATA[Elite posted : That's a crappy rootkit, using dirty tricks.<br><br>I suggest you go read up about Rustock.B variant.<br><small>--<br>QUAD!!!!</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20112511</guid>
<pubDate>Wed, 05 Mar 2008 11:51:25 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20112499</link>
<description><![CDATA[bcastner posted : What is an "average" rootkit?<br>Are you suggesting that rookited infections <u>never</u> use a loader?<br>Are you suggesting that they always have "hidden system driver, hidden registry entry (usually a service or two for driver and process), and hidden files (driver and executable)"?<br><br>Do not take my comment above as a treatise on rootkits. But yes, many do in fact use an intermediate loader.  Not all.  <br><br>Lets take a very common one at the moment, the Autorun infection KAVO:<br><br>When kavo.exe is executed, it drops 4z5zdceq.dll in the %Temp% folder. The dll name is different for each version of the malware. 4z5zdceq.dll is detected as Trojan-PSW.Win32.OnLineGames.nnt.<br>kavo.exe loads the dll and writes h7.sys to the %Temp% folder. Driver name is random.<br>h7.sys is loaded by the System Process.<br><br>kavo.exe deletes h7.sys.<br>kavo.exe launches a hidden iexplore.exe process and writes to its virtual memory.<br>Internet Explorer loads %Temp%\4z5zdceq.dll.<br><br>kavo.exe copies itself to %system%\kavo.exe.<br>kavo.exe drops kavo0.dll into system32 folder.<br>In meanwhile, Internet Explorer writes wincab.sys to the system32 folder.<br><br>The System Process loads wincab.sys<br><br>Internet Explorer markes wincab.sys for deletion.<br><br>A new thread is created by explorer.exe in order to load %system%\kavo0.dll<br><br>Explorer creates a new hidden Internet Explorer process and zz.rar is downloaded from internet. This file tells if an update is available.<br>If an update is available, zz.exe is downloaded from the web and both files are copied into the %Temp% folder. Files may have another name, they are different for each update.<br>In meanwhile, explorer.exe copies %system%\kavo.exe to c:\g2p3s.exe (different filename for each version) and creates the c:\autorun.inf file. If any removable drives are present, those files are also copied to the root folder. This method ensures that the malware will propagate on another computer if the flash drive is plugged in.<br>If an update was available, it's installed using the same method as described in point 1 to 12.<br>When the update tries to overwrite %system%\kavo0.dll, a sharing violation is triggered. The file is then dropped as kavo1.dll. That is why you will see both files present most of the time.<br>Our driver only does exist in memory, wincab.sys is not present on the HDD when you shut down the computer. You can easily check this by booting to the Recovery Console. When performing a dir command, the file is not present.<br>Since kavo.exe is set to run each time windows starts, the rootkit will be reinstalled every time you restart / boot up the PC. <br>The files are very difficult to delete, partially due to the presence of the rootkit but also because the infection checks every 30 seconds if %system%\kavo.exe, c:\g2p3s.exe and c:\autorun.inf are still present. If not, they are re-created.<br><br>From Kimberly's notes on KAVO:  &raquo;<A HREF="http://www.bluetack.co.uk/forums/index.php?s=c9c6b21b85ff9d86e90c27fd901b0c89&showtopic=18228" >www.bluetack.co.uk/forum &middot;&middot;&middot; ic=18228</A><br><small>--<br><b>============</b><br><b>MS-MVP 2004 - -2008, ASAP Member</b><br><b><i>Users Helping Users</i></b><br><br></small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20112499</guid>
<pubDate>Wed, 05 Mar 2008 11:49:25 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20112485</link>
<description><![CDATA[CajunTek posted : <div class="bquote"><small>said by <a href="/profile/698374" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=698374');">Elite</a>:</small><br><br>bcastner <A HREF="/useremail/u/693977"><i class='fa fa-user'></i></A>, you are somewhat ill-informed about how rootkits function.  </div>I suspect that is not the case...<br><small>--<br>da Cajun <br><br> Darn I hate Malware</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20112485</guid>
<pubDate>Wed, 05 Mar 2008 11:47:08 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20112454</link>
<description><![CDATA[Elite posted : NIAPAntirootkit is a complete piece of shit, from my experience and other's experiences with it.<br><br>AntiVir has decent rootkit detection. I'd say it could detect just about everything ITW except MBRKit.<br><br>The fact that he's got two hidden CLSIDs, but no hidden drivers, processes, or files, tells me it's probably an FP on AntiVir's side.<br><br>If he's really paranoid, he can download GMER and do a scan.<br><small>--<br>QUAD!!!!</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20112454</guid>
<pubDate>Wed, 05 Mar 2008 11:43:41 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20112373</link>
<description><![CDATA[Cudni posted : <div class="bquote"><small>said by <a href="/profile/698374" onClick="this.blur(); return popup(event,'/uidpop?ajh=1&uid=698374');">Elite</a>:</small><br><br>You have no rootkits.<br> </div>because.....?<br><br>Cudni]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20112373</guid>
<pubDate>Wed, 05 Mar 2008 11:31:47 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20112345</link>
<description><![CDATA[Elite posted : You have no rootkits.<br><br>bcastner <A HREF="/useremail/u/693977"><i class='fa fa-user'></i></A>, you are somewhat ill-informed about how rootkits function. Average usermode rootkit has a hidden process, hidden system driver, hidden registry entry (usually a service or two for driver and process), and hidden files (driver and executable). There are no loaders involved.<br><small>--<br>QUAD!!!!</small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20112345</guid>
<pubDate>Wed, 05 Mar 2008 11:27:22 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20111851</link>
<description><![CDATA[bcastner posted : The second one is not related to your first posting.  The second has a CLSID of {BDEADF00-C265-11d0-BCED-00A0C90AB50F} and is a valid Microsoft entry:  &raquo;<A HREF="http://www.microsoft.com/technet/prodtechnol/windows2000serv/reskit/regentry/85854.mspx?mfr=true" >www.microsoft.com/techne &middot;&middot;&middot; mfr=true</A><br><br>The first is suspicious.  But registry traces are not the rootkit.  As to can they change, well, yes they can and usually do.  The process for a rootkit is typically to have one loader, which creates a randomly named entry.  The randomly named entry creates the hook in a userland process such as Winlogon.  It then deletes the second file.  The final active rootkit thread will have a random name.<br><br>Follow the advice of La Luna <A HREF="/useremail/u/429050"><i class='fa fa-user'></i></A>.<br>Your are going to get nowhere with a rootkit by attempting to modify the registry for its traces.  This is made more likely since you are using a rootkit revealer type of utility.  For all we know what you are seeeing is the trace evidence of this very same utility.  Rootkit utilities have to randomly name their own internals, as otherwise rootkit authors could easily target them so as to more effectively hide.  So they employ the same tricks and tactics as do the rootkit authors themselves.<br><br><small>--<br><b>============</b><br><b>MS-MVP 2004 - -2008, ASAP Member</b><br><b><i>Users Helping Users</i></b><br><br></small>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20111851</guid>
<pubDate>Wed, 05 Mar 2008 10:03:39 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20111820</link>
<description><![CDATA[La Luna posted : Follow the instructions here, including the online scans:<br><br>&raquo;<A HREF="/faq/seclean">Security Cleanup FAQ</A> &raquo;<A HREF="/faq/13616">Mandatory Steps Before  Requesting Assistance</A>]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20111820</guid>
<pubDate>Wed, 05 Mar 2008 09:58:22 EDT</pubDate>
</item>
<item>
<title>Re: Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Re-Possible-rootkit-20111506</link>
<description><![CDATA[anon posted : After I managed to open the registry entry using NIAPAntirootkit Tools Registry Editor and after I exported the file, it changed. It is a binary entry, so I wasn't able to understand the commands within the entry. However, it changed to this:<br><br>Windows Registry Editor Version 5.00<br><br>[HKEY_USERS\S-1-5-21-1715567821-884357618-839522115-1004\Software\Microsoft<br>\Windows\CurrentVersion\Shell Extensions\Approved]<br>"{BDEADF00-C265-11d0-BCED-00A0C90AB50F}"="Web Folders"<br><br>[HKEY_USERS\S-1-5-21-1715567821-884357618-839522115-1004\Software\Microsoft<br>\Windows\CurrentVersion\Shell Extensions\Approved\]<br>"{BDEADF00-C265-11d0-BCED-00A0C90AB50F}"="Web Folders"<br><br>[HKEY_USERS\S-1-5-21-1715567821-884357618-839522115-1004\Software\Microsoft<br>\Windows\CurrentVersion\Shell Extensions\Approved\\]<br>"{BDEADF00-C265-11d0-BCED-00A0C90AB50F}"="Web Folders"<br><br>[HKEY_USERS\S-1-5-21-1715567821-884357618-839522115-1004\Software\Microsoft<br>\Windows\CurrentVersion\Shell Extensions\Approved\\\]<br>"{BDEADF00-C265-11d0-BCED-00A0C90AB50F}"="Web Folders"<br><br>[HKEY_USERS\S-1-5-21-1715567821-884357618-839522115-1004\Software\Microsoft<br>\Windows\CurrentVersion\Shell Extensions\Approved\\\\]<br>"{BDEADF00-C265-11d0-BCED-00A0C90AB50F}"="Web Folders"<br><br>and on and on and on...<br><br>Is this a rootkit? It seems to be a very smart one? But how could it have changed? There are no hidden processes running or hidden files on my computer; I checked. <br><br>Hope to solve it soon<br>Bob]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Re-Possible-rootkit-20111506</guid>
<pubDate>Wed, 05 Mar 2008 08:34:31 EDT</pubDate>
</item>
<item>
<title>Possible rootkit?</title>
<link>http://www.dslreports.com/forum/Possible-rootkit-20111138</link>
<description><![CDATA[anon posted : I scanned my computer with antivir classic rootkit scan, and it came back with two hidden objects. I would like to know what they are and whether or not they are rootkits? Could it be that a program creates these entries?<br><br>Here is my log:<br><br>AntiVir PersonalEdition Classic<br>Report file date: Sunday, March 02, 2008 14:35<br><br>Scanning for 1129035 virus strains and unwanted programs.<br><br>Licensed to: Avira AntiVir PersonalEdition Classic<br>Serial number: 0000149996-ADJIE-0001<br>Platform: Windows XP<br>Windows version: (Service Pack 2) [5.1.2600]<br>Username: samlim<br>Computer name: PERSONAL-DDDC93<br><br>Version information:<br>BUILD.DAT : 270 15603 Bytes 9/19/2007 13:32:00<br>AVSCAN.EXE : 7.0.6.1 290856 Bytes 8/23/2007 06:16:29<br>AVSCAN.DLL : 7.0.6.0 49192 Bytes 8/16/2007 05:23:51<br>LUKE.DLL : 7.0.5.3 147496 Bytes 8/14/2007 08:32:47<br>LUKERES.DLL : 7.0.6.1 10280 Bytes 8/21/2007 05:35:20<br>ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 7/18/2007 07:27:15<br>ANTIVIR1.VDF : 7.0.1.95 3367424 Bytes 12/14/2007 06:43:52<br>ANTIVIR2.VDF : 7.0.2.181 1993728 Bytes 2/24/2008 09:35:40<br>ANTIVIR3.VDF : 7.0.2.215 117248 Bytes 2/29/2008 05:35:01<br>AVEWIN32.DLL : 7.6.0.73 3334656 Bytes 3/2/2008 05:35:01<br>AVWINLL.DLL : 1.0.0.7 14376 Bytes 2/26/2007 03:36:26<br>AVPREF.DLL : 7.0.2.2 25640 Bytes 7/18/2007 00:39:17<br>AVREP.DLL : 7.0.0.1 155688 Bytes 4/16/2007 06:16:24<br>AVPACK32.DLL : 7.6.0.3 360488 Bytes 1/16/2008 10:40:55<br>AVREG.DLL : 7.0.1.6 30760 Bytes 7/18/2007 00:17:06<br>AVARKT.DLL : 1.0.0.20 278568 Bytes 8/28/2007 05:26:33<br>AVEVTLOG.DLL : 7.0.0.20 86056 Bytes 7/18/2007 00:10:18<br>NETNT.DLL : 7.0.0.0 7720 Bytes 3/8/2007 04:09:42<br>RCIMAGE.DLL : 7.0.1.30 2342952 Bytes 8/7/2007 05:38:13<br>RCTEXT.DLL : 7.0.62.0 86056 Bytes 8/21/2007 05:50:37<br>SQLITE3.DLL : 3.3.17.1 339968 Bytes 7/23/2007 02:37:21<br><br>Configuration settings for the scan:<br>Jobname..........................: Rootkit search<br>Configuration file...............: C:\Documents and Settings\All Users\Application Data\Avira\AntiVir PersonalEdition Classic\PROFILES\rootkit.avp<br>Logging..........................: high<br>Primary action...................: interactive<br>Secondary action.................: ignore<br>Scan master boot sector..........: on<br>Scan boot sector.................: on<br>Scan memory......................: off<br>Process scan.....................: off<br>Scan registry....................: off<br>Search for rootkits..............: on<br>Scan all files...................: All files<br>Scan archives....................: on<br>Recursion depth..................: 20<br>Smart extensions.................: on<br>Deviating archive types..........: +BSD Mailbox, +Netscape/Mozilla Mailbox, +Eudora Mailbox, +Squid cache, +Pegasus Mailbox, +MS Outlook Mailbox, <br>Macro heuristic..................: on<br>File heuristic...................: high<br>Deviating risk categories........: +APPL,+GAME,+JOKE,+PCK,+SPR,<br>Expanded search settings.........: 0x00300922<br><br>Start of the scan: Sunday, March 02, 2008 14:35<br><br>Starting search for hidden objects.<br>HKEY_USERS\S-1-5-21-1715567821-884357618-839522115-1004\Software\Microsoft\<br>Windows\CurrentVersion\Shell Extensions\Approved\{26910156-F8C6-3BCF-B410-E8F60C33D564}\hakolggmepoiffaa<br><br>[NOTE] The registry entry is invisible.<br>HKEY_USERS\S-1-5-21-1715567821-884357618-839522115-1004\Software\Microsoft\<br>Windows\CurrentVersion\Shell Extensions\Approved\{26910156-F8C6-3BCF-B410-E8F60C33D564}\hakolggmjpfjfabo<br><br>[NOTE] The registry entry is invisible.<br>'601417' objects were checked, '2' hidden objects were found.<br><br>End of the scan: Sunday, March 02, 2008 14:40<br>Used time: 05:05 min<br><br>The scan has been done completely.<br><br>0 Scanning directories<br>0 Files were scanned<br>0 viruses and/or unwanted programs were found<br>0 Files were classified as suspicious:<br>0 files were deleted<br>0 files were repaired<br>0 files were moved to quarantine<br>0 files were renamed<br>0 Files cannot be scanned<br>0 Files not concerned<br>0 Archives were scanned<br>0 Warnings<br>0 Notes<br>601417 Objects were scanned with rootkit scan<br>2 Hidden objects were found]]></description>
<guid isPermaLink="true">http://www.dslreports.com/forum/Possible-rootkit-20111138</guid>
<pubDate>Wed, 05 Mar 2008 04:09:59 EDT</pubDate>
</item>
</channel>
</rss>
