- Jul 24, 2000
- 979
- 0
- 76
I found a kernel module/driver loaded in memory using GMER, IceSword, and Rootkit Unhooker (latest versions). There is a particular file that I am unable to locate. It's "supposed" to be located in C:\Windows\System32\Drivers\a????????.SYS even though I had already selected to show all hidden and system files.
That particular module always changes its name with the following characteristics.
1. Always start with a???????.sys
2. Always 8 characters in length
3. Always 421888 bytes in size
http://img294.imageshack.us/my...image=icesword1xo2.jpg
http://img294.imageshack.us/my...image=icesword2sm1.jpg
http://img459.imageshack.us/my...ootkitunhooker1ah5.jpg
http://img187.imageshack.us/my...ootkitunhooker2yv9.jpg
The last image was taken with my digi camera since a screenshot was too slow before BSOD. It's basically: avp3lewx.sys, 0x8ACCF000, 421888, [apv3lewx.sys] [SCSIPORT.SYS] [sptd.sys] [????] [ntkrnlpa.exe]
IceSword wasn't able to provide much details although it works fine. It has an option to browse the file structure, but I couldn't find those files when using it. Windows Explorer doesn't see it either.
Rootkit Unhooker keeps causing BSOD with IRQ_NOT_LESS_OR_EQUAL. I only managed to get two screenshots with Rootkit Unhooker before the system restarts from BSOD.
The only software I currently have are Daemon Tools (v4.10 x86 latest), NOD32 v2.70.39, SUPERAntiSpyware (latest), SpywareTerminator (v2.0.0.93 latest). Also have Supreme Commander installed (possible copy protection scheme here?).
Other than those programs, I don't see any other legit software or Windows' core require to change the filename upon every restart. What can it possibly be? Is it a driver from those programs above? That doesn't make a lot of sense since I ran each program separately AND only after each restart.
That particular module always changes its name with the following characteristics.
1. Always start with a???????.sys
2. Always 8 characters in length
3. Always 421888 bytes in size
http://img294.imageshack.us/my...image=icesword1xo2.jpg
http://img294.imageshack.us/my...image=icesword2sm1.jpg
http://img459.imageshack.us/my...ootkitunhooker1ah5.jpg
http://img187.imageshack.us/my...ootkitunhooker2yv9.jpg
The last image was taken with my digi camera since a screenshot was too slow before BSOD. It's basically: avp3lewx.sys, 0x8ACCF000, 421888, [apv3lewx.sys] [SCSIPORT.SYS] [sptd.sys] [????] [ntkrnlpa.exe]
IceSword wasn't able to provide much details although it works fine. It has an option to browse the file structure, but I couldn't find those files when using it. Windows Explorer doesn't see it either.
Rootkit Unhooker keeps causing BSOD with IRQ_NOT_LESS_OR_EQUAL. I only managed to get two screenshots with Rootkit Unhooker before the system restarts from BSOD.
The only software I currently have are Daemon Tools (v4.10 x86 latest), NOD32 v2.70.39, SUPERAntiSpyware (latest), SpywareTerminator (v2.0.0.93 latest). Also have Supreme Commander installed (possible copy protection scheme here?).
Other than those programs, I don't see any other legit software or Windows' core require to change the filename upon every restart. What can it possibly be? Is it a driver from those programs above? That doesn't make a lot of sense since I ran each program separately AND only after each restart.