ROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Start Time: 2010/08/19 22:53
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================
Drivers
-------------------
Name: ALSysIO.sys
Image Path: C:\DOCUME~1\[Name Removed]\LOCALS~1\Temp\ALSysIO.sys
Address: 0xB6B19000 Size: 28672 File Visible: No Signed: -
Status: -
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xB6B49000 Size: 98304 File Visible: No Signed: -
Status: -
Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xBA5CE000 Size: 8192 File Visible: No Signed: -
Status: -
Name: jycjy.sys
Image Path: jycjy.sys
Address: 0xBA0A8000 Size: 61440 File Visible: No Signed: -
Status: -
Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xB5E4F000 Size: 49152 File Visible: No Signed: -
Status: -
Hidden/Locked Files
-------------------
Path: c:\windows\temp\hlktmp
Status: Allocation size mismatch (API: 33570816, Raw: 0)
SSDT
-------------------
#: 019 Function Name: NtAssignProcessToJobObject
Status: Hooked by "<unknown>" at address 0x89ebc580
#: 057 Function Name: NtDebugActiveProcess
Status: Hooked by "<unknown>" at address 0x89ebd100
#: 068 Function Name: NtDuplicateObject
Status: Hooked by "<unknown>" at address 0x89ebcb30
#: 122 Function Name: NtOpenProcess
Status: Hooked by "<unknown>" at address 0x89ebbcc0
#: 128 Function Name: NtOpenThread
Status: Hooked by "<unknown>" at address 0x89ebbfc0
#: 137 Function Name: NtProtectVirtualMemory
Status: Hooked by "<unknown>" at address 0x89ebc9c0
#: 213 Function Name: NtSetContextThread
Status: Hooked by "<unknown>" at address 0x89ebc860
#: 229 Function Name: NtSetInformationThread
Status: Hooked by "<unknown>" at address 0x89ebc6e0
#: 237 Function Name: NtSetSecurityObject
Status: Hooked by "<unknown>" at address 0x89eb9700
#: 253 Function Name: NtSuspendProcess
Status: Hooked by "<unknown>" at address 0x89ebc420
#: 254 Function Name: NtSuspendThread
Status: Hooked by "<unknown>" at address 0x89ebc2c0
#: 257 Function Name: NtTerminateProcess
Status: Hooked by "<unknown>" at address 0x89ebbe50
#: 258 Function Name: NtTerminateThread
Status: Hooked by "<unknown>" at address 0x89ebc150
#: 277 Function Name: NtWriteVirtualMemory
Status: Hooked by "<unknown>" at address 0x89ebcf50
==EOF==
==================================================
Scan Start Time: 2010/08/19 22:53
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================
Drivers
-------------------
Name: ALSysIO.sys
Image Path: C:\DOCUME~1\[Name Removed]\LOCALS~1\Temp\ALSysIO.sys
Address: 0xB6B19000 Size: 28672 File Visible: No Signed: -
Status: -
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xB6B49000 Size: 98304 File Visible: No Signed: -
Status: -
Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xBA5CE000 Size: 8192 File Visible: No Signed: -
Status: -
Name: jycjy.sys
Image Path: jycjy.sys
Address: 0xBA0A8000 Size: 61440 File Visible: No Signed: -
Status: -
Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xB5E4F000 Size: 49152 File Visible: No Signed: -
Status: -
Hidden/Locked Files
-------------------
Path: c:\windows\temp\hlktmp
Status: Allocation size mismatch (API: 33570816, Raw: 0)
SSDT
-------------------
#: 019 Function Name: NtAssignProcessToJobObject
Status: Hooked by "<unknown>" at address 0x89ebc580
#: 057 Function Name: NtDebugActiveProcess
Status: Hooked by "<unknown>" at address 0x89ebd100
#: 068 Function Name: NtDuplicateObject
Status: Hooked by "<unknown>" at address 0x89ebcb30
#: 122 Function Name: NtOpenProcess
Status: Hooked by "<unknown>" at address 0x89ebbcc0
#: 128 Function Name: NtOpenThread
Status: Hooked by "<unknown>" at address 0x89ebbfc0
#: 137 Function Name: NtProtectVirtualMemory
Status: Hooked by "<unknown>" at address 0x89ebc9c0
#: 213 Function Name: NtSetContextThread
Status: Hooked by "<unknown>" at address 0x89ebc860
#: 229 Function Name: NtSetInformationThread
Status: Hooked by "<unknown>" at address 0x89ebc6e0
#: 237 Function Name: NtSetSecurityObject
Status: Hooked by "<unknown>" at address 0x89eb9700
#: 253 Function Name: NtSuspendProcess
Status: Hooked by "<unknown>" at address 0x89ebc420
#: 254 Function Name: NtSuspendThread
Status: Hooked by "<unknown>" at address 0x89ebc2c0
#: 257 Function Name: NtTerminateProcess
Status: Hooked by "<unknown>" at address 0x89ebbe50
#: 258 Function Name: NtTerminateThread
Status: Hooked by "<unknown>" at address 0x89ebc150
#: 277 Function Name: NtWriteVirtualMemory
Status: Hooked by "<unknown>" at address 0x89ebcf50
==EOF==