Robert Hensing's Secure Windows Initiative Bloghttp://blogs.technet.com/robert_hensing/default.aspxen-USCommunityServer 2.0 (Build: 60209.2598)New security features in VC2005http://blogs.technet.com/robert_hensing/archive/2005/09/29/411732.aspxThu, 29 Sep 2005 18:55:00 GMTd5e57398-b9ef-4490-9955-07cbb4e4a80d:411732Robert_Hensing0http://blogs.technet.com/robert_hensing/comments/411732.aspxhttp://blogs.technet.com/robert_hensing/commentrss.aspx?PostID=411732<P>So this is a pretty nice summary of some of the cool / new features of VC2005 that will hopefully lead to more secure code being cranked out all over the planet.</P><FONT size=2> <P></FONT><A href="http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnvs05/html/vs05security.asp"><U><FONT color=#0000ff>http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnvs05/html/vs05security.asp</U></FONT></A><FONT size=2></P></FONT><img src="http://blogs.technet.com/aggbug.aspx?PostID=411732" width="1" height="1">So what is it – ya do here? Allow myself to introduce . . . myself (again).http://blogs.technet.com/robert_hensing/archive/2005/07/14/407696.aspxThu, 14 Jul 2005 14:45:00 GMTd5e57398-b9ef-4490-9955-07cbb4e4a80d:407696Robert_Hensing0http://blogs.technet.com/robert_hensing/comments/407696.aspxhttp://blogs.technet.com/robert_hensing/commentrss.aspx?PostID=407696<P class=MsoNormal style="MARGIN: 0in 0in 0pt">Okay – if you are still subscribed to this feed – then you probably remember me from back in the day when I was an incident response guy for PSS Security doing detective work helping our customers figure out how they got hacked and offering sage advice on how not to get hacked (again) going forward.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>I hope that I was able to paint a pretty good picture of what a day in the life of a PSS Security engineer looks like with my previous blog posts and the types of threats facing our customers.</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><?xml:namespace prefix = o ns = "urn:schemas-microsoft-com:office:office" /><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">But now for something completely different - I’d like to give you a glimpse into my new life as a member of the SWI Defense team.</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">SWI or Secure Windows Initiative is a large team made up of various sub-teams within the Security Engineering and Communications division here at Microsoft.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">One of SWI’s core responsibilities is developing and enforcing the SDL – Security Development Lifecycle which is our fundamental approach to writing better, more secure software.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>But in addition to that, members of SWI do everything from helping developers create and use threat models early on in the development life cycle, to performing code reviews, to conducting penetration testing against un-released products, to creating security tools to help us do our jobs better (think fuzzing etc.).</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">In addition to that proactive work – certain members of SWI work reactively with the MSRC to triage and repro incoming privately reported and publicly disclosed vulnerabilities that they pick up either through the secure@ inbox or via the various lists that the MSRC monitors 24x7.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>After issues are triaged by SWI and bugs are opened and assigned to the developers responsible for fixing them, my team (SWI Defense) sets out to find ways to mitigate or workaround the reported vulnerability with the interest of protecting customers in the absence of or inability to deploy a security update.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>On the SWI Defense team we start our investigation very early in the process – sometimes even before the developers have started coding the fix!</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">What are we ‘investigating’?</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">We’re looking for ‘mitigating factors’ (i.e. things that may make the vulnerability less severe or non-applicable) and workarounds to help protect you from the reported vulnerability in case it gets exploited or exploit code is released.</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">How do we do it?<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>There are a variety of things we do.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>First and foremost we attempt to reproduce the problem (on every supported platform) by creating our own internal repro that we can use for testing.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>For example, if the problem is with a malformed document or file – we use a hex editor and create a malformed document or file.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>If the problem requires playing back network traffic – we use internal tools for playing back the required network traffic.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Sometimes we are required to abuse an API locally by calling it directly so we may create a local repro tool that can be used to demonstrate the vulnerability.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Fully patched undoable Virtual PC images come in quite handy here.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>After we’ve got our repro sorted out – we start debugging to see what’s going on underneath the covers.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Next, after we’ve identified the vulnerable function we start looking for ways we can avoid calling that vulnerable function via source code inspection.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>For example – suppose the vulnerable function was responsible for logging data – would turning off logging or changing log parameters or formats help avoid the vulnerable code path while allowing the system to remain on-line?<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">After looking at the code we also look for any configuration changes that can be made to workaround the issue such as stopping services, un-registering COM objects, ACL’ing files, using Software Restriction Policies, filtering ports and a myriad of other techniques that can be applied to given classes of vulnerabilities.</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">Once we have come up with a list of recommended workarounds and mitigations we provide this data to the MSRC for consideration.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Things we come up with may eventually be placed in a Security Advisory or a Security Bulletin (or both) (or neither if deemed too risky).</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">Have we had any success?<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Absolutely. <SPAN style="FONT-FAMILY: Wingdings; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-char-type: symbol; mso-symbol-font-family: Wingdings"><SPAN style="mso-char-type: symbol; mso-symbol-font-family: Wingdings">J</SPAN></SPAN><SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Take a look at most of the security bulletins released this year and you will find a non-empty ‘workarounds’ section under ‘Vulnerability Details’ in the bulletin.</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">It’s important to note that some security updates contain fixes for multiple issues.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>These issues are assigned CVE identifiers and are noted in the bulletin.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>We attempt to provide workarounds and mitigations for *each* critical or important CVE listed in the bulletin (in other words workarounds are per-important/critical vulnerability – not per-bulletin).</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">Let’s have a look at some of the security bulletins released in 2005</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">Here’s an issue I worked on shortly after starting the job:</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><A href="http://www.microsoft.com/technet/security/Bulletin/MS05-016.mspx">http://www.microsoft.com/technet/security/Bulletin/MS05-016.mspx</A></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">This was a privately reported vulnerability whereby an attacker could send you a file and if you attempted to open it, the Windows shell could be tricked into running MSHTA.EXE which would then process some malicious script embedded in the file to run code of an attacker’s choice in the context of you.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">We discovered a fairly easy and safe workaround for this one.</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">You can see the workaround by drilling down to ‘Vulnerability Details <SPAN style="FONT-FAMILY: Wingdings; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-char-type: symbol; mso-symbol-font-family: Wingdings"><SPAN style="mso-char-type: symbol; mso-symbol-font-family: Wingdings">à</SPAN></SPAN> Windows Shell Vulnerability <SPAN style="FONT-FAMILY: Wingdings; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-char-type: symbol; mso-symbol-font-family: Wingdings"><SPAN style="mso-char-type: symbol; mso-symbol-font-family: Wingdings">à</SPAN></SPAN> Workarounds for Windows Shell vulnerability’ section of the bulletin.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">It was as simple as temporarily un-registering MSHTA.EXE (until the update can be applied, and then re-registering it after the update is applied) using a single command line.&nbsp; Oh&nbsp;and the workaround was easy to undo - just re-register MSHTA using a similar command. <SPAN style="FONT-FAMILY: Wingdings; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-char-type: symbol; mso-symbol-font-family: Wingdings"><SPAN style="mso-char-type: symbol; mso-symbol-font-family: Wingdings">J</SPAN></SPAN></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">In our testing we also discovered an interesting ‘mitigating factor’ for this vulnerability.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>You could only exploit the vulnerability by sending a user a document that wasn’t already a registered file type (i.e. a .DOC file would not work since .DOC is registered by default to either WordPad or Word, but a .ROB file would probably work since there is no .ROB file association by default).<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>This information also made it into the mitigating factors part of the bulletin to help administrators understand the threat a bit better.</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">Another great example is <A href="http://www.microsoft.com/technet/security/Bulletin/MS05-025.mspx">http://www.microsoft.com/technet/security/Bulletin/MS05-025.mspx</A></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">There were two vulnerabilities addressed in this bulletin – one was rated critical (the PNG issue) and one was rated ‘moderate’ (the XML info disclosure issue).</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">When investigating the PNG issue we discovered that the root cause of the vulnerability was in a COM object shipped with IE used for processing PNG files so we tested un-registering the DLL (temporarily) and we also tested putting a Software Restriction Policy on it to prevent it from being loaded and sure enough either of these workarounds allow you to workaround the vulnerability in the absence of the security update.</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">More recently we also provided the MSRC with numerous workarounds for the vulnerability having to do with the JView Profiler COM object and Internet Explorer.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>These workarounds were listed in both the security advisory (initially) and then in the security bulletin when it was released:</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><A href="http://www.microsoft.com/technet/security/Bulletin/MS05-037.mspx">http://www.microsoft.com/technet/security/Bulletin/MS05-037.mspx</A></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">There are 6 workarounds documented in the bulletin for this issue.</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">As a customer – would you rather be told ‘install the security update’ or ‘well you can install the security update – or you can evaluate any of the 6 workarounds we came up with and tested to see if they are appropriate for your environment while you test the security update in a non-production environment’?<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>I think I know the answer.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Recently I noticed that there are not a lot of vendors providing this level of detail in their security bulletins.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN><A href="http://www.netbsd.org/Security/">Some vendors</A> are providing workarounds and mitigations in their security alerts/advisories/bulletins while <A href="https://rhn.redhat.com/errata/rhel3es-errata.html">others still are not</A>.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>For a more thorough look at how our security bulletins compare to some of our competitors check out the ‘Security in Operation’ series of articles from Jeff Jones – you can find part 1 <A href="http://www.microsoft.com/technet/community/columns/secmgmt/sm0305.mspx">here</A>.</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">So do we test the workarounds we come up with?<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Absolutely.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">We do functional testing to ensure the workaround actually works but we can only perform very limited if any application compatibility testing.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>We try to document known app-compat issues where possible but there are likely issues we cannot foresee.</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">Are workarounds as safe to deploy as the eventual security update?<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Probably not.</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">Security updates undergo considerably more testing (of all kinds) than the workarounds we come up with and as such workarounds should be carefully considered before deployment.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Workarounds should never be used indefinitely in place of the security update.</P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></P> <P class=MsoNormal style="MARGIN: 0in 0in 0pt">That’s it for now . . . </P><img src="http://blogs.technet.com/aggbug.aspx?PostID=407696" width="1" height="1">Robert Hensing’s Incident Response Blog – Reloadedhttp://blogs.technet.com/robert_hensing/archive/2005/03/23/401077.aspxWed, 23 Mar 2005 19:24:00 GMTd5e57398-b9ef-4490-9955-07cbb4e4a80d:401077Robert_Hensing11http://blogs.technet.com/robert_hensing/comments/401077.aspxhttp://blogs.technet.com/robert_hensing/commentrss.aspx?PostID=401077<p class="MsoNormal" style="MARGIN: 0in 0in 0pt">After nearly 7 years in Product Support Services helping our customers on issues ranging from debugging IIS failures, to identifying performance issues to helping customers with security investigations I have taken on a new challenge and accepted a job in the Security Business and Technology Unit working for the SWI team (Secure Windows Initiative).<?xml:namespace prefix = o ns = "urn:schemas-microsoft-com:office:office" /><o:p></o:p></p> <p class="MsoNormal" style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></p> <p class="MsoNormal" style="MARGIN: 0in 0in 0pt">My career at Microsoft initially had me working reactively with customers at a 1:1 level and while it was immensely satisfying and a great learning experience – near the end I had an intense desire to reach more people and to scale out so to speak.<span style="mso-spacerun: yes">&nbsp; </span>This is largely what made me turn to blogging.<span style="mso-spacerun: yes">&nbsp; </span><o:p></o:p></p> <p class="MsoNormal" style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></p> <p class="MsoNormal" style="MARGIN: 0in 0in 0pt">As a member of the SWI team, I feel I will be getting that opportunity (although indirectly) as I will be working closely with the MSRC during the security bulletin development process.<span style="mso-spacerun: yes">&nbsp; </span>Specifically, I’ll be helping them identify possible workarounds to security vulnerabilities so that they can be tested, verified and documented in the bulletins by the time they go live so that our customers can use them (if necessary) until the security updates can be applied. <o:p></o:p></p> <p class="MsoNormal" style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></p> <p class="MsoNormal" style="MARGIN: 0in 0in 0pt">This is definitely a change in focus for me, but I’m incredibly excited about it.<span style="mso-spacerun: yes">&nbsp; </span>However, as you can see I can, unfortunately, no longer really blog about Windows incident response topics with any sort of authoritative first-hand knowledge since I will no longer be helping to develop new incident response techniques or be doing incident response as my primary job.<span style="mso-spacerun: yes">&nbsp; </span>I’ve asked the PSS Security team not to give up on blogging and my hope is that they will create a team blog that all members can use to pick up where I am leaving off – if this happens – I will post the details and a referral URL here.<o:p></o:p></p> <p class="MsoNormal" style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></p> <p class="MsoNormal" style="MARGIN: 0in 0in 0pt">Going forward I am going to repurpose my blog and use it to talk about one of the most fascinating teams in Microsoft – the Secure Windows Initiative team.<span style="mso-spacerun: yes">&nbsp; </span>This team is responsible for one of the most important policies we have ever enforced – the Security Development Lifecycle - the development process by which all new products must go through.<span style="mso-spacerun: yes">&nbsp; </span>But what’s <i style="mso-bidi-font-style: normal">really</i> interesting is that this is the team within Microsoft that just about no one (externally) has heard about – yet they have some pretty unbelievably important tasks.<o:p></o:p></p> <p class="MsoNormal" style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></p> <p class="MsoNormal" style="MARGIN: 0in 0in 0pt">We have recently published a very lengthy and a surprisingly in-depth look into how we have been developing software over the last few years (although it is a process designed to be continually improved and thus this process has evolved since its conception).<o:p></o:p></p> <p class="MsoNormal" style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></p> <p class="MsoNormal" style="MARGIN: 0in 0in 0pt">Maintaining and enforcing the SDL is one of the core tasks of the SWI team, so without further adieu I give to you the SDL:<o:p></o:p></p> <p class="MsoNormal" style="MARGIN: 0in 0in 0pt"><span style="mso-spacerun: yes">&nbsp;</span><a href="http://msdn.microsoft.com/security/default.aspx?pull=/library/en-us/dnsecure/html/sdl.asp"></a><o:p></o:p></p> <p class="MsoNormal" style="MARGIN: 0in 0in 0pt"><span style="FONT-SIZE: 10pt; FONT-FAMILY: Arial"><a href="http://msdn.microsoft.com/security/sdl">http://msdn.microsoft.com/security/sdl</a></span><o:p></o:p></p> <p class="MsoNormal" style="MARGIN: 0in 0in 0pt"><o:p>&nbsp;</o:p></p><img src="http://blogs.technet.com/aggbug.aspx?PostID=401077" width="1" height="1">New Rootkit Revealer available!http://blogs.technet.com/robert_hensing/archive/2005/03/23/400934.aspxWed, 23 Mar 2005 14:52:00 GMTd5e57398-b9ef-4490-9955-07cbb4e4a80d:400934Robert_Hensing3http://blogs.technet.com/robert_hensing/comments/400934.aspxhttp://blogs.technet.com/robert_hensing/commentrss.aspx?PostID=400934<p>Sysinternals yesterday released a new version of Rootkit revealer after receiving feedback that people using rootkits were starting to add Rootkit Revealer to the 'root process' to continue to avoid detection.&nbsp; <br /><br />The new version uses a randomly named executable that runs as a service in order to avoid getting hooked by rootkits that can do simple file name matching - an approch that was discussed in one of my previous blog posts:</p> <p><a href="http://www.sysinternals.com/ntw2k/freeware/rootkitreveal.shtml">http://www.sysinternals.com/ntw2k/freeware/rootkitreveal.shtml</a></p><img src="http://blogs.technet.com/aggbug.aspx?PostID=400934" width="1" height="1">New weapon in the war - F-Secure reveals Blacklight - an anti-rootkit tool - try it today (remember to rename it <G>)http://blogs.technet.com/robert_hensing/archive/2005/03/10/392122.aspxThu, 10 Mar 2005 15:02:00 GMTd5e57398-b9ef-4490-9955-07cbb4e4a80d:392122Robert_Hensing4http://blogs.technet.com/robert_hensing/comments/392122.aspxhttp://blogs.technet.com/robert_hensing/commentrss.aspx?PostID=392122<p>F-Secure has finally taken the wraps off a new anti-rootkit tool they call Blacklight (I dig the name):</p> <p><a href="http://www.f-secure.com/blacklight/try.shtml">http://www.f-secure.com/blacklight/try.shtml</a></p> <p>It seems to do a file system scan and may employ a similar technique to that of Rootkit Revealer and the Ghostbuster tools created by Microsoft Research.</p><img src="http://blogs.technet.com/aggbug.aspx?PostID=392122" width="1" height="1">Rootkit Revealer vs. Hacker Defender - How the miscreants are defeating Rootkit Revealer and how to fight backhttp://blogs.technet.com/robert_hensing/archive/2005/03/10/392092.aspxThu, 10 Mar 2005 14:36:00 GMTd5e57398-b9ef-4490-9955-07cbb4e4a80d:392092Robert_Hensing26http://blogs.technet.com/robert_hensing/comments/392092.aspxhttp://blogs.technet.com/robert_hensing/commentrss.aspx?PostID=392092<p>So over the last week we've started to get cases where Rootkit Revealer (having been downloaded by the customer) is not detecting any hidden files / folders / registry entries on the customers machine; yet our own rootkit tools we supply with our IR toolkit come back with hidden files / folders etc. and have no problem detecting evidence of a rootkit.&nbsp; Why the discrepancy?&nbsp; After all Mark's tool works very similairly to some of ours which have worked fine for years&nbsp;. . . </p> <p>We decided to investigate and collected some specimens and it turns out that Rootkit Revealer is rather easy to defeat if you're using the Hacker Defender rootkit.</p> <p><strong>Background:</strong><br />The Hacker Defender rootkit supports configuration through an INI file.&nbsp; The INI file has numerous sections in it that govern the behavior and operation of the rootkit / backdoor (just like a normal INI file would) and one of the sections that the miscreant can configure is entitled [Root Processes].&nbsp; Here's an explanation from the readme file that comes with the rootkit:</p> <p><br /><em>Root Processes is a list of programs which will be immune against <br />infection. You can see hidden files, directories and programs only with these <br />root programs. So, root processes are for rootkit admins. To be mentioned in <br />Root Processes doesn't mean you're hidden. It is possible to have root process<br />which is not hidden and vice versa.</em></p> <p>Here's the default settings for this part of the .INI file:<br />[Root Processes]<br />hxdef*<br />rcmd.exe</p> <p>Here's how Hacker Defender (hxdef) works.&nbsp; When the main .EXE is run - a device driver is&nbsp;extracted and&nbsp;code is subsequently&nbsp;injected into all running processes on the machine and the various user mode Win32 API's listed in the readme file are then patched / hooked / detoured over to the rootkits code so that filtering can be performed etc.&nbsp; Root processes are immune to this however; when they start, they do not get hooked in any way - so they can 'see' all that would normally be hidden by the rootkit.&nbsp; The miscreants of course are all too familair with the operation of hxdef (I stand by my assertion that this is by far the most popular 'in the wild' rootkit with the biggest installed user base) and many seem to have added 'rootkitrevealer.exe' to the Root Processes section of the .INI file.&nbsp; Since rootkitrevealer.exe is a root process; it can see all the files / folders / registry entries that hacker defender is hiding and thus it does not flag them as hidden.</p> <p>This is just another great example of the arms race we are locked in with the miscreants (some call it a cat and mouse game - but that's far too innocent; I personally am at war with the miscreants and this is my arms race).</p> <p><strong>Advice:</strong>&nbsp; If you're going to download and run Rootkit Revealer (and I encourage you to) - make sure you rename the .EXE to something unique, be creative.&nbsp; If you need a random file name use the random number generate from <a href="http://www.random.org">www.random.org</a> or something like that and make the file name long and random.&nbsp; You'll have much better success - until the miscreants counter this move and fire back with something more technically advanced.</p><img src="http://blogs.technet.com/aggbug.aspx?PostID=392092" width="1" height="1">Rootkits - revealed!http://blogs.technet.com/robert_hensing/archive/2005/02/22/378371.aspxTue, 22 Feb 2005 22:34:00 GMTd5e57398-b9ef-4490-9955-07cbb4e4a80d:378371Robert_Hensing1http://blogs.technet.com/robert_hensing/comments/378371.aspxhttp://blogs.technet.com/robert_hensing/commentrss.aspx?PostID=378371<p>Well what do you know - that day that I was talking about in my previous post?&nbsp; It was today:<br /><a href="http://www.sysinternals.com/ntw2k/freeware/rootkitreveal.shtml">http://www.sysinternals.com/ntw2k/freeware/rootkitreveal.shtml</a></p> <p>Make sure you check out the MSR site in the coming days / weeks (hoping that by saying it like that it will happen today as well).</p><img src="http://blogs.technet.com/aggbug.aspx?PostID=378371" width="1" height="1">Wormbotdoorkit? Kitbotwormdoor? Trojwormrootbot? Malware by any other name . . . 2005 - the year of the rootkit?http://blogs.technet.com/robert_hensing/archive/2005/02/22/378363.aspxTue, 22 Feb 2005 22:24:00 GMTd5e57398-b9ef-4490-9955-07cbb4e4a80d:378363Robert_Hensing17http://blogs.technet.com/robert_hensing/comments/378363.aspxhttp://blogs.technet.com/robert_hensing/commentrss.aspx?PostID=378363<p><font color="#ff0000">Edited 2/25/2005 to&nbsp;examine the multiple definitions&nbsp;of the word 'rootkit', added information on a LUA-friendly rootkit for the LUA folks to ponder (LUA - Limitted User Account), and added some thoughts on how they could mess with AV software. :)</font></p> <p>So this is a post I meant to make ages ago but a shiny object flew by my window and I forgot to post it.&nbsp; I'd like to take a second to talk about the sad state of affairs when it comes to the way we in the security and incident response community talk about malware.&nbsp; There is so much malware in the world with so many different attributes and properties and I often find myself thinking I'm talking to someone about a 'rootkit' and they are really talking about a 'backdoor server' OR&nbsp;they will be talking to ME about a 'rootkit' but their definition of a rootkit isn't the same as mine and after a few minutes of initial confusion we have to fall back and re-negotiate our communications session and derive some mutually agreed upon definitions. :)&nbsp; At the end of this post I'm also going to make some observations about the ubiquity of malware we refer too as 'rootkits' and I will even make some predictions about the inevitable demise (of current rootkits) and rebirth - all to take place in the year 2005. :)&nbsp; Intrigued?&nbsp; Read on . . . <?xml:namespace prefix = o ns = "urn:schemas-microsoft-com:office:office" /><o:p></o:p></p> <p>In this blog post I'm going to attempt to define some different categories of malware that people can / should use when speaking to me about malware - because they are the ones I use.&nbsp; If you have better, more industry accepted definitions - feel free to post them as a comment in my blog.<o:p></o:p></p> <p>Okay - so lets get started . . . I'm not going to give definitions for worms or viruses as these are both fairly well understood and well defined.<o:p></o:p></p> <p><strong>Malware</strong>:&nbsp; Malware is a subset of all software that was written for malicious purposes or behaves maliciously.&nbsp; Some examples of this are exploit tools (programs designed to exploit vulnerabilities), backdoor servers, rootkits, spreaders/auto-rooters, worms, viruses, some spyware and some ad-ware (more on this later) etc.&nbsp; Some software that I do not consider to be malware would be things like network scanners / mappers, commonly used FTP servers, popular remote control software, etc.&nbsp; These might fall into a 'grey' category of 'Potentially Unwanted Software' but probably should not be classified as 'malware'.<o:p></o:p></p> <p><strong>Exploit / 'sploit / exploit tool</strong>:&nbsp; Malware designed to exploit a software vulnerability for the purpose of gaining unauthorized remote access to a machine (usually) by targeting a service listening on a port with elevated privileges.&nbsp; These tools can also be designed to gain local elevation of privilege as well however by exploiting a vulnerability in the OS.<o:p></o:p></p> <p><strong>Backdoors</strong>:&nbsp; Backdoors are software that allows remote unauthorized access to a machine.&nbsp; Backdoors can either bind to a new dedicated port or they can share a port with another process by hijacking the winsock stack in that process.&nbsp; Backdoors can wait for inbound connections or they can shovel a shell out of your network to the domain name / IP address of the attacker’s choice.&nbsp; The backdoor can be implemented in the kernel as part of a device driver, or in usermode as a DLL or an EXE.&nbsp; Backdoors can load via ASEP's (auto-start entry points) in the registry (there are easily dozens of ways for this to happen) or they can modify a binary on the disk and piggyback off the loading of that binary (i.e. the winlogon modification I blogged about earlier).<o:p></o:p></p> <p><strong>Spreaders</strong>:&nbsp; Spreaders are tools used to 'spread' malware and potentially unwanted software to vulnerable machines.&nbsp; Spreaders can be multi-threaded and usually take a range of IP addresses as input and produce a range of compromises hosts as output by leveraging the latest exploit du jur.&nbsp; A spreader will typically just attempt a connection to the vulnerable port on a remote host, perform the exploit and then attempt to insert and run the shellcode of the attackers choice (the most commonly used shellcode these days seems to fetch a file from a remote URL using HTTP and save it to the local disk and then run the process).&nbsp; These are also sometimes called 'auto-rooters'.<o:p></o:p></p> <p><strong>Bots</strong>:&nbsp; Bots are software that can spread to other machines (like a worm) using either weak or easily guessed admin passwords or a variety of remotely exploitable vulnerabilities (as the list of remotely exploitable vulnerabilities found in Windows grows - so too does the number of ways bots are getting on machines).&nbsp; Bots will typically drop either a backdoor server component or an IRC client which can facilitate remote control through outbound connection to an IRC server.&nbsp; Bots can either propagate autonomously or at the behest of the person controlling the 'botnet' (collective network of bots).&nbsp; Bots are one of the most critical threats to an enterprise due to the speed at which they can tear through a corporate network - especially if a domain admin logs in to a machine infected with a bot (now the bot can propagate with domain admin credentials to all machines in the domain).&nbsp; Detection and clean-up are usually non-trivial and result in significant downtime.&nbsp; Bot's are a pain in the ass but we've been very lucky that to date - they haven't been all that sophisticated about hiding from admins using stealth techniques / rootkit technology (keep reading).<o:p></o:p></p> <p><strong>Trojan</strong>:&nbsp; This is an interesting term as you don't usually hear 'trojan' by itself when referring to software / malware - you usually&nbsp;hear 'backdoor trojan' uttered collectively i.e. both words spoken together referring to one thing.&nbsp; I am officially deprecating this term with my blog post because I hate it. :)&nbsp; I don't like it. I think it’s ridiculous.&nbsp; When I hear 'backdoor trojan' used by people, they are *really* just describing software that acts as a backdoor.&nbsp; Great so drop the word 'trojan' from what you just said since it only confuses people like me.&nbsp; Trojan implies 'trojan horse' which when applied to software would probably have to mean 'software disguised as something it is <em>not</em> so that when a user 'opens' it, they receive something they were not expecting' (or something).&nbsp; If that is true - backdoor functionality is only one of *many* payloads that could be delivered via a modern day trojan horse program - and thus referring to a 'backdoor' as a 'trojan' is very imprecise if not just flat-out wrong.&nbsp; If anything the word 'trojan' refers to a 'delivery vehicle' which itself is almost un-interesting (at least to me) for anything other than root cause analysis (i.e. determining how you got hacked).<o:p></o:p></p> <p><strong>Rootkits</strong>:&nbsp; Alas - we have arrived at the most hotly debated (IMHO) definition.&nbsp; The term 'rootkit' has been around probably longer than Windows and they are a unique and interesting class of malware.&nbsp; It is my understanding that the term originated 'back in the day' for the Unix platform and when applied to that platform the term means 'a collection or 'kit' of tools used to obtain OR maintain root access' (there is some debate in the community whether rootkits are used to obtain root access or to simply prolong root access by employing stealth techniques).&nbsp; The definition seems to be&nbsp;repurposed or updated every few years so depending on when you last checked your definition may not be current. :)&nbsp; The two schools of thought on definition of a rootkit seem to center around <em>obtaining</em> 'root' privileges vs. <em>maintaining</em> 'root' privileges.</p> <p>If you subscribe to the theory that rootkits were used for elevating privileges (obtaining root), then rootkits for Unix almost always implied EoP via exploitation of some vulnerability and part of the kit may have included a 'trojaned' copy of common system tools that provided stealth to avoid detection by the system admin after root was obtained to maintain root access as well.&nbsp; </p> <p>Rootkits for Windows have been slowly gaining in popularity for almost a decade now but this class of software on the Windows platform has evolved to the point of being fairly different (in its implementation)&nbsp;from its Unix brethren - yet the same general name is used and this greatly confuses people with experience with rootkits on both platforms.&nbsp; So let’s break down the Unix 'obtain root' definition of a&nbsp;rootkit into its sub-categories.&nbsp; You have three distinct behaviors in the 'kit' or collection of software.&nbsp; First you have the elevation of privilege - this would be accomplished by an 'exploit tool' on the Windows platform.&nbsp; Next the kit will usually seek to establish permanent access to the machine - this may be accomplished by installing a backdoor on the Windows platform.&nbsp; Finally the kit may seek to hide the presence of the backdoor using stealth techniques and this was traditionally carried out by 'trojaning' a system binary like netstat or 'ps' but trojaning of system binaries on Windows almost never occurs (may believe becuase of closed source and WFP).&nbsp; These three distinct functionalities may have been traditionally referred to as the 'rootkit' (as stated - some people&nbsp;do not believe rootkits are used to elevate priv's to root, some people&nbsp;do)&nbsp;but on Windows typically the word 'rootkit' is used to discuss a specific sub-set of malware that provides stealth functionality i.e. the ability to hide stuff and nothing more (i.e. the third functionality mentioned above).&nbsp; </p> <p>On Windows an exploit tool is usually used to gain remote access to the machine, the shellcode is then run in the context of the exploited process and is used to download a backdoor server / component to the compromised machine and then run it (typically from an HTTP site which itself may be compromised).&nbsp; In addition to the backdoor a piece of software known as a 'rootkit' may also be downloaded to the machine&nbsp;for the sole purpose of hiding the backdoor and any other&nbsp;tools uploaded to the server by the remote attacker.&nbsp; So the most basic definition of a rootkit for Windows is a piece of software designed to hide other software.&nbsp; An automated intrusion (using a spreader and a backdoor server downloaded to the compromised Windows host by the spreader) need not involve the use of a rootkit (a different piece of malware used to hide the backdoor).<o:p></o:p></p> <p><strong>Properties of rootkits for Windows</strong><o:p></o:p></p> <p>Soo . . . some people feel that rootkits on Unix / Linux are a collection of tools&nbsp;designed to elevate privileges and setup backdoors in automated fashion whereas others maintain that they are more like&nbsp;rootkits for Windows as noted - and that they just hide stuff and do <em>NOT</em> facilitate elevation of privilege (thus making the name imply that it's more about 'maintaining' root vs. elevating to root).&nbsp; In fact for a rootkit on Windows to work <em>fully</em> (providing hiding / stealth for <em>all</em> users of the system)&nbsp;- it must be installed by an administrator or from a process with administrator or SYSTEM&nbsp;privileges but the rootkit itself does not&nbsp;provide for exploitation - only hiding.&nbsp; In other words - you have to have already compromised the security of the box (or tricked a user into running one) before installing any of&nbsp;today’s rootkits as they all require privileges to do things that&nbsp;only administrators have (if they want to hide truly effectively from all users / tools).&nbsp;&nbsp;</p> <p>For&nbsp;all the users out there running as a LUA (limitted user account) who feel 'safer' having read that rootkits require Admin or SYSTEM rights to work properly; have no fear - there is a rootkit (<a href="http://www.phrack.org/show.php?p=62&amp;a=12">NTIllusion</a>) that works just fine as a regular user account (but would provide stealth only for processes running in the context of that user).</p> <p>The 'stuff' they hide can be anything - you can hide a file, a folder, a user account, a group, a process, a port, a registry entry, a network connection or all of the above and the hiding is traditionally done without any modification to the tools used to enumerate this information (i.e. the binary on the disk is left un-modified).&nbsp; Anything you can think of as a security practitioner that you might examine to find evidence of a compromise can be hidden by an advanced rootkit.&nbsp; Rootkits range from the very simple process hiding rootkits (early examples of the FU rootkit simply took a PID to hide and didn't hide any files or folders or registry entries etc.) to the very . . . feature complete rootkits like Hacker Defender and YYT_HAC rootkits which can hide just about everything AND come bundled with built-in backdoor servers (negating the need for a separate backdoor to be hidden).<o:p></o:p></p> <p>And now we have arrived at the quandary that people face when trying to discuss malware like Hacker Defender or the YYT_HAC rootkit.<o:p></o:p></p> <p>Are these rootkits?&nbsp; Yes - using the modern Windows-specific version of the definition - it hides / stealth’s stuff - but it&nbsp;was <em>not</em> the software actually used to compromise the host (i.e. it's not an exploit and does not elevate privileges).<o:p></o:p></p> <p>Is it a backdoor?&nbsp; Yes - these rootkits contain a backdoor server component and also come with a special backdoor client that can be used to communicate with the backdoor server.<o:p></o:p></p> <p>Could a rootkit like this be dropped by a self-propagating or propagate-on-demand bot?&nbsp; Yes - this malware or the technology employed by this malware could easily be picked up by the next version of Agobot/Gaobot/Phatbot/Polybot/Sdbot/Rbot/Spybot families of malware.&nbsp; Here's a thought - what if this rootkit got on your machine before the AV vendor updated their signatures and then hid the directory the signatures come down in?&nbsp; Would the AV software still work and be able to detect anything?&nbsp; Most likely not - not if it can't find the signatures being hidden by the rootkit - something to ponder.</p> <p>What would you call a bot that installed a backdoor server that was stealthed by a rootkit?&nbsp; Is it a botdoorkit?&nbsp; A doorbotkit?<o:p></o:p></p> <p>I don't have a particular desire, nor do I see a particular need to be able to quickly summarize complex malware in one easy to consume 'buzzword' which is what I feel people often try to do.&nbsp; Malware is getting increasingly more full-featured and increasingly more complex and I think it's time we stop trying to classify what is obviously a collection of independently developed 'malware' (i.e. programs developed by different groups of people for different purposes with different functionality) being dropped onto compromised hosts using a single word like 'backdoor' or 'trojan' and instead we should focus on the attributes and properties of the pieces of malware we have identified on the system and refer to them based on their functionality - but before we do that, we must first agree on what it is we're talking about and thus my proposed definitions above.<o:p></o:p></p> <p>And finally - I predict that 2005 will be the year the Windows 'rootkit' finally goes 'mainstream' . . . in that I mean more people than ever (including the mass media) will be exposed to the term this year (we already exposed the&nbsp;media to this threat at RSA a couple weeks ago)&nbsp;and we will start to see rootkit stealthing technology and techniques picked up by ever increasing amounts of potentially un-wanted software and ad-ware /spyware in an effort to combat increasingly more effective antivirus and antispyware software.&nbsp; <o:p></o:p></p> <p>Think I'm wrong?&nbsp; It's already happening - you just may not be aware of it:<br />894278 You receive a Stop 0x00000050 error on a blue screen<br /><a href="http://support.microsoft.com/?id=894278">http://support.microsoft.com/?id=894278</a><o:p></o:p></p> <p>Think about it - Spyware/Adware is the new 'spam'.&nbsp; It's the new billion-dollar industry being used by sophisticated crime rings to make money - do you really expect them to just go down without a fight?&nbsp; Especially when it's so easy to hide using rootkit technology?&nbsp; Especially when spam is becoming less and less profitable as people become better and better at fighting it?<o:p></o:p></p> <p>I also predict that if rootkits are are the Windows equivalent of 'the world that has been pulled over your eyes' (to quote Morpheus)&nbsp;that 2005 will be the year the Matrix gets reloaded. :)&nbsp; Why do I say that?&nbsp; Very smart people have developed very effective tools - tools that can be used to expose rootkits and the processes, files and folders that they hide and 2005 will be the year these tools go mainstream.&nbsp; <o:p></o:p></p> <p>Think I'm wrong?&nbsp; It's already happening - you just may not be aware of it:<br /><a href="http://research.microsoft.com/rootkit/">http://research.microsoft.com/rootkit/</a><o:p></o:p></p> <p>Check that site periodically in the coming weeks / months - we <em>are</em> fighting back!<o:p></o:p></p> <p>And it's not just Microsoft preparing to release kick-ass anti-rootkit tools - there will be more - this year.&nbsp; You can count on it.&nbsp; I will of course update this blog when I hear about new anti-rootkit tool releases.<o:p></o:p></p> <p>This unequivocal defeat of the hiding techniques employed by&nbsp;the most popular&nbsp;rootkits will force the miscreants back to the drawing boards this year (actually they never sit still and are always working on new techniques and they already exist but we just haven't forced them into using them widely yet)&nbsp;and they <em>will</em> come up with new hiding techniques (or use the ones already well known) - and the game will continue - culminating in an eventual reloading of the Matrix. :)<o:p></o:p></p> <p>Signed<o:p></o:p></p> <p>- The Previous One</p><img src="http://blogs.technet.com/aggbug.aspx?PostID=378363" width="1" height="1">Microsoft does 733t speak . . . it's like an SNL skit - only funnier.http://blogs.technet.com/robert_hensing/archive/2005/02/18/376094.aspxFri, 18 Feb 2005 15:22:00 GMTd5e57398-b9ef-4490-9955-07cbb4e4a80d:376094Robert_Hensing12http://blogs.technet.com/robert_hensing/comments/376094.aspxhttp://blogs.technet.com/robert_hensing/commentrss.aspx?PostID=376094So yesterday this hilarious URL probably arrived in your inbox via your own personal friend network - and if it didn't, allow me to share it with you now (it's almost as entertaining as the <a href="http://www.wired.com/news/culture/0,1284,59757,00.html">Star Wars Kid</a>):<br /><font size="2"> <p></font><a href="http://www.microsoft.com/athome/security/children/kidtalk.mspx"><u><font color="#0000ff">http://www.microsoft.com/athome/security/children/kidtalk.mspx</u></font></a></p> <p>So this was tossed about on a Microsoft security MVP mailing list and it elicited this hilarious reply from a security MVP:</p><font size="2"> <blockquote dir="ltr" style="MARGIN-RIGHT: 0px"> <p><font size="3">... I just felt a disturbance in the force, as if millions of kiddies yelled out in embarrassment as their parents tried to talk leet to them...</font></p> <p><font size="3">M0M [133t!]: d00d, did j00 |-|4/\3 phun 4t sk00l t0d4yz? $c13nc3 is teh r0x0rs, w00t! D4D 4nd I R g0ing 0ut ToNiGHT, g0nn4 sh0z /\/\y m4d sk1llz. Th3r3's ph00d in da phridg3.</font></p> <p><font size="3">Son: I'm so embarrassed. Never talk that way again, please</font>.</p></blockquote> <p dir="ltr"><font size="3">Maybe it's just me but I thought that was funny as hell and wanted to share Michael's reply with the world via my blog. :)<br />Shared with permission from Michael: </font><a href="http://www.atrevido.net"><u><font color="#0000ff"><font size="3">www.atrevido.net</font></u></font></a></p></font><img src="http://blogs.technet.com/aggbug.aspx?PostID=376094" width="1" height="1">The MSRC @ RSA - the webspacehttp://blogs.technet.com/robert_hensing/archive/2005/02/17/375661.aspxThu, 17 Feb 2005 22:27:00 GMTd5e57398-b9ef-4490-9955-07cbb4e4a80d:375661Robert_Hensing5http://blogs.technet.com/robert_hensing/comments/375661.aspxhttp://blogs.technet.com/robert_hensing/commentrss.aspx?PostID=375661<p>Wow - this is really really cool.&nbsp; <br />So . . .&nbsp;select members of the MSRC are off at RSA this week doing BOOTH duty and talking to our customers and then blogging about the days events in an MSN web space - check it out!</p> <p><a href="http://spaces.msn.com/members/msrc/PersonalSpace.aspx">http://spaces.msn.com/members/msrc/PersonalSpace.aspx</a></p> <p>Kevin Kean, "Stepto", Simon Conant, Debby Fry Wilson - all the big names (well, except for Simon) are there and a blogin'!<br />If you have a few minutes - it's an interesting insight into the world of booth duty at a sufficiently large conferrence (I've done booth duty at TechEd&nbsp;a couple times and it's harder work than you'd think).</p> <p>P.S. - I am actually not at RSA this week - but thanks for asking the MSRC folks if I'm around - it lets them know that they really <em>should</em> be paying my way to these events in the future and gives me ammo when I ask ("well, you know - our customers are asking for this . . ."). :)</p><img src="http://blogs.technet.com/aggbug.aspx?PostID=375661" width="1" height="1">Windows Server 2003 spanks Red Hat's monkey?http://blogs.technet.com/robert_hensing/archive/2005/02/17/375481.aspxThu, 17 Feb 2005 18:46:00 GMTd5e57398-b9ef-4490-9955-07cbb4e4a80d:375481Robert_Hensing30http://blogs.technet.com/robert_hensing/comments/375481.aspxhttp://blogs.technet.com/robert_hensing/commentrss.aspx?PostID=375481<p>Interesting information from RSA, it's nice to see someone other than me notice the pure creamy goodness of WS2003 for once (I've noticed it from the incident response side of things by noting&nbsp;a marked absence of WS2003 hacking cases over the last 2 years as compared to Windows 2000).</p> <p><a href="http://www.linuxinsider.com/alert/40697.html">http://www.linuxinsider.com/alert/40697.html</a></p> <p>Why am I not surprised by their findings?&nbsp; <br />Simple - I've been slowly biding my time as the WS2003 OS matures watching the bug counts in our OS and those of our competitors month by&nbsp;month using an independant site like Secunia - anyone who's been doing this already knows that there are dramatically more bugs discovered and fixed by our open source competitor which in my mind does not seem to indiciate any superior secure coding kung-fu being employed on their part (or that the 'many eyes' approach is indeed contributing to provably more secure code).<br /></p> <p>Here are the stats from Secunia - an organization not affiliated with Microsoft b.t.w. :)<br /><strong>Windows Server 2003 Enterprise Edition</strong><br /><a href="http://secunia.com/product/1174/">http://secunia.com/product/1174/</a><br />44 advisories since June of 2003, 11% un-patched right now, 0% extremely critical, 45% highly critical,&nbsp;59% exploitable 'from remote'.<br />Looking at the two un-patched ones, one is an HTML help vuln from 2003 - so I am betting that is a mistake and another is a minor information disclosure bug - obviously we have work to do still and we are doing it.<br /><br /><strong>Red Hat Enterprise Linux ES 3.0</strong><br /><a href="http://secunia.com/product/2535/">http://secunia.com/product/2535/</a><br />136 advisories, since NOVEMBER of 2004, 0% un-patched right now (I wonder if that includes all the latest <a href="http://secunia.com/advisories/14295/">slew of&nbsp;Linux kernel vulnerabilities</a> reported in the last day or so) 1% extremely critical, 24% highly critical, 66% exploitable 'from remote'.</p> <p>We are by no means perfect, and we still have a loooooooong way to go, but the journey has at least started and as the first batch of products to go through our secure development lifecycle start to withstand the test of time - it is really no surprise to me to see that our focus on&nbsp;building secure products first and foremost is starting to pay off in terms of better quality software with fewer and less damaging vulnerabilities.</p><img src="http://blogs.technet.com/aggbug.aspx?PostID=375481" width="1" height="1">Introducing Tim 'The tool man' Rains - PSS Security Techlead, fellow blogger, maintainer of WOLFv2http://blogs.technet.com/robert_hensing/archive/2005/02/07/368512.aspxMon, 07 Feb 2005 17:16:00 GMTd5e57398-b9ef-4490-9955-07cbb4e4a80d:368512Robert_Hensing10http://blogs.technet.com/robert_hensing/comments/368512.aspxhttp://blogs.technet.com/robert_hensing/commentrss.aspx?PostID=368512<p>Folks it just occured to me that I haven't formally introduced you to a colleague of mine, Tim Rains.<br />Tim Rains is also a tech-lead on the PSS Security team and is an avid C++ coder (un-like me who despises the language).&nbsp; <br /><br />In fact Tim has a long and distinguished track record of writing a number of useful utilities over the years (some even more well known than my Autodump+ vbscript! &lt;G&gt;) many of which are used every day by PSS and some of which are used every day by PSS Security.</p> <p>He has recently released a new tool to the web - Promqry (we've gotta work on his tool name creativity).&nbsp; <br />You can read more about it here:<br /><a href="http://www.entmag.com/news/article.asp?EditorialsID=6557"><u><font color="#0000ff">http://www.entmag.com/news/article.asp?EditorialsID=6557</u></font></a></p><font size="3"> <p>Tim also maintains his own blog located here that I highly recommend checking out:<br /><a href="http://blogs.msdn.com/tim_rains/"><u><font color="#0000ff">http://blogs.msdn.com/tim_rains/</u></font></a><font size="2"> </font></p> <p><font size="2"><font size="3">In the future I'm going to try and get the other tech-leads on the PSS Security team to publish informative posts like the ones I have done on recent interesting hacking cases we've been involved in so that I do not become a single point of failure in the sharing process. :)&nbsp; Maybe I can convince them to start a dedicated PSS Security blog that anyone from the team can post to . . . hmmmm.</font></font></p> <p><font size="2"><font size="3">Tim is currently in the process of taking WOLF (Windows Online Forensics - our live response toolkit that we use to collect data from&nbsp;customers systems) to the next level with numerous improvements that only moving to compiled code can give you (it will no longer be a batch file).</font></font></p> <p>As a finaly FYI before you ask - no, WOLF is not available for public download for many reasons.&nbsp; One of the better reasons is that we redistribute numerous 3rd party tools (with permission of course) and per the terms of our licensing agreement we are allowed to send WOLF to customers on an as-needed basis but we are not allowed to post WOLF for public download.&nbsp; As we continue to improve the data collection piece of our incident response process this may change in the future but right now we are not allowed to distribute WOLF broadly or post it for public download - sorry.<font size="2"></p></font></font><img src="http://blogs.technet.com/aggbug.aspx?PostID=368512" width="1" height="1">WOLF sizes up the MySQL bot / worm / spreader thing . . . a live system perspectivehttp://blogs.technet.com/robert_hensing/archive/2005/01/28/362175.aspxFri, 28 Jan 2005 05:31:00 GMTd5e57398-b9ef-4490-9955-07cbb4e4a80d:362175Robert_Hensing11http://blogs.technet.com/robert_hensing/comments/362175.aspxhttp://blogs.technet.com/robert_hensing/commentrss.aspx?PostID=362175<p>So it seems that there is a new MySQL bot that is spreading to Windows machines running MySQL with weak SA (or whatever MySQL's equivalent is)&nbsp;passwords.</p> <p>You can read more about it here <a href="http://news.zdnet.com/2100-1009_22-5553570.html">http://news.zdnet.com/2100-1009_22-5553570.html</a>&nbsp;and here: <a href="http://isc.sans.org//diary.php?date=2005-01-27">http://isc.sans.org//diary.php?date=2005-01-27</a></p> <p>This is all great information on how the bot gets on the system - but let's have a look at what it does once it's on the system through the eyes of WOLF. :)<br />I got this data from a customer who was running MySQL on an XP SP2 machine.&nbsp; They had configured the XP SP2 firewall with an exception to allow the MySQL service (among others) to receive packets from all networks.</p> <p> <hr id="null" /> </p> <p>I didn't really have any leads when I started looking at the .CAB file so I checked for the presence of any new or suspicious services that have been installed and I found some:</p> <blockquote dir="ltr" style="MARGIN-RIGHT: 0px"> <p><font size="2">Copied from Services:</font></p> <p><font size="2">Event Monitor&nbsp; -&nbsp; [stopped]<br />&nbsp;&nbsp;&nbsp; Disabled<br />&nbsp;&nbsp;&nbsp; LocalSystem<br />&nbsp;&nbsp;&nbsp; \"C:\WINDOWS\system32\spoolcll.exe\" -netsvcs<br />&nbsp;&nbsp;&nbsp; </font></p> <p><font size="2">Copied from Services:</font></p> <p><font size="2">rpcservice&nbsp; -&nbsp; [running]<br />&nbsp;&nbsp;&nbsp; Automatic<br />&nbsp;&nbsp;&nbsp; LocalSystem<br />&nbsp;&nbsp;&nbsp; C:\WINDOWS\system32\rpccontrol.exe<br />&nbsp;&nbsp;&nbsp; rpccontrol service</font></p></blockquote> <p> <hr id="null" /> </p> <p>Next I&nbsp;get the MAC times for 'spoolcll.exe':</p> <blockquote dir="ltr" style="MARGIN-RIGHT: 0px"> <p><font size="2">Copied from: Search Results for: spoolcll<br />==========================<br />Files containing instances of 'spoolcll'</font></p> <p><font size="2">Number of Files Searched: 10<br />Time to Search Files: 11 seconds</font></p> <p><font size="2">dir_creation_time_C_drive.txt<br />====================<br />&nbsp;&nbsp;&nbsp; Directory of c:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\4TCVEXMH<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 01/26/2005&nbsp; 08:57a&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 166,912 spoolc~1.exe&nbsp;&nbsp;&nbsp; spoolcll[1].exe</font></p> <p><font size="2">&nbsp;&nbsp;&nbsp; Directory of c:\WINDOWS\Prefetch<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 01/26/2005&nbsp; 01:56p&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 9,110 spoolc~1.pf&nbsp;&nbsp;&nbsp;&nbsp; spoolcll.exe-06e977be.pf</font></p> <p><font size="2">&nbsp;&nbsp;&nbsp; Directory of c:\WINDOWS\system32<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 01/26/2005&nbsp; 08:57a&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 166,912&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; spoolcll.exe</font></p> <p><br /><font size="2">dir_last_access_time_C_drive.txt<br />====================<br />&nbsp;&nbsp;&nbsp; Directory of c:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\4TCVEXMH<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 01/26/2005&nbsp; 03:50p&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 166,912 spoolc~1.exe&nbsp;&nbsp;&nbsp; spoolcll[1].exe</font></p> <p><font size="2">&nbsp;&nbsp;&nbsp; Directory of c:\WINDOWS\Prefetch<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 01/26/2005&nbsp; 04:43p&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 9,110 spoolc~1.pf&nbsp;&nbsp;&nbsp;&nbsp; spoolcll.exe-06e977be.pf</font></p> <p><font size="2">&nbsp;&nbsp;&nbsp; Directory of c:\WINDOWS\system32<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 01/26/2005&nbsp; 04:33p&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 166,912&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; spoolcll.exe</font></p> <p><br /><font size="2">dir_last_write_time_C_drive.txt<br />====================<br />&nbsp;&nbsp;&nbsp; Directory of c:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\4TCVEXMH<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 01/26/2005&nbsp; 08:57a&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 166,912 spoolc~1.exe&nbsp;&nbsp;&nbsp; spoolcll[1].exe</font></p> <p><font size="2">&nbsp;&nbsp;&nbsp; Directory of c:\WINDOWS\Prefetch<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 01/26/2005&nbsp; 01:56p&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 9,110 spoolc~1.pf&nbsp;&nbsp;&nbsp;&nbsp; spoolcll.exe-06e977be.pf</font></p> <p><font size="2">&nbsp;&nbsp;&nbsp; Directory of c:\WINDOWS\system32<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 01/26/2005&nbsp; 08:57a&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 166,912&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; spoolcll.exe</font></p></blockquote> <p>We have all kinds of useful information from this search.</p> <ol> <li>We know approximately when this file was dropped and we can start looking for other files dropped around the same time (~9am yesterday)</li> <li>It appears as if the file was&nbsp;dropped into the TIF (Temporary Internet Files) folder using the 'LocalService' user account (a built-in low privilege account).</li> <li>The files were then probably copied to SYSTEM32 and then run later after a reboot and cached via the prefetch directory.</li></ol> <p> <hr id="null" /> </p> <p>Next I&nbsp;get the MAC times for 'rpccontrol.exe':</p> <blockquote dir="ltr" style="MARGIN-RIGHT: 0px"> <p><font size="2">Copied from: Search Results for: rpccontrol<br />==========================<br />Files containing instances of 'rpccontrol'</font></p> <p><font size="2">Number of Files Searched: 10<br />Time to Search Files: 4 seconds</font></p> <p><font size="2">dir_creation_time_C_drive.txt<br />====================<br />&nbsp;&nbsp;&nbsp; Directory of c:\WINDOWS\Prefetch<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 01/26/2005&nbsp; 02:11p&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 8,306 rpccon~1.pf&nbsp;&nbsp;&nbsp;&nbsp; rpccontrol.exe-348acdff.pf</font></p> <p><font size="2">&nbsp;&nbsp;&nbsp; Directory of c:\WINDOWS\system32<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 01/26/2005&nbsp; 09:01a&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 574,976 rpccon~1.exe&nbsp;&nbsp;&nbsp; rpccontrol.exe</font></p> <p><br /><font size="2">dir_last_access_time_C_drive.txt<br />====================<br />&nbsp;&nbsp;&nbsp; Directory of c:\WINDOWS\Prefetch<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 01/26/2005&nbsp; 04:43p&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 8,306 rpccon~1.pf&nbsp;&nbsp;&nbsp;&nbsp; rpccontrol.exe-348acdff.pf</font></p> <p><font size="2">&nbsp;&nbsp;&nbsp; Directory of c:\WINDOWS\system32<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 01/26/2005&nbsp; 04:49p&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 574,976 rpccon~1.exe&nbsp;&nbsp;&nbsp; rpccontrol.exe</font></p> <p><br /><font size="2">dir_last_write_time_C_drive.txt<br />====================<br />&nbsp;&nbsp;&nbsp; Directory of c:\WINDOWS\Prefetch<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 01/26/2005&nbsp; 02:11p&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 8,306 rpccon~1.pf&nbsp;&nbsp;&nbsp;&nbsp; rpccontrol.exe-348acdff.pf</font></p> <p><font size="2">&nbsp;&nbsp;&nbsp; Directory of c:\WINDOWS\system32<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 09/10/2004&nbsp; 08:00p&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 574,976 rpccon~1.exe&nbsp;&nbsp;&nbsp; rpccontrol.exe</font></p></blockquote> <p>Wow - same deal, dropped in the TIF and then copied to SYSTEM32 at the same time (roughly).</p> <p> <hr id="null" /> </p> <p>Now I have a date / time I'm interested in looking at so we go to Date View for the gory details.</p> <blockquote dir="ltr" style="MARGIN-RIGHT: 0px"> <p><font size="2">Copied from: Date View<br />==========================<br />2005-01-26&nbsp;&nbsp; 08:57:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\4TCVEXMH -&nbsp; 166,912 spoolc~1.exe&nbsp;&nbsp;&nbsp; spoolcll[1].exe<br /><font color="#ff0000">2005-01-26&nbsp;&nbsp; 08:57:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\mysql-4.1.8-win\data\mysql -&nbsp; 45,056 app_re~1.dll&nbsp;&nbsp;&nbsp; app_result.dll</font><br />2005-01-26&nbsp;&nbsp; 08:57:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32 -&nbsp; 166,912&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; spoolcll.exe<br />2005-01-26&nbsp;&nbsp; 08:57:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\4TCVEXMH -&nbsp; 166,912 spoolc~1.exe&nbsp;&nbsp;&nbsp; spoolcll[1].exe<br />2005-01-26&nbsp;&nbsp; 08:57:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\mysql-4.1.8-win\data -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; mysql<br />2005-01-26&nbsp;&nbsp; 08:57:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\mysql-4.1.8-win\data\mysql -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 08:57:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\mysql-4.1.8-win\data\mysql -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br /><font color="#ff0000">2005-01-26&nbsp;&nbsp; 08:57:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\mysql-4.1.8-win\data\mysql -&nbsp; 45,056 app_re~1.dll&nbsp;&nbsp;&nbsp; app_result.dll</font><br />2005-01-26&nbsp;&nbsp; 08:57:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\mysql-4.1.8-win\data\mysql -&nbsp; 579&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; func.myd<br />2005-01-26&nbsp;&nbsp; 08:57:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32 -&nbsp; 166,912&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; spoolcll.exe<br /><font color="#ff0000">2005-01-26&nbsp;&nbsp; 08:57:32&nbsp;&nbsp; | system_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;0&nbsp;7035&nbsp;Service Control Manager&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;The Event Monitor service was successfully sent a start control.&nbsp; <br /></font><font color="#ff0000">2005-01-26&nbsp;&nbsp; 08:57:32&nbsp;&nbsp; | system_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;0&nbsp;7036&nbsp;Service Control Manager&nbsp;N/A&nbsp;SYSTEM&nbsp;The Event Monitor service entered the running state.</font>&nbsp; <br /><font color="#0000ff">2005-01-26&nbsp;&nbsp; 08:57:55&nbsp;&nbsp; | system_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;0&nbsp;4226&nbsp;Tcpip&nbsp;N/A&nbsp;SYSTEM</font>&nbsp;&nbsp;<br />2005-01-26&nbsp;&nbsp; 08:59:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\Documents and Settings\USER\Local Settings\History\History.IE5\MSHist012005012620050127 -&nbsp; 49,152&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; index.dat<br />2005-01-26&nbsp;&nbsp; 08:59:14&nbsp;&nbsp; | application_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;1&nbsp;101&nbsp;ESENT&nbsp;N/A&nbsp;SYSTEM&nbsp;wuauclt (1380) The database engine stopped.&nbsp; <br />2005-01-26&nbsp;&nbsp; 08:59:14&nbsp;&nbsp; | application_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;1&nbsp;103&nbsp;ESENT&nbsp;N/A&nbsp;SYSTEM&nbsp;wuaueng.dll (1380) SUS20ClientDataStore: The database engine stopped the instance (0).&nbsp; <br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\System Volume Information\_restore{A8F1E086-2979-49E7-8501-90915E0AFFC6}\RP348 -&nbsp; 1,444&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; a0088629.dll<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\System Volume Information\_restore{A8F1E086-2979-49E7-8501-90915E0AFFC6}\RP348 -&nbsp; 1,444&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; a0088640.dll<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\System Volume Information\_restore{A8F1E086-2979-49E7-8501-90915E0AFFC6}\RP348 -&nbsp; 1,459&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; a0089642.dll<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\System Volume Information\_restore{A8F1E086-2979-49E7-8501-90915E0AFFC6}\RP349 -&nbsp; 1,444&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; a0089651.dll<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\System Volume Information\_restore{A8F1E086-2979-49E7-8501-90915E0AFFC6}\RP349 -&nbsp; 1,459&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; a0089648.dll<br /><font color="#ff0000">2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32 -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; recycler<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32 -&nbsp; 1,323&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; mw.dll<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32 -&nbsp; 1,459&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; rpc.dll<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32 -&nbsp; 153&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; auto.bat<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32 -&nbsp; 242&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; mc.dll<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32 -&nbsp; 574,976 rpccon~1.exe&nbsp;&nbsp;&nbsp; rpccontrol.exe<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\Temp -&nbsp; 628,007&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; extra.exe<br /></font>2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_creation_time_X_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; x:\Temp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; cygwin<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_creation_time_X_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; x:\Temp\cygwin -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_creation_time_X_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; x:\Temp\cygwin -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_hidden_files_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; dmp<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_hidden_files_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_hidden_files_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32 -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; recycler<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_last_write_time_X_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; x:\ -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; temp<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_last_write_time_X_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; x:\Temp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 09:01:00&nbsp;&nbsp; | dir_last_write_time_X_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; x:\Temp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br /><font color="#ff0000">2005-01-26&nbsp;&nbsp; 09:01:28&nbsp;&nbsp; | system_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;0&nbsp;7035&nbsp;Service Control Manager&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;The rpcservice service was successfully sent a start control.&nbsp; <br />2005-01-26&nbsp;&nbsp; 09:01:28&nbsp;&nbsp; | system_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;0&nbsp;7036&nbsp;Service Control Manager&nbsp;N/A&nbsp;SYSTEM&nbsp;The rpcservice service entered the running state.&nbsp; </font></font></p></blockquote> <p>Okay we have lots of data to digest here.<br />First we see the DLL that is discussed in the SANS article linked too above - this is the initial pieces of malware dropped on the box.&nbsp; It is actually a downloader that when loaded inside of a host process (or maybe run with rundll32.exe)&nbsp;will use WININET API's to download the other files to the TIF and then run them.&nbsp; How do&nbsp;I know this?&nbsp; I got a copy from the customer and ran strings against it - it's not packed with anything so you are able to see a lot.&nbsp; </p> <p>So now the picture is becoming clear - a login to MySQL is performed by guessing a password, executable code is written to the database using that logon, then persisted to the file system in the form of a DLL and then loaded and executed (this part I'm not clear on how this works).&nbsp; </p> <p>Once the DLL loads it uses WININET API's to start downloading the other malware (the EXE's etc.) to the machine via either FTP or HTTP&nbsp;and then running them.&nbsp; You can see the stuff I highlighted in red pretty clearly shows the EXE's getting downloaded to the box, copied to SYSTEM32 and then started as a service.&nbsp; But what's that lone event ID I highlighted in <font color="#0000ff">blue</font> above?</p> <p><a href="http://www.microsoft.com/technet/support/ee/result.aspx?EvtSrc=Tcpip&amp;EvtID=4226&amp;ProdName=Windows+Operating+System&amp;LCID=1033&amp;ProdVer=5.2">http://www.microsoft.com/technet/support/ee/result.aspx?EvtSrc=Tcpip&amp;EvtID=4226&amp;ProdName=Windows+Operating+System&amp;LCID=1033&amp;ProdVer=5.2</a></p> <p>Hooray for XP SP2's built-in rate limiting which kicked in, presumably when this stuff started scanning!&nbsp; <br />The rate-limiting built-in to XP SP2 has been the topic of much heated debate amongst security professionals but its real-world data like this showing that it works against even new malware that makes me favor it.&nbsp; Sure it can be subverted by skilled miscreants - but draw your own conclusions based on this evidence.</p> <p>At this point, after a while, the user of the machine started to get suspicious that something was up (perhaps network performance was sluggish) and started rebooting and installing things like Microsoft Antispyware . . . here's the next cluster of 'interesting' data:</p> <p> <hr id="null" /> </p> <p>It's really hard to write solid code - the miscreants are not the best coders either - here's proof:</p> <blockquote dir="ltr" style="MARGIN-RIGHT: 0px"> <p><font size="2">Copied from: Date View<br />==========================<br />2005-01-26&nbsp;&nbsp; 13:56:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\Prefetch -&nbsp; 17,284 taskmg~1.pf&nbsp;&nbsp;&nbsp;&nbsp; taskmgr.exe-20256c55.pf<br />2005-01-26&nbsp;&nbsp; 13:56:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\Prefetch -&nbsp; 9,110 spoolc~1.pf&nbsp;&nbsp;&nbsp;&nbsp; spoolcll.exe-06e977be.pf<br />2005-01-26&nbsp;&nbsp; 13:56:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\Prefetch -&nbsp; 9,110 spoolc~1.pf&nbsp;&nbsp;&nbsp;&nbsp; spoolcll.exe-06e977be.pf<br />2005-01-26&nbsp;&nbsp; 13:56:12&nbsp;&nbsp; | system_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;0&nbsp;4202&nbsp;Tcpip&nbsp;N/A&nbsp;SYSTEM&nbsp;&nbsp;HP WLAN 802.11a/b/g W500 - Packet Scheduler Miniport&nbsp;<br />2005-01-26&nbsp;&nbsp; 13:56:17&nbsp;&nbsp; | system_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;0&nbsp;32003&nbsp;ipnathlp&nbsp;N/A&nbsp;SYSTEM&nbsp;The Network Address Translator (NAT) was unable to request an operation&nbsp; of the kernel-mode translation module.&nbsp; This may indicate misconfiguration, insufficient resources, or&nbsp; an internal error.&nbsp; The data is the error code.&nbsp; <br /><font color="#ff0000">2005-01-26&nbsp;&nbsp; 13:56:26&nbsp;&nbsp; | system_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;0&nbsp;7031&nbsp;Service Control Manager&nbsp;N/A&nbsp;SYSTEM&nbsp;The Event Monitor service terminated unexpectedly.&nbsp; It has done this 1 time(s).&nbsp; The following corrective action will be taken in 1 milliseconds: Restart the service.&nbsp; <br />2005-01-26&nbsp;&nbsp; 13:56:28&nbsp;&nbsp; | system_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;0&nbsp;7036&nbsp;Service Control Manager&nbsp;N/A&nbsp;SYSTEM&nbsp;The Event Monitor service entered the running state.&nbsp; <br />2005-01-26&nbsp;&nbsp; 13:56:43&nbsp;&nbsp; | system_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;0&nbsp;7031&nbsp;Service Control Manager&nbsp;N/A&nbsp;SYSTEM&nbsp;The Event Monitor service terminated unexpectedly.&nbsp; It has done this 2 time(s).&nbsp; The following corrective action will be taken in 1 milliseconds: Restart the service.&nbsp; <br />2005-01-26&nbsp;&nbsp; 13:56:45&nbsp;&nbsp; | system_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;0&nbsp;7036&nbsp;Service Control Manager&nbsp;N/A&nbsp;SYSTEM&nbsp;The Event Monitor service entered the running state.&nbsp; <br />2005-01-26&nbsp;&nbsp; 13:56:48&nbsp;&nbsp; | system_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;0&nbsp;7031&nbsp;Service Control Manager&nbsp;N/A&nbsp;SYSTEM&nbsp;The Event Monitor service terminated unexpectedly.&nbsp; It has done this 3 time(s).&nbsp; The following corrective action will be taken in 1 milliseconds: Restart the service.&nbsp; <br />2005-01-26&nbsp;&nbsp; 13:56:51&nbsp;&nbsp; | system_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;0&nbsp;7036&nbsp;Service Control Manager&nbsp;N/A&nbsp;SYSTEM&nbsp;The Event Monitor service entered the running state.&nbsp; </font></font></p></blockquote> <p>Sadly the miscreants have set the service to restart automatically so it keeps on trucking.</p> <p> <hr id="null" /> </p> <p>Now the next cluster of events let you know that this is not just a standard worm that spreads and does little else - this bot phoned home to someone and then that someone started preparing the server to host warez after it got the message:</p> <blockquote dir="ltr" style="MARGIN-RIGHT: 0px"> <p><font size="2">Copied from: Date View<br />==========================<br />2005-01-26&nbsp;&nbsp; 14:11:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\System Volume Information\_restore{A8F1E086-2979-49E7-8501-90915E0AFFC6}\RP349 -&nbsp; 18,108 change~1.1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; change.log.1<br />2005-01-26&nbsp;&nbsp; 14:11:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\System Volume Information\_restore{A8F1E086-2979-49E7-8501-90915E0AFFC6}\RP349 -&nbsp; 46,822&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; change.log<br /><font color="#ff0000">2005-01-26&nbsp;&nbsp; 14:11:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\Prefetch -&nbsp; 10,146 attrib~1.pf&nbsp;&nbsp;&nbsp;&nbsp; attrib.exe-39eafb02.pf<br />2005-01-26&nbsp;&nbsp; 14:11:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\Prefetch -&nbsp; 17,818 extrae~1.pf&nbsp;&nbsp;&nbsp;&nbsp; extra.exe-03550c8c.pf<br />2005-01-26&nbsp;&nbsp; 14:11:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\Prefetch -&nbsp; 8,306 rpccon~1.pf&nbsp;&nbsp;&nbsp;&nbsp; rpccontrol.exe-348acdff.pf<br />2005-01-26&nbsp;&nbsp; 14:11:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\Program Files\Microsoft AntiSpyware -&nbsp; 1,716&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; errors.log<br />2005-01-26&nbsp;&nbsp; 14:11:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\Prefetch -&nbsp; 10,146 attrib~1.pf&nbsp;&nbsp;&nbsp;&nbsp; attrib.exe-39eafb02.pf<br />2005-01-26&nbsp;&nbsp; 14:11:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\Prefetch -&nbsp; 17,818 extrae~1.pf&nbsp;&nbsp;&nbsp;&nbsp; extra.exe-03550c8c.pf<br />2005-01-26&nbsp;&nbsp; 14:11:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\Prefetch -&nbsp; 8,306 rpccon~1.pf&nbsp;&nbsp;&nbsp;&nbsp; rpccontrol.exe-348acdff.pf<br />2005-01-26&nbsp;&nbsp; 14:11:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\Temp -&nbsp; 628,007&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; extra.exe<br /></font>2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 00-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 00 -+-=o0o===========================================o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 01-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 01 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; a&nbsp; n e g a t i v e&nbsp; f i b e s&nbsp; e l i t e&nbsp; s t r o&nbsp;&nbsp; -+-=o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 02-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 02 -+-=o0o===========================================o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 03-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 03 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; g a m e s&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 04-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 04 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; s o f t w a r e&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 05_-_o~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 05 +-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; m o v i e s&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 06-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 06 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; m u s i c&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 07-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 07 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; c o n s o l e&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 08-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 08 -+-=o0o==========================================o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 09-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 09 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; h a c k e d&nbsp; b y&nbsp; t u t t 3 f r u t&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 10-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 10 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; f i l l e d&nbsp; b y&nbsp; t u t t 3 f r u t&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- -+-=o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 11-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 11 -+-=o0o==========================================o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\00 -+-=o0o===========================================o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\00 -+-=o0o===========================================o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\01 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; A&nbsp; N e g a t i v e&nbsp; F i b e s&nbsp; E l i t e&nbsp; S t r o&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\01 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; A&nbsp; N e g a t i v e&nbsp; F i b e s&nbsp; E l i t e&nbsp; S t r o&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\02 -+-=o0o===========================================o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\02 -+-=o0o===========================================o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\03 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; G a m e s&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\03 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; G a m e s&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\04 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; S o f t w a r e&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\04 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; S o f t w a r e&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\05 +-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; M o v i e s&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\05 +-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; M o v i e s&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\06 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; M u s i c&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\06 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; M u s i c&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\07 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; C o n s o l e&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\07 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; C o n s o l e&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\08 -+-=o0o==========================================o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\08 -+-=o0o==========================================o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\09 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; H a c k e d&nbsp; b y&nbsp; T u T T 3 F R u T&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\09 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; H a c k e d&nbsp; b y&nbsp; T u T T 3 F R u T&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\10 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; F i l l e d&nbsp; b y&nbsp; T u T T 3 F R u T&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\10 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; F i l l e d&nbsp; b y&nbsp; T u T T 3 F R u T&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\11 -+-=o0o==========================================o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\11 -+-=o0o==========================================o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 00-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 00 -+-=o0o===========================================o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 01-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 01 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; a&nbsp; n e g a t i v e&nbsp; f i b e s&nbsp; e l i t e&nbsp; s t r o&nbsp;&nbsp; -+-=o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 02-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 02 -+-=o0o===========================================o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 03-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 03 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; g a m e s&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 04-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 04 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; s o f t w a r e&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 06-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 06 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; m u s i c&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 07-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 07 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; c o n s o l e&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 08-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 08 -+-=o0o==========================================o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 09-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 09 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; h a c k e d&nbsp; b y&nbsp; t u t t 3 f r u t&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 10-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 10 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; f i l l e d&nbsp; b y&nbsp; t u t t 3 f r u t&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- -+-=o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 11-_-_~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 11 -+-=o0o==========================================o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\00 -+-=o0o===========================================o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\00 -+-=o0o===========================================o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\01 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; A&nbsp; N e g a t i v e&nbsp; F i b e s&nbsp; E l i t e&nbsp; S t r o&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\01 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; A&nbsp; N e g a t i v e&nbsp; F i b e s&nbsp; E l i t e&nbsp; S t r o&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\02 -+-=o0o===========================================o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\02 -+-=o0o===========================================o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\03 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; G a m e s&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\03 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; G a m e s&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\04 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; S o f t w a r e&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\04 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; S o f t w a r e&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\06 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; M u s i c&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\06 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; M u s i c&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\07 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; C o n s o l e&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\07 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; C o n s o l e&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\08 -+-=o0o==========================================o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\08 -+-=o0o==========================================o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\09 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; H a c k e d&nbsp; b y&nbsp; T u T T 3 F R u T&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\09 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; H a c k e d&nbsp; b y&nbsp; T u T T 3 F R u T&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\10 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; F i l l e d&nbsp; b y&nbsp; T u T T 3 F R u T&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\10 -+-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; F i l l e d&nbsp; b y&nbsp; T u T T 3 F R u T&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\11 -+-=o0o==========================================o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\11 -+-=o0o==========================================o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..</font></p></blockquote> <p>Welp - now we have some leads for law enforcement some day in the form of handles / nick's these guys go by.&nbsp; Tooty fruit?&nbsp; Umm . . . okay.<br />What's interesting is that while this was going on the user decided to reboot one more time - thereby interrupting the preparation of the new warez site which was in full swing . . .</p> <p> <hr id="null" /> </p> <p>Not to fear - looks like it resumed shortly after the reboot . . . :(</p> <blockquote dir="ltr" style="MARGIN-RIGHT: 0px"> <p><br /><font size="2">Copied from: Date View<br />==========================<br />2005-01-26&nbsp;&nbsp; 14:22:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 05_-_o~1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 05 +-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; m o v i e s&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+-<br />2005-01-26&nbsp;&nbsp; 14:22:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\05 +-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; M o v i e s&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-26&nbsp;&nbsp; 14:22:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINDOWS\system32\recycler\dmp\05 +-=o0o=-+-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; M o v i e s&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -+-=o0o=-+- -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..</font></p></blockquote> <p> <hr id="null" /> </p> <p>Okay enough of that - let's do some more investigating - here's a registry search for app_result.dll</p> <blockquote dir="ltr" style="MARGIN-RIGHT: 0px"> <p><br /><font size="2">Copied from: Search Results for: app_result.dll<br />==========================<br />Files containing instances of 'app_result.dll'</font></p> <p><font size="2">Number of Files Searched: 2<br />Time to Search Files: 3 seconds</font></p> <p><font size="2">registry.txt<br />====================<br />&nbsp;&nbsp; [HKEY_USERS\S-1-5-21-1085031214-1292428093-xxxxxxxx-yyyyyy\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSaveMRU\*]<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "i"=(REG_SZ)"C:\\mysql-4.1.8-win\\data\\mysql\\app_result.dll"</font></p> <p><font size="2">&nbsp;&nbsp; [HKEY_USERS\S-1-5-21-1085031214-1292428093-xxxxxxxx-yyyyyy\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSaveMRU\dll]<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "b"=(REG_SZ)"C:\\mysql-4.1.8-win\\data\\mysql\\app_result.dll"</font></p></blockquote> <p>Doesn't give us much . . . <hr id="null" /> </p> <p>Let's check out the XP SP2 firewall policy</p> <blockquote dir="ltr" style="MARGIN-RIGHT: 0px"> <p><br /><font size="2">Copied from: Date View<br />==========================<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;848&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;No&nbsp;Domain&nbsp;All interfaces&nbsp;On&nbsp;Disabled&nbsp;Disabled&nbsp;Disabled&nbsp;Disabled&nbsp;Disabled&nbsp;Disabled&nbsp;Disabled&nbsp;Disabled&nbsp;Disabled&nbsp;Enabled&nbsp;Disabled&nbsp;Disabled&nbsp;Disabled&nbsp;Disabled&nbsp;Disabled&nbsp;Disabled&nbsp;Disabled&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;849&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;iTunes&nbsp;C:\Program Files\iTunes\iTunes.exe&nbsp;Enabled&nbsp;All subnets&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;849&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;java&nbsp;C:\Documents and Settings\USER\.netbeans\3.6\modules\profiler-ea-vm\jre\bin\java.exe&nbsp;Enabled&nbsp;All subnets&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;849&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;java&nbsp;C:\java\j2sdk1.4.2_05\bin\java.exe&nbsp;Enabled&nbsp;All subnets&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;849&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;Java(TM) 2 Platform Standard Edition binary&nbsp;C:\java\jdk1.5.0\bin\java.exe&nbsp;Enabled&nbsp;All subnets&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;849&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;Java(TM) 2 Platform Standard Edition binary&nbsp;C:\java\jdk1.5.0\jre\bin\javaw.exe&nbsp;Enabled&nbsp;All subnets&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;849&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;javaw&nbsp;C:\java\j2sdk1.4.2_05\bin\javaw.exe&nbsp;Enabled&nbsp;All subnets&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;849&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;javaw&nbsp;C:\java\j2sdk1.4.2_05\jre\bin\javaw.exe&nbsp;Enabled&nbsp;All subnets&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;849&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;mIRC&nbsp;C:\Program Files\mIRC\mirc.exe&nbsp;Enabled&nbsp;All subnets&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;849&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;MSN Messenger 7.0&nbsp;C:\Program Files\MSN Messenger\msnmsgr.exe&nbsp;Enabled&nbsp;All subnets&nbsp;<br /><font color="#ff0000">2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;849&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;mysqld-nt&nbsp;C:\mysql\bin\mysqld-nt.exe&nbsp;Enabled&nbsp;All subnets&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;849&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;mysqld-nt&nbsp;C:\mysql-4.1.5-gamma-win\bin\mysqld-nt.exe&nbsp;Enabled&nbsp;All subnets&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;849&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;mysqld-nt&nbsp;C:\mysql-4.1.8-win\bin\mysqld-nt.exe&nbsp;Enabled&nbsp;All subnets&nbsp;<br /></font>2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;849&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;Remote Assistance&nbsp;%windir%\system32\sessmgr.exe&nbsp;Enabled&nbsp;All subnets&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;849&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;runide&nbsp;C:\Program Files\NetBeans3.6\bin\runide.exe&nbsp;Enabled&nbsp;All subnets&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;849&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;vvsys Application&nbsp;C:\Program Files\Polycom\ViaVideoNG\vvsys.exe&nbsp;Enabled&nbsp;All subnets&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;849&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;Windows Messenger&nbsp;C:\Program Files\Messenger\msmsgs.exe&nbsp;Enabled&nbsp;All subnets&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;849&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;Windows NetMeeting&nbsp;C:\Program Files\NetMeeting\conf.exe&nbsp;Enabled&nbsp;All subnets&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;850&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;All interfaces&nbsp;NetBIOS Datagram Service&nbsp;138&nbsp;UDP&nbsp;Disabled&nbsp;Local subnet only&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;850&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;All interfaces&nbsp;NetBIOS Name Service&nbsp;137&nbsp;UDP&nbsp;Disabled&nbsp;Local subnet only&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;850&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;All interfaces&nbsp;NetBIOS Session Service&nbsp;139&nbsp;TCP&nbsp;Disabled&nbsp;Local subnet only&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;850&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;All interfaces&nbsp;Remote Desktop&nbsp;3389&nbsp;TCP&nbsp;Disabled&nbsp;All subnets&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;850&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;All interfaces&nbsp;SMB over TCP&nbsp;445&nbsp;TCP&nbsp;Disabled&nbsp;Local subnet only&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;850&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;All interfaces&nbsp;SSDP Component of UPnP Framework&nbsp;1900&nbsp;UDP&nbsp;Disabled&nbsp;Local subnet only&nbsp;<br />2005-01-26&nbsp;&nbsp; 09:14:20&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; &nbsp;6&nbsp;850&nbsp;Security&nbsp;NT AUTHORITY\SYSTEM&nbsp;&nbsp;SYSTEM&nbsp;Local Policy&nbsp;Domain&nbsp;All interfaces&nbsp;UPnP Framework over TCP&nbsp;2869&nbsp;TCP&nbsp;Disabled&nbsp;Local subnet only&nbsp;</font></p></blockquote> <p><a href="http://www.microsoft.com/technet/prodtechnol/winxppro/support/wftshoot.mspx">http://www.microsoft.com/technet/prodtechnol/winxppro/support/wftshoot.mspx</a><br />Windows Firewall uses the following event IDs:</p> <p>• 848 - Displays the startup configuration of Windows Firewall.<br />&nbsp;<br />• 849 - Displays an application exception configuration.<br />&nbsp;<br />• 850 - Displays a port exception configuration.<br />&nbsp;<br />• 851 - Displays a change made to the application exceptions list.<br />&nbsp;<br />• 852 - Displays a change made to the port exceptions list.<br />&nbsp;<br />• 853 - Displays a change made to the Windows Firewall operation mode.<br />&nbsp;<br />• 854 - Displays a change made to Windows Firewall logging settings.<br />&nbsp;<br />• 855 - Displays a change made to ICMP settings.<br />&nbsp;<br />• 856 - Displays a change made to the Prohibit unicast response to multicast or broadcast requests setting.<br />&nbsp;<br />• 857 - Displays a change made to the Remote Administration setting.<br />&nbsp;<br />• 860 - Displays a change made to a different profile.<br />&nbsp;<br />• 861 - Displays an application attempting to listen for incoming traffic.<br />&nbsp;</p> <p> <hr id="null" /> </p> <p>Finally here are the MD5/SHA-1 values of the initial DLL dropped on the box via MySQL:</p> <p><font face="Courier New" size="2">D:\malware\MySQL&gt;fciv -both app_result.dll<br />//<br />// File Checksum Integrity Verifier version 2.05.<br />//<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; MD5&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SHA-1<br />-------------------------------------------------------------------------<br />fa9e72f3f7073f285e18299260331a2f bbc6e88b4af5ee6fa101ada8eb2e31f33105450a app_result.dll</font><br /></p> <p> <hr id="null" /> </p> <p>Here is some string data from the DLL obtained using strings:</p> <p><font face="Courier New" size="2">ShellExecuteA<br />SHELL32.dll<br />InternetCloseHandle<br />FtpGetFileA<br /><font color="#0000ff">InternetConnectA<br />InternetOpenA<br />WININET.dll</font><br />GetCommandLineA<br />GetVersion<br />ExitProcess<br />TerminateProcess<br />GetCurrentProcess<br />GetCurrentThreadId<br />TlsSetValue<br />TlsAlloc<br />TlsFree<br />SetLastError<br />TlsGetValue<br />GetLastError<br />SetHandleCount<br />GetStdHandle<br />GetFileType<br />GetStartupInfoA<br />DeleteCriticalSection<br />GetModuleFileNameA<br />FreeEnvironmentStringsA<br />FreeEnvironmentStringsW<br />WideCharToMultiByte<br />GetEnvironmentStrings<br />GetEnvironmentStringsW<br />GetModuleHandleA<br />GetEnvironmentVariableA<br />GetVersionExA<br />HeapDestroy<br />HeapCreate<br />VirtualFree<br />HeapFree<br />WriteFile<br />MultiByteToWideChar<br />GetStringTypeA<br />GetStringTypeW<br />InitializeCriticalSection<br />EnterCriticalSection<br />LeaveCriticalSection<br />HeapAlloc<br />GetCPInfo<br />GetACP<br />GetOEMCP<br />VirtualAlloc<br />HeapReAlloc<br />GetProcAddress<br />LoadLibraryA<br />RtlUnwind<br />LCMapStringA<br />LCMapStringW<br />InterlockedDecrement<br />InterlockedIncrement<br />KERNEL32.dll<br />app_result.dll<br />app_result<br />open<br />PST<br />PDT</font><br /> <hr id="null" /> </p> <p>That's all for now - looks like the AV's are probably on top of this . . . </p> <p>&nbsp;</p><img src="http://blogs.technet.com/aggbug.aspx?PostID=362175" width="1" height="1">The Blame Game - I won't go there.http://blogs.technet.com/robert_hensing/archive/2005/01/27/361930.aspxThu, 27 Jan 2005 21:33:00 GMTd5e57398-b9ef-4490-9955-07cbb4e4a80d:361930Robert_Hensing15http://blogs.technet.com/robert_hensing/comments/361930.aspxhttp://blogs.technet.com/robert_hensing/commentrss.aspx?PostID=361930<p>So I'm getting some 'interesting' and frankly un-expected comments on my most recent 'Anatomy of . . . ' posts where I delve into examples of a hack involving certain vulnerabilities (one of which wasn't even in one of our products I'd like to point out).</p> <p>Look folks - my intent with these blogs is not to place blame and I'm not in the habbit of blaming the victims for getting attacked as the finger can be pointed at either us or them (or the miscreants who commit the crimes but why does no one ever think to blame them when all is said and done?!&nbsp; Think about it . . . ).</p> <p>If I <em>had</em> to - I'd gladly take the blame on behalf of Microsoft over customers any day and will gladly fall on my sword.</p> <p>My intent with this blog is to simply&nbsp;share knowledge about how these attacks are occuring, why they are occurring, what IR teams at other organizations can look for and what security practitioners should be doing to secure systems in a way that most people can understand interspersed with some humorous wit and colorful commentary strewn throughout.</p> <p>My team&nbsp;<em>always</em> tries to get to root cause on each and every case&nbsp;because by demystifying how these intrusions occur for our customers they will start to see how <em><strong>easy</strong></em> it really is to take basic precautions to avoid getting hacked.&nbsp; Patterns will emerge.&nbsp; Sure we have hundreds of pages of guidance on this that or the other but it's really quite easy to avoid getting hacked when you come right down to it at the end of the day:<br />Patches, passwords and ports.&nbsp; <br />If you can manage all 3 of those in your environment&nbsp;- you'll do just fine and need not worry (excessively &lt;G&gt;).</p> <p>I want to make clear here that I do not enjoy, nor am I proud of the fact that our customers are getting hacked in droves.<br />I don't take pleasure in pointing out how <em>easy</em> it would have been for them, in retrospect to avoid getting hacked (with these last two blogs either a firewall or a software update would have prevented it).<br />That said I certainly <em>do</em> enjoy the hell out of my job - I <em>like</em> hunting the hunters and being a good guy and I think my team is quite good at it and I'm proud to be a part of it offering the service we do for our customers.</p> <p>With every hacking case we get - we close the case with a series of recommendations on how to not get hacked going forward and I will continue to share those assesments with you in each post - but please don't take offense at the casual way in which I mention the recommendations (which are all documented best practices anyways).&nbsp; I realize some organizations struggle with passwords.&nbsp; I realize some organizations struggle with patches.&nbsp; If these are sensitive topics for you - don't take it out on me.&nbsp; I'm just the messenger (perhaps more like the ghost of Christmas future showing you via my blog what's in store for you if you don't resolve your struggles and soon &lt;G&gt;).</p> <p>And finally - I'd like to point out that Windows 2000 was not an operating system designed with security in mind and it is the reason a disproportionate number of hacking cases are for Windows 2000 when used by people who are not security focused.&nbsp; Think about some of the features of Windows 2000 out of the box.</p> <ul> <li>It allows for blank admin passwords and they can and will be used against you.</li> <li>It does not require strong passwords during setup should you decide to put one on the admin account ('password' or 'dog' are okay to use during setup)</li> <li>no firewall</li> <li>everything's on by default</li></ul> <p>You may have seen mention in my post a hint about WS2003 and how you'll likely see me post very little about hax0r3d WS2003 boxes.&nbsp; <br />There is a non-marketting reason for that (I am NOT a marketting guy and I'm not working a bit harder so Initech can ship a few more widgets).<br />WS2003 is a 'secure by default' operating system (our first, followed by XP SP2) that received code review and myriad defense in depth improvements.</p> <p>Think about some of the features of WS2003 out of the box (some of these you may not have known about - but have been quietly helping to protect customers for years now):</p> <ul> <li>It allows you to set a blank admin password during setup&nbsp;BUT . . . if you do, you get yelled at and then you can't authenticate to the server using that account on the network (i.e. can't access the admin shares using 'administrator' with no password.&nbsp; It's a security policy and it's enforced by default - so actually a blank admin password is better than having a password like 'password' for example.</li> <li>Speaking of lame passwords like 'password' - should you decide to create a password for the administrator account during setup - you will be <a href="http://www.microsoft.com/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/Default.asp?url=/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/windows_password_tips.asp">forced to choose a better one</a> (i.e. one that meets password complexity requirements).&nbsp; You won't be able to use 'password' for example.</li> <li>Built-in firewall - not on by default - but change is coming.</li> <li>Everything's <em><strong>off</strong></em> by default - you won't find IIS or a myriad of other services listening by default that increase your exposure needlessly</li> <li>Stack smashing protection - the majority of the OS has been compiled with the /GS compiler flag to place stack cookies around important functions</li></ul> <p>In the coming months we'll be releasing WS2003 SP1 with even more creamy goodness to help protect our customers (more on that I'm sure will come later).</p> <p>In the mean time - you need to realize - we <em>are</em> fighting back for our customers <em>without</em> placing blame (oh and occasionally we help law enforcement arrest the bad guys - so maybe just a little well-deserved blame aimed at those who break the law &lt;G&gt;).</p><img src="http://blogs.technet.com/aggbug.aspx?PostID=361930" width="1" height="1">Anatomy of a WINS server hack (MS04-045) . . . http://blogs.technet.com/robert_hensing/archive/2005/01/27/361800.aspxThu, 27 Jan 2005 19:43:00 GMTd5e57398-b9ef-4490-9955-07cbb4e4a80d:361800Robert_Hensing19http://blogs.technet.com/robert_hensing/comments/361800.aspxhttp://blogs.technet.com/robert_hensing/commentrss.aspx?PostID=361800<p>Okay - so here is my analysis of a recent WINS hack a customer experienced.&nbsp; The customer caught this by analyzing their netflow data from their routers . . . they suddenly started sending tremendous amounts of packet love and affection to various IP's around the Internet and they traced the packets to a Windows box on their network and thus the IR process was kicked into full swing.&nbsp; </p> <p>They immediately pulled the plug, ran WOLF and started analyzing the data.&nbsp; As you will see these&nbsp;miscreants leave behind some tells that indicate that they are slightly more skilled than the miscreants from the previous blog post who went up against Windows File Protection . . . and lost.&nbsp; </p> <p>As with most IR cases we don't have direct, objective first-hand knowledge of how the compromise occurred - all we can do is piece together the puzzle based on the evidence at hand and make a subjective assumption about what we <em>think</em> probably happened.&nbsp; Sometimes it's a no brainer and you see something like XP_CMDSHELL being run in the event logs and the customer tells us they have a blank SA password and no firewall - other times we have to do some educating guessing. :)&nbsp; We rely heavily on <a href="http://en.wikipedia.org/wiki/Occam's_Razor">Occam's Razor</a> and find it to hold true most of the time.</p> <p> <hr id="null" /> <p></p> <p>Okay - with this case I was lucky in that this customer was more sophisticated than most and the customer was able to give me some 'leads' in the form of a process name and a date and time that the gratuitous love and packet affection occured on their network.&nbsp; When you don't see anything suspicious in the volatile data on a machine (i.e. running processes / suspicious network connections) its very important to have a lead in the form of a date or time to go on usually - otherwise you're just looking for a needle in a hay stack.<br /><br />Using WOLF Hound (our trusty IR data viewer) I told it to show me everything that happened on the file system and in the event logs on the 9th.&nbsp; <br /><br />First we see some unusual events logged from the WINS service on this machine (a Windows 2000 SP4 machine b.t.w. - you will see me blog very little about WS2003 servers . . . I wonder why that is?).&nbsp; <br /><br />After the suspicious WINS event log entries we that <a href="ftp://ftp.EXE">FTP.EXE</a> gets run (last access time) and it looks like it was run (probably) to pull down a file called przsvc.exe.&nbsp; </p> <blockquote dir="ltr" style="MARGIN-RIGHT: 0px"> <p><font size="2">Copied from: Date View<br />==========================<br />2005-01-09&nbsp;&nbsp; 16:10:40&nbsp;&nbsp; | system_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; 0&nbsp;4192&nbsp;Wins&nbsp;N/A&nbsp;SERVERNAME&nbsp;An error occurred from which WINS will try to recover. If the recovery fails,&nbsp;&nbsp; check previous event log entries to determine what prevented a successful&nbsp;&nbsp; recovery. Take the appropriate action to solve the error that prevented&nbsp;&nbsp; recovery.&nbsp; <br />2005-01-09&nbsp;&nbsp; 16:10:40&nbsp;&nbsp; | system_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; 0&nbsp;4242&nbsp;Wins&nbsp;N/A&nbsp;SERVERNAME&nbsp;WINS Push thread encountered an exception. A recovery will be attempted.&nbsp; <br />2005-01-09&nbsp;&nbsp; 16:10:40&nbsp;&nbsp; | system_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; 0&nbsp;4297&nbsp;Wins&nbsp;N/A&nbsp;SERVERNAME&nbsp;WINS encountered a low memory condition. Check to see if the system is running&nbsp;&nbsp; out of virtual memory.&nbsp; <br />2005-01-09&nbsp;&nbsp; 16:12:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINNT\system32 -&nbsp; 19,788&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; przsvc.exe<br />2005-01-09&nbsp;&nbsp; 16:12:00&nbsp;&nbsp; | dir_last_access_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINNT\system32 -&nbsp; 39,696&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href="ftp://ftp.exe">ftp.exe</a><br />2005-01-09&nbsp;&nbsp; 16:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINNT\system32 -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; spool<br />2005-01-09&nbsp;&nbsp; 16:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINNT\system32\spool -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-09&nbsp;&nbsp; 16:12:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINNT\system32\spool -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br />2005-01-09&nbsp;&nbsp; 16:52:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINNT\system32 -&nbsp; 22,016&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; spoolsrv.exe<br />2005-01-09&nbsp;&nbsp; 16:52:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\ -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; data<br />2005-01-09&nbsp;&nbsp; 16:52:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\Data -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; .<br />2005-01-09&nbsp;&nbsp; 16:52:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\Data -&nbsp; &lt;DIR&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ..<br /></font></p></blockquote> <p dir="ltr" style="MARGIN-RIGHT: 0px">Using&nbsp;FTP to suck stuff down to the box . . . well that's hardly interesting, that's been demo'd&nbsp;in hacking books and hacking classes for years . . .&nbsp;'that's soooo last century'.&nbsp; What's interesting about <em>this</em> crew is that they also seem to have the ability to download files via HTTP (probably by calling WININET API's) just in case you're doing some egress filtering and don't allow outbound FTP.&nbsp; We've seen this done&nbsp;via scripting combined with ADODB.Stream to persist the fetched data before and it's not really hard to write a compiled program to do the same thing and run it as SYSTEM if you know what API's to call.&nbsp; Could this be new functionality of this particular BOT variant (spoolsrv.exe is an SDBot variant b.t.w.).&nbsp; </p> <p dir="ltr" style="MARGIN-RIGHT: 0px">You may notice below that the 'Default User' profile's TIF (Temporary Internet Files) folder is being written around 16:52 . . . it turns out you can repro this yourself - fire up a copy of Internet Explorer running as the SYSTEM account (left as an exercise to the reader) and download some files - observe where they go.&nbsp; That's right, they go into the 'Default User' profile.&nbsp; So now it seems we have evidence that someone was running something on the box (SDBot) with elevated privileges and downloading files via IE&nbsp; (less likely) or by calling the same API's IE calls (more likely).&nbsp; </p> <p dir="ltr" style="MARGIN-RIGHT: 0px">This is a little more sophisticated than usual - but it's not a new technique - we've seen this used on occasion in the past but usually from vbscripts wrapped inside of .CHM files that were downloaded and run via Internet Explorer 0-days.</p> <blockquote dir="ltr" style="MARGIN-RIGHT: 0px"><font size="2"> <p><br />2005-01-09&nbsp;&nbsp; 16:52:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\Documents and Settings\Default User\Local Settings\Temporary Internet Files\Content.IE5 -&nbsp; 32,768&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; index.dat<br />2005-01-09&nbsp;&nbsp; 16:52:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINNT\system32 -&nbsp; 22,016&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; spoolsrv.exe<br />2005-01-09&nbsp;&nbsp; 16:55:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\Documents and Settings\Default User\Local Settings\Temporary Internet Files\Content.IE5\41YZG527 -&nbsp; 2,539,520 winzip~1.exe&nbsp;&nbsp;&nbsp; winzip81sr1eval[1].exe<br />2005-01-09&nbsp;&nbsp; 16:55:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\Documents and Settings\Default User\Local Settings\Temporary Internet Files\Content.IE5\G5AZ8XYZ -&nbsp; 464,957 nfs-cd~1.zip&nbsp;&nbsp;&nbsp; nfs-cd[1].zip<br />2005-01-09&nbsp;&nbsp; 16:55:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\Documents and Settings\Default User\Local Settings\Temporary Internet Files\Content.IE5\STMBS1EB -&nbsp; 2,848,655 aim_1_~1.exe&nbsp;&nbsp;&nbsp; aim[1].exe<br />2005-01-09&nbsp;&nbsp; 16:55:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\Documents and Settings\Default User\Local Settings\Temporary Internet Files\Content.IE5\G5AZ8XYZ -&nbsp; 464,957 nfs-cd~1.zip&nbsp;&nbsp;&nbsp; nfs-cd[1].zip<br />2005-01-09&nbsp;&nbsp; 16:55:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\Documents and Settings\Default User\Local Settings\Temporary Internet Files\Content.IE5\STMBS1EB -&nbsp; 2,848,655 aim_1_~1.exe&nbsp;&nbsp;&nbsp; aim[1].exe<br />2005-01-09&nbsp;&nbsp; 16:56:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\Documents and Settings\Default User\Local Settings\Temporary Internet Files\Content.IE5\QDF591YV -&nbsp; 2,628,632 lusetu~1.exe&nbsp;&nbsp;&nbsp; lusetup[1].exe<br />2005-01-09&nbsp;&nbsp; 16:56:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\Documents and Settings\Default User\Local Settings\Temporary Internet Files\Content.IE5\41YZG527 -&nbsp; 2,539,520 winzip~1.exe&nbsp;&nbsp;&nbsp; winzip81sr1eval[1].exe<br />2005-01-09&nbsp;&nbsp; 16:56:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\Documents and Settings\Default User\Local Settings\Temporary Internet Files\Content.IE5\QDF591YV -&nbsp; 2,628,632 lusetu~1.exe&nbsp;&nbsp;&nbsp; lusetup[1].exe<br />2005-01-09&nbsp;&nbsp; 17:08:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINNT\system32 -&nbsp; 51,733&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; plugin1.dat<br />2005-01-09&nbsp;&nbsp; 17:08:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINNT\Temp -&nbsp; 84&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; del.bat<br />2005-01-09&nbsp;&nbsp; 17:08:00&nbsp;&nbsp; | dir_last_access_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINNT\Temp -&nbsp; 84&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; del.bat<br />2005-01-09&nbsp;&nbsp; 17:08:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINNT\Temp -&nbsp; 84&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; del.bat<br />2005-01-09&nbsp;&nbsp; 17:09:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINNT\system32 -&nbsp; 51,733&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; plugin1.dat</font></p></blockquote> <p>We collect some files that are more than likely 'suspicious' when we run WOLF.&nbsp; <br />Del.bat seems like it might be one of those files and we just happened to snag a copy - let's have a look:</p> <blockquote dir="ltr" style="MARGIN-RIGHT: 0px"> <p><font size="2">Copied from: Files Collected<br />==========================<br />Contents of: del.bat<br />================</font></p> <p><font size="2">@echo off<br />:repeat<br />del "%1"<br />if exist "%1" goto repeat<br />del "C:\WINNT\TEMP\del.bat"</font></p> <p><font size="2">Copied from: Date View<br />==========================<br />2005-01-09&nbsp;&nbsp; 17:08:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINNT\system32 -&nbsp; 51,733&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; plugin1.dat<br />2005-01-09&nbsp;&nbsp; 17:08:00&nbsp;&nbsp; | dir_creation_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINNT\Temp -&nbsp; 84&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; del.bat<br />2005-01-09&nbsp;&nbsp; 17:08:00&nbsp;&nbsp; | dir_last_access_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINNT\Temp -&nbsp; 84&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; del.bat<br />2005-01-09&nbsp;&nbsp; 17:08:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINNT\Temp -&nbsp; 84&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; del.bat<br />2005-01-09&nbsp;&nbsp; 17:09:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINNT\system32 -&nbsp; 51,733&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; plugin1.dat</font><br /></p></blockquote> <p>So what I found interesting about this batch file is that it's like&nbsp;a crude dead mans switch.&nbsp; Delete whatever I pass in on the command line and then delete myself when done - nice.&nbsp; So say I start a server process and its running and then I call this batch file with the path to the server process as the first parameter.&nbsp; If the file is in use, the delete operation will fail and this batch file will simpy&nbsp;loop until the process is ended (assuming a process or a DLL is what is being passed in to the batch file as %1) and the file can finally be deleted.&nbsp; Finally - when the filename I pass in to the batch file as %1 does finally manage to get deleted - the batch file will delete itself . . . since it was still there - it doesn't look like it was ever called.</p> <p>After this series of events - all was quiet on this server until a few days later when all we see is the previously downloaded malware that was placed in the IE TIF folder get accessed (although this looks to have been due to an incremental backup of the file system by some backup network backup software according to the event log):</p> <blockquote dir="ltr" style="MARGIN-RIGHT: 0px"> <p><font size="2">Copied from: Date View<br />==========================<br />2005-01-14&nbsp;&nbsp; 00:00:00&nbsp;&nbsp; | dir_last_access_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\Documents and Settings\Default User\Local Settings\Temporary Internet Files\Content.IE5\41YZG527 -&nbsp; 2,539,520 winzip~1.exe&nbsp;&nbsp;&nbsp; winzip81sr1eval[1].exe<br />2005-01-14&nbsp;&nbsp; 00:00:00&nbsp;&nbsp; | dir_last_access_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\Documents and Settings\Default User\Local Settings\Temporary Internet Files\Content.IE5\G5AZ8XYZ -&nbsp; 464,957 nfs-cd~1.zip&nbsp;&nbsp;&nbsp; nfs-cd[1].zip<br />2005-01-14&nbsp;&nbsp; 00:00:00&nbsp;&nbsp; | dir_last_access_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\Documents and Settings\Default User\Local Settings\Temporary Internet Files\Content.IE5\QDF591YV -&nbsp; 2,628,632 lusetu~1.exe&nbsp;&nbsp;&nbsp; lusetup[1].exe<br />2005-01-14&nbsp;&nbsp; 00:00:31&nbsp;&nbsp; | security_eventlog.txt&nbsp;&nbsp; |&nbsp;&nbsp; 8&nbsp;2&nbsp;538&nbsp;Security&nbsp;SERVERNAME\IUSR_SERVERNAME&nbsp;&nbsp;SERVERNAME&nbsp;IUSR_SERVERNAME&nbsp;SERVERNAME&nbsp;(0x0,0xA1207C)&nbsp;3&nbsp;<br />2005-01-14&nbsp;&nbsp; 00:01:00&nbsp;&nbsp; | dir_last_access_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\Documents and Settings\Default User\Local Settings\Temporary Internet Files\Content.IE5\STMBS1EB -&nbsp; 2,848,655 aim_1_~1.exe&nbsp;&nbsp;&nbsp; aim[1].exe<br /></font></p></blockquote> <p>Then all was quiet again for few more days and then on the 20th it looks like someone updated the main piece of malware the morning that the IR process kicked into gear:</p> <blockquote dir="ltr" style="MARGIN-RIGHT: 0px"> <p><font size="2">Copied from: Date View<br />==========================<br />2005-01-20&nbsp;&nbsp; 08:15:00&nbsp;&nbsp; | dir_last_write_time_C_drive.txt&nbsp;&nbsp; |&nbsp;&nbsp; c:\WINNT\system32 -&nbsp; 19,788&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; przsvc.exe</font></p></blockquote> <p>What's interesting is the way in which this malware (have not received a specimen yet) was loading - it was using a lesser known autostart technique that has been used in the past by things like Beast and Sub7.</p> <blockquote dir="ltr" style="MARGIN-RIGHT: 0px"> <p><font size="2">Copied from: Search Results for: przsvc.exe<br />==========================<br />Files containing instances of 'przsvc.exe'</font></p> <p><font size="2">Number of Files Searched: 1<br />Time to Search Files: 0 seconds</font></p> <p><font size="2">registry.txt<br />====================<br />&nbsp;&nbsp; [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9F81D88C-C298-9935-C5D1-40AA4DB91155}]<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "stubpath"=(REG_EXPAND_SZ)"C:\\WINNT\\system32\\przsvc.exe s"<br /></font></p></blockquote> <p>So to conclude, I have a theory based on suspicious WINS related event log entries that this box was comrpomised using a WINS remote shell exploit.&nbsp; Fortunately we have a tool that allows me to get the patch-level of a machine during the data collection phase - MBSA.&nbsp; MBSA was able to show me what I needed to see:</p> <blockquote dir="ltr" style="MARGIN-RIGHT: 0px"> <p><font size="2">Copied from: mbsacli_patch_status.txt<br />==========================<br />&nbsp;Patch NOT Found&nbsp;MS04-041&nbsp;885836<br />&nbsp;A required registry key does not exist.&nbsp; It is necessary in order <br />&nbsp;for this patch to be considered installed.&nbsp; <br />&nbsp;[SOFTWARE\Microsoft\Windows <br />&nbsp;NT\CurrentVersion\Hotfix\KB885836\Installed]</font></p> <p><font size="2">&nbsp;Patch NOT Found&nbsp;MS04-043&nbsp;873339<br />&nbsp;File version is less than expected.<br />&nbsp;[C:\WINNT\system32\hypertrm.dll, 5.0.2195.6684 &lt; 5.0.2195.7000]</font></p> <p><font size="2">&nbsp;Patch NOT Found&nbsp;MS04-044&nbsp;885835<br />&nbsp;File version is less than expected.<br />&nbsp;[C:\WINNT\system32\lsasrv.dll, 5.0.2195.6902 &lt; 5.0.2195.6987]</font></p> <p><font color="#ff0000" size="2">&nbsp;Patch NOT Found&nbsp;MS04-045&nbsp;870763<br />&nbsp;File version is less than expected.<br />&nbsp;[C:\WINNT\system32\wins.exe, 5.0.2195.6870 &lt; 5.0.2195.7005]</font></p></blockquote> <p dir="ltr">Ouch baby - very ouch.</p> <blockquote dir="ltr" style="MARGIN-RIGHT: 0px"> <p><br /><font size="2">Copied from: mbsacli_patch_status.txt<br />==========================<br />&nbsp;* SQL SERVER 2000 GOLD</font></p> <p><font size="2">&nbsp;Warning&nbsp;&nbsp;&nbsp;<br />&nbsp;The latest service pack for this product is not installed.&nbsp; <br />&nbsp;Currently SQL Server 2000 Gold is installed.&nbsp; The latest service <br />&nbsp;pack is SQL Server 2000 SP3.</font></p> <p><font size="2">&nbsp;Patch NOT Found&nbsp;MS00-092&nbsp;280380<br />&nbsp;File version is less than expected.<br />&nbsp;[d:\program files\microsoft sql server\MSSQL\binn\odsole70.dll, <br />&nbsp;2000.80.194.0 &lt; 2000.80.223.0]</font></p> <p><font size="2">&nbsp;Patch NOT Found&nbsp;MS01-032&nbsp;299717<br />&nbsp;File version is less than expected.<br />&nbsp;[d:\program files\microsoft sql server\MSSQL\binn\sqlservr.exe, <br />&nbsp;2000.80.194.0 &lt; 2000.80.296.0]</font></p> <p><font size="2">&nbsp;Patch NOT Found&nbsp;MS01-041&nbsp;298012<br />&nbsp;File version is less than expected.<br />&nbsp;[d:\program files\microsoft sql server\MSSQL\binn\ssmsrp70.dll, <br />&nbsp;2000.80.194.0 &lt; 2000.80.213.0]</font></p> <p><font size="2">&nbsp;Note&nbsp;&nbsp;MS02-035&nbsp;263968<br />&nbsp;Please refer to 306460 for a detailed explanation.</font></p></blockquote> <p>This box is at severe risk as it is missing multiple security updates that are remotely exploitable including SQL updates!&nbsp; Worse still - the box only has a 6 character minimum password policy and the passwords never expire!&nbsp; </p> <p>Given that this box was not behind a firewall it's only a matter of time before the admin password is guessed and/or another remotely exploitable vulnerability is used to take control of this machine.</p> <blockquote dir="ltr" style="MARGIN-RIGHT: 0px"> <p><br /><font size="2">Copied from: net_accounts.txt<br />==========================<br />Thu Jan 20 16:11:24 2005<br />Force user logoff how long after time expires?:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Never<br />Minimum password age (days):&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0<br />Maximum password age (days):&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Unlimited<br />Minimum password length:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 6<br />Length of password history maintained:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2<br />Lockout threshold:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 5<br />Lockout duration (minutes):&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 5<br />Lockout observation window (minutes):&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 5<br />Computer role:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SERVER<br />The command completed successfully.</font> <br /></p></blockquote> <p>Our advice to this customer is to follow standard best practices for internet facing boxes as documented in all of our Windows 2000 hardening guides which can be found at <a href="http://www.microsoft.com/security/guidance">http://www.microsoft.com/security/guidance</a></p> <p>At the very least they need to immediately consider:</p> <ol> <li>Increasing the strength of their password policy (I recommend 10 character or more minimums and educate people about the use of pass-phrases) <li>Set a password expiration of no more than 70 days <li>Shut down un-needed servcies (this box was running everything and then some) <li>Install all critical security updates for both the OS&nbsp;<em>and</em> the server applications within 24 hours (even more critical since this box is plugged directly into the Internet with an Internet routable IP) or better yet turn on Automatic Updates or consider using SUS etc. <li>For the love of God use a firewall to screen inbound access to some of those high profile ports!</li></ol> <p>On the plus side this customer DID have account logon auditing enabled on this server and I can confirm that no Windows accounts were harmed in taking over of this server (this time).</p> <blockquote dir="ltr" style="MARGIN-RIGHT: 0px"> <p><font size="2"></font><font size="2">&nbsp;</p></font></blockquote><img src="http://blogs.technet.com/aggbug.aspx?PostID=361800" width="1" height="1">