I've been able to use DirQuery by AD successfully in the past.
Now, I am a bit stumped.
This is showing up in the process list: "\\.\globalroot\Device\svchost.exe\svchost.exe"
When I attempt to do DirQuery, the result is this:
Running from: C:\Documents and Settings\Jeff\Desktop\DirQuery.exe
Log file at : C:\Documents and Settings\Jeff\Desktop\DirQuery.txt
The driver that owns the link:
\\.\globalroot\Device\svchost.exe
is located at:
́́́́́́́́́́́́́́́́́́́Ȑ́́́́́́́̂̂̂̂̂̂̂̂̂̂̂̂̂̂̂̂̂̂̂̂̂̂̂̂Ȑ̂̂̂̂̂̂̂̂Ġ̂Ԅ܆ईଊഌ༎ ᄐጒᔔᤘᬚᴜ℠⌢┤✦⤨⬪⼮㌲㔴㜶㤸㬺㴼㼾䅀䍂䕄䝆䥈䭊䵌低児卒啔坖奘孚嵜彞䅠䍂䕄䝆䥈䭊䵌低児卒啔坖奘筚Ⳏ粑ⴄ粑粑粑f
and the device link is:
Ề%Ȉ
Was the location and device link encrypted, or was this an invalid read?
When I punch that information in to a translator, it reads it as Chinese text, with the only noticeable words in it are "Death Qijizangbi" as if that is the name of the developer of the infection currently testing (AV Pro 2010).
Now, I am a bit stumped.
This is showing up in the process list: "\\.\globalroot\Device\svchost.exe\svchost.exe"
When I attempt to do DirQuery, the result is this:
Running from: C:\Documents and Settings\Jeff\Desktop\DirQuery.exe
Log file at : C:\Documents and Settings\Jeff\Desktop\DirQuery.txt
The driver that owns the link:
\\.\globalroot\Device\svchost.exe
is located at:
́́́́́́́́́́́́́́́́́́́Ȑ́́́́́́́̂̂̂̂̂̂̂̂̂̂̂̂̂̂̂̂̂̂̂̂̂̂̂̂Ȑ̂̂̂̂̂̂̂̂Ġ̂Ԅ܆ईଊഌ༎ ᄐጒᔔᤘᬚᴜ℠⌢┤✦⤨⬪⼮㌲㔴㜶㤸㬺㴼㼾䅀䍂䕄䝆䥈䭊䵌低児卒啔坖奘孚嵜彞䅠䍂䕄䝆䥈䭊䵌低児卒啔坖奘筚Ⳏ粑ⴄ粑粑粑f
and the device link is:
Ề%Ȉ
Was the location and device link encrypted, or was this an invalid read?
When I punch that information in to a translator, it reads it as Chinese text, with the only noticeable words in it are "Death Qijizangbi" as if that is the name of the developer of the infection currently testing (AV Pro 2010).
Jay
seCURE Connexion Consultant
seCURE Connexion Consultant