str.sys - Dangerous
str.sys
Manual removal instructions:
Antivirus Report of str.sys:
str.sys
We suggest you to remove str.sys from your computer as soon as possible.
Str.sys is Trojan/Backdoor.
Kill the file str.sys and remove str.sys from Windows startup.
Classification:
Antivirus Version Last Update Result
AVG 8.5.0.339 2009.06.02 Agent_r.NU
BitDefender 7.2 2009.06.02 Trojan.Generic.CJ.LY
DrWeb 5.0.0.12182 2009.06.02 Trojan.MulDrop.31446
F-Secure 8.0.14470.0 2009.06.02 Trojan.Win32.Agent.ckiz
Symantec 1.4.4.12 2009.06.02 Trojan Horse
VBA32 3.12.10.6 2009.06.02 Rootkit.Win32.Samidi.gen
Additional information
File size: 96256 bytes
MD5 : ccea85657ccd4982430336771be1b2
14
SHA1 : ea763b02aca13ffbc8f798bc3559e2d9160311ba
Installation
When the program is executed, it creates the following registry subkeys and values:
----------------------------------
Keys deleted:0
----------------------------------
----------------------------------
Keys added:4
----------------------------------
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_DXPTZJMCWETFMBH
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_DXPTZJMCWETFMBH\0000
HKLM\SYSTEM\CurrentControlSet\Services\dxptzjmcwetfmbh
HKLM\SYSTEM\CurrentControlSet\Services\dxptzjmcwetfmbh\Security
----------------------------------
Values deleted:0
----------------------------------
----------------------------------
Values added:14
----------------------------------
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_DXPTZJMCWETFMBH\0000\Service: "dxptzjmcwetfmbh"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_DXPTZJMCWETFMBH\0000\Legacy: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_DXPTZJMCWETFMBH\0000\ConfigFlags: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_DXPTZJMCWETFMBH\0000\Class: "LegacyDriver"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_DXPTZJMCWETFMBH\0000\ClassGUID: "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_DXPTZJMCWETFMBH\0000\DeviceDesc: "dxptzjmcwetfmbh"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_DXPTZJMCWETFMBH\NextInstance: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\dxptzjmcwetfmbh\Security\Security: 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD 01 02 00 01 01 00 00 00 00 00 05 12 00 00 00 00 00 18 00 FF 01 0F 00 01 02 00 00 00 00 00 05 20 00 00 00 20 02 00 00 00 00 14 00 8D 01 02 00 01 01 00 00 00 00 00 05 0B 00 00 00 00 00 18 00 FD 01 02 00 01 02 00 00 00 00 00 05 20 00 00 00 23 02 00 00 01 01 00 00 00 00 00 05 12 00 00 00 01 01 00 00 00 00 00 05 12 00 00 00
HKLM\SYSTEM\CurrentControlSet\Services\dxptzjmcwetfmbh\Type: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\dxptzjmcwetfmbh\Start: 0x00000002
HKLM\SYSTEM\CurrentControlSet\Services\dxptzjmcwetfmbh\ErrorControl: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Services\dxptzjmcwetfmbh\ImagePath: "\??\C:\WINDOWS\system32\drivers\agseylycllw.sys"
HKLM\SYSTEM\CurrentControlSet\Services\dxptzjmcwetfmbh\DisplayName: "dxptzjmcwetfmbh"
HKLM\SYSTEM\CurrentControlSet\Services\dxptzjmcwetfmbh\RulesData: 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7E 00 5C 00 52 00 45 00 47 00 49 00 53 00 54 00 52 00 59 00 5C 00 4D 00 41 00 43 00 48 00 49 00 4E 00 45 00 5C 00 53 00 59 00 53 00 54 00 45 00 4D 00 5C 00 43 00 6F 00 6E 00 74 00 72 00 6F 00 6C 00 53 00 65 00 74 00 30 00 30 00 31 00 5C 00 53 00 65 00 72 00 76 00 69 00 63 00 65 00 73 00 5C 00 64 00 78 00 70 00 74 00 7A 00 6A 00 6D 00 63 00 77 00 65 00 74 00 66 00 6D 00 62 00 68 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 5C 00 44 00 65 00 76 00 69 00 63 00 65 00 5C 00 48 00 61 00 72 00 64 00 64 00 69 00 73 00 6B 00 56 00 6F 00 6C 00 75 00 6D 00 65 00 31 00 5C 00 57 00 49 00 4E 00 44 00 4F 00 57 00 53 00 5C 00 73 00 79 00 73 00 74 00 65 00 6D 00 33 00 32 00 5C 00 64 00 72 00 69 00 76 00 65 00 72 00 73 00 5C 00 61 00 67 00 73 00 65 00 79 00 6C 00 79 00 63 00 6C 00 6C 00 77 00 2E 00 73 00 79 00 73 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 70 00 5C 00 44 00 65 00 76 00 69 00 63 00 65 00 5C 00 48 00 61 00 72 00 64 00 64 00 69 00 73 00 6B 00 56 00 6F 00 6C 00 75 00 6D 00 65 00 31 00 5C 00 57 00 49 00 4E 00 44 00 4F 00 57 00 53 00 5C 00 73 00 79 00 73 00 74 00 65 00 6D 00 33 00 32 00 5C 00 64 00 72 00 69 00 76 00 65 00 72 00 73 00 5C 00 73 00 74 00 72 00 2E 00 73 00 79 00 73 00 00 00
----------------------------------
Values modified:0
----------------------------------
----------------------------------
Files added:2
----------------------------------
C:\WINDOWS\system32\drivers\agseylycllw.sys
C:\WINDOWS\system32\drivers\str.sys
----------------------------------
Files deleted:1
----------------------------------
C:\sand-box\3.exe
----------------------------------
Files [attributes?] modified:0
----------------------------------
----------------------------------
Folders added:0
----------------------------------
----------------------------------
Folders deleted:0
----------------------------------
----------------------------------
Total changes:21
----------------------------------
-------------------------------------------------------------------------------------
Detected by RegRun Reanimator:
Type: Services detected by Partizan
Item Name: dxptzjmcwetfmbh
Related File: \??\C:\WINDOWS\system32\drivers\agseylycllw.sys
Removal Results: Success
Number of reboot: 2
str.sys | Malware |
str.sys | Dangerous |
str.sys | High Risk |
Str.sys is Trojan/Backdoor.
Kill the file str.sys and remove str.sys from Windows startup.
Classification:
Antivirus Version Last Update Result
AVG 8.5.0.339 2009.06.02 Agent_r.NU
BitDefender 7.2 2009.06.02 Trojan.Generic.CJ.LY
DrWeb 5.0.0.12182 2009.06.02 Trojan.MulDrop.31446
F-Secure 8.0.14470.0 2009.06.02 Trojan.Win32.Agent.ckiz
Symantec 1.4.4.12 2009.06.02 Trojan Horse
VBA32 3.12.10.6 2009.06.02 Rootkit.Win32.Samidi.gen
Additional information
File size: 96256 bytes
MD5 : ccea85657ccd4982430336771be1b2
14
SHA1 : ea763b02aca13ffbc8f798bc3559e2d9160311ba
Installation
When the program is executed, it creates the following registry subkeys and values:
----------------------------------
Keys deleted:0
----------------------------------
----------------------------------
Keys added:4
----------------------------------
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_DXPTZJMCWETFMBH
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_DXPTZJMCWETFMBH\0000
HKLM\SYSTEM\CurrentControlSet\Services\dxptzjmcwetfmbh
HKLM\SYSTEM\CurrentControlSet\Services\dxptzjmcwetfmbh\Security
----------------------------------
Values deleted:0
----------------------------------
----------------------------------
Values added:14
----------------------------------
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_DXPTZJMCWETFMBH\0000\Service: "dxptzjmcwetfmbh"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_DXPTZJMCWETFMBH\0000\Legacy: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_DXPTZJMCWETFMBH\0000\ConfigFlags: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_DXPTZJMCWETFMBH\0000\Class: "LegacyDriver"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_DXPTZJMCWETFMBH\0000\ClassGUID: "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_DXPTZJMCWETFMBH\0000\DeviceDesc: "dxptzjmcwetfmbh"
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_DXPTZJMCWETFMBH\NextInstance: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\dxptzjmcwetfmbh\Security\Security: 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD 01 02 00 01 01 00 00 00 00 00 05 12 00 00 00 00 00 18 00 FF 01 0F 00 01 02 00 00 00 00 00 05 20 00 00 00 20 02 00 00 00 00 14 00 8D 01 02 00 01 01 00 00 00 00 00 05 0B 00 00 00 00 00 18 00 FD 01 02 00 01 02 00 00 00 00 00 05 20 00 00 00 23 02 00 00 01 01 00 00 00 00 00 05 12 00 00 00 01 01 00 00 00 00 00 05 12 00 00 00
HKLM\SYSTEM\CurrentControlSet\Services\dxptzjmcwetfmbh\Type: 0x00000001
HKLM\SYSTEM\CurrentControlSet\Services\dxptzjmcwetfmbh\Start: 0x00000002
HKLM\SYSTEM\CurrentControlSet\Services\dxptzjmcwetfmbh\ErrorControl: 0x00000000
HKLM\SYSTEM\CurrentControlSet\Services\dxptzjmcwetfmbh\ImagePath: "\??\C:\WINDOWS\system32\drivers\agseylycllw.sys"
HKLM\SYSTEM\CurrentControlSet\Services\dxptzjmcwetfmbh\DisplayName: "dxptzjmcwetfmbh"
HKLM\SYSTEM\CurrentControlSet\Services\dxptzjmcwetfmbh\RulesData: 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7E 00 5C 00 52 00 45 00 47 00 49 00 53 00 54 00 52 00 59 00 5C 00 4D 00 41 00 43 00 48 00 49 00 4E 00 45 00 5C 00 53 00 59 00 53 00 54 00 45 00 4D 00 5C 00 43 00 6F 00 6E 00 74 00 72 00 6F 00 6C 00 53 00 65 00 74 00 30 00 30 00 31 00 5C 00 53 00 65 00 72 00 76 00 69 00 63 00 65 00 73 00 5C 00 64 00 78 00 70 00 74 00 7A 00 6A 00 6D 00 63 00 77 00 65 00 74 00 66 00 6D 00 62 00 68 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 5C 00 44 00 65 00 76 00 69 00 63 00 65 00 5C 00 48 00 61 00 72 00 64 00 64 00 69 00 73 00 6B 00 56 00 6F 00 6C 00 75 00 6D 00 65 00 31 00 5C 00 57 00 49 00 4E 00 44 00 4F 00 57 00 53 00 5C 00 73 00 79 00 73 00 74 00 65 00 6D 00 33 00 32 00 5C 00 64 00 72 00 69 00 76 00 65 00 72 00 73 00 5C 00 61 00 67 00 73 00 65 00 79 00 6C 00 79 00 63 00 6C 00 6C 00 77 00 2E 00 73 00 79 00 73 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 70 00 5C 00 44 00 65 00 76 00 69 00 63 00 65 00 5C 00 48 00 61 00 72 00 64 00 64 00 69 00 73 00 6B 00 56 00 6F 00 6C 00 75 00 6D 00 65 00 31 00 5C 00 57 00 49 00 4E 00 44 00 4F 00 57 00 53 00 5C 00 73 00 79 00 73 00 74 00 65 00 6D 00 33 00 32 00 5C 00 64 00 72 00 69 00 76 00 65 00 72 00 73 00 5C 00 73 00 74 00 72 00 2E 00 73 00 79 00 73 00 00 00
----------------------------------
Values modified:0
----------------------------------
----------------------------------
Files added:2
----------------------------------
C:\WINDOWS\system32\drivers\agseylycllw.sys
C:\WINDOWS\system32\drivers\str.sys
----------------------------------
Files deleted:1
----------------------------------
C:\sand-box\3.exe
----------------------------------
Files [attributes?] modified:0
----------------------------------
----------------------------------
Folders added:0
----------------------------------
----------------------------------
Folders deleted:0
----------------------------------
----------------------------------
Total changes:21
----------------------------------
-------------------------------------------------------------------------------------
Detected by RegRun Reanimator:
Type: Services detected by Partizan
Item Name: dxptzjmcwetfmbh
Related File: \??\C:\WINDOWS\system32\drivers\agseylycllw.sys
Removal Results: Success
Number of reboot: 2
Dmitry Sokolov:
I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.
Since that time I work every day to fix the issues that antiviruses cannot.
If your antivirus have not helped you solve the problem, you should try UnHackMe.
We are a small company and you can ask me directly, if you have any questions.