Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Avira "Hidden Objects" & trojan issue


  • This topic is locked This topic is locked
9 replies to this topic

#1 dave1972

dave1972

  • Members
  • 45 posts
  • OFFLINE
  •  
  • Local time:03:43 AM

Posted 31 August 2010 - 08:17 AM

Hey all. Recently I've had Avira antivirus detect a TR/Trash.Gen Trojan which it seems to have got rid of though now Avira reports that I have 17 hidden objects (previously 15) on my computer. :flowers:

Here is a previous scan report showing the Trojan...

Avira AntiVir Personal
Report file date: 30 August 2010 20:59

Scanning for 2763023 virus strains and unwanted programs.

The program is running as an unrestricted full version.
Online services are available:

Licensee : Avira AntiVir Personal - FREE Antivirus
Serial number : 00001*******************
Platform : Windows XP
Windows version : (Service Pack 3) [5.1.2600]
Boot mode : Normally booted
Username : SYSTEM
Computer name : DAVE

Version information:
BUILD.DAT : 10.0.0.567 32097 Bytes 4/19/2010 15:07:00
AVSCAN.EXE : 10.0.3.0 433832 Bytes 4/20/2010 21:02:20
AVSCAN.DLL : 10.0.3.0 46440 Bytes 4/20/2010 21:02:19
LUKE.DLL : 10.0.2.3 104296 Bytes 3/7/2010 18:33:04
LUKERES.DLL : 10.0.0.1 12648 Bytes 2/10/2010 23:40:49
VBASE000.VDF : 7.10.0.0 19875328 Bytes 11/6/2009 07:35:52
VBASE001.VDF : 7.10.1.0 1372672 Bytes 11/19/2009 12:18:49
VBASE002.VDF : 7.10.3.1 3143680 Bytes 1/20/2010 12:19:48
VBASE003.VDF : 7.10.3.75 996864 Bytes 1/26/2010 12:19:59
VBASE004.VDF : 7.10.4.203 1579008 Bytes 3/5/2010 11:26:18
VBASE005.VDF : 7.10.6.82 2494464 Bytes 4/15/2010 19:10:29
VBASE006.VDF : 7.10.7.218 2294784 Bytes 6/2/2010 21:28:48
VBASE007.VDF : 7.10.9.165 4840960 Bytes 7/23/2010 09:07:05
VBASE008.VDF : 7.10.9.166 2048 Bytes 7/23/2010 09:07:05
VBASE009.VDF : 7.10.9.167 2048 Bytes 7/23/2010 09:07:05
VBASE010.VDF : 7.10.9.168 2048 Bytes 7/23/2010 09:07:05
VBASE011.VDF : 7.10.9.169 2048 Bytes 7/23/2010 09:07:05
VBASE012.VDF : 7.10.9.170 2048 Bytes 7/23/2010 09:07:06
VBASE013.VDF : 7.10.9.198 157696 Bytes 7/26/2010 09:07:07
VBASE014.VDF : 7.10.9.255 997888 Bytes 7/29/2010 09:07:11
VBASE015.VDF : 7.10.10.28 139264 Bytes 8/2/2010 19:11:58
VBASE016.VDF : 7.10.10.52 127488 Bytes 8/3/2010 19:11:59
VBASE017.VDF : 7.10.10.84 137728 Bytes 8/6/2010 19:21:36
VBASE018.VDF : 7.10.10.107 176640 Bytes 8/9/2010 19:12:31
VBASE019.VDF : 7.10.10.130 132608 Bytes 8/10/2010 19:12:32
VBASE020.VDF : 7.10.10.158 131072 Bytes 8/12/2010 10:21:47
VBASE021.VDF : 7.10.10.190 136704 Bytes 8/16/2010 10:21:48
VBASE022.VDF : 7.10.10.217 118272 Bytes 8/19/2010 17:40:23
VBASE023.VDF : 7.10.10.246 130048 Bytes 8/23/2010 13:04:14
VBASE024.VDF : 7.10.11.11 144896 Bytes 8/25/2010 13:04:15
VBASE025.VDF : 7.10.11.33 135168 Bytes 8/27/2010 13:04:15
VBASE026.VDF : 7.10.11.34 2048 Bytes 8/27/2010 13:04:15
VBASE027.VDF : 7.10.11.35 2048 Bytes 8/27/2010 13:04:16
VBASE028.VDF : 7.10.11.36 2048 Bytes 8/27/2010 13:04:16
VBASE029.VDF : 7.10.11.37 2048 Bytes 8/27/2010 13:04:16
VBASE030.VDF : 7.10.11.38 2048 Bytes 8/27/2010 13:04:16
VBASE031.VDF : 7.10.11.47 102400 Bytes 8/30/2010 13:04:17
Engineversion : 8.2.4.46
AEVDF.DLL : 8.1.2.1 106868 Bytes 8/1/2010 09:07:28
AESCRIPT.DLL : 8.1.3.44 1364346 Bytes 8/30/2010 13:04:27
AESCN.DLL : 8.1.6.1 127347 Bytes 5/17/2010 20:15:27
AESBX.DLL : 8.1.3.1 254324 Bytes 4/26/2010 11:23:45
AERDL.DLL : 8.1.8.2 614772 Bytes 8/1/2010 09:07:25
AEPACK.DLL : 8.2.3.5 471412 Bytes 8/6/2010 19:21:47
AEOFFICE.DLL : 8.1.1.8 201081 Bytes 8/1/2010 09:07:23
AEHEUR.DLL : 8.1.2.19 2867574 Bytes 8/30/2010 13:04:24
AEHELP.DLL : 8.1.13.3 242038 Bytes 8/30/2010 13:04:18
AEGEN.DLL : 8.1.3.20 397684 Bytes 8/30/2010 13:04:18
AEEMU.DLL : 8.1.2.0 393588 Bytes 4/26/2010 11:23:42
AECORE.DLL : 8.1.16.2 192887 Bytes 8/1/2010 09:07:15
AEBB.DLL : 8.1.1.0 53618 Bytes 4/26/2010 11:23:41
AVWINLL.DLL : 10.0.0.0 19304 Bytes 1/14/2010 12:03:38
AVPREF.DLL : 10.0.0.0 44904 Bytes 1/14/2010 12:03:35
AVREP.DLL : 10.0.0.8 62209 Bytes 2/18/2010 16:47:40
AVREG.DLL : 10.0.3.0 53096 Bytes 4/20/2010 21:02:20
AVSCPLR.DLL : 10.0.3.0 83816 Bytes 4/20/2010 21:02:20
AVARKT.DLL : 10.0.0.14 227176 Bytes 4/20/2010 21:02:19
AVEVTLOG.DLL : 10.0.0.8 203112 Bytes 1/26/2010 09:53:30
SQLITE3.DLL : 3.6.19.0 355688 Bytes 1/28/2010 12:57:58
AVSMTP.DLL : 10.0.0.17 63848 Bytes 3/16/2010 15:38:56
NETNT.DLL : 10.0.0.0 11624 Bytes 2/19/2010 14:41:00
RCIMAGE.DLL : 10.0.0.26 2550120 Bytes 1/28/2010 13:10:20
RCTEXT.DLL : 10.0.53.0 97128 Bytes 4/20/2010 21:02:19

Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: c:\program files\avira\antivir desktop\sysscan.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:, D:,
Process scan........................: on
Extended process scan...............: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium
Deviating risk categories...........: +APPL,+GAME,+JOKE,+PCK,+PFS,+SPR,

Start of the scan: 30 August 2010 20:59

Starting search for hidden objects.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\qtcnwzpx\type
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\qtcnwzpx\start
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\qtcnwzpx\errorcontrol
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\qtcnwzpx\group
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\qtcnwzpx\group
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\qtcnwzpx\gm6hc4ts1i
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\qtcnwzpx\yi6ep4vq
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\qtcnwzpx\o3cr4l1q
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet003\Services\qtcnwzpx\type
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet003\Services\qtcnwzpx\start
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet003\Services\qtcnwzpx\errorcontrol
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet003\Services\qtcnwzpx\gm6hc4ts1i
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet003\Services\qtcnwzpx\yi6ep4vq
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet003\Services\qtcnwzpx\o3cr4l1q
[NOTE] The registry entry is invisible.
c:\windows\system32\regsvr32.exe
c:\WINDOWS\system32\regsvr32.exe
[NOTE] The process is not visible.

The scan of running processes will be started
Scan process 'rsmsink.exe' - '31' Module(s) have been scanned
Scan process 'msdtc.exe' - '42' Module(s) have been scanned
Scan process 'dllhost.exe' - '63' Module(s) have been scanned
Scan process 'dllhost.exe' - '47' Module(s) have been scanned
Scan process 'vssvc.exe' - '50' Module(s) have been scanned
Scan process 'avscan.exe' - '69' Module(s) have been scanned
Scan process 'avcenter.exe' - '65' Module(s) have been scanned
Scan process 'iPodService.exe' - '32' Module(s) have been scanned
Scan process 'ONENOTEM.EXE' - '24' Module(s) have been scanned
Scan process 'SuperHybridEngine.exe' - '28' Module(s) have been scanned
Scan process 'ctfmon.exe' - '28' Module(s) have been scanned
Scan process 'GoogleToolbarNotifier.exe' - '58' Module(s) have been scanned
Scan process 'TeaTimer.exe' - '37' Module(s) have been scanned
Scan process 'Eee Docking.exe' - '23' Module(s) have been scanned
Scan process 'RTHDCPL.EXE' - '39' Module(s) have been scanned
Scan process 'iTunesHelper.exe' - '72' Module(s) have been scanned
Scan process 'avgnt.exe' - '56' Module(s) have been scanned
Scan process 'jusched.exe' - '23' Module(s) have been scanned
Scan process 'LiveUpdate.exe' - '47' Module(s) have been scanned
Scan process 'AsScrPro.exe' - '27' Module(s) have been scanned
Scan process 'igfxsrvc.exe' - '30' Module(s) have been scanned
Scan process 'igfxext.exe' - '28' Module(s) have been scanned
Scan process 'SynTPEnh.exe' - '30' Module(s) have been scanned
Scan process 'hkcmd.exe' - '29' Module(s) have been scanned
Scan process 'igfxtray.exe' - '30' Module(s) have been scanned
Scan process 'AsTray.exe' - '35' Module(s) have been scanned
Scan process 'AsEPCMon.exe' - '22' Module(s) have been scanned
Scan process 'AsAcpiSvr.exe' - '41' Module(s) have been scanned
Scan process 'Explorer.EXE' - '130' Module(s) have been scanned
Scan process 'alg.exe' - '35' Module(s) have been scanned
Scan process 'btwdins.exe' - '28' Module(s) have been scanned
Scan process 'svchost.exe' - '43' Module(s) have been scanned
Scan process 'SeaPort.exe' - '47' Module(s) have been scanned
Scan process 'jqs.exe' - '35' Module(s) have been scanned
Scan process 'avshadow.exe' - '28' Module(s) have been scanned
Scan process 'mDNSResponder.exe' - '35' Module(s) have been scanned
Scan process 'AppleMobileDeviceService.exe' - '35' Module(s) have been scanned
Scan process 'avguard.exe' - '57' Module(s) have been scanned
Scan process 'svchost.exe' - '36' Module(s) have been scanned
Scan process 'sched.exe' - '45' Module(s) have been scanned
Scan process 'spoolsv.exe' - '65' Module(s) have been scanned
Scan process 'svchost.exe' - '39' Module(s) have been scanned
Scan process 'svchost.exe' - '34' Module(s) have been scanned
Scan process 'svchost.exe' - '32' Module(s) have been scanned
Scan process 'svchost.exe' - '173' Module(s) have been scanned
Scan process 'svchost.exe' - '41' Module(s) have been scanned
Scan process 'svchost.exe' - '55' Module(s) have been scanned
Scan process 'lsass.exe' - '60' Module(s) have been scanned
Scan process 'services.exe' - '59' Module(s) have been scanned
Scan process 'winlogon.exe' - '78' Module(s) have been scanned
Scan process 'csrss.exe' - '14' Module(s) have been scanned
Scan process 'smss.exe' - '2' Module(s) have been scanned

Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!

Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!
Boot sector 'D:\'
[INFO] No virus was found!

Starting to scan executable files (registry).
The registry was scanned ( '1669' files ).


Starting the file scan:

Begin scan in 'C:\'
C:\System Volume Information\_restore{C5723442-0BB4-47D1-BD0E-A6181D2923BF}\RP46\A0018493.dll
[DETECTION] Is the TR/Trash.Gen Trojan
C:\System Volume Information\_restore{C5723442-0BB4-47D1-BD0E-A6181D2923BF}\RP46\A0018494.exe
[DETECTION] Is the TR/Trash.Gen Trojan
Begin scan in 'D:\'

Beginning disinfection:
C:\System Volume Information\_restore{C5723442-0BB4-47D1-BD0E-A6181D2923BF}\RP46\A0018494.exe
[DETECTION] Is the TR/Trash.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '47c3b83b.qua'.
C:\System Volume Information\_restore{C5723442-0BB4-47D1-BD0E-A6181D2923BF}\RP46\A0018493.dll
[DETECTION] Is the TR/Trash.Gen Trojan
[NOTE] The file was moved to the quarantine directory under the name '5f54979c.qua'.


End of the scan: 30 August 2010 22:02
Used time: 59:48 Minute(s)

The scan has been done completely.

9474 Scanned directories
255780 Files were scanned
2 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
2 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
255778 Files not concerned
6967 Archives were scanned
0 Warnings
2 Notes
549185 Objects were scanned with rootkit scan
15 Hidden objects were found


-------------------------------------------------------------------------------------------------



I am a little worried that these "hidden objects" could well prove to be harmful so I re ran all scans with Avira and got the following results...



-----------------------------------------------------------------------------------------------

Avira AntiVir Personal
Report file date: 31 August 2010 13:00

Scanning for 2763023 virus strains and unwanted programs.

The program is running as an unrestricted full version.
Online services are available:

Licensee : Avira AntiVir Personal - FREE Antivirus
Serial number : 00001*********************
Platform : Windows XP
Windows version : (Service Pack 3) [5.1.2600]
Boot mode : Normally booted
Username : David
Computer name : DAVE

Version information:
BUILD.DAT : 10.0.0.567 32097 Bytes 4/19/2010 15:07:00
AVSCAN.EXE : 10.0.3.0 433832 Bytes 4/20/2010 21:02:20
AVSCAN.DLL : 10.0.3.0 46440 Bytes 4/20/2010 21:02:19
LUKE.DLL : 10.0.2.3 104296 Bytes 3/7/2010 18:33:04
LUKERES.DLL : 10.0.0.1 12648 Bytes 2/10/2010 23:40:49
VBASE000.VDF : 7.10.0.0 19875328 Bytes 11/6/2009 07:35:52
VBASE001.VDF : 7.10.1.0 1372672 Bytes 11/19/2009 12:18:49
VBASE002.VDF : 7.10.3.1 3143680 Bytes 1/20/2010 12:19:48
VBASE003.VDF : 7.10.3.75 996864 Bytes 1/26/2010 12:19:59
VBASE004.VDF : 7.10.4.203 1579008 Bytes 3/5/2010 11:26:18
VBASE005.VDF : 7.10.6.82 2494464 Bytes 4/15/2010 19:10:29
VBASE006.VDF : 7.10.7.218 2294784 Bytes 6/2/2010 21:28:48
VBASE007.VDF : 7.10.9.165 4840960 Bytes 7/23/2010 09:07:05
VBASE008.VDF : 7.10.9.166 2048 Bytes 7/23/2010 09:07:05
VBASE009.VDF : 7.10.9.167 2048 Bytes 7/23/2010 09:07:05
VBASE010.VDF : 7.10.9.168 2048 Bytes 7/23/2010 09:07:05
VBASE011.VDF : 7.10.9.169 2048 Bytes 7/23/2010 09:07:05
VBASE012.VDF : 7.10.9.170 2048 Bytes 7/23/2010 09:07:06
VBASE013.VDF : 7.10.9.198 157696 Bytes 7/26/2010 09:07:07
VBASE014.VDF : 7.10.9.255 997888 Bytes 7/29/2010 09:07:11
VBASE015.VDF : 7.10.10.28 139264 Bytes 8/2/2010 19:11:58
VBASE016.VDF : 7.10.10.52 127488 Bytes 8/3/2010 19:11:59
VBASE017.VDF : 7.10.10.84 137728 Bytes 8/6/2010 19:21:36
VBASE018.VDF : 7.10.10.107 176640 Bytes 8/9/2010 19:12:31
VBASE019.VDF : 7.10.10.130 132608 Bytes 8/10/2010 19:12:32
VBASE020.VDF : 7.10.10.158 131072 Bytes 8/12/2010 10:21:47
VBASE021.VDF : 7.10.10.190 136704 Bytes 8/16/2010 10:21:48
VBASE022.VDF : 7.10.10.217 118272 Bytes 8/19/2010 17:40:23
VBASE023.VDF : 7.10.10.246 130048 Bytes 8/23/2010 13:04:14
VBASE024.VDF : 7.10.11.11 144896 Bytes 8/25/2010 13:04:15
VBASE025.VDF : 7.10.11.33 135168 Bytes 8/27/2010 13:04:15
VBASE026.VDF : 7.10.11.34 2048 Bytes 8/27/2010 13:04:15
VBASE027.VDF : 7.10.11.35 2048 Bytes 8/27/2010 13:04:16
VBASE028.VDF : 7.10.11.36 2048 Bytes 8/27/2010 13:04:16
VBASE029.VDF : 7.10.11.37 2048 Bytes 8/27/2010 13:04:16
VBASE030.VDF : 7.10.11.38 2048 Bytes 8/27/2010 13:04:16
VBASE031.VDF : 7.10.11.47 102400 Bytes 8/30/2010 13:04:17
Engineversion : 8.2.4.46
AEVDF.DLL : 8.1.2.1 106868 Bytes 8/1/2010 09:07:28
AESCRIPT.DLL : 8.1.3.44 1364346 Bytes 8/30/2010 13:04:27
AESCN.DLL : 8.1.6.1 127347 Bytes 5/17/2010 20:15:27
AESBX.DLL : 8.1.3.1 254324 Bytes 4/26/2010 11:23:45
AERDL.DLL : 8.1.8.2 614772 Bytes 8/1/2010 09:07:25
AEPACK.DLL : 8.2.3.5 471412 Bytes 8/6/2010 19:21:47
AEOFFICE.DLL : 8.1.1.8 201081 Bytes 8/1/2010 09:07:23
AEHEUR.DLL : 8.1.2.19 2867574 Bytes 8/30/2010 13:04:24
AEHELP.DLL : 8.1.13.3 242038 Bytes 8/30/2010 13:04:18
AEGEN.DLL : 8.1.3.20 397684 Bytes 8/30/2010 13:04:18
AEEMU.DLL : 8.1.2.0 393588 Bytes 4/26/2010 11:23:42
AECORE.DLL : 8.1.16.2 192887 Bytes 8/1/2010 09:07:15
AEBB.DLL : 8.1.1.0 53618 Bytes 4/26/2010 11:23:41
AVWINLL.DLL : 10.0.0.0 19304 Bytes 1/14/2010 12:03:38
AVPREF.DLL : 10.0.0.0 44904 Bytes 1/14/2010 12:03:35
AVREP.DLL : 10.0.0.8 62209 Bytes 2/18/2010 16:47:40
AVREG.DLL : 10.0.3.0 53096 Bytes 4/20/2010 21:02:20
AVSCPLR.DLL : 10.0.3.0 83816 Bytes 4/20/2010 21:02:20
AVARKT.DLL : 10.0.0.14 227176 Bytes 4/20/2010 21:02:19
AVEVTLOG.DLL : 10.0.0.8 203112 Bytes 1/26/2010 09:53:30
SQLITE3.DLL : 3.6.19.0 355688 Bytes 1/28/2010 12:57:58
AVSMTP.DLL : 10.0.0.17 63848 Bytes 3/16/2010 15:38:56
NETNT.DLL : 10.0.0.0 11624 Bytes 2/19/2010 14:41:00
RCIMAGE.DLL : 10.0.0.26 2550120 Bytes 1/28/2010 13:10:20
RCTEXT.DLL : 10.0.53.0 97128 Bytes 4/20/2010 21:02:19

Configuration settings for the scan:
Jobname.............................: Scan for Rootkits and active malware
Configuration file..................: C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\PROFILES\rootkit.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Process scan........................: on
Extended process scan...............: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: high
Deviating risk categories...........: +APPL,+GAME,+JOKE,+PCK,+PFS,+SPR,

Start of the scan: 31 August 2010 13:00

Starting search for hidden objects.
HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\RNG\seed
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\qtcnwzpx\type
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\qtcnwzpx\start
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\qtcnwzpx\errorcontrol
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\qtcnwzpx\group
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\qtcnwzpx\group
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\qtcnwzpx\gm6hc4ts1i
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\qtcnwzpx\yi6ep4vq
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet002\Services\qtcnwzpx\o3cr4l1q
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet003\Services\qtcnwzpx\type
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet003\Services\qtcnwzpx\start
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet003\Services\qtcnwzpx\errorcontrol
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet003\Services\qtcnwzpx\gm6hc4ts1i
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet003\Services\qtcnwzpx\yi6ep4vq
[NOTE] The registry entry is invisible.
HKEY_LOCAL_MACHINE\System\ControlSet003\Services\qtcnwzpx\o3cr4l1q
[NOTE] The registry entry is invisible.
c:\program files\eeepc\acpi\asacpisvr.exe
c:\Program Files\EeePC\ACPI\AsAcpiSvr.exe
[NOTE] The process is not visible.
c:\windows\system32\regsvr32.exe
c:\WINDOWS\system32\regsvr32.exe
[NOTE] The process is not visible.

The scan of running processes will be started
Scan process 'rsmsink.exe' - '31' Module(s) have been scanned
Scan process 'msdtc.exe' - '42' Module(s) have been scanned
Scan process 'dllhost.exe' - '63' Module(s) have been scanned
Scan process 'dllhost.exe' - '47' Module(s) have been scanned
Scan process 'vssvc.exe' - '50' Module(s) have been scanned
Scan process 'avscan.exe' - '67' Module(s) have been scanned
Scan process 'avcenter.exe' - '138' Module(s) have been scanned
Scan process 'Safari.exe' - '117' Module(s) have been scanned
Scan process 'iPodService.exe' - '32' Module(s) have been scanned
Scan process 'ONENOTEM.EXE' - '24' Module(s) have been scanned
Scan process 'SuperHybridEngine.exe' - '28' Module(s) have been scanned
Scan process 'ctfmon.exe' - '28' Module(s) have been scanned
Scan process 'GoogleToolbarNotifier.exe' - '58' Module(s) have been scanned
Scan process 'TeaTimer.exe' - '37' Module(s) have been scanned
Scan process 'Eee Docking.exe' - '23' Module(s) have been scanned
Scan process 'RTHDCPL.EXE' - '39' Module(s) have been scanned
Scan process 'iTunesHelper.exe' - '72' Module(s) have been scanned
Scan process 'avgnt.exe' - '48' Module(s) have been scanned
Scan process 'jusched.exe' - '23' Module(s) have been scanned
Scan process 'LiveUpdate.exe' - '47' Module(s) have been scanned
Scan process 'AsScrPro.exe' - '27' Module(s) have been scanned
Scan process 'igfxsrvc.exe' - '30' Module(s) have been scanned
Scan process 'SynTPEnh.exe' - '30' Module(s) have been scanned
Scan process 'igfxext.exe' - '28' Module(s) have been scanned
Scan process 'hkcmd.exe' - '29' Module(s) have been scanned
Scan process 'igfxtray.exe' - '30' Module(s) have been scanned
Scan process 'AsTray.exe' - '35' Module(s) have been scanned
Scan process 'AsEPCMon.exe' - '22' Module(s) have been scanned
Scan process 'AsAcpiSvr.exe' - '41' Module(s) have been scanned
Scan process 'Explorer.EXE' - '123' Module(s) have been scanned
Scan process 'alg.exe' - '35' Module(s) have been scanned
Scan process 'btwdins.exe' - '28' Module(s) have been scanned
Scan process 'svchost.exe' - '44' Module(s) have been scanned
Scan process 'SeaPort.exe' - '47' Module(s) have been scanned
Scan process 'jqs.exe' - '35' Module(s) have been scanned
Scan process 'avshadow.exe' - '28' Module(s) have been scanned
Scan process 'mDNSResponder.exe' - '35' Module(s) have been scanned
Scan process 'AppleMobileDeviceService.exe' - '35' Module(s) have been scanned
Scan process 'avguard.exe' - '57' Module(s) have been scanned
Scan process 'svchost.exe' - '36' Module(s) have been scanned
Scan process 'sched.exe' - '45' Module(s) have been scanned
Scan process 'spoolsv.exe' - '65' Module(s) have been scanned
Scan process 'svchost.exe' - '39' Module(s) have been scanned
Scan process 'svchost.exe' - '34' Module(s) have been scanned
Scan process 'svchost.exe' - '32' Module(s) have been scanned
Scan process 'svchost.exe' - '167' Module(s) have been scanned
Scan process 'svchost.exe' - '41' Module(s) have been scanned
Scan process 'svchost.exe' - '55' Module(s) have been scanned
Scan process 'lsass.exe' - '60' Module(s) have been scanned
Scan process 'services.exe' - '59' Module(s) have been scanned
Scan process 'winlogon.exe' - '78' Module(s) have been scanned
Scan process 'csrss.exe' - '14' Module(s) have been scanned
Scan process 'smss.exe' - '2' Module(s) have been scanned

Starting to scan executable files (registry).
The registry was scanned ( '1669' files ).


Starting the file scan:

Begin scan in 'C:'


End of the scan: 31 August 2010 14:08
Used time: 1:07:28 Hour(s)

The scan has been done completely.

9315 Scanned directories
251256 Files were scanned
0 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
0 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
251256 Files not concerned
6964 Archives were scanned
0 Warnings
0 Notes
544791 Objects were scanned with rootkit scan
17 Hidden objects were found
------------------------------------------------------------------------

What exactly are these hidden objects and could they be harmful?

Thanks in advance for any help :thumbsup:

Edited by dave1972, 31 August 2010 - 08:20 AM.


BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,416 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:43 AM

Posted 01 September 2010 - 12:06 AM

Hello Dave,let's get a second opinionas we may have a rootkit.
We Need to check for Rootkits with RootRepeal
  • Download RootRepeal from the following location and save it to your desktop.
  • Extract RootRepeal.exe from the archive (If you did not use the "Direct Download" mirror).
  • Open Posted Image on your desktop.
  • Click the Posted Image tab.
  • Click the Posted Image button.
  • Check all seven boxes: Posted Image
  • Push Ok
  • Check the box for your main system drive (Usually C:), and press Ok.
  • Allow RootRepeal to run a scan of your system. This may take some time.
  • Once the scan completes, push the Posted Image button. Save the log to your desktop, using a distinctive name, such as RootRepeal.txt. Include this report in your next reply, please.



Next run MBAM (MalwareBytes):

Please download Malwarebytes Anti-Malware (v1.46) and save it to your desktop.
Before you save it rename it to say zztoy.exe


alternate download link 1
alternate download link 2
MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 dave1972

dave1972
  • Topic Starter

  • Members
  • 45 posts
  • OFFLINE
  •  
  • Local time:03:43 AM

Posted 01 September 2010 - 04:23 PM

Hey Boopme! Thanks for the quick reply and assistance :thumbsup:

I have Logs for you.
On a side note, as I was scanning with MBAM, Avira popped up to inform me of an attack by a virus called EXP/Pidief.6685 exploit which it quarantined. Oddly enough MBAM did not catch it at all!

Here is RootRepeal log...


ROOTREPEAL © AD, 2007-2009
==================================================
Scan Start Time: 2010/09/01 21:01
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================

Drivers
-------------------
Name: dump_iaStor.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_iaStor.sys
Address: 0x9EE57000 Size: 892928 File Visible: No Signed: -
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xA3B84000 Size: 49152 File Visible: No Signed: -
Status: -

Hidden/Locked Files
-------------------
Path: C:\WINDOWS\system32\drivers\qtcnwzpx.sys
Status: Locked to the Windows API!

SSDT
-------------------
#: 041 Function Name: NtCreateKey
Status: Hooked by "<unknown>" at address 0xa72bd836

#: 053 Function Name: NtCreateThread
Status: Hooked by "<unknown>" at address 0xa72bd82c

#: 063 Function Name: NtDeleteKey
Status: Hooked by "<unknown>" at address 0xa72bd83b

#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "<unknown>" at address 0xa72bd845

#: 098 Function Name: NtLoadKey
Status: Hooked by "<unknown>" at address 0xa72bd84a

#: 122 Function Name: NtOpenProcess
Status: Hooked by "<unknown>" at address 0xa72bd818

#: 128 Function Name: NtOpenThread
Status: Hooked by "<unknown>" at address 0xa72bd81d

#: 193 Function Name: NtReplaceKey
Status: Hooked by "<unknown>" at address 0xa72bd854

#: 204 Function Name: NtRestoreKey
Status: Hooked by "<unknown>" at address 0xa72bd84f

#: 247 Function Name: NtSetValueKey
Status: Hooked by "<unknown>" at address 0xa72bd840

Stealth Objects
-------------------
Object: Hidden Code [Driver: Ntfs, IRP_MJ_CREATE]
Process: System Address: 0x86f4b1f8 Size: 1148

Hidden Services
-------------------
Service Name: qtcnwzpx
Image Path: C:\WINDOWS\system32\drivers\qtcnwzpx.sys

==EOF==



AND here is MBAM log...



Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4525

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

01/09/2010 21:58:23
mbam-log-2010-09-01 (21-58-23).txt

Scan type: Quick scan
Objects scanned: 159777
Time elapsed: 17 minute(s), 42 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


Have a look at this Avira log too...


Avira AntiVir Personal
Report file date: 01 September 2010 21:52

Scanning for 2771546 virus strains and unwanted programs.

The program is running as an unrestricted full version.
Online services are available:

Licensee : Avira AntiVir Personal - FREE Antivirus
Serial number : 00001*******************
Platform : Windows XP
Windows version : (Service Pack 3) [5.1.2600]
Boot mode : Normally booted
Username : SYSTEM
Computer name : DAVE

Version information:
BUILD.DAT : 10.0.0.567 32097 Bytes 4/19/2010 15:07:00
AVSCAN.EXE : 10.0.3.0 433832 Bytes 4/20/2010 21:02:20
AVSCAN.DLL : 10.0.3.0 46440 Bytes 4/20/2010 21:02:19
LUKE.DLL : 10.0.2.3 104296 Bytes 3/7/2010 18:33:04
LUKERES.DLL : 10.0.0.1 12648 Bytes 2/10/2010 23:40:49
VBASE000.VDF : 7.10.0.0 19875328 Bytes 11/6/2009 07:35:52
VBASE001.VDF : 7.10.1.0 1372672 Bytes 11/19/2009 12:18:49
VBASE002.VDF : 7.10.3.1 3143680 Bytes 1/20/2010 12:19:48
VBASE003.VDF : 7.10.3.75 996864 Bytes 1/26/2010 12:19:59
VBASE004.VDF : 7.10.4.203 1579008 Bytes 3/5/2010 11:26:18
VBASE005.VDF : 7.10.6.82 2494464 Bytes 4/15/2010 19:10:29
VBASE006.VDF : 7.10.7.218 2294784 Bytes 6/2/2010 21:28:48
VBASE007.VDF : 7.10.9.165 4840960 Bytes 7/23/2010 09:07:05
VBASE008.VDF : 7.10.9.166 2048 Bytes 7/23/2010 09:07:05
VBASE009.VDF : 7.10.9.167 2048 Bytes 7/23/2010 09:07:05
VBASE010.VDF : 7.10.9.168 2048 Bytes 7/23/2010 09:07:05
VBASE011.VDF : 7.10.9.169 2048 Bytes 7/23/2010 09:07:05
VBASE012.VDF : 7.10.9.170 2048 Bytes 7/23/2010 09:07:06
VBASE013.VDF : 7.10.9.198 157696 Bytes 7/26/2010 09:07:07
VBASE014.VDF : 7.10.9.255 997888 Bytes 7/29/2010 09:07:11
VBASE015.VDF : 7.10.10.28 139264 Bytes 8/2/2010 19:11:58
VBASE016.VDF : 7.10.10.52 127488 Bytes 8/3/2010 19:11:59
VBASE017.VDF : 7.10.10.84 137728 Bytes 8/6/2010 19:21:36
VBASE018.VDF : 7.10.10.107 176640 Bytes 8/9/2010 19:12:31
VBASE019.VDF : 7.10.10.130 132608 Bytes 8/10/2010 19:12:32
VBASE020.VDF : 7.10.10.158 131072 Bytes 8/12/2010 10:21:47
VBASE021.VDF : 7.10.10.190 136704 Bytes 8/16/2010 10:21:48
VBASE022.VDF : 7.10.10.217 118272 Bytes 8/19/2010 17:40:23
VBASE023.VDF : 7.10.10.246 130048 Bytes 8/23/2010 13:04:14
VBASE024.VDF : 7.10.11.11 144896 Bytes 8/25/2010 13:04:15
VBASE025.VDF : 7.10.11.33 135168 Bytes 8/27/2010 13:04:15
VBASE026.VDF : 7.10.11.52 148992 Bytes 8/31/2010 19:54:25
VBASE027.VDF : 7.10.11.53 2048 Bytes 8/31/2010 19:54:25
VBASE028.VDF : 7.10.11.54 2048 Bytes 8/31/2010 19:54:25
VBASE029.VDF : 7.10.11.55 2048 Bytes 8/31/2010 19:54:25
VBASE030.VDF : 7.10.11.56 2048 Bytes 8/31/2010 19:54:25
VBASE031.VDF : 7.10.11.68 91648 Bytes 9/1/2010 19:54:26
Engineversion : 8.2.4.46
AEVDF.DLL : 8.1.2.1 106868 Bytes 8/1/2010 09:07:28
AESCRIPT.DLL : 8.1.3.44 1364346 Bytes 8/30/2010 13:04:27
AESCN.DLL : 8.1.6.1 127347 Bytes 5/17/2010 20:15:27
AESBX.DLL : 8.1.3.1 254324 Bytes 4/26/2010 11:23:45
AERDL.DLL : 8.1.8.2 614772 Bytes 8/1/2010 09:07:25
AEPACK.DLL : 8.2.3.5 471412 Bytes 8/6/2010 19:21:47
AEOFFICE.DLL : 8.1.1.8 201081 Bytes 8/1/2010 09:07:23
AEHEUR.DLL : 8.1.2.19 2867574 Bytes 8/30/2010 13:04:24
AEHELP.DLL : 8.1.13.3 242038 Bytes 8/30/2010 13:04:18
AEGEN.DLL : 8.1.3.20 397684 Bytes 8/30/2010 13:04:18
AEEMU.DLL : 8.1.2.0 393588 Bytes 4/26/2010 11:23:42
AECORE.DLL : 8.1.16.2 192887 Bytes 8/1/2010 09:07:15
AEBB.DLL : 8.1.1.0 53618 Bytes 4/26/2010 11:23:41
AVWINLL.DLL : 10.0.0.0 19304 Bytes 1/14/2010 12:03:38
AVPREF.DLL : 10.0.0.0 44904 Bytes 1/14/2010 12:03:35
AVREP.DLL : 10.0.0.8 62209 Bytes 2/18/2010 16:47:40
AVREG.DLL : 10.0.3.0 53096 Bytes 4/20/2010 21:02:20
AVSCPLR.DLL : 10.0.3.0 83816 Bytes 4/20/2010 21:02:20
AVARKT.DLL : 10.0.0.14 227176 Bytes 4/20/2010 21:02:19
AVEVTLOG.DLL : 10.0.0.8 203112 Bytes 1/26/2010 09:53:30
SQLITE3.DLL : 3.6.19.0 355688 Bytes 1/28/2010 12:57:58
AVSMTP.DLL : 10.0.0.17 63848 Bytes 3/16/2010 15:38:56
NETNT.DLL : 10.0.0.0 11624 Bytes 2/19/2010 14:41:00
RCIMAGE.DLL : 10.0.0.26 2550120 Bytes 1/28/2010 13:10:20
RCTEXT.DLL : 10.0.53.0 97128 Bytes 4/20/2010 21:02:19

Configuration settings for the scan:
Jobname.............................: avguard_async_scan
Configuration file..................: C:\Documents and Settings\All Users\Application Data\Avira\AntiVir Desktop\TEMP\AVGUARD_afd965d4\guard_slideup.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: quarantine
Scan master boot sector.............: on
Scan boot sector....................: off
Process scan........................: on
Scan registry.......................: off
Search for rootkits.................: off
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: high
Deviating risk categories...........: +APPL,+GAME,+JOKE,+PCK,+PFS,+SPR,

Start of the scan: 01 September 2010 21:52

The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'mbam.exe' - '1' Module(s) have been scanned
Scan process 'Safari.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'iPodService.exe' - '1' Module(s) have been scanned
Scan process 'ONENOTEM.EXE' - '1' Module(s) have been scanned
Scan process 'SuperHybridEngine.exe' - '1' Module(s) have been scanned
Scan process 'ctfmon.exe' - '1' Module(s) have been scanned
Scan process 'GoogleToolbarNotifier.exe' - '1' Module(s) have been scanned
Scan process 'igfxext.exe' - '1' Module(s) have been scanned
Scan process 'TeaTimer.exe' - '1' Module(s) have been scanned
Scan process 'Eee Docking.exe' - '1' Module(s) have been scanned
Scan process 'RTHDCPL.EXE' - '1' Module(s) have been scanned
Scan process 'iTunesHelper.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'jusched.exe' - '1' Module(s) have been scanned
Scan process 'LiveUpdate.exe' - '1' Module(s) have been scanned
Scan process 'AsScrPro.exe' - '1' Module(s) have been scanned
Scan process 'igfxsrvc.exe' - '1' Module(s) have been scanned
Scan process 'SynTPEnh.exe' - '1' Module(s) have been scanned
Scan process 'hkcmd.exe' - '1' Module(s) have been scanned
Scan process 'igfxtray.exe' - '1' Module(s) have been scanned
Scan process 'AsTray.exe' - '1' Module(s) have been scanned
Scan process 'AsEPCMon.exe' - '1' Module(s) have been scanned
Scan process 'AsAcpiSvr.exe' - '1' Module(s) have been scanned
Scan process 'Explorer.EXE' - '1' Module(s) have been scanned
Scan process 'btwdins.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'SeaPort.exe' - '1' Module(s) have been scanned
Scan process 'jqs.exe' - '1' Module(s) have been scanned
Scan process 'avshadow.exe' - '1' Module(s) have been scanned
Scan process 'mDNSResponder.exe' - '1' Module(s) have been scanned
Scan process 'AppleMobileDeviceService.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned

Starting the file scan:

Begin scan in 'C:\Documents and Settings\David\Local Settings\temp\it1uabvt.tmp'
C:\Documents and Settings\David\Local Settings\temp\it1uabvt.tmp
[0] Archive type: PDF Stream
[DETECTION] Contains recognition pattern of the EXP/Pidief.6685 exploit
--> Object
[DETECTION] Contains recognition pattern of the EXP/Pidief.6685 exploit

Beginning disinfection:
C:\Documents and Settings\David\Local Settings\temp\it1uabvt.tmp
[DETECTION] Contains recognition pattern of the EXP/Pidief.6685 exploit
[NOTE] The file was moved to the quarantine directory under the name '4e3c195e.qua'.


End of the scan: 01 September 2010 21:53
Used time: 00:07 Minute(s)

The scan has been done completely.

0 Scanned directories
49 Files were scanned
1 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
1 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
48 Files not concerned
0 Archives were scanned
0 Warnings
1 Notes


The scan results will be transferred to the Guard.
--------------------------------------------------------------------


What do you make of this behaviour? Odd?

#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,416 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:43 AM

Posted 01 September 2010 - 07:30 PM

Hello again, no one tool will get everything and why we run several.

This file bothers me as I cannot get info on it. C:\WINDOWS\system32\drivers\qtcnwzpx.sys
Lets' upload this file for a second opinion on what it actually is..

Please make sure that you can view all hidden files. Instructions on how to do this can be found here:
How to see hidden files in Windows

Please click this link-->Jotti

When the jotti page has finished loading, click the Browse button and navigate to the following file and click Submit.
<filepath>suspect.file ... C:\WINDOWS\system32\drivers\qtcnwzpx.sys

Please post back the results of the scan in your next post.

If Jotti is busy, try the same at Virustotal: http://www.virustotal.com/


NOTE:
For submission to a specific anti-virus vendor see Submitting Virus Samples: How to Submit a Virus.


EDIT: I forgot this. While we are showing hidden files.
Rerun Avira and Rerun MBAM (MalwareBytes) like this:

Open MBAM in normal/regular mode and click Update tab, select Check for Updates,when done
click Scanner tab,select Quick scan and scan (normal mode).
After scan click Remove Selected, Post new scan log and Reboot into normal mode.

Edited by boopme, 01 September 2010 - 07:33 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 dave1972

dave1972
  • Topic Starter

  • Members
  • 45 posts
  • OFFLINE
  •  
  • Local time:03:43 AM

Posted 02 September 2010 - 12:23 PM

Jotti says...

Status: File is empty (0 bytes)!

Tried VirusTotal and it uploads and goes back to upload a file box again (obviously doesn't see any info in the upload).
Checked the Properties of the file and it says 741kb (744kb on disk)

Showing nothing there so I decided to right click the file and selected Scan file with Avira.
Here is that log...


Avira AntiVir Personal
Report file date: 02 September 2010 17:56

Scanning for 2771546 virus strains and unwanted programs.

The program is running as an unrestricted full version.
Online services are available:

Licensee : Avira AntiVir Personal - FREE Antivirus
Serial number : ************************
Platform : Windows XP
Windows version : (Service Pack 3) [5.1.2600]
Boot mode : Normally booted
Username : David
Computer name : DAVE

Version information:
BUILD.DAT : 10.0.0.567 32097 Bytes 4/19/2010 15:07:00
AVSCAN.EXE : 10.0.3.0 433832 Bytes 4/20/2010 21:02:20
AVSCAN.DLL : 10.0.3.0 46440 Bytes 4/20/2010 21:02:19
LUKE.DLL : 10.0.2.3 104296 Bytes 3/7/2010 18:33:04
LUKERES.DLL : 10.0.0.1 12648 Bytes 2/10/2010 23:40:49
VBASE000.VDF : 7.10.0.0 19875328 Bytes 11/6/2009 07:35:52
VBASE001.VDF : 7.10.1.0 1372672 Bytes 11/19/2009 12:18:49
VBASE002.VDF : 7.10.3.1 3143680 Bytes 1/20/2010 12:19:48
VBASE003.VDF : 7.10.3.75 996864 Bytes 1/26/2010 12:19:59
VBASE004.VDF : 7.10.4.203 1579008 Bytes 3/5/2010 11:26:18
VBASE005.VDF : 7.10.6.82 2494464 Bytes 4/15/2010 19:10:29
VBASE006.VDF : 7.10.7.218 2294784 Bytes 6/2/2010 21:28:48
VBASE007.VDF : 7.10.9.165 4840960 Bytes 7/23/2010 09:07:05
VBASE008.VDF : 7.10.9.166 2048 Bytes 7/23/2010 09:07:05
VBASE009.VDF : 7.10.9.167 2048 Bytes 7/23/2010 09:07:05
VBASE010.VDF : 7.10.9.168 2048 Bytes 7/23/2010 09:07:05
VBASE011.VDF : 7.10.9.169 2048 Bytes 7/23/2010 09:07:05
VBASE012.VDF : 7.10.9.170 2048 Bytes 7/23/2010 09:07:06
VBASE013.VDF : 7.10.9.198 157696 Bytes 7/26/2010 09:07:07
VBASE014.VDF : 7.10.9.255 997888 Bytes 7/29/2010 09:07:11
VBASE015.VDF : 7.10.10.28 139264 Bytes 8/2/2010 19:11:58
VBASE016.VDF : 7.10.10.52 127488 Bytes 8/3/2010 19:11:59
VBASE017.VDF : 7.10.10.84 137728 Bytes 8/6/2010 19:21:36
VBASE018.VDF : 7.10.10.107 176640 Bytes 8/9/2010 19:12:31
VBASE019.VDF : 7.10.10.130 132608 Bytes 8/10/2010 19:12:32
VBASE020.VDF : 7.10.10.158 131072 Bytes 8/12/2010 10:21:47
VBASE021.VDF : 7.10.10.190 136704 Bytes 8/16/2010 10:21:48
VBASE022.VDF : 7.10.10.217 118272 Bytes 8/19/2010 17:40:23
VBASE023.VDF : 7.10.10.246 130048 Bytes 8/23/2010 13:04:14
VBASE024.VDF : 7.10.11.11 144896 Bytes 8/25/2010 13:04:15
VBASE025.VDF : 7.10.11.33 135168 Bytes 8/27/2010 13:04:15
VBASE026.VDF : 7.10.11.52 148992 Bytes 8/31/2010 19:54:25
VBASE027.VDF : 7.10.11.53 2048 Bytes 8/31/2010 19:54:25
VBASE028.VDF : 7.10.11.54 2048 Bytes 8/31/2010 19:54:25
VBASE029.VDF : 7.10.11.55 2048 Bytes 8/31/2010 19:54:25
VBASE030.VDF : 7.10.11.56 2048 Bytes 8/31/2010 19:54:25
VBASE031.VDF : 7.10.11.68 91648 Bytes 9/1/2010 19:54:26
Engineversion : 8.2.4.46
AEVDF.DLL : 8.1.2.1 106868 Bytes 8/1/2010 09:07:28
AESCRIPT.DLL : 8.1.3.44 1364346 Bytes 8/30/2010 13:04:27
AESCN.DLL : 8.1.6.1 127347 Bytes 5/17/2010 20:15:27
AESBX.DLL : 8.1.3.1 254324 Bytes 4/26/2010 11:23:45
AERDL.DLL : 8.1.8.2 614772 Bytes 8/1/2010 09:07:25
AEPACK.DLL : 8.2.3.5 471412 Bytes 8/6/2010 19:21:47
AEOFFICE.DLL : 8.1.1.8 201081 Bytes 8/1/2010 09:07:23
AEHEUR.DLL : 8.1.2.19 2867574 Bytes 8/30/2010 13:04:24
AEHELP.DLL : 8.1.13.3 242038 Bytes 8/30/2010 13:04:18
AEGEN.DLL : 8.1.3.20 397684 Bytes 8/30/2010 13:04:18
AEEMU.DLL : 8.1.2.0 393588 Bytes 4/26/2010 11:23:42
AECORE.DLL : 8.1.16.2 192887 Bytes 8/1/2010 09:07:15
AEBB.DLL : 8.1.1.0 53618 Bytes 4/26/2010 11:23:41
AVWINLL.DLL : 10.0.0.0 19304 Bytes 1/14/2010 12:03:38
AVPREF.DLL : 10.0.0.0 44904 Bytes 1/14/2010 12:03:35
AVREP.DLL : 10.0.0.8 62209 Bytes 2/18/2010 16:47:40
AVREG.DLL : 10.0.3.0 53096 Bytes 4/20/2010 21:02:20
AVSCPLR.DLL : 10.0.3.0 83816 Bytes 4/20/2010 21:02:20
AVARKT.DLL : 10.0.0.14 227176 Bytes 4/20/2010 21:02:19
AVEVTLOG.DLL : 10.0.0.8 203112 Bytes 1/26/2010 09:53:30
SQLITE3.DLL : 3.6.19.0 355688 Bytes 1/28/2010 12:57:58
AVSMTP.DLL : 10.0.0.17 63848 Bytes 3/16/2010 15:38:56
NETNT.DLL : 10.0.0.0 11624 Bytes 2/19/2010 14:41:00
RCIMAGE.DLL : 10.0.0.26 2550120 Bytes 1/28/2010 13:10:20
RCTEXT.DLL : 10.0.53.0 97128 Bytes 4/20/2010 21:02:19

Configuration settings for the scan:
Jobname.............................: ShlExt
Configuration file..................: C:\DOCUME~1\David\LOCALS~1\Temp\2203eda9.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:,
Process scan........................: off
Scan registry.......................: off
Search for rootkits.................: off
Integrity checking of system files..: off
Scan all files......................: Intelligent file selection
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium
Deviating risk categories...........: +APPL,+GAME,+JOKE,+PCK,+PFS,+SPR,

Start of the scan: 02 September 2010 17:56

Starting the file scan:

Begin scan in 'C:\WINDOWS\system32\drivers\qtcnwzpx.sys'


End of the scan: 02 September 2010 17:56
Used time: 00:07 Minute(s)

The scan has been done completely.

0 Scanned directories
1 Files were scanned
0 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
0 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
1 Files not concerned
0 Archives were scanned
0 Warnings
0 Notes

Did the same with MBAM and here is that log for that particular file...

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4525

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

02/09/2010 18:00:13
mbam-log-2010-09-02 (18-00-13).txt

Scan type: Quick scan
Objects scanned: 1
Time elapsed: 6 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


REran MBAM in full quickscan mode. Here is that log...

Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4531

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

02/09/2010 18:20:49
mbam-log-2010-09-02 (18-20-49).txt

Scan type: Quick scan
Objects scanned: 160242
Time elapsed: 17 minute(s), 40 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)


Strange?

Avira updated and ran in the background. No alerts.

#6 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,416 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:43 AM

Posted 02 September 2010 - 01:46 PM

Hi Dave everything I look ay=t says these should br safe files,,,.

The keys under HKLM\SYSTEM\CurrentControlSet are a safe place to preserve data that is vital to your driver because the data is stored in the system hive. The system takes extra precautions to protect the system hive (for example, keeping multiple copies).

The HKLM\SYSTEM\CurrentControlSet\Services Tree
The HKLM\SYSTEM\CurrentControlSet\Services registry tree stores information about each service on the system. Each driver has a key of the form HKLM\SYSTEM\CurrentControlSet\Services\DriverName. The PnP Manager passes this path to a driver in the RegistryPath parameter when it calls the driver's DriverEntry routine. A driver can store global driver-defined data under its key in the Services tree. Information stored under this key is available to the driver during its initialization.

http://www.osronline.com/ddkx/install/install-over_6e3r.htm

I just don't like I cannot ID that file.. Would you want to post in our DDS log section and wait a few days to have the machine analyzed?
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#7 dave1972

dave1972
  • Topic Starter

  • Members
  • 45 posts
  • OFFLINE
  •  
  • Local time:03:43 AM

Posted 02 September 2010 - 01:59 PM

Yes OK. Could you give me more instruction / info?
What exactly should I do now?

Thanks.

#8 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,416 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:43 AM

Posted 02 September 2010 - 02:30 PM

Good choice Dave.

Please go here....
Preparation Guide ,do steps 6 - 9.

Create a DDS log and post it in the new topic explained in step 9,which is here Virus, Trojan, Spyware, and Malware Removal Logs and not in this topic,thanks.
If Gmer won't run,skip it and move on. Use the RootRe[eal log from earlier.

Let me know if that went well.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#9 dave1972

dave1972
  • Topic Starter

  • Members
  • 45 posts
  • OFFLINE
  •  
  • Local time:03:43 AM

Posted 03 September 2010 - 10:22 AM

Thanks for all your help Boopme!

I have started another thread as you requested HERE.

Cheers :thumbsup:

#10 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,416 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:04:43 AM

Posted 03 September 2010 - 11:21 AM

You're most welcome~!!
Now that your log is properly posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Removal Team member, nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show it the log you already posted. Further, any modifications you make on your own may cause confusion for the helper assisting you and could complicate the malware removal process which would extend the time it takes to clean your computer.

From this point on the Malware Removal Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take a while to get a response because the Malware Removal Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have made your post and are waiting, please DO NOT make another reply until it has been responded to by a member of the Malware Removal Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another HJT Team member is already assisting you and not open the thread to respond.

To avoid confusion, I am closing this topic.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users