Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Hidden object......Rootkit?


  • Please log in to reply
5 replies to this topic

#1 sandbetweentoes

sandbetweentoes

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:03:08 PM

Posted 12 February 2011 - 01:02 PM

I have the Avira free home edition and it shows 1 hidden object, which appears to be Rootkit. Malwarebytes and SuperSpyware doesn't see it.

I've read about these things and if it is one of those nasty Rootkits, I don't want to do anything else without guidance. So what would you like next and I'll get with.

thanks!

Avira AntiVir Personal
Report file date: Saturday, February 12, 2011 09:12

Scanning for 2395740 virus strains and unwanted programs.

The program is running as an unrestricted full version.
Online services are available:

Licensee : Avira AntiVir Personal - FREE Antivirus
Serial number : 0000149996-ADJIE-0000001
Platform : Windows XP
Windows version : (Service Pack 3) [5.1.2600]
Boot mode : Normally booted
Username : SYSTEM
Computer name : STEVE-F20E13DA7

Version information:
BUILD.DAT : 10.0.0.611 31824 Bytes 1/14/2011 13:42:00
AVSCAN.EXE : 10.0.3.5 435368 Bytes 12/13/2010 16:39:56
AVSCAN.DLL : 10.0.3.0 46440 Bytes 4/1/2010 20:57:04
LUKE.DLL : 10.0.3.2 104296 Bytes 12/13/2010 16:40:06
LUKERES.DLL : 10.0.0.1 12648 Bytes 2/11/2010 07:40:49
VBASE000.VDF : 7.10.0.0 19875328 Bytes 11/6/2009 17:05:36
VBASE001.VDF : 7.11.0.0 13342208 Bytes 12/14/2010 04:24:57
VBASE002.VDF : 7.11.3.0 1950720 Bytes 2/9/2011 15:46:52
VBASE003.VDF : 7.11.3.1 2048 Bytes 2/9/2011 15:46:52
VBASE004.VDF : 7.11.3.2 2048 Bytes 2/9/2011 15:46:53
VBASE005.VDF : 7.11.3.3 2048 Bytes 2/9/2011 15:46:53
VBASE006.VDF : 7.11.3.4 2048 Bytes 2/9/2011 15:46:53
VBASE007.VDF : 7.11.3.5 2048 Bytes 2/9/2011 15:46:53
VBASE008.VDF : 7.11.3.6 2048 Bytes 2/9/2011 15:46:54
VBASE009.VDF : 7.11.3.7 2048 Bytes 2/9/2011 15:46:54
VBASE010.VDF : 7.11.3.8 2048 Bytes 2/9/2011 15:46:54
VBASE011.VDF : 7.11.3.9 2048 Bytes 2/9/2011 15:46:54
VBASE012.VDF : 7.11.3.10 2048 Bytes 2/9/2011 15:46:55
VBASE013.VDF : 7.11.3.11 2048 Bytes 2/9/2011 15:46:55
VBASE014.VDF : 7.11.3.12 2048 Bytes 2/9/2011 15:46:55
VBASE015.VDF : 7.11.3.13 2048 Bytes 2/9/2011 15:46:55
VBASE016.VDF : 7.11.3.14 2048 Bytes 2/9/2011 15:46:56
VBASE017.VDF : 7.11.3.15 2048 Bytes 2/9/2011 15:46:56
VBASE018.VDF : 7.11.3.16 2048 Bytes 2/9/2011 15:46:56
VBASE019.VDF : 7.11.3.17 2048 Bytes 2/9/2011 15:46:56
VBASE020.VDF : 7.11.3.18 2048 Bytes 2/9/2011 15:46:57
VBASE021.VDF : 7.11.3.19 2048 Bytes 2/9/2011 15:46:57
VBASE022.VDF : 7.11.3.20 2048 Bytes 2/9/2011 15:46:57
VBASE023.VDF : 7.11.3.21 2048 Bytes 2/9/2011 15:46:57
VBASE024.VDF : 7.11.3.22 2048 Bytes 2/9/2011 15:46:58
VBASE025.VDF : 7.11.3.23 2048 Bytes 2/9/2011 15:46:58
VBASE026.VDF : 7.11.3.24 2048 Bytes 2/9/2011 15:46:58
VBASE027.VDF : 7.11.3.25 2048 Bytes 2/9/2011 15:46:58
VBASE028.VDF : 7.11.3.26 2048 Bytes 2/9/2011 15:46:59
VBASE029.VDF : 7.11.3.27 2048 Bytes 2/9/2011 15:47:01
VBASE030.VDF : 7.11.3.28 2048 Bytes 2/9/2011 15:47:01
VBASE031.VDF : 7.11.3.47 89088 Bytes 2/11/2011 15:47:06
Engineversion : 8.2.4.166
AEVDF.DLL : 8.1.2.1 106868 Bytes 12/13/2010 16:39:51
AESCRIPT.DLL : 8.1.3.53 1282427 Bytes 2/3/2011 02:45:36
AESCN.DLL : 8.1.7.2 127349 Bytes 12/13/2010 16:39:50
AESBX.DLL : 8.1.3.2 254324 Bytes 12/13/2010 16:39:50
AERDL.DLL : 8.1.9.2 635252 Bytes 12/13/2010 16:39:50
AEPACK.DLL : 8.2.4.9 512374 Bytes 2/3/2011 02:45:33
AEOFFICE.DLL : 8.1.1.16 205179 Bytes 2/3/2011 02:45:31
AEHEUR.DLL : 8.1.2.76 3273078 Bytes 2/11/2011 15:48:25
AEHELP.DLL : 8.1.16.1 246134 Bytes 2/7/2011 17:54:01
AEGEN.DLL : 8.1.5.2 397683 Bytes 1/20/2011 17:46:53
AEEMU.DLL : 8.1.3.0 393589 Bytes 12/13/2010 16:39:42
AECORE.DLL : 8.1.19.2 196983 Bytes 1/20/2011 17:46:37
AEBB.DLL : 8.1.1.0 53618 Bytes 12/13/2010 16:39:41
AVWINLL.DLL : 10.0.0.0 19304 Bytes 12/13/2010 16:39:56
AVPREF.DLL : 10.0.0.0 44904 Bytes 12/13/2010 16:39:54
AVREP.DLL : 10.0.0.8 62209 Bytes 6/17/2010 22:27:13
AVREG.DLL : 10.0.3.2 53096 Bytes 12/13/2010 16:39:54
AVSCPLR.DLL : 10.0.3.2 84328 Bytes 12/13/2010 16:39:56
AVARKT.DLL : 10.0.22.6 231784 Bytes 12/13/2010 16:39:52
AVEVTLOG.DLL : 10.0.0.8 203112 Bytes 12/13/2010 16:39:53
SQLITE3.DLL : 3.6.19.0 355688 Bytes 6/17/2010 22:27:22
AVSMTP.DLL : 10.0.0.17 63848 Bytes 12/13/2010 16:39:56
NETNT.DLL : 10.0.0.0 11624 Bytes 6/17/2010 22:27:21
RCIMAGE.DLL : 10.0.0.26 2550120 Bytes 1/28/2010 21:10:20
RCTEXT.DLL : 10.0.58.0 97128 Bytes 12/13/2010 16:40:20

Configuration settings for the scan:
Jobname.............................: Complete system scan
Configuration file..................: C:\Program Files\Avira\AntiVir Desktop\sysscan.avp
Logging.............................: low
Primary action......................: interactive
Secondary action....................: ignore
Scan master boot sector.............: on
Scan boot sector....................: on
Boot sectors........................: C:,
Process scan........................: on
Extended process scan...............: on
Scan registry.......................: on
Search for rootkits.................: on
Integrity checking of system files..: off
Scan all files......................: All files
Scan archives.......................: on
Recursion depth.....................: 20
Smart extensions....................: on
Macro heuristic.....................: on
File heuristic......................: medium
Deviating risk categories...........: +APPL,+GAME,+JOKE,+PCK,+PFS,+SPR,

Start of the scan: Saturday, February 12, 2011 09:12

Starting search for hidden objects.
HKEY_LOCAL_MACHINE\System\ControlSet001\Services\NtmsSvc\Config\Standalone\drivelist
[NOTE] The registry entry is invisible.

The scan of running processes will be started
Scan process 'SCServer.exe' - '38' Module(s) have been scanned
Scan process 'IEXPLORE.EXE' - '137' Module(s) have been scanned
Scan process 'msdtc.exe' - '42' Module(s) have been scanned
Scan process 'IEXPLORE.EXE' - '70' Module(s) have been scanned
Scan process 'dllhost.exe' - '61' Module(s) have been scanned
Scan process 'dllhost.exe' - '47' Module(s) have been scanned
Scan process 'vssvc.exe' - '50' Module(s) have been scanned
Scan process 'avscan.exe' - '71' Module(s) have been scanned
Scan process 'avcenter.exe' - '64' Module(s) have been scanned
Scan process 'SUPERAntiSpyware.exe' - '58' Module(s) have been scanned
Scan process 'ctfmon.exe' - '27' Module(s) have been scanned
Scan process 'AGRSMMSG.exe' - '22' Module(s) have been scanned
Scan process 'SOUNDMAN.EXE' - '28' Module(s) have been scanned
Scan process 'jusched.exe' - '24' Module(s) have been scanned
Scan process 'avgnt.exe' - '47' Module(s) have been scanned
Scan process 'mswinext.exe' - '69' Module(s) have been scanned
Scan process 'cfp.exe' - '52' Module(s) have been scanned
Scan process 'Explorer.EXE' - '95' Module(s) have been scanned
Scan process 'alg.exe' - '35' Module(s) have been scanned
Scan process 'WLIDSvcM.exe' - '18' Module(s) have been scanned
Scan process 'WLIDSVC.EXE' - '55' Module(s) have been scanned
Scan process 'wdfmgr.exe' - '18' Module(s) have been scanned
Scan process 'svchost.exe' - '41' Module(s) have been scanned
Scan process 'avshadow.exe' - '28' Module(s) have been scanned
Scan process 'SeaPort.exe' - '47' Module(s) have been scanned
Scan process 'jqs.exe' - '35' Module(s) have been scanned
Scan process 'avguard.exe' - '54' Module(s) have been scanned
Scan process 'svchost.exe' - '36' Module(s) have been scanned
Scan process 'sched.exe' - '47' Module(s) have been scanned
Scan process 'spoolsv.exe' - '52' Module(s) have been scanned
Scan process 'svchost.exe' - '40' Module(s) have been scanned
Scan process 'svchost.exe' - '34' Module(s) have been scanned
Scan process 'svchost.exe' - '172' Module(s) have been scanned
Scan process 'cmdagent.exe' - '80' Module(s) have been scanned
Scan process 'svchost.exe' - '40' Module(s) have been scanned
Scan process 'svchost.exe' - '55' Module(s) have been scanned
Scan process 'lsass.exe' - '60' Module(s) have been scanned
Scan process 'services.exe' - '29' Module(s) have been scanned
Scan process 'winlogon.exe' - '80' Module(s) have been scanned
Scan process 'csrss.exe' - '12' Module(s) have been scanned
Scan process 'smss.exe' - '2' Module(s) have been scanned

Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!
Master boot sector HD1
[INFO] No virus was found!
Master boot sector HD2
[INFO] No virus was found!
Master boot sector HD3
[INFO] No virus was found!
Master boot sector HD4
[INFO] No virus was found!

Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!

Starting to scan executable files (registry).
The registry was scanned ( '357' files ).


Starting the file scan:

Begin scan in 'C:\'


End of the scan: Saturday, February 12, 2011 09:28
Used time: 15:53 Minute(s)

The scan has been done completely.

2340 Scanned directories
72097 Files were scanned
0 Viruses and/or unwanted programs were found
0 Files were classified as suspicious
0 files were deleted
0 Viruses and unwanted programs were repaired
0 Files were moved to quarantine
0 Files were renamed
0 Files cannot be scanned
72097 Files not concerned
412 Archives were scanned
0 Warnings
0 Notes
216627 Objects were scanned with rootkit scan
1 Hidden objects were found

BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,486 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:08 PM

Posted 12 February 2011 - 03:45 PM

The registry key with NtmsSvc is related to Removable Storage Service.

Not all hidden components detected by anti-rootkit (ARK) scanners and security tools are malicious. It is normal for a Firewall, some anti-virus and anti-malware software (ProcessGuard, Prevx), CD Emulators sandboxes, virtual machines and Host based Intrusion Prevention Systems (HIPS) to exhibit rootkit-like behavior or hook into the OS kernal/SSDT (System Service Descriptor Table) in order to protect your system. SSDT is a table that stores addresses of functions that are used by Windows. Whenever a function is called, Windows looks in this table to find the address for it. Both legitimate programs and rootkits can hook into and alter this table.

API Kernel hooks are not always bad since some system monitoring software and security tools use them as well. If no hooks are active on a system it means that all system services are handled by ntoskrnl.exe which is a base component of Windows operating systems and the process used in the boot-up cycle of a computer. ARK scanners do not differentiate between what is good and what is bad...they only report what is found. Therefore, even on a clean system some hidden essential components may be detected when performing a scan to check for the presence of rootkits. As such, you should not be alarmed if you see any hidden entries created by legitimate programs after performing a scan.

This is what Avira says about hidden objects.

A hidden object refers to a registry entry or file or folder that is invisible to the operating system. This includes rootkits which are used to hide malware. These are dangerous. But keep in mind that not all hidden objects are dangerous as there are legal programs which hide their own files and registry entries.

Avira Support Forum: Scan Results Question - Warnings - Detections - Hidden Objects
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 sandbetweentoes

sandbetweentoes
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:03:08 PM

Posted 12 February 2011 - 11:31 PM

Ok, thanks for the info.
However, 2 days ago this was not on my computer. I run a scan every morning. That's what concerns me.

If it is a rootkit are there things I should look for while using my computer? Slowness, redirecting.....etc
I read up on Kaspersky's site and elsewhere how bad these are and I just want to make sure it doesn't dig itself deeper. I just don't wanna have to erase my hard drive.

thanks!

#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,486 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:08 PM

Posted 13 February 2011 - 09:01 AM

The NtmsSvc\Config\Standalone\drivelist registry entry is associated with Removable Storage and the drive list box which shows the stand-alone drives that are connected to the computer. It is a common detection when using Avira and is only being reported because it is invisible.

If you want a second opinion or want to know why it is suddenly being reported, ask in the AntiVir Personal for Windows support forum.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#5 sandbetweentoes

sandbetweentoes
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:03:08 PM

Posted 15 February 2011 - 01:01 PM

Very good!

You guys are the specialists and I'll go with that. I was just a bit nervous that I'd lose bank accounts etc.

thanks very much for your assistance!

Off to the beach!

#6 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,486 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:04:08 PM

Posted 15 February 2011 - 03:29 PM

You're welcome.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users