Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

infected by Trojan.Win32.ZbotPatched.d, Trojan/W32.ZbotPatched.380928 , Heuristic.BehavesLike.Win32.Virus


  • Please log in to reply
7 replies to this topic

#1 jennifor

jennifor

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:us
  • Local time:02:00 AM

Posted 08 July 2010 - 04:04 PM

hi all i am infected by Trojan.Win32.ZbotPatched.d @Trojan/W32.ZbotPatched.380928@ Heuristic.BehavesLike.Win32.Virus.I i tried to remove but no luck . its a pain i hope u can help before i reformat drive. kaspersky found the file said had to restart to remove. on restart scan it found same trojans now in a different exe. i am running vista 32 home premium any help is greatly appreciated ty. Antivirus Version Last Update Result
a-squared 5.0.0.31 2010.07.08 -
AhnLab-V3 2010.07.08.00 2010.07.07 -
AntiVir 8.2.4.10 2010.07.07 -
Antiy-AVL 2.0.3.7 2010.07.07 -
Authentium 5.2.0.5 2010.07.08 -
Avast 4.8.1351.0 2010.07.07 -
Avast5 5.0.332.0 2010.07.07 -
AVG 9.0.0.836 2010.07.08 -
BitDefender 7.2 2010.07.08 -
CAT-QuickHeal 11.00 2010.07.07 -
ClamAV 0.96.0.3-git 2010.07.08 -
Comodo 5354 2010.07.08 -
DrWeb 5.0.2.03300 2010.07.08 -
eSafe 7.0.17.0 2010.07.07 -
eTrust-Vet 36.1.7691 2010.07.07 -
F-Prot 4.6.1.107 2010.07.07 -
F-Secure 9.0.15370.0 2010.07.08 -
Fortinet 4.1.133.0 2010.07.07 -
GData 21 2010.07.08 -
Ikarus T3.1.1.84.0 2010.07.08 -
Jiangmin 13.0.900 2010.07.07 -
Kaspersky 7.0.0.125 2010.07.08 Trojan.Win32.ZbotPatched.d
McAfee 5.400.0.1158 2010.07.08 -
McAfee-GW-Edition 2010.1 2010.07.05 Heuristic.BehavesLike.Win32.Virus.I
Microsoft 1.5902 2010.07.08 -
NOD32 5260 2010.07.07 -
Norman 6.05.11 2010.07.07 -
nProtect 2010-07-07.02 2010.07.07 Trojan/W32.ZbotPatched.380928
Panda 10.0.2.7 2010.07.07 -
PCTools 7.0.3.5 2010.07.07 -
Prevx 3.0 2010.07.08 -
Rising 22.55.02.04 2010.07.07 -
Sophos 4.54.0 2010.07.08 -
Sunbelt 6557 2010.07.07 -
Symantec 20101.1.0.89 2010.07.07 -
TheHacker 6.5.2.1.309 2010.07.07 -
TrendMicro 9.120.0.1004 2010.07.07 -
TrendMicro-HouseCall 9.120.0.1004 2010.07.08 -
VBA32 3.12.12.6 2010.07.07 -
ViRobot 2010.6.29.3912 2010.07.07 -
VirusBuster 5.0.27.0 2010.07.07 -
Additional information
File size: 380928 bytes
MD5...: ed9c86197c61b635f60ddf28df7c39fc
SHA1..: dde6db62d5f72d38f6b04c882def5ee18e43feec
SHA256: e5e7c158a51c75c1adb6afc9714e8a8e11f4f14db869fc6050dc98767c05a36c
ssdeep: 6144:08XuHu1awotJTZRtl8uDhEl5wCAwHMeBYQu3A5nbGlO8/Xc:jXuHuE9vZRt
auDhEluCRHMeBYQu3A

PEiD..: -
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x20c9f
timedatestamp.....: 0x3fc2e046 (Tue Nov 25 04:53:26 2003)
machinetype.......: 0x14c (I386)

( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x4327e 0x44000 6.56 e1cdbb149f6c8bfe83ad8a855941d93c
.rdata 0x45000 0xc2c6 0xd000 4.55 0d103f1d251584dbac315ee373a9064f
.data 0x52000 0x7788 0x4000 4.38 ab2cf0a976b22d3c2ae974d0e93a6639
.rsrc 0x5a000 0x62a8 0x7000 4.40 685d97f2b8a45c3639203a56fbcbefaa

( 12 imports )
> KERNEL32.dll: TerminateProcess, RaiseException, HeapReAlloc, HeapSize, GetACP, LCMapStringA, LCMapStringW, UnhandledExceptionFilter, FreeEnvironmentStringsA, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetFileType, HeapDestroy, HeapCreate, VirtualFree, VirtualAlloc, HeapFree, SetUnhandledExceptionFilter, GetStringTypeA, GetStringTypeW, GetDriveTypeA, SetStdHandle, IsBadReadPtr, IsBadCodePtr, CompareStringA, CompareStringW, SetEnvironmentVariableA, HeapAlloc, GetProfileStringA, ExitProcess, GetCommandLineA, GetStartupInfoA, GetLocalTime, GetSystemTime, GetTimeZoneInformation, RtlUnwind, GetTickCount, SetErrorMode, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetShortPathNameA, GetStringTypeExA, GetVolumeInformationA, MoveFileA, SetEndOfFile, UnlockFile, LockFile, FlushFileBuffers, SetFilePointer, GetCurrentProcess, DuplicateHandle, GetOEMCP, GetCPInfo, GetThreadLocale, GetProcessVersion, TlsGetValue, LocalReAlloc, TlsSetValue, EnterCriticalSection, LeaveCriticalSection, TlsFree, GlobalHandle, DeleteCriticalSection, TlsAlloc, InitializeCriticalSection, LocalAlloc, SizeofResource, GlobalFlags, MulDiv, FindNextFileA, FindFirstFileA, SetLastError, FindClose, FormatMessageA, LocalFree, GetLastError, GetDiskFreeSpaceA, GetFileTime, SetFileTime, GetFullPathNameA, lstrcpynA, GetFileAttributesA, LoadLibraryA, FreeLibrary, GetVersion, lstrcatA, GlobalGetAtomNameA, GlobalFindAtomA, lstrcpyA, GetModuleHandleA, GetProcAddress, WritePrivateProfileStringA, GetPrivateProfileStringA, GetPrivateProfileIntA, GlobalAddAtomA, MultiByteToWideChar, WideCharToMultiByte, InterlockedDecrement, InterlockedIncrement, GetModuleFileNameA, GlobalDeleteAtom, lstrcmpA, GetCurrentThread, GetCurrentThreadId, LockResource, FindResourceA, LoadResource, GetCurrentDirectoryA, lstrcmpiA, lstrlenA, GetTempFileNameA, DeleteFileA, GetFileSize, ReadFile, CreateFileA, WriteFile, CloseHandle, GlobalReAlloc, GlobalAlloc, GlobalLock, GlobalFree, GlobalUnlock, IsBadWritePtr
> USER32.dll: CharUpperA, InflateRect, RegisterClipboardFormatA, PostThreadMessageA, GetScrollRange, GetScrollPos, SetScrollPos, GetTopWindow, IsChild, GetCapture, WinHelpA, GetClassInfoA, RegisterClassA, GetMenu, GetMenuItemCount, GetSubMenu, GetMenuItemID, DefWindowProcA, CreateWindowExA, GetClassLongA, SetPropA, UnhookWindowsHookEx, GetPropA, CallWindowProcA, RemovePropA, GetMessageTime, GetMessagePos, GetForegroundWindow, SetForegroundWindow, RegisterWindowMessageA, OffsetRect, IntersectRect, SystemParametersInfoA, IsIconic, GetWindowPlacement, GetWindowRect, MapDialogRect, GetWindow, SetWindowContextHelpId, wsprintfA, SetFocus, ShowWindow, SetWindowPos, MoveWindow, SetWindowLongA, GetDlgCtrlID, GetWindowTextLengthA, GetWindowTextA, SetWindowTextA, IsDialogMessageA, MessageBeep, DeleteMenu, GetMenuCheckMarkDimensions, LoadBitmapA, GetMenuState, ModifyMenuA, SetMenuItemBitmaps, CheckMenuItem, EnableMenuItem, GetFocus, GetMessageA, TranslateMessage, GetSysColorBrush, GetKeyState, CallNextHookEx, ValidateRect, IsWindowVisible, PeekMessageA, GetCursorPos, SetWindowsHookExA, GetLastActivePopup, ShowOwnedPopups, PostMessageA, PostQuitMessage, GetNextDlgTabItem, EndDialog, SetActiveWindow, IsWindow, GetSystemMetrics, CreateDialogIndirectParamA, DestroyWindow, ReleaseDC, UnregisterClassA, HideCaret, ShowCaret, ExcludeUpdateRgn, DrawFocusRect, DefDlgProcA, IsWindowUnicode, GetParent, GetDlgItem, IsWindowEnabled, SendMessageA, GetActiveWindow, MessageBoxA, SetRect, GetWindowLongA, AdjustWindowRect, LoadCursorA, SetCursor, InvalidateRect, EnableScrollBar, GetClientRect, EnableWindow, GetNextDlgGroupItem, CopyAcceleratorTableA, CharNextA, DestroyIcon, LoadStringA, UpdateWindow, GetDC, InsertMenuA, PtInRect, GetClassNameA, GrayStringA, DrawTextA, TabbedTextOutA, EndPaint, BeginPaint, GetWindowDC, ClientToScreen, BringWindowToTop, UnpackDDElParam, ReuseDDElParam, SetMenu, LoadMenuA, DestroyMenu, GetDesktopWindow, ReleaseCapture, TranslateAcceleratorA, LoadAcceleratorsA, SetRectEmpty, LoadIconA, MapWindowPoints, GetSysColor, AdjustWindowRectEx, ScreenToClient, EqualRect, DeferWindowPos, BeginDeferWindowPos, CopyRect, EndDeferWindowPos, DispatchMessageA, GetMenuStringA, SendDlgItemMessageA, SetScrollRange
> GDI32.dll: GetClipBox, SetTextColor, SetBkColor, SaveDC, RestoreDC, SetBkMode, SetMapMode, SetViewportOrgEx, OffsetViewportOrgEx, SetViewportExtEx, ScaleViewportExtEx, SetWindowExtEx, ScaleWindowExtEx, IntersectClipRect, CreateBitmap, GetViewportExtEx, GetWindowExtEx, CreateSolidBrush, PtVisible, RectVisible, TextOutA, ExtTextOutA, Escape, GetTextColor, GetBkColor, DPtoLP, LPtoDP, GetMapMode, PatBlt, StretchDIBits, DeleteObject, CreateCompatibleDC, SelectObject, BitBlt, DeleteDC, GetObjectA, GetStockObject, CreateDIBitmap, GetTextExtentPointA, GetDeviceCaps
> comdlg32.dll: GetOpenFileNameA, GetSaveFileNameA, GetFileTitleA
> WINSPOOL.DRV: ClosePrinter, DocumentPropertiesA, OpenPrinterA
> ADVAPI32.dll: RegOpenKeyExA, RegCreateKeyA, GetFileSecurityA, SetFileSecurityA, RegDeleteValueA, RegSetValueExA, RegQueryValueExA, RegSetValueA, RegCreateKeyExA, RegDeleteKeyA, RegOpenKeyA, RegEnumKeyA, RegCloseKey, RegQueryValueA
> SHELL32.dll: ExtractIconA, DragAcceptFiles, DragQueryFileA, DragFinish, SHGetFileInfoA
> COMCTL32.dll: -
> oledlg.dll: -
> ole32.dll: CoFreeUnusedLibraries, OleInitialize, CoTaskMemAlloc, CoTaskMemFree, CreateILockBytesOnHGlobal, StgCreateDocfileOnILockBytes, StgOpenStorageOnILockBytes, CoGetClassObject, CLSIDFromString, CLSIDFromProgID, CoRegisterMessageFilter, CoRevokeClassObject, OleFlushClipboard, OleIsCurrentClipboard, OleUninitialize
> OLEPRO32.DLL: -
> OLEAUT32.dll: -, -, -, -, -, -, -, -, -

( 0 exports )

RDS...: NSRL Reference Data Set
-
trid..: Win64 Executable Generic (54.6%)
Win32 Executable MS Visual C++ (generic) (24.0%)
Windows Screen Saver (8.3%)
Win32 Executable Generic (5.4%)
Win32 Dynamic Link Library (generic) (4.8%)
pdfid.: -
sigcheck:
publisher....:
copyright....: Copyright © 2002
product......: KscViewer __ ____
description..: KscViewer MFC __ ____
original name: KscViewer.EXE
internal name: KscViewer
file version.: 1, 0, 0, 1
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned



ATTENTION: VirusTotal is a free service offered by Hispasec Sistemas. There are no guarantees about the availability and continuity of this service. Although the detection rate afforded by the use of multiple antivirus engines is far superior to that offered by just one product, these results DO NOT guarantee the harmlessness of a file. Currently, there is not any solution that offers a 100% effectiveness rate for detecting viruses and malware.

BC AdBot (Login to Remove)

 


#2 Guest_Jayson201_*

Guest_Jayson201_*

  • Guests
  • OFFLINE
  •  

Posted 08 July 2010 - 04:07 PM

Refrain from posting logs without being asked to post a log...

Run a scan with Malwarebytes Anti Malware ( A full scan, make sure you download install and update malwarebytes anti malware, before attempting to scan with it ;) )

You dont have allll those anti viruses on your computer at once, do you?

#3 rigel

rigel

    FD-BC


  • BC Advisor
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA

Posted 08 July 2010 - 09:09 PM

@ Jayson:

Virustotal is a service that analyzes suspicious files and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines.

http://www.virustotal.com/sobre.html

It runs a multiple scans against a submitted file and gives the results in the form of a report.

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#4 jennifor

jennifor
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:us
  • Local time:03:00 AM

Posted 09 July 2010 - 07:02 AM

Internet Explorer 7.0.6000.16386

7/9/2010 8:50:44 PM
mbam-log-2010-07-09 (20-50-44).txt

Scan type: Full scan (C:\|D:\|E:\|F:\|)
Objects scanned: 161974
Time elapsed: 1 hour(s), 26 minute(s), 22 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 1
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowSearch (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)
i hope i did it correctly if not dont be afraid to yellllllll!!! :thumbsup:

#5 rigel

rigel

    FD-BC


  • BC Advisor
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:02:00 AM

Posted 09 July 2010 - 01:37 PM

No yelling allowed :thumbsup: You can yell at your compute if you like :flowers:

Please update and rerun malwarebytes in Full Scan Mode.

Then...

Please download and scan with SUPERAntiSpyware Free
  • Double-click SUPERAntiSypware.exe and use the default settings for installation.
  • An icon will be created on your desktop. Double-click that icon to launch the program.
  • If it will not start, go to Start > All Prgrams > SUPERAntiSpyware and click on Alternate Start.
  • If asked to update the program definitions, click "Yes". If not, update the definitions before scanning by selecting "Check for Updates". (If you encounter any problems while downloading the updates, manually download them from here. Double-click on the hyperlink for Download Installer and save SASDEFINITIONS.EXE to your desktop. Then double-click on SASDEFINITIONS.EXE to install the definitions.)
  • In the Main Menu, click the Preferences... button.
  • Click the "General and Startup" tab, and under Start-up Options, make sure "Start SUPERAntiSpyware when Windows starts" box is unchecked.
  • Click the "Scanning Control" tab, and under Scanner Options, make sure the following are checked (leave all others unchecked):
    • Close browsers before scanning.
    • Scan for tracking cookies.
    • Terminate memory threats before quarantining.
  • Click the "Close" button to leave the control center screen and exit the program.
  • Do not run a scan just yet.
Reboot your computer in "Safe Mode" using the F8 method. To do this, restart your computer and after hearing your computer beep once during startup (but before the Windows icon appears) press the F8 key repeatedly. A menu will appear with several options. Use the arrow keys to navigate and select the option to run Windows in "Safe Mode".

Scan with SUPERAntiSpyware as follows:
  • Launch the program and back on the main screen, under "Scan for Harmful Software" click Scan your computer.
  • On the left, make sure you check C:\Fixed Drive.
  • On the right, under "Complete Scan", choose Perform Complete Scan and click "Next".
  • After the scan is complete, a Scan Summary box will appear with potentially harmful items that were detected. Click "OK".
  • Make sure everything has a checkmark next to it and click "Next".
  • A notification will appear that "Quarantine and Removal is Complete". Click "OK" and then click the "Finish" button to return to the main menu.
  • If asked if you want to reboot, click "Yes" and reboot normally.
  • To retrieve the removal information after reboot, launch SUPERAntispyware again.
    • Click Preferences, then click the Statistics/Logs tab.
    • Under Scanner Logs, double-click SUPERAntiSpyware Scan Log.
    • If there are several logs, click the current dated log and press View log. A text file will open in your default text editor.
    • Please copy and paste the Scan Log results in your next reply.
  • Click Close to exit the program.
If you have a problem downloading, installing or getting SAS to run, try downloading and using the SUPERAntiSpyware Portable Scanner instead. Save the randomly named file (i.e. SAS_1710895.COM) to a usb drive or CD and transfer to the infected computer. Then double-click on it to launch and scan. The file is randomly named to help keep malware from blocking the scanner.

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#6 rigel

rigel

    FD-BC


  • BC Advisor
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:03:00 AM

Posted 09 July 2010 - 01:38 PM

Pardon the double post, but let's do one more thing before the scans...

Please download TFC by Old Timer and save it to your desktop.
alternate download link
  • Save any unsaved work. TFC will close ALL open programs including your browser!
  • Double-click on TFC.exe to run it. If you are using Vista, right-click on the file and choose Run As Administrator.
  • Click the Start button to begin the cleaning process and let it run uninterrupted to completion.
  • Important! If TFC prompts you to reboot, please do so immediately. If not prompted, manually reboot the machine anyway to ensure a complete clean.

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith


#7 jennifor

jennifor
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:us
  • Local time:03:00 AM

Posted 10 July 2010 - 08:01 PM

hi again updated windows had some problems not all install . i ran tcf restart ran malewarebytes scann then dowloaded superantispyware set up like u said reboot and ran the scan in sfemode. Malwarebytes' Anti-Malware 1.46
www.malwarebytes.org

Database version: 4300

Windows 6.0.6002 Service Pack 2
Internet Explorer 8.0.6001.18928

7/11/2010 7:32:38 AM
mbam-log-2010-07-11 (07-32-38).txt

Scan type: Full scan (C:\|D:\|E:\|F:\|)
Objects scanned: 216822
Time elapsed: 48 minute(s), 58 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 0
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
(No malicious items detected)

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
(No malicious items detected)
and superantispyware log SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 07/11/2010 at 09:22 AM

Application Version : 4.40.1002

Core Rules Database Version : 5181
Trace Rules Database Version: 2993

Scan type : Complete Scan
Total Scan Time : 00:55:36

Memory items scanned : 278
Memory threats detected : 0
Registry items scanned : 6437
Registry threats detected : 0
File items scanned : 101436
File threats detected : 9

Adware.Tracking Cookie
C:\Users\sen\AppData\Roaming\Microsoft\Windows\Cookies\Low\sen@ad.yieldmanager[1].txt
C:\Users\sen\AppData\Roaming\Microsoft\Windows\Cookies\Low\sen@apmebf[1].txt
C:\Users\sen\AppData\Roaming\Microsoft\Windows\Cookies\Low\sen@atdmt[1].txt
C:\Users\sen\AppData\Roaming\Microsoft\Windows\Cookies\Low\sen@collective-media[1].txt
C:\Users\sen\AppData\Roaming\Microsoft\Windows\Cookies\Low\sen@content.yieldmanager[1].txt
C:\Users\sen\AppData\Roaming\Microsoft\Windows\Cookies\Low\sen@fastclick[1].txt
C:\Users\sen\AppData\Roaming\Microsoft\Windows\Cookies\Low\sen@interclick[1].txt
C:\Users\sen\AppData\Roaming\Microsoft\Windows\Cookies\Low\sen@mediaplex[1].txt
C:\Users\sen\AppData\Roaming\Microsoft\Windows\Cookies\Low\sen@microsoftwindows.112.2o7[1].txt
again hope i did it correct your directions are great thx for taking the time to help.

#8 rigel

rigel

    FD-BC


  • BC Advisor
  • 12,944 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:South Carolina - USA
  • Local time:02:00 AM

Posted 12 July 2010 - 08:38 PM

Looks good. Would you please update and rerun Kaspersky AV scan. Post the log for review.

Thanks :thumbsup:

"In a world where you can be anything, be yourself." ~ unknown

"Fall in love with someone who deserves your heart. Not someone who plays with it. Will Smith





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users