Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with Trojan


  • Please log in to reply
5 replies to this topic

#1 fast_car

fast_car

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:02:28 PM

Posted 15 October 2008 - 10:58 AM

hello

iv got the same problem....but the difference is that i cant run the SUPER AntiSpyware! i clicked on the downloaded icon and it stopped in the middle of the installation, goes a pop-up going "Error 1406: could not write value to key Software\Microsoft\WINDOWS\cURRENTvERSION\iNSTALLER\InProgress verify that you have sufficient access to the key, or contact your support personnel"........iv googled the error 1406 and followed the instuctions and downloaded Windows Installer 4.5 Redistributable. however, during the installation, it encounters a glitch and pops "System could not allocate the required space in a registry log" and thus the installation of Windows Installer 4.5 Redistributable was aborted. FYI, im using the admin account in my laptop.

~ after further googling, i found out a person thats been plagued by this problem, overcome this by installing CCleaner and run it. so i went on to do the same thing, but once more, theres some glitch and the installation seems stuck while doing this action "Execute: 'C:\DOCUME~1\Compaq\LOCALS~1\Temp\ytb3.exe'/s". strangely enough, theres an icon of CCleaner on my desktop and when i clicked on it, it runs as usual. so i went on cleaning whats there to be cleaned. when i got back to try installing both Windows Installer 4.5 Redistributable and SUPER AntiSpyware, the same thing pops again! i still cant install those two and i cant understand whats the problem....

~ iv tried to install spybot search n destroy, but another error occurs,"cannot write registration key blah2...".......

Besides that, i also noticed that i cant download several things on the Internet that was once downloadable....besides that, iv only aware that my firefox cant execute "save page as" command....what should i do? i kept getting the same pop-ups every 5 mins or so and iv been infected by the same trojan.....however, after i ran CCleaner, the trojan pop-up seems to be disappeared.....but i dont think the trojan had been completely wiped out from my laptop....oh,please instruct me on what i should do.....


Mod Edit: Topic split from "Trojan-spy.win32.keylogger.aa" ~ TMacK

Edited by fast_car, 15 October 2008 - 01:34 PM.


BC AdBot (Login to Remove)

 


m

#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,194 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:28 PM

Posted 15 October 2008 - 01:37 PM

It appears to me that the file.ytb3.exe'/, is the yahoo tool bar. I would recommend you uninstall CCleaner and Yahoo tool bar. They were packaged together. See if you can now install SAS and others. Should you want to reinstall the CCleaner later use the Slim version and be sure to UN check the install Yahoo Tool Bar box.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 fast_car

fast_car
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:02:28 PM

Posted 15 October 2008 - 02:07 PM

hmm......when i right-clicked on "my computer" and clicked "local users and groups">"users" it seems that beside my account and and Guest, there's another "User" account which have the description "Built-in account for administering the computer". when i right-clicked on it, clicked on "properties" it appears that this "User" is a member of administrators. this means that my computer has 2 admins! is that normal? is this one of the tricks caused by Trojan-spy.win32.keylogger.aa ??

FYI, in my computer, there's originally and still is only has 2 accounts, mine (admin) and Guest. even when i log in, only these 2 accounts appear at the start up.

when i run regedt32, i experimentally try to change the "permissions" on "SOFTWARE", however, theres a security message appears going "Unable to save permission changes on SOFTWARE. System could not allocate the required space in a registry log"


ok, i have manage to install SUPER Anti spyware but i cannot open it. when i click on the icon, nothing happened. this happened to other spyware that i have installed before like spybot.

so, any ideas what the heck happened on my computer?one thing i know is that the root of all evil in my computer starts from the infection of Trojan-spy.win32.keylogger.aa....

Edited by fast_car, 15 October 2008 - 03:22 PM.


#4 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 72,194 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:02:28 PM

Posted 15 October 2008 - 07:15 PM

Im stiil looking at this admin item.
I need to ask did you get SAS from their site or a BC reference link?
See if you can run MBAM

Please download Malwarebytes Anti-Malware and save it to your desktop.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
  • MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • On the Scanner tab:
    • Make sure the "Perform Quick Scan" option is selected.
    • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
  • Back at the main Scanner screen, click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply and exit MBAM.
Note: If MBAM encounters a file that is difficult to remove, you may be asked to reboot your computer so it can proceed with the disinfection process. Regardless if prompted to restart the computer or not, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware. MBAM may make changes to your registry as part of its disinfection routine. If you're using other security programs that detect registry changes, they may alert you after scanning with MBAM. Please permit the program to allow the changes.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#5 garmanma

garmanma

    Computer Masochist


  • Staff Emeritus
  • 27,809 posts
  • OFFLINE
  •  
  • Location:Cleveland, Ohio
  • Local time:03:28 PM

Posted 15 October 2008 - 07:47 PM

hmm......when i right-clicked on "my computer" and clicked "local users and groups">"users" it seems that beside my account and and Guest, there's another "User" account which have the description "Built-in account for administering the computer". when i right-clicked on it, clicked on "properties" it appears that this "User" is a member of administrators. this means that my computer has 2 admins! is that normal? is this one of the tricks caused by Trojan-spy.win32.keylogger.aa ??


There are other circumstances where it's possible and it's not a reflection of the virus. See if this makes sense to you:
http://www.ghacks.net/2007/10/31/check-the...on-your-system/
Mark
Posted Image
why won't my laptop work?

Having grandkids is God's way of giving you a 2nd chance because you were too busy working your butt off the 1st time around
Do not send me PMs with problems that should be posted in the forums. Keep it in the forums, so everyone benefits
Become a BleepingComputer fan: Facebook and Twitter

#6 fast_car

fast_car
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:02:28 PM

Posted 15 October 2008 - 10:49 PM

ok. iv successfully installed MBAM. And below are the log...

Malwarebytes' Anti-Malware 1.28
Database version: 1274
Windows 5.1.2600 Service Pack 3

10/16/2008 11:42:02 AM
mbam-log-2008-10-16 (11-42-02).txt

Scan type: Quick Scan
Objects scanned: 47672
Time elapsed: 3 minute(s), 2 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 4
Registry Keys Infected: 18
Registry Values Infected: 6
Registry Data Items Infected: 2
Folders Infected: 4
Files Infected: 39

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\WINDOWS\system32\tuvTnlMe.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\winzdn32.dll (Trojan.FakeAlert) -> Delete on reboot.
C:\WINDOWS\system32\khfFVMDS.dll (Trojan.Vundo) -> Delete on reboot.
C:\Program Files\PC Clean Pro\com\pcprosd.dll (Rogue.PCCleanPro) -> Delete on reboot.

Registry Keys Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0574d50f-c261-490d-bf39-4e91183c4efb} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\khffvmds (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{0574d50f-c261-490d-bf39-4e91183c4efb} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{819a806e-e95a-43da-803f-6e204de1b34f} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{819a806e-e95a-43da-803f-6e204de1b34f} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\winzdn32 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{c9c42510-9b41-42c1-9dcd-7282a2d07c61} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{04ad6348-b9ab-4ba0-b1ff-da7404529593} (Rogue.PCCleanPro) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\AllFilesystemObjects\shellex\ContextMenuHandlers\pcprosd.dll (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\pcprosd.dll (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\PC Clean Pro (Rogue.PCCleanPro) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\MSFox (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\logons (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\typelib (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SYSTEM\currentcontrolset\Services\iTunesMusic (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSSMGR (Trojan.Downloader) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\chkshproc (Trojan.FakeAlert.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\brastk (Trojan.FakeAlert.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{0574d50f-c261-490d-bf39-4e91183c4efb} (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{04ad6348-b9ab-4ba0-b1ff-da7404529593} (Rogue.PCCleanPro) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\huy (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\brastk (Trojan.FakeAlert) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\tuvtnlme -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\tuvtnlme-> Delete on reboot.

Folders Infected:
C:\WINDOWS\mslagent (Adware.EGDAccess) -> Quarantined and deleted successfully.
C:\Program Files\PC Clean Pro (Rogue.PCCleanPro) -> Delete on reboot.
C:\Program Files\PC Clean Pro\com (Rogue.PCCleanPro) -> Delete on reboot.
C:\WINDOWS\system32\124909 (Trojan.BHO) -> Quarantined and deleted successfully.

Files Infected:
C:\WINDOWS\system32\khfFVMDS.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\tuvTnlMe.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\eMlnTvut.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\eMlnTvut.ini2 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\fabedkly.exe (Trojan.FakeAlert.H) -> Delete on reboot.
C:\WINDOWS\system32\brastk.exe (Trojan.FakeAlert.H) -> Delete on reboot.
C:\WINDOWS\system32\winzdn32.dll (Trojan.FakeAlert) -> Delete on reboot.
C:\WINDOWS\system32\fb.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\karna.dat (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\cbXpoLDT.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\geBuRHWO.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\karna.dat (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\hgGwuRkI.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\winzlo32.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\opnnnmjk.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ssqPfgff.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\iifedBQI.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\qoMeEXNd.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\mesn.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\ymysq.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\compaq\Local Settings\Temp\twe7.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\compaq\Local Settings\Temp\twe8.tmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\keygen.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\serial.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Documents and Settings\compaq\Desktop\spynomore_key.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Documents and Settings\compaq\Desktop\kapersky_antivirus_6_0.exe (Spyware.OnlineGames) -> Quarantined and deleted successfully.
C:\Program Files\PC Clean Pro\PC Clean Pro.exe (Rogue.PCCleanPro) -> Quarantined and deleted successfully.
C:\Program Files\PC Clean Pro\com\pcprosd.dll (Rogue.PCCleanPro) -> Delete on reboot.
C:\WINDOWS\system32\124909\124909.dll (Trojan.BHO) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\mcrh.tmp (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ (Fake.Dropped.Malware) -> Delete on reboot.
C:\WINDOWS\system32\dpcproxy.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\serauth1.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\serauth2.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\beep.sys (Fake.Beep.Sys) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\dllcache\beep.sys (Fake.Beep.Sys) -> Quarantined and deleted successfully.
C:\WINDOWS\brastk.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\wini10714.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Documents and Settings\compaq\Local Settings\Temp\video266.cfg (Trojan.FakeAlert) -> Quarantined and deleted successfully.


ok....the Pop-ups of trojan has been removed...and i can install Sas now. its seems that MBAM works and fixed the problem. but i still have 2 admins in my computer. i dont know whether this will cause any problems...but i'll keep on posting later.

Edited by fast_car, 15 October 2008 - 11:07 PM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users