Download.Trojan?

  • Thread starter Carey Frisch [MVP]
  • Start date
C

Carey Frisch [MVP]

You should know that viruses/worms are oftentimes designed to corrupt
operating system files. If the following suggestions do not work,
it's time for a "Clean Install" of Windows XP.

There is a very helpful virus removal newsgroup you may wish to post to:
news://msnews.microsoft.com/microsoft.public.security.virus

Symantec Security Check
http://security.symantec.com/sscv6/default.asp?langid=ie&venid=sym

Virus Removal Tools
http://securityresponse.symantec.com/avcenter/tools.list.html

Online Virus Removal Tutorials
http://www.symantec.com/techsupp/virusremoval/virusremoval_info_tutorial.html

3 Simple Steps to Insure the Security of Your PC
http://www.microsoft.com/security/protect/


Clean Install Windows XP
http://www.michaelstevenstech.com/cleanxpinstall.html

[Courtesy of MS-MVP Michael Stevens]

--
Carey Frisch
Microsoft MVP
Windows XP - Shell/User

Be Smart! Protect your PC!
http://www.microsoft.com/security/protect/

-----------------------------------------------------------------------------------------------


| My daughter has managed to get her Windows XP PC infected with a trojan of
| some type. Norton anti-virus reports it as "Download.Trojan" but can't fix
| it. When she tries to open her Internet Explorer she gets "stcterm.html" in
| the address window and the explorer hangs up.
|
| Any suggestions from any body? She is three hours away and everything is
| second hand.
|
| Thanks.
 
M

mmsjt

My daughter has managed to get her Windows XP PC infected with a trojan of
some type. Norton anti-virus reports it as "Download.Trojan" but can't fix
it. When she tries to open her Internet Explorer she gets "stcterm.html" in
the address window and the explorer hangs up.

Any suggestions from any body? She is three hours away and everything is
second hand.

Thanks.
 
R

randy

Hmm did a search on google for this file and found nothing.. thats a first
for Google!! but i did find something and aloto this trojan . here are the
removal instructions from norton/symantec web page

a.. Turn off and remove unneeded services. By default, many operating
systems install auxiliary services that are not critical, such as an FTP
server, telnet, and a Web server. These services are avenues of attack. If
they are removed, blended threats have less avenues of attack and you have
fewer services to maintain through patch updates.
b.. If a blended threat exploits one or more network services, disable, or
block access to, those services until a patch is applied.
c.. Always keep your patch levels up-to-date, especially on computers that
host public services and are accessible through the firewall, such as HTTP,
FTP, mail, and DNS services.
d.. Enforce a password policy. Complex passwords make it difficult to
crack password files on compromised computers. This helps to prevent or
limit damage when a computer is compromised.
e.. Configure your email server to block or remove email that contains
file attachments that are commonly used to spread viruses, such as .vbs,
..bat, .exe, .pif and .scr files.
f.. Isolate infected computers quickly to prevent further compromising
your organization. Perform a forensic analysis and restore the computers
using trusted media.
g.. Train employees not to open attachments unless they are expecting
them. Also, do not execute software that is downloaded from the Internet
unless it has been scanned for viruses. Simply visiting a compromised Web
site can cause infection if certain browser vulnerabilities are not patched.


The following instructions pertain to all current and recent Symantec
antivirus products, including the Symantec AntiVirus and Norton AntiVirus
product lines.


1.. Disable System Restore (Windows Me/XP).
2.. Update the virus definitions.
3.. Restart the computer in Safe mode (Windows 95/98/Me/2000/XP) or VGA
mode (Windows NT).
4.. Run a full system scan and delete all the files detected as
Download.Trojan.
5.. Clear Internet Explorer History and files, if needed.

For specific details on each of these steps, read the following
instructions.

1. Disabling System Restore (Windows Me/XP)
If you are running Windows Me or Windows XP, we recommend that you
temporarily turn off System Restore. Windows Me/XP uses this feature, which
is enabled by default, to restore the files on your computer in case they
become damaged. If a virus, worm, or Trojan infects a computer, System
Restore may back up the virus, worm, or Trojan on the computer.

Windows prevents outside programs, including antivirus programs, from
modifying System Restore. Therefore, antivirus programs or tools cannot
remove threats in the System Restore folder. As a result, System Restore has
the potential of restoring an infected file on your computer, even after you
have cleaned the infected files from all the other locations.

Also, a virus scan may detect a threat in the System Restore folder even
though you have removed the threat.

For instructions on how to turn off System Restore, read your Windows
documentation, or one of the following articles:
a.. "How to disable or enable Windows Me System Restore"
b.. "How to turn off or turn on Windows XP System Restore"

For additional information, and an alternative to disabling Windows Me
System Restore, see the Microsoft Knowledge Base article, "Antivirus Tools
Cannot Clean Infected Files in the _Restore Folder," Article ID: Q263455.

2. Updating the virus definitions
Symantec Security Response fully tests all the virus definitions for quality
assurance before they are posted to our servers. There are two ways to
obtain the most recent virus definitions:
a.. Running LiveUpdate, which is the easiest way to obtain virus
definitions: These virus definitions are posted to the LiveUpdate servers
once each week (usually on Wednesdays), unless there is a major virus
outbreak. To determine whether definitions for this threat are available by
LiveUpdate, refer to the Virus Definitions (LiveUpdate).
b.. Downloading the definitions using the Intelligent Updater: The
Intelligent Updater virus definitions are posted on U.S. business days
(Monday through Friday). You should download the definitions from the
Symantec Security Response Web site and manually install them. To determine
whether definitions for this threat are available by the Intelligent
Updater, refer to the Virus Definitions (Intelligent Updater).

The Intelligent Updater virus definitions are available: Read "How to
update virus definition files using the Intelligent Updater" for detailed
instructions.

3. Restarting the computer in Safe mode or VGA mode
a.. For Windows 95, 98, Me, 2000, or XP users, restart the computer in
Safe mode. For instructions, refer to the document, "How to start the
computer in Safe Mode."
b.. For Windows NT 4 users, restart the computer in VGA mode.


4. Scanning for and deleting the infected files
1.. Start your Symantec antivirus program and make sure that it is
configured to scan all the files.
a.. For Norton AntiVirus consumer products: Read the document, "How to
configure Norton AntiVirus to scan all files."
b.. For Symantec AntiVirus Enterprise products: Read the document, "How
to verify that a Symantec Corporate antivirus product is set to scan all
files."
2.. Run a full system scan.
3.. If any files are detected as infected with Download.Trojan, click
Delete. If your Symantec antivirus program detects any infected files that
it cannot delete, record the location of the file and the file name. Then do
one of the following:
a.. If the file is in a location other than the Temporary Internet Files
folder, restart the computer in Safe mode a second time. Then use Windows
Explorer, browse to and delete that particular file. Once this is done,
restart the computer in Normal mode. For instructions, read the section on
returning to Normal mode in the document, "How to start the computer in Safe
Mode."
b.. If the file is in the Temporary Internet Files folder, write down
the entire path and file name. Then go on to section 5.

5. Clearing the Temporary Internet Files folder
1.. Restart the computer in Normal mode. For instructions, read the
section on returning to Normal mode in the document "How to start the
computer in Safe Mode."

2.. Log onto the computer using the name that was shown in the path that
you wrote down in step 4c.

For example, if the path was:

C:\Documents and Settings\Linda\Local Settings\Temporary Internet
Files\qrwmqczd.dll

log on to the computer as Linda.


3.. Start Internet Explorer.
4.. Click the Tools menu > Internet Options.
5.. In the Temporary Internet Files section, click the Delete Files
button.
6.. Check "Delete all offline content," and then click OK.






Write-up by: Gor Nazaryan

HOPE this HELPS
 
G

Guest

ok i got infected with that too and my NAV didnt fix it either...
the best way to remove it is manually...
Norton creates a log of every activity and threat alerts... to view it, open the main Norton Antivirus windows and go to the tab REPORTS... and beside ACTIVITY LOG click on VIEW REPORT. A second window will open up and in that, on the left column, select THREAT ALERTS... this will show you the details of all the viruses and trojans detected on the computer. Now search for the Download.trojan one... it will have the information about the file that is actually the trojan. Then search for that file manually and delete it


----- randy wrote: ----

Hmm did a search on google for this file and found nothing.. thats a firs
for Google!! but i did find something and aloto this trojan . here are th
removal instructions from norton/symantec web pag

a.. Turn off and remove unneeded services. By default, many operatin
systems install auxiliary services that are not critical, such as an FT
server, telnet, and a Web server. These services are avenues of attack. I
they are removed, blended threats have less avenues of attack and you hav
fewer services to maintain through patch updates
b.. If a blended threat exploits one or more network services, disable, o
block access to, those services until a patch is applied
c.. Always keep your patch levels up-to-date, especially on computers tha
host public services and are accessible through the firewall, such as HTTP
FTP, mail, and DNS services
d.. Enforce a password policy. Complex passwords make it difficult t
crack password files on compromised computers. This helps to prevent o
limit damage when a computer is compromised
e.. Configure your email server to block or remove email that contain
file attachments that are commonly used to spread viruses, such as .vbs
..bat, .exe, .pif and .scr files
f.. Isolate infected computers quickly to prevent further compromisin
your organization. Perform a forensic analysis and restore the computer
using trusted media
g.. Train employees not to open attachments unless they are expectin
them. Also, do not execute software that is downloaded from the Interne
unless it has been scanned for viruses. Simply visiting a compromised We
site can cause infection if certain browser vulnerabilities are not patched


The following instructions pertain to all current and recent Symante
antivirus products, including the Symantec AntiVirus and Norton AntiViru
product lines


1.. Disable System Restore (Windows Me/XP)
2.. Update the virus definitions
3.. Restart the computer in Safe mode (Windows 95/98/Me/2000/XP) or VG
mode (Windows NT)
4.. Run a full system scan and delete all the files detected a
Download.Trojan
5.. Clear Internet Explorer History and files, if needed

For specific details on each of these steps, read the followin
instructions

1. Disabling System Restore (Windows Me/XP
If you are running Windows Me or Windows XP, we recommend that yo
temporarily turn off System Restore. Windows Me/XP uses this feature, whic
is enabled by default, to restore the files on your computer in case the
become damaged. If a virus, worm, or Trojan infects a computer, Syste
Restore may back up the virus, worm, or Trojan on the computer

Windows prevents outside programs, including antivirus programs, fro
modifying System Restore. Therefore, antivirus programs or tools canno
remove threats in the System Restore folder. As a result, System Restore ha
the potential of restoring an infected file on your computer, even after yo
have cleaned the infected files from all the other locations

Also, a virus scan may detect a threat in the System Restore folder eve
though you have removed the threat

For instructions on how to turn off System Restore, read your Windows
documentation, or one of the following articles:
a.. "How to disable or enable Windows Me System Restore"
b.. "How to turn off or turn on Windows XP System Restore"

For additional information, and an alternative to disabling Windows Me
System Restore, see the Microsoft Knowledge Base article, "Antivirus Tools
Cannot Clean Infected Files in the _Restore Folder," Article ID: Q263455.

2. Updating the virus definitions
Symantec Security Response fully tests all the virus definitions for quality
assurance before they are posted to our servers. There are two ways to
obtain the most recent virus definitions:
a.. Running LiveUpdate, which is the easiest way to obtain virus
definitions: These virus definitions are posted to the LiveUpdate servers
once each week (usually on Wednesdays), unless there is a major virus
outbreak. To determine whether definitions for this threat are available by
LiveUpdate, refer to the Virus Definitions (LiveUpdate).
b.. Downloading the definitions using the Intelligent Updater: The
Intelligent Updater virus definitions are posted on U.S. business days
(Monday through Friday). You should download the definitions from the
Symantec Security Response Web site and manually install them. To determine
whether definitions for this threat are available by the Intelligent
Updater, refer to the Virus Definitions (Intelligent Updater).

The Intelligent Updater virus definitions are available: Read "How to
update virus definition files using the Intelligent Updater" for detailed
instructions.

3. Restarting the computer in Safe mode or VGA mode
a.. For Windows 95, 98, Me, 2000, or XP users, restart the computer in
Safe mode. For instructions, refer to the document, "How to start the
computer in Safe Mode."
b.. For Windows NT 4 users, restart the computer in VGA mode.


4. Scanning for and deleting the infected files
1.. Start your Symantec antivirus program and make sure that it is
configured to scan all the files.
a.. For Norton AntiVirus consumer products: Read the document, "How to
configure Norton AntiVirus to scan all files."
b.. For Symantec AntiVirus Enterprise products: Read the document, "How
to verify that a Symantec Corporate antivirus product is set to scan all
files."
2.. Run a full system scan.
3.. If any files are detected as infected with Download.Trojan, click
Delete. If your Symantec antivirus program detects any infected files that
it cannot delete, record the location of the file and the file name. Then do
one of the following:
a.. If the file is in a location other than the Temporary Internet Files
folder, restart the computer in Safe mode a second time. Then use Windows
Explorer, browse to and delete that particular file. Once this is done,
restart the computer in Normal mode. For instructions, read the section on
returning to Normal mode in the document, "How to start the computer in Safe
Mode."
b.. If the file is in the Temporary Internet Files folder, write down
the entire path and file name. Then go on to section 5.

5. Clearing the Temporary Internet Files folder
1.. Restart the computer in Normal mode. For instructions, read the
section on returning to Normal mode in the document "How to start the
computer in Safe Mode."

2.. Log onto the computer using the name that was shown in the path that
you wrote down in step 4c.

For example, if the path was:

C:\Documents and Settings\Linda\Local Settings\Temporary Internet
Files\qrwmqczd.dll

log on to the computer as Linda.


3.. Start Internet Explorer.
4.. Click the Tools menu > Internet Options.
5.. In the Temporary Internet Files section, click the Delete Files
button.
6.. Check "Delete all offline content," and then click OK.






Write-up by: Gor Nazaryan

HOPE this HELPS
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top