Trojans.... Is there a way???

G

Guest

Hi, my daughters computer got a trojan on it and try as I may it won't be
gone. We are using Avast and Search and Destroy SE and it says it's cleaned
it but it is still there. This trojan opens up a IE window at start up called
uglyphotos or something and I've searched the pc and found nothing on there.
Is there a way to get the trojan of without reformatting. Any help
appreciated.
 
G

Guest

evergrowingbump said:
Hi, my daughters computer got a trojan on it and try as I may it won't be
gone. We are using Avast and Search and Destroy SE and it says it's cleaned
it but it is still there. This trojan opens up a IE window at start up called
uglyphotos or something and I've searched the pc and found nothing on there.
Is there a way to get the trojan of without reformatting. Any help
appreciated.


Oh we are running XP Pro
 
P

Pennywise

evergrowingbump said:
Hi, my daughters computer got a trojan on it and try as I may it won't be
gone. We are using Avast and Search and Destroy SE and it says it's cleaned
it but it is still there. This trojan opens up a IE window at start up called
uglyphotos or something and I've searched the pc and found nothing on there.
Is there a way to get the trojan of without reformatting. Any help
appreciated.

Visit and use the services of http://hijackthis.de/en

http://www.ewido.net/en/ is a pretty good malware detector

NOD32 is a good anti virual program, it uses IMON and will usually
detect malware before it reaches your computer (in transit)
NOD32 www.SoftwareSecuritySolutions.com (for next time)

But no you don't need to reformat to get rid of malware.
 
R

Rock

evergrowingbump said:
Hi, my daughters computer got a trojan on it and try as I may it won't be
gone. We are using Avast and Search and Destroy SE and it says it's
cleaned
it but it is still there. This trojan opens up a IE window at start up
called
uglyphotos or something and I've searched the pc and found nothing on
there.
Is there a way to get the trojan of without reformatting. Any help
appreciated.


It's SpyBot Search and Destroy and Adaware SE. Have you run the scans in
safe mode? It sometimes takes several different anti-malware programs to
clean a system. Here are some links for dealing with malware. Also what is
the name of the trojan? On google.com search for the string..... "Remove
(Name of Trojan)" without the quotes and parenthesis: www.google.com

THE PARASITE FIGHT
Finding, Removing & Protecting Yourself From Scumware
http://aumha.org/a/parasite.htm

Richard Harper’s Guide to Cleaning Pests
http://rgharper.mvps.org/cleanit.htm

http://www.elephantboycomputers.com/page2.html#Removing_Malware

PC Hell Spyware and Adware Removal Help
http://www.pchell.com/support/spyware.shtml

http://mvps.org/winhelp2002/unwanted.htm
 
J

Joe Wright

evergrowingbump said:
Hi, my daughters computer got a trojan on it and try as I may it won't be
gone. We are using Avast and Search and Destroy SE and it says it's cleaned
it but it is still there. This trojan opens up a IE window at start up called
uglyphotos or something and I've searched the pc and found nothing on there.
Is there a way to get the trojan of without reformatting. Any help
appreciated.

Once infected, it sometimes a Safe Mode, or Boot scan to remove a virus
so the virus isn't running at the time, and can't rewrite itself to the
registry.

With Avast!, you can open the control panel by double-clicking the
Desktop icon, or right=click the orb in the tray, click "Start Avast!
Antivirus". Once you have the control panel, click the arrow-looking
icon it the upper left corner, click "Schedule Boot-Time Scan...".
Restart the computer and, when prompted to remove a virus, I think you
press 2, Enter to select "Delete All". Then you won't have to
continually press buttons throughout the scan.
 
P

Plato

=?Utf-8?B?ZXZlcmdyb3dpbmdidW1w?= said:
Hi, my daughters computer got a trojan on it and try as I may it won't be
gone. We are using Avast and Search and Destroy SE and it says it's cleaned
it but it is still there. This trojan opens up a IE window at start up called
uglyphotos or something and I've searched the pc and found nothing on there.
Is there a way to get the trojan of without reformatting. Any help
appreciated.

You already tried in safe mode?
 
D

David H. Lipman

From: "evergrowingbump" <[email protected]>

| Hi, my daughters computer got a trojan on it and try as I may it won't be
| gone. We are using Avast and Search and Destroy SE and it says it's cleaned
| it but it is still there. This trojan opens up a IE window at start up called
| uglyphotos or something and I've searched the pc and found nothing on there.
| Is there a way to get the trojan of without reformatting. Any help
| appreciated.


Download MULTI_AV.EXE from the URL --
http://www.ik-cs.com/programs/virtools/Multi_AV.exe

To use this utility, perform the following...
Execute; Multi_AV.exe { Note: You must use the default folder C:\AV-CLS }
Choose; Unzip
Choose; Close

Execute; C:\AV-CLS\StartMenu.BAT
{ or Double-click on 'Start Menu' in C:\AV-CLS }

NOTE: You may have to disable your software FireWall or allow WGET.EXE to go through your
FireWall to allow it to download the needed AV vendor related files.

C:\AV-CLS\StartMenu.BAT -- { or Double-click on 'Start Menu' in C:\AV-CLS}
This will bring up the initial menu of choices and should be executed in Normal Mode.
This way all the components can be downloaded from each AV vendor's web site.
The choices are; Sophos, Trend, McAfee, Kaspersky, Exit this menu and Reboot the PC.

You can choose to go to each menu item and just download the needed files or you can
download the files and perform a scan in Normal Mode. Once you have downloaded the files
needed for each scanner you want to use, you should reboot the PC into Safe Mode [F8 key
during boot] and re-run the menu again and choose which scanner you want to run in Safe
Mode. It is suggested to run the scanners in both Safe Mode and Normal Mode.

When the menu is displayed hitting 'H' or 'h' will bring up a more comprehensive PDF help
file. http://www.ik-cs.com/multi-av.htm

Additional Instructions:
http://pcdid.com/Multi_AV.htm


* * * Please report back your results * * *
 
H

HeyBub

evergrowingbump said:
Hi, my daughters computer got a trojan on it and try as I may it
won't be gone. We are using Avast and Search and Destroy SE and it
says it's cleaned it but it is still there. This trojan opens up a IE
window at start up called uglyphotos or something and I've searched
the pc and found nothing on there. Is there a way to get the trojan
of without reformatting. Any help appreciated.

"Trojans" usually operate in stealth mode -- they don't want to announce
their presence. You probably have some sort of adware or spyware. These are
usually not the province of virus detectors or virus removers.

True, there is a great deal of overlap between various kinds of malicious
software ("malware"), but, in general:

Virus = Causes local destruction
Trojan = Usually does NOT cause local destruction (i.e., used to send
somebody else's spam)
Adware = Bombards you with advertising
Spyware = Watches what you do and calls home with the info
(Worm = Relates to method of propagation, not the results)

Use Adaware or Spyware Blaster and other malware detector/remover.
 
D

David H. Lipman

From: "HeyBub" <[email protected]>


|
| "Trojans" usually operate in stealth mode -- they don't want to announce
| their presence. You probably have some sort of adware or spyware. These are
| usually not the province of virus detectors or virus removers.
|
| True, there is a great deal of overlap between various kinds of malicious
| software ("malware"), but, in general:
|
| Virus = Causes local destruction
| Trojan = Usually does NOT cause local destruction (i.e., used to send
| somebody else's spam)
| Adware = Bombards you with advertising
| Spyware = Watches what you do and calls home with the info
| (Worm = Relates to method of propagation, not the results)
|
| Use Adaware or Spyware Blaster and other malware detector/remover.
|

Close, but not really...

Virus -- software that self replicates and often has a payload that may be destructive.
Viruses that spread via network protocols are worms. They thus replicate by infecting other
computers by using network protocols such as; NetBIOS over IP, SMTP, NNTP, SMB, RPC, etc.
An example of a destructive virus payload would be the CIH (aka; Chernobyl). When this
virus infects a goven computer it has a payload date. On the payload dat it may destroy
data on the hard diak and if the BIOS of the infected computer is Flash BIOS and is NOT
write-potected, the payload will erase or corrupt the BIOS and thus leave the computer
incapable of booting. Examples of a non-destructive viruses would be the Boot Sector
Infectors "NYB" and "Form". Once a computer or media is infected, it will spread to other
media. For example, read an infected floppy on a non-infected computer and the computer's
hard disk will now be infected.

{ Note: The "Form" and "NYB" rely on FAT and NOT NTFS and therefore do not spead on NT
based system using NTFS partition schemes. }

Trojan -- software that does NOT self replicate but usually has a payload that may be
destructive but usually is NON destructive and designed to perform the payload function of
intent by the author. Sometimes they are written poorly and thuis crash the computer and
may be considered destructtive. An example would be some Backdoor.Haxdoor variants that mat
result in a BSoD. The BSoD condition was not the authors intent but it may be the
consequence. A destructive payload may be hard disk data removal and/or data file removal
or corruption. A non-destructive payload example would be a Trojan dialer. Its objective
is to use you PC modem to dial off-shore or 900 numbers to bring in revenue. Another woould
be a Trojan Proxy. Here a third party will use and control your PC which acts as a Proxy
agent. The intended victim of the malicious activity does not see the orginator, the victim
instead sees the Proxy infected user.

Interestingly, many Trojan cans and will be infected with a virus. For exmaple, I have sen
mIRC
backdoor Trojans infected with the Parite virus.

Basically all are under the the name of "malware". Malware is broken down into to
sub-types, viruses and non-viral malware. The non-viral malware class has become a growing
problem nad now infects more computers. Trojans are considered non-viral malware but you
will find the word Trojan used as if it was a virus. There are many forms of non-viral
malware that exist. Some examples...
adware
spyware
proxy agents
spam bots
browser helper objects
browser hijackers
DDoS agents
downloaders
droppers
 
H

HeyBub

David said:
Close, but not really...

Virus -- software that self replicates and often has a payload that
may be destructive. Viruses that spread via network protocols are
worms. They thus replicate by infecting other computers by using
network protocols such as; NetBIOS over IP, SMTP, NNTP, SMB, RPC,
etc. An example of a destructive virus payload would be the CIH (aka;
Chernobyl). When this virus infects a goven computer it has a
payload date. On the payload dat it may destroy data on the hard
diak and if the BIOS of the infected computer is Flash BIOS and is
NOT write-potected, the payload will erase or corrupt the BIOS and
thus leave the computer incapable of booting. Examples of a
non-destructive viruses would be the Boot Sector Infectors "NYB" and
"Form". Once a computer or media is infected, it will spread to
other media. For example, read an infected floppy on a non-infected
computer and the computer's hard disk will now be infected.

{ Note: The "Form" and "NYB" rely on FAT and NOT NTFS and therefore
do not spead on NT based system using NTFS partition schemes. }

Trojan -- software that does NOT self replicate but usually has a
payload that may be destructive but usually is NON destructive and
designed to perform the payload function of intent by the author.
Sometimes they are written poorly and thuis crash the computer and
may be considered destructtive. An example would be some
Backdoor.Haxdoor variants that mat result in a BSoD. The BSoD
condition was not the authors intent but it may be the consequence.
A destructive payload may be hard disk data removal and/or data file
removal or corruption. A non-destructive payload example would be a
Trojan dialer. Its objective is to use you PC modem to dial
off-shore or 900 numbers to bring in revenue. Another woould be a
Trojan Proxy. Here a third party will use and control your PC which
acts as a Proxy agent. The intended victim of the malicious activity
does not see the orginator, the victim instead sees the Proxy
infected user.

Interestingly, many Trojan cans and will be infected with a virus.
For exmaple, I have sen mIRC
backdoor Trojans infected with the Parite virus.

Basically all are under the the name of "malware". Malware is broken
down into to sub-types, viruses and non-viral malware. The non-viral
malware class has become a growing problem nad now infects more
computers. Trojans are considered non-viral malware but you will
find the word Trojan used as if it was a virus. There are many forms
of non-viral malware that exist. Some examples...
adware
spyware
proxy agents
spam bots
browser helper objects
browser hijackers
DDoS agents
downloaders
droppers

Good explanations! Now condense each definition to one line.
 
D

David H. Lipman

From: "bamajim" <[email protected]>

| Malware/Spyware removal is becoming a special field
| Here are a few links to forums that specialize in Malware/Spyware removal
|
| http://forums.us.dell.com/supportforums/board?board.id=si_hijack
|
| http://forums.tomcoyote.org/index.php?s=7978e4b3726db887fefff71bebfc20db&
|
| http://forum.malwareremoval.com/
|
| http://www.castlecops.com/
|

I see you listed Dell. That's funny !

They are shipping NEW computers with a vulnerable version of Sun Java, Even after you get
the computer and Sun Java auti-updates to the latest version, the computer remains at-risk
of being infected with malware, such the Vundo Trojan/Virtumonde Adware, if you don't
manually remove the vulnerable version of Sun Java.


If you are using any version of Sun Java that is prior to JRE Version 5.0 update 6,
then you are strongly urged to remove any/all versions that are prior to JRE/JSE
Version 5.0 update 6. There are vulnerabilities in them and they are actively being
exploited.

Therefore, it is highly suggested that if there are any prior versions of Sun Java
to Version 6 on the PC that they be removed ASAP.

The latest version is Sun Java JRE/JSE Version 5.0 Update 8

Simple check, look under...
C:\Program Files\Java

The only folder under that folder should be the latest version.

Such as...
C:\Program Files\Java\jre1.5.0_08


http://www.java.com/en/download/manual.jsp

or

http://java.sun.com/javase/downloads/index.jsp
 
C

cquirke (MVP Windows shell/user)

Oh boy, malware taxonomy!

FWIW, here's mine...

I use "malware" to refer to all software that:
- is user-hostile
- enters the system under false pretences

The terms "virus", "worm" and "trojan" relate to behaviors, and modern
malware is usually complex enough to show multiple behaviors.


Viruses infect something (files or disks) and passively waits for that
something to be spread through the normal course of events.

Worms actively send themselves out, rather than waiting to be
passively carried about, and are self-contained files (or in-memory
processes) rather than embedded in existing files.

Trojans pose as something harmless or useful; they may enter the
system by passively mimicing something you want, so that you instigate
thier installation, but can spread in other ways.


Modern malware usually exists to do work, and usually work that
generates income. Some opportunities to generate income require the
recipient of that income to be visible, and so the recipient is (or
poses as) a commercial business - hence "commercial malware".

Other ways of making money do not require visibility, so the attacker
can stay anonymous and is therefore not constrained to actions that
could be plausibly denied or defended as business practice.

A third type of malware is not intended to make money; this I refer to
as "traditional malware", in contrast to commercial malware.


I don't use the term "spyware" at all. Most commercial malware does
not spy - it's more likey to make money by showing you ads, enticing
you to click on sponsored links added to arbitrary content, or shoving
some sponsor's web page in your face as your home or search pages.

The software that does spy (keyloggers, RATs) are nearly always
criminally rather than commercially deployed, and are more usually
referred to as "trojans", irrespective of how they spread.


Malware can spread in different ways, and at different speeds:

1-generation, real-time

For example, malware may be hosted on sites that can be updated in
real-time to stay ahead of av detection signatures, or can be spammed
out from a central point. The latter is slower, but in both cases,
there is only one generation of spread, directly from the source to
the victim. This is usually too fast for av to keep up.

n-generation, but extremely fast

These are the pure network worms that enter the system via an
exploitable edge, and out again within a matter of seconds. Again,
the speed is faster than a daily-updated av can match; for example,
Saphire/Slammer went global within a few minutes of release.

n-generation, store-and-forward

This is your classic modern "virus" spread, from one infected PC to
one or more others, via email, messenging, peer-2-peer file sharing,
or disks that get carried around. It's a slow spreading method that's
more likely to be trumped by your daily av updates.

custom

Custom tools are not spread in the wild, but may be uploaded by human
hackers via some RAT (Remote Access Trojan) bridgehead. Because the
software hasn't been widely exposed, av is unlikely to catch it.

real-time updated

Some malware will automatically pull down updates or replacements for
itself, or take the form of a simple downloader stub that pulls down
the "real" malware. In both cases, there's that real-time factor that
means the malware is likely to be too new for av to detect. The main
defense is global; finding the host sites and shutting them down.


Then there are the ways that malware gets to run on the system:

runtime only

Some malware never exist as files at all - or make any attempt to
persist across runtimes. So if you switch the PC off or reboot it to
scan it, the malware you're looking for is gone. This type of pure
runtime infection makes sense for servers that are always connected
and are never shut down, and is also practical for broadband users of
NT-generation OSs, as this combines lengthy uptimes (no resource heap
depletion a la Win9x) with always-on (Inter)net access.

intrafile infection

These are your pure file viruses, which do not exist as separate files
but insert themselves within existing files that you'd want to keep.
The purest form also requires no explicit integration, because the
virus code runs whenever the infected file runs. This is type of
malware is best managed via antivirus tools; it is in fact the key
malware type for which av was invented.

stand-alone files with integration

Most modern malware fall into this category; the entire file is the
malware, and it needs to be integrated via startup axis, file
association etc. in order to run at all. HiJackThis and similar tools
can be used to manually track and manage such malware, and most
"antispyware" tools look as much for integration cues as the malware
files themselves. Complications can arise if the malware file is
deleted without cleaning up integration references to it.

landmine

Some malware avoid detection by not running most of the time; instead,
they lie around passively until the user trips over them in some way.
It's rare that malware will exist purely in this form; usually it will
be a separate component of an active malware that seeks to remain
undetected and thus later retain ownership of the victim. The
workings of System Restore can accidentally create this mechanism.

inactive

Often you will have malware that has never run, possibly because the
surface it seeks to exploit is not there, or the user's too smart to
click. Examples include email attachments you've received but not
"opened", stuff that's dumped into web cache, etc.


Then there are the ways that malware can resist removal; rootkits,
task-killers, DNS poisoners, re-infecting files after they've been
scanned, task re-spawners, recurrent primary entry, etc. Almost all
of these tactics can be disabled by isoltaing the PC from other
systems, and scanning it without running ANY code on the HD.

The point about all this is that it clarifies your defense and
management strategies. For example, a firewall is more useful than an
av as defense against pure network worms, whereas av scanners are your
best hope to detect and manage intrafile infectors. Many malware
spill out of these categories, e.g. stand-alone malware files that
also infect existing files or that integrate the files they infect.


------------ ----- --- -- - - - -
Drugs are usually safe. Inject? (Y/n)
 
C

cquirke (MVP Windows shell/user)

I see you listed Dell. That's funny !

They are shipping NEW computers with a vulnerable version of Sun Java, Even after you get
the computer and Sun Java auti-updates to the latest version, the computer remains at-risk
of being infected with malware, such the Vundo Trojan/Virtumonde Adware, if you don't
manually remove the vulnerable version of Sun Java.
If you are using any version of Sun Java that is prior to JRE Version 5.0 update 6,
then you are strongly urged to remove any/all versions that are prior to JRE/JSE
Version 5.0 update 6. There are vulnerabilities in them and they are actively being
exploited.

I've just blogged on this topic (as well as others)...

http://cquirke.blogspot.com


------------ ----- --- -- - - - -
Drugs are usually safe. Inject? (Y/n)
 
D

David H. Lipman

From: "cquirke (MVP Windows shell/user)" <[email protected]>


|
| I've just blogged on this topic (as well as others)...
|
| http://cquirke.blogspot.com
|


Hi Chris:

Yepper, we can thank MS MVP MowGreen for his dilligence in this subject matter for
identifying the problem and getting Sun to admit it public.

The article you reference in your Blog was dated: Aug 21, 2006. However, Sun actually made
the first admitted there was a problem on Feb 7, 2006
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102171-1

Interestingly I was discussing this subject matter with MowGreen back in October 2005 and he
had been working this issue for several months by then.

There have been questions raised if those JS Trojan Exploits that are known to exploit MSJVM
may also be exploiting these versions of Sun Java !
 
G

Guest

Hey all,

Thanks for all the info and help. The problem has now been resolved using
alot of the advise given and someone with much more knowledge of pc's than
me. Pc is clean, virus, trojan adware and malware free now. I read this stuff
and got confused very quickly but thanks to a smart and wise friend, and all
your help, all is well.

Cheers,

Michelle
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Similar Threads


Top