Related:
- Got an annoying little trojan (Kryptik.IXJ)
- Trojan remover - Download - Antivirus
- Annoying duck desktop - Download - Other
- Game center pop up annoying android - Guide
- Trojan brisv - Viruses & Security Forum
- Lenovo Ideapad 530s Annoying Sound - Laptop Forum
2 responses
jack4rall
Posts
6428
Registration date
Sunday June 6, 2010
Status
Moderator
Last seen
July 16, 2020
May 25, 2011 at 07:56 AM
May 25, 2011 at 07:56 AM
Hello,
Try this 1
1) Go to "Safe Mode with Networking"
2) Download the applications from the below link.
https://download.bleepingcomputer.com/grinler/rkill.com
https://ccm.net/downloads/security-and-maintenance/4621-malwarebytes-anti-malware/
Run the rkill which will terminate the malicious processes. Wait for the process to
get completed. Then, install the "Malwarebytes' Anti-Malware", update it and
perform "Full Scan".
3) After completion of step 2, follow the below instructions
Click on the below link and download the application
https://www.zebulon.fr/telechargements/securite/systeme/zhpdiag.html
Install the downloaded application --> Now you can find two shortcuts icons
ZHPDiag and ZHPFix.
3) Double-click on "ZHPDiag". When the "ZHPDiag" window appears, select the
below additional options by going to "Options (Screwdriver Icon)"
[] Redirection of the file HOSTS
[] Last file created in windows prefetcher.
[] Last modified or created user files.
Now click on the Magnifying glass and run the analysis.
Wait for the process to get completed. When the analysis process gets completed
click on the "Save button ( Floppy Icon)" and save the report on your desktop.
Now upload the file in speedyshare. Click on the below link
https://authentification.site
Click on "Browse" button and select the saved report --> Click on "Click here to
start uploading" button --> Now copy the given URL and post it here.
Good Luck
Try this 1
1) Go to "Safe Mode with Networking"
2) Download the applications from the below link.
https://download.bleepingcomputer.com/grinler/rkill.com
https://ccm.net/downloads/security-and-maintenance/4621-malwarebytes-anti-malware/
Run the rkill which will terminate the malicious processes. Wait for the process to
get completed. Then, install the "Malwarebytes' Anti-Malware", update it and
perform "Full Scan".
3) After completion of step 2, follow the below instructions
Click on the below link and download the application
https://www.zebulon.fr/telechargements/securite/systeme/zhpdiag.html
Install the downloaded application --> Now you can find two shortcuts icons
ZHPDiag and ZHPFix.
3) Double-click on "ZHPDiag". When the "ZHPDiag" window appears, select the
below additional options by going to "Options (Screwdriver Icon)"
[] Redirection of the file HOSTS
[] Last file created in windows prefetcher.
[] Last modified or created user files.
Now click on the Magnifying glass and run the analysis.
Wait for the process to get completed. When the analysis process gets completed
click on the "Save button ( Floppy Icon)" and save the report on your desktop.
Now upload the file in speedyshare. Click on the below link
https://authentification.site
Click on "Browse" button and select the saved report --> Click on "Click here to
start uploading" button --> Now copy the given URL and post it here.
Good Luck
Hi
I had the same Trojan on one of my laptops so this is what I did(You should turn off your system restore before start cleaning a Malware but sometimes restoring windows to nearest point before infection will save your system & turning off it may cause to loose some of your files that deleted by Malware in this case some of my desktop files are gone) :
1- Boot to "Safe Mode"
2- Use "rkill" from above link (I used it 4 times Until it didn't find any processes to kill)
3- Install "Malwarebytes' Anti-Malware Pro" & update it using offline update package (I don't like to connect to internet when there is a Malware on my system) & performed a full scan with it. 3 malware found. choose to delete them & it ask to restart.
4- Restart to windows normal mode (Windows work now) & update "Malwarebytes' Anti-Malware" & perform another full scan.2 registry keys found (One diable taskmanager & another disable changing wallpaper) & delete them with another restart.(I updated ESET too & performed a full scan with it too but nothing found but you do this too maybe they updated their definition by now)
5- Then I found 2 other files in "Documents and Settings\All Users" folder. An exe file & another file with the same name as the file ESET found it as Kryptik.IXJ Trojan that obviously left overs so I deleted them manually. No problem in deleting them because they don't booted with windows anymore.
6- Now there is no desktop & no write click on it yet.
Use "Run" from start menu & type "regedit" to go to registry & go to this path (This path maybe correct for WinXP only) :
HKey_Current_User>Software>Microsoft>Windows>CurrentVersion>Policies>
There are 3 folders you should check for changed values, "ActiveDesktop, Explorer and System".
It's easy to understand what most of those registry do.
In my case the problem was a registry key in Explorer folder with a name of "NoDesktop" that I double clicked on it & turned the value from "1" to "0".
Restarted & desktop is back but I lost some of my files on desktop.
7- I was too tired to resume checking for other changes & fixing them or searching if it's copied my desktop files somewhere else so I stopped here. I will write here if I found anything else after resume working on it again. ;)
I had the same Trojan on one of my laptops so this is what I did(You should turn off your system restore before start cleaning a Malware but sometimes restoring windows to nearest point before infection will save your system & turning off it may cause to loose some of your files that deleted by Malware in this case some of my desktop files are gone) :
1- Boot to "Safe Mode"
2- Use "rkill" from above link (I used it 4 times Until it didn't find any processes to kill)
3- Install "Malwarebytes' Anti-Malware Pro" & update it using offline update package (I don't like to connect to internet when there is a Malware on my system) & performed a full scan with it. 3 malware found. choose to delete them & it ask to restart.
4- Restart to windows normal mode (Windows work now) & update "Malwarebytes' Anti-Malware" & perform another full scan.2 registry keys found (One diable taskmanager & another disable changing wallpaper) & delete them with another restart.(I updated ESET too & performed a full scan with it too but nothing found but you do this too maybe they updated their definition by now)
5- Then I found 2 other files in "Documents and Settings\All Users" folder. An exe file & another file with the same name as the file ESET found it as Kryptik.IXJ Trojan that obviously left overs so I deleted them manually. No problem in deleting them because they don't booted with windows anymore.
6- Now there is no desktop & no write click on it yet.
Use "Run" from start menu & type "regedit" to go to registry & go to this path (This path maybe correct for WinXP only) :
HKey_Current_User>Software>Microsoft>Windows>CurrentVersion>Policies>
There are 3 folders you should check for changed values, "ActiveDesktop, Explorer and System".
It's easy to understand what most of those registry do.
In my case the problem was a registry key in Explorer folder with a name of "NoDesktop" that I double clicked on it & turned the value from "1" to "0".
Restarted & desktop is back but I lost some of my files on desktop.
7- I was too tired to resume checking for other changes & fixing them or searching if it's copied my desktop files somewhere else so I stopped here. I will write here if I found anything else after resume working on it again. ;)
No file deleted by the Trojan the person who ran the infected file on my system was moving them from desktop to some place else before infection. :D
So It doesn't delete any user files only it turned them to hidden.
But it deleted many of my shortcuts under start menu, all quick launch & all shortcuts in "Administrative Tools" under control panel.(Not a big problem)
you can get back some of your startmenu shortcuts by unhide "Start Menu" folders under user's profiles.
At last the Trojan create shortcuts to itself on desktop & start menu with these name "Windows XP Recovery". Delete them manually & make sure the target file of them deleted too.
So It doesn't delete any user files only it turned them to hidden.
But it deleted many of my shortcuts under start menu, all quick launch & all shortcuts in "Administrative Tools" under control panel.(Not a big problem)
you can get back some of your startmenu shortcuts by unhide "Start Menu" folders under user's profiles.
At last the Trojan create shortcuts to itself on desktop & start menu with these name "Windows XP Recovery". Delete them manually & make sure the target file of them deleted too.