How to Remove a Trojan, Virus, Worm, Or Other Malware

5
Bleeping Computer · Donate Blogs Chat Help Search Search Forums Advanced Search Search with Google RSS Welcome Guest ( Log In | Create Account) New Member? Join for free. Have a problem and would like to ask us for help? To learn how to ask your question Click Here! Do you have popups or other malware infecting your computer? If so, Start Here! Are you having trouble using this site? Then you should visit the New User Orientation Center! Bleeping Computer -> Tutorials -> Spyware/Hijacker/Malware Removal -> How to remove a Trojan, Virus, Worm, or other Malware Home · Sections · Popular · New Tutorials Enter keywords that you would like search our tutorials for: Please note that all keywords must be 4 or more characters long. How to remove a Trojan, Virus, Worm, or other Malware by Bleeping Computer on 18th of May 2005 (Views: 935,625) Print Tutorial Tell a friend Add to del.icio.us! · Submit to reddit! · digg it! · Submit to My-Tuts! How to remove a Trojan, Virus, Worm, or other Malware Table of Contents 1. Diallers, Trojans, Viruses, Worms Oh My! 2. How these infections start 3. How to remove these infections 4. How to protect yourself in the future 5. Sponsors Antivirus Purchase Premiere Anti Spyware software from Kaspersky Help Desk Software Help desk software from Parature - the best solution for your company How to remove a Trojan, Virus, Worm, or other Malware http://www.bleepingcomputer.com/tutorials/tutorial101.html (1 of 5)5/13/2007 2:44:03 AM

description

How to remove a Trojan, Virus, Worm, or other Malware

Transcript of How to Remove a Trojan, Virus, Worm, Or Other Malware

  • Bleeping Computer Donate Blogs Chat Help

    Search Search Forums

    Advanced Search

    Search with Google

    RSS

    Welcome Guest (Log In | Create Account) New Member? Join for free.

    Have a problem and would like to ask us for help? To learn how to ask your question Click Here!

    Do you have popups or other malware infecting your computer? If so, Start Here!

    Are you having trouble using this site? Then you should visit the New User Orientation Center!

    Bleeping Computer -> Tutorials -> Spyware/Hijacker/Malware Removal -> How to remove a Trojan, Virus, Worm, or other Malware

    Home Sections Popular New Tutorials

    Enter keywords that you would like search our tutorials for:Please note that all keywords must be 4 or more characters long.

    How to remove a Trojan, Virus, Worm, or other Malware

    by Bleeping Computer on 18th of May 2005 (Views: 935,625)

    Print Tutorial Tell a friend

    Add to del.icio.us! Submit to reddit! digg it! Submit to My-Tuts!

    How to remove a Trojan, Virus, Worm, or other Malware

    Table of Contents

    1. Diallers, Trojans, Viruses, Worms Oh My!

    2. How these infections start

    3. How to remove these infections

    4. How to protect yourself in the future

    5.

    Sponsors

    Antivirus Purchase Premiere Anti Spyware software from Kaspersky

    Help Desk Software Help desk software from Parature - the best solution for your company

    How to remove a Trojan, Virus, Worm, or other Malware

    http://www.bleepingcomputer.com/tutorials/tutorial101.html (1 of 5)5/13/2007 2:44:03 AM

    http://www.bleepingcomputer.com/http://www.bleepingcomputer.com/forums/http://www.bleepingcomputer.com/glossary/http://www.bleepingcomputer.com/resources/http://www.bleepingcomputer.com/startups/http://www.bleepingcomputer.com/uninstall/http://www.bleepingcomputer.com/filedb/http://www.bleepingcomputer.com/http://www.bleepingcomputer.com/tutorials/http://www.bleepingcomputer.com/http://www.bleepingcomputer.com/supportus.php#donationhttp://www.bleepingcomputer.com/forums/index.php?automodule=bloghttp://www.bleepingcomputer.com/chat.phphttp://www.bleepingcomputer.com/forums/index.php?act=Helphttp://www.bleepingcomputer.com/forums/index.php?act=Search&f=http://www.bleepingcomputer.com/forums/index.php?act=Search&f=http://www.google.com/custom?domains=BleepingComputer.com&sitesearch=&sa=Search&client=pub-0920899300397823&forid=1&channel=3735109218&ie=ISO-8859-1&oe=ISO-8859-1&safe=active&cof=GALT%3A%23008000%3BGL%3A1%3BDIV%3A%23336699%3BVLC%3A663399%3BAH%3Acenter%3BBGC%3AFFFFFF%3BLBGC%3A336699%3BALC%3A0000FF%3BLC%3A0000FF%3BT%3A000000%3BGFNT%3A0000FF%3BGIMP%3A0000FF%3BFORID%3A1%3B&hl=enhttp://www.bleepingcomputer.com/rss.phphttp://www.bleepingcomputer.com/forums/index.php?act=Login&CODE=00http://www.bleepingcomputer.com/forums/index.php?act=Reg&CODE=00http://www.bleepingcomputer.com/forums/index.php?act=Reghttp://www.bleepingcomputer.com/forums/topic33007.htmlhttp://www.bleepingcomputer.com/forums/topic33007.htmlhttp://www.bleepingcomputer.com/forums/topic34773.htmlhttp://www.bleepingcomputer.com/forums/topic34773.htmlhttp://www.bleepingcomputer.com/forums/forum82.htmlhttp://www.bleepingcomputer.com/forums/forum82.htmlhttp://www.bleepingcomputer.com/http://www.bleepingcomputer.com/tutorials/http://www.bleepingcomputer.com/tutorials/category38.htmlhttp://www.bleepingcomputer.com/tutorials/http://www.bleepingcomputer.com/tutorials/sections.htmlhttp://www.bleepingcomputer.com/tutorials/popular.htmlhttp://www.bleepingcomputer.com/tutorials/new.htmlhttp://www.bleepingcomputer.com/tutorials/index.php?act=print&tut=101&client=printerhttp://www.bleepingcomputer.com/tutorials/index.php?act=friend&tut=101http://www.bleepingcomputer.com/click.php?l=http%3A%2F%2Fdel.icio.us%2Fpost%3Furl%3Dhttp%3A%2F%2Fwww.bleepingcomputer.com%2Ftutorials%2Ftutorial101.html%26title%3DHow%2520to%2520remove%2520a%2520Trojan%252C%2520Virus%252C%2520Worm%252C%2520or%2520other%2520Malwarehttp://www.bleepingcomputer.com/click.php?l=http%3A%2F%2Fdel.icio.us%2Fpost%3Furl%3Dhttp%3A%2F%2Fwww.bleepingcomputer.com%2Ftutorials%2Ftutorial101.html%26title%3DHow%2520to%2520remove%2520a%2520Trojan%252C%2520Virus%252C%2520Worm%252C%2520or%2520other%2520Malwarehttp://www.bleepingcomputer.com/click.php?l=http%3A%2F%2Freddit.com%2Fsubmit%3Furl%3Dhttp%3A%2F%2Fwww.bleepingcomputer.com%2Ftutorials%2Ftutorial101.html%26title%3DHow%2520to%2520remove%2520a%2520Trojan%252C%2520Virus%252C%2520Worm%252C%2520or%2520other%2520Malwarehttp://www.bleepingcomputer.com/click.php?l=http%3A%2F%2Freddit.com%2Fsubmit%3Furl%3Dhttp%3A%2F%2Fwww.bleepingcomputer.com%2Ftutorials%2Ftutorial101.html%26title%3DHow%2520to%2520remove%2520a%2520Trojan%252C%2520Virus%252C%2520Worm%252C%2520or%2520other%2520Malwarehttp://www.bleepingcomputer.com/click.php?l=http%3A%2F%2Fwww.digg.com%2Fsubmit%3Furl%3Dhttp%3A%2F%2Fwww.bleepingcomputer.com%2Ftutorials%2Ftutorial101.html%26phase%3D2http://www.bleepingcomputer.com/click.php?l=http%3A%2F%2Fwww.digg.com%2Fsubmit%3Furl%3Dhttp%3A%2F%2Fwww.bleepingcomputer.com%2Ftutorials%2Ftutorial101.html%26phase%3D2http://www.bleepingcomputer.com/click.php?l=http%3A%2F%2Fuser.my-tuts.com%2Ftag-tutorial%2F%3Ftitle%3DHow%2520to%2520remove%2520a%2520Trojan%252C%2520Virus%252C%2520Worm%252C%2520or%2520other%2520Malware%26url%3Dhttp%3A%2F%2Fwww.bleepingcomputer.com%2Ftutorials%2Ftutorial101.htmlhttp://www.bleepingcomputer.com/click.php?l=http%3A%2F%2Fuser.my-tuts.com%2Ftag-tutorial%2F%3Ftitle%3DHow%2520to%2520remove%2520a%2520Trojan%252C%2520Virus%252C%2520Worm%252C%2520or%2520other%2520Malware%26url%3Dhttp%3A%2F%2Fwww.bleepingcomputer.com%2Ftutorials%2Ftutorial101.htmlhttp://www.kaspersky.com/http://www.parature.com/http://www.parature.com/http://www.vibrantmedia.com/whatisIntelliTXT.asp?ipid=1472&cc=us&server=bleepingcomputer.us.intellitxt.com

  • How to remove a Trojan, Virus, Worm, or other Malware

    Conclusion

    Dialers, Trojans, Viruses, and Worms Oh My!

    If you use a computer, read the newspaper, or watch the news, you will know about computer viruses or other malware. These are those malicious programs that once they infect

    your machine will start causing havoc on your computer. What many people do not know is that there are many different types of infections that are categorized in the general category of

    Malware.

    Malware - Malware is programming or files that are developed for the purpose of doing harm. Thus, malware includes computer viruses, worms, Trojan horses, spyware, hijackers, and certain type of adware.

    This article will focus on those malware that are considered viruses, trojans, worms, and viruses, though this information can be used to remove the other types of malware as well. We will not go into specific details about any one particular infection, but rather provide a broad overview of how these infections can be removed. For the most part these instructions should allow you to remove a good deal of infections, but there are some that need special steps to be removed and these won't be covered under this tutorial.

    Before we continue it is important to understand the generic malware terms that you will be reading about.

    Adware - A program that generates popups on your computer or displays advertisements. It is important to note that not all adware programs are necessarily considered malware. There are many legitimate programs that are given for free that display ads in their programs in order to generate revenue. As long as this information is provided up front then they are generally not considered malware.

    Backdoor - A program that allows a remote user to execute commands and tasks on your computer without your permission. These types of programs are typically used to launch attacks on other computers, distribute copyrighted software or media, or hack other computers.

    Dialler - A program that typically dials a premium rate number that has per minute charges over and above the typical call charge. These calls are with the intent of gaining access to pornographic material.

    Hijackers - A program that attempts to hijack certain Internet functions like redirecting your start page to the hijacker's own start page, redirecting search queries to a undesired search engine, or replace search results from popular search engines with their own information.

    Spyware - A program that monitors your activity or information on your computer and sends that information to a remote computer without your knowledge.

    Trojan - A program that has been designed to appear innocent but has been intentionally designed to cause some malicious activity or to provide a backdoor to your system.

    Virus - A program that when run, has the ability to self-replicate by infecting other programs and files on your computer. These programs can have many effects ranging from wiping your hard drive, displaying a joke in a small box, or doing nothing at all except to replicate itself. These types of infections tend to be localized to your computer and not have the ability to spread to another computer on their own. The word virus has incorrectly become a general term that encompasses trojans, worms, and viruses.

    Worm - A program that when run, has the ability to spread to other computers on its own using either mass-mailing techniques to email addresses found on your computer or by using the Internet to infect a remote computer using known security holes.

    Web

    BC

    http://www.bleepingcomputer.com/tutorials/tutorial101.html (2 of 5)5/13/2007 2:44:03 AM

    http://www.google.com/

  • How to remove a Trojan, Virus, Worm, or other Malware

    How these infections start

    Just like any program, in order for the program to work, it must be started. Malware programs are no different in this respect and must be started in some fashion in order to do what they were designed to do. For the most part these infections run by creating a configuration entry in the Windows Registry in order to make these programs start when your computer starts.

    Unfortunately, though, in the Windows operating system there are many different ways to make a program start which can make it difficult for the average computer user to find manually. Luckily for us, though, there are programs that allow us to cut through this confusion and see the various programs that are automatically starting when windows boots. The program we recommend for this, because its free and detailed, is Autoruns from Sysinternals.

    When you run this program it will list all the various programs that start when your computer is booted into Windows. For the most part, the majority of these programs are safe and should be left alone unless you know what you are doing or know you do not need them to run at startup.

    At this point, you should download Autoruns and try it out. Just run the Autoruns.exe and look at all the programs that start automatically. Don't uncheck or delete anything at this point. Just examine the information to see an overview of the amount of programs that are starting automatically. When you feel comfortable with what you are seeing, move on to the next section.

    How to remove these infections

    We have finally arrived at the section you came here for. You are most likely reading this tutorial because you are infected with some sort of malware and want to remove it. With this knowledge that you are infected, it is also assumed that you examined the programs running on your computer and found one that does not look right. You did further research by checking that program against our Startup Database or by searching in Google and have learned that it is an infection and you now want to remove it.

    If you have identified the particular program that is part of the malware, and you want to remove it, please follow these steps.

    1. Download and extract the Autoruns program by Sysinternals to C:\Autoruns

    2. Reboot into Safe Mode so that the malware is not started when you are doing these steps. Many malware monitor the keys that allow them to start and if they notice they have been removed, will automatically replace that startup key. For this reason booting into safe mode allows us to get past that defense in most cases.

    3. Navigate to the C:\Autoruns folder you created in Step 1 and double-click on autoruns.exe.

    4. When the program starts, click on the Options menu and enable the following options by clicking on them. This will place a checkmark next to each of these options.

    1. Include empty locations

    2. Verify Code Signatures

    3. Hide Signed Microsoft Entries

    5. Then press the F5 key on your keyboard to refresh the startups list using these new settings.

    6. The program shows information about your startup entries in 8 different tabs. For the most part, the filename you are looking for will be found under the Logon or the Services tabs, but you should check all the other tabs to make sure they are not loading elsewhere as

    http://www.bleepingcomputer.com/tutorials/tutorial101.html (3 of 5)5/13/2007 2:44:03 AM

    http://www.bleepingcomputer.com/tutorials/tutorial74.htmlhttp://www.sysinternals.com/Utilities/Autoruns.htmlhttp://www.sysinternals.com/Utilities/Autoruns.htmlhttp://www.bleepingcomputer.com/startups/http://www.sysinternals.com/Utilities/Autoruns.htmlhttp://www.bleepingcomputer.com/tutorials/tutorial61.html

  • How to remove a Trojan, Virus, Worm, or other Malware

    well. Click on each tab and look through the list for the filename that you want to remove. The filename will be found under the Image Path column. There may be more than one entry associated with the same file as it is common for malware to create multiple startup entries. It is important to note that many malware programs disguise themselves by using the same filenames as valid Microsoft files. it is therefore important to know exactly which file, and the folder they are in, that you want to remove. You can check our Startup Database for that information or ask for help in our computer help forums.

    7. Once you find the entry that is associated with the malware, you want to delete that entry so it will not start again on the next reboot. To do that right click on the entry and select delete. This startup entry will now be removed from the Registry.

    8. Now that we made it so it will not start on boot up, you should delete the file using My Computer or Windows Explorer. If you can not see the file, it may be hidden. To allow you to see hidden files you can follow the steps for your operating system found in this tutorial:

    How to see hidden files in Windows

    9. When you are finished removing the malware entries from the Registry and deleting the files, reboot into normal mode as you will now be clean from the infection.

    How to protect yourself in the future

    In order to protect yourself from this happening again it is important that take proper care and precautions when using your computer. Make sure you have updated antivirus and spyware removal software running, all the latest updates to your operating system, a firewall, and only open attachments or click on popups that you know are safe. These precautions can be a tutorial unto itself, and luckily, we have one created already:

    Simple and easy ways to keep your computer safe and secure on the Internet

    Please read this tutorial and follow the steps listed in order to be safe on the Internet. Other tutorials that are important to read in order to protect your computer are listed below.

    Understanding Spyware, Browser Hijackers, and Dialers

    Understanding and Using Firewalls

    Safely Connecting a Computer to the Internet

    Using Spybot - Search & Destroy to remove Spyware from Your Computer

    Using Ad-Aware SE to remove Spyware & Hijackers from Your Computer

    Using SpywareBlaster to protect your computer from Spyware, Hijackers, and Malware

    Using IE-Spyad to enhance your privacy and Security

    Conclusion

    Now that you know how to remove a generic malware from your computer, it should help you stay relatively clean from infection. Unfortunately there are a lot of malware that makes it very difficult to remove and these steps will not help you with those particular infections. In situations like that where you need extra help, do not hesitate to ask for help in our computer help forums. We also have a self-help section that contains detailed fixes on some of the more common infections that may be able to help. This self-help section can be found here:

    http://www.bleepingcomputer.com/tutorials/tutorial101.html (4 of 5)5/13/2007 2:44:03 AM

    http://www.bleepingcomputer.com/startups/http://www.bleepingcomputer.com/forums/http://www.bleepingcomputer.com/forums/http://www.bleepingcomputer.com/tutorials/tutorial62.htmlhttp://www.bleepingcomputer.com/tutorials/tutorial82.htmlhttp://www.bleepingcomputer.com/tutorials/tutorial41.htmlhttp://www.bleepingcomputer.com/tutorials/tutorial60.htmlhttp://www.bleepingcomputer.com/tutorials/tutorial86.htmlhttp://www.bleepingcomputer.com/tutorials/tutorial43.htmlhttp://www.bleepingcomputer.com/tutorials/tutorial48.htmlhttp://www.bleepingcomputer.com/tutorials/tutorial49.htmlhttp://www.bleepingcomputer.com/tutorials/tutorial53.htmlhttp://www.bleepingcomputer.com/forums/

  • How to remove a Trojan, Virus, Worm, or other Malware

    Spyware & Malware Self-Help and Reading Room

    -- Lawrence AbramsBleeping Computer Spyware & Malware Removal SeriesBleepingComputer.com: Computer Help & Tutorials for the beginning computer user.

    Add to del.icio.us! Submit to reddit! digg it! Submit to My-Tuts!

    Created:

    This article is published and created for http://www.bleepingcomputer.com, otherwise known as Bleeping Computer, and is covered by all copyright laws. All articles on this website are copyright 2003-2007 by Bleeping Computer, LLC. All right reserved. Use of these articles is limited to viewing and printing for personal use only. If you would like to use this material or portions of this material for other purposes you must receive explicit permission from Bleeping Computer before reprinting or redistributing this article in any medium.

    We have a total of (115) Tutorials in our Database & (6,508,314) Total Views

    Advertise | About Us | Terms of Use | Privacy Policy | Contact Us | Support Bleeping Computer | Site Map | Chat | Tutorials

    Discussion Forums | The Computer Glossary | Resources | Spyware/HJ Detector | RSS Feeds | Startups | The File Database

    2003-2007 All Rights Reserved Bleeping Computer LLC.

    Download important Business files from virtually anywhere With a Small Business mobility solution from Microsoft, you can stay productive virtually anywhere your workday takes you.www.microsoft.com

    http://www.bleepingcomputer.com/tutorials/tutorial101.html (5 of 5)5/13/2007 2:44:03 AM

    http://www.bleepingcomputer.com/forums/forum55.htmlhttp://www.bleepingcomputer.com/http://www.bleepingcomputer.com/click.php?l=http%3A%2F%2Fdel.icio.us%2Fpost%3Furl%3Dhttp%3A%2F%2Fwww.bleepingcomputer.com%2Ftutorials%2Ftutorial101.html%26title%3DHow%2520to%2520remove%2520a%2520Trojan%252C%2520Virus%252C%2520Worm%252C%2520or%2520other%2520Malwarehttp://www.bleepingcomputer.com/click.php?l=http%3A%2F%2Fdel.icio.us%2Fpost%3Furl%3Dhttp%3A%2F%2Fwww.bleepingcomputer.com%2Ftutorials%2Ftutorial101.html%26title%3DHow%2520to%2520remove%2520a%2520Trojan%252C%2520Virus%252C%2520Worm%252C%2520or%2520other%2520Malwarehttp://www.bleepingcomputer.com/click.php?l=http%3A%2F%2Freddit.com%2Fsubmit%3Furl%3Dhttp%3A%2F%2Fwww.bleepingcomputer.com%2Ftutorials%2Ftutorial101.html%26title%3DHow%2520to%2520remove%2520a%2520Trojan%252C%2520Virus%252C%2520Worm%252C%2520or%2520other%2520Malwarehttp://www.bleepingcomputer.com/click.php?l=http%3A%2F%2Freddit.com%2Fsubmit%3Furl%3Dhttp%3A%2F%2Fwww.bleepingcomputer.com%2Ftutorials%2Ftutorial101.html%26title%3DHow%2520to%2520remove%2520a%2520Trojan%252C%2520Virus%252C%2520Worm%252C%2520or%2520other%2520Malwarehttp://www.bleepingcomputer.com/click.php?l=http%3A%2F%2Fwww.digg.com%2Fsubmit%3Furl%3Dhttp%3A%2F%2Fwww.bleepingcomputer.com%2Ftutorials%2Ftutorial101.html%26phase%3D2http://www.bleepingcomputer.com/click.php?l=http%3A%2F%2Fwww.digg.com%2Fsubmit%3Furl%3Dhttp%3A%2F%2Fwww.bleepingcomputer.com%2Ftutorials%2Ftutorial101.html%26phase%3D2http://www.bleepingcomputer.com/click.php?l=http%3A%2F%2Fuser.my-tuts.com%2Ftag-tutorial%2F%3Ftitle%3DHow%2520to%2520remove%2520a%2520Trojan%252C%2520Virus%252C%2520Worm%252C%2520or%2520other%2520Malware%26url%3Dhttp%3A%2F%2Fwww.bleepingcomputer.com%2Ftutorials%2Ftutorial101.htmlhttp://www.bleepingcomputer.com/click.php?l=http%3A%2F%2Fuser.my-tuts.com%2Ftag-tutorial%2F%3Ftitle%3DHow%2520to%2520remove%2520a%2520Trojan%252C%2520Virus%252C%2520Worm%252C%2520or%2520other%2520Malware%26url%3Dhttp%3A%2F%2Fwww.bleepingcomputer.com%2Ftutorials%2Ftutorial101.htmljavascript:scroll(0,0);javascript:scroll(0,0);http://www.bleepingcomputer.com/advertise/http://www.bleepingcomputer.com/about.phphttp://www.bleepingcomputer.com/useragreement.phphttp://www.bleepingcomputer.com/privacy.phphttp://www.bleepingcomputer.com/contactus.phphttp://www.bleepingcomputer.com/supportus.phphttp://www.bleepingcomputer.com/sitemap.phphttp://www.bleepingcomputer.com/chat.phphttp://www.bleepingcomputer.com/tutorials/http://www.bleepingcomputer.com/forums/http://www.bleepingcomputer.com/glossary/http://www.bleepingcomputer.com/resources/http://www.bleepingcomputer.com/spwd.phphttp://www.bleepingcomputer.com/rss.phphttp://www.bleepingcomputer.com/startups/http://www.bleepingcomputer.com/filedb/http://www.bleepingcomputer.com/filedb/http://www.bleepingcomputer.com/

    bleepingcomputer.comHow to remove a Trojan, Virus, Worm, or other Malware

    JIGGPOIBBIIIJHECDHPAKGPENLOAFIDF: form1: x: f1: f2: Searchf3: allf4: 30f5: 01

    form2: x: f1: searchf2:

    f3:

    form5: f1:

    form3: x: f1: BleepingComputer.comf2: f3: 0f6: pub-0920899300397823f7: 1f8: 6074528531f9: ISO-8859-1f10: ISO-8859-1f11: activef12: GALT:#008000;GL:1;DIV:#336699;VLC:663399;AH:center;BGC:FFFFFF;LBGC:336699;ALC:0000FF;LC:0000FF;T:000000;GFNT:0000FF;GIMP:0000FF;FORID:1;f13: en

    f4: Searchf5:

    form4: x: f1: categoryf2: [-1]