Showing posts with label Windows. Show all posts
Showing posts with label Windows. Show all posts

Saturday, June 4, 2011

How to tell if the computer is infected by malware such as Win32.Injector.CCQ?

How to tell if the computer is infected by malware such as Win32.Injector.CCQ?
The symptoms of Win32.Injector.CCQ vary wildly, ranging from slow PC performance to loss of important data. If you are experiencing any of the symptoms listed below, chances are you have Win32.Injector.CCQ or another risky unwanted programs installed on your computer:

Sudden slow PC performance

Win32.Injector.CCQ can use a lot of your system resources to track your computer activities or deliver pop-up ads that may greatly slow down the computer or even make it crash randomly. If you are recently getting a lot of system crashes, the computer is running much slower than usual or you cannot access your hard properly, then your computer must be infected and should be took care of.

E-mail problems

Win32.Injector.CCQ can collect and send your email address book to an email spammer and send unexpected email messages from your computer without your knowledge. If you get a lot of bounced back emails or notice that thousands of emails were sent without your permission, then it is possible that your computer is infected.

Constant unwanted ads

Win32.Injector.CCQ will interrupt you with annoying pop-up ads for adult or other objectionable web sites. If it is controlled by hackers, this can make your computer completely useless once you visit the website in which malicious programming or code is planted.

Unexpected desktop icons, Toolbars or homepages

Win32.Injector.CCQ or other threats may record and reset your account settings or change your default homepage to a different one, which sometimes cannot be changed back. Also, it can also add new desktop items or toolbars to Internet Explorer without letting you know.


Also Read:-
How to remove Win32.Injector.CCQ manually?
How to remove Win32.Injector.CCQ from your computer?
What is Win32.Injector.CCQ?
How to tell if the computer is infected by malware such as Win32.Injector.CCQ?

Enhanced by Zemanta

Tuesday, May 10, 2011

How to Remove Fake AV Software

Trojan.FakeAV.3510
Manipulate the Windows HOSTS file and block antivirus

Fake antivirus this one has a hobby of doing a block on segambreng security software and Windows hosts file redirects the victim computer so successful in the infection can not access the sites security services provider. Transfer of Hosts file is a need to watch out by comptuer users, especially users of internet banking due to the transfer of hosts, phishing websites and the right social engineering techniques, it has the potential to cause break-ins on internet banking account. Although already equipped with a protection calculator PIN / Token (two-factor authentication). Because that's important for those of you who use Internet Banking to use anti virus protection features the Hosts file as given by Dr Web Security Space.

The characteristics and symptoms of the virus
The virus is made using Visual Basic programming language with a size of about 62 KB by using Visual Basic icon. One characteristic that can be recognized is that each user opens Internet Explorer will display a website [http://www.qseach.com/?ref=kzCXow ==] resembling a website search engine www.google.com

File parent virus
When the user runs the file parent virus, it will display an error message, then he will make a master file that will be run automatically when the computer boots.

Function Block Windows
In order for the user difficulty in doing the cleaning, it will do block some functions of Windows, such as Task Manager, MSCONFIG, CMD (Command Prompt), Regedit or Folder Options to make changes to the registry

Security Software Blocks
In addition to the Windows function block, he will do blocks of tools / software security including antivirus programs by reading the "caption text Windows" and by doing debugger (transfer) to run a virus file in the directory [C: \ Documents and Settings \% username % \ 132616c4 \ winlogon.exe]. To make a debugger (transfer), it will create a string in the registry

Changing the USB Flash icon
This virus will also change the icon into the icon Folder USB Flash and USB Flash block access if a user access by double click on the USB Flash. By doing double click on the USB Flash it will automatically activate the virus.

Hide files/folders
Again USB Flash be victims, this time he will hide all files / folders in USB Flash and instead it will create a duplicate file that has the same name as the file / folder that is hidden in the form of a shortcut file
For each shortcut file created will have a target to run a virus file (Ua3kmh73O3jyut4Iok.exe) which had been prepared when on the run, the target file would normally be stored on the USB Flash.

Change the Windows Hosts file
He also will make changes to the Windows Hosts file [C:\Windows\System32\Drivers\Etc\Hosts] which resulted in a number of websites can not be accessed. Here are some website addresses that will be on the block.

How to purge Trojan.FakeAV.3510
1. For cleaning, you can use the Tools Dr.Web CureIt! of the Dr.Web antivirus. Please download these tools at the following address:
http://www.freedrweb.com/cureit/?lng=en
Once these tools successfully downloaded, run the tools with the way double click on the file Dr.Web CureIt!. When the prompt appears "DrWeb CureIt! - Enhanced Protection Mode ", click the [OK], when you select this mode you will not be able to do activities on the computer this is done for the cleaning process can be performed more optimally.
This will bring up the screen scan "Dr.Web Scanner for Windows - Express Scan", leave until the scan is completed. If it appears the cleaning process when the scan is done, click the [Yes to All).
For optimal cleaning, scans all drives including USB flash / external HDD by selecting option [Scan complete].
Note:
Dr.Web anti-virus will also automatically restore the HOSTS file in Windows that has been changed by Trojan.fakeAV.3510 to the initial setting. If a prompt appears the Windows fixes to the HOSTS file has been modified by a virus, click the [Yes].
Click Restart, if a prompt appears restart of Dr.Web antivirus.

2. Fix Windows Registry that has been changed by the virus, to accelerate the repair process copy the script below in Notepad and save it as repair.inf, run the file in the following way
Right-click repair.inf
Click INSTALL

[Version]
Signature="$Chicago$"
Provider=Vaksincom

[DefaultInstall]
AddReg=UnhookRegKey
DelReg=del

[UnhookRegKey]
HKLM, Software\CLASSES\batfile\shell\open\command,,,"""%1"" %*"
HKLM, Software\CLASSES\comfile\shell\open\command,,,"""%1"" %*"
HKLM, Software\CLASSES\exefile\shell\open\command,,,"""%1"" %*"
HKLM, Software\CLASSES\piffile\shell\open\command,,,"""%1"" %*"
HKLM, Software\CLASSES\regfile\shell\open\command,,,"regedit.exe "%1""
HKLM, Software\CLASSES\scrfile\shell\open\command,,,"""%1"" %*"
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon, Shell,0, "Explorer.exe"
HKCU, Software\Microsoft\Internet Explorer\main, Start Page,0, "about:blank"
HKCU, Software\Microsoft\Internet Explorer\main, Search Page,0,"about:blank"
HKCU, Software\Microsoft\Internet Explorer\main, Local Page,0, "about:blank"
HKCU, Software\Microsoft\Internet Explorer\main, Default_Search_URL,0, "about:blank"
HKCU, Software\Microsoft\Internet Explorer\main, Default_Page_URL,0, "about:blank"

[del]
HKCU, Software\Microsoft\WIndows\CurrentVersion\Run, 74e4144414
HKCU, Software\Microsoft\WIndows\CurrentVersion\Policies\Associations
HKCU, Software\Microsoft\WIndows\CurrentVersion\Policies\Explorer, NoFile
HKCU, Software\Microsoft\WIndows\CurrentVersion\Policies\Explorer, NoFolderOptions
HKCU, Software\Microsoft\WIndows\CurrentVersion\Policies\Explorer, NoRun
HKCU, Software\Microsoft\WIndows\CurrentVersion\Policies\System, DisableRegistryTools
HKCU, Software\Microsoft\WIndows\CurrentVersion\Policies\System, DisableTaskMgr
HKCU, Software\Policies\Microsoft\Windows\System, DisableCMD
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options
HKLM, SOFTWARE\Policies\Microsoft\WindowsFirewall
HKCU, Software\Policies\Microsoft\Internet Explorer\Control Panel, HomePage
HKLM, Software\Microsoft\WIndows\CurrentVersion\Run, 74e4144414
HKLM, Software\Microsoft\WIndows\CurrentVersion\Policies\Explorer, NoFolderOptions
HKLM, Software\Microsoft\WIndows\CurrentVersion\Policies\System, EnableLUA

3. Manually delete the following registy locations:
click menu [Start]
Click [RUN]
Type Regedit.exe, then Click the [OK]
Then delete the following registry string
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\layers
C:\Documents and Settings\%user%\132616c4\winlogon.exe = RUNASADMIN
HKEY_LOCAL_MACHINE \Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\layers
C:\Documents and Settings\%user%\132616c4\winlogon.exe = RUNASADMIN HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
C:\Documents and Settings\%user%\132616c4\winlogon.exe = C:\Documents and Settings\%user%\132616c4\winlogon.exe:*:Enabled:@xpsp2res.dll,-53342401
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
C:\Documents and Settings\%user%\132616c4\winlogon.exe = C:\Documents and Settings\%user%\132616c4\winlogon.exe:*:Enabled:@xpsp2res.dll,-53342401
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List
C:\Documents and Settings\%user%\132616c4\winlogon.exe = C:\Documents and Settings\%user%\132616c4\winlogon.exe:*:Enabled:@xpsp2res.dll,-53342401

Note:
% user% is the name of the user / acount that is used during Windows logon
Fix Image File Execution Files. Please download files at the address FixImageFile http://rapidshare.com/files/446070146/FixImageFile.zip FixImageFile_XP.reg then import that file (Windows XP) or FixImageFile_Vista_Win7.reg (Windows Vista / 7) by: (see figure 15)
Click [Start]
Click [Run]
Type Regedit.exe and click the [OK]
Once the screen appears "Registry Editor", click [File] menu
Click [Import]
Then navigate to the file FixImageFile.reg, then click the [Open]
If the confirmation screen appears, click the [OK]

4. Show files that have been hidden by the virus in the USB Flash, how:
Click [Start]
Click [Run]
Type CMD and click the [OK]
After the application of the Command Prompt (CMD), move the cursor position to the USB Flash by typing% USB Flash%: then press the Enter key.

Note:

% USB Flash drive% is different, for example if you are USB Flash E then type the command E:
Then type the command attrib-s-h-r / s / d and then click the Enter key (see figure 18)
Wait a while until the process is completed.

5. For optimal cleaning, uses anti-virus scan with up-to-date.
Enhanced by Zemanta

Friday, December 19, 2008

VIRUS : What is computer virus? Which is the best free antivirus available ?

What is computer virus?

I know you would say whats the need to know "What is virus ?" well i would say without knowing what the virus is how would you be inclined to download and update an antivirus.

A virus is program, which reproduces its own code by attacking other programs in such a way that the virus code is executed. note that this is done without permission or knowledge of the user. A virus can destroy software,modify programs,delete files etc. While doing all its malicious actions virus keeps on spreading itself.

This results in your loosing control over your own computer.
From this information it is clear that virus is like a parasite which affects our body( in this case computer) and then feeds on the host. the way biological virus destroys our cells and reproduces, computer virus destroys computer's files and data. Be cautious these file and data can be anything may be your photos or office spreadsheets.
Reblog this post [with Zemanta]

ShareThis

Blog Widget by LinkWithin