VideoHelp Forum




+ Reply to Thread
Results 1 to 11 of 11
  1. Banned
    Join Date
    Dec 2003
    Location
    United States
    Search Comp PM
    Guys, I have a problem with a trojan that continues to pop up. EZ Trust's realtime protection picks up the infection, But I've run four different scans with four different antivrus/Trojan apps and neither picked this trojan or its source.







    I left the realtime protection box open during each scan and I realized that it detected the same infection four different times in two different locations. The funny thing is that when I'd go to the folder that is said to contain the trojan, that trojan isn't there. This leaves me to beleive that EZ Trust's realtime protection deletes the file once it has located it.

    The weird thing is that I can't find the source of the trojan. In order for the same trojan to continue to show up it the same locations, tells me that someone or something is continuing to drop the trojan, I just don't know how its getting on my computer or who is doing it.

    I figure if I can delete the file that is steadily downloaded the file onto my computer, it wouldn't show up.

    Do you guys have any ideas as to how I can get rid of this little pest, or what I can do to found out how it continues to make its way onto my computer?

    How can I tell if someone is remotely connected to my pc without my permission?


    PS. You might say that I contract it whenevr I visit a certain site; I dought that, because most of the times I receive the notification from EZ Trust When I'm not even surfing the web.
    Quote Quote  
  2. Mod Neophyte redwudz's Avatar
    Join Date
    Sep 2002
    Location
    USA
    Search Comp PM
    This is all I could find on the Thorin virus. Not sure about removal.http://www.kaspersky.ch/avpve/newexe/win32/thorin.stm

    Make sure all your antivirus/antitrojan software is updated. Maybe the link above will give you some help. Sometimes you can run the scans in safe mode and kill it that way. And unhook from the internet while you are doing this.
    Quote Quote  
  3. Member Soopafresh's Avatar
    Join Date
    Jan 2004
    Location
    United States
    Search Comp PM
    Just read the link that redwudz posted. Ruh ro (in Scooby Doo voice). Burn your data to CD/DVD and be prepared to reinstall. Sounds like a BAD one.


    You have a CHANCE of removing it by booting your system via CD and using WinPE (XP on a CD) to clean the infection. Look here for info - you'll need an XP CD with SP1 or greater on it to create the thing. http://www.ubcd4win.com/howto.htm

    You can try to find the source of the trojan/virus with this app:

    RootkitRevealer

    url: http://www.sysinternals.com

    RootkitRevealer

    What is a Rootkit?
    The term rootkit is used to describe the mechanisms and techniques whereby malware, including viruses, spyware, and trojans, attempt to hide their presence from spyware blockers, antivirus, and system management utilities. There are several rootkit classifications depending on whether the malware survives reboot and whether it executes in user mode or kernel mode.

    Persistent Rootkits
    A persistent rootkit is one associated with malware that activates each time the system boots. Because such malware contain code that must be executed automatically each system start or when a user logs in, they must store code in a persistent store, such as the Registry or file system, and configure a method by which the code executes without user intervention.

    Memory-Based Rootkits
    Memory-based rootkits are malware that has no persistent code and therefore does not survive a reboot.

    User-mode Rootkits
    There are many methods by which rootkits attempt to evade detection. For example, a user-mode rootkit might intercept all calls to the Windows FindFirstFile/FindNextFile APIs, which are used by file system exploration utilities, including Explorer and the command prompt to enumerate the contents of file system directories. When an application performs a directory listing that would otherwise return results that contain entries identifying the files associated with the rootkit, the rootkit intercepts and modifies the output to remove the entries.

    The Windows native API serves as the interface between user-mode clients and kernel-mode services and more sophisticated user-mode rootkits intercept file system, Registry, and process enumeration functions of the Native API. This prevents their detection by scanners that compare the results of a Windows API enumeration with that returned by a native API enumeration.

    Kernel-mode Rootkits
    Kernel-mode rootkits can be even more powerful since, not only can they intercept the native API in kernel-mode, but they can also directly manipulate kernel-mode data structures. A common technique for hiding the presence of a malware process is to remove the process from the kernel's list of active processes. Since process management APIs rely on the contents of the list, the malware process will not display in process management tools like Task Manager or Process Explorer.
    Quote Quote  
  4. Banned
    Join Date
    Dec 2003
    Location
    United States
    Search Comp PM
    Thanx supafresh, I'll be sure to use that app
    Quote Quote  
  5. Member
    Join Date
    Mar 2003
    Location
    Canada
    Search Comp PM
    Under windows explorer options are you sure that you're showing hidden files and folders as well as system files and folders? It's possible the file might just be hidden.

    I'd recommend trying AdAware and Microsoft AntiSpyware beta if you haven't already. both are free and work great.
    Quote Quote  
  6. Banned
    Join Date
    Dec 2003
    Location
    United States
    Search Comp PM
    Under windows explorer options are you sure that you're showing hidden files and folders as well as system files and folders? It's possible the file might just be hidden.
    Yes I'm sure.
    Quote Quote  
  7. Banned
    Join Date
    Sep 2004
    Location
    Inner Circle of Thought
    Search Comp PM
    I read about kernel rootkits a couple of weeks ago and it sounds pretty nasty.

    You may need to start over.
    Quote Quote  
  8. joollyjohn jollyjohn's Avatar
    Join Date
    Mar 2005
    Location
    Sydney Australia
    Search Comp PM
    G'day
    Mate, try this. (Free demo) Update it before you use it.
    http://www.eset.com/home/home.htm
    It 'll be the end of your problem. Configure to do deep clean and and check on everything including Potentially Dangerous Applications. You won't beleive how much shit you will find in the PC.
    John
    Quote Quote  
  9. Master of Time & Space Capmaster's Avatar
    Join Date
    Feb 2004
    Location
    Denver, CO United States
    Search Comp PM
    Consider doing a system restore from a previous safe restore point
    Quote Quote  
  10. Banned
    Join Date
    Dec 2003
    Location
    United States
    Search Comp PM
    I have reformatted since my last post; I couldn't get rid of the little bugger that was pesterring me, so I fried him with a reformat :P Burn baby Burn :lol2:

    My system was hesitating badly, it had poor response, and sometimes it acted as if it had a mind of its own Now that I've reformatted, speed, speed, speed; I love it. I literally feel refreshed by the fresh reinstall.

    One thing though, since the reformat, I've only installed the most important files and progs. I want to make a copy of my system as it is now would. I want to try once more to install sp2, should I make the copy of my system before or after sp2? I ask this because the last time I tried to install sp2 I wasn't able to connect to the internet.

    Which is better anyway, A fresh install, or booting from a dvd copy of your OS?

    Ive never booted a copied os from disc before, how is that done? I know that question is noobish
    Quote Quote  
  11. Member Heywould3's Avatar
    Join Date
    Apr 2002
    Location
    always on the move
    Search Comp PM
    have you tried turning off system restore then booting in safe mode. run the scan delete all trojans etc i would use ms antispyware and adaware and spybot all of them. then reboot back into windows normally.. wait a couple hours see if it comes back. if not thn you can safely turn system restore on..

    if you arenot sure how to turn it off.. go to control pannel admin tools services. scroll down to system restore you should stop it and disable it for the time being.

    this has worked for me a couple times when nothing else has.. key is to run scans in safe mode.
    Quote Quote  



Similar Threads

Visit our sponsor! Try DVDFab and backup Blu-rays!