Solved

Downloader.Trojen Help

Posted on 2004-04-08
4
1,745 Views
Last Modified: 2010-04-11
Norton Antivirus 2004 has detected a DownLoader Trogen.
Message comes up
C:WINDOWS\AddCLS.xe
The file WINDOWS\AddCLS.xe is infected with the Downloaderfile.Trogen virus.

Problem I have is I cannot remove it.
Nortons gives message  repair failed
                                   delete failed
                                  access failed
What does .WINDOWS\AddCLS.xe file do
Can i remove this file to get rid of this trojen without  causing problems on computer
If yes how and can I replace this file with an uninfected one.
Opperating system XP Home Edition
0
Comment
Question by:Windows_ME_is_a_dog
  • 2
  • 2
4 Comments
 
LVL 2

Accepted Solution

by:
Thunder_scream earned 250 total points
ID: 10788337
Hi
its some sort of web trojan..these are its dependencies..
Running processes:
C:\WINDOWS\AddCLS.exe
regedit key:
HKCU\..\Run: [AddClass] C:\WINDOWS\AddCLS.exe

I dont suggest moving it by manually ...try the following..
1: go to safemode and try to remove it...with norton anti  if this does not work
2: create a norton rescue disk and restart with the floppy and do a scan and try to remove it..  if this does not work
3: remove manually.

good luck
0
 
LVL 2

Expert Comment

by:Thunder_scream
ID: 10788346
also the installation cd for norton has a rescue mode
if you boot with the installtion cd that is
cheers!
0
 

Author Comment

by:Windows_ME_is_a_dog
ID: 10789045

When i click on more information in nortons  gives me

Trojan: Backdoor.IRC.Aladinz


Trojan: IRC.Momma.Worm


Trojan: W32.Ronoper.Worm



0
 

Author Comment

by:Windows_ME_is_a_dog
ID: 10789460
Thanks Thunder_scream Had to manual remove it.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now