Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17


Trojan Horse Downloader.Swizzor.8.B

Posted on 2006-11-23
Medium Priority
Last Modified: 2010-04-11
Help, how do i remove it???

I am using AVG Free which detects and deletes it, but then 20 minutes later its back with a different file name.

The virus files are always found in:

C:\Documents and settings\Amy\Local Settings\Temp\<random number>.exe

<random number> changes every time a virus is found.  After looking in the directory in explorer (win XP) it shows several of them, and avg finds and deletes them all, but then a few minutes they start to appear again.

How do i get rid of it for good?
Question by:NAORC
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
  • 2
  • +4

Accepted Solution

sg405222 earned 2000 total points
ID: 18001715

This downloader installs itself as a browser help object and wil attempt to download files from predetermined URLS and also execute EXE files from a remote website.  This happens as soon as you load IE

Take a look at

As a future precaution I would clear all you browser cache history etc when you exit your broswer inc any off line content


Expert Comment

ID: 18004715

The problem with new boundlers, hoaxs, trojans, and spyware, etc
is that they no longer are in the same old 'RUN Once' in the Registry.

people that do this kind of things, they have learned some other ways to
hide the best as posible all running proccess in the backgraund.

if you look in the running proccess of you computer, you may see the trojan.exe
running, but you can't see from where the program is running or what makes it run.
then even if you close this trojan.exe from all the proccess, the trojans.exe magically
start again :-)... Try this out,

Click Start Menu, then RUN, now type regedit, and go to this key path in the Registry:
'HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\Installed Components

Now that u are there, try to locate something not familliar with the rest of the stuff
for example: '\TrojanDir]"StubPath"="C:\Windows\System32:\trojan.exe'
also can be many diferent dir, sub, folders, etc.
another example '\BlaBlaBla]"StubPath"="C:\Windows\trojan.exe'

Sometimes even if you find this and delete it, it will come out again, but
if you find bouth path and delete then, the show will be over for that trojan.

hope u understand my point or my writing :-)

Good luck


Expert Comment

ID: 18006100
Try removing the following (this will take a while, there's alot)
Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

LVL 23

Expert Comment

by:Mohamed Osama
ID: 18006617
A Hijack this log might help here .

Expert Comment

ID: 18008551

i am 90% sure that 'HijackThis and the other spayware remover will not stop this.
i was just suggesting on how to try removing it manually if it exist in the Registry.

LVL 23

Expert Comment

by:Mohamed Osama
ID: 18008602
Hijack this IS a manual method of removal as opposed to software that depends on malware signatures
with HT you will be able to remove anything that shouldnt be there as long as you know enough about the usual software enviroment of your operating system.

Expert Comment

ID: 18008751

i know that program thats right i give that opinion. I also know Spy Sweeper.

LVL 47

Expert Comment

ID: 18010012
I second admin3k's suggestion of hijackthis log.

There are many variants of swizzor. Generally they fall into the category of Lop infection.
Hijackthis can't fix an infection but it is very helpful in pointing us to what infection the system has.
The hijackthis log can tell us what tool is needed to fix the system base on the bad entries showing in the log. If it's a variant of Lop then the below tool will fix it,
Hijackthis is one of the best diagnostic tool there is, besides its other functions. I always suggest or ask to look for a hijackthis log so I don't have to do guesswork on what tool to suggest.

Download NoLop to your desktop from one of the links below...,ed0778d88843ca2625ab6208a197bcc5/;dl=item16

First close any other programs you have running as this will require a reboot
Double click NoLop.exe to run it
Now click the button labelled "Search and Destroy"
<<your computer will now be scanned for infected files>>
When scanning is finished you will be prompted to reboot only if infected, Click OK
Now click the "REBOOT" Button.
A Message should popup from NoLop. If not, double click the program again and it will finish Please Post the contents of C:\NoLop.log

LVL 30

Expert Comment

ID: 18012061
You need to run the cleaners while in safe mode.

I would run spybot sd and adaware after updating the signatures.

Author Comment

ID: 18018567
Thanks all.. keep the suggestions coming..

I will be trying saturday to fix it when i am next with my client.
LVL 47

Expert Comment

ID: 18018615
A hijackthis log will be most helpful in our diagnoses.

Please download HijackThis 1.99.1
Open Hijackthis, click "Do a system scan and save a logfile" don't fix anything yet.

Then upload the logs to any hosting sites,
or go to the below link and login using your Experts-Exchange username and password.
Click on "Expert Area" tab
type or paste the link to your Question
"Browse" your pc to the location of your Hijackthis log and click "Upload"
Copy the resulting "url" and post it back here.

OR: paste the log to either of these sites:
then at the bottom left corner click "paste"
Copy the address/url and post it here.

2. or at --> 
and click "Analyse", click "Save".  Then post the link to the saved list here.

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A look at what happened in the Verizon cloud breach.
Ever wonder what it's like to get hit by ransomware? "Tom" gives you all the dirty details first-hand – and conveys the hard lessons his company learned in the aftermath.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question