Improve company productivity with a Business Account.Sign Up


Trojan Horse Downloader.Swizzor.8.B

Posted on 2006-11-23
Medium Priority
Last Modified: 2010-04-11
Help, how do i remove it???

I am using AVG Free which detects and deletes it, but then 20 minutes later its back with a different file name.

The virus files are always found in:

C:\Documents and settings\Amy\Local Settings\Temp\<random number>.exe

<random number> changes every time a virus is found.  After looking in the directory in explorer (win XP) it shows several of them, and avg finds and deletes them all, but then a few minutes they start to appear again.

How do i get rid of it for good?
Question by:NAORC
  • 3
  • 2
  • 2
  • +4

Accepted Solution

sg405222 earned 2000 total points
ID: 18001715

This downloader installs itself as a browser help object and wil attempt to download files from predetermined URLS and also execute EXE files from a remote website.  This happens as soon as you load IE

Take a look at

As a future precaution I would clear all you browser cache history etc when you exit your broswer inc any off line content


Expert Comment

ID: 18004715

The problem with new boundlers, hoaxs, trojans, and spyware, etc
is that they no longer are in the same old 'RUN Once' in the Registry.

people that do this kind of things, they have learned some other ways to
hide the best as posible all running proccess in the backgraund.

if you look in the running proccess of you computer, you may see the trojan.exe
running, but you can't see from where the program is running or what makes it run.
then even if you close this trojan.exe from all the proccess, the trojans.exe magically
start again :-)... Try this out,

Click Start Menu, then RUN, now type regedit, and go to this key path in the Registry:
'HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\Installed Components

Now that u are there, try to locate something not familliar with the rest of the stuff
for example: '\TrojanDir]"StubPath"="C:\Windows\System32:\trojan.exe'
also can be many diferent dir, sub, folders, etc.
another example '\BlaBlaBla]"StubPath"="C:\Windows\trojan.exe'

Sometimes even if you find this and delete it, it will come out again, but
if you find bouth path and delete then, the show will be over for that trojan.

hope u understand my point or my writing :-)

Good luck


Expert Comment

ID: 18006100
Try removing the following (this will take a while, there's alot)
Get 10% Off Your First Squarespace Website

Ready to showcase your work, publish content or promote your business online? With Squarespace’s award-winning templates and 24/7 customer service, getting started is simple. Head to and use offer code ‘EXPERTS’ to get 10% off your first purchase.

LVL 23

Expert Comment

by:Mohamed Osama
ID: 18006617
A Hijack this log might help here .

Expert Comment

ID: 18008551

i am 90% sure that 'HijackThis and the other spayware remover will not stop this.
i was just suggesting on how to try removing it manually if it exist in the Registry.

LVL 23

Expert Comment

by:Mohamed Osama
ID: 18008602
Hijack this IS a manual method of removal as opposed to software that depends on malware signatures
with HT you will be able to remove anything that shouldnt be there as long as you know enough about the usual software enviroment of your operating system.

Expert Comment

ID: 18008751

i know that program thats right i give that opinion. I also know Spy Sweeper.

LVL 47

Expert Comment

ID: 18010012
I second admin3k's suggestion of hijackthis log.

There are many variants of swizzor. Generally they fall into the category of Lop infection.
Hijackthis can't fix an infection but it is very helpful in pointing us to what infection the system has.
The hijackthis log can tell us what tool is needed to fix the system base on the bad entries showing in the log. If it's a variant of Lop then the below tool will fix it,
Hijackthis is one of the best diagnostic tool there is, besides its other functions. I always suggest or ask to look for a hijackthis log so I don't have to do guesswork on what tool to suggest.

Download NoLop to your desktop from one of the links below...,ed0778d88843ca2625ab6208a197bcc5/;dl=item16

First close any other programs you have running as this will require a reboot
Double click NoLop.exe to run it
Now click the button labelled "Search and Destroy"
<<your computer will now be scanned for infected files>>
When scanning is finished you will be prompted to reboot only if infected, Click OK
Now click the "REBOOT" Button.
A Message should popup from NoLop. If not, double click the program again and it will finish Please Post the contents of C:\NoLop.log

LVL 30

Expert Comment

ID: 18012061
You need to run the cleaners while in safe mode.

I would run spybot sd and adaware after updating the signatures.

Author Comment

ID: 18018567
Thanks all.. keep the suggestions coming..

I will be trying saturday to fix it when i am next with my client.
LVL 47

Expert Comment

ID: 18018615
A hijackthis log will be most helpful in our diagnoses.

Please download HijackThis 1.99.1
Open Hijackthis, click "Do a system scan and save a logfile" don't fix anything yet.

Then upload the logs to any hosting sites,
or go to the below link and login using your Experts-Exchange username and password.
Click on "Expert Area" tab
type or paste the link to your Question
"Browse" your pc to the location of your Hijackthis log and click "Upload"
Copy the resulting "url" and post it back here.

OR: paste the log to either of these sites:
then at the bottom left corner click "paste"
Copy the address/url and post it here.

2. or at --> 
and click "Analyse", click "Save".  Then post the link to the saved list here.

Featured Post

Improve Your Query Performance Tuning

In this FREE six-day email course, you'll learn from Janis Griffin, Database Performance Evangelist. She'll teach 12 steps that you can use to optimize your queries as much as possible and see measurable results in your work. Get started today!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

To share tips on how to stay ALERT and avoid being the next victim - at least not due to your own poor cyber habits and hygiene!
Cloud computing is a model of provisioning IT services. By combining many servers into one large pool and providing virtual machines from that resource pool, it provides IT services that let customers acquire resources at any time and get rid of the…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

584 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question