Trojan Horse Downloader.Swizzor.8.B

Posted on 2006-11-23
Last Modified: 2010-04-11
Help, how do i remove it???

I am using AVG Free which detects and deletes it, but then 20 minutes later its back with a different file name.

The virus files are always found in:

C:\Documents and settings\Amy\Local Settings\Temp\<random number>.exe

<random number> changes every time a virus is found.  After looking in the directory in explorer (win XP) it shows several of them, and avg finds and deletes them all, but then a few minutes they start to appear again.

How do i get rid of it for good?
Question by:NAORC
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
  • 2
  • +4

Accepted Solution

sg405222 earned 500 total points
ID: 18001715

This downloader installs itself as a browser help object and wil attempt to download files from predetermined URLS and also execute EXE files from a remote website.  This happens as soon as you load IE

Take a look at

As a future precaution I would clear all you browser cache history etc when you exit your broswer inc any off line content


Expert Comment

ID: 18004715

The problem with new boundlers, hoaxs, trojans, and spyware, etc
is that they no longer are in the same old 'RUN Once' in the Registry.

people that do this kind of things, they have learned some other ways to
hide the best as posible all running proccess in the backgraund.

if you look in the running proccess of you computer, you may see the trojan.exe
running, but you can't see from where the program is running or what makes it run.
then even if you close this trojan.exe from all the proccess, the trojans.exe magically
start again :-)... Try this out,

Click Start Menu, then RUN, now type regedit, and go to this key path in the Registry:
'HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\Installed Components

Now that u are there, try to locate something not familliar with the rest of the stuff
for example: '\TrojanDir]"StubPath"="C:\Windows\System32:\trojan.exe'
also can be many diferent dir, sub, folders, etc.
another example '\BlaBlaBla]"StubPath"="C:\Windows\trojan.exe'

Sometimes even if you find this and delete it, it will come out again, but
if you find bouth path and delete then, the show will be over for that trojan.

hope u understand my point or my writing :-)

Good luck


Expert Comment

ID: 18006100
Try removing the following (this will take a while, there's alot)
Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

LVL 23

Expert Comment

by:Mohamed Osama
ID: 18006617
A Hijack this log might help here .

Expert Comment

ID: 18008551

i am 90% sure that 'HijackThis and the other spayware remover will not stop this.
i was just suggesting on how to try removing it manually if it exist in the Registry.

LVL 23

Expert Comment

by:Mohamed Osama
ID: 18008602
Hijack this IS a manual method of removal as opposed to software that depends on malware signatures
with HT you will be able to remove anything that shouldnt be there as long as you know enough about the usual software enviroment of your operating system.

Expert Comment

ID: 18008751

i know that program thats right i give that opinion. I also know Spy Sweeper.

LVL 47

Expert Comment

ID: 18010012
I second admin3k's suggestion of hijackthis log.

There are many variants of swizzor. Generally they fall into the category of Lop infection.
Hijackthis can't fix an infection but it is very helpful in pointing us to what infection the system has.
The hijackthis log can tell us what tool is needed to fix the system base on the bad entries showing in the log. If it's a variant of Lop then the below tool will fix it,
Hijackthis is one of the best diagnostic tool there is, besides its other functions. I always suggest or ask to look for a hijackthis log so I don't have to do guesswork on what tool to suggest.

Download NoLop to your desktop from one of the links below...,ed0778d88843ca2625ab6208a197bcc5/;dl=item16

First close any other programs you have running as this will require a reboot
Double click NoLop.exe to run it
Now click the button labelled "Search and Destroy"
<<your computer will now be scanned for infected files>>
When scanning is finished you will be prompted to reboot only if infected, Click OK
Now click the "REBOOT" Button.
A Message should popup from NoLop. If not, double click the program again and it will finish Please Post the contents of C:\NoLop.log

LVL 30

Expert Comment

ID: 18012061
You need to run the cleaners while in safe mode.

I would run spybot sd and adaware after updating the signatures.

Author Comment

ID: 18018567
Thanks all.. keep the suggestions coming..

I will be trying saturday to fix it when i am next with my client.
LVL 47

Expert Comment

ID: 18018615
A hijackthis log will be most helpful in our diagnoses.

Please download HijackThis 1.99.1
Open Hijackthis, click "Do a system scan and save a logfile" don't fix anything yet.

Then upload the logs to any hosting sites,
or go to the below link and login using your Experts-Exchange username and password.
Click on "Expert Area" tab
type or paste the link to your Question
"Browse" your pc to the location of your Hijackthis log and click "Upload"
Copy the resulting "url" and post it back here.

OR: paste the log to either of these sites:
then at the bottom left corner click "paste"
Copy the address/url and post it here.

2. or at --> 
and click "Analyse", click "Save".  Then post the link to the saved list here.

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Intune and ActiveSync 2 26
Samsung dvr sdr-5102n2t not working 7 60
Is etc. legitimate? 2 294
exchange 2010 Dag failed 3 67
There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question