473,387 Members | 1,573 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,387 software developers and data experts.

trojan attack

hai
i have a problem here because of a trojan attack..its called trojan agent horse.ACNS i googled it and could not find any relevant information. this trojan does not let me run anything.for running any application it asks for open with. then it has disabled running exe files and control panel.i dont want to reinstall my os.can you tell me how to clean up without using removers as i tried quite a few of them and none worked... thanx for the help in advance,,,

I AM REALLY DESPERATE
Sep 25 '08 #1
4 2665
Stang02GT
1,208 Expert 1GB
Have you tried Nortons or Macafee?

Do you rememeber what you downloaded around the time you noticed this virus?
Sep 25 '08 #2
AmberJain
884 Expert 512MB
Hello,

Please post more details about your problem such as:

1. How come you know that there's a trojan horse on your PC. Is it some anti virus (or similar) which informs you that you have a trojan? Please post back the details about Anti virus you are using and the information provided by AntiVirus about the trojan.

2. Is you anti virus updated?

3. Can you post a screenshot of processes running in Task manager?

4. Remove any malicious looking entry for autoruns in msconfig. (goto run-->msconfig--->startup)


Hope this helps......
AmbrNewlearner
Sep 25 '08 #3
first my anti virus, avg free edition reported there was a trojan attack.then my system doesnot work properly..meaning, for each and every application, i get a open with dialog box and have to choose the correct exe file.thats how i confirmed the trojan attack stated by avg.now i am not able to open any application directly and run commands from run.i cant open task manager also.....i regualrly update my virus every day
Sep 26 '08 #4
AmberJain
884 Expert 512MB
Hello,

first my anti virus, avg free edition reported there was a trojan attack
Had you tried scanning using some other Anti Virus software other than AVG. I had used AVG in the past and noticed that (somehow) computer gets infected even after AVG is installed and many times AVG justs notifies user about viruses and cannot delete them (well, that may be my personal opinion). Well, if you would really like to solve this problem, then I would prefer you to download and install Avast anti virus (it's FREE) from here. When you would be installing, Avast would prompt you for an boot time scan. Select to run Avast boot time scanner and then when you will restart your PC then Avast will run a boot time scan to see and remove any viruses on your system.

If that doesnot helps then you will need to manually search for the malicious file(s) and restore file type associations for all extensions. But first perform a Avast anti virus scan (remember to first uninstall AVG and then install Avast) and post back if that helps. If not then we will TRY to manually remove malicious file(s).

So try scanning using Avast and post back the results.

Hope this helps.........
AmbrNewlearner
Sep 27 '08 #5

Sign in to post your reply or Sign up for a free account.

Similar topics

18
by: Mad Programmer | last post by:
I'm writing a destructive trojan with C++ and I need to know how I can destroy the target's monitor and format the target's harddisk before the target can stop the program. What do I need to do?
87
by: Sony Music CDs install Malware | last post by:
Whether you are a web surfer or a C++ developer, if you use Windows be cautioned about SONY music CDs. They contain 'viewer' type software that is actually a trojan horse for a "rootkit". The...
2
by: irfan200x | last post by:
How Should i Remove the Trojan Virus in my system Windows XP SP2? Is some body have the Full Software Then send to me my E-mail Address is bye
2
by: =?Utf-8?B?bXkgY2F0IGtub3dzIG1vcmU=?= | last post by:
* your browser was infected by trojan.win.32.obfuscated.gx. you need to clean your system immediately or it will crash. Okay so this is what keeps popping up every so often. I've downloaded...
2
by: priya08 | last post by:
System affected by Trojan horse virus. Anti-virus is having in the system but it is detecting the virus but not removing the virus... Tell some antivirus to remove it.... when the system is logged...
0
by: =?Utf-8?B?UmFuZ2VyODAx?= | last post by:
Hi All My virus software detected a trojan horse virus in the smss.exe and winlogon.exe files that were located in my C:\Program Files\Common Files\ Since then I can no longer log onto my MS...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.