Question:
Can a Trojan keep disconnecting my dsl?
e_lix_abeth
2010-05-21 18:15:57 UTC
I found a Trojan last night on my PC(win32 crypt gku [drp]), for the last week my dsl modem has been having connection issues from 8pm to early mornings, all pcs are wireless in the house and all was having the dropped connections. Could this Trojan have caused that?
Seven answers:
ilknur K
2010-05-21 18:39:03 UTC
A Trojan, sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system. The term is derived from the Trojan Horse story in Greek mythology.



Purpose and operation Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access it remotely and perform various operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse.

Operations that could be performed by a hacker on a target computer system include:

Use of the machine as part of a botnet (i.e. to perform spamming or to perform Distributed Denial-of-service (DDoS) attacks)

Data theft (e.g. passwords, credit card information, etc.)

Installation of software (including other malware)

Downloading or uploading of files

Modification or deletion of files

Keystroke logging

Viewing the user's screen

Wasting computer storage space

Crashing the computer

Trojan horses require interaction with a hacker to fulfill their purpose, though the hacker need not be the individual responsible for distributing the Trojan horse. In fact, it is possible for hackers to scan computers on a network using a port scanner in the hope of finding one with a Trojan horse installed, which the hacker can then use to control the target computer.[1]

A trojan differs from a virus in that only a file specifically designed to carry it can do so. http://en.wikipedia.org/wiki/Trojan_horse_(computing)



Follow this instructions to Remove Trojan Virus in you Computer.

Restart You Computer Safe Mode with Networking



1. Log out and reboot your machine.



2. When the machine starts the reboot sequence, press the F8 key repeatedly.



3. Select Safe Mode with Networking from the resulting menu.



4. Login. If the malware has changed your password, try logging in as

Administrator. By default, Administrator has no password.



5. The machine will continue booting, but the Windows desktop will look different.



Then in The Safe With Networking .Download by using Rkill press here http://www.bleepingcomputer.com/forums/topic308364.html



Download and Scan By Using Malwarebytes’ Anti-Malware http://download.cnet.com/Malwarebytes-Anti-Malware/3000-8022_4-10804572.html?tag=contentMain;contentAux



Download and Scan By Using Super Anti-Spyware Press here http://www.superantispyware.com/



Download ATF is a new, freeware, temporary file cleaner for Windows, IE, Firefox and Opera with a simple, easy-to-use interface.



The main screen allows the user to either clean all temporary files, or select files for cleaning. The program also knows if Firefox and or Opera is being used, and gives the option of cleaning the temporary files associated with those applications.



ATF Cleaner provides the user with a window showing the total bytes freed upon completion. The program is small (36kb), quick to run and no installation required. to Download ATF Cleaner press this link http://download.cnet.com/ATF-Cleaner/3000-18512_4-89432.html



Download and Scan By using

Remove Fake Antivirus 1.64 press here http://www.softpedia.com/progDownload/Remove-Fake-Antivirus-Download-127588.html

After Finish Scan and Remove all Virus,Restart you Computer to be Normal.



Then

Download and Scan again By using Norman Malware Cleaner Press here http://www.norman.com/support/support_tools/58732/en This is to make sure you Virus, Malware, Trojan, Worm,

Rogue Fake Anti-Virus, Hijack Web Browser, Pop up Advertisements,

Rootkit and Spyware it is not on you Computer Forever. Please give me the feedback and Rate Me
Orla
2010-05-22 01:39:11 UTC
Yep, that's called a classic trojan can perform the major functions of Trojan programs: blocking, modifying or erasing data, disrupting the operation of computers or computer network; they don't have any additional functions. http://www.filehippo.com/download_hijackthis/download/977401f430f892662f302243ff61e113/

Download Hijack This>Run scan on suspected files>Show them to http://www.techsupportforum.com/security-center/virus-trojan-spyware-help/hijackthis-log-help-inactive/83200-hijack-log.html Search for C:\ for win32. It's a dropper. I just realised its name: its functions: to install a malware program without the user's knowledge: trojan-droppers on't display any messages/false messages such as, notifying about an error in the archive or using the wrong version of the OS. Its function i to protect another known malware program from being detected: not every anti-virus can detect a malware located inside a trojan-dropper.
2010-05-22 02:17:05 UTC
In general, trojans and other malware exist...NOT to wreck havoc upon the infected computer....but to make money for the criminals that code this crap.



These guys want to steal your passwords, your financial info and your ID etc etc

etc. The ONLY way that they can retrieve this info is to connect to the internet and have it sent to them, without your knowledge or consent.



These internet criminals don't care one iota what time you have internet access from. AM , PM they all spit on us.



Your issue is with your ISP....they are likely upgrading their network (during those limited hours) to give the end-user (you) a faster and more reliable connection.



Isn't progress wonderful??
vlj2002
2010-05-22 02:48:33 UTC
Yes, Shows you how to remove rogues, but works for other viruses too (By me):



http://www.youtube.com/watch?v=eGVWQgtCvtg



Use combofix from bleepingcomputer.com, then download malwarbytes(you may need to rename the installer/setup to something like winlogon.exe to be able to run or install it) from malwarebytes.com or softpedia.com, then clean the rest of the virus with superantispyware and Hitman Pro 3.5 from softpedia.com/cnet.com and just in case you do have a rootkit on your system use GMER from majorgeek.com(Use gmer to scan and anything in red delete.)



Future Protection use this wizard to recommend security protection for your system:



http://www.techsupportalert.com/secwiz



or go to safe mode and then do the above:





To get into Safe Mode with Networking:



1. Log out and reboot your machine.

2. When the machine starts the reboot sequence, press the F8 key repeatedly.

3. Select Safe Mode with Networking from the resulting menu.



Note: Rogue security software is a form of computer malware that deceives or misleads users into paying for the fake or simulated removal of malware.
weh717
2010-05-22 04:57:01 UTC
Okay you are really becoming annoying vlj2002. Every question you try to answer is the same nonsense about youtube video and whatever else you are trying to say. You are clueless. Go away.
2010-05-23 20:21:32 UTC
there are have some Trojan running on your computer!

The latest software can remove it:

http://adware-scan-online.com/Trojan/
jjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj
2010-05-22 01:39:15 UTC
download hijackthis and post the log on a tech form like http://www.security-forums.com register on it and post your problem on a catergory you think is the problem with your pc and a tech support will be with you in seconds and its free and we can tell you excatly whats wrong with it


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...