Enter your Keyword, Search here,

Manual Removal of W32/Agent.XRB Trojan

Manual Removal of W32/Agent.XRB Trojan.
W32/Agent.XRB is a trojan. The trojan will infect Windows systems.
This trojan first appeared on January 7, 2009.
Other names of W32/Agent.XRB Trojan:
This trojan is also known as Trojan-Downloader.Win32.Agent.xrb, W32.Versie.A

Damage Level : Medium/High
Distribution Level:
Medium
No Removal Tool for W32/Agent.XRB Trojan
Trojan Manual Removal Instructions

Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.
The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • %Windows\System\MSISERVER.exe [ 646,144 Bytes ] [ Kill the Process, Use Killbox if your Access Denied ]
  • %Drive\AutoRun.inf
  • %Temp%\WER4207.dir00\manifest.txt
  • %Temp%\WER4207.dir00\sysdata.xml
  • %Temp%\WER4207.dir00 [ Delete this Folder ] 
    • If you have any of these files in running process from task manger, end the process before removal.
    • Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
    • Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.
Trojan Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download this UnHookExec.inf, and then continue with the removal.Save it to your Windows desktop. Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
The Trojan modifies registry at the following locations to ensure its automatic execution at every system startup:

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_WINDOWS_INSTALLER3.1
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_WINDOWS_INSTALLER3.1\0000
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Windows Installer3.1
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Windows Installer3.1\Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_WINDOWS_INSTALLER3.1
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_WINDOWS_INSTALLER3.1\0000
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Windows Installer3.1
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Windows Installer3.1\Security

The newly created Registry Values

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_WINDOWS_INSTALLER3.1\0000
Service = "Windows Installer3.1"
Legacy = 0x00000001
ConfigFlags = 0x00000000
Class = "LegacyDriver"
ClassGUID = "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
DeviceDesc = "Windows Installer3.1"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_WINDOWS_INSTALLER3.1
NextInstance = 0x00000001
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Windows Installer3.1\Security
Security = 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD 01 02 00 01 01 00 00 00 00 00 05 12 00 00 00 00 00 18 00 FF 01 0F 0
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Windows Installer3.1
Type = 0x00000110
Start = 0x00000002
ErrorControl = 0x00000000
ImagePath = [pathname with a string SHARE]\MSISERVER.exe"
DisplayName = "Windows Installer3.1"
ObjectName = "LocalSystem"
Description = "��ӡ��޸ĺ�ɾ���� Windows ��װ����"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_WINDOWS_INSTALLER3.1\0000
Service = "Windows Installer3.1"
Legacy = 0x00000001
ConfigFlags = 0x00000000
Class = "LegacyDriver"
ClassGUID = "{8ECC055D-047F-11D1-A537-0000F8753ED1}"
DeviceDesc = "Windows Installer3.1"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Enum\Root\LEGACY_WINDOWS_INSTALLER3.1
NextInstance = 0x00000001
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Windows Installer3.1\Security
Security = 01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60 00 04 00 00 00 00 00 14 00 FD 01 02 00 01 01 00 00 00 00 00 05 12 00 00 00 00 00 18 00 FF 01 0F 0
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Windows Installer3.1
Type = 0x00000110
Start = 0x00000002
ErrorControl = 0x00000000
ImagePath = [pathname with a string SHARE]\MSISERVER.exe"
DisplayName = "Windows Installer3.1"
ObjectName = "LocalSystem"
Description = "��ӡ��޸ĺ�ɾ���� Windows ��װ����"


Search Registry For Virus File Names listed above to remove completely,
Edit Menu - Find
, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Killbox (Freeware)

No comments :

Post a Comment

Comment on this Post!!

More Posts that you may be interested...