Enter your Keyword, Search here,

Manual Removal of W32/Magania.BPKA Trojan » olhrwef.exe

Manual Removal of W32/Magania.BPKA Trojan » olhrwef.exe, nmdfgds0.dll, nmdfgds1.dll, cdaudio.sys, p0ijj.bat, oiwj.exe
W32/Magania.BPKA is a trojan. The trojan will infect Windows systems.
The following Internet downloads were started (the retrieved bits are saved into the local file):
URL to be downloaded and
Filename for the downloaded bits
http://456229.net/mg/am1.rar - %Temp%\am1.rar   
http://sderfg.com/1m/c.rar - %System%\c.exe

This Trojan Copies its files to %Windows\system32, %Windows\system32\dllcache, Windows Root folder as hidden files or active non-hidden files.
This trojan information updated on August 11, 2009.
Other names of W32/Magania.BPKA Trojan:
This trojan is also known as Worm/AutoRun.GV, Trojan-GameThief.Win32.Magania.bpka, Trojan.Magania.RBT.

Damage Level : Medium/High
Distribution Level:
Download Registry, Taskmanager and Folder Options Repair Tool
W32/Magania.BPKA Trojan Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.

The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • [ Kill the Process, Use Killbox if your Access Denied ]
Download W32/Magania.BPKA Trojan Known File Removal Tool
[In Windows Vista Run As Administrator, After Execution System Will Restart]
  • %Windows\system32\olhrwef.exe [282.62 KB]
  • %Windows\system32\nmdfgds0.dll
  • %Windows\system32\nmdfgds1.dll
  • %Windows\system32\dllcache\cdaudio.sys
  • %Root of Windows Installed drive\p0ijj.bat
  • %Root of Windows Installed drive\oiwj.exe 
  • %Root of Windows Installed drive\autorun.inf
    [ No Exact Information about Files, search above related files in Program files Folder ]
    If you have any of these files in running process from task manger, end the process before removal.
    Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
    [ Right Click - Save Target As/Linked Content As ]
    Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/Magania.BPKA Trojan Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ] 
  • Save it to your Windows desktop.
  • Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
  • Or Download Regfile to enable Registry editor
  • Download Registry Enabler [ Right click - Save Target As ]
  • Open it with Registry editor
W32/Magania.BPKA Trojan modifies registry at the following locations to ensure its automatic execution at every system Startup:
Delete The Entries

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL / CheckedValue = 0x00000000
Delete file entries from right side

Search Registry For W32/Magania.BPKA Trojan File Names listed above to remove completely,
Edit Menu - Find, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Killbox (Freeware)

No comments :

Post a Comment

Comment on this Post!!

More Posts that you may be interested...