If your computer has not been protected with anti-virus software and has been infected with malware, you will need to take the following actions to delete this:
- Delete the original trojan file (its location on the infected computer will depend on how the program got onto the computer).
- Restore the original "hosts" file content:
By default this is the following type of file:
# (C) Microsoft Corp., 1993-1999 # # It is a sample HOSTS file used by Microsoft TCP/IP for Windows. # # This file contains the mappings for the IP-addresses to the host names. # Each element should be located within a separate string. The IP-address should # be located in the first column, followed by the relevant name. # The IP-address and name of the host should be separated by at least one space. # # Moreover, some strings may contain comments # (details of the string). These should follow the name of the host and should be separated # from it by the '#' symbol. # # For example: # # 22.214.171.124 rhino.acme.com # source server # 126.96.36.199 x.acme.com # client host x
- Run a full Kaspersky Antivirus scan of the computer with updated antivirus databases (download trial version).
The trojan is launched with a string parameter containing a pathway to a certain file. If launching without this parameter, the trojan shuts down without carrying out any actions.
When running, the trojan replaces the "hosts" file:
with a file with a path obtained in the launch parameter. This means that the user may be redirected to certain sites or prevented from accessing certain resources. "Hidden" and "read only" attributes are then established for the "hosts" file. The trojan then deletes the file, the path to which is obtained from the launch parameter, and then shuts down.
A trojan program that carries out destructive actions on the user's computer. It is a Windows application (PE-EXE file). 6656 bytes. Written in C++.