Thursday, 10 May 2012 20:26
A rogue program named Windows Pro Solutions has appeared in a virus analysis report. You can see it on this link
This program creates a file Protector-####.exe, where these # characters differ from one infected computer to another. In this particular instance this file is protector-nfrd.exe, this file name on your computer will be different. In some instances it creates a malicious file NPSWF32.dll and loads it in the address space of protector-nfrd.exe or whatever the name of this file on your computer.
- The installer of this virus is of about 1.88 MB. It may be detected by antivirus programs as
packed with PE_Patch [Kaspersky Lab]
- It has capability to send out email message(s) with the built-in SMTP client engine.
- It creates registry entries so that protector-nfrd.exe and other malicious files run at startup
It creates protector-nfrd.exe and other files on the infected computer that you need to search and delete. You should end running processes named protector-nfrd.exe from Task Manager. And also remove the file's entries from windows startup.
Warning: It is possible that some legitimate software may be using the same file names as that of the virus files. You do not have to delete these files if they belong to some legitimate program installed on your computer. Use Windows Defender or SysInternals Process Explorer to differentiate between them. The information in this article is presented without making any claims regarding its usefulness or otherwise. If you have any objections or questions, please send a note by adding a comment at the end of this page, or mail on support(at)comprolive.com
- Most of the viruses enter your computer when you visit some harmful website. If you use a browser plugin that warns you about harmful websites, you can prevent this from happening. A popular browser plugin is called Web Of Trust (WOT), you can install it from its website on this link.
[ a video about WOT plugin ]
- Some of the viruses are downloaded in Internet Cache or in the Temp folder of the windows. The viruses get activated when these files are executed. You can reduce the risk of virus infection if you empty your browser cache and remove windows temp files occasionally, ideally at the end of a browsing session or before closing down your computer. Some programs like CCleaner can be set to do these things automatically. [ a video about CCleaner ]
- Do not leave your computer infected and insecure. If you doubt that there could be some undetected virus on your computer, don't leave it like that. Format the hard disk and reinstall windows and all other programs. That is the sure way to clear doubts.
If you know the duration since your computer is infected, you can try to restore your computer at a prior date, that will be an easy way to undo the changes done by the virus
- Using system restore in windows XP
- Using system restore in windows Vista
- Using system restore in windows7
Boot in safe mode
Sometimes you can not delete a file. You should boot in safe mode and then try to delete it.
- How to boot in safe in windows XP
- How to boot in safe mode in windows Vista
- How to boot in safe mode in windows7
View Hidden Files
- You need to enable to view hidden files and folders before searching.
- How to Enable to View Hidden Files and Folders in Windows XP
- How to Enable to View Hidden Files and Folders in Windows Vista
- How to Enable to View Hidden Files and Folders in Windows7
Remove Processes from Task ManagerPress Ctrl Alt Del keys to open the Task Manager.Select Processes tab. You will see a list. Look for the names protector-nfrd.exe in it. Select if found and press the End Process button. It will ask for your confirmation to end that process. Select Yes. You can end one process at a time. You can find out if a process in Task Manager is good or bad by using Windows Defender in XP and Vista. It shows the path of a process and its publisher. Harmful processes may be shown under Unknown Publisher in windows defender. Whereas in Windows7 you can find that out from the task manager itself. You can watch a video on How to use Windows Defender.
- How to use Windows Defender in windows XP
- How to use Windows Defender in windows Vista
- How to use Windows Defender in windows7
Or you can use Sysinternal's Process Explorer. How to use Sysinternal's Process Explorer
Removing entry from windows startup
The system configuration can be started in xp and in vista by typing msconfig in the run box/ start menu search box.
In xp by clicking on Start > run . The windows startup is reversible. You can check / uncheck any entry from windows startup any number of times. Watch a video on How to Use the Windows Startup
Open system configuration window.Click on the Startup tab. You will see a list all the programs that are scheduled to start with windows. Expand the middle column using your mouse pointer. That will show you the full path of the program. Locate and uncheck the boxes in front of these names "protector-nfrd.exe" (also look for any other suspicious names)Press Apply , Press Close/Ok , Select "restart" at the next prompt.Deleting files
The computer will restart now. Delete the following files and folders. Boot in safe mode or boot in the dos prompt if needed. You can use windows search utility to search for protector-nfrd.exe
%DesktopDir%\Windows Pro Solutions.lnk
(in some instances it creates a data file in the system32 folder as listed above. In case the name is altered, try to find out this file by noting down the date of creation/ modification of the Protector-####.exe file, and then look for a DAT file in the system32 folder created on the same date)
Files in Temp folder
[file and pathname of the sample #1]
You can find full path of the folders for your version of windows on this link.
(We do not know the name or the location of sample #1, it could be in your default download location or on the desktop or in a Temp folder. The files and folders in the Temp folder can be automatically removed, if you use a freeware temp files/ registry cleaner software like CCleaner)
Some Common folder locations
Virus makes create their files in uncommon locations. You can find such locations on this link.
These are the folders where you should find sub folders of legitimate programs. If you find any files (exe, dll etc) at this location, they should be treated suspiciously. The other thing to look out for is randomly named folders.
Repair Hosts File
To repair/ edit the hosts file. Login as administrator. open the following file in notepad
C:\ WINDOWS \system32 \drivers \etc \hosts
remove anything other than 127.0.0.1 Localhost, and save and close the file.
There are several registry modifications done by this virus. You can see the registry modifications in the report from the link above.Using CCleaner
You can easily remove the files in the temp folder by running CCleaner. You can set CCleaner to run automatically each time the computer starts. Do not forget to run CCleaner > Registry menu to remove the obsolete registry entries.
more about CCleaner on this link
Free tools to repair disabled folder options, registry, Task Manager etc
Whereas you can repair disabled Folder Options, disabled Registry Tools, disabled Task Manager, Disabled System Restore etc using these free tools
Use the System File Checker
To repair altered deleted or modified windows system files.
- How to run System File Checker utility in windows XP
- How to run System File Checker utility in windows Vista
- How to run System File Checker utility in windows7
Virus infections are complex. Most of the times a virus on the computer downloads more files and make it complicated. In my attempt to warn users about the different ways that viruses are trying to infect and ways to find them and remove, I have created videos on specific Free tools and manual methods, these videos could be of great help
1) To detect and remove malicious Alternate Data Streams - Stream Armour
2) To detect and remove malicious Services - Advanced WinService Manager
3) To detect and remove viruses in Fake recycle Bin - Watch Video
4) keep an eye on suspicious connections using a Firewall - Free Comodo Firewall
5) A free tool to detect and remove unwanted BHOs - SpyBHO Remover
6) A free tool from Microsoft to reset the IE settings - on Microsoft's website
Reprinted with permission from Threatexpert.com
|< Prev||Next >|