How to Uninstall Trojan-Dropper.Win32.Agent.arru.docx Windows 2000/Windows XP / Windows 2003/Windows Vista / Windows 7

Trojan-Dropper.Win32.Agent.arru is written by VC, using of PeCompact packers, length of Trojan-Dropper.Win32.Agent.arru is 34,322 bytes. Trojan-Dropper.Win32.Agent.arru would mainly spread through the file bundle , download manager , web page linked to trojan horse , etc., its main purpose is to release Trojan-Dropper.Win32.Agent.arru, download and run itself on user’s PC.

When PC is infected by Trojan-Dropper.Win32.Agent.arru, computer may restart in no reason, important files lost, system and network slowed , programs closed undue.

 

Infected Objects by Trojan-Dropper.Win32.Agent.arru

Windows 2000/Windows XP / Windows 2003/Windows Vista / Windows 7

Transmission of Trojan-Dropper.Win32.Agent.arru

Bundle file, web page linked to horse, download manager

1. manually delete the following files:

D: VolumeDH kisp2011.exe

% Temp% cdf1912.tmp

% Documents and Settings% Administrator Application Data A.tmp

% Documents and Settings% Administrator Application Data B.tmp

% Documents and Settings% Administrator Application Data lua 1.bat

% Documents and Settings% Administrator Application Data lua 2.bat

% Temp% tmp_ext.bat

% Temp% inl19.tmp

2. manually delete the following registry key:

HKEY_LOCAL_MACHINE SOFTWARE WinRAR

Name: tech1894 Data: tech1894

Name: udate data: the current date

Name: uid data: 0

Name: uname data: system

Variable declaration:

% SystemDriver% system where the partition, usually C:

% SystemRoot% WINDODWS directory, usually C: Windows

% Documents and Settings% user file directory, usually C: Documents and Settings

% Temp% temp folder, usually C: Documents and Settings current user name Local Settings Temp

% ProgramFiles% system program the default installation directory, typically: C: ProgramFiles

Files Created by Trojan-Dropper.Win32.Agent.arru:

D: VolumeDH kisp2011.exe

% Temp% cdf1912.tmp

% Documents and Settings% Administrator Application Data A.tmp

% Documents and Settings% Administrator Application Data B.tmp

% Documents and Settings% Administrator Application Data lua 1.bat

% Documents and Settings% Administrator Application Data lua 2.bat

% Temp% tmp_ext.bat

% Temp% inl19.tmp

Registry Branches Created by Trojan-Dropper.Win32.Agent.arru:

HKEY_LOCAL_MACHINE SOFTWARE WinRAR

Name: tech1894 Data: tech1894

Name: udate data: the current date

Name: uid data: 0

Name: uname data: system

Trojan-Dropper.Win32.Agent.arru Would Try to Access the Networks As Follow:

http://121 .***. 142.19:1000 / ipv.wav

http://download1 .***. com.cdn20.com/sxcms.exe

http://setup .***. com/install/pipi_73.exe

http://www .***. com/youbak/software/partner/9010/ddsp1.exe

References:

http://en.wikipedia.org/wiki/Computer_virus

Malware removal guide

Microsoft Updates

Any help needed?