Overview ATC

ATC the normal specimen Trojan, Downloader.This spyware spreads basically on wide-area networks using for infection and reproduction of vulnerability of the operating system of Windows.For definition of the presence at system ATC sets in memory unique identifiers.Often enough is updated and varies.ATC is shifty and can lead to loss of the data and make your system unsteadiness.

How to Clear ATC from Your computer?

In order to completely delete ATC from your PC it is necessary to remove all files, folders, keys of the register of Windows and their value.For this purpose you can use ExterminateIt or try to delete ATC independently manually.For malware removal independently you need to follow the steps described below in the sections - How to remove ATC Files (.exe, .dll, .com, .sys, .bin etc.)and How to clear ATC from the Windows Registry.In sections Files ATC and Folders ATC complete lists for removal are resulted. Also you can take advantage of sections of Windows Registry Keys and Windows Registry Values for removal ATC

How to clear ATC Files (.dll, .sys, .exe, .com, .bin etc.).

All files and directories associated with ATC are below the relevant sections Files and Folders on this page.To clear completely ATC must delete all the files.

To remove files and folders associated with ATC execute following steps:

Using the file explorer or file manager display all from mentioned below files and folders. Note: The paths use certain conventions such as [ %PROGRAM_FILES%]. These conventions are explained here.Select the file or folder and press SHIFT+Delete on the keyboard. Click Yes in the confirm dialog box.

IMPORTANT: If a file is locked (the file can be used by other program), removal is impossible (the Windows will notify you the corresponding message).

For removal locked files take advantage RemoveOnReboot utility.To delete locked file, select it and press the right button of the mouse, then select Send To-> remove on Next Reboot on the menu and after removal restart your pc.

You could download RemoveOnReboot utility now RemoveOnReboot

Scan your Files for ATC

How to remove ATC from the Windows Registry?

The Windows registry is important directory which stores system information, settings and options for Microsoft Windows operating systems. Also information about installed programs details as well as the information about the applications that are automatically run at start-up.Because this, adware, spyware, and malware (including ATC) often store references to their own files in your Windows registry so that they can automatically launch every time you start up your computer.The registry also provides a window into the operation of the kernel, exposing runtime information such as performance counters and currently active hardware.

If you want effectively remove ATC from your Windows registry, you must delete all the registry keys and values associated with ATC.They are listed in the additional sections - Registry Keys and Registry Values on this page.

IMPORTANT: it should be remembered that Windows registry is a core component of your operation system, therefore we urgently recommend to make back up of registry before the removal beginning keys and values. The warning. Wrong change of parameters of the registry using the editor of the register or any different way can lead to serious problems. For their elimination operating system reinstallation can be demanded. The corporation Microsoft does not guarantee that these problems can be eliminated.

The amenability for changing the registry at your own risk.Back up the registry.

Before register editing is necessary to export sections to which changes will be made, or to create a backup copy of all register.At occurrence of a problem it will allow to restore a former state of the register. To create a backup copy of all register, take advantage of the program of archiving for a backup of a state of system. The system state includes the register, a database of registration of classes COM + and load files.

Registry Editor it is possible to use for performance of following tasks: search of the subteen, section, subsection or parameter; subsection or parameter addition; change of value of parameter; subsection or parameter removal; subsection or parameter renaming. Transition Registry Editor displays the set of folders. Each folder represents a key local pc.When you view the remote computer’s registry will be visible only two standard sections: HKEY_USERS and HKEY_LOCAL_MACHINE.

Follow the steps below to clear the ATC registry keys and values:

On the Windows Start menu, click Run. In the Open box, type regedit and click OK. Open the Registry Editor. The application consists of two panels.

In the left pane, presented folders that represent the registry keys, arranged in a hierarchical order. The right side shows the value selected key. To clear the keys, associated with ATC, do the following:Locate the key in the left pane windows Registry Editor, opening folders ways described in the section Registry Keys. By selecting the correct key, click the right mouse button and in the dialog box, select Delete. Click Yes in the dialog box Confirm Key Delete. To remove the key value contained in the section Registry Values, do the following:In the right pane of Registry Editor window, click the key, highlight it and click the right mouse button. In the pop-up menu, select Delete. Click Yes in the dialog box Confirm Value Delete.

Scan your Windows Registry for ATC

ATC Categorized as Trojan, Downloader

How Did My PC Get Infected with ATC?

One of the most common questions found when cleaning ATC is “how did my machine get infected”? There are a variety of reasons, but the most common ones are that you are going to sites that you are not practicing Safe Internet, you are not running the proper security software, and that your pc’s security settings are set too low.

Practice Safe Internet

One of the main reasons people get ATC in the first place is that they are not practicing Safe Internet. You practice Safe Internet when you educate yourself on how to use properly the Internet using security tools and good practice. Whether these things are files or sites it doesn’t really matter. If something is out to get you, and you click on it, it most likely will.

Below are a list of simple precautions to take to keep your PC clean and running securely:

If you acquire an attachment from someone you do not know, DO NOT OPEN IT!It may be ATC. Opening attachments from people you do not know is a very common method for viruses or worms to infect your pc.

If you acquire an attachment and it ends with a .exe, .com, .bat, or .pif DO NOT OPEN the attachment unless you know for a fact that it is clean.For the casual PC user, you will almost never receive a valid attachment of this type.

If you have an attachment from someone you know, and it looks suspicious, then it probably is.The email could be from someone you know infected with ATC that is trying to infect everyone in their address book.

If you are browsing the Internet and a popup appears saying that you are infected, ignore it! DO NOT INSTALL any software that will require to download.

Another tactic to get ATC on the web is when a site displays a popup that looks like a normal Windows message or alert. When you click on them, though, they instead bring you to another site that is trying to push a product on you.

Do not go to porn sites.The fact is that a large amount of spyware (including ATC) is pushed through these types of sites.

When using an Instant Messaging program be cautious about clicking on links people send to you. It is not uncommon for infections to send a message to everyone in the infected person’s contact list that contains a link to an infection (it may be ATC too). Instead when you receive a message that contains a link, message back to the person asking if it is legit before you click on it.

Stay away from Warez and Crack sites! In addition to the obvious copyright issues, the downloads from these sites are typically overrun with infections and ATC is not exception.

Be careful of what you download off web sites and Peer-2-Peer networks. Some sites disguise malware as legitimate software to trick you into installing them and Peer-2-Peer networks are crawling with it.If you want to download a piece of software a from a site, and are not sure if they are legitimate, you can use McAfee Siteadvisor to look up info on the site.

Visit Microsoft’s Windows Update Site Frequently

It is important that you visit regularly. This will ensure your computer has always the latest security updates available installed on your computer.If there are new updates to install, install them immediately, then reboot your computer, and revisit the site until there are no more critical updates. This also protect your computer from ATC.

Symptoms of Infection

Symptoms of ATC

If you suspect or confirm that your PC is infected with ATC, obtain the current antivirus software.The following are some primary indicators that a PC may be infected:

  • The computer runs slower than usual.
  • The PC crashes, and then it restarts every few minutes, it may be symptom of ATC.
  • Additionally, the PC does not run as usual.
  • Disks or disk drives are inaccessible.
  • You cannot print items correctly.
  • You see unusual error messages.
  • You see distorted menus and dialog boxes.
  • There is a double extension on an attachment that you recently opened, such as a .jpg, .vbs, .gif, or .exe. extension, it’s may be ATC.
  • An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted.
  • An antivirus program cannot be installed on the computer, or the antivirus program will not run.
  • New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs.
  • Strange sounds or music plays from the speakers unexpectedly.
  • A program disappears from the computer even though you did not intentionally delete the program.

Note These are common signs of infection by ATC. However, these signs may also be caused by hardware or software problems that have nothing to do with a PC virus.

Symptoms of ATC in e-mail messages

When a PC virus infects e-mail messages or infects other files on a computer, you may notice the following symptoms:

  • The infected file may make copies of itself. This behavior may use up all the free space on the hard disk.
  • A copy of the infected file may be sent to all the addresses in an e-mail address list.
  • The ATC adware may reformat the hard disk.
  • This behavior will delete files and programs.
  • The ATC may install hidden programs, such as pirated software.
  • This pirated software may then be distributed and sold from the pc.
  • The ATC may reduce security.
  • This could enable intruders to access remotely the computer or the network.
  • You receive an e-mail message that has a strange attachment. When you open the attachment, dialog boxes appear, or a sudden degradation in system performance occurs.
  • Someone tells you that they have recently received e-mail messages from you that contained attached files that you did not send. The files that are attached to the e-mail messages have extensions such as .exe, .bat, .scr, and .vbs extensions.

Trojan Infection Symptoms

A trojan horse (including ATC) is a program that infects your PC and allows a hacker to run hidden tasks behind your back.

The ATC can allow total remote access to your PC by a third party.

If you have experienced any of the following symptoms, you are infected with an Internet Trojan and hackers have invaded your pc.To clear the trojan and keep others out of your PC you could purchase the Buy ExterminateIt Now.

Symptoms That Indicate ATC

If you experience any of the following symptoms, you have been infected by one of the most dangerous type of individuals. These non-stealth hackers are known to destroy data and crash computers when they grow tired of playing their games.

Your CD-ROM drawer opens and closes by itself

ATC have the ability to open and close your CD-ROM drawer.

Your PC screen flips upside down or invertss.

When you are infected with ATC, hackers can make your PC screen blink, flip upside down or invert it so that everything is displayed backwards.

Your wall paper or background settings change by themselves

The non-stealth type of hacker may change your default background or wall paper settings. Many times this will be done by using a picture found on your PC or one uploaded by the hacker.

Documents or messages print on your printer by themselves

Since the hacker has total access to your computer, he can access your printer and print personal messages to you or print documents found in your folders.

Problems with your browser

Your computer browser goes to a strange or unknown web page by itself Trojans, including ATC, allow the hacker to launch your web browser and go to any web page that they preselected.

Your windows color settings change by themselves

When infected, the ATC allows the hacker to change your Windows color settings to any colors of their choice.

Your screen saver settings change by themselves

Often, the non-stealth hacker will set your screen saver with a personal scrolling message to you.

Your right and left mouse buttons reverse their functions

Often, the hacker makes your mouse buttons switch around. The right click now does what the left click did and the left click takes on the functions that the right click used to have.

Your mouse pointer disappears

Sometimes the hacker will completely turn off your mouse. Then, your mouse pointing arrow completely disappears.

Your mouse moves by itself

The hacker can take control of your mouse pointer and click on icons and start programs as if he were sitting in your chair in front of your pc.

Your mouse starts leaving trails

The hacker can change your mouse configuration to make it leave mouse trails as you move it.

Your PC plays recordings of things recorded in your computer room.

If you have a microphone connected to your computer, the hacker can record and listen to what is going on in the room. Sometimes the non-stealth hacker will play the sound file back when he knows you are in the room.

Your sound volume changes by itself

Sometimes the hacker will turn your sound volume all the way up or down to attract your attention.

Your Windows Start button disappears

Once infected by ATC, the hacker can make your Windows start button hidden from your view.

Programs load or unload by themselves

ATC can kill or startup programs on your pc.Many times your anti adware is unloaded and then parts of it are altered or deleted.

Your computer starts talking or conversing with you.

ATC allow the hacker to type anything that he wants to say to you in a box and then make it appear that your computer is talking to you.Many times this feature is used along with the web cam and sound option so that the hacker can see and hear you as he converses.

Your computer starts reading the contents of your computer clipboard.

The hacker can make your computer speak the text contained in your clipboard and insert new text into your windows clipboard.

Strange chat boxes appear on your PC and you are forced to chat with some stranger.

The ATC will allow the hacker to bring up a square black chat box when you can not do anything else but type into this box. The hacker may talk back to you, or just leave this box up to block you from accessing your PC programs while he undermines what you are doing.

Strange Windows Warning, Info, error, or question boxes appear on your computer.

Your computer generates strange warning or question boxes.Many times these are personal messages directed directly to you and asking you a question with Yes or No or Ok buttons for you to click.

You get complaints from your ISP that your PC is IP scanning.

The hacker can use your PC to attack, send email or scan for other infected computers.You could then even get an email from your Internet service provider warning you that your account will be terminated if the activity continues.

People that you are chatting with know too much personal information about you or your computer.

With the help of ATC hackers can find personal information about you by reading documents on your PC such as a resume, financial records, personal letters, etc.

Other people can read your private IRC or ICQ messages

While your computer is infected with ATC, the hacker can not only see everything that you type, but every message sent to you via programs such as ICQ, IRC, AIM and yahoo pager.If someone that you are talking to seems to know what others are talking to you about in private while using one of the chat programs above you may have been infected.

People that you are talking to can see you or know what is inside your PC room.

If you have a webcam, the hacker can turn it on without your knowledge and watch you as well as see things in the background of the webcam.

Your time and date change on your PC by itself.

Using ATC the hacker can change the time and date on your computer.Often this is done it is to catch your attention and changed to the extreme.You can then expect the hacker to ask you what time or date it is on your pc.

Your PC speaker starts and stops working by itself.

The hacker can turn your PC speaker on and off. Your PC shuts down by itself.The hacker can cause your PC to shutdown if you are infected by ATC.

Your computer shuts down and powers off by itself.

Once infected, the hacker using ATC can make your computer turn itself off.

Your Task bar disappears

The hacker can hide your taskbar from your view.

Ctrl + Alt + Del stops working

The hacker or Trojan may disable this function so that you can not view your task list or be able to end the task on a given program or process.

When you reboot your PC you get a message telling you that there are other users still connected.

If you get a message when you reboot telling you that other users are still connected, it means that you have open file shares and someone is accessing your files. You need to put a password on your drives and shares or stop sharing files.

What ATC may do?

Below are possibilities you may experience when you are infected with ATC. Remember that you also may be experiencing any of the below issues and not have a virus.

  • ATC may delete files.
  • Various messages in files or on programs.
  • Changes volume label.
  • Marks clusters as bad in the FAT.
  • Randomly overwrites sectors on the hard disk.
  • Replaces the MBR with own code.
  • Create more than one partition.
  • Attempts to access the hard disk drive, which can result in error messages such as: Invalid drive specification.
  • Causes cross-linked files.
  • Causes a “sector not found” error.
  • Cause the system to run slow.
  • Logical partitions created, partitions decrease in size.
  • A directory may be displayed as garbage.
  • Directory order may be modified so files, such as COM files, will start at the beginning of the directory.
  • Cause Hardware problems such as keyboard keys not working, printer issues, modem issues etc.
  • Disable ports such as LPT or COM ports.
  • Caused keyboard keys to be remapped.
  • Alter the system time / date.
  • Cause system to hang or freeze randomly.
  • Cause activity on HDD or FDD randomly.
  • Increase file size.
  • Increase or decrease memory size.
  • Randomly change file or memory size.
  • Extended boot times.
  • Increase disk access times.

How to protect yourself in the future?

In order to protect yourself from ATC and this not happening again it is important that take proper care and precautions when using your computer.Make sure you have updated ExterminateIt running, all the latest updates to your operating system, a firewall, and only open attachments or click on popups that you know are safe. These precautions can be a tutorial unto itself, and luckily, we have one created already:

Simple and easy ways to keep your computer safe and secure on the Internet.

Make your Internet Explorer 6 and below more secure.From within Internet Explorer click on the Tools menu and then click on Options.

  • Click once on the Security tab.
  • Click once on the Internet icon so it becomes highlighted.
  • Click once on the Custom Level button.
  • Change the Download signed ActiveX controls to Prompt.
  • Change the Download unsigned ActiveX controls to Disable.
  • Change the Initialize and script ActiveX controls not marked as safe to Disable.
  • Change the Installation of desktop items to Prompt.
  • Change the Launching programs and files in an IFRAME to Prompt.
  • Change the Navigate sub-frames across different domains to Prompt.
  • When all these settings have been made, click on the OK button.
  • If it prompts you as to whether or not you want to save the settings, click on Yes button.
  • Next press the Apply button and then the OK to exit the Internet Properties page.

Buy ExterminateIt Now

It is very important that your PC has an anti-virus software running on your machine (you could free download ExterminateIt).This alone can save you a lot of trouble with malware in the future.

We can’t stress strongly enough how important it is for you to do five things for every computer you own:Secure your e-mail client against running unwanted scripts. If you use Outlook or Outlook Express and have not secured them.

Scan your computers by ExterminateIt at least weekly to make sure they aren’t harboring viruses or worms.

Keep your ExterminateIt software up-to-date. AntiVirus software vendors update their adware lists on a regular basis.Make sure you visit your vendor’s Web site at least once a week to download the update.

Avoid running attachments (especially .EXE files) that come in your e-mail it may be ATC, even if they come from your friends, relatives or colleagues. The warped minds now writing e-mail viruses will do their best to lure you into running their viruses and worms by making them look like love letters, jokes or pornography. Once you or one of your friend succumbs to this temptation, the script will mail itself to everyone on that computer’s address list.

Make frequent backups of your data files, and keep some of your backups out of your computer.We like to burn CD-R backup discs on a regular schedule; CD-RW and Zip discs also work well.

  1. No comments yet.
(will not be published)
  1. No trackbacks yet.