Aliases of Scramble
There are many names at Scramble. But most known of them are following: [Kaspersky]Trojan.Scramble,Lokjaw.Scramble.1253;[Eset]Scramble.1253 virus;[F-Prot]destructive program;[Panda]Trj/Scramble,Scramble(1256.1259,Scramble.Drp;[Computer Associates]Scramble!Trojan,Scramble.1640
Scramble the normal sample Trojan, Backdoor, Downloader, DoS.This malware extends basically on wide-area networks using for infection and reproduction of vulnerability of the operating system of Windows.For definition of the presence at system Scramble makes in memory unique identifiers.Often enough is updated and varies.Scramble is dangerous and can lead to loss of the data and make your system unsteadiness.
How to Clear Scramble from Your computer?
In order to completely clear Scramble from your PC it is necessary to delete all files, folders, keys of the register of Windows and their value.For this purpose you can use ExterminateIt or try to delete Scramble independently manually.For malware removal independently you need to follow the steps described below in the sections - How to clear Scramble Files (.exe, .dll, .com, .sys, .bin etc.)and How to remove Scramble from the Windows Registry.In sections Files Scramble and Folders Scramble complete lists for removal are resulted. Also you can take advantage of sections of Windows Registry Keys and Windows Registry Values for removal Scramble
How to remove Scramble Files (.sys, .exe, .dll, .com, .bin etc.).
To clear files and folders associated with Scramble execute following steps:
Using the file explorer or file manager display all from mentioned below files and folders. Note: The paths use certain conventions such as [ %PROGRAM_FILES%]. These conventions are explained here.Select the file or folder and press SHIFT+Delete on the keyboard. Click Yes in the confirm dialog box.
IMPORTANT: If a file is locked (the file can be used by other application), removal is impracticable (the Windows will notify you the corresponding message).
For removal locked files take advantage RemoveOnReboot utility.To remove locked file, select it and press the right button of the mouse, then select Send To-> delete on Next Reboot on the menu and after removal restart your computer.
You could download RemoveOnReboot utility now RemoveOnReboot
How to delete Scramble from the Windows Registry?
The Windows registry is important directory which stores system information, settings and options for Microsoft Windows operating systems. Also information about installed programs details as well as the information about the applications that are automatically run at start-up.Because this, malware, spyware, and adware (including Scramble) often store references to their own files in your Windows registry so that they can automatically launch every time you start up your computer.The registry also provides a window into the operation of the kernel, exposing runtime information such as performance counters and currently active hardware.
If you want effectively delete Scramble from your Windows registry, you must clear all the registry keys and values associated with Scramble.They are listed in the additional sections - Registry Keys and Registry Values on this page.
IMPORTANT: it should be remembered that Windows registry is a core component of your operation system, therefore we urgently recommend to make back up of registry before the removal beginning keys and values. The warning. Wrong change of parameters of the registry using the editor of the register or any different way can lead to serious problems. For their elimination operating system reinstallation can be demanded. The corporation Microsoft does not guarantee that these problems can be eliminated.
The responsibility for changing the registry at your own risk.Back up the registry.
Before register editing is requisite to export sections to which changes will be made, or to create a backup copy of all register.At occurrence of a problem it will allow to restore a former state of the register. To create a backup copy of all register, take advantage of the program of archiving for a backup of a state of system. The system state includes the register, a database of registration of classes COM + and load files.
Registry Editor it is possible to use for performance of following tasks: search of the subteen, section, subsection or parameter; subsection or parameter addition; change of value of parameter; subsection or parameter removal; subsection or parameter renaming. Transition Registry Editor displays the set of folders. Each folder represents a key local computer.When you view the remote computer’s registry will be visible only two standard sections: HKEY_USERS and HKEY_LOCAL_MACHINE.
Follow the steps below to clear the Scramble registry keys and values:
On the Windows Start menu, click Run. In the Open box, type regedit and click OK. Open the Registry Editor. The application consists of two panels.
In the left pane, presented folders that represent the registry keys, arranged in a hierarchical order. The right side shows the value selected key. To remove the keys, associated with Scramble, do the following:Locate the key in the left pane windows Registry Editor, opening folders ways described in the section Registry Keys. By selecting the correct key, click the right mouse button and in the dialog box, select Delete. Click Yes in the dialog box Confirm Key Delete. To delete the key value contained in the section Registry Values, do the following:In the right pane of Registry Editor window, click the key, highlight it and click the right mouse button. In the pop-up menu, select Delete. Click Yes in the dialog box Confirm Value Delete.
How Did My PC Get Infected with Scramble?
One of the most common questions found when cleaning Scramble is “how did my machine get infected”? There are a variety of reasons, but the most common ones are that you are going to sites that you are not practicing Safe Internet, you are not running the proper security software, and that your computer’s security settings are set too low.
Practice Safe Internet
One of the main reasons people get Scramble in the first place is that they are not practicing Safe Internet. You practice Safe Internet when you educate yourself on how to use properly the Internet using security tools and good practice. Whether these things are files or sites it doesn’t really matter. If something is out to get you, and you click on it, it most likely will.
Below are a list of simple precautions to take to keep your computer clean and running securely:
If you get an attachment from someone you do not know, DO NOT OPEN IT!It may be Scramble. Opening attachments from people you do not know is a very common method for viruses or worms to infect your computer.
If you receive an attachment and it ends with a .exe, .com, .bat, or .pif DO NOT OPEN the attachment unless you know for a fact that it is clean.For the casual computer user, you will almost never receive a valid attachment of this type.
If you receive an attachment from someone you know, and it looks suspicious, then it probably is.The email could be from someone you know infected with Scramble that is trying to infect everyone in their address book.
If you are browsing the Internet and a popup appears saying that you are infected, ignore it! DO NOT INSTALL any software that will require to download.
Another tactic to get Scramble on the web is when a site displays a popup that looks like a normal Windows message or alert. When you click on them, though, they instead bring you to another site that is trying to push a product on you.
Do not go to porn sites.The fact is that a large amount of malware (including Scramble) is pushed through these types of sites.
When using an Instant Messaging program be cautious about clicking on links people send to you. It is not uncommon for infections to send a message to everyone in the infected person’s contact list that contains a link to an infection (it may be Scramble too). Instead when you receive a message that contains a link, message back to the person asking if it is legit before you click on it.
Stay away from Warez and Crack sites! In addition to the obvious copyright issues, the downloads from these sites are typically overrun with infections and Scramble is not exception.
Be careful of what you download off web sites and Peer-2-Peer networks. Some sites disguise adware as legitimate software to trick you into installing them and Peer-2-Peer networks are crawling with it. If you want to download a piece of software a from a site, and are not sure if they are legitimate, you can use McAfee Siteadvisor to look up info on the site.
Visit Microsoft’s Windows Update Site Frequently
It is important that you visit http://www.windowsupdate.com regularly. This will ensure your computer has always the latest security updates available installed on your computer.If there are new updates to install, install them immediately, then reboot your computer, and revisit the site until there are no more critical updates. This also protect your computer from Scramble.
Symptoms of Infection
Symptoms of Scramble
If you suspect or confirm that your PC is infected with Scramble, obtain the current antivirus software.The following are some primary indicators that a computer may be infected:
- The PC runs slower than usual.
- The computer stops responding, or it locks up frequently.
- The PC crashes, and then it restarts every few minutes, it may be symptom of Scramble.
- The PC restarts on its own.
- Additionally, the PC does not run as usual.
- Disks or disk drives are inaccessible.
- You cannot print items correctly.
- You see unusual error messages.
- You see distorted menus and dialog boxes.
- There is a double extension on an attachment that you recently opened, such as a .jpg, .vbs, .gif, or .exe. extension, it’s may be Scramble.
- An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted.
- An antivirus program cannot be installed on the computer, or the antivirus program will not run.
- New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs.
- Strange sounds or music plays from the speakers unexpectedly.
- A program disappears from the PC even though you did not intentionally clear the program.
Note These are common signs of infection by Scramble. However, these signs may also be caused by hardware or software problems that have nothing to do with a PC virus.
Symptoms of Scramble in e-mail messages
When a computer adware infects e-mail messages or infects other files on a computer, you may notice the following symptoms:
- The infected file may make copies of itself. This behavior may use up all the free space on the hard disk.
- A copy of the infected file may be sent to all the addresses in an e-mail address list.
- The Scramble adware may reformat the hard disk.
- This behavior will remove files and programs.
- The Scramble may install hidden programs, such as pirated software.
- This pirated software may then be distributed and sold from the pc.
- The Scramble may reduce security.
- This could enable intruders to access remotely the computer or the network.
- You receive an e-mail message that has a strange attachment. When you open the attachment, dialog boxes appear, or a sudden degradation in system performance occurs.
- Someone tells you that they have recently received e-mail messages from you that contained attached files that you did not send. The files that are attached to the e-mail messages have extensions such as .exe, .bat, .scr, and .vbs extensions.
Trojan Infection Symptoms
A trojan horse (including Scramble) is a program that infects your computer and allows a hacker to run hidden tasks behind your back.
The Scramble can allow total remote access to your computer by a third party.
If you have experienced any of the following symptoms, you are infected with an Internet Trojan and hackers have invaded your computer.To remove the trojan and keep others out of your PC you could purchase the Buy ExterminateIt Now.
Symptoms That Indicate Scramble
If you experience any of the following symptoms, you have been infected by one of the most dangerous type of individuals. These non-stealth hackers are known to destroy data and crash computers when they grow tired of playing their games.
Your CD-ROM drawer opens and closes by itself
Scramble have the ability to open and close your CD-ROM drawer.
Your computer screen flips upside down or invertss.
When you are infected with Scramble, hackers can make your PC screen blink, flip upside down or invert it so that everything is displayed backwards.
Your wall paper or background settings change by themselves
The non-stealth type of hacker may change your default background or wall paper settings. Many times this will be done by using a picture found on your computer or one uploaded by the hacker.
Documents or messages print on your printer by themselves
Since the hacker has total access to your computer, he can access your printer and print personal messages to you or print documents found in your folders.
Problems with your browser
Your computer browser goes to a strange or unknown web page by itself Trojans, including Scramble, allow the hacker to launch your web browser and go to any web page that they preselected.
Your windows color settings change by themselves
When infected, the Scramble allows the hacker to change your Windows color settings to any colors of their choice.
Your screen saver settings change by themselves
Often, the non-stealth hacker will set your screen saver with a personal scrolling message to you.
Your right and left mouse buttons reverse their functions
Often, the hacker makes your mouse buttons switch around. The right click now does what the left click did and the left click takes on the functions that the right click used to have.
Your mouse pointer disappears
Sometimes the hacker will completely turn off your mouse. Then, your mouse pointing arrow completely disappears.
Your mouse moves by itself
The hacker can take control of your mouse pointer and click on icons and start programs as if he were sitting in your chair in front of your computer.
Your mouse starts leaving trails
The hacker can change your mouse configuration to make it leave mouse trails as you move it.
Your computer plays recordings of things recorded in your computer room.
If you have a microphone connected to your computer, the hacker can record and listen to what is going on in the room. Sometimes the non-stealth hacker will play the sound file back when he knows you are in the room.
Your sound volume changes by itself
Sometimes the hacker will turn your sound volume all the way up or down to attract your attention.
Your Windows Start button disappears
Once infected by Scramble, the hacker can make your Windows start button hidden from your view.
Programs load or unload by themselves
Scramble can kill or startup programs on your computer.Many times your anti spyware is unloaded and then parts of it are altered or deleted.
Your computer starts talking or conversing with you.
Scramble allow the hacker to type anything that he wants to say to you in a box and then make it appear that your PC is talking to you.Many times this feature is used along with the web cam and sound option so that the hacker can see and hear you as he converses.
Your computer starts reading the contents of your PC clipboard.
The hacker can make your PC speak the text contained in your clipboard and insert new text into your windows clipboard.
Strange chat boxes appear on your PC and you are forced to chat with some stranger.
The Scramble will allow the hacker to bring up a square black chat box when you can not do anything else but type into this box. The hacker may talk back to you, or just leave this box up to block you from accessing your computer programs while he undermines what you are doing.
Strange Windows Warning, Info, error, or question boxes appear on your pc.
Your PC generates strange warning or question boxes.Many times these are personal messages directed directly to you and asking you a question with Yes or No or Ok buttons for you to click.
You get complaints from your ISP that your PC is IP scanning.
The hacker can use your computer to attack, send email or scan for other infected computers.You could then even get an email from your Internet service provider warning you that your account will be terminated if the activity continues.
People that you are chatting with know too much personal information about you or your pc.
With the help of Scramble hackers can find personal information about you by reading documents on your PC such as a resume, financial records, personal letters, etc.
Other people can read your private IRC or ICQ messages
While your PC is infected with Scramble, the hacker can not only see everything that you type, but every message sent to you via programs such as ICQ, IRC, AIM and yahoo pager.If someone that you are talking to seems to know what others are talking to you about in private while using one of the chat programs above you may have been infected.
People that you are talking to can see you or know what is inside your computer room.
If you have a webcam, the hacker can turn it on without your knowledge and watch you as well as see things in the background of the webcam.
Your time and date change on your PC by itself.
Using Scramble the hacker can change the time and date on your pc.Often this is done it is to catch your attention and changed to the extreme.You can then expect the hacker to ask you what time or date it is on your pc.
Your computer speaker starts and stops working by itself.
The hacker can turn your PC speaker on and off. Your PC shuts down by itself.The hacker can cause your computer to shutdown if you are infected by Scramble.
Your computer shuts down and powers off by itself.
Once infected, the hacker using Scramble can make your PC turn itself off.
Your Task bar disappears
The hacker can hide your taskbar from your view.
Ctrl + Alt + Del stops working
The hacker or Trojan may disable this function so that you can not view your task list or be able to end the task on a given program or process.
When you reboot your PC you get a message telling you that there are other users still connected.
If you get a message when you reboot telling you that other users are still connected, it means that you have open file shares and someone is accessing your files. You need to put a password on your drives and shares or stop sharing files.
What Scramble may do?
Below are possibilities you may experience when you are infected with Scramble. Remember that you also may be experiencing any of the below issues and not have a virus.
- Scramble may clear files.
- Various messages in files or on programs.
- Changes volume label.
- Marks clusters as bad in the FAT.
- Randomly overwrites sectors on the hard disk.
- Replaces the MBR with own code.
- Create more than one partition.
- Attempts to access the hard disk drive, which can result in error messages such as: Invalid drive specification.
- Causes cross-linked files.
- Causes a “sector not found” error.
- Cause the system to run slow.
- Logical partitions created, partitions decrease in size.
- A directory may be displayed as garbage.
- Directory order may be modified so files, such as COM files, will start at the beginning of the directory.
- Cause Hardware problems such as keyboard keys not working, printer issues, modem issues etc.
- Disable ports such as LPT or COM ports.
- Caused keyboard keys to be remapped.
- Alter the system time / date.
- Cause system to hang or freeze randomly.
- Cause activity on HDD or FDD randomly.
- Increase file size.
- Increase or decrease memory size.
- Randomly change file or memory size.
- Extended boot times.
- Increase disk access times.
How to protect yourself in the future?
In order to protect yourself from Scramble and this not happening again it is important that take proper care and precautions when using your pc.Make sure you have updated ExterminateIt running, all the latest updates to your operating system, a firewall, and only open attachments or click on popups that you know are safe. These precautions can be a tutorial unto itself, and luckily, we have one created already:
Simple and easy ways to keep your PC safe and secure on the Internet.
Make your Internet Explorer 6 and below more secure.From within Internet Explorer click on the Tools menu and then click on Options.
- Click once on the Security tab.
- Click once on the Internet icon so it becomes highlighted.
- Click once on the Custom Level button.
- Change the Download signed ActiveX controls to Prompt.
- Change the Download unsigned ActiveX controls to Disable.
- Change the Initialize and script ActiveX controls not marked as safe to Disable.
- Change the Installation of desktop items to Prompt.
- Change the Launching programs and files in an IFRAME to Prompt.
- Change the Navigate sub-frames across different domains to Prompt.
- When all these settings have been made, click on the OK button.
- If it prompts you as to whether or not you want to save the settings, click on Yes button.
- Next press the Apply button and then the OK to exit the Internet Properties page.
It is very important that your computer has an anti-virus software running on your machine (you could free download ExterminateIt).This alone can save you a lot of trouble with spyware in the future.
We can’t stress strongly enough how important it is for you to do five things for every PC you own:Secure your e-mail client against running unwanted scripts. If you use Outlook or Outlook Express and have not secured them.
Scan your computers by ExterminateIt at least weekly to make sure they aren’t harboring viruses or worms.
Keep your ExterminateIt software up-to-date. AntiVirus software vendors update their adware lists on a regular basis.Make sure you visit your vendor’s Web site at least once a week to download the update.
Avoid running attachments (especially .EXE files) that come in your e-mail it may be Scramble, even if they come from your friends, relatives or colleagues. The warped minds now writing e-mail viruses will do their best to lure you into running their viruses and worms by making them look like love letters, jokes or pornography. Once you or one of your friend succumbs to this temptation, the script will mail itself to everyone on that computer’s address list.
Make frequent backups of your data files, and keep some of your backups out of your pc.We like to burn CD-R backup discs on a regular schedule; CD-RW and Zip discs also work well.