ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Infected With Trojan.ADH.2? - How to Remove It?

Updated on July 22, 2014

“I keep hearing what sounds to be ads in my speakers/headset so I run a scan with Malwarebytes. In the end, it says that it has quarantined the file C:\Windows\System32\rpcss.dll which has been infected with Trojan.ADH.2. However, this doesn't stop the ads from coming up. I still hear the annoying audio ads in the background. Malwarebytes also keeps popping up that it has blocked the threat about once every 40 seconds to a minute. How can I get rid of the threat? “

Learn more about Trojan.ADH.2:

Trojan.ADH.2 is identified as a malicious Trojan horse that can damage the computer severely. It is often found to infect scvhost.exe on the computer. However, many antivirus applications just can help stop and quarantine this threat, but fail to completely delete it. This Trojan can reoccur over and over again after it has been quarantined. In fact, this Trojan is designed by cyber criminals to corrupt target computers terribly and then steal information from the target users. It has the capability to play audio ads in the background once it gets into the compromised PC. You may feel strange to hear such unexpected advertisements when surfing the Internet without opening any media programs.

Screenshot of the threat detected by Symantec Antivirus:

Once installed on your computer, this Trojan can affect your computer performance obviously by modifying the infected rpcss.dll. Since rpcss.dll is a system process it should not be altered easily. The process is required for your PC to work properly. If it is changed by the threat, many computer issues may occur. On the one hand, the Trojan is able to run automatically every time Windows starts. Whenever you start up PC, this threat can be triggered at startup. Then it will start to perform a list of harmful tasks. On the other hand, it may connect to remote servers and download other malicious files or programs on the infected computer, further damaging and compromising the PC. In this way, the data that stored on your PC may be uploaded randomly, which can lead to your personal private information leak. Third parties may get and make use of the data to make illegal profits. Moreover, it may even open a backdoor for remote hackers to access the PC without permission. Then attackers can your trace system records and browser histories to steal your confidential information and compromise the system security aggressively. As a consequence, your log-in passwords, ID number, online credit card passwords or other personal information could be recorded and stolen.

The Trojan is not only a threat to your personal privacy, but also a time bomb to your infected computer. It can endanger your computer security seriously by modifying some vital settings. Some functions of the security tools that installed on your PC may be disabled or turned off by this malware, which makes the infected PC vulnerable for other cyber threats. Under the circumstances, many other malware like ransomware, rogue programs, spyware and so on can take the opportunity to invade the same machine.

Therefore, in order to protect your computer from further damages, please remove Trojan.ADH.2 from the computer as quickly as you can.

Attention: Usually, the Trojan is distributed through harmful websites, suspicious links and free downloads, etc. It may slip into your computer as a harmless application when you visit unsafe web pages or download free items from infected website without letting you know. Therefore, you need to be more careful when surfing the Internet. NEVER visit the malicious websites or click on unknown attachments or links in junk emails.

Symptoms of getting infected by Trojan.ADH.2:

1) Some audio advertisements appear on your computer without rhyme or reason.

2) Some application errors or system errors may pop up when you run programs.

3) The computer speed becomes very slow and it takes you a long time to wait a program to respond.

4) The computer may freeze or crash frequently or encounter blue screen of death error.

5) Some unwanted or strange programs and files may be found on your PC without your permission.

How to get rid of Trojan.ADH.2 and repair the infected PC manually?

Currently, many antivirus applications may fail to thoroughly clear this Trojan from the infected computer. To eradicate the threat, you can follow the instructions below and effectively delete all components of the Trojan.

Step 1: Open Windows Task Manager to end process associated with this Trojan. To do that, press Ctrl + Alt + Delete keys at the same time to open Window Task Manager.

Go to Processes tab on top and scroll down the list to find the suspicious process then right click on it and select End Process.

[random].exe

Step 2: Show hidden folders and files and delete malicious files. Open Folder Options by clicking Control Panel, clicking Appearance and Personalization and clicking Folder Options.

Under View tab, tick Show hidden files, folders and drivers and uncheck Hide protected operating system files (Recommended) and then click OK.

Search for the following folders and delete files created by Trojan.ADH.2.

C:\windows\winstart.bat

C:\windows\wininit.ini

C:\windows\Autoexec.bat

C:\Windows\System32

Step 3: Modify the registry entries that changed by the Trojan. Press Windows key + R key to start Run box.

Then type in regedit and click OK to open Registry Editor.

In the registry entries, locate the following registry keys and alter them.

Change the value of the below entry to “NT AUTHORITY\NetworkService”.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet \Services\rpcss\ObjectName

Change the value of the below entry to “%SystemRoot%\system32 \rpcss.dll”.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\rpcss\Parameters\ServiceDll

Warning: It is risky to modify the Windows registry because any wrong modification may lead to serious consequence to your computer. You are not suggested to modify this part of PC until you are confident about it.

Step4: Download a compatible version of rpcss.dll to replace the old one. You can go to a reputable dll file download website and download a version of rpcss.dll that works on your system. Save it on your PC and right click on it to select the option to decompress the file. Then drag the file to the right location to replace the infected one. Then reboot your PC.

Recommended method:

In addition to the manual steps above, there is another easy way to remove Trojan.ADH.2 completely. We highly recommend you to use a professional and powerful removal tool to delete the Trojan as well as its leftovers once for all within minutes. For those computer beginners, it’s too hard and sophisticated to make modifications on program files and system registry. If you are not familiar with computer, please download and install a reliable and powerful removal tool to help eliminate the Trojan instead.

Download a professional removal tool on your PC.

Perform a scan of your infected PC with the tool.

Delete all infected files and registry entries of the Trojan.

With a few simple steps and you will be able to protect your machine from the malicious Trojan attack. Therefore, use a professional removal to get rid of Trojan.ADH.2 if you are not good at delete it manually.

© 2014 Joan White

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)