ZombGet Trojan

ZombGet malware description and removal detail
Categories:Trojan,Downloader
Also known as:

[Panda]Trojan Horse;
[Computer Associates]Win32/ZombGet.02.b!Downloader

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing ZombGet:

An up-to-date copy of ExterminateIt should detect and prevent infection from ZombGet.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove ZombGet manually.

To completely manually remove ZombGet malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with ZombGet.

  1. Use Task Manager to terminate the ZombGet process.
  2. Delete the original ZombGet file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes ZombGet from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of ZombGet!


Also Be Aware of the Following Threats:
Removing Ciko Trojan

0 comments

DelWin Trojan

DelWin malware description and removal detail
Categories:Trojan,Worm,Backdoor,Hacker Tool
Also known as:

[Kaspersky]Trojan.BAT.Delwin.c,Trojan.BAT.Delwin.f,Trojan.BAT.Delwin.g,Trojan.BAT.Delwin.i,Trojan.BAT.Delwin.j,Trojan.DelWin.a,Trojan.Win32.DelWin.a,Goblin.1759;
[McAfee]Delwin,QDel150,QZap61;
[F-Prot]destructive program;
[Panda]BAT/Deltree.E,Trj/BAT.Delwin.F,Trj/DelWin.A,Trj/DelWin.C,Trj/Delwin.I,Trj/Delwin.J,Trj/W32.DelWin.a,Trojan Horse,Trojan Horse.LC,Trj/DelWin,Backdoor Program,Trj/Deltree.B,Trj/DelWin.F,Trj/W32.DelWin.b;
[Computer Associates]Bat/Delsys.C!Trojan,Bat/Delwin.c!Trojan,Bat/Delwin.F!Trojan,Bat2EXE.Delwin.C!Trojan,Bat2EXE.Xjpa!Trojan,Delwin.G!Trojan,Win32/Delwin.A!Trojan,DelWin.18439!Trojan,Delwin.17312!Trojan,Delwin.H!Trojan,DelWin.J,DelWin.J1!Trojan,Delwin.17280!Trojan,Delwin.G2!Trojan,DelWin.j!Trojan,Win32/DelWin.J!Trojan,Win32.DelWin,Win32/Delwin.C!Trojan,Delwin;
[Other]DOS/QDelWin.L,Trojan:BAT/Delwin.J,Trojan-BAT.Delwin.j

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing DelWin:

An up-to-date copy of ExterminateIt should detect and prevent infection from DelWin.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove DelWin manually.

To completely manually remove DelWin malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with DelWin.

  1. Use Task Manager to terminate the DelWin process.
  2. Delete the original DelWin file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes DelWin from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of DelWin!


Also Be Aware of the Following Threats:
Killer Trojan Information

0 comments

Zlob.Fam.TrustInBar Trojan

Zlob.Fam.TrustInBar malware description and removal detail
Categories:Trojan,Popups
Visible Symptoms:
Files in system folders:
[%PROGRAM_FILES%]\TrustIn Contextual\trustincontext.dll
[%WINDOWS%]\inetloader.dll
[%WINDOWS%]\se_spoof.dll
[%WINDOWS%]\ticads.exe
[%WINDOWS%]\tpopup.exe
[%WINDOWS%]\trustinbar.exe
[%WINDOWS%]\tse.exe
[%PROGRAM_FILES%]\TrustIn Contextual\trustincontext.dll
[%WINDOWS%]\inetloader.dll
[%WINDOWS%]\se_spoof.dll
[%WINDOWS%]\ticads.exe
[%WINDOWS%]\tpopup.exe
[%WINDOWS%]\trustinbar.exe
[%WINDOWS%]\tse.exe

In order to ensure that the Zlob.Fam.TrustInBar is launched automatically each time the system is booted, the Zlob.Fam.TrustInBar adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%WINDOWS%]\ticads.exe
[%WINDOWS%]\tpopup.exe
[%WINDOWS%]\trustinbar.exe
[%WINDOWS%]\tse.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Zlob.Fam.TrustInBar:

Files:
[%PROGRAM_FILES%]\TrustIn Contextual\trustincontext.dll
[%WINDOWS%]\inetloader.dll
[%WINDOWS%]\se_spoof.dll
[%WINDOWS%]\ticads.exe
[%WINDOWS%]\tpopup.exe
[%WINDOWS%]\trustinbar.exe
[%WINDOWS%]\tse.exe
[%PROGRAM_FILES%]\TrustIn Contextual\trustincontext.dll
[%WINDOWS%]\inetloader.dll
[%WINDOWS%]\se_spoof.dll
[%WINDOWS%]\ticads.exe
[%WINDOWS%]\tpopup.exe
[%WINDOWS%]\trustinbar.exe
[%WINDOWS%]\tse.exe

Folders:
[%PROGRAM_FILES%]\TrustIn Contextual

Registry Keys:
HKEY_CLASSES_ROOT\changerbho.changerbho
HKEY_CLASSES_ROOT\ChangerBHO.ChangerBHO.1
HKEY_CLASSES_ROOT\CLSID\{0D4C7057-EAD2-44C6-AD18-9092905F28F1}
HKEY_CLASSES_ROOT\CLSID\{0EDC6C20-A31C-11DB-8AB9-0800200C9A66}
HKEY_CLASSES_ROOT\CLSID\{3AAC4C68-AFC8-11DB-80EF-8AF955D89593}
HKEY_CLASSES_ROOT\CLSID\{590FFB84-6A29-4797-9C0E-B15DF2C4CDCB}
HKEY_CLASSES_ROOT\CLSID\{631F7200-642E-11DB-BD13-0800200C9A66}
HKEY_CLASSES_ROOT\CLSID\{a19ef336-01d4-48e6-926a-fe7e1c747aed}
HKEY_CLASSES_ROOT\CLSID\{F67EEB12-AB09-11DB-A6F1-260856D89593}
HKEY_CLASSES_ROOT\CLSID\{FE6C16C4-16AD-47B6-B250-26AD1829E49A}
HKEY_CLASSES_ROOT\InetLoader.WeeklyExecuter
HKEY_CLASSES_ROOT\InetLoader.WeeklyExecuter.1
HKEY_CLASSES_ROOT\Interface\{60D3A642-0B03-46AD-B8B0-8D45989A0055}
HKEY_CLASSES_ROOT\Interface\{636FF82A-830A-42EA-938B-6DC78B2AC30C}
HKEY_CLASSES_ROOT\Interface\{81CDDAE8-3B92-4F0D-86C1-8DD5DB6A8471}
HKEY_CLASSES_ROOT\Interface\{8C88AAE2-A341-4DE8-B064-062194307E5F}
HKEY_CLASSES_ROOT\Interface\{A55C3BA7-DB1E-4652-867E-055CEAFE8018}
HKEY_CLASSES_ROOT\Interface\{C28EB22A-6966-4E4B-8592-E84C28D38402}
HKEY_CLASSES_ROOT\Se_spoof.SpoofBHO
HKEY_CLASSES_ROOT\Se_spoof.SpoofBHO.1
HKEY_CLASSES_ROOT\TrustInContext.ContextualAds
HKEY_CLASSES_ROOT\TrustInContext.ContextualAds.1
HKEY_CLASSES_ROOT\TypeLib\{42FC3840-020C-4E93-A34C-4DF1A6330FBB}
HKEY_CLASSES_ROOT\TypeLib\{506146FD-9499-49A8-AEDE-692C173B2AA4}
HKEY_CLASSES_ROOT\TypeLib\{B1C54189-72F0-4353-987B-18FA221BEF09}
HKEY_CLASSES_ROOT\TypeLib\{EFA1EC0F-8359-41B7-A178-7DD6805A0C79}
HKEY_CLASSES_ROOT\TypeLib\{FEBB9141-2FF9-4FC8-BA91-1CE79DDE25CF}
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{590FFB84-6A29-4797-9C0E-B15DF2C4CDCB}
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{A19EF336-01D4-48E6-926A-FE7E1C747AED}
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{FE6C16C4-16AD-47B6-B250-26AD1829E49A}
HKEY_CURRENT_USER\Software\TrustIn
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ChangerBHO.ChangerBHO
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ChangerBHO.ChangerBHO.1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\InetLoader.WeeklyExecuter
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\InetLoader.WeeklyExecuter.1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{636FF82A-830A-42EA-938B-6DC78B2AC30C}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{81CDDAE8-3B92-4F0D-86C1-8DD5DB6A8471}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{8C88AAE2-A341-4DE8-B064-062194307E5F}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{A55C3BA7-DB1E-4652-867E-055CEAFE8018}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{C28EB22A-6966-4E4B-8592-E84C28D38402}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Se_spoof.SpoofBHO
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Se_spoof.SpoofBHO.1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TrustInContext.ContextualAds
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TrustInContext.ContextualAds.1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{42FC3840-020C-4E93-A34C-4DF1A6330FBB}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{506146FD-9499-49A8-AEDE-692C173B2AA4}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{B1C54189-72F0-4353-987B-18FA221BEF09}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{EFA1EC0F-8359-41B7-A178-7DD6805A0C79}
HKEY_LOCAL_MACHINE\Software\Microsoft\Code Store Database\Distribution Units\{590FFB84-6A29-4797-9C0E-B15DF2C4CDCB}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0D4C7057-EAD2-44C6-AD18-9092905F28F1}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0EDC6C20-A31C-11DB-8AB9-0800200C9A66}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2520BA45-3D97-4864-82FF-F47F951727BA}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{590FFB84-6A29-4797-9C0E-B15DF2C4CDCB}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{631F7200-642E-11DB-BD13-0800200C9A66}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F67EEB12-AB09-11DB-A6F1-260856D89593}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FE6C16C4-16AD-47B6-B250-26AD1829E49A}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Contextual Ads
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Trust Cleaner Promo
HKEY_LOCAL_MACHINE\SOFTWARE\TrustIn Bar
HKEY_LOCAL_MACHINE\SOFTWARE\TrustIn Popups

Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar

Removing Zlob.Fam.TrustInBar:

An up-to-date copy of ExterminateIt should detect and prevent infection from Zlob.Fam.TrustInBar.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Zlob.Fam.TrustInBar manually.

To completely manually remove Zlob.Fam.TrustInBar malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Zlob.Fam.TrustInBar.

  1. Use Task Manager to terminate the Zlob.Fam.TrustInBar process.
  2. Delete the original Zlob.Fam.TrustInBar file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Zlob.Fam.TrustInBar from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Zlob.Fam.TrustInBar!


Also Be Aware of the Following Threats:
Iinun Trojan Cleaner

0 comments

Dopen Trojan

Dopen malware description and removal detail
Categories:Trojan
Also known as:

[Panda]Trj/W32.Dopen.b,Trj/Doth,Trj/W32.Dopen.a;
[Computer Associates]Win32/Dopen.B!Trojan,Win32/Dopen.A!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Dopen:

An up-to-date copy of ExterminateIt should detect and prevent infection from Dopen.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Dopen manually.

To completely manually remove Dopen malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Dopen.

  1. Use Task Manager to terminate the Dopen process.
  2. Delete the original Dopen file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Dopen from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Dopen!


Also Be Aware of the Following Threats:
Removing Java.FloodMem Trojan
Remove Lexup Trojan
QFat13 Trojan Information

0 comments

Bat.Sb Trojan

Bat.Sb malware description and removal detail
Categories:Trojan
Also known as:

[Eset]BAT/generic virus;
[Panda]BAT/C65;
[Computer Associates]Bat/Sb.65

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bat.Sb:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bat.Sb.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bat.Sb manually.

To completely manually remove Bat.Sb malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bat.Sb.

  1. Use Task Manager to terminate the Bat.Sb process.
  2. Delete the original Bat.Sb file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bat.Sb from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bat.Sb!


Also Be Aware of the Following Threats:
HLL.OJ.sub Trojan Cleaner
Micron Trojan Cleaner
WinHound Ransomware Information
PolyEngine.Win32.V32P Trojan Removal

0 comments

Cutwail Trojan

Cutwail malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]Rootkit.Win32.Agent.dp,Trojan-Dropper.Win32.Small.avu,Trojan-Downloader.Win32.Agent.boy,Trojan-Downloader.Win32.Agent.brk,Trojan-Downloader.Win32.Agent.crz,Trojan-Downloader.Win32.Agent.czl,Trojan-Downloader.Win32.Agent.deu,Trojan-Downloader.Win32.Agent.djt,Trojan-Downloader.Win32.Agent.dpe,Trojan.Win32.Pakes.sx,Trojan-Spy.Win32.KeyLogger.rp,Trojan.Win32.Pakes.bqb,Trojan.Win32.Agent.der,Trojan.Win32.Agent.dcc,Trojan.Win32.Agent.cnt,Trojan.Win32.Pakes.btf,Trojan-Dropper.Win32.Agent.dgf;
[McAfee]Spy-Agent.bv,Spy-Agent.bv.dldr;
[F-Prot]W32/Downldr2.AOUA;
[Other]Win32/Cutwail!generic,Trojan.Pandex,Trojan-Dropper.Win32.Agent.bie,Win32/Cutwail.S,W32/Agent.BNQJ,Troj/Agent-ELV,Win32/Cutwail.T,Win32/Cutwail.AB,Win32/Cutwail.AN,Win32/Cutwail.AQ,Trojan.Goldun,W32/Agent.COSM,Win32/Cutwail.BF,TrojanDropper:Win32/Cutwail.A,Troj/Pushdo-Gen,Win32/Cutwail.BI,TrojanDropper:Win32.Cutwail.H,Win32/Cutwail.CA,TrojanDropper:Win32/Cutwail.R,W32/Agent.DLNS,Trojan.Kobcka.BG,Win32/Cutwail.CC,Troj/Agent-GIS

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\drivers\ip6fw.sys
[%SYSTEM%]\drivers\runtime.sys
[%SYSTEM%]\drivers\secdrv.sys
[%SYSTEM%]\plugin1.dat
[%WINDOWS%]\plugin1.dat
[%WINDOWS%]\SysPr.prx
[%WINDOWS%]\Temp\startdrv.exe
[%SYSTEM%]\ksys.sys
[%SYSTEM%]\drivers\ip6fw.sys
[%SYSTEM%]\drivers\runtime.sys
[%SYSTEM%]\drivers\secdrv.sys
[%SYSTEM%]\plugin1.dat
[%WINDOWS%]\plugin1.dat
[%WINDOWS%]\SysPr.prx
[%WINDOWS%]\Temp\startdrv.exe
[%SYSTEM%]\ksys.sys

In order to ensure that the Cutwail is launched automatically each time the system is booted, the Cutwail adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%WINDOWS%]\Temp\startdrv.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Cutwail:

Files:
[%SYSTEM%]\drivers\ip6fw.sys
[%SYSTEM%]\drivers\runtime.sys
[%SYSTEM%]\drivers\secdrv.sys
[%SYSTEM%]\plugin1.dat
[%WINDOWS%]\plugin1.dat
[%WINDOWS%]\SysPr.prx
[%WINDOWS%]\Temp\startdrv.exe
[%SYSTEM%]\ksys.sys
[%SYSTEM%]\drivers\ip6fw.sys
[%SYSTEM%]\drivers\runtime.sys
[%SYSTEM%]\drivers\secdrv.sys
[%SYSTEM%]\plugin1.dat
[%WINDOWS%]\plugin1.dat
[%WINDOWS%]\SysPr.prx
[%WINDOWS%]\Temp\startdrv.exe
[%SYSTEM%]\ksys.sys

Registry Keys:
HKEY_CURRENT_USER\software\wget
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{9b71d88c-c598-4935-c5d1-43aa4db90836}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\xvid
HKEY_LOCAL_MACHINE\software\wget
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_ndnet1
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_runtime
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_runtime2
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\ndnet1
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\runtime
HKEY_CURRENT_USER\software\dimaware
HKEY_LOCAL_MACHINE\software\dimaware
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{c4de5b15-4ffe-4c02-8cb3-cad24a33562b}
HKEY_LOCAL_MACHINE\system\currentcontrolset001\control\safeboot\minimal\ctl_w32.sys
HKEY_LOCAL_MACHINE\system\currentcontrolset001\control\safeboot\network\ctl_w32.sys
HKEY_LOCAL_MACHINE\system\currentcontrolset001\services\ctl_w32
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_ctl_w32

Registry Values:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Cutwail:

An up-to-date copy of ExterminateIt should detect and prevent infection from Cutwail.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Cutwail manually.

To completely manually remove Cutwail malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Cutwail.

  1. Use Task Manager to terminate the Cutwail process.
  2. Delete the original Cutwail file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Cutwail from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Cutwail!


Also Be Aware of the Following Threats:
Bancos.HGX Trojan Symptoms
Excessive.Force Spyware Removal instruction

0 comments

Super Trojan

Super malware description and removal detail
Categories:Trojan,RAT,Hacker Tool
Also known as:

[Panda]Trojan Horse.LC;
[Computer Associates]Super.7984!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Super:

An up-to-date copy of ExterminateIt should detect and prevent infection from Super.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Super manually.

To completely manually remove Super malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Super.

  1. Use Task Manager to terminate the Super process.
  2. Delete the original Super file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Super from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Super!


Also Be Aware of the Following Threats:
Gaobot.XW Worm Information
Hackers.Paradise Backdoor Symptoms
Remove BC RAT
Conseal DoS Cleaner

0 comments

Win32.RCServer Trojan

Win32.RCServer malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]TrojanSpy.Win32.Chazer.a;
[Panda]Bck/Cay.A;
[Computer Associates]Win32/Reign.I.26286!Trojan,Win32.Reign.I

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Win32.RCServer:

An up-to-date copy of ExterminateIt should detect and prevent infection from Win32.RCServer.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Win32.RCServer manually.

To completely manually remove Win32.RCServer malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Win32.RCServer.

  1. Use Task Manager to terminate the Win32.RCServer process.
  2. Delete the original Win32.RCServer file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Win32.RCServer from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Win32.RCServer!


Also Be Aware of the Following Threats:
Stoned.Email.Bomber Hacker Tool Information
PWS.Trial Trojan Removal
Vxidl.AMJ Trojan Cleaner
Remove Bancos.HRB Trojan
Win32.TrojanDownloader.IstBar.NAG Downloader Removal instruction

0 comments

SillyDl.NP!Trojan Trojan

SillyDl.NP!Trojan malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing SillyDl.NP!Trojan:

An up-to-date copy of ExterminateIt should detect and prevent infection from SillyDl.NP!Trojan.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove SillyDl.NP!Trojan manually.

To completely manually remove SillyDl.NP!Trojan malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SillyDl.NP!Trojan.

  1. Use Task Manager to terminate the SillyDl.NP!Trojan process.
  2. Delete the original SillyDl.NP!Trojan file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes SillyDl.NP!Trojan from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of SillyDl.NP!Trojan!


Also Be Aware of the Following Threats:
Removing Vxidl.BDP Trojan

0 comments

Shadow Trojan

Shadow malware description and removal detail
Categories:Trojan,Backdoor,Downloader,Hacker Tool,DoS
Also known as:

[Panda]Trj/Shadow98,Trj/Shadow98.II;
[Computer Associates]Shadow-98,Shadow

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Shadow:

An up-to-date copy of ExterminateIt should detect and prevent infection from Shadow.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Shadow manually.

To completely manually remove Shadow malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Shadow.

  1. Use Task Manager to terminate the Shadow process.
  2. Delete the original Shadow file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Shadow from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Shadow!


Also Be Aware of the Following Threats:
BingoPalace.com Tracking Cookie Cleaner

0 comments

SillyDL.DAQ Trojan

SillyDL.DAQ malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing SillyDL.DAQ:

An up-to-date copy of ExterminateIt should detect and prevent infection from SillyDL.DAQ.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove SillyDL.DAQ manually.

To completely manually remove SillyDL.DAQ malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SillyDL.DAQ.

  1. Use Task Manager to terminate the SillyDL.DAQ process.
  2. Delete the original SillyDL.DAQ file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes SillyDL.DAQ from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of SillyDL.DAQ!


Also Be Aware of the Following Threats:
webstat.com Tracking Cookie Cleaner
AOL Trojan Cleaner
Win32.Wuloit Trojan Removal
GrayBird Trojan Symptoms
SillyDl.CRH Trojan Cleaner

0 comments

Vxidl.ACC Trojan

Vxidl.ACC malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Vxidl.ACC:

An up-to-date copy of ExterminateIt should detect and prevent infection from Vxidl.ACC.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Vxidl.ACC manually.

To completely manually remove Vxidl.ACC malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Vxidl.ACC.

  1. Use Task Manager to terminate the Vxidl.ACC process.
  2. Delete the original Vxidl.ACC file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Vxidl.ACC from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Vxidl.ACC!


Also Be Aware of the Following Threats:
InCommander Trojan Information
Removing TwiZone DoS
SillyOR Trojan Removal

0 comments

CouponAge Adware

CouponAge malware description and removal detail
Categories:Adware

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing CouponAge:

An up-to-date copy of ExterminateIt should detect and prevent infection from CouponAge.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove CouponAge manually.

To completely manually remove CouponAge malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with CouponAge.

  1. Use Task Manager to terminate the CouponAge process.
  2. Delete the original CouponAge file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes CouponAge from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of CouponAge!


Also Be Aware of the Following Threats:
Bat.Delaol Trojan Removal

0 comments

Frethog.ACS Trojan

Frethog.ACS malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Frethog.ACS:

An up-to-date copy of ExterminateIt should detect and prevent infection from Frethog.ACS.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Frethog.ACS manually.

To completely manually remove Frethog.ACS malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Frethog.ACS.

  1. Use Task Manager to terminate the Frethog.ACS process.
  2. Delete the original Frethog.ACS file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Frethog.ACS from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Frethog.ACS!


Also Be Aware of the Following Threats:
Remove Behdevy Trojan
Satiloler Trojan Removal instruction
Remove Ad.Logics Tracking Cookie
Alex Trojan Information
Dowque.ABF Trojan Removal

0 comments

MIRC.IRCFlood Trojan

MIRC.IRCFlood malware description and removal detail
Categories:Trojan,Backdoor,DoS
Also known as:

[Panda]Backdoor Program

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\cnick.dll
[%SYSTEM%]\m4x[x]
[%SYSTEM%]\neiom.dll
[%SYSTEM%]\org.reg
[%SYSTEM%]\orgs.reg
[%SYSTEM%]\xxx-spam.dll
[%SYSTEM%]\xxxx-inviter.dll
[%SYSTEM%]\TEMP\0ff.exe
[%SYSTEM%]\TEMP\4w4y
[%SYSTEM%]\TEMP\ANITVI~1.BAT
[%SYSTEM%]\TEMP\f&ll
[%SYSTEM%]\TEMP\gt.x
[%SYSTEM%]\TEMP\GUNSYS~1.EXE
[%SYSTEM%]\TEMP\HeDs.exe
[%SYSTEM%]\TEMP\IRCX.dll
[%SYSTEM%]\TEMP\law.x
[%SYSTEM%]\TEMP\niCk-X
[%SYSTEM%]\TEMP\orrl.exe
[%SYSTEM%]\TEMP\w.e
[%SYSTEM%]\TEMP\XGun
[%SYSTEM%]\cnick.dll
[%SYSTEM%]\m4x[x]
[%SYSTEM%]\neiom.dll
[%SYSTEM%]\org.reg
[%SYSTEM%]\orgs.reg
[%SYSTEM%]\xxx-spam.dll
[%SYSTEM%]\xxxx-inviter.dll
[%SYSTEM%]\TEMP\0ff.exe
[%SYSTEM%]\TEMP\4w4y
[%SYSTEM%]\TEMP\ANITVI~1.BAT
[%SYSTEM%]\TEMP\f&ll
[%SYSTEM%]\TEMP\gt.x
[%SYSTEM%]\TEMP\GUNSYS~1.EXE
[%SYSTEM%]\TEMP\HeDs.exe
[%SYSTEM%]\TEMP\IRCX.dll
[%SYSTEM%]\TEMP\law.x
[%SYSTEM%]\TEMP\niCk-X
[%SYSTEM%]\TEMP\orrl.exe
[%SYSTEM%]\TEMP\w.e
[%SYSTEM%]\TEMP\XGun

In order to ensure that the MIRC.IRCFlood is launched automatically each time the system is booted, the MIRC.IRCFlood adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%SYSTEM%]\TEMP\0ff.exe
[%SYSTEM%]\TEMP\HeDs.exe
[%SYSTEM%]\TEMP\orrl.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting MIRC.IRCFlood:

Files:
[%SYSTEM%]\cnick.dll
[%SYSTEM%]\m4x[x]
[%SYSTEM%]\neiom.dll
[%SYSTEM%]\org.reg
[%SYSTEM%]\orgs.reg
[%SYSTEM%]\xxx-spam.dll
[%SYSTEM%]\xxxx-inviter.dll
[%SYSTEM%]\TEMP\0ff.exe
[%SYSTEM%]\TEMP\4w4y
[%SYSTEM%]\TEMP\ANITVI~1.BAT
[%SYSTEM%]\TEMP\f&ll
[%SYSTEM%]\TEMP\gt.x
[%SYSTEM%]\TEMP\GUNSYS~1.EXE
[%SYSTEM%]\TEMP\HeDs.exe
[%SYSTEM%]\TEMP\IRCX.dll
[%SYSTEM%]\TEMP\law.x
[%SYSTEM%]\TEMP\niCk-X
[%SYSTEM%]\TEMP\orrl.exe
[%SYSTEM%]\TEMP\w.e
[%SYSTEM%]\TEMP\XGun
[%SYSTEM%]\cnick.dll
[%SYSTEM%]\m4x[x]
[%SYSTEM%]\neiom.dll
[%SYSTEM%]\org.reg
[%SYSTEM%]\orgs.reg
[%SYSTEM%]\xxx-spam.dll
[%SYSTEM%]\xxxx-inviter.dll
[%SYSTEM%]\TEMP\0ff.exe
[%SYSTEM%]\TEMP\4w4y
[%SYSTEM%]\TEMP\ANITVI~1.BAT
[%SYSTEM%]\TEMP\f&ll
[%SYSTEM%]\TEMP\gt.x
[%SYSTEM%]\TEMP\GUNSYS~1.EXE
[%SYSTEM%]\TEMP\HeDs.exe
[%SYSTEM%]\TEMP\IRCX.dll
[%SYSTEM%]\TEMP\law.x
[%SYSTEM%]\TEMP\niCk-X
[%SYSTEM%]\TEMP\orrl.exe
[%SYSTEM%]\TEMP\w.e
[%SYSTEM%]\TEMP\XGun

Folders:
[%SYSTEM%]\xcm

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing MIRC.IRCFlood:

An up-to-date copy of ExterminateIt should detect and prevent infection from MIRC.IRCFlood.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove MIRC.IRCFlood manually.

To completely manually remove MIRC.IRCFlood malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with MIRC.IRCFlood.

  1. Use Task Manager to terminate the MIRC.IRCFlood process.
  2. Delete the original MIRC.IRCFlood file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes MIRC.IRCFlood from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of MIRC.IRCFlood!


Also Be Aware of the Following Threats:
PSW.Blade Trojan Symptoms
Bancos.HLN Trojan Cleaner
FakeAlert.Adobepnl Trojan Information
Removing Sepro Trojan
Allsum.5bk Trojan Removal

0 comments

Delf.id Trojan

Delf.id malware description and removal detail
Categories:Trojan,Backdoor
Also known as:

[Kaspersky]Backdoor.Delf.im;
[Eset]Win32/Delf.ID trojan,Win32/Delf.NAB trojan;
[Panda]Backdoor Program;
[Computer Associates]Backdoor/Delf.im,Backdoor/Delf.Pamela

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Delf.id:

An up-to-date copy of ExterminateIt should detect and prevent infection from Delf.id.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Delf.id manually.

To completely manually remove Delf.id malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Delf.id.

  1. Use Task Manager to terminate the Delf.id process.
  2. Delete the original Delf.id file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Delf.id from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Delf.id!


Also Be Aware of the Following Threats:
Remove System33r.Multi.Webdownloader Downloader
Datex Trojan Removal instruction
Pigeon.EEK Trojan Removal
XED Trojan Removal

0 comments

Exebug.file Trojan

Exebug.file malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]PS-MPC-based,Trojan.Direct.b;
[Eset]Psmpc.564.A virus;
[McAfee]Exebug file,Univ/o;
[F-Prot]destructive program,PS-MPC.564;
[Panda]PS-MPC.Based;
[Computer Associates]PS-MPC,PS-MPC.550

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Exebug.file:

An up-to-date copy of ExterminateIt should detect and prevent infection from Exebug.file.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Exebug.file manually.

To completely manually remove Exebug.file malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Exebug.file.

  1. Use Task Manager to terminate the Exebug.file process.
  2. Delete the original Exebug.file file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Exebug.file from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Exebug.file!


Also Be Aware of the Following Threats:
Pigeon.BBG Trojan Symptoms

0 comments

Dir.bomb Trojan

Dir.bomb malware description and removal detail
Categories:Trojan,Backdoor,Downloader,DoS
Also known as:

[Kaspersky]Trojan.Skism.a;
[Panda]Trj/Skism.A,Trj/Skism;
[Computer Associates]Dir-bomb

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Dir.bomb:

An up-to-date copy of ExterminateIt should detect and prevent infection from Dir.bomb.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Dir.bomb manually.

To completely manually remove Dir.bomb malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Dir.bomb.

  1. Use Task Manager to terminate the Dir.bomb process.
  2. Delete the original Dir.bomb file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Dir.bomb from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Dir.bomb!


Also Be Aware of the Following Threats:
Voonda Toolbar Symptoms

0 comments

poshuk.com Tracking Cookie

poshuk.com malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing poshuk.com:

An up-to-date copy of ExterminateIt should detect and prevent infection from poshuk.com.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove poshuk.com manually.

To completely manually remove poshuk.com malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with poshuk.com.

  1. Use Task Manager to terminate the poshuk.com process.
  2. Delete the original poshuk.com file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes poshuk.com from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of poshuk.com!


Also Be Aware of the Following Threats:
Keyboard.Collector Spyware Removal instruction
AFA Internet Enhancement Adware Removal instruction
SillyDl.CTZ Trojan Information
Killr Trojan Cleaner

0 comments

visionize.dk Tracking Cookie

visionize.dk malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing visionize.dk:

An up-to-date copy of ExterminateIt should detect and prevent infection from visionize.dk.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove visionize.dk manually.

To completely manually remove visionize.dk malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with visionize.dk.

  1. Use Task Manager to terminate the visionize.dk process.
  2. Delete the original visionize.dk file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes visionize.dk from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of visionize.dk!


Also Be Aware of the Following Threats:
Remove SdBot.dc Backdoor

0 comments

Fludel Trojan

Fludel malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Fludel:

An up-to-date copy of ExterminateIt should detect and prevent infection from Fludel.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Fludel manually.

To completely manually remove Fludel malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Fludel.

  1. Use Task Manager to terminate the Fludel process.
  2. Delete the original Fludel file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Fludel from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Fludel!


Also Be Aware of the Following Threats:
Removing Agobot.ad Trojan
DF.Dropper Trojan Symptoms
NetCrack.alpha Trojan Removal

0 comments

JS.CSSPopup Trojan

JS.CSSPopup malware description and removal detail
Categories:Trojan,Hijacker
Also known as:

[Kaspersky]Trojan.Win32.StartPage.bi,TrojanDownloader.Win32.Small.ar;
[Eset]Win32/SearchHelp.A trojan;
[Panda]Spyware/SearchHelp,Trj/Zerolin.A;
[Computer Associates]JS.CSSPopup,Win32/StartPage.IDG!Trojan,Win32.Startpage.V,Win32/Small.ar!Trojan,Win32.Suzer

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing JS.CSSPopup:

An up-to-date copy of ExterminateIt should detect and prevent infection from JS.CSSPopup.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove JS.CSSPopup manually.

To completely manually remove JS.CSSPopup malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with JS.CSSPopup.

  1. Use Task Manager to terminate the JS.CSSPopup process.
  2. Delete the original JS.CSSPopup file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes JS.CSSPopup from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of JS.CSSPopup!


Also Be Aware of the Following Threats:
Remove Inokital Trojan
Uren Trojan Cleaner
Cene2 Trojan Information
Removing Control.it Backdoor
Removing Small.fp Backdoor

0 comments

Lucifer Trojan

Lucifer malware description and removal detail
Categories:Trojan,Backdoor,Downloader,DoS
Also known as:

[Kaspersky]Trojan.Lucifer,LuciferBoot.b;
[F-Prot]security risk or a "backdoor" program;
[Panda]Trj/Lucifer,Lucifer.512;
[Computer Associates]Win32/LuciferX!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Lucifer:

An up-to-date copy of ExterminateIt should detect and prevent infection from Lucifer.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Lucifer manually.

To completely manually remove Lucifer malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Lucifer.

  1. Use Task Manager to terminate the Lucifer process.
  2. Delete the original Lucifer file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Lucifer from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Lucifer!


Also Be Aware of the Following Threats:
Vxidl.ADU Trojan Removal instruction

0 comments

Rewas Trojan

Rewas malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Rewas:

An up-to-date copy of ExterminateIt should detect and prevent infection from Rewas.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Rewas manually.

To completely manually remove Rewas malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Rewas.

  1. Use Task Manager to terminate the Rewas process.
  2. Delete the original Rewas file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Rewas from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Rewas!


Also Be Aware of the Following Threats:
ro2cn Adware Symptoms
Remove RegClean Ransomware
Webber.J!downloader Trojan Cleaner

0 comments

Pigeon.AHW Trojan

Pigeon.AHW malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.AHW:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.AHW.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.AHW manually.

To completely manually remove Pigeon.AHW malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.AHW.

  1. Use Task Manager to terminate the Pigeon.AHW process.
  2. Delete the original Pigeon.AHW file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.AHW from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.AHW!


Also Be Aware of the Following Threats:
Super Trojan Cleaner
Removing PRUEBA.VOM Trojan
Remove Win32.Mitglieder Trojan
SillyDl.DAG Trojan Information

0 comments

Wefoey Trojan

Wefoey malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Wefoey:

An up-to-date copy of ExterminateIt should detect and prevent infection from Wefoey.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Wefoey manually.

To completely manually remove Wefoey malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Wefoey.

  1. Use Task Manager to terminate the Wefoey process.
  2. Delete the original Wefoey file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Wefoey from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Wefoey!


Also Be Aware of the Following Threats:
Bancos.GYM Trojan Removal

0 comments

Pigeon.AVOT Trojan

Pigeon.AVOT malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.AVOT:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.AVOT.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.AVOT manually.

To completely manually remove Pigeon.AVOT malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.AVOT.

  1. Use Task Manager to terminate the Pigeon.AVOT process.
  2. Delete the original Pigeon.AVOT file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.AVOT from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.AVOT!


Also Be Aware of the Following Threats:
WordMacro.Kerrang Trojan Cleaner
NetPal BHO Removal instruction
Removing Inteter.ab Trojan
PWS.Pricol Trojan Removal instruction
Pigeon.AVVB Trojan Information

0 comments

Nadol Trojan

Nadol malware description and removal detail
Categories:Trojan
Also known as:

[Panda]Trj/Nadol;
[Computer Associates]Nadol!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Nadol:

An up-to-date copy of ExterminateIt should detect and prevent infection from Nadol.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Nadol manually.

To completely manually remove Nadol malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Nadol.

  1. Use Task Manager to terminate the Nadol process.
  2. Delete the original Nadol file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Nadol from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Nadol!


Also Be Aware of the Following Threats:
Remove Pigeon.EXV Trojan

0 comments

Blog Archive