MSN.VB Trojan

MSN.VB malware description and removal detail
Categories:Trojan,DoS
Also known as:

[Panda]Flooder Program,Trojan Horse,Flooder/Floed.A,Flooder/Psycho.A;
[Computer Associates]Win32/Flooder.MSN.VB.X!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing MSN.VB:

An up-to-date copy of ExterminateIt should detect and prevent infection from MSN.VB.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove MSN.VB manually.

To completely manually remove MSN.VB malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with MSN.VB.

  1. Use Task Manager to terminate the MSN.VB process.
  2. Delete the original MSN.VB file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes MSN.VB from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of MSN.VB!


Also Be Aware of the Following Threats:
IRCFlood.RTEM Trojan Removal instruction
Pigeon.AVVA Trojan Cleaner
Bancos.FYS Trojan Cleaner
Pigeon.AVTY Trojan Cleaner
Removing Lorkgo Trojan

0 comments

CWS.DNSRelay Hijacker

CWS.DNSRelay malware description and removal detail
Categories:Hijacker
Visible Symptoms:
Files in system folders:
[%PROGRAM_FILES_COMMON%]\web folders\mswsc10.dll
[%SYSTEM%]\astctl32.ocx
[%SYSTEM%]\dnsrelay.dll
[%WINDOWS%]\system\astctl32.ocx
[%WINDOWS%]\system\dnsrelay.dll
[%PROGRAM_FILES_COMMON%]\web folders\mswsc10.dll
[%SYSTEM%]\astctl32.ocx
[%SYSTEM%]\dnsrelay.dll
[%WINDOWS%]\system\astctl32.ocx
[%WINDOWS%]\system\dnsrelay.dll

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting CWS.DNSRelay:

Files:
[%PROGRAM_FILES_COMMON%]\web folders\mswsc10.dll
[%SYSTEM%]\astctl32.ocx
[%SYSTEM%]\dnsrelay.dll
[%WINDOWS%]\system\astctl32.ocx
[%WINDOWS%]\system\dnsrelay.dll
[%PROGRAM_FILES_COMMON%]\web folders\mswsc10.dll
[%SYSTEM%]\astctl32.ocx
[%SYSTEM%]\dnsrelay.dll
[%WINDOWS%]\system\astctl32.ocx
[%WINDOWS%]\system\dnsrelay.dll

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing CWS.DNSRelay:

An up-to-date copy of ExterminateIt should detect and prevent infection from CWS.DNSRelay.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove CWS.DNSRelay manually.

To completely manually remove CWS.DNSRelay malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with CWS.DNSRelay.

  1. Use Task Manager to terminate the CWS.DNSRelay process.
  2. Delete the original CWS.DNSRelay file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes CWS.DNSRelay from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of CWS.DNSRelay!


Also Be Aware of the Following Threats:
Removing Dowque.AAD Trojan
Removing SpyBot.Variant Worm
Removing WhenU.Search Toolbar

0 comments

layer.ads.de Tracking Cookie

layer.ads.de malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing layer.ads.de:

An up-to-date copy of ExterminateIt should detect and prevent infection from layer.ads.de.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove layer.ads.de manually.

To completely manually remove layer.ads.de malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with layer.ads.de.

  1. Use Task Manager to terminate the layer.ads.de process.
  2. Delete the original layer.ads.de file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes layer.ads.de from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of layer.ads.de!


Also Be Aware of the Following Threats:
Remove Monkey Trojan

0 comments

Kemdorm Backdoor

Kemdorm malware description and removal detail
Categories:Backdoor
Also known as:

[Kaspersky]Trojan.Win32.Delf.acy;
[Other]Win32/Kemdorm.A

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Kemdorm:

An up-to-date copy of ExterminateIt should detect and prevent infection from Kemdorm.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Kemdorm manually.

To completely manually remove Kemdorm malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Kemdorm.

  1. Use Task Manager to terminate the Kemdorm process.
  2. Delete the original Kemdorm file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Kemdorm from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Kemdorm!


Also Be Aware of the Following Threats:
DNSKiller DoS Removal
Remove Vxidl.AGT Trojan
Removing Monker Adware
Sexprovider.com Toolbar Cleaner
Meldsimp Trojan Symptoms

0 comments

Pigeon.EIZ Trojan

Pigeon.EIZ malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.EIZ:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.EIZ.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.EIZ manually.

To completely manually remove Pigeon.EIZ malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.EIZ.

  1. Use Task Manager to terminate the Pigeon.EIZ process.
  2. Delete the original Pigeon.EIZ file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.EIZ from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.EIZ!


Also Be Aware of the Following Threats:
Remove LookQuick Toolbar
Vxidl.BBU Trojan Removal
Bancos.ZZX Trojan Removal
TrojanSpy.Win32.KeyHunter Trojan Symptoms

0 comments

Atnau.client Trojan

Atnau.client malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Atnau.client:

An up-to-date copy of ExterminateIt should detect and prevent infection from Atnau.client.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Atnau.client manually.

To completely manually remove Atnau.client malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Atnau.client.

  1. Use Task Manager to terminate the Atnau.client process.
  2. Delete the original Atnau.client file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Atnau.client from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Atnau.client!


Also Be Aware of the Following Threats:
DOSKill Trojan Information
Removing slotchbar Hijacker
Remove Cmd.beta Trojan
Remove Klap Trojan

0 comments

Wazam Adware

Wazam malware description and removal detail
Categories:Adware,Hijacker

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Wazam:

Folders:
[%PROGRAM_FILES%]\cursorarts\iconforge\wazam.com toolbar

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{b5e60a66-0c51-4894-8df8-cbdf4e478d58}
HKEY_LOCAL_MACHINE\software\sbb

Removing Wazam:

An up-to-date copy of ExterminateIt should detect and prevent infection from Wazam.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Wazam manually.

To completely manually remove Wazam malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Wazam.

  1. Use Task Manager to terminate the Wazam process.
  2. Delete the original Wazam file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Wazam from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Wazam!


Also Be Aware of the Following Threats:
Removing Vxidl.AJX Trojan

0 comments

Win32.Flooder.MailSpam.NoName.virus DoS

Win32.Flooder.MailSpam.NoName.virus malware description and removal detail
Categories:DoS
Also known as:

[Kaspersky]Flooder.MailSpam.Noname.c

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Win32.Flooder.MailSpam.NoName.virus:

An up-to-date copy of ExterminateIt should detect and prevent infection from Win32.Flooder.MailSpam.NoName.virus.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Win32.Flooder.MailSpam.NoName.virus manually.

To completely manually remove Win32.Flooder.MailSpam.NoName.virus malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Win32.Flooder.MailSpam.NoName.virus.

  1. Use Task Manager to terminate the Win32.Flooder.MailSpam.NoName.virus process.
  2. Delete the original Win32.Flooder.MailSpam.NoName.virus file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Win32.Flooder.MailSpam.NoName.virus from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Win32.Flooder.MailSpam.NoName.virus!


Also Be Aware of the Following Threats:
Sasser.B Worm Information
Zosu Trojan Cleaner
Fluxay.3!Setup Backdoor Removal instruction

0 comments

Furier Trojan

Furier malware description and removal detail
Categories:Trojan,Hacker Tool
Also known as:

[Kaspersky]Trojan.PSW.Furitron.b,Trojan.PSW.Furitron.c,Trojan.PSW.Furitron.d,Trojan.PSW.Furitron.a;
[Panda]Trojan Horse;
[Computer Associates]Win32/Furitron.B!PWS!Trojan,Win32/Furitron.D!PWS!Trojan,Win32/Netset!PWS!Trojan,Win32/Furitron.A!PWS!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Furier:

An up-to-date copy of ExterminateIt should detect and prevent infection from Furier.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Furier manually.

To completely manually remove Furier malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Furier.

  1. Use Task Manager to terminate the Furier process.
  2. Delete the original Furier file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Furier from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Furier!


Also Be Aware of the Following Threats:
Removing GoHip Trojan
Haxial.RemoteAdminTool RAT Symptoms
Word Trojan Removal
TrojanDownloader.906e Downloader Removal
Man Trojan Removal instruction

0 comments

Ugogo88 Downloader

Ugogo88 malware description and removal detail
Categories:Downloader
Also known as:

[Kaspersky]Trojan-Downloader.Win32.Small.csr;
[Other]Win32/SillyDl.AVA

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\adoax.axd
[%WINDOWS%]\stdie.dll
[%SYSTEM%]\adoax.axd
[%WINDOWS%]\stdie.dll

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Ugogo88:

Files:
[%SYSTEM%]\adoax.axd
[%WINDOWS%]\stdie.dll
[%SYSTEM%]\adoax.axd
[%WINDOWS%]\stdie.dll

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{a3803141-3cf5-4d66-b7ea-8d2674fe152c}
HKEY_CLASSES_ROOT\typelib\{9fd6c9e2-54f8-48a9-bef6-964f9c221ae4}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{a3803141-3cf5-4d66-b7ea-8d2674fe152c}

Removing Ugogo88:

An up-to-date copy of ExterminateIt should detect and prevent infection from Ugogo88.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Ugogo88 manually.

To completely manually remove Ugogo88 malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Ugogo88.

  1. Use Task Manager to terminate the Ugogo88 process.
  2. Delete the original Ugogo88 file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Ugogo88 from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Ugogo88!


Also Be Aware of the Following Threats:
Sathidl Downloader Information
Armagedon Trojan Removal instruction
koocwolla Trojan Information
Remove Guangwaigirl.52b Backdoor
Unofficial.Specification.of.the.Icq.Protocol Trojan Symptoms

0 comments

Win.Spy.Pro Spyware

Win.Spy.Pro malware description and removal detail
Categories:Spyware
Visible Symptoms:
Files in system folders:
[%PROFILE_TEMP%]\Compress0\ziplog.txt
[%PROFILE_TEMP%]\Compress1\ziplog.txt
[%PROFILE_TEMP%]\Compress2\ziplog.txt
[%PROFILE_TEMP%]\Compress3\ziplog.txt
[%PROFILE_TEMP%]\Compress4\ziplog.txt
[%PROFILE_TEMP%]\Compress5\ziplog.txt
[%WINDOWS%]\Files.ico
[%WINDOWS%]\ftplog.txt
[%WINDOWS%]\jpg.ico
[%WINDOWS%]\MCLDR.dll
[%WINDOWS%]\zclient.dll
[%WINDOWS%]\ziplog.txt
[%PROFILE_TEMP%]\Compress0\ziplog.txt
[%PROFILE_TEMP%]\Compress1\ziplog.txt
[%PROFILE_TEMP%]\Compress2\ziplog.txt
[%PROFILE_TEMP%]\Compress3\ziplog.txt
[%PROFILE_TEMP%]\Compress4\ziplog.txt
[%PROFILE_TEMP%]\Compress5\ziplog.txt
[%WINDOWS%]\Files.ico
[%WINDOWS%]\ftplog.txt
[%WINDOWS%]\jpg.ico
[%WINDOWS%]\MCLDR.dll
[%WINDOWS%]\zclient.dll
[%WINDOWS%]\ziplog.txt

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Win.Spy.Pro:

Files:
[%PROFILE_TEMP%]\Compress0\ziplog.txt
[%PROFILE_TEMP%]\Compress1\ziplog.txt
[%PROFILE_TEMP%]\Compress2\ziplog.txt
[%PROFILE_TEMP%]\Compress3\ziplog.txt
[%PROFILE_TEMP%]\Compress4\ziplog.txt
[%PROFILE_TEMP%]\Compress5\ziplog.txt
[%WINDOWS%]\Files.ico
[%WINDOWS%]\ftplog.txt
[%WINDOWS%]\jpg.ico
[%WINDOWS%]\MCLDR.dll
[%WINDOWS%]\zclient.dll
[%WINDOWS%]\ziplog.txt
[%PROFILE_TEMP%]\Compress0\ziplog.txt
[%PROFILE_TEMP%]\Compress1\ziplog.txt
[%PROFILE_TEMP%]\Compress2\ziplog.txt
[%PROFILE_TEMP%]\Compress3\ziplog.txt
[%PROFILE_TEMP%]\Compress4\ziplog.txt
[%PROFILE_TEMP%]\Compress5\ziplog.txt
[%WINDOWS%]\Files.ico
[%WINDOWS%]\ftplog.txt
[%WINDOWS%]\jpg.ico
[%WINDOWS%]\MCLDR.dll
[%WINDOWS%]\zclient.dll
[%WINDOWS%]\ziplog.txt

Folders:
[%WINDOWS%]\dll
[%PROGRAM_FILES%]\Accessories\Temp23\Archive
[%PROGRAM_FILES%]\Accessories\Temp23\WC
[%PROGRAM_FILES%]\Accessories\Temp251
[%SYSTEM%]\comroot
[%SYSTEM%]\DCOMFirewall
[%WINDOWS%]\Temp32

Registry Keys:
HKEY_CLASSES_ROOT\skinmenu.smenu
HKEY_LOCAL_MACHINE\software\cams
HKEY_LOCAL_MACHINE\software\xpdriver

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Win.Spy.Pro:

An up-to-date copy of ExterminateIt should detect and prevent infection from Win.Spy.Pro.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Win.Spy.Pro manually.

To completely manually remove Win.Spy.Pro malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Win.Spy.Pro.

  1. Use Task Manager to terminate the Win.Spy.Pro process.
  2. Delete the original Win.Spy.Pro file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Win.Spy.Pro from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Win.Spy.Pro!


Also Be Aware of the Following Threats:
Remove AxNTRegSecurity Hostile Code
BAT.Delfiles Trojan Removal instruction
Remove CashBar Adware

0 comments

Bancos.GPS Trojan

Bancos.GPS malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bancos.GPS:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bancos.GPS.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bancos.GPS manually.

To completely manually remove Bancos.GPS malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.GPS.

  1. Use Task Manager to terminate the Bancos.GPS process.
  2. Delete the original Bancos.GPS file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bancos.GPS from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bancos.GPS!


Also Be Aware of the Following Threats:
Rotate Trojan Symptoms
Dluca.by Trojan Cleaner
Remove bounceme.net Tracking Cookie

0 comments

Vxidl.BBD Trojan

Vxidl.BBD malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Vxidl.BBD:

An up-to-date copy of ExterminateIt should detect and prevent infection from Vxidl.BBD.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Vxidl.BBD manually.

To completely manually remove Vxidl.BBD malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Vxidl.BBD.

  1. Use Task Manager to terminate the Vxidl.BBD process.
  2. Delete the original Vxidl.BBD file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Vxidl.BBD from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Vxidl.BBD!


Also Be Aware of the Following Threats:
TrojanDownloader.VBS.Codin Trojan Symptoms

0 comments

HLLP Trojan

HLLP malware description and removal detail
Categories:Trojan,Backdoor,Downloader,Hacker Tool,DoS
Also known as:

[Kaspersky]HLLP.Wirus.8841,HLLP.Wirus.9130,HLLP.3072.b,HLLP.Nutmeg.3327,HLLP.Banshee.4349,HLLP.Nutmeg.3310,Win32.HLLP.VB.a,HLLP.Nazi.4415,Win32.HLLP.Xinfect.b,Trojan.Smurf.a,HLLP.10000,HLLO.TPPE.13744,HLLP.4631,HLLP.5062,HLLP.BJVC.4725,HLLP.Brian.4709.a,HLLP.Brian.4709.b,HLLP.Carol.20500,HLLP.Cheska.4630,HLLP.Lugad.4805,HLLP.Siri.4996,HLLP.Sui.5674,HLLP.Brian.4933,HLLP.Brian.4949.a,HLLP.Brian.4949.b,HLLP.Includer,HLLP.MF.6014,HLLP.Myxa.7643,HLLP.PMP,HLLP.Zyx.b,HLLW.BigBug.8820,PolyEngineSGen.EO,HLLO.3505;
[Eset]Hll.3072.A virus,Hll.3072.B virus;
[McAfee]HLLT,HLLT.3072,W32/HLLP,HLLP.Nazi.4415,HLLP.9840;
[F-Prot]HLLP.8841,HLLP.9130,HLLP.3072.B,W32/HLLP.Xinfect.B,HLLP.9840,HLLP.7643.A;
[Panda]HLL.Gen,HLLO.Gen,Nutmeg.3310,W95/VBVirus,Naziphobia,W95/HLLP.Xinfect.B,Trj/QName,Univ.AP.M,Chesca.4630,Jojov.4709,Sui Generis.5674,Univ.ES,Bigbug.8820,Univ.PS;
[Computer Associates]HLLP.9130,HLLP.Wirus.8841,HLLP.Wirus.9130,HLLP.3072.B,HLLP.4348,Nutmeg.3300,Win32.VB.14336,Win95/HLLP.14336,Win32.HLLP.Xinf.18432,Win32/HLLP.Xinfect.B0,HLLP.9840,HLLP.9504,HllP.3547,HLLP.4080,HLLP.4631,Hllp.4709,HLLP.5062,HLLP.BJVC.4725,HLLP.Carol.4869,HLLP.Cheska.4630,HLLP.Siri.4996,HLLP.Sui.5674,Lugad.4805,HLLP.4933,HLLP.4944,HLLP.4949.B,HLLP.6104,HLLP.13920,HLLP.13744

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing HLLP:

An up-to-date copy of ExterminateIt should detect and prevent infection from HLLP.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove HLLP manually.

To completely manually remove HLLP malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with HLLP.

  1. Use Task Manager to terminate the HLLP process.
  2. Delete the original HLLP file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes HLLP from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of HLLP!


Also Be Aware of the Following Threats:
Vxidl.AZW Trojan Symptoms
Remove Bancos.HYB Trojan

0 comments

ContentSaver BHO

ContentSaver malware description and removal detail
Categories:BHO

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing ContentSaver:

An up-to-date copy of ExterminateIt should detect and prevent infection from ContentSaver.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove ContentSaver manually.

To completely manually remove ContentSaver malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with ContentSaver.

  1. Use Task Manager to terminate the ContentSaver process.
  2. Delete the original ContentSaver file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes ContentSaver from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of ContentSaver!


Also Be Aware of the Following Threats:
Oggo Trojan Removal instruction
Clear.Search Hijacker Cleaner
SillyDl.CHW Trojan Symptoms
Toledorz Backdoor Removal instruction

0 comments

IRC.Reklam DoS

IRC.Reklam malware description and removal detail
Categories:DoS
Also known as:

[Panda]Flooder Program,Univ.AP.J

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing IRC.Reklam:

An up-to-date copy of ExterminateIt should detect and prevent infection from IRC.Reklam.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove IRC.Reklam manually.

To completely manually remove IRC.Reklam malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with IRC.Reklam.

  1. Use Task Manager to terminate the IRC.Reklam process.
  2. Delete the original IRC.Reklam file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes IRC.Reklam from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of IRC.Reklam!


Also Be Aware of the Following Threats:
SpySherrif Trojan Removal instruction
Mastercom RAT Cleaner
NIL RAT Removal instruction
Icon.Changer Trojan Information
Loosky Trojan Removal instruction

0 comments

Vxidl.ACO Trojan

Vxidl.ACO malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Vxidl.ACO:

An up-to-date copy of ExterminateIt should detect and prevent infection from Vxidl.ACO.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Vxidl.ACO manually.

To completely manually remove Vxidl.ACO malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Vxidl.ACO.

  1. Use Task Manager to terminate the Vxidl.ACO process.
  2. Delete the original Vxidl.ACO file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Vxidl.ACO from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Vxidl.ACO!


Also Be Aware of the Following Threats:
Removing Natas Trojan
ActMon Spyware Information

0 comments

TrojanDropper.Win32.Small.br Trojan

TrojanDropper.Win32.Small.br malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]AP.NightCity;
[Panda]Night_City,Trojan Horse;
[Computer Associates]Night_City,Win32.Fresh.20.A,Win32/Fresh.20.A!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing TrojanDropper.Win32.Small.br:

An up-to-date copy of ExterminateIt should detect and prevent infection from TrojanDropper.Win32.Small.br.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove TrojanDropper.Win32.Small.br manually.

To completely manually remove TrojanDropper.Win32.Small.br malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with TrojanDropper.Win32.Small.br.

  1. Use Task Manager to terminate the TrojanDropper.Win32.Small.br process.
  2. Delete the original TrojanDropper.Win32.Small.br file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes TrojanDropper.Win32.Small.br from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of TrojanDropper.Win32.Small.br!


Also Be Aware of the Following Threats:
Pigeon.BBB Trojan Information
Globe Trojan Symptoms

0 comments

Mtexer Backdoor

Mtexer malware description and removal detail
Categories:Backdoor,RAT

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Mtexer:

An up-to-date copy of ExterminateIt should detect and prevent infection from Mtexer.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Mtexer manually.

To completely manually remove Mtexer malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Mtexer.

  1. Use Task Manager to terminate the Mtexer process.
  2. Delete the original Mtexer file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Mtexer from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Mtexer!


Also Be Aware of the Following Threats:
Remove Perl.Hadic Trojan
JS.MS07 Trojan Cleaner
Dowque.AFF Trojan Removal
DNet Trojan Cleaner
AdultP2P Adware Information

0 comments

Bancos.HGI Trojan

Bancos.HGI malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bancos.HGI:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bancos.HGI.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bancos.HGI manually.

To completely manually remove Bancos.HGI malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.HGI.

  1. Use Task Manager to terminate the Bancos.HGI process.
  2. Delete the original Bancos.HGI file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bancos.HGI from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bancos.HGI!


Also Be Aware of the Following Threats:
Removing CNNIC.Update Hijacker
Zlob.Fam.Online Video Add-on Trojan Removal
Pigeon.EPH Trojan Cleaner
Phishbank.APR Trojan Removal
Barbie Trojan Symptoms

0 comments

CoolWebSearch.SearchX Hijacker

CoolWebSearch.SearchX malware description and removal detail
Categories:Hijacker,Toolbar

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing CoolWebSearch.SearchX:

An up-to-date copy of ExterminateIt should detect and prevent infection from CoolWebSearch.SearchX.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove CoolWebSearch.SearchX manually.

To completely manually remove CoolWebSearch.SearchX malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with CoolWebSearch.SearchX.

  1. Use Task Manager to terminate the CoolWebSearch.SearchX process.
  2. Delete the original CoolWebSearch.SearchX file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes CoolWebSearch.SearchX from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of CoolWebSearch.SearchX!


Also Be Aware of the Following Threats:
Pigeon.EAD Trojan Symptoms

0 comments

Beyond.telecom Adware

Beyond.telecom malware description and removal detail
Categories:Adware

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Beyond.telecom:

Folders:
[%PROGRAM_FILES%]\mpb\dialers

Registry Keys:
HKEY_CURRENT_USER\software\mpb\dialers
HKEY_CURRENT_USER\software\sym\dialers
HKEY_LOCAL_MACHINE\software\mpb\dialers
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\hotsexy_au
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\virgins_au

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Beyond.telecom:

An up-to-date copy of ExterminateIt should detect and prevent infection from Beyond.telecom.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Beyond.telecom manually.

To completely manually remove Beyond.telecom malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Beyond.telecom.

  1. Use Task Manager to terminate the Beyond.telecom process.
  2. Delete the original Beyond.telecom file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Beyond.telecom from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Beyond.telecom!


Also Be Aware of the Following Threats:
Pigeon.EKU Trojan Removal instruction
FDoS.Code DoS Symptoms
VCL.Restart Trojan Removal
Remove LV Trojan

0 comments

w3counter.com Tracking Cookie

w3counter.com malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing w3counter.com:

An up-to-date copy of ExterminateIt should detect and prevent infection from w3counter.com.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove w3counter.com manually.

To completely manually remove w3counter.com malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with w3counter.com.

  1. Use Task Manager to terminate the w3counter.com process.
  2. Delete the original w3counter.com file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes w3counter.com from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of w3counter.com!


Also Be Aware of the Following Threats:
Banker.CLI Trojan Removal
Remove Vxidl.APJ Trojan

0 comments

Zango Adware

Zango malware description and removal detail
Categories:Adware,Hijacker,Toolbar
Also known as:

[Kaspersky]Adware.Win32.180Solutions.ax;
[McAfee]Adware-ZangoSA;
[Other]Adware.ZangoSearch,Zango.SearchAssisstant

Visible Symptoms:
Files in system folders:
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.2.0\ZbCoreSrv.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.2.0\ZbHostIE.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.2.0\ZbSrv.exe
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.2.0\ZbToolbar.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.3.0\ZbCoreSrv.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.3.0\ZbHostIE.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.3.0\ZbSrv.exe
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.3.0\ZbToolbar.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.3.0\ZbWallpaper.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.2.0\ZbCoreSrv.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.2.0\ZbHostIE.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.2.0\ZbSrv.exe
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.2.0\ZbToolbar.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.3.0\ZbCoreSrv.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.3.0\ZbHostIE.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.3.0\ZbSrv.exe
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.3.0\ZbToolbar.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.3.0\ZbWallpaper.dll

In order to ensure that the Zango is launched automatically each time the system is booted, the Zango adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.2.0\ZbSrv.exe
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.3.0\ZbSrv.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Zango:

Files:
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.2.0\ZbCoreSrv.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.2.0\ZbHostIE.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.2.0\ZbSrv.exe
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.2.0\ZbToolbar.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.3.0\ZbCoreSrv.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.3.0\ZbHostIE.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.3.0\ZbSrv.exe
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.3.0\ZbToolbar.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.3.0\ZbWallpaper.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.2.0\ZbCoreSrv.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.2.0\ZbHostIE.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.2.0\ZbSrv.exe
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.2.0\ZbToolbar.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.3.0\ZbCoreSrv.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.3.0\ZbHostIE.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.3.0\ZbSrv.exe
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.3.0\ZbToolbar.dll
[%PROGRAM_FILES%]\ZangoToolbar\Bin\4.8.3.0\ZbWallpaper.dll

Folders:
[%APPDATA%]\ZangoToolbar
[%PROGRAM_FILES%]\ZangoToolbar

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{0ebacaf2-e0f9-47a9-98cf-0ecce30b654c}
HKEY_CLASSES_ROOT\clsid\{37e5d130-e81c-43e5-a2ad-9c155467f334}
HKEY_CLASSES_ROOT\CLSID\{5CBE2611-C31B-401F-89BC-4CBB25E853D7}
HKEY_CLASSES_ROOT\clsid\{7585af6a-6d68-4896-a1a1-f23aa8fcf9f1}
HKEY_CLASSES_ROOT\clsid\{8109fd3d-d891-4f80-8339-50a4913ace6f}
HKEY_CLASSES_ROOT\clsid\{97ce9a1f-672e-4cf4-b483-9de6bcb4cb1e}
HKEY_CLASSES_ROOT\clsid\{ac17d2fb-6c7a-47b7-bb3d-ec879bc3c911}
HKEY_CLASSES_ROOT\clsid\{cf1a5756-f372-463e-bc20-1d3d58f4b9af}
HKEY_CLASSES_ROOT\clsid\{d318484f-1800-441a-8661-a1dea5f8800e}
HKEY_CLASSES_ROOT\interface\{06784c15-b640-40f8-aee8-3c1a3c7a899c}
HKEY_CLASSES_ROOT\interface\{195ef37c-0ff4-4aef-b51b-47d326f01978}
HKEY_CLASSES_ROOT\interface\{1d5df418-73ea-4b20-b0d1-5f9c6c949cb0}
HKEY_CLASSES_ROOT\interface\{30022029-2c17-4a99-87d2-a382c674a19d}
HKEY_CLASSES_ROOT\interface\{3a6691ea-c844-46f2-9237-1386a85ce119}
HKEY_CLASSES_ROOT\interface\{3d2e7662-85fb-4cc1-875c-a624b1aa5d96}
HKEY_CLASSES_ROOT\interface\{610e0e95-8f2f-4b71-966e-f91701d4dc2c}
HKEY_CLASSES_ROOT\interface\{67a89831-6bc7-4cc0-a2c3-560f9a581e64}
HKEY_CLASSES_ROOT\interface\{72feeb09-bb27-46d3-a06d-930d4d544227}
HKEY_CLASSES_ROOT\interface\{736918fe-2349-4230-ba9a-1f23649e32ad}
HKEY_CLASSES_ROOT\interface\{85e06077-c824-43d0-a8dc-5efb17bc348a}
HKEY_CLASSES_ROOT\interface\{89d36231-6bd9-4e20-bba0-fd28c3a83c40}
HKEY_CLASSES_ROOT\interface\{972bc913-312c-44b7-aa91-4ae3ec2e264b}
HKEY_CLASSES_ROOT\interface\{a0ba9f0f-bcef-49cf-8a8e-d87e19e066f3}
HKEY_CLASSES_ROOT\interface\{a53762b6-30f7-469f-ba92-13d63cf09a93}
HKEY_CLASSES_ROOT\interface\{b24ff4f6-d327-4208-8840-68ccef7d6125}
HKEY_CLASSES_ROOT\interface\{bd31df26-7178-41f4-88dd-f16b82d827ca}
HKEY_CLASSES_ROOT\interface\{c4db76d5-b430-4652-8599-7cd2c8fe6cc6}
HKEY_CLASSES_ROOT\interface\{e4662b0a-da6b-4408-a73b-5a2bbb2b0cc8}
HKEY_CLASSES_ROOT\interface\{e775c662-85d0-438e-82f0-6bce20a8e154}
HKEY_CLASSES_ROOT\interface\{e977de7c-34ea-4876-b333-207c4504589e}
HKEY_CLASSES_ROOT\typelib\{049b9813-c417-4a47-a893-604fad16b251}
HKEY_CLASSES_ROOT\typelib\{4dbe6b29-59fc-400c-915b-fb57a5cd533e}
HKEY_CLASSES_ROOT\typelib\{5937cd7f-1c0b-41e1-9075-60ebdf3c7d34}
HKEY_CLASSES_ROOT\typelib\{7586a473-7a57-4641-8155-e87135d0e2f4}
HKEY_CLASSES_ROOT\typelib\{dc92ee2e-df2d-4a80-a48b-17377c81cfc2}
HKEY_CLASSES_ROOT\zangohook.sabho
HKEY_CLASSES_ROOT\zangohook.sabho.1
HKEY_CLASSES_ROOT\zangotoolbar.zbcommband
HKEY_CLASSES_ROOT\zangotoolbar.zctoolband
HKEY_CLASSES_ROOT\zangotoolbar.zctoolband.1
HKEY_CLASSES_ROOT\zbcoresrv.lfgax
HKEY_CLASSES_ROOT\zbcoresrv.zbcoreservices
HKEY_CLASSES_ROOT\zbhostie.bho
HKEY_CLASSES_ROOT\zbsrv.zbcoreservices
HKEY_CLASSES_ROOT\zbtoolbar.zbhtmlmenuui
HKEY_CLASSES_ROOT\zbtoolbar.zbtoolbarctl
HKEY_CLASSES_ROOT\zbtools.hbmain
HKEY_CURRENT_USER\software\zangotoolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\explorer bars\{0ebacaf2-e0f9-47a9-98cf-0ecce30b654c}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5CBE2611-C31B-401F-89BC-4CBB25E853D7}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\zango toolbar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\zangotoolbarwebtools
HKEY_LOCAL_MACHINE\software\zango programs
HKEY_LOCAL_MACHINE\software\zangotoolbar
HKEY_CLASSES_ROOT\clsid\{5cbe2611-c31b-401f-89bc-4cbb25e853d7}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{5cbe2611-c31b-401f-89bc-4cbb25e853d7}

Registry Values:
HKEY_CLASSES_ROOT\interface\{06784c15-b640-40f8-aee8-3c1a3c7a899c}\typelib
HKEY_CLASSES_ROOT\interface\{195ef37c-0ff4-4aef-b51b-47d326f01978}\typelib
HKEY_CLASSES_ROOT\interface\{1d5df418-73ea-4b20-b0d1-5f9c6c949cb0}\typelib
HKEY_CURRENT_USER\software\microsoft\internet explorer\explorer bars\{0ebacaf2-e0f9-47a9-98cf-0ecce30b654c}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\zangotoolbarwebtools
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\zangotoolbarwebtools
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\zangotoolbarwebtools
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\zangotoolbarwebtools
HKEY_CURRENT_USER\software\microsoft\internet explorer\explorer bars\{0ebacaf2-e0f9-47a9-98cf-0ecce30b654c}, barsize=23,01,00,00,00,00,00
HKEY_LOCAL_MACHINE\software\fdlgyaph
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar

Removing Zango:

An up-to-date copy of ExterminateIt should detect and prevent infection from Zango.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Zango manually.

To completely manually remove Zango malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Zango.

  1. Use Task Manager to terminate the Zango process.
  2. Delete the original Zango file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Zango from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Zango!


Also Be Aware of the Following Threats:
Phishbank.AUG Trojan Removal instruction
TFD DoS Symptoms

0 comments

Tolbuhin Trojan

Tolbuhin malware description and removal detail
Categories:Trojan,Backdoor,Downloader,DoS
Also known as:

[Kaspersky]Cracky.596,Sk.1004,Sk.992,Sk.1147;
[Panda]Milena_K.596,Tolbuhin.1004,Tolbuhin.992,Tolbuhin.1147;
[Computer Associates]Tolbuhin

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Tolbuhin:

An up-to-date copy of ExterminateIt should detect and prevent infection from Tolbuhin.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Tolbuhin manually.

To completely manually remove Tolbuhin malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Tolbuhin.

  1. Use Task Manager to terminate the Tolbuhin process.
  2. Delete the original Tolbuhin file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Tolbuhin from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Tolbuhin!


Also Be Aware of the Following Threats:
Bancos.HUD Trojan Cleaner
IRCServ DoS Symptoms
StartPage.bx Hijacker Symptoms

0 comments

microstatic.pl Tracking Cookie

microstatic.pl malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing microstatic.pl:

An up-to-date copy of ExterminateIt should detect and prevent infection from microstatic.pl.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove microstatic.pl manually.

To completely manually remove microstatic.pl malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with microstatic.pl.

  1. Use Task Manager to terminate the microstatic.pl process.
  2. Delete the original microstatic.pl file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes microstatic.pl from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of microstatic.pl!


Also Be Aware of the Following Threats:
Remove Adtech Adware
Pigeon.AVMH Trojan Information
Trojan.Downloader.Win32.QQHelper.gh Trojan Cleaner
Remove TrojanDownloader.Win32.GoldenPalace Trojan
mybloglog.com Tracking Cookie Cleaner

0 comments

Sunafad Trojan

Sunafad malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Sunafad:

An up-to-date copy of ExterminateIt should detect and prevent infection from Sunafad.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Sunafad manually.

To completely manually remove Sunafad malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Sunafad.

  1. Use Task Manager to terminate the Sunafad process.
  2. Delete the original Sunafad file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Sunafad from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Sunafad!


Also Be Aware of the Following Threats:
Vxidl.AHW Trojan Symptoms

0 comments

Internet.Explorer Adware

Internet.Explorer malware description and removal detail
Categories:Adware

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Internet.Explorer:

An up-to-date copy of ExterminateIt should detect and prevent infection from Internet.Explorer.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Internet.Explorer manually.

To completely manually remove Internet.Explorer malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Internet.Explorer.

  1. Use Task Manager to terminate the Internet.Explorer process.
  2. Delete the original Internet.Explorer file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Internet.Explorer from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Internet.Explorer!


Also Be Aware of the Following Threats:
Removing Nohux Trojan

0 comments

DiskFill Trojan

DiskFill malware description and removal detail
Categories:Trojan,Hacker Tool,DoS
Also known as:

[Panda]Trojan Horse,Trojan Horse.LC;
[Computer Associates]Win32/DiskFill.20480!Trojan,Win32/Diskfill.A!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing DiskFill:

An up-to-date copy of ExterminateIt should detect and prevent infection from DiskFill.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove DiskFill manually.

To completely manually remove DiskFill malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with DiskFill.

  1. Use Task Manager to terminate the DiskFill process.
  2. Delete the original DiskFill file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes DiskFill from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of DiskFill!


Also Be Aware of the Following Threats:
Doubletrouble Hostile Code Removal instruction
Pigeon.AEP Trojan Cleaner
FDoS.ICQBomb Trojan Cleaner
EasyWWW Trojan Information

0 comments

Helios Trojan

Helios malware description and removal detail
Categories:Trojan,Backdoor,RAT,Hacker Tool
Also known as:

[Kaspersky]Backdoor.Helios.408,Backdoor.Helios.15,Backdoor.Helios.16,Backdoor.Helios.14,Backdoor.Helios.13,Backdoor.Helios.22,Backdoor.Helibot.10,Backdoor.Helios.24,Backdoor.Helios.25,Backdoor.Helios.17,TrojanDropper.Win32.HeliosBinder.10.a,TrojanDropper.Win32.HeliosBinder.10.b,Backdoor.Helios.30;
[McAfee]BackDoor-ABB,SennaSpy2001;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program,Backdoor Program.LC,Bck/Helios.14,Bck/Helios.13,Bck/Helios,Bck/Helios.25,Bck/Helios.15,Trj/W32.HeliosBind;
[Computer Associates]Backdoor/Helios.408,Backdoor/Helios.408!Client,Backdoor/Helios.408!Server,Backdoor/Helios.15!Client,Backdoor/Helios.15!Server,Backdoor/Helios.16!Client,Backdoor/Helios.16!Server,Backdoor/Helios.14!Client,Backdoor/Helios.14!Server,Backdoor/Helios.13!Client,Backdoor/Helios.13!Server,Backdoor/Helios.2.2,Backdoor/Helios.22,Backdoor/Helibot.10,Backdoor/Helios.3_0!Plugin,Win32.Helios.30.plugin,Backdoor/Helios.17!Client,Backdoor/Helios.17!Server,Win32.Helios.10.C,Backdoor/Helios.30,Win32.Helios.30

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\system\scanstartup.exe
[%WINDOWS%]\system\scanstartup.exe

In order to ensure that the Helios is launched automatically each time the system is booted, the Helios adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%WINDOWS%]\system\scanstartup.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Helios:

Files:
[%WINDOWS%]\system\scanstartup.exe
[%WINDOWS%]\system\scanstartup.exe

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\new-server
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\scanstartup
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices

Removing Helios:

An up-to-date copy of ExterminateIt should detect and prevent infection from Helios.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Helios manually.

To completely manually remove Helios malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Helios.

  1. Use Task Manager to terminate the Helios process.
  2. Delete the original Helios file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Helios from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Helios!


Also Be Aware of the Following Threats:
Abal Trojan Information
Vxidl.BFD Trojan Symptoms
GuardDown Trojan Information
Boojum Trojan Removal

0 comments

SillyDl.DAD Downloader

SillyDl.DAD malware description and removal detail
Categories:Downloader
Also known as:

[Kaspersky]Trojan-Downloader.Win32.Small.ekz;
[Other]Win32/SillyDl.DAD

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing SillyDl.DAD:

An up-to-date copy of ExterminateIt should detect and prevent infection from SillyDl.DAD.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove SillyDl.DAD manually.

To completely manually remove SillyDl.DAD malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SillyDl.DAD.

  1. Use Task Manager to terminate the SillyDl.DAD process.
  2. Delete the original SillyDl.DAD file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes SillyDl.DAD from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of SillyDl.DAD!


Also Be Aware of the Following Threats:
Bad.Sectors Trojan Information

0 comments

Blog Archive