Lineage.ACO Trojan

Lineage.ACO malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]Trojan-Dropper.Win32.Agent.cpj

Visible Symptoms:
Files in system folders:
[%PROGRAM_FILES%]\xerox\best.bat
[%WINDOWS%]\Debug\62D4F8F5DDAC.dll
[%WINDOWS%]\Debug\62D4F8F5DDAC.exe
[%PROGRAM_FILES%]\xerox\best.bat
[%WINDOWS%]\Debug\62D4F8F5DDAC.dll
[%WINDOWS%]\Debug\62D4F8F5DDAC.exe

In order to ensure that the Lineage.ACO is launched automatically each time the system is booted, the Lineage.ACO adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%WINDOWS%]\Debug\62D4F8F5DDAC.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Lineage.ACO:

Files:
[%PROGRAM_FILES%]\xerox\best.bat
[%WINDOWS%]\Debug\62D4F8F5DDAC.dll
[%WINDOWS%]\Debug\62D4F8F5DDAC.exe
[%PROGRAM_FILES%]\xerox\best.bat
[%WINDOWS%]\Debug\62D4F8F5DDAC.dll
[%WINDOWS%]\Debug\62D4F8F5DDAC.exe

Folders:
[%PROGRAM_FILES%]\Filsec

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{7f7a1edd-e15e-41ed-aa85-06ea55c7e13a}

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks

Removing Lineage.ACO:

An up-to-date copy of ExterminateIt should detect and prevent infection from Lineage.ACO.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Lineage.ACO manually.

To completely manually remove Lineage.ACO malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Lineage.ACO.

  1. Use Task Manager to terminate the Lineage.ACO process.
  2. Delete the original Lineage.ACO file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Lineage.ACO from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Lineage.ACO!


Also Be Aware of the Following Threats:
AdServer.Monster.com Tracking Cookie Cleaner
Alporon Trojan Removal
Pigeon.AYT Trojan Removal instruction
BagleDl.AH Trojan Removal

0 comments

Emma Trojan

Emma malware description and removal detail
Categories:Trojan,Backdoor,Downloader,DoS
Also known as:

[Kaspersky]EMS.411,EMS.417,Virus.DOS.EMS.417;
[McAfee]Univ/f;
[F-Prot]Emma.417;
[Panda]Emma,Univ.A;
[Computer Associates]Emma

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Emma:

An up-to-date copy of ExterminateIt should detect and prevent infection from Emma.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Emma manually.

To completely manually remove Emma malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Emma.

  1. Use Task Manager to terminate the Emma process.
  2. Delete the original Emma file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Emma from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Emma!


Also Be Aware of the Following Threats:
SystemDebug RAT Cleaner
Remove Bot.gen Backdoor

0 comments

Bancos.GOI Trojan

Bancos.GOI malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bancos.GOI:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bancos.GOI.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bancos.GOI manually.

To completely manually remove Bancos.GOI malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.GOI.

  1. Use Task Manager to terminate the Bancos.GOI process.
  2. Delete the original Bancos.GOI file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bancos.GOI from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bancos.GOI!


Also Be Aware of the Following Threats:
Rbot.FRH Trojan Removal instruction

0 comments

Inform Trojan

Inform malware description and removal detail
Categories:Trojan,Hacker Tool
Also known as:

[Panda]Trj/PSW.Inform;
[Computer Associates]Win32/Inform!PWS!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Inform:

An up-to-date copy of ExterminateIt should detect and prevent infection from Inform.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Inform manually.

To completely manually remove Inform malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Inform.

  1. Use Task Manager to terminate the Inform process.
  2. Delete the original Inform file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Inform from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Inform!


Also Be Aware of the Following Threats:
Pigeon.DZJ Trojan Removal
Pigeon.AXR Trojan Symptoms
BootDr33 Trojan Removal instruction
SpySender.88i Backdoor Information

0 comments

Foxyt Trojan

Foxyt malware description and removal detail
Categories:Trojan,Hacker Tool
Visible Symptoms:
Files in system folders:
[%SYSTEM%]\foxdh.exe
[%SYSTEM%]\foxmir.1ls
[%SYSTEM%]\foxmxd.exe
[%SYSTEM%]\locamxd.sls
[%SYSTEM%]\foxdh.exe
[%SYSTEM%]\foxmir.1ls
[%SYSTEM%]\foxmxd.exe
[%SYSTEM%]\locamxd.sls

In order to ensure that the Foxyt is launched automatically each time the system is booted, the Foxyt adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%SYSTEM%]\foxdh.exe
[%SYSTEM%]\foxmxd.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Foxyt:

Files:
[%SYSTEM%]\foxdh.exe
[%SYSTEM%]\foxmir.1ls
[%SYSTEM%]\foxmxd.exe
[%SYSTEM%]\locamxd.sls
[%SYSTEM%]\foxdh.exe
[%SYSTEM%]\foxmir.1ls
[%SYSTEM%]\foxmxd.exe
[%SYSTEM%]\locamxd.sls

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Foxyt:

An up-to-date copy of ExterminateIt should detect and prevent infection from Foxyt.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Foxyt manually.

To completely manually remove Foxyt malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Foxyt.

  1. Use Task Manager to terminate the Foxyt process.
  2. Delete the original Foxyt file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Foxyt from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Foxyt!


Also Be Aware of the Following Threats:
easy.ad.info Tracking Cookie Removal instruction
TrojanProxy.Win32.Agent Trojan Cleaner
Random.Wallpaper.Changer Trojan Removal
Pigeon.AVHT Trojan Symptoms
Removing Vxidl.AFC Trojan

0 comments

Win32.PWS.Legendmir.HookDLL.Troj Trojan

Win32.PWS.Legendmir.HookDLL.Troj malware description and removal detail
Categories:Trojan,Hacker Tool
Also known as:

[Kaspersky]Trojan.PSW.Lmir.bw;
[Eset]Win32/PSW.Legendmir.BW1 trojan;
[Panda]Trojan Horse;
[Computer Associates]Win32.Lemir.G,Win32/Lemir!PWS!HookDLL!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Win32.PWS.Legendmir.HookDLL.Troj:

An up-to-date copy of ExterminateIt should detect and prevent infection from Win32.PWS.Legendmir.HookDLL.Troj.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Win32.PWS.Legendmir.HookDLL.Troj manually.

To completely manually remove Win32.PWS.Legendmir.HookDLL.Troj malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Win32.PWS.Legendmir.HookDLL.Troj.

  1. Use Task Manager to terminate the Win32.PWS.Legendmir.HookDLL.Troj process.
  2. Delete the original Win32.PWS.Legendmir.HookDLL.Troj file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Win32.PWS.Legendmir.HookDLL.Troj from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Win32.PWS.Legendmir.HookDLL.Troj!


Also Be Aware of the Following Threats:
Incelid Trojan Information
Gerenbrad Trojan Information
FavoriteMan.SpyAssault BHO Information
SillyDl.CEH Downloader Cleaner

0 comments

Session Trojan

Session malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Session:

An up-to-date copy of ExterminateIt should detect and prevent infection from Session.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Session manually.

To completely manually remove Session malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Session.

  1. Use Task Manager to terminate the Session process.
  2. Delete the original Session file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Session from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Session!


Also Be Aware of the Following Threats:
Delf.jq Trojan Cleaner

0 comments

Tribe.FloodNet DoS

Tribe.FloodNet malware description and removal detail
Categories:DoS

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Tribe.FloodNet:

An up-to-date copy of ExterminateIt should detect and prevent infection from Tribe.FloodNet.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Tribe.FloodNet manually.

To completely manually remove Tribe.FloodNet malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Tribe.FloodNet.

  1. Use Task Manager to terminate the Tribe.FloodNet process.
  2. Delete the original Tribe.FloodNet file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Tribe.FloodNet from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Tribe.FloodNet!


Also Be Aware of the Following Threats:
Remove Ice DoS
Bat.Geez Trojan Information

0 comments

TrojanClicker.Win32.VB.gg Trojan

TrojanClicker.Win32.VB.gg malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]Trojan-Clicker.Win32.VB.gg;
[McAfee]Generic.AdClicker.a;
[Other]Trojan.Adclicker,TROJ_VB_LT

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing TrojanClicker.Win32.VB.gg:

An up-to-date copy of ExterminateIt should detect and prevent infection from TrojanClicker.Win32.VB.gg.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove TrojanClicker.Win32.VB.gg manually.

To completely manually remove TrojanClicker.Win32.VB.gg malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with TrojanClicker.Win32.VB.gg.

  1. Use Task Manager to terminate the TrojanClicker.Win32.VB.gg process.
  2. Delete the original TrojanClicker.Win32.VB.gg file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes TrojanClicker.Win32.VB.gg from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of TrojanClicker.Win32.VB.gg!


Also Be Aware of the Following Threats:
Loofeer Trojan Cleaner
Removing Bancos.HPK Trojan
Before.You.Go.com Tracking Cookie Symptoms
BlazingTools.Perfect.Keylogger Spyware Removal

0 comments

Pigeon.AWKM Trojan

Pigeon.AWKM malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.AWKM:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.AWKM.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.AWKM manually.

To completely manually remove Pigeon.AWKM malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.AWKM.

  1. Use Task Manager to terminate the Pigeon.AWKM process.
  2. Delete the original Pigeon.AWKM file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.AWKM from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.AWKM!


Also Be Aware of the Following Threats:
Kazaa.Pad Worm Symptoms
Loony Trojan Information

0 comments

Enola Trojan

Enola malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]Enola.1864;
[Eset]Enola.1864 virus;
[Panda]Enola;
[Computer Associates]Enola

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Enola:

An up-to-date copy of ExterminateIt should detect and prevent infection from Enola.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Enola manually.

To completely manually remove Enola malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Enola.

  1. Use Task Manager to terminate the Enola process.
  2. Delete the original Enola file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Enola from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Enola!


Also Be Aware of the Following Threats:
Removing SillyDl.DNB Trojan
Munich Trojan Removal
Remove Is.My.Mate.Cheating.Online Spyware
Remove Linploit.A!rootkit Trojan

0 comments

Pigeon.EEC Trojan

Pigeon.EEC malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.EEC:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.EEC.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.EEC manually.

To completely manually remove Pigeon.EEC malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.EEC.

  1. Use Task Manager to terminate the Pigeon.EEC process.
  2. Delete the original Pigeon.EEC file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.EEC from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.EEC!


Also Be Aware of the Following Threats:
Remove VBS.Inor Trojan

0 comments

Xupiter Hijacker

Xupiter malware description and removal detail
Categories:Hijacker

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Xupiter:

An up-to-date copy of ExterminateIt should detect and prevent infection from Xupiter.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Xupiter manually.

To completely manually remove Xupiter malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Xupiter.

  1. Use Task Manager to terminate the Xupiter process.
  2. Delete the original Xupiter file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Xupiter from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Xupiter!


Also Be Aware of the Following Threats:
IRCFlooder.Chamel DoS Cleaner
DeepThroat.Lite Backdoor Symptoms
SillyDl.CHU Trojan Removal
Httpd.Flood DoS Information

0 comments

VNC.CommonComponents RAT

VNC.CommonComponents malware description and removal detail
Categories:RAT
Visible Symptoms:
Files in system folders:
[%PROGRAM_FILES%]\networkstreaming\customer\vnchooks.dll
[%PROGRAM_FILES%]\networkstreaming\customer\winvnc.exe
[%PROGRAM_FILES%]\networkstreaming\customer\vnchooks.dll
[%PROGRAM_FILES%]\networkstreaming\customer\winvnc.exe

In order to ensure that the VNC.CommonComponents is launched automatically each time the system is booted, the VNC.CommonComponents adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%PROGRAM_FILES%]\networkstreaming\customer\winvnc.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting VNC.CommonComponents:

Files:
[%PROGRAM_FILES%]\networkstreaming\customer\vnchooks.dll
[%PROGRAM_FILES%]\networkstreaming\customer\winvnc.exe
[%PROGRAM_FILES%]\networkstreaming\customer\vnchooks.dll
[%PROGRAM_FILES%]\networkstreaming\customer\winvnc.exe

Registry Keys:
HKEY_CLASSES_ROOT\.vnc
HKEY_CLASSES_ROOT\vnc.connectioninfo
HKEY_CLASSES_ROOT\vncviewer.config
HKEY_LOCAL_MACHINE\software\orl\winvnc3
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_winvnc
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\winvnc

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing VNC.CommonComponents:

An up-to-date copy of ExterminateIt should detect and prevent infection from VNC.CommonComponents.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove VNC.CommonComponents manually.

To completely manually remove VNC.CommonComponents malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with VNC.CommonComponents.

  1. Use Task Manager to terminate the VNC.CommonComponents process.
  2. Delete the original VNC.CommonComponents file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes VNC.CommonComponents from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of VNC.CommonComponents!


Also Be Aware of the Following Threats:
Removing QQThief Trojan
TrojanDropper.VBS.Inor Trojan Removal instruction

0 comments

XP.Advanced.Keylogger Spyware

XP.Advanced.Keylogger malware description and removal detail
Categories:Spyware
Visible Symptoms:
Files in system folders:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\XP Advanced Keylogger.lnk
[%DESKTOP%]\XP Advanced Keylogger.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\XP Advanced Keylogger.lnk
[%DESKTOP%]\XP Advanced Keylogger.lnk

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting XP.Advanced.Keylogger:

Files:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\XP Advanced Keylogger.lnk
[%DESKTOP%]\XP Advanced Keylogger.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\XP Advanced Keylogger.lnk
[%DESKTOP%]\XP Advanced Keylogger.lnk

Folders:
[%COMMON_PROGRAMS%]\XP Advanced Keylogger
[%PROGRAMS%]\xp advanced keylogger
[%PROGRAM_FILES%]\XP Advanced Keylogger

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{17b307be-b2ec-43e8-8605-5e1f257273b1}
HKEY_CLASSES_ROOT\clsid\{5388d0ee-ace4-4c4d-8532-72f234399aeb}
HKEY_CLASSES_ROOT\clsid\{60fb8d96-d4e9-461b-81a1-2356040b73e5}
HKEY_CLASSES_ROOT\clsid\{a9676c29-ed6e-4c33-9295-8bc13cd3947d}
HKEY_CLASSES_ROOT\clsid\{b44432c2-4d5c-4495-ac72-55a39917142c}
HKEY_CLASSES_ROOT\clsid\{b7385bc9-4857-471b-9e06-cf2807288633}
HKEY_CLASSES_ROOT\clsid\{ba7a51fa-04f1-45cb-b493-36ad46950432}
HKEY_CLASSES_ROOT\clsid\{c080ffda-6d65-4f98-ba30-89a340fc2c2c}
HKEY_CLASSES_ROOT\clsid\{c610b319-5ef8-4302-ac99-4580932a5957}
HKEY_CLASSES_ROOT\clsid\{e27d817e-a07e-481d-b449-48f83d7a18f4}
HKEY_CLASSES_ROOT\toolkeyloggerdll.application
HKEY_CLASSES_ROOT\toolkeyloggerdll.application.1
HKEY_CLASSES_ROOT\toolkeyloggerdll.blockexe
HKEY_CLASSES_ROOT\toolkeyloggerdll.blockexe.1
HKEY_CLASSES_ROOT\toolkeyloggerdll.clipboard
HKEY_CLASSES_ROOT\toolkeyloggerdll.clipboard.1
HKEY_CLASSES_ROOT\toolkeyloggerdll.hotkey
HKEY_CLASSES_ROOT\toolkeyloggerdll.hotkey.1
HKEY_CLASSES_ROOT\toolkeyloggerdll.keyboard
HKEY_CLASSES_ROOT\toolkeyloggerdll.keyboard.1
HKEY_CLASSES_ROOT\toolkeyloggerdll.logtoftp
HKEY_CLASSES_ROOT\toolkeyloggerdll.logtoftp.1
HKEY_CLASSES_ROOT\toolkeyloggerdll.logtomail
HKEY_CLASSES_ROOT\toolkeyloggerdll.logtomail.1
HKEY_CLASSES_ROOT\toolkeyloggerdll.password
HKEY_CLASSES_ROOT\toolkeyloggerdll.password.1
HKEY_CLASSES_ROOT\toolkeyloggerdll.screen
HKEY_CLASSES_ROOT\toolkeyloggerdll.screen.1
HKEY_CLASSES_ROOT\toolkeyloggerdll.tasklist
HKEY_CLASSES_ROOT\toolkeyloggerdll.tasklist.1
HKEY_CLASSES_ROOT\typelib\{4c4ab6b2-4bc3-494a-9232-5001e0793ac4}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\xp advanced keylogger_is1

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing XP.Advanced.Keylogger:

An up-to-date copy of ExterminateIt should detect and prevent infection from XP.Advanced.Keylogger.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove XP.Advanced.Keylogger manually.

To completely manually remove XP.Advanced.Keylogger malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with XP.Advanced.Keylogger.

  1. Use Task Manager to terminate the XP.Advanced.Keylogger process.
  2. Delete the original XP.Advanced.Keylogger file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes XP.Advanced.Keylogger from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of XP.Advanced.Keylogger!


Also Be Aware of the Following Threats:
Inwin Trojan Removal instruction
Wussoe Trojan Cleaner

0 comments

Remat Trojan

Remat malware description and removal detail
Categories:Trojan,Hacker Tool
Also known as:

[Panda]Trj/Legmir.D;
[Computer Associates]Win32/Remat.19317!Worm

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Remat:

An up-to-date copy of ExterminateIt should detect and prevent infection from Remat.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Remat manually.

To completely manually remove Remat malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Remat.

  1. Use Task Manager to terminate the Remat process.
  2. Delete the original Remat file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Remat from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Remat!


Also Be Aware of the Following Threats:
JS.DropperAppl Trojan Symptoms
ExefWrapper Trojan Information

0 comments

Bloon Trojan

Bloon malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]AdWare.Win32.Msnagent.b;
[McAfee]AdClicker-BW;
[Other]Win32/Bloon.V,Adware.WinProtect

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\pppcgm.exe
[%SYSTEM%]\{EB553BDA-B36E-41EB-A605-F44C2AB1C37D}.exe
[%WINDOWS%]\Help\SPAlert.chm
[%SYSTEM%]\pppcgm.exe
[%SYSTEM%]\{EB553BDA-B36E-41EB-A605-F44C2AB1C37D}.exe
[%WINDOWS%]\Help\SPAlert.chm

In order to ensure that the Bloon is launched automatically each time the system is booted, the Bloon adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%SYSTEM%]\pppcgm.exe
[%SYSTEM%]\{EB553BDA-B36E-41EB-A605-F44C2AB1C37D}.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Bloon:

Files:
[%SYSTEM%]\pppcgm.exe
[%SYSTEM%]\{EB553BDA-B36E-41EB-A605-F44C2AB1C37D}.exe
[%WINDOWS%]\Help\SPAlert.chm
[%SYSTEM%]\pppcgm.exe
[%SYSTEM%]\{EB553BDA-B36E-41EB-A605-F44C2AB1C37D}.exe
[%WINDOWS%]\Help\SPAlert.chm

Removing Bloon:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bloon.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bloon manually.

To completely manually remove Bloon malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bloon.

  1. Use Task Manager to terminate the Bloon process.
  2. Delete the original Bloon file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bloon from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bloon!


Also Be Aware of the Following Threats:
Removing Bancos.FXZ Trojan
Remove Valueclick.ne.Tracking.Cookie Tracking Cookie
Lprng Trojan Cleaner
Remove Vxidl.AUG Trojan
DigitalMafia'z.EXE.File Trojan Removal instruction

0 comments

ElfNotify Trojan

ElfNotify malware description and removal detail
Categories:Trojan,RAT,Downloader,Hacker Tool
Also known as:

[Kaspersky]TrojanDownloader.Win32.Elfdown.10.a;
[McAfee]ElfNotify;
[F-Prot]destructive program;
[Panda]Trojan Horse.LC

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing ElfNotify:

An up-to-date copy of ExterminateIt should detect and prevent infection from ElfNotify.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove ElfNotify manually.

To completely manually remove ElfNotify malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with ElfNotify.

  1. Use Task Manager to terminate the ElfNotify process.
  2. Delete the original ElfNotify file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes ElfNotify from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of ElfNotify!


Also Be Aware of the Following Threats:
Remove PePatch.dk Spyware

0 comments

Bancos.FUI Trojan

Bancos.FUI malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bancos.FUI:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bancos.FUI.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bancos.FUI manually.

To completely manually remove Bancos.FUI malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.FUI.

  1. Use Task Manager to terminate the Bancos.FUI process.
  2. Delete the original Bancos.FUI file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bancos.FUI from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bancos.FUI!


Also Be Aware of the Following Threats:
Backdoor.BCZ Backdoor Removal
Remove JTTP Trojan
Remove Win32.DlMersting.AX.DLL.Tr Trojan
Witch.Control Backdoor Removal

0 comments

worldnow.com Tracking Cookie

worldnow.com malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing worldnow.com:

An up-to-date copy of ExterminateIt should detect and prevent infection from worldnow.com.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove worldnow.com manually.

To completely manually remove worldnow.com malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with worldnow.com.

  1. Use Task Manager to terminate the worldnow.com process.
  2. Delete the original worldnow.com file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes worldnow.com from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of worldnow.com!


Also Be Aware of the Following Threats:
Removing WCRAT Trojan

0 comments

Liquid.Code Trojan

Liquid.Code malware description and removal detail
Categories:Trojan,Backdoor,Downloader,DoS
Also known as:

[Kaspersky]Lct.591;
[Panda]Intended.Lct.591

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Liquid.Code:

An up-to-date copy of ExterminateIt should detect and prevent infection from Liquid.Code.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Liquid.Code manually.

To completely manually remove Liquid.Code malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Liquid.Code.

  1. Use Task Manager to terminate the Liquid.Code process.
  2. Delete the original Liquid.Code file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Liquid.Code from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Liquid.Code!


Also Be Aware of the Following Threats:
Remove Perfect.Keylogger.Lite Spyware

0 comments

Bancos.IFF Trojan

Bancos.IFF malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bancos.IFF:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bancos.IFF.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bancos.IFF manually.

To completely manually remove Bancos.IFF malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.IFF.

  1. Use Task Manager to terminate the Bancos.IFF process.
  2. Delete the original Bancos.IFF file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bancos.IFF from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bancos.IFF!


Also Be Aware of the Following Threats:
Vxidl.BBG Trojan Removal instruction
Preview.Unlocked RAT Symptoms

0 comments

Vefisi Trojan

Vefisi malware description and removal detail
Categories:Trojan
Visible Symptoms:
Files in system folders:
[%PROGRAM_FILES_COMMON%]\osa9.exe
[%PROGRAM_FILES_COMMON%]\OSAB.dll
[%SYSTEM%]\drivers\HWRegProt.sys
[%WINDOWS%]\30001.exe
[%PROGRAM_FILES_COMMON%]\osa9.exe
[%PROGRAM_FILES_COMMON%]\OSAB.dll
[%SYSTEM%]\drivers\HWRegProt.sys
[%WINDOWS%]\30001.exe

In order to ensure that the Vefisi is launched automatically each time the system is booted, the Vefisi adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%PROGRAM_FILES_COMMON%]\osa9.exe
[%WINDOWS%]\30001.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Vefisi:

Files:
[%PROGRAM_FILES_COMMON%]\osa9.exe
[%PROGRAM_FILES_COMMON%]\OSAB.dll
[%SYSTEM%]\drivers\HWRegProt.sys
[%WINDOWS%]\30001.exe
[%PROGRAM_FILES_COMMON%]\osa9.exe
[%PROGRAM_FILES_COMMON%]\OSAB.dll
[%SYSTEM%]\drivers\HWRegProt.sys
[%WINDOWS%]\30001.exe

Removing Vefisi:

An up-to-date copy of ExterminateIt should detect and prevent infection from Vefisi.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Vefisi manually.

To completely manually remove Vefisi malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Vefisi.

  1. Use Task Manager to terminate the Vefisi process.
  2. Delete the original Vefisi file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Vefisi from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Vefisi!


Also Be Aware of the Following Threats:
Bancos.HQC Trojan Cleaner
Lineage.ABD Trojan Symptoms
GoodTech.Telnet.Server DoS Cleaner

0 comments

mediatracker.co.nz Tracking Cookie

mediatracker.co.nz malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing mediatracker.co.nz:

An up-to-date copy of ExterminateIt should detect and prevent infection from mediatracker.co.nz.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove mediatracker.co.nz manually.

To completely manually remove mediatracker.co.nz malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with mediatracker.co.nz.

  1. Use Task Manager to terminate the mediatracker.co.nz process.
  2. Delete the original mediatracker.co.nz file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes mediatracker.co.nz from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of mediatracker.co.nz!


Also Be Aware of the Following Threats:
Removing TrojanClicker.Win32.Agent.af Trojan
PCTurboPro Ransomware Information

0 comments

Blog Archive