Wednesday, October 29, 2008

CmjSpy Trojan

CmjSpy malware description and removal detail
Also known as:

[Eset]Win32/CmjSpy.25.B trojan;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program,Bck/CmjSpy.05,Bck/CmjSpy.11,Backdoor Program.LC;
[Computer Associates]Backdoor/CmjSpy.05!Server,Backdoor/CmjSpy.11!Server,Backdoor/Cmjspy.25.b,Backdoor/Cmjspy.2_1,Backdoor/Cmjspy.B,Backdoor/Cmjspy.L

Visible Symptoms:
Files in system folders:

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting CmjSpy:


Registry Values:

Removing CmjSpy:

An up-to-date copy of ExterminateIt should detect and prevent infection from CmjSpy.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove CmjSpy manually.

To completely manually remove CmjSpy malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with CmjSpy.

  1. Use Task Manager to terminate the CmjSpy process.
  2. Delete the original CmjSpy file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.

ExterminateIt effectively and automatically removes CmjSpy from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of CmjSpy!

Also Be Aware of the Following Threats:
Vxidl.ACZ Trojan Information Backdoor Removal instruction
WordMacro.Over.B:intended Trojan Removal instruction
Vxidl.BEP Trojan Removal
VBS.Atomic Trojan Information

No comments: