Monday, November 3, 2008

Bancos.HWX Trojan

Bancos.HWX malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bancos.HWX:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bancos.HWX.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bancos.HWX manually.

To completely manually remove Bancos.HWX malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.HWX.

  1. Use Task Manager to terminate the Bancos.HWX process.
  2. Delete the original Bancos.HWX file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bancos.HWX from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bancos.HWX!


Also Be Aware of the Following Threats:
Remove Mersting Trojan
Remove Pigeon.AVU Trojan
SillyDl.CGY Trojan Information
Removing TrojanClicker.Win32.Myxq Trojan
Small.Big.Brother.2b1 Trojan Removal instruction

Moron Trojan

Moron malware description and removal detail
Categories:Trojan
Also known as:

[McAfee]Moron.a;
[F-Prot]destructive program;
[Panda]Trj/Moron.A,Trj/Moron.B,Trj/Ugly;
[Computer Associates]Moron.A!Trojan,Moron.B,Ugly,Ugly_Dudes

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Moron:

An up-to-date copy of ExterminateIt should detect and prevent infection from Moron.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Moron manually.

To completely manually remove Moron malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Moron.

  1. Use Task Manager to terminate the Moron process.
  2. Delete the original Moron file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Moron from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Moron!


Also Be Aware of the Following Threats:
TrojanDropper.JS.Mimail Trojan Cleaner
Remove Win32.Exploit.SQLexp Trojan
TribuneInteractive Tracking Cookie Removal
HLLP.Non31995 Trojan Cleaner
Removing CWSMeup.E Trojan

TrojanNotifier.Win32.VB Trojan

TrojanNotifier.Win32.VB malware description and removal detail
Categories:Trojan,Hacker Tool
Also known as:

[Kaspersky]Constructor.Win32.VB.e,Constructor.Win32.VB.f;
[Panda]Trojan Horse

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing TrojanNotifier.Win32.VB:

An up-to-date copy of ExterminateIt should detect and prevent infection from TrojanNotifier.Win32.VB.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove TrojanNotifier.Win32.VB manually.

To completely manually remove TrojanNotifier.Win32.VB malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with TrojanNotifier.Win32.VB.

  1. Use Task Manager to terminate the TrojanNotifier.Win32.VB process.
  2. Delete the original TrojanNotifier.Win32.VB file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes TrojanNotifier.Win32.VB from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of TrojanNotifier.Win32.VB!


Also Be Aware of the Following Threats:
Ehg.eckounlimited.hitbox Tracking Cookie Information
Remove DontRun Trojan
Malware Toolbar Toolbar Cleaner
Backdoor.BAC.dll Backdoor Information
Chat.VB DoS Information

Anthena Trojan

Anthena malware description and removal detail
Categories:Trojan,Backdoor
Also known as:

[Kaspersky]Backdoor.Delf.er,Backdoor.VagrNocker.12;
[Eset]Win32/Delf.ER trojan;
[McAfee]New BackDoor1;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program,Bck/Delf;
[Computer Associates]Backdoor/Delf.er.Server,Backdoor/Matrix Server family

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\winbios.exe
[%WINDOWS%]\winbios.exe

In order to ensure that the Anthena is launched automatically each time the system is booted, the Anthena adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%WINDOWS%]\winbios.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Anthena:

Files:
[%WINDOWS%]\winbios.exe
[%WINDOWS%]\winbios.exe

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices

Removing Anthena:

An up-to-date copy of ExterminateIt should detect and prevent infection from Anthena.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Anthena manually.

To completely manually remove Anthena malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Anthena.

  1. Use Task Manager to terminate the Anthena process.
  2. Delete the original Anthena file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Anthena from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Anthena!


Also Be Aware of the Following Threats:
Removing SillyDl.CYJ Trojan
Deftcode Backdoor Removal
VB.qo Backdoor Symptoms
QSD13 Trojan Symptoms
Pigeon.EYJ Trojan Removal

Triplethreat Hostile Code

Triplethreat malware description and removal detail
Categories:Hostile Code

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Triplethreat:

An up-to-date copy of ExterminateIt should detect and prevent infection from Triplethreat.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Triplethreat manually.

To completely manually remove Triplethreat malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Triplethreat.

  1. Use Task Manager to terminate the Triplethreat process.
  2. Delete the original Triplethreat file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Triplethreat from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Triplethreat!


Also Be Aware of the Following Threats:
Lufoure Trojan Symptoms
Sucker.Matrix RAT Cleaner
Removing NetTracker Trojan
Removing nasads.com Tracking Cookie
Pigeon.AVW Trojan Information

FloodBot DoS

FloodBot malware description and removal detail
Categories:DoS

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing FloodBot:

An up-to-date copy of ExterminateIt should detect and prevent infection from FloodBot.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove FloodBot manually.

To completely manually remove FloodBot malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with FloodBot.

  1. Use Task Manager to terminate the FloodBot process.
  2. Delete the original FloodBot file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes FloodBot from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of FloodBot!


Also Be Aware of the Following Threats:
Tiny.Family Trojan Removal instruction
GetAlert Downloader Information
Pigeon.AZH Trojan Removal
VB.qo Backdoor Symptoms
Removing Fake.MSN Trojan

Frethog Trojan

Frethog malware description and removal detail
Categories:Trojan,Hacker Tool
Also known as:

[Kaspersky]Trojan-PSW.Win32.Agent.iu,Trojan-PWS.Win32.Agent.iu,Trojan-PSW.Win32.OnLineGames.bs,Trojan-PSW.Win32.OnLineGame.bs,Trojan-PSW.Win32.OnLineGames.es,Trojan-PSW.Win32.OnLineGames.gs,Trojan-PWS.Win32.WOW.qf,Trojan-PSW.Win32.OnLineGame.gs,Trojan-PSW.Win32.WOW.qr,Trojan-PSW.Win32.OnLineGames.qp,Trojan-PSW.Win32.OnLineGames.tz,Trojan-PSW.Win32.OnLineGames.uf,Trojan-PSW.Win32.OnLineGames.mp,Trojan.Win32.Qhost.Ip,Trojan-PSW.Win32.OnLineGames.tk,Trojan-PSW.Win32.Nilage.bju,Trojan-Downloader.Win32.Agent.bna,Trojan-PSW.Win32.OnLinesGames.es,Trojan-PSW.Win32.OnLineGames.te,Trojan-PSW.Win32.WOW.qo,Trojan-PSW.WIn32.OnLineGames.xg,Trojan-PSW.Win32.OnLineGames.sc,Trojan-PSW.Win32.OnLineGames.sy,Trojan-PSW.Win32.OnLineGames.ry,Trojan-PSW.Win32.OnLineGames.ox,Trojan-PSW.Win32.OnlineGames.wz,Trojan-PSW.Win32.OnLineGames.tl,Trojan-PSW.Win32.OnLineGames.yn,Trojan-PSW.Win32.Small.cf,Worm.Win32.Agent.aj,Trojan-PSW.Win32.OnLineGames.kw,Trojan-PWS.OnLineGames.aci,Trojan-Downloader.Win32.Agent.bek,Trojan-Downloader.Win32.Agent.dey,Trojan-PSW.Win32.OnLineGames.edt,Trojan-PSW.Win32.Nilage.bty;
[McAfee]PWS-Legmir.dll,PWS-Lineage,New Malware.w,PWS-LegMir.gen.b,PWS-WoW,PWS-Mmorpg.gen,PWS-LegMir,New malware.aj,Generic.PWS;
[F-Prot]W32/PWStealer.AIN,W32/PWStealer,W32/PWStealer.gen1,W32/PWStealer.JBY,W32/PWStealer.GQS,W32/PWStealer.JTI,W32/PWStealer2!Generic;
[Other]Win32/Frethog,win32/Frethog.B,Infostealer,Infostealer.Menghuan,TSPY_AGENT.FUY,Win32/Frethog.H,W32/OnLineGames.FX,Infostealer.Gampass,Win32/Frethog.BT,Win32/Frethog.BH,Win32/Frethog.BI,Win32/Frethog.BD,Win32/Frethog.AX,Win32/Frethog.BU,Infostealer.Perfwo,W32/Blackhole.LN,Mal/Packer,Win32/Frethog.AG,Win32/Frethog.BF,Win32/Frethog.DB,Win32/Frethog.DC,Win32/Frethog.DU,Win32/Frethog.IJ,Win32/Frethog.IG,Win32/Frethog.IM,Win32/Frethog.IO,Win32/Frethog.JG,Win32/Frethog!generic,Win32/Frethog.KQ,Win32/Frethog.KR,Win32/Frethog.KS,Win32/Frethog.KT,Win32/Frethog.KU,Win32/Frethog.KV,Win32/Frethog.JU,Win32/Frethog.OB,Win32/Frethog.OX,Win32/Frethog.ND,VirTool:Win32/Obfuscator.A,OnlineGames.dam,TSPY_ONLINEG.BLG,Trojan.Win32.NSAnti.b,PWS:Win32/Frethog.E,W32/OnLineGames.DDZ,TSPY_ONLINEG.BIF,Troja/PSW-Gen,Trojan-PWS.7BE35CC9,Win32/Frethog.QR,PWS:Win32/Frethog.C,W32/Horst.gen31,Win32/Frethog.QO,TSPY_ONLINEG.AXS,Win32/Frethog.QV,W32/OnLineGames.GJP,Win32/Frethog.SL,Win32/Frethog.SG,Win32/Frethog.SF,Win32/Frethog.SE,Win32/Frethog.SD,Win32/Frethog.SC,Win32/Frethog.SI,Win32/Frethog.SR,Virus:Win32/Detnat.F,W32/Viking.gen4,TROJ_Generic,Mal/EncPk-F,INfostealer.Gampass,Win32/Frethog.TI,Win32/Frethog.TH,Win32/Frethog.SS,Trojan.Packed.NsAnti,Mal/EncPk-I,Infostealer.Wowcraft,Infostealer.Gamepass,Win32/Frethog.UF,Win32/Frethog.UG,Win32/Frethog.UH,Win32/Frethog.VB,PWS:Win32/Frethog.D,W32/Suspicious_U.gen.dropper,TPSY_LEGMIR.AWY,TSPY_FRETHOG.PU,Win32/Frethog WT,Win32/Frethog.WS,Win32/Frethog.XD,Win32/Frethog.WR,PWS:Win32/Frethog.F,PWS:Win32/Frethog.gen!E,TSPY_ONLINEG.HVZ,Mal/Gampass-A,W32/Hupigon.gen67,W32/Lineage.AXZP,TSPY_NILAGE.PY

Visible Symptoms:
Files in system folders:
[%PROFILE_TEMP%]\woso.exe
[%PROFILE_TEMP%]\woso0.dll
[%PROFILE_TEMP%]\ztso.exe
[%PROFILE_TEMP%]\ztso0.dll
[%SYSTEM%]\dllhost32.exe
[%SYSTEM%]\mppds.dll
[%SYSTEM%]\NVDispDrv.dll
[%WINDOWS%]\mppds.exe
[%WINDOWS%]\NVDispDrv.exe
[%PROFILE%]\Temp\zts0.dll
[%PROFILE_TEMP%]\mhs0.dll
[%PROFILE_TEMP%]\mhs2.dll
[%PROFILE_TEMP%]\mhs2.exe
[%PROFILE_TEMP%]\mhso.exe
[%PROFILE_TEMP%]\mhso0.dll
[%PROFILE_TEMP%]\RavMonD.exe
[%PROFILE_TEMP%]\wgso.exe
[%PROFILE_TEMP%]\wgso0.dll
[%PROFILE_TEMP%]\wlzs.dll
[%PROFILE_TEMP%]\wlzs.exe
[%PROFILE_TEMP%]\zts2.dll
[%PROFILE_TEMP%]\zts2.exe
[%PROGRAM_FILES%]\Internet Explorer\RAVDHMON.DAT
[%PROGRAM_FILES%]\Internet Explorer\RAVDHMON.exe
[%PROGRAM_FILES%]\Internet Explorer\RAVTLMON.DAT
[%PROGRAM_FILES%]\Internet Explorer\RAVTLMON.exe
[%SYSTEM%]\cmdbcs.dll
[%SYSTEM%]\dh2103.dll
[%SYSTEM%]\DiskMan32.dll
[%SYSTEM%]\Kvsc3.dll
[%SYSTEM%]\mh104.dll
[%SYSTEM%]\MOSOU.dll
[%SYSTEM%]\mosou.exe
[%SYSTEM%]\nmhxy.dll
[%SYSTEM%]\nmhxy.exe
[%SYSTEM%]\nwizdh.exe
[%SYSTEM%]\nwiztlbb.dll
[%SYSTEM%]\nwiztlbu.exe
[%SYSTEM%]\nwizwmgjs.dll
[%SYSTEM%]\nwizwmgjs.exe
[%SYSTEM%]\nwizzhuxians.dll
[%SYSTEM%]\nwizzhuxians.exe
[%SYSTEM%]\RAV00AE.DAT
[%SYSTEM%]\RAV00AE.exe
[%SYSTEM%]\RAVMY623.dll
[%SYSTEM%]\upxdnd.dll
[%SYSTEM%]\vbsdaas2.exe
[%SYSTEM%]\WSVBRS.dll
[%SYSTEM%]\wsvbs.dll
[%SYSTEM%]\wsvbs.exe
[%SYSTEM%]\xk1s0.dll
[%WINDOWS%]\cmdbcs.exe
[%WINDOWS%]\DiskMan32.exe
[%WINDOWS%]\Kvsc3.exe
[%WINDOWS%]\mhs3.exe
[%WINDOWS%]\upxdnd.exe
[%WINDOWS%]\wsvbs.exe
[%WINDOWS%]\zts3.exe
[%PROFILE_TEMP%]\woso.exe
[%PROFILE_TEMP%]\woso0.dll
[%PROFILE_TEMP%]\ztso.exe
[%PROFILE_TEMP%]\ztso0.dll
[%SYSTEM%]\dllhost32.exe
[%SYSTEM%]\mppds.dll
[%SYSTEM%]\NVDispDrv.dll
[%WINDOWS%]\mppds.exe
[%WINDOWS%]\NVDispDrv.exe
[%PROFILE%]\Temp\zts0.dll
[%PROFILE_TEMP%]\mhs0.dll
[%PROFILE_TEMP%]\mhs2.dll
[%PROFILE_TEMP%]\mhs2.exe
[%PROFILE_TEMP%]\mhso.exe
[%PROFILE_TEMP%]\mhso0.dll
[%PROFILE_TEMP%]\RavMonD.exe
[%PROFILE_TEMP%]\wgso.exe
[%PROFILE_TEMP%]\wgso0.dll
[%PROFILE_TEMP%]\wlzs.dll
[%PROFILE_TEMP%]\wlzs.exe
[%PROFILE_TEMP%]\zts2.dll
[%PROFILE_TEMP%]\zts2.exe
[%PROGRAM_FILES%]\Internet Explorer\RAVDHMON.DAT
[%PROGRAM_FILES%]\Internet Explorer\RAVDHMON.exe
[%PROGRAM_FILES%]\Internet Explorer\RAVTLMON.DAT
[%PROGRAM_FILES%]\Internet Explorer\RAVTLMON.exe
[%SYSTEM%]\cmdbcs.dll
[%SYSTEM%]\dh2103.dll
[%SYSTEM%]\DiskMan32.dll
[%SYSTEM%]\Kvsc3.dll
[%SYSTEM%]\mh104.dll
[%SYSTEM%]\MOSOU.dll
[%SYSTEM%]\mosou.exe
[%SYSTEM%]\nmhxy.dll
[%SYSTEM%]\nmhxy.exe
[%SYSTEM%]\nwizdh.exe
[%SYSTEM%]\nwiztlbb.dll
[%SYSTEM%]\nwiztlbu.exe
[%SYSTEM%]\nwizwmgjs.dll
[%SYSTEM%]\nwizwmgjs.exe
[%SYSTEM%]\nwizzhuxians.dll
[%SYSTEM%]\nwizzhuxians.exe
[%SYSTEM%]\RAV00AE.DAT
[%SYSTEM%]\RAV00AE.exe
[%SYSTEM%]\RAVMY623.dll
[%SYSTEM%]\upxdnd.dll
[%SYSTEM%]\vbsdaas2.exe
[%SYSTEM%]\WSVBRS.dll
[%SYSTEM%]\wsvbs.dll
[%SYSTEM%]\wsvbs.exe
[%SYSTEM%]\xk1s0.dll
[%WINDOWS%]\cmdbcs.exe
[%WINDOWS%]\DiskMan32.exe
[%WINDOWS%]\Kvsc3.exe
[%WINDOWS%]\mhs3.exe
[%WINDOWS%]\upxdnd.exe
[%WINDOWS%]\wsvbs.exe
[%WINDOWS%]\zts3.exe

In order to ensure that the Frethog is launched automatically each time the system is booted, the Frethog adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%PROFILE_TEMP%]\woso.exe
[%PROFILE_TEMP%]\ztso.exe
[%SYSTEM%]\dllhost32.exe
[%WINDOWS%]\mppds.exe
[%WINDOWS%]\NVDispDrv.exe
[%PROFILE_TEMP%]\mhs2.exe
[%PROFILE_TEMP%]\mhso.exe
[%PROFILE_TEMP%]\RavMonD.exe
[%PROFILE_TEMP%]\wgso.exe
[%PROFILE_TEMP%]\wlzs.exe
[%PROFILE_TEMP%]\zts2.exe
[%PROGRAM_FILES%]\Internet Explorer\RAVDHMON.exe
[%PROGRAM_FILES%]\Internet Explorer\RAVTLMON.exe
[%SYSTEM%]\mosou.exe
[%SYSTEM%]\nmhxy.exe
[%SYSTEM%]\nwizdh.exe
[%SYSTEM%]\nwiztlbu.exe
[%SYSTEM%]\nwizwmgjs.exe
[%SYSTEM%]\nwizzhuxians.exe
[%SYSTEM%]\RAV00AE.exe
[%SYSTEM%]\vbsdaas2.exe
[%SYSTEM%]\wsvbs.exe
[%WINDOWS%]\cmdbcs.exe
[%WINDOWS%]\DiskMan32.exe
[%WINDOWS%]\Kvsc3.exe
[%WINDOWS%]\mhs3.exe
[%WINDOWS%]\upxdnd.exe
[%WINDOWS%]\wsvbs.exe
[%WINDOWS%]\zts3.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Frethog:

Files:
[%PROFILE_TEMP%]\woso.exe
[%PROFILE_TEMP%]\woso0.dll
[%PROFILE_TEMP%]\ztso.exe
[%PROFILE_TEMP%]\ztso0.dll
[%SYSTEM%]\dllhost32.exe
[%SYSTEM%]\mppds.dll
[%SYSTEM%]\NVDispDrv.dll
[%WINDOWS%]\mppds.exe
[%WINDOWS%]\NVDispDrv.exe
[%PROFILE%]\Temp\zts0.dll
[%PROFILE_TEMP%]\mhs0.dll
[%PROFILE_TEMP%]\mhs2.dll
[%PROFILE_TEMP%]\mhs2.exe
[%PROFILE_TEMP%]\mhso.exe
[%PROFILE_TEMP%]\mhso0.dll
[%PROFILE_TEMP%]\RavMonD.exe
[%PROFILE_TEMP%]\wgso.exe
[%PROFILE_TEMP%]\wgso0.dll
[%PROFILE_TEMP%]\wlzs.dll
[%PROFILE_TEMP%]\wlzs.exe
[%PROFILE_TEMP%]\zts2.dll
[%PROFILE_TEMP%]\zts2.exe
[%PROGRAM_FILES%]\Internet Explorer\RAVDHMON.DAT
[%PROGRAM_FILES%]\Internet Explorer\RAVDHMON.exe
[%PROGRAM_FILES%]\Internet Explorer\RAVTLMON.DAT
[%PROGRAM_FILES%]\Internet Explorer\RAVTLMON.exe
[%SYSTEM%]\cmdbcs.dll
[%SYSTEM%]\dh2103.dll
[%SYSTEM%]\DiskMan32.dll
[%SYSTEM%]\Kvsc3.dll
[%SYSTEM%]\mh104.dll
[%SYSTEM%]\MOSOU.dll
[%SYSTEM%]\mosou.exe
[%SYSTEM%]\nmhxy.dll
[%SYSTEM%]\nmhxy.exe
[%SYSTEM%]\nwizdh.exe
[%SYSTEM%]\nwiztlbb.dll
[%SYSTEM%]\nwiztlbu.exe
[%SYSTEM%]\nwizwmgjs.dll
[%SYSTEM%]\nwizwmgjs.exe
[%SYSTEM%]\nwizzhuxians.dll
[%SYSTEM%]\nwizzhuxians.exe
[%SYSTEM%]\RAV00AE.DAT
[%SYSTEM%]\RAV00AE.exe
[%SYSTEM%]\RAVMY623.dll
[%SYSTEM%]\upxdnd.dll
[%SYSTEM%]\vbsdaas2.exe
[%SYSTEM%]\WSVBRS.dll
[%SYSTEM%]\wsvbs.dll
[%SYSTEM%]\wsvbs.exe
[%SYSTEM%]\xk1s0.dll
[%WINDOWS%]\cmdbcs.exe
[%WINDOWS%]\DiskMan32.exe
[%WINDOWS%]\Kvsc3.exe
[%WINDOWS%]\mhs3.exe
[%WINDOWS%]\upxdnd.exe
[%WINDOWS%]\wsvbs.exe
[%WINDOWS%]\zts3.exe
[%PROFILE_TEMP%]\woso.exe
[%PROFILE_TEMP%]\woso0.dll
[%PROFILE_TEMP%]\ztso.exe
[%PROFILE_TEMP%]\ztso0.dll
[%SYSTEM%]\dllhost32.exe
[%SYSTEM%]\mppds.dll
[%SYSTEM%]\NVDispDrv.dll
[%WINDOWS%]\mppds.exe
[%WINDOWS%]\NVDispDrv.exe
[%PROFILE%]\Temp\zts0.dll
[%PROFILE_TEMP%]\mhs0.dll
[%PROFILE_TEMP%]\mhs2.dll
[%PROFILE_TEMP%]\mhs2.exe
[%PROFILE_TEMP%]\mhso.exe
[%PROFILE_TEMP%]\mhso0.dll
[%PROFILE_TEMP%]\RavMonD.exe
[%PROFILE_TEMP%]\wgso.exe
[%PROFILE_TEMP%]\wgso0.dll
[%PROFILE_TEMP%]\wlzs.dll
[%PROFILE_TEMP%]\wlzs.exe
[%PROFILE_TEMP%]\zts2.dll
[%PROFILE_TEMP%]\zts2.exe
[%PROGRAM_FILES%]\Internet Explorer\RAVDHMON.DAT
[%PROGRAM_FILES%]\Internet Explorer\RAVDHMON.exe
[%PROGRAM_FILES%]\Internet Explorer\RAVTLMON.DAT
[%PROGRAM_FILES%]\Internet Explorer\RAVTLMON.exe
[%SYSTEM%]\cmdbcs.dll
[%SYSTEM%]\dh2103.dll
[%SYSTEM%]\DiskMan32.dll
[%SYSTEM%]\Kvsc3.dll
[%SYSTEM%]\mh104.dll
[%SYSTEM%]\MOSOU.dll
[%SYSTEM%]\mosou.exe
[%SYSTEM%]\nmhxy.dll
[%SYSTEM%]\nmhxy.exe
[%SYSTEM%]\nwizdh.exe
[%SYSTEM%]\nwiztlbb.dll
[%SYSTEM%]\nwiztlbu.exe
[%SYSTEM%]\nwizwmgjs.dll
[%SYSTEM%]\nwizwmgjs.exe
[%SYSTEM%]\nwizzhuxians.dll
[%SYSTEM%]\nwizzhuxians.exe
[%SYSTEM%]\RAV00AE.DAT
[%SYSTEM%]\RAV00AE.exe
[%SYSTEM%]\RAVMY623.dll
[%SYSTEM%]\upxdnd.dll
[%SYSTEM%]\vbsdaas2.exe
[%SYSTEM%]\WSVBRS.dll
[%SYSTEM%]\wsvbs.dll
[%SYSTEM%]\wsvbs.exe
[%SYSTEM%]\xk1s0.dll
[%WINDOWS%]\cmdbcs.exe
[%WINDOWS%]\DiskMan32.exe
[%WINDOWS%]\Kvsc3.exe
[%WINDOWS%]\mhs3.exe
[%WINDOWS%]\upxdnd.exe
[%WINDOWS%]\wsvbs.exe
[%WINDOWS%]\zts3.exe

Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{5ff01121-f04d-30cf-64cd-74ff5fe1cf1c}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{6a202101-f04d-11cf-64cd-31ff5fe1cf20}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{77709117-a10d-41cf-64cd-51ff5fe1cf41}
HKEY_LOCAL_MACHINE\software\microsoft\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Frethog:

An up-to-date copy of ExterminateIt should detect and prevent infection from Frethog.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Frethog manually.

To completely manually remove Frethog malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Frethog.

  1. Use Task Manager to terminate the Frethog process.
  2. Delete the original Frethog file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Frethog from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Frethog!


Also Be Aware of the Following Threats:
Bancos.GRO Trojan Information
Pigeon.AVOI Trojan Cleaner
Loadwin.exe Trojan Symptoms
Pigeon.ADY Trojan Symptoms
Boot.IIB.Build RAT Removal instruction

JS.MS07 Trojan

JS.MS07 malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing JS.MS07:

An up-to-date copy of ExterminateIt should detect and prevent infection from JS.MS07.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove JS.MS07 manually.

To completely manually remove JS.MS07 malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with JS.MS07.

  1. Use Task Manager to terminate the JS.MS07 process.
  2. Delete the original JS.MS07 file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes JS.MS07 from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of JS.MS07!


Also Be Aware of the Following Threats:
Pigeon.ERM Trojan Symptoms
Removing DEO Backdoor
Pigeon.AQK Trojan Symptoms
Remove Bancos.FXB Trojan
Boot.IIB.Build RAT Symptoms

Rotcev Trojan

Rotcev malware description and removal detail
Categories:Trojan
Visible Symptoms:
Files in system folders:
[%SYSTEM%]\adodbc.exe
[%SYSTEM%]\adodbc.exe

In order to ensure that the Rotcev is launched automatically each time the system is booted, the Rotcev adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%SYSTEM%]\adodbc.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Rotcev:

Files:
[%SYSTEM%]\adodbc.exe
[%SYSTEM%]\adodbc.exe

Removing Rotcev:

An up-to-date copy of ExterminateIt should detect and prevent infection from Rotcev.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Rotcev manually.

To completely manually remove Rotcev malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Rotcev.

  1. Use Task Manager to terminate the Rotcev process.
  2. Delete the original Rotcev file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Rotcev from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Rotcev!


Also Be Aware of the Following Threats:
Remove CmjSpy Trojan
Tular Trojan Removal
Pornuven Downloader Symptoms
Bancos.FXB Trojan Removal instruction
Remove Pigeon.ADY Trojan

Begemot Trojan

Begemot malware description and removal detail
Categories:Trojan,Backdoor,Downloader,DoS
Also known as:

[Kaspersky]Win95.Begemot;
[McAfee]W32/Begemot;
[F-Prot]W32/Begemont.4318,security risk or a "backdoor" program;
[Panda]W95/Begemont.A;
[Computer Associates]Win98.Begemot.8192

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Begemot:

An up-to-date copy of ExterminateIt should detect and prevent infection from Begemot.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Begemot manually.

To completely manually remove Begemot malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Begemot.

  1. Use Task Manager to terminate the Begemot process.
  2. Delete the original Begemot file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Begemot from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Begemot!


Also Be Aware of the Following Threats:
WordMacro.Over.B:intended Trojan Information
Removing Win32.Runner.SE!Trojan Trojan
Removing Pornuven Downloader
Removing CWSMeup.E Trojan
Bancos.IBL Trojan Cleaner

Pigeon.ELQ Trojan

Pigeon.ELQ malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.ELQ:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.ELQ.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.ELQ manually.

To completely manually remove Pigeon.ELQ malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.ELQ.

  1. Use Task Manager to terminate the Pigeon.ELQ process.
  2. Delete the original Pigeon.ELQ file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.ELQ from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.ELQ!


Also Be Aware of the Following Threats:
RaxSearch Adware Cleaner
Vxidl.BFC Trojan Symptoms
SillyDl.DFA Trojan Information
Pigeon.DSI Trojan Removal
ELF.Chsh.30!Rootkit!Trojan Trojan Cleaner

Small.Big.Brother.2b1 Trojan

Small.Big.Brother.2b1 malware description and removal detail
Categories:Trojan,Backdoor,RAT
Also known as:

[Kaspersky]Backdoor.SmallBigBrother;
[Eset]Win32/SmallBigBrother.02b1.Server trojan;
[McAfee]BackDoor-WV;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/SB_Brother.02b;
[Computer Associates]Backdoor/SmallBigBrother.02b1!Se

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Small.Big.Brother.2b1:

An up-to-date copy of ExterminateIt should detect and prevent infection from Small.Big.Brother.2b1.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Small.Big.Brother.2b1 manually.

To completely manually remove Small.Big.Brother.2b1 malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Small.Big.Brother.2b1.

  1. Use Task Manager to terminate the Small.Big.Brother.2b1 process.
  2. Delete the original Small.Big.Brother.2b1 file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Small.Big.Brother.2b1 from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Small.Big.Brother.2b1!


Also Be Aware of the Following Threats:
Pigeon.EYJ Trojan Information
Agent.fn Downloader Information
Pigeon.EPL Trojan Cleaner
Cool Trojan Information
Pigeon.AVW Trojan Information

InternetBillingSolution Adware

InternetBillingSolution malware description and removal detail
Categories:Adware,BHO,Toolbar

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting InternetBillingSolution:

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{00000185-b716-11d3-92f3-00d0b709a7d8}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{00000185-b716-11d3-92f3-00d0b709a7d8}
HKEY_LOCAL_MACHINE\software\classes\clsid\{00000185-b716-11d3-92f3-00d0b709a7d8}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{00000185-b716-11d3-92f3-00d0b709a7d8}

Removing InternetBillingSolution:

An up-to-date copy of ExterminateIt should detect and prevent infection from InternetBillingSolution.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove InternetBillingSolution manually.

To completely manually remove InternetBillingSolution malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with InternetBillingSolution.

  1. Use Task Manager to terminate the InternetBillingSolution process.
  2. Delete the original InternetBillingSolution file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes InternetBillingSolution from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of InternetBillingSolution!


Also Be Aware of the Following Threats:
primaryads.com Tracking Cookie Symptoms
RaxSearch Adware Cleaner
Stub BHO Information
Breath.of.Death Trojan Removal
Pigeon.DSI Trojan Symptoms

TribuneInteractive Tracking Cookie

TribuneInteractive malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing TribuneInteractive:

An up-to-date copy of ExterminateIt should detect and prevent infection from TribuneInteractive.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove TribuneInteractive manually.

To completely manually remove TribuneInteractive malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with TribuneInteractive.

  1. Use Task Manager to terminate the TribuneInteractive process.
  2. Delete the original TribuneInteractive file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes TribuneInteractive from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of TribuneInteractive!


Also Be Aware of the Following Threats:
Remove VBS.Atomic Trojan
Sweet.Heart.Yesterday Backdoor Cleaner
Remove Inwin Trojan
IRCBot.VR Worm Removal
Game Trojan Removal

Dluca.gen Downloader

Dluca.gen malware description and removal detail
Categories:Downloader
Visible Symptoms:
Files in system folders:
[%SYSTEM%]\gwmpivue.exe
[%SYSTEM%]\kmrptame.exe
[%SYSTEM%]\msgb1.exe
[%SYSTEM%]\gwmpivue.exe
[%SYSTEM%]\kmrptame.exe
[%SYSTEM%]\msgb1.exe

In order to ensure that the Dluca.gen is launched automatically each time the system is booted, the Dluca.gen adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%SYSTEM%]\gwmpivue.exe
[%SYSTEM%]\kmrptame.exe
[%SYSTEM%]\msgb1.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Dluca.gen:

Files:
[%SYSTEM%]\gwmpivue.exe
[%SYSTEM%]\kmrptame.exe
[%SYSTEM%]\msgb1.exe
[%SYSTEM%]\gwmpivue.exe
[%SYSTEM%]\kmrptame.exe
[%SYSTEM%]\msgb1.exe

Removing Dluca.gen:

An up-to-date copy of ExterminateIt should detect and prevent infection from Dluca.gen.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Dluca.gen manually.

To completely manually remove Dluca.gen malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Dluca.gen.

  1. Use Task Manager to terminate the Dluca.gen process.
  2. Delete the original Dluca.gen file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Dluca.gen from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Dluca.gen!


Also Be Aware of the Following Threats:
Backdoor.Millenium.VB!Server Backdoor Removal
Bancos.IBL Trojan Removal
Removing TradeExit Adware
Boot.IIB.Build RAT Information
Remove LMZ Trojan

Zetronic RAT

Zetronic malware description and removal detail
Categories:RAT

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Zetronic:

An up-to-date copy of ExterminateIt should detect and prevent infection from Zetronic.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Zetronic manually.

To completely manually remove Zetronic malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Zetronic.

  1. Use Task Manager to terminate the Zetronic process.
  2. Delete the original Zetronic file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Zetronic from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Zetronic!


Also Be Aware of the Following Threats:
VBS.Atomic Trojan Symptoms
Pigeon.AVTI Trojan Information
Pigeon.EMV Trojan Removal instruction
Vxidl.AIA Trojan Symptoms
Rotate Trojan Removal

AOHade Trojan

AOHade malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing AOHade:

An up-to-date copy of ExterminateIt should detect and prevent infection from AOHade.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove AOHade manually.

To completely manually remove AOHade malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with AOHade.

  1. Use Task Manager to terminate the AOHade process.
  2. Delete the original AOHade file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes AOHade from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of AOHade!


Also Be Aware of the Following Threats:
Removing Win32.Runner.SE!Trojan Trojan
Removing Vxidl.AKX Trojan
Removing Deggoo Trojan
Pigeon.AQM Trojan Removal instruction
Spy.Win32.BZub Trojan Removal

MBKWBar Toolbar

MBKWBar malware description and removal detail
Categories:Toolbar
Visible Symptoms:
Files in system folders:
[%PROFILE_TEMP%]\mbkwnst.exe
[%PROFILE_TEMP%]\mbkwnst.inf
[%WINDOWS%]\mbkwnst.exe
[%PROFILE_TEMP%]\mbkwnst.exe
[%PROFILE_TEMP%]\mbkwnst.inf
[%WINDOWS%]\mbkwnst.exe

In order to ensure that the MBKWBar is launched automatically each time the system is booted, the MBKWBar adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%PROFILE_TEMP%]\mbkwnst.exe
[%WINDOWS%]\mbkwnst.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting MBKWBar:

Files:
[%PROFILE_TEMP%]\mbkwnst.exe
[%PROFILE_TEMP%]\mbkwnst.inf
[%WINDOWS%]\mbkwnst.exe
[%PROFILE_TEMP%]\mbkwnst.exe
[%PROFILE_TEMP%]\mbkwnst.inf
[%WINDOWS%]\mbkwnst.exe

Folders:
[%PROGRAM_FILES%]\mbkwbar

Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{EA5A82FB-D6BE-44F9-9363-B1ABABC153C1}
HKEY_CLASSES_ROOT\ietoolbar.toolbarimpl
HKEY_CLASSES_ROOT\ietoolbar.toolbarimpl.1
HKEY_CLASSES_ROOT\typelib\{4a7dba74-e729-4ec8-92e2-ffd83921449f}
HKEY_CURRENT_USER\software\mbkwbar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\mbkwbar
HKEY_CLASSES_ROOT\clsid\{ea5a82fb-d6be-44f9-9363-b1ababc153c1}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar\{ea5a82fb-d6be-44f9-9363-b1ababc153c1}

Removing MBKWBar:

An up-to-date copy of ExterminateIt should detect and prevent infection from MBKWBar.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove MBKWBar manually.

To completely manually remove MBKWBar malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with MBKWBar.

  1. Use Task Manager to terminate the MBKWBar process.
  2. Delete the original MBKWBar file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes MBKWBar from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of MBKWBar!


Also Be Aware of the Following Threats:
Backdoor.Prorat Backdoor Information
KissThis Trojan Symptoms
Remove Backdoor.BAC.dll Backdoor
Removing QLowZones Trojan
Removing VBS.Atomic Trojan

Loadwin.exe Trojan

Loadwin.exe malware description and removal detail
Categories:Trojan
Visible Symptoms:
Files in system folders:
[%SYSTEM%]\sldrv.dll
[%WINDOWS%]\system\loadwin.exe
[%SYSTEM%]\sldrv.dll
[%WINDOWS%]\system\loadwin.exe

In order to ensure that the Loadwin.exe is launched automatically each time the system is booted, the Loadwin.exe adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%WINDOWS%]\system\loadwin.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Loadwin.exe:

Files:
[%SYSTEM%]\sldrv.dll
[%WINDOWS%]\system\loadwin.exe
[%SYSTEM%]\sldrv.dll
[%WINDOWS%]\system\loadwin.exe

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Loadwin.exe:

An up-to-date copy of ExterminateIt should detect and prevent infection from Loadwin.exe.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Loadwin.exe manually.

To completely manually remove Loadwin.exe malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Loadwin.exe.

  1. Use Task Manager to terminate the Loadwin.exe process.
  2. Delete the original Loadwin.exe file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Loadwin.exe from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Loadwin.exe!


Also Be Aware of the Following Threats:
ZippyLookup Toolbar Removal instruction
EZSearching BHO Symptoms
Backdoor.Millenium.VB!Server Backdoor Removal instruction
Mywebcam Trojan Symptoms
Removing Pigeon.ALE Trojan

Kilamp Trojan

Kilamp malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Kilamp:

An up-to-date copy of ExterminateIt should detect and prevent infection from Kilamp.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Kilamp manually.

To completely manually remove Kilamp malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Kilamp.

  1. Use Task Manager to terminate the Kilamp process.
  2. Delete the original Kilamp file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Kilamp from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Kilamp!


Also Be Aware of the Following Threats:
Win32.Exploit.SQLexp Trojan Cleaner
Pigeon.AZH Trojan Removal
Bionet.19b Trojan Symptoms
Removing SillyDl.CYJ Trojan
Remove Breath.of.Death Trojan

NetTracker Trojan

NetTracker malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing NetTracker:

An up-to-date copy of ExterminateIt should detect and prevent infection from NetTracker.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove NetTracker manually.

To completely manually remove NetTracker malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with NetTracker.

  1. Use Task Manager to terminate the NetTracker process.
  2. Delete the original NetTracker file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes NetTracker from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of NetTracker!


Also Be Aware of the Following Threats:
TheRapist Trojan Removal
IRCBot.VR Worm Information
Removing Small.ek Downloader
Bancos.AKA Trojan Information
Removing TradeExit Adware

EZSearching BHO

EZSearching malware description and removal detail
Categories:BHO,Toolbar
Visible Symptoms:
Files in system folders:
[%SYSTEM%]\ctap7.dll
[%SYSTEM%]\ctavp3.dll
[%SYSTEM%]\ctavp5.dll
[%SYSTEM%]\psic1.dll
[%SYSTEM%]\ctav3.dll
[%SYSTEM%]\ctsr2.dll
[%SYSTEM%]\testadit.dll
[%SYSTEM%]\testadit3.dll
[%WINDOWS%]\system\ctap7.dll
[%WINDOWS%]\system\ctav3.dll
[%WINDOWS%]\system\ctavp3.dll
[%WINDOWS%]\system\ctavp5.dll
[%WINDOWS%]\system\ctsr2.dll
[%WINDOWS%]\system\psic1.dll
[%WINDOWS%]\system\testadit.dll
[%WINDOWS%]\system\testadit3.dll
[%SYSTEM%]\ctap7.dll
[%SYSTEM%]\ctavp3.dll
[%SYSTEM%]\ctavp5.dll
[%SYSTEM%]\psic1.dll
[%SYSTEM%]\ctav3.dll
[%SYSTEM%]\ctsr2.dll
[%SYSTEM%]\testadit.dll
[%SYSTEM%]\testadit3.dll
[%WINDOWS%]\system\ctap7.dll
[%WINDOWS%]\system\ctav3.dll
[%WINDOWS%]\system\ctavp3.dll
[%WINDOWS%]\system\ctavp5.dll
[%WINDOWS%]\system\ctsr2.dll
[%WINDOWS%]\system\psic1.dll
[%WINDOWS%]\system\testadit.dll
[%WINDOWS%]\system\testadit3.dll

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting EZSearching:

Files:
[%SYSTEM%]\ctap7.dll
[%SYSTEM%]\ctavp3.dll
[%SYSTEM%]\ctavp5.dll
[%SYSTEM%]\psic1.dll
[%SYSTEM%]\ctav3.dll
[%SYSTEM%]\ctsr2.dll
[%SYSTEM%]\testadit.dll
[%SYSTEM%]\testadit3.dll
[%WINDOWS%]\system\ctap7.dll
[%WINDOWS%]\system\ctav3.dll
[%WINDOWS%]\system\ctavp3.dll
[%WINDOWS%]\system\ctavp5.dll
[%WINDOWS%]\system\ctsr2.dll
[%WINDOWS%]\system\psic1.dll
[%WINDOWS%]\system\testadit.dll
[%WINDOWS%]\system\testadit3.dll
[%SYSTEM%]\ctap7.dll
[%SYSTEM%]\ctavp3.dll
[%SYSTEM%]\ctavp5.dll
[%SYSTEM%]\psic1.dll
[%SYSTEM%]\ctav3.dll
[%SYSTEM%]\ctsr2.dll
[%SYSTEM%]\testadit.dll
[%SYSTEM%]\testadit3.dll
[%WINDOWS%]\system\ctap7.dll
[%WINDOWS%]\system\ctav3.dll
[%WINDOWS%]\system\ctavp3.dll
[%WINDOWS%]\system\ctavp5.dll
[%WINDOWS%]\system\ctsr2.dll
[%WINDOWS%]\system\psic1.dll
[%WINDOWS%]\system\testadit.dll
[%WINDOWS%]\system\testadit3.dll

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{2f24b54d-3a27-11d8-8169-00c02623048a}
HKEY_CLASSES_ROOT\clsid\{34d516ea-40e3-4e3b-8ba8-505112738ed5}
HKEY_CLASSES_ROOT\clsid\{4b021269-dd24-48b2-96b4-da121e9c0502}
HKEY_CLASSES_ROOT\clsid\{858126b0-3708-4051-ae8e-b48521401ca2}
HKEY_CLASSES_ROOT\clsid\{8db672bd-330f-11d8-8168-00c02623048a}
HKEY_CLASSES_ROOT\clsid\{b418b139-414d-4374-820f-ee74520c5a0d}
HKEY_CLASSES_ROOT\clsid\{b6598677-4b54-42a9-ba67-8b64e3fcd92d}
HKEY_CLASSES_ROOT\clsid\{db0018a2-f7d9-4b71-9651-640143df23f9}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{2f24b54d-3a27-11d8-8169-00c02623048a}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{34d516ea-40e3-4e3b-8ba8-505112738ed5}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{4b021269-dd24-48b2-96b4-da121e9c0502}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{858126b0-3708-4051-ae8e-b48521401ca2}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{8db672bd-330f-11d8-8168-00c02623048a}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{b6598677-4b54-42a9-ba67-8b64e3fcd92d}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{db0018a2-f7d9-4b71-9651-640143df23f9}
HKEY_LOCAL_MACHINE\software\classes\clsid\{2f24b54d-3a27-11d8-8169-00c02623048a}
HKEY_LOCAL_MACHINE\software\classes\clsid\{34d516ea-40e3-4e3b-8ba8-505112738ed5}
HKEY_LOCAL_MACHINE\software\classes\clsid\{4b021269-dd24-48b2-96b4-da121e9c0502}
HKEY_LOCAL_MACHINE\software\classes\clsid\{858126b0-3708-4051-ae8e-b48521401ca2}
HKEY_LOCAL_MACHINE\software\classes\clsid\{8db672bd-330f-11d8-8168-00c02623048a}
HKEY_LOCAL_MACHINE\software\classes\clsid\{b418b139-414d-4374-820f-ee74520c5a0d}
HKEY_LOCAL_MACHINE\software\classes\clsid\{b6598677-4b54-42a9-ba67-8b64e3fcd92d}
HKEY_LOCAL_MACHINE\software\classes\clsid\{db0018a2-f7d9-4b71-9651-640143df23f9}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{2f24b54d-3a27-11d8-8169-00c02623048a}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{34d516ea-40e3-4e3b-8ba8-505112738ed5}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{4b021269-dd24-48b2-96b4-da121e9c0502}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{858126b0-3708-4051-ae8e-b48521401ca2}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{8db672bd-330f-11d8-8168-00c02623048a}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{b6598677-4b54-42a9-ba67-8b64e3fcd92d}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{db0018a2-f7d9-4b71-9651-640143df23f9}

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar

Removing EZSearching:

An up-to-date copy of ExterminateIt should detect and prevent infection from EZSearching.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove EZSearching manually.

To completely manually remove EZSearching malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with EZSearching.

  1. Use Task Manager to terminate the EZSearching process.
  2. Delete the original EZSearching file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes EZSearching from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of EZSearching!


Also Be Aware of the Following Threats:
Remove HumanClick Tracking Cookie
Bancos.GRO Trojan Removal
Tular Trojan Removal
Remove Pigeon.AQM Trojan
Remove Lookup.Absnro Hijacker

DontRun Trojan

DontRun malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]Trojan.DontRun.a;
[F-Prot]destructive program;
[Panda]Trj/dontrun.a,Trj/Dontrun;
[Computer Associates]DontRun!Trojan,Dontrun.B!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing DontRun:

An up-to-date copy of ExterminateIt should detect and prevent infection from DontRun.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove DontRun manually.

To completely manually remove DontRun malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with DontRun.

  1. Use Task Manager to terminate the DontRun process.
  2. Delete the original DontRun file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes DontRun from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of DontRun!


Also Be Aware of the Following Threats:
Removing ZippyLookup Toolbar
Whazit BHO Removal instruction
Predator Trojan Information
Tular Trojan Symptoms
KissThis Trojan Removal