Thursday, December 4, 2008

TrojanDownloader.Win32.Agent.af Trojan

TrojanDownloader.Win32.Agent.af malware description and removal detail
Categories:Trojan,Downloader
Also known as:

[Panda]Trj/Downloader.NT

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\sr.dll
[%WINDOWS%]\sr.dll

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting TrojanDownloader.Win32.Agent.af:

Files:
[%WINDOWS%]\sr.dll
[%WINDOWS%]\sr.dll

Removing TrojanDownloader.Win32.Agent.af:

An up-to-date copy of ExterminateIt should detect and prevent infection from TrojanDownloader.Win32.Agent.af.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove TrojanDownloader.Win32.Agent.af manually.

To completely manually remove TrojanDownloader.Win32.Agent.af malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with TrojanDownloader.Win32.Agent.af.

  1. Use Task Manager to terminate the TrojanDownloader.Win32.Agent.af process.
  2. Delete the original TrojanDownloader.Win32.Agent.af file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes TrojanDownloader.Win32.Agent.af from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of TrojanDownloader.Win32.Agent.af!


Also Be Aware of the Following Threats:
Remove Desktop.Advisor Spyware
Removing Bancos.GJH Trojan
Small.abd Downloader Symptoms

Bat.tf Trojan

Bat.tf malware description and removal detail
Categories:Trojan
Also known as:

[McAfee]Bat/tf;
[Panda]Trojan Horse.LC;
[Computer Associates]BAT.Nonstop.A,Bat/Lameness!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bat.tf:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bat.tf.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bat.tf manually.

To completely manually remove Bat.tf malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bat.tf.

  1. Use Task Manager to terminate the Bat.tf process.
  2. Delete the original Bat.tf file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bat.tf from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bat.tf!


Also Be Aware of the Following Threats:
Remove Browser.Enhancement BHO
VRL50388 Trojan Cleaner
Key.Generator Backdoor Removal

Badbot Trojan

Badbot malware description and removal detail
Categories:Trojan,Backdoor,RAT
Also known as:

[Kaspersky]Backdoor.Badbot;
[Eset]Win32/BadBot.10 trojan;
[McAfee]BackDoor-AQU;
[F-Prot]security risk or a "backdoor" program;
[Computer Associates]Win32.Badbot.20,Win32/BadBot.Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Badbot:

An up-to-date copy of ExterminateIt should detect and prevent infection from Badbot.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Badbot manually.

To completely manually remove Badbot malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Badbot.

  1. Use Task Manager to terminate the Badbot process.
  2. Delete the original Badbot file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Badbot from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Badbot!


Also Be Aware of the Following Threats:
Remove Cidra Trojan
Remote.Interactive.Command Backdoor Cleaner
Cracking.Tool Trojan Cleaner
Vxidl.AUV Trojan Removal

Pigeon.ENT Trojan

Pigeon.ENT malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.ENT:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.ENT.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.ENT manually.

To completely manually remove Pigeon.ENT malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.ENT.

  1. Use Task Manager to terminate the Pigeon.ENT process.
  2. Delete the original Pigeon.ENT file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.ENT from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.ENT!


Also Be Aware of the Following Threats:
Zlob.cu Downloader Information
Removing PWS.Hooker.dll Trojan

Win32.ac Adware

Win32.ac malware description and removal detail
Categories:Adware
Also known as:

[Panda]Dialer.Gen

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Win32.ac:

An up-to-date copy of ExterminateIt should detect and prevent infection from Win32.ac.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Win32.ac manually.

To completely manually remove Win32.ac malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Win32.ac.

  1. Use Task Manager to terminate the Win32.ac process.
  2. Delete the original Win32.ac file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Win32.ac from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Win32.ac!


Also Be Aware of the Following Threats:
WordMacro.Dark Trojan Information
Vanti Trojan Cleaner

DSK.WebDownloader Trojan

DSK.WebDownloader malware description and removal detail
Categories:Trojan,Downloader
Also known as:

[Kaspersky]TrojanDownloader.Win32.Small.aj;
[Panda]Trojan Horse

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing DSK.WebDownloader:

An up-to-date copy of ExterminateIt should detect and prevent infection from DSK.WebDownloader.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove DSK.WebDownloader manually.

To completely manually remove DSK.WebDownloader malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with DSK.WebDownloader.

  1. Use Task Manager to terminate the DSK.WebDownloader process.
  2. Delete the original DSK.WebDownloader file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes DSK.WebDownloader from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of DSK.WebDownloader!


Also Be Aware of the Following Threats:
Vxidl.BFV Trojan Removal
TMouse Trojan Removal
Bancos.HKA Trojan Removal
Energy.Josua.HLLP Trojan Cleaner
Veevo BHO Removal instruction

PayCounter.com Tracking Cookie

PayCounter.com malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing PayCounter.com:

An up-to-date copy of ExterminateIt should detect and prevent infection from PayCounter.com.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove PayCounter.com manually.

To completely manually remove PayCounter.com malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with PayCounter.com.

  1. Use Task Manager to terminate the PayCounter.com process.
  2. Delete the original PayCounter.com file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes PayCounter.com from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of PayCounter.com!


Also Be Aware of the Following Threats:
riversoft Adware Removal instruction
Java.KBD Backdoor Symptoms
insitemetrics.com Tracking Cookie Cleaner

FlashEnhancer Adware

FlashEnhancer malware description and removal detail
Categories:Adware

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting FlashEnhancer:

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{7cd20e91-1f31-41da-8379-479ea31df969}
HKEY_CLASSES_ROOT\clsid\{d7e588ab-a5d9-4422-b313-22a3470f9700}
HKEY_CLASSES_ROOT\unawareobj.unawareobj
HKEY_CLASSES_ROOT\unawareobj.unawareobj.1

Registry Values:
HKEY_CLASSES_ROOT\interface\{28168cce-5310-4f12-ab58-9da99a55aaeb}\typelib
HKEY_CLASSES_ROOT\interface\{890089b7-b385-442f-97b6-99060e8bd08f}\typelib
HKEY_LOCAL_MACHINE\software\ftk
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonce
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonce

Removing FlashEnhancer:

An up-to-date copy of ExterminateIt should detect and prevent infection from FlashEnhancer.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove FlashEnhancer manually.

To completely manually remove FlashEnhancer malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with FlashEnhancer.

  1. Use Task Manager to terminate the FlashEnhancer process.
  2. Delete the original FlashEnhancer file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes FlashEnhancer from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of FlashEnhancer!


Also Be Aware of the Following Threats:
Remove Skun Backdoor
Remove Adroar Adware
BackDoor.CRR Trojan Removal instruction
Bancos.HXS Trojan Information
Remove Bancos.FWB Trojan

VirusProtect Ransomware

VirusProtect malware description and removal detail
Categories:Ransomware
Visible Symptoms:
Files in system folders:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusProtect 3.8.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusProtect 3.9.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusProtectPro 3.6.lnk
[%DESKTOP%]\VirusProtect 3.8.lnk
[%DESKTOP%]\VirusProtect 3.9.lnk
[%DESKTOP%]\VirusProtectPro 3.6.lnk
[%PROFILE_TEMP%]\VPPLanguage.ini
[%PROGRAM_FILES%]\VirusProtect 3.8\VirusProtect 3.8.exe
[%PROGRAM_FILES%]\VirusProtect 3.9\VirusProtect 3.9.exe
[%PROGRAM_FILES%]\VirusProtectPro 3.6\VirusProtectPro 3.6.exe
[%STARTMENU%]\VirusProtect 3.8.lnk
[%STARTMENU%]\VirusProtect 3.9.lnk
[%STARTMENU%]\VirusProtectPro 3.6.lnk
[%DESKTOP%]\Vids\setup.exe
[%DESKTOP%]\VirusProtect 3.8.lnk
[%DESKTOP%]\VirusProtect 3.9.lnk
[%PROGRAM_FILES%]\Helper\webfindsite.dll
[%SYSTEM%]\ncrjf.dll
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusProtect 3.8.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusProtect 3.9.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusProtectPro 3.6.lnk
[%DESKTOP%]\VirusProtect 3.8.lnk
[%DESKTOP%]\VirusProtect 3.9.lnk
[%DESKTOP%]\VirusProtectPro 3.6.lnk
[%PROFILE_TEMP%]\VPPLanguage.ini
[%PROGRAM_FILES%]\VirusProtect 3.8\VirusProtect 3.8.exe
[%PROGRAM_FILES%]\VirusProtect 3.9\VirusProtect 3.9.exe
[%PROGRAM_FILES%]\VirusProtectPro 3.6\VirusProtectPro 3.6.exe
[%STARTMENU%]\VirusProtect 3.8.lnk
[%STARTMENU%]\VirusProtect 3.9.lnk
[%STARTMENU%]\VirusProtectPro 3.6.lnk
[%DESKTOP%]\Vids\setup.exe
[%DESKTOP%]\VirusProtect 3.8.lnk
[%DESKTOP%]\VirusProtect 3.9.lnk
[%PROGRAM_FILES%]\Helper\webfindsite.dll
[%SYSTEM%]\ncrjf.dll

In order to ensure that the VirusProtect is launched automatically each time the system is booted, the VirusProtect adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%PROGRAM_FILES%]\VirusProtect 3.8\VirusProtect 3.8.exe
[%PROGRAM_FILES%]\VirusProtect 3.9\VirusProtect 3.9.exe
[%PROGRAM_FILES%]\VirusProtectPro 3.6\VirusProtectPro 3.6.exe
[%DESKTOP%]\Vids\setup.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting VirusProtect:

Files:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusProtect 3.8.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusProtect 3.9.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusProtectPro 3.6.lnk
[%DESKTOP%]\VirusProtect 3.8.lnk
[%DESKTOP%]\VirusProtect 3.9.lnk
[%DESKTOP%]\VirusProtectPro 3.6.lnk
[%PROFILE_TEMP%]\VPPLanguage.ini
[%PROGRAM_FILES%]\VirusProtect 3.8\VirusProtect 3.8.exe
[%PROGRAM_FILES%]\VirusProtect 3.9\VirusProtect 3.9.exe
[%PROGRAM_FILES%]\VirusProtectPro 3.6\VirusProtectPro 3.6.exe
[%STARTMENU%]\VirusProtect 3.8.lnk
[%STARTMENU%]\VirusProtect 3.9.lnk
[%STARTMENU%]\VirusProtectPro 3.6.lnk
[%DESKTOP%]\Vids\setup.exe
[%DESKTOP%]\VirusProtect 3.8.lnk
[%DESKTOP%]\VirusProtect 3.9.lnk
[%PROGRAM_FILES%]\Helper\webfindsite.dll
[%SYSTEM%]\ncrjf.dll
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusProtect 3.8.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusProtect 3.9.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusProtectPro 3.6.lnk
[%DESKTOP%]\VirusProtect 3.8.lnk
[%DESKTOP%]\VirusProtect 3.9.lnk
[%DESKTOP%]\VirusProtectPro 3.6.lnk
[%PROFILE_TEMP%]\VPPLanguage.ini
[%PROGRAM_FILES%]\VirusProtect 3.8\VirusProtect 3.8.exe
[%PROGRAM_FILES%]\VirusProtect 3.9\VirusProtect 3.9.exe
[%PROGRAM_FILES%]\VirusProtectPro 3.6\VirusProtectPro 3.6.exe
[%STARTMENU%]\VirusProtect 3.8.lnk
[%STARTMENU%]\VirusProtect 3.9.lnk
[%STARTMENU%]\VirusProtectPro 3.6.lnk
[%DESKTOP%]\Vids\setup.exe
[%DESKTOP%]\VirusProtect 3.8.lnk
[%DESKTOP%]\VirusProtect 3.9.lnk
[%PROGRAM_FILES%]\Helper\webfindsite.dll
[%SYSTEM%]\ncrjf.dll

Folders:
[%PROGRAMS%]\VirusProtect 3.8
[%PROGRAMS%]\VirusProtect 3.9
[%PROGRAMS%]\VirusProtectPro
[%PROGRAM_FILES%]\VirusProtect 3.8
[%PROGRAM_FILES%]\VirusProtect 3.9
[%PROGRAM_FILES%]\VirusProtectPro 3.3
[%PROGRAM_FILES%]\VirusProtectPro 3.4
[%PROGRAM_FILES%]\VirusProtectPro 3.6
[%PROGRAM_FILES%]\VirusProtectPro 3.7

Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{B7C9058D-0F9C-32C0-83B6-740DFD8A6726}
HKEY_CLASSES_ROOT\Interface\{0BD06CA9-D39D-470C-AD69-40B2D20ED44E}
HKEY_CLASSES_ROOT\Interface\{1FCE299D-2509-4156-8F35-737685DA33D6}
HKEY_CLASSES_ROOT\Interface\{21688E5D-A895-4B60-B127-B76607420334}
HKEY_CLASSES_ROOT\Interface\{40E563B2-61B2-4215-819A-A7E24CF8AA3E}
HKEY_CLASSES_ROOT\Interface\{45FBEFBF-E8B6-44A5-B0A1-A143E1A74816}
HKEY_CLASSES_ROOT\Interface\{477C7CD6-CAAD-43F5-96FB-C8F0F580F7E2}
HKEY_CLASSES_ROOT\Interface\{4A878A6E-E373-4F79-9B72-F6E3B6573FA4}
HKEY_CLASSES_ROOT\Interface\{5146B43E-B36D-4A2A-B617-CC05CC500150}
HKEY_CLASSES_ROOT\Interface\{559FB885-1610-4359-B22F-CE0A0C7B1220}
HKEY_CLASSES_ROOT\Interface\{582ECCC8-C5BC-4EC4-8B0A-40274533088F}
HKEY_CLASSES_ROOT\Interface\{5B8BED0F-5F18-4051-9908-C5C569A1AAE9}
HKEY_CLASSES_ROOT\Interface\{63667718-EBF2-4CAB-B1E8-994D41589C24}
HKEY_CLASSES_ROOT\Interface\{7060E07A-79A7-492E-8716-685840C41D3A}
HKEY_CLASSES_ROOT\Interface\{7D93B305-D932-45FF-B484-B96BAF433B18}
HKEY_CLASSES_ROOT\Interface\{90E25318-2612-48DB-AD52-4D64B1E79368}
HKEY_CLASSES_ROOT\Interface\{91335813-BFA8-493C-9ED5-E76A4F65F093}
HKEY_CLASSES_ROOT\Interface\{972F0BE3-976F-40B8-8EB4-88A25987416E}
HKEY_CLASSES_ROOT\Interface\{9A44471D-1B69-4834-881C-E8E85D198186}
HKEY_CLASSES_ROOT\Interface\{9F80EA2D-53CF-4AA5-A154-F4FBF1EF6A5A}
HKEY_CLASSES_ROOT\Interface\{A35F8FAC-755D-4F90-A5D3-F7E18D9EB100}
HKEY_CLASSES_ROOT\Interface\{A71C08E5-E038-4672-943F-B386DE479944}
HKEY_CLASSES_ROOT\Interface\{B20B249C-97C3-43F4-A560-A2C5239FBC50}
HKEY_CLASSES_ROOT\Interface\{BD94CBD6-0B47-4327-8192-23BA274F7FD3}
HKEY_CLASSES_ROOT\Interface\{C269F4C1-7558-4DFC-9FB6-4C149B482586}
HKEY_CLASSES_ROOT\Interface\{CE92A296-3142-493C-B64E-6ED73EAFB9AE}
HKEY_CLASSES_ROOT\Interface\{D7C0DF6C-91FF-48BD-AD98-E35769394138}
HKEY_CLASSES_ROOT\Interface\{D8EC2704-B249-4495-A7A4-A90857BDDF4D}
HKEY_CLASSES_ROOT\Interface\{D91E9F36-9E44-44AB-803C-0D941FDA7988}
HKEY_CLASSES_ROOT\Interface\{E0757BDD-69BE-4C3F-AFC6-50D6524FA9B6}
HKEY_CLASSES_ROOT\Interface\{F2F8C877-B06C-4B5E-95E7-AACFC9E8219D}
HKEY_CLASSES_ROOT\Interface\{F761F695-FD28-42D3-A669-C3FC8309A6F8}
HKEY_CLASSES_ROOT\Interface\{FE2D4E30-10F9-4F16-B2D9-4D7A02F0AF34}
HKEY_CLASSES_ROOT\multimediaControls.chl
HKEY_CLASSES_ROOT\TypeLib\{3B8E549E-0C73-4AAB-8939-5EA2ED102CC6}
HKEY_CLASSES_ROOT\TypeLib\{D2F6E4C0-349A-4A64-A773-C14661D5A9E4}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B7C9058D-0F9C-32C0-83B6-740DFD8A6726}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{d8b937a4-cdad-497b-a872-8da7c4c3ef6f}
HKEY_LOCAL_MACHINE\Software\Classes\Interface\{21688E5D-A895-4B60-B127-B76607420334}
HKEY_LOCAL_MACHINE\Software\Classes\Interface\{40E563B2-61B2-4215-819A-A7E24CF8AA3E}
HKEY_LOCAL_MACHINE\Software\Classes\Interface\{45FBEFBF-E8B6-44A5-B0A1-A143E1A74816}
HKEY_LOCAL_MACHINE\Software\Classes\Interface\{5146B43E-B36D-4A2A-B617-CC05CC500150}
HKEY_LOCAL_MACHINE\Software\Classes\Interface\{5B8BED0F-5F18-4051-9908-C5C569A1AAE9}
HKEY_LOCAL_MACHINE\Software\Classes\Interface\{63667718-EBF2-4CAB-B1E8-994D41589C24}
HKEY_LOCAL_MACHINE\Software\Classes\Interface\{972F0BE3-976F-40B8-8EB4-88A25987416E}
HKEY_LOCAL_MACHINE\Software\Classes\Interface\{9F80EA2D-53CF-4AA5-A154-F4FBF1EF6A5A}
HKEY_LOCAL_MACHINE\Software\Classes\Interface\{A35F8FAC-755D-4F90-A5D3-F7E18D9EB100}
HKEY_LOCAL_MACHINE\Software\Classes\Interface\{C269F4C1-7558-4DFC-9FB6-4C149B482586}
HKEY_LOCAL_MACHINE\Software\Classes\Interface\{CE92A296-3142-493C-B64E-6ED73EAFB9AE}
HKEY_LOCAL_MACHINE\Software\Classes\Interface\{D7C0DF6C-91FF-48BD-AD98-E35769394138}
HKEY_LOCAL_MACHINE\Software\Classes\Interface\{D8EC2704-B249-4495-A7A4-A90857BDDF4D}
HKEY_LOCAL_MACHINE\Software\Classes\Interface\{D91E9F36-9E44-44AB-803C-0D941FDA7988}
HKEY_LOCAL_MACHINE\Software\Classes\Interface\{E0757BDD-69BE-4C3F-AFC6-50D6524FA9B6}
HKEY_LOCAL_MACHINE\Software\Classes\Interface\{F2F8C877-B06C-4B5E-95E7-AACFC9E8219D}
HKEY_LOCAL_MACHINE\Software\Classes\multimediaControls.chl
HKEY_LOCAL_MACHINE\Software\Classes\TypeLib\{3B8E549E-0C73-4AAB-8939-5EA2ED102CC6}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{D2F6E4C0-349A-4A64-A773-C14661D5A9E4}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{9034A523-D068-4BE8-A284-9DF278BE776E}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\VirusProtect 3.8.exe 3.8
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\VirusProtect 3.9.exe 3.9
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\VirusProtect 3.8
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\VirusProtect 3.9
HKEY_LOCAL_MACHINE\SOFTWARE\VirusProtect 3.8
HKEY_LOCAL_MACHINE\SOFTWARE\VirusProtect 3.9
HKEY_CLASSES_ROOT\clsid\{075a465d-0af2-4b79-8db3-2fda0fd8d74c}
HKEY_CLASSES_ROOT\clsid\{8b87dcc7-9b89-4205-aa82-076b2a1edfe0}
HKEY_CLASSES_ROOT\clsid\{b7c9058d-0f9c-32c0-83b6-740dfd8a6726}
HKEY_CLASSES_ROOT\clsid\{f10587e9-0e47-4cbe-84ae-7dd20b8684bb}
HKEY_CLASSES_ROOT\e404.e404mgr
HKEY_CLASSES_ROOT\e404.e404mgr.1
HKEY_CLASSES_ROOT\interface\{0979850f-6c3e-4294-b225-b3d3c4a6f2a1}
HKEY_CLASSES_ROOT\interface\{1bb2da5f-b78f-44ea-bda1-771cbe1dec68}
HKEY_CLASSES_ROOT\interface\{21688e5d-a895-4b60-b127-b76607420334}
HKEY_CLASSES_ROOT\interface\{2a4e73c5-ba3c-4391-b7e5-ffe8d3bd6245}
HKEY_CLASSES_ROOT\interface\{40e563b2-61b2-4215-819a-a7e24cf8aa3e}
HKEY_CLASSES_ROOT\interface\{44a923ca-f430-4f85-9f84-5153ecdb882e}
HKEY_CLASSES_ROOT\interface\{45fbefbf-e8b6-44a5-b0a1-a143e1a74816}
HKEY_CLASSES_ROOT\interface\{4e6e21ec-9d72-4164-8a53-74786a467872}
HKEY_CLASSES_ROOT\interface\{5146b43e-b36d-4a2a-b617-cc05cc500150}
HKEY_CLASSES_ROOT\interface\{5b8bed0f-5f18-4051-9908-c5c569a1aae9}
HKEY_CLASSES_ROOT\interface\{631e9e48-b066-43da-92ac-6dadf61b173b}
HKEY_CLASSES_ROOT\interface\{63667718-ebf2-4cab-b1e8-994d41589c24}
HKEY_CLASSES_ROOT\interface\{65c1361c-e696-4af0-9e21-81910193f352}
HKEY_CLASSES_ROOT\interface\{77dce805-c8ce-48aa-a47f-bfa6cc7704b3}
HKEY_CLASSES_ROOT\interface\{8d42769f-07d8-494d-aab4-aa1652c541fa}
HKEY_CLASSES_ROOT\interface\{972f0be3-976f-40b8-8eb4-88a25987416e}
HKEY_CLASSES_ROOT\interface\{9f80ea2d-53cf-4aa5-a154-f4fbf1ef6a5a}
HKEY_CLASSES_ROOT\interface\{a1922071-390c-418d-916d-91209e95d286}
HKEY_CLASSES_ROOT\interface\{a1f8cd95-cfb3-43d1-a956-63441cc058c1}
HKEY_CLASSES_ROOT\interface\{a35f8fac-755d-4f90-a5d3-f7e18d9eb100}
HKEY_CLASSES_ROOT\interface\{a63b46ad-96a7-4a2c-bd8f-8cd097e1593a}
HKEY_CLASSES_ROOT\interface\{a65f98dd-2360-468c-b76e-b1b84c0d547c}
HKEY_CLASSES_ROOT\interface\{ae2aeed0-be1b-4ba2-826e-20d1991081b8}
HKEY_CLASSES_ROOT\interface\{c269f4c1-7558-4dfc-9fb6-4c149b482586}
HKEY_CLASSES_ROOT\interface\{ce92a296-3142-493c-b64e-6ed73eafb9ae}
HKEY_CLASSES_ROOT\interface\{d7c0df6c-91ff-48bd-ad98-e35769394138}
HKEY_CLASSES_ROOT\interface\{d7f73787-6206-4bba-bdc0-7cfa9940dbcb}
HKEY_CLASSES_ROOT\interface\{d8ec2704-b249-4495-a7a4-a90857bddf4d}
HKEY_CLASSES_ROOT\interface\{d91e9f36-9e44-44ab-803c-0d941fda7988}
HKEY_CLASSES_ROOT\interface\{e0757bdd-69be-4c3f-afc6-50d6524fa9b6}
HKEY_CLASSES_ROOT\interface\{e770f739-2968-4ed9-a63c-dc1938dc82a2}
HKEY_CLASSES_ROOT\interface\{f2f8c877-b06c-4b5e-95e7-aacfc9e8219d}
HKEY_CLASSES_ROOT\interface\{f7d09218-46d7-4d3d-9b7f-315204cd0836}
HKEY_CLASSES_ROOT\multimediacontrols.chl
HKEY_CLASSES_ROOT\typelib\{3b8e549e-0c73-4aab-8939-5ea2ed102cc6}
HKEY_CLASSES_ROOT\typelib\{cfafa83c-855b-4e3d-92b9-a587995b675a}
HKEY_CLASSES_ROOT\typelib\{e63648f7-3933-440e-b4f6-a8584dd7b7eb}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app paths\virusprotect 3.8.exe 3.8
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app paths\virusprotect 3.9.exe 3.9
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{f10587e9-0e47-4cbe-84ae-7dd20b8684bb}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\virusprotect 3.8
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\virusprotect 3.9
HKEY_LOCAL_MACHINE\software\virusprotect 3.8

Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\sharedtaskscheduler
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\sharedtaskscheduler
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\virusprotect 3.9
HKEY_LOCAL_MACHINE\software\virusprotect 3.9
HKEY_LOCAL_MACHINE\software\virusprotect 3.9

Removing VirusProtect:

An up-to-date copy of ExterminateIt should detect and prevent infection from VirusProtect.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove VirusProtect manually.

To completely manually remove VirusProtect malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with VirusProtect.

  1. Use Task Manager to terminate the VirusProtect process.
  2. Delete the original VirusProtect file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes VirusProtect from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of VirusProtect!


Also Be Aware of the Following Threats:
Removing Nooper Trojan
Removing Vxidl.BCV Trojan

Bancos.GZN Trojan

Bancos.GZN malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bancos.GZN:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bancos.GZN.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bancos.GZN manually.

To completely manually remove Bancos.GZN malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.GZN.

  1. Use Task Manager to terminate the Bancos.GZN process.
  2. Delete the original Bancos.GZN file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bancos.GZN from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bancos.GZN!


Also Be Aware of the Following Threats:
quarterserver.de Tracking Cookie Removal
Remove Small.coq Downloader
Remove SearchExplorerBar Adware
Remove Agobot.bh Trojan

Sinhar Trojan

Sinhar malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]Trojan-Proxy.Win32.Lager.aq,Trojan.Win32.Small.ku;
[Other]Win32/Sinhar,Win32/Sinhar.B,Win32/Sinhar.A,Trojan.Abwiz.F,Trojan.Packed.6

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Sinhar:

An up-to-date copy of ExterminateIt should detect and prevent infection from Sinhar.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Sinhar manually.

To completely manually remove Sinhar malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Sinhar.

  1. Use Task Manager to terminate the Sinhar process.
  2. Delete the original Sinhar file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Sinhar from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Sinhar!


Also Be Aware of the Following Threats:
VB.ls Trojan Removal
Removing Leodon Downloader
OS2 Trojan Cleaner
Exal Trojan Information

FearlessKeySpy Trojan

FearlessKeySpy malware description and removal detail
Categories:Trojan,Spyware,Backdoor
Also known as:

[Kaspersky]TrojanSpy.Win32.Fearless.11.b,TrojanSpy.Win32.Fearless.10,TrojanSpy.Win32.Fearless.20;
[Panda]Trojan Horse,Trj/Fearless.C;
[Computer Associates]Backdoor/FearlessKeySpy.11.B!Ser,Win32.FearlessKeySpy.11.B,Backdoor/FearlessKeySpy.10.A!Ser,Win32.FearlessKeySpy.10,Win32/FearlessKeySpy.20.A!Trojan,Win32.FearlessKeySpy.20.A

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\system\ouleaut32.exe
[%WINDOWS%]\system\thehook.dll
[%WINDOWS%]\system\ouleaut32.exe
[%WINDOWS%]\system\thehook.dll

In order to ensure that the FearlessKeySpy is launched automatically each time the system is booted, the FearlessKeySpy adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%WINDOWS%]\system\ouleaut32.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting FearlessKeySpy:

Files:
[%WINDOWS%]\system\ouleaut32.exe
[%WINDOWS%]\system\thehook.dll
[%WINDOWS%]\system\ouleaut32.exe
[%WINDOWS%]\system\thehook.dll

Registry Values:
HKEY_CURRENT_USER\.default\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices

Removing FearlessKeySpy:

An up-to-date copy of ExterminateIt should detect and prevent infection from FearlessKeySpy.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove FearlessKeySpy manually.

To completely manually remove FearlessKeySpy malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with FearlessKeySpy.

  1. Use Task Manager to terminate the FearlessKeySpy process.
  2. Delete the original FearlessKeySpy file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes FearlessKeySpy from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of FearlessKeySpy!


Also Be Aware of the Following Threats:
Removing neostat.pl Tracking Cookie
Removing Mywife.C Worm
TwistedHumor Adware Symptoms

CWS.AFF.IEDLL Hijacker

CWS.AFF.IEDLL malware description and removal detail
Categories:Hijacker

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing CWS.AFF.IEDLL:

An up-to-date copy of ExterminateIt should detect and prevent infection from CWS.AFF.IEDLL.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove CWS.AFF.IEDLL manually.

To completely manually remove CWS.AFF.IEDLL malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with CWS.AFF.IEDLL.

  1. Use Task Manager to terminate the CWS.AFF.IEDLL process.
  2. Delete the original CWS.AFF.IEDLL file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes CWS.AFF.IEDLL from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of CWS.AFF.IEDLL!


Also Be Aware of the Following Threats:
Zlob.Fam.Online Add-on Trojan Cleaner
Removing PswStor Trojan

SatanCOM Trojan

SatanCOM malware description and removal detail
Categories:Trojan,Backdoor,Downloader,DoS
Also known as:

[Kaspersky]Hellish;
[Panda]Hellish.1395

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing SatanCOM:

An up-to-date copy of ExterminateIt should detect and prevent infection from SatanCOM.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove SatanCOM manually.

To completely manually remove SatanCOM malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SatanCOM.

  1. Use Task Manager to terminate the SatanCOM process.
  2. Delete the original SatanCOM file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes SatanCOM from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of SatanCOM!


Also Be Aware of the Following Threats:
Backdoor.Slackbot Backdoor Removal instruction
Removing SpyDldr.J Trojan
Removing Efewe Trojan

QDel106 Trojan

QDel106 malware description and removal detail
Categories:Trojan
Also known as:

[McAfee]QDel106;
[F-Prot]destructive program;
[Panda]Trj/Snowdome;
[Computer Associates]Win/SnowDome!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing QDel106:

An up-to-date copy of ExterminateIt should detect and prevent infection from QDel106.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove QDel106 manually.

To completely manually remove QDel106 malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with QDel106.

  1. Use Task Manager to terminate the QDel106 process.
  2. Delete the original QDel106 file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes QDel106 from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of QDel106!


Also Be Aware of the Following Threats:
Removing Cheqtal Trojan
Anti.MSN Backdoor Information
AntiSpyLab Ransomware Cleaner

Contextual Adware

Contextual malware description and removal detail
Categories:Adware,Toolbar

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Contextual:

Folders:
[%PROGRAM_FILES%]\ContextualToolbar

Registry Keys:
HKEY_CLASSES_ROOT\typelib\{1b8b502e-455b-4022-be77-fb6d9f808a18}
HKEY_CLASSES_ROOT\clsid\{9f7a6f30-90c3-4222-af59-c73467018f59}
HKEY_CLASSES_ROOT\clsid\{9f9f7a6f30-90c3-4222-af59-c73467018f59}
HKEY_CLASSES_ROOT\clsid\{e0eb37db-33de-4448-a124-233b9a43f064}
HKEY_CLASSES_ROOT\interface\{65bb0e9a-d57b-485b-828b-15d1b8c3e9d3}
HKEY_CLASSES_ROOT\interface\{ab5c05ae-a2b0-45c3-bae9-ba2f082343a6}
HKEY_CLASSES_ROOT\toolband.xbtb09298
HKEY_CLASSES_ROOT\toolband.xbtb09298.1
HKEY_CLASSES_ROOT\typelib\{b9799a6c-ffc4-44eb-a8b0-71eb09e6ad3b}
HKEY_CLASSES_ROOT\xbtb09298.ietoolbar
HKEY_CLASSES_ROOT\xbtb09298.ietoolbar.1
HKEY_CLASSES_ROOT\xbtb09298.xbtb09298
HKEY_CLASSES_ROOT\xbtb09298.xbtb09298.1
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\ext\stats\{9f7a6f30-90c3-4222-af59-c73467018f59}
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\ext\stats\{e0eb37db-33de-4448-a124-233b9a43f064}
HKEY_CURRENT_USER\software\xbtb09298
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{eoeb37db-33de-4448-a124-233b9a43f064}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\xbtb09298.xbtb09298toolbar

Registry Values:
HKEY_CLASSES_ROOT\clsid\{994d478a-45d0-4db4-ae77-288b1e346e99}\inprocserver32
HKEY_CLASSES_ROOT\protocols\filter\text/html
HKEY_CURRENT_USER\software\fcadvice
HKEY_CURRENT_USER\software\fcadvice
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser

Removing Contextual:

An up-to-date copy of ExterminateIt should detect and prevent infection from Contextual.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Contextual manually.

To completely manually remove Contextual malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Contextual.

  1. Use Task Manager to terminate the Contextual process.
  2. Delete the original Contextual file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Contextual from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Contextual!


Also Be Aware of the Following Threats:
Downloader.ADT Downloader Symptoms
Bancos.HPF Trojan Information
Removing FakeRecycled Trojan
Pigeon.AZO Trojan Removal

SpyArsenal AIM Logger Spyware

SpyArsenal AIM Logger malware description and removal detail
Categories:Spyware
Visible Symptoms:
Files in system folders:
[%PROFILE%]\cmd.exe
[%PROFILE%]\start
[%PROFILE%]\cmd.exe
[%PROFILE%]\start

In order to ensure that the SpyArsenal AIM Logger is launched automatically each time the system is booted, the SpyArsenal AIM Logger adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%PROFILE%]\cmd.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting SpyArsenal AIM Logger:

Files:
[%PROFILE%]\cmd.exe
[%PROFILE%]\start
[%PROFILE%]\cmd.exe
[%PROFILE%]\start

Folders:
[%SYSTEM%]\csvdea

Registry Keys:
HKEY_LOCAL_MACHINE\SOFTWARE\KMiNT21\SpyArsenal-AIM-Logger
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\PSSdk21
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_PSSDK21
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\PSSdk21

Removing SpyArsenal AIM Logger:

An up-to-date copy of ExterminateIt should detect and prevent infection from SpyArsenal AIM Logger.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove SpyArsenal AIM Logger manually.

To completely manually remove SpyArsenal AIM Logger malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SpyArsenal AIM Logger.

  1. Use Task Manager to terminate the SpyArsenal AIM Logger process.
  2. Delete the original SpyArsenal AIM Logger file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes SpyArsenal AIM Logger from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of SpyArsenal AIM Logger!


Also Be Aware of the Following Threats:
Drunk.Mouse Trojan Cleaner
WordMacro.Ice Trojan Cleaner

Pigeon.AEL Trojan

Pigeon.AEL malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.AEL:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.AEL.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.AEL manually.

To completely manually remove Pigeon.AEL malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.AEL.

  1. Use Task Manager to terminate the Pigeon.AEL process.
  2. Delete the original Pigeon.AEL file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.AEL from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.AEL!


Also Be Aware of the Following Threats:
Remove conversionruler.com Tracking Cookie
123bar BHO Symptoms
Eurosol Trojan Cleaner

Splash Trojan

Splash malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]Trojan.Win32.Splash;
[McAfee]Splash;
[F-Prot]destructive program;
[Panda]Trj/Splass;
[Computer Associates]Win32/Splash!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Splash:

An up-to-date copy of ExterminateIt should detect and prevent infection from Splash.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Splash manually.

To completely manually remove Splash malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Splash.

  1. Use Task Manager to terminate the Splash process.
  2. Delete the original Splash file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Splash from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Splash!


Also Be Aware of the Following Threats:
Stealth.Folder.Hider Spyware Information
Removing SillyDl.DLD Trojan

Arkhew Trojan

Arkhew malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]Trojan.Win32.Small.ir;
[Other]Win32/Arkhew,Win32/Arkhew.C

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\thecat.exe
[%SYSTEM%]\thecat.exe

In order to ensure that the Arkhew is launched automatically each time the system is booted, the Arkhew adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%SYSTEM%]\thecat.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Arkhew:

Files:
[%SYSTEM%]\thecat.exe
[%SYSTEM%]\thecat.exe

Removing Arkhew:

An up-to-date copy of ExterminateIt should detect and prevent infection from Arkhew.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Arkhew manually.

To completely manually remove Arkhew malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Arkhew.

  1. Use Task Manager to terminate the Arkhew process.
  2. Delete the original Arkhew file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Arkhew from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Arkhew!


Also Be Aware of the Following Threats:
Packet.coded RAT Cleaner
Registry.Defender Adware Symptoms
Remove vss2000.com Tracking Cookie
Maxifiles Adware Removal instruction
SillyDl.ASN Trojan Information

Pigeon.AWKE Trojan

Pigeon.AWKE malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.AWKE:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.AWKE.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.AWKE manually.

To completely manually remove Pigeon.AWKE malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.AWKE.

  1. Use Task Manager to terminate the Pigeon.AWKE process.
  2. Delete the original Pigeon.AWKE file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.AWKE from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.AWKE!


Also Be Aware of the Following Threats:
Removing Bancos.IKD Trojan

Bancos.HZW Trojan

Bancos.HZW malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bancos.HZW:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bancos.HZW.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bancos.HZW manually.

To completely manually remove Bancos.HZW malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.HZW.

  1. Use Task Manager to terminate the Bancos.HZW process.
  2. Delete the original Bancos.HZW file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bancos.HZW from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bancos.HZW!


Also Be Aware of the Following Threats:
TrojanDropper.Win32.VB.bg Trojan Information
Bancos.IFP Trojan Symptoms
Sex.Niche.Guide Toolbar Cleaner
Psychward.03b RAT Removal instruction

TrojanDownloader.Win32.IstBar.bp Downloader

TrojanDownloader.Win32.IstBar.bp malware description and removal detail
Categories:Downloader
Also known as:

[Panda]Adware/PowerScan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing TrojanDownloader.Win32.IstBar.bp:

An up-to-date copy of ExterminateIt should detect and prevent infection from TrojanDownloader.Win32.IstBar.bp.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove TrojanDownloader.Win32.IstBar.bp manually.

To completely manually remove TrojanDownloader.Win32.IstBar.bp malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with TrojanDownloader.Win32.IstBar.bp.

  1. Use Task Manager to terminate the TrojanDownloader.Win32.IstBar.bp process.
  2. Delete the original TrojanDownloader.Win32.IstBar.bp file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes TrojanDownloader.Win32.IstBar.bp from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of TrojanDownloader.Win32.IstBar.bp!


Also Be Aware of the Following Threats:
OwlForce Adware Removal instruction
EnergyPlugin Adware Removal
SystemErrorFixer Ransomware Removal instruction
Flip.It Trojan Symptoms

Bat.HotToTrot Hacker Tool

Bat.HotToTrot malware description and removal detail
Categories:Hacker Tool,DoS
Also known as:

[Kaspersky]BAT.Hot2Trot;
[Eset]BAT/Hot.C virus;
[Panda]BAT/Hottrot

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bat.HotToTrot:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bat.HotToTrot.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bat.HotToTrot manually.

To completely manually remove Bat.HotToTrot malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bat.HotToTrot.

  1. Use Task Manager to terminate the Bat.HotToTrot process.
  2. Delete the original Bat.HotToTrot file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bat.HotToTrot from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bat.HotToTrot!


Also Be Aware of the Following Threats:
RPStealer Trojan Removal instruction
Backdoor.Spigot Backdoor Cleaner
idregie.com Tracking Cookie Removal
Removing Blaze Trojan
SillyDl.CZL Trojan Symptoms

Agent.gf Trojan

Agent.gf malware description and removal detail
Categories:Trojan,Backdoor
Visible Symptoms:
Files in system folders:
[%SYSTEM%]\winserver.exe
[%SYSTEM%]\winserver.exe

In order to ensure that the Agent.gf is launched automatically each time the system is booted, the Agent.gf adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%SYSTEM%]\winserver.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Agent.gf:

Files:
[%SYSTEM%]\winserver.exe
[%SYSTEM%]\winserver.exe

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices

Removing Agent.gf:

An up-to-date copy of ExterminateIt should detect and prevent infection from Agent.gf.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Agent.gf manually.

To completely manually remove Agent.gf malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Agent.gf.

  1. Use Task Manager to terminate the Agent.gf process.
  2. Delete the original Agent.gf file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Agent.gf from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Agent.gf!


Also Be Aware of the Following Threats:
SillyDl.ADU Trojan Cleaner

Avispa!Dropper Trojan

Avispa!Dropper malware description and removal detail
Categories:Trojan,Backdoor,Downloader,DoS
Also known as:

[Kaspersky]Avispa.2048.a;
[McAfee]Avispa.dr;
[F-Prot]virus dropper;
[Panda]Avispa

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Avispa!Dropper:

An up-to-date copy of ExterminateIt should detect and prevent infection from Avispa!Dropper.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Avispa!Dropper manually.

To completely manually remove Avispa!Dropper malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Avispa!Dropper.

  1. Use Task Manager to terminate the Avispa!Dropper process.
  2. Delete the original Avispa!Dropper file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Avispa!Dropper from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Avispa!Dropper!


Also Be Aware of the Following Threats:
TrojanDownloader.Win32.VB.ah Trojan Symptoms
EasySearch Adware Removal
PWS.ICQInfo Trojan Removal instruction
MailSpam.DMail Hacker Tool Cleaner

James Trojan

James malware description and removal detail
Categories:Trojan,Backdoor,Downloader,DoS
Also known as:

[Panda]James Bond;
[Computer Associates]James

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing James:

An up-to-date copy of ExterminateIt should detect and prevent infection from James.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove James manually.

To completely manually remove James malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with James.

  1. Use Task Manager to terminate the James process.
  2. Delete the original James file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes James from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of James!


Also Be Aware of the Following Threats:
WurldMedia.bpboh BHO Cleaner
Mitglieder.Q Trojan Removal

Agent.ds Trojan

Agent.ds malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Agent.ds:

An up-to-date copy of ExterminateIt should detect and prevent infection from Agent.ds.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Agent.ds manually.

To completely manually remove Agent.ds malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Agent.ds.

  1. Use Task Manager to terminate the Agent.ds process.
  2. Delete the original Agent.ds file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Agent.ds from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Agent.ds!


Also Be Aware of the Following Threats:
Bancos.DHX Trojan Removal

BrowserAid.SearchandClick BHO

BrowserAid.SearchandClick malware description and removal detail
Categories:BHO
Visible Symptoms:
Files in system folders:
[%SYSTEM%]\inetp60.dll
[%WINDOWS%]\system\inetp60.dll
[%SYSTEM%]\inetp60.dll
[%WINDOWS%]\system\inetp60.dll

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting BrowserAid.SearchandClick:

Files:
[%SYSTEM%]\inetp60.dll
[%WINDOWS%]\system\inetp60.dll
[%SYSTEM%]\inetp60.dll
[%WINDOWS%]\system\inetp60.dll

Registry Keys:
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{087173ef-9829-4f49-8340-a524177d3f60}
HKEY_LOCAL_MACHINE\software\classes\clsid\{087173ef-9829-4f49-8340-a524177d3f60}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{087173ef-9829-4f49-8340-a524177d3f60}

Removing BrowserAid.SearchandClick:

An up-to-date copy of ExterminateIt should detect and prevent infection from BrowserAid.SearchandClick.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove BrowserAid.SearchandClick manually.

To completely manually remove BrowserAid.SearchandClick malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with BrowserAid.SearchandClick.

  1. Use Task Manager to terminate the BrowserAid.SearchandClick process.
  2. Delete the original BrowserAid.SearchandClick file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes BrowserAid.SearchandClick from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of BrowserAid.SearchandClick!


Also Be Aware of the Following Threats:
Removing Other Downloader
Agent.fn Downloader Symptoms

Smo Trojan

Smo malware description and removal detail
Categories:Trojan,Backdoor,Downloader,DoS
Also known as:

[Kaspersky]HLLC.Smoller.70440;
[Panda]HLLO.Gen

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Smo:

An up-to-date copy of ExterminateIt should detect and prevent infection from Smo.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Smo manually.

To completely manually remove Smo malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Smo.

  1. Use Task Manager to terminate the Smo process.
  2. Delete the original Smo file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Smo from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Smo!


Also Be Aware of the Following Threats:
Massaker Backdoor Information
Removing Pigeon.AGB Trojan