Thursday, December 18, 2008

clix.pt Tracking Cookie

clix.pt malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing clix.pt:

An up-to-date copy of ExterminateIt should detect and prevent infection from clix.pt.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove clix.pt manually.

To completely manually remove clix.pt malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with clix.pt.

  1. Use Task Manager to terminate the clix.pt process.
  2. Delete the original clix.pt file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes clix.pt from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of clix.pt!


Also Be Aware of the Following Threats:
Bancos.HAV Trojan Symptoms
Remove Small.oh Downloader
Backdoor.SatanzCrew!Server Backdoor Cleaner

Temohs Trojan

This summary is not available. Please click here to view the post.

YAT Trojan

YAT malware description and removal detail
Categories:Trojan,Backdoor,RAT
Also known as:

[Kaspersky]Backdoor.Bedienks.221,Backdoor.Yat.302,Backdoor.Antilam.20.n,Backdoor.Antilam.20.p,Backdoor.Pestdoor.31,Backdoor.Yat.100,Backdoor.Bedienks.2,Backdoor.Antilam.20.o;
[Eset]Win32/Bedienks.221 trojan,Win32/Biedenks.221 trojan,Win32/Yat.302 trojan,Win32/Yat.100 trojan,Win32/Pestdoor.31 trojan,Bedienks.2 trojan;
[McAfee]BackDoor-BQ,BackDoor-BQ.gen;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Bedienks.221,Bck/YAT.3.01,Backdoor Program,Bck/YAT.100,Backdoor Program.LC,Bck/Bedienks.2;
[Computer Associates]Backdoor/Bedienks.221,Backdoor/Yat.3_02,Backdoor/Yat.302,Backdoor/Yat.100,Backdoor/Antilam.2.0.N,Backdoor/Pestdoor.3.1,Backdoor/Antilam.20.n!Server,Backdoor/Bedienk.2!Server,Backdoor/Bedienks.2!Server,Backdoor/Antilam.20.o!Server

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing YAT:

An up-to-date copy of ExterminateIt should detect and prevent infection from YAT.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove YAT manually.

To completely manually remove YAT malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with YAT.

  1. Use Task Manager to terminate the YAT process.
  2. Delete the original YAT file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes YAT from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of YAT!


Also Be Aware of the Following Threats:
Central Adware Removal instruction

Wintool Downloader

Wintool malware description and removal detail
Categories:Downloader

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Wintool:

An up-to-date copy of ExterminateIt should detect and prevent infection from Wintool.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Wintool manually.

To completely manually remove Wintool malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Wintool.

  1. Use Task Manager to terminate the Wintool process.
  2. Delete the original Wintool file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Wintool from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Wintool!


Also Be Aware of the Following Threats:
TB Trojan Cleaner
Pigeon.ANF Trojan Information

Loader Downloader

Loader malware description and removal detail
Categories:Downloader
Also known as:

[Kaspersky]Trojan-Downloader.Win32..Small.dtc;
[Other]Troj/Dloadr-AMZ,Trojan-Downloader.Gen

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Loader:

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run

Removing Loader:

An up-to-date copy of ExterminateIt should detect and prevent infection from Loader.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Loader manually.

To completely manually remove Loader malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Loader.

  1. Use Task Manager to terminate the Loader process.
  2. Delete the original Loader file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Loader from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Loader!


Also Be Aware of the Following Threats:
CIA.boot Trojan Information
Bancos.GDG Trojan Symptoms
Remove Chopenoz.BL4 Trojan
Removing AOHell Trojan

SubSeven.Bonus.ICQPager.Fix Backdoor

SubSeven.Bonus.ICQPager.Fix malware description and removal detail
Categories:Backdoor,RAT
Also known as:

[Kaspersky]Backdoor.SubSeven.213.bonus;
[Panda]Backdoor Program.LC;
[Computer Associates]Backdoor/SubSeven_Server_family,Win32.SubSeven.AE

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing SubSeven.Bonus.ICQPager.Fix:

An up-to-date copy of ExterminateIt should detect and prevent infection from SubSeven.Bonus.ICQPager.Fix.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove SubSeven.Bonus.ICQPager.Fix manually.

To completely manually remove SubSeven.Bonus.ICQPager.Fix malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SubSeven.Bonus.ICQPager.Fix.

  1. Use Task Manager to terminate the SubSeven.Bonus.ICQPager.Fix process.
  2. Delete the original SubSeven.Bonus.ICQPager.Fix file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes SubSeven.Bonus.ICQPager.Fix from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of SubSeven.Bonus.ICQPager.Fix!


Also Be Aware of the Following Threats:
Jolt2Mod DoS Cleaner
SFX RAT Cleaner
Removing Bancos.HPN Trojan
Remove Banker.CLI Trojan

Duck Trojan

Duck malware description and removal detail
Categories:Trojan,Hacker Tool
Also known as:

[Panda]Trojan Horse.LC;
[Computer Associates]Win32/Duck!PWS!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Duck:

An up-to-date copy of ExterminateIt should detect and prevent infection from Duck.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Duck manually.

To completely manually remove Duck malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Duck.

  1. Use Task Manager to terminate the Duck process.
  2. Delete the original Duck file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Duck from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Duck!


Also Be Aware of the Following Threats:
Remove tiser.com.au Tracking Cookie
OnAlf RAT Removal
Remove Lolkilla Trojan
Remove AntiExe Trojan

SillyDl.CUK Trojan

SillyDl.CUK malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing SillyDl.CUK:

An up-to-date copy of ExterminateIt should detect and prevent infection from SillyDl.CUK.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove SillyDl.CUK manually.

To completely manually remove SillyDl.CUK malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SillyDl.CUK.

  1. Use Task Manager to terminate the SillyDl.CUK process.
  2. Delete the original SillyDl.CUK file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes SillyDl.CUK from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of SillyDl.CUK!


Also Be Aware of the Following Threats:
UnSpyPC Trojan Symptoms
Removing Bancos.GPR Trojan
Puzzle.Desktop.Sudoku Adware Cleaner

TB Trojan

TB malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]Trojan.Crunch,Trojan.DOS.TB.Evil.a,Trojan.TB,Trojan.TB.Evil.a,Trojan.TB.Evil.b,Trojan.TB.ForPro,Trojan.TB.SpeedUp.a,Trojan.TB.SpeedUp.b,Trojan.TB.Wiz.a,Trojan.TB.Wiz.b,Trojan.DOS.Cruach;
[McAfee]TB;
[F-Prot]destructive program;
[Panda]Trj/Crunch,Trj/Tb.Evil.A,Trj/Tb.Evil.B,Trj/Tb.ForPro,Trj/Tb.SpeedUp.A,Trj/Tb.SpeedUp.B,Trj/TB.Wiz.A,Trj/Tb.Wiz.B,Trj/TMVS,Trj/Farenheit;
[Computer Associates]Format_Pro!Trojan,HLLP.Tmvs.30838,TB,TB.Evil.A!Trojan,TB.Evil.B!Trojan,TB.SpeedUp.A!Trojan,TB.SpeedUp.B!Trojan,TB.Wiz.b!Trojan,TBasic.Asshole!Trojan,TBasic.German!Trojan,Farenheit!Trojan,TBasic.Toronto!Trojan;
[Other]DOS/German.A,Trojan:Win32/Crunch,trojan-backdoor-crunch

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing TB:

An up-to-date copy of ExterminateIt should detect and prevent infection from TB.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove TB manually.

To completely manually remove TB malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with TB.

  1. Use Task Manager to terminate the TB process.
  2. Delete the original TB file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes TB from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of TB!


Also Be Aware of the Following Threats:
Raw.client RAT Removal instruction
Lineage.ABB Trojan Removal instruction
Gaslide Trojan Removal instruction

IRC.Projax.worm Trojan

IRC.Projax.worm malware description and removal detail
Categories:Trojan,Worm
Also known as:

[Kaspersky]IRC-Worm.Projax.b;
[McAfee]IRC/Projax.worm;
[F-Prot]security risk or a "backdoor" program;
[Panda]Worm Generic.LC;
[Computer Associates]IRC.Projax.B,Projax!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing IRC.Projax.worm:

An up-to-date copy of ExterminateIt should detect and prevent infection from IRC.Projax.worm.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove IRC.Projax.worm manually.

To completely manually remove IRC.Projax.worm malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with IRC.Projax.worm.

  1. Use Task Manager to terminate the IRC.Projax.worm process.
  2. Delete the original IRC.Projax.worm file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes IRC.Projax.worm from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of IRC.Projax.worm!


Also Be Aware of the Following Threats:
Removing HLL.ow.Joker Trojan
Removing MyDailyHoroscope Adware
Zasil Trojan Removal instruction

Bancos.DLJ Trojan

Bancos.DLJ malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bancos.DLJ:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bancos.DLJ.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bancos.DLJ manually.

To completely manually remove Bancos.DLJ malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.DLJ.

  1. Use Task Manager to terminate the Bancos.DLJ process.
  2. Delete the original Bancos.DLJ file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bancos.DLJ from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bancos.DLJ!


Also Be Aware of the Following Threats:
Remove Duwende Trojan
Remove Win32.Adbreak Trojan
TrojanDownloader.win32Delf.bj Adware Removal instruction

THX Hacker Tool

THX malware description and removal detail
Categories:Hacker Tool,DoS
Also known as:

[Kaspersky]Flooder.IRC.Floodbots.15,Flooder.MailSpam.AnonymousMail.10,Nuker.Crow

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing THX:

An up-to-date copy of ExterminateIt should detect and prevent infection from THX.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove THX manually.

To completely manually remove THX malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with THX.

  1. Use Task Manager to terminate the THX process.
  2. Delete the original THX file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes THX from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of THX!


Also Be Aware of the Following Threats:
FDoS.Krate DoS Removal instruction
SillyDl.CCV Trojan Removal
hitboss.com Tracking Cookie Cleaner

Bancos.HSI Trojan

Bancos.HSI malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bancos.HSI:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bancos.HSI.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bancos.HSI manually.

To completely manually remove Bancos.HSI malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.HSI.

  1. Use Task Manager to terminate the Bancos.HSI process.
  2. Delete the original Bancos.HSI file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bancos.HSI from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bancos.HSI!


Also Be Aware of the Following Threats:
Wolf Trojan Removal instruction
Removing QDel4 Trojan
TIBS Trojan Removal
Bancos.IJP Trojan Information

Livuto Trojan

Livuto malware description and removal detail
Categories:Trojan,Downloader
Also known as:

[Kaspersky]Trojan-Downloader.Win32.Agent.bgg,Trojan.Win32.Obfuscated.fr,Trojan-Downloader.Win32.QQHelper.mo,Trojan-Downloader.WIn32.Agent.dix,Trojan-Downloader.Win32.Hmir.as,Rootkit.Win32.Agent.fw;
[McAfee]Generic Downloader.ab,Downloader-BBM,AdClicker-ER.dll,BackDoor-CVM;
[Other]Win32/Livuto.Z,Win32/Livuto.X,Win32/Livuto.BW,Win32/Livuto.CB,Adware.NewWeb,Trojan.Farfi,Backdoor:Win32/Farfi.B!sys,Rootkit.gen6,Win32/Livuto.CT,Downloader,TROJ_DLOADER.MPL,Win32/Livuto.CU,Backdoor:Win32/Farfli.B.dll,Farfli.gen3,Win32/Livuto!generic,Rootkit.gen2

Visible Symptoms:
Files in system folders:
[%PROFILE_TEMP%]\HostEx\TempA_.exe
[%PROFILE_TEMP%]\module1.exe
[%PROFILE_TEMP%]\module2.exe
[%PROGRAM_FILES%]\WZCN\cn_ie_wzcn.dll
[%PROGRAM_FILES%]\WZCN\configuration.xml
[%PROGRAM_FILES%]\WZCN\language.ini
[%PROGRAM_FILES%]\WZCN\uninst.exe
[%PROGRAM_FILES%]\WZCN\wazap.ico
[%SYSTEM%]\winttrs
[%WINDOWS%]\system\10310.exe
[%WINDOWS%]\system\Mvvp.dll
[%WINDOWS%]\system\sdfa
[%PROFILE_TEMP%]\HostEx\TempA_.exe
[%PROFILE_TEMP%]\module1.exe
[%PROFILE_TEMP%]\module2.exe
[%PROGRAM_FILES%]\WZCN\cn_ie_wzcn.dll
[%PROGRAM_FILES%]\WZCN\configuration.xml
[%PROGRAM_FILES%]\WZCN\language.ini
[%PROGRAM_FILES%]\WZCN\uninst.exe
[%PROGRAM_FILES%]\WZCN\wazap.ico
[%SYSTEM%]\winttrs
[%WINDOWS%]\system\10310.exe
[%WINDOWS%]\system\Mvvp.dll
[%WINDOWS%]\system\sdfa

In order to ensure that the Livuto is launched automatically each time the system is booted, the Livuto adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%PROFILE_TEMP%]\HostEx\TempA_.exe
[%PROFILE_TEMP%]\module1.exe
[%PROFILE_TEMP%]\module2.exe
[%PROGRAM_FILES%]\WZCN\uninst.exe
[%WINDOWS%]\system\10310.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Livuto:

Files:
[%PROFILE_TEMP%]\HostEx\TempA_.exe
[%PROFILE_TEMP%]\module1.exe
[%PROFILE_TEMP%]\module2.exe
[%PROGRAM_FILES%]\WZCN\cn_ie_wzcn.dll
[%PROGRAM_FILES%]\WZCN\configuration.xml
[%PROGRAM_FILES%]\WZCN\language.ini
[%PROGRAM_FILES%]\WZCN\uninst.exe
[%PROGRAM_FILES%]\WZCN\wazap.ico
[%SYSTEM%]\winttrs
[%WINDOWS%]\system\10310.exe
[%WINDOWS%]\system\Mvvp.dll
[%WINDOWS%]\system\sdfa
[%PROFILE_TEMP%]\HostEx\TempA_.exe
[%PROFILE_TEMP%]\module1.exe
[%PROFILE_TEMP%]\module2.exe
[%PROGRAM_FILES%]\WZCN\cn_ie_wzcn.dll
[%PROGRAM_FILES%]\WZCN\configuration.xml
[%PROGRAM_FILES%]\WZCN\language.ini
[%PROGRAM_FILES%]\WZCN\uninst.exe
[%PROGRAM_FILES%]\WZCN\wazap.ico
[%SYSTEM%]\winttrs
[%WINDOWS%]\system\10310.exe
[%WINDOWS%]\system\Mvvp.dll
[%WINDOWS%]\system\sdfa

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{1f58177b-1cad-42d0-85c1-a4b63c2f0715}
HKEY_CLASSES_ROOT\clsid\{35ec0410-555e-4402-b372-d9a6e0bf6795}
HKEY_CLASSES_ROOT\clsid\{43e40178-0298-4789-b74c-388340a3be6b}
HKEY_CLASSES_ROOT\clsid\{d2a47409-32d6-4dae-ba00-75ed194b16a0}
HKEY_CLASSES_ROOT\clsid\{d500885e-e400-41ca-804b-cd6373a7eef2}
HKEY_CLASSES_ROOT\clsid\{f57f0570-4eeb-4af5-930d-97a35796ae82}
HKEY_CLASSES_ROOT\interface\{5aa68e42-c1f2-449a-8230-5917fa0e6a60}
HKEY_CLASSES_ROOT\interface\{77cf20d2-b091-4496-83da-acb897068778}
HKEY_CLASSES_ROOT\interface\{a0f4099e-ba1a-4d10-89b4-dc0c67db9528}
HKEY_CLASSES_ROOT\interface\{b275354a-9f09-420b-911b-29f8bb8a302d}
HKEY_CLASSES_ROOT\interface\{d99abe4e-0faf-41c3-b482-2da133c5d083}
HKEY_CLASSES_ROOT\soduisearch.datacenter
HKEY_CLASSES_ROOT\soduisearch.datacenter.1
HKEY_CLASSES_ROOT\soduisearch.sodui
HKEY_CLASSES_ROOT\soduisearch.sodui.1
HKEY_CLASSES_ROOT\soduisearch.soduicontainer
HKEY_CLASSES_ROOT\soduisearch.soduicontainer.1
HKEY_CLASSES_ROOT\typelib\{2eae3758-19ac-487a-8999-bc6bb6391e0d}\1.0
HKEY_CLASSES_ROOT\typelib\{af63ff93-7ad3-48f3-a06a-13ebf3c4ddde}\1.0
HKEY_CLASSES_ROOT\wzcn.wzcnbho
HKEY_CLASSES_ROOT\wzcn.wzcnbho.1

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{d500885e-e400-41ca-804b-cd6373a7eef2}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Livuto:

An up-to-date copy of ExterminateIt should detect and prevent infection from Livuto.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Livuto manually.

To completely manually remove Livuto malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Livuto.

  1. Use Task Manager to terminate the Livuto process.
  2. Delete the original Livuto file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Livuto from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Livuto!


Also Be Aware of the Following Threats:
Muska54 Backdoor Information
Bancos.IFJ Trojan Cleaner
Cx2 Backdoor Information

Chiton.dr Trojan

Chiton.dr malware description and removal detail
Categories:Trojan,Backdoor,Downloader,DoS
Also known as:

[Kaspersky]Win32.Chiton.b;
[McAfee]W32/Chiton.e.dr;
[F-Prot]W32/Chthon.B;
[Panda]Univ.B;
[Computer Associates]Win32.Vibyor.gen

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Chiton.dr:

An up-to-date copy of ExterminateIt should detect and prevent infection from Chiton.dr.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Chiton.dr manually.

To completely manually remove Chiton.dr malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Chiton.dr.

  1. Use Task Manager to terminate the Chiton.dr process.
  2. Delete the original Chiton.dr file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Chiton.dr from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Chiton.dr!


Also Be Aware of the Following Threats:
Removing RTB666 Backdoor
superpages.com Tracking Cookie Cleaner

PowerSpider Trojan

PowerSpider malware description and removal detail
Categories:Trojan,Backdoor,RAT
Also known as:

[Kaspersky]Backdoor.Win32.PowerSpider.a;
[Eset]Win32/PowerSpider.A trojan;
[Computer Associates]Backdoor/PowerSpider,Win32.PowerSpider.A;
[Other]Backdoor.Powerspider.B,W32/Powerspider.NI,Troj/PowerSpi-A,BKDR_POWERSPI.C

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\mspbhook.dll
[%SYSTEM%]\mspbhook.dll

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting PowerSpider:

Files:
[%SYSTEM%]\mspbhook.dll
[%SYSTEM%]\mspbhook.dll

Registry Keys:
HKEY_CLASSES_ROOT\zpwd_box

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices

Removing PowerSpider:

An up-to-date copy of ExterminateIt should detect and prevent infection from PowerSpider.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove PowerSpider manually.

To completely manually remove PowerSpider malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with PowerSpider.

  1. Use Task Manager to terminate the PowerSpider process.
  2. Delete the original PowerSpider file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes PowerSpider from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of PowerSpider!


Also Be Aware of the Following Threats:
SillyDl.CGB Trojan Information
Win32.Coced.Ninel!PWS!Trojan Trojan Information

TrojanNotifier.Win32.Delf Trojan

TrojanNotifier.Win32.Delf malware description and removal detail
Categories:Trojan,Hacker Tool
Also known as:

[Panda]Trojan Horse

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing TrojanNotifier.Win32.Delf:

An up-to-date copy of ExterminateIt should detect and prevent infection from TrojanNotifier.Win32.Delf.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove TrojanNotifier.Win32.Delf manually.

To completely manually remove TrojanNotifier.Win32.Delf malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with TrojanNotifier.Win32.Delf.

  1. Use Task Manager to terminate the TrojanNotifier.Win32.Delf process.
  2. Delete the original TrojanNotifier.Win32.Delf file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes TrojanNotifier.Win32.Delf from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of TrojanNotifier.Win32.Delf!


Also Be Aware of the Following Threats:
SillyDl.BBQ Trojan Removal instruction
Removing Pigeon.EKI Trojan
Pigeon.ETD Trojan Cleaner
Seekmo.Search.Assistant Adware Symptoms
Removing Frethog.ADO Trojan

VCL Trojan

VCL malware description and removal detail
Categories:Trojan,Backdoor,Downloader,Hacker Tool,DoS
Also known as:

[Kaspersky]Constructor.VCL,Constructor.Win32.Vclwin,packed: HackStop,VCL.4893,VCL.519.a,VCL.562,VCL-based,VCL-based.trojan,VirTool.DOS.Instvcl.b,PS-MPC-based,VCL.BadCommand.541,VCL.516.a,VCL.2037,VCL.2805,VCL.Renegade.5737,VCL.Zeta.2536,Burma.409,VCL.Texas.1221.b,VCL.Mystic.377,VCL.Mystic.379,VCL.347.a,VCL.Eq.1145,Trivial.145.a;
[Eset]Atomic.371 virus,Vcl.541 virus,Vcl.Renegade.5737 virus,Burma.409 virus;
[McAfee]VCL.kit,Univ/r;
[F-Prot]virus construction tool;
[Panda]Constructor/VCL,Mimic-Den Zuk,Univ,Virus Constructor,Atomic 1,Tximuly.177,Direct.gen,Immolation;
[Computer Associates]VCL.1005,VCL.4893.B,VCL.519.A,VCL.562,VCL.821.A,VCL.O.470,VCL.Dome,VCL!Generated,VCL.476,VCL.O.371,VCL,VCL.516.A,VCL.2037,VCL.2536,VCL.2805,VCL.5737,VCL.377/379,VCL.O.347,VCL.generic,VCL.785

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing VCL:

An up-to-date copy of ExterminateIt should detect and prevent infection from VCL.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove VCL manually.

To completely manually remove VCL malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with VCL.

  1. Use Task Manager to terminate the VCL process.
  2. Delete the original VCL file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes VCL from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of VCL!


Also Be Aware of the Following Threats:
Bancos.HUD Trojan Information

Pigeon.AUZS Trojan

Pigeon.AUZS malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.AUZS:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.AUZS.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.AUZS manually.

To completely manually remove Pigeon.AUZS malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.AUZS.

  1. Use Task Manager to terminate the Pigeon.AUZS process.
  2. Delete the original Pigeon.AUZS file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.AUZS from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.AUZS!


Also Be Aware of the Following Threats:
Zlob.Fam.SystemTools Trojan Cleaner
Julrom Trojan Information
Fective Trojan Information
Tvmtwo Adware Removal instruction

Pigeon.AUZV Trojan

Pigeon.AUZV malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.AUZV:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.AUZV.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.AUZV manually.

To completely manually remove Pigeon.AUZV malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.AUZV.

  1. Use Task Manager to terminate the Pigeon.AUZV process.
  2. Delete the original Pigeon.AUZV file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.AUZV from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.AUZV!


Also Be Aware of the Following Threats:
Ethernet.Packet.GreedyDog.Version Trojan Information
Forgive Trojan Removal
DoubleWrite Trojan Information
Zlob.Fam.My Pass Generator Trojan Removal