Friday, December 26, 2008

Bancos.FVK Trojan

Bancos.FVK malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bancos.FVK:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bancos.FVK.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bancos.FVK manually.

To completely manually remove Bancos.FVK malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.FVK.

  1. Use Task Manager to terminate the Bancos.FVK process.
  2. Delete the original Bancos.FVK file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bancos.FVK from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bancos.FVK!


Also Be Aware of the Following Threats:
Remove srpa.de Tracking Cookie
TrojanDownloader.HTML.Nosuh Trojan Cleaner
Pigeon.EUL Trojan Removal
Remove Panic Trojan

Pornuper Trojan

Pornuper malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Pornuper:

Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\clkhost

Removing Pornuper:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pornuper.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pornuper manually.

To completely manually remove Pornuper malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pornuper.

  1. Use Task Manager to terminate the Pornuper process.
  2. Delete the original Pornuper file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pornuper from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pornuper!


Also Be Aware of the Following Threats:
Removing CWS.Yexe Hijacker
Remove Surveiller.Common.Components Spyware
Bancos.HSH Trojan Cleaner
Cool Trojan Removal

Hide.for.ICQ Backdoor

Hide.for.ICQ malware description and removal detail
Categories:Backdoor,Hacker Tool
Also known as:

[Kaspersky]Backdoor.IRC.Kat;
[Panda]Bck/IRC.Kat;
[Computer Associates]Pirch/Kat

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Hide.for.ICQ:

An up-to-date copy of ExterminateIt should detect and prevent infection from Hide.for.ICQ.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Hide.for.ICQ manually.

To completely manually remove Hide.for.ICQ malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Hide.for.ICQ.

  1. Use Task Manager to terminate the Hide.for.ICQ process.
  2. Delete the original Hide.for.ICQ file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Hide.for.ICQ from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Hide.for.ICQ!


Also Be Aware of the Following Threats:
Remove Coolgame Trojan
Remove Win32.Bambo Trojan
Pigeon.EOW Trojan Cleaner

Opalcot Trojan

Opalcot malware description and removal detail
Categories:Trojan,Hacker Tool
Also known as:

[Kaspersky]Trojan-PSW.Win32.Lmir.bep;
[McAfee]PWS-WoW.dll;
[Other]Win32/Opalcot.B,Infostealer.Lemir

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\11.log
[%SYSTEM%]\kb3716626.log
[%SYSTEM%]\win32smd.exe
[%SYSTEM%]\11.log
[%SYSTEM%]\kb3716626.log
[%SYSTEM%]\win32smd.exe

In order to ensure that the Opalcot is launched automatically each time the system is booted, the Opalcot adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%SYSTEM%]\win32smd.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Opalcot:

Files:
[%SYSTEM%]\11.log
[%SYSTEM%]\kb3716626.log
[%SYSTEM%]\win32smd.exe
[%SYSTEM%]\11.log
[%SYSTEM%]\kb3716626.log
[%SYSTEM%]\win32smd.exe

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Opalcot:

An up-to-date copy of ExterminateIt should detect and prevent infection from Opalcot.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Opalcot manually.

To completely manually remove Opalcot malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Opalcot.

  1. Use Task Manager to terminate the Opalcot process.
  2. Delete the original Opalcot file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Opalcot from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Opalcot!


Also Be Aware of the Following Threats:
Win32.Cazdoor Trojan Removal
Removing Liberty Trojan

SATAN Trojan

SATAN malware description and removal detail
Categories:Trojan,Backdoor,Downloader,Hacker Tool,DoS
Also known as:

[Kaspersky]66c.612,Lct.599,Lct.602;
[Eset]Satan.602 virus;
[Panda]Lct.599;
[Computer Associates]Liquid

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing SATAN:

An up-to-date copy of ExterminateIt should detect and prevent infection from SATAN.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove SATAN manually.

To completely manually remove SATAN malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SATAN.

  1. Use Task Manager to terminate the SATAN process.
  2. Delete the original SATAN file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes SATAN from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of SATAN!


Also Be Aware of the Following Threats:
Removing SillyFDC Worm

Small.aui Downloader

Small.aui malware description and removal detail
Categories:Downloader

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Small.aui:

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Small.aui:

An up-to-date copy of ExterminateIt should detect and prevent infection from Small.aui.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Small.aui manually.

To completely manually remove Small.aui malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Small.aui.

  1. Use Task Manager to terminate the Small.aui process.
  2. Delete the original Small.aui file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Small.aui from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Small.aui!


Also Be Aware of the Following Threats:
checkstat.nl Tracking Cookie Information
NameNag.Killer DoS Symptoms

Qhost.df Trojan

Qhost.df malware description and removal detail
Categories:Trojan
Visible Symptoms:
Files in system folders:
[%SYSTEM%]\howiper.exe
[%SYSTEM%]\hclean32.exe
[%SYSTEM%]\hwiper.exe
[%SYSTEM%]\howiper.exe
[%SYSTEM%]\hclean32.exe
[%SYSTEM%]\hwiper.exe

In order to ensure that the Qhost.df is launched automatically each time the system is booted, the Qhost.df adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%SYSTEM%]\howiper.exe
[%SYSTEM%]\hclean32.exe
[%SYSTEM%]\hwiper.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Qhost.df:

Files:
[%SYSTEM%]\howiper.exe
[%SYSTEM%]\hclean32.exe
[%SYSTEM%]\hwiper.exe
[%SYSTEM%]\howiper.exe
[%SYSTEM%]\hclean32.exe
[%SYSTEM%]\hwiper.exe

Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\ruins

Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Qhost.df:

An up-to-date copy of ExterminateIt should detect and prevent infection from Qhost.df.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Qhost.df manually.

To completely manually remove Qhost.df malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Qhost.df.

  1. Use Task Manager to terminate the Qhost.df process.
  2. Delete the original Qhost.df file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Qhost.df from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Qhost.df!


Also Be Aware of the Following Threats:
SingaRaja Hacker Tool Removal instruction
Remove Nuclear.0b1 Backdoor

Vxidl.AEZ Trojan

Vxidl.AEZ malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Vxidl.AEZ:

An up-to-date copy of ExterminateIt should detect and prevent infection from Vxidl.AEZ.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Vxidl.AEZ manually.

To completely manually remove Vxidl.AEZ malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Vxidl.AEZ.

  1. Use Task Manager to terminate the Vxidl.AEZ process.
  2. Delete the original Vxidl.AEZ file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Vxidl.AEZ from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Vxidl.AEZ!


Also Be Aware of the Following Threats:
Removing Wingkill Trojan
Bancos.HBT Trojan Removal
DlMyss Trojan Removal
Remove EjTroj RAT

Shupko Trojan

Shupko malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Shupko:

An up-to-date copy of ExterminateIt should detect and prevent infection from Shupko.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Shupko manually.

To completely manually remove Shupko malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Shupko.

  1. Use Task Manager to terminate the Shupko process.
  2. Delete the original Shupko file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Shupko from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Shupko!


Also Be Aware of the Following Threats:
AOHell Trojan Removal instruction
Zlob.Fam.Audio-Video Add-on Trojan Removal instruction
SpyArsenal.ICQ.Logger Spyware Cleaner
Remove Win32.DelAll Trojan

PWS.ICQInfo Trojan

PWS.ICQInfo malware description and removal detail
Categories:Trojan,Hacker Tool
Also known as:

[McAfee]PWS-ICQInfo;
[F-Prot]destructive program;
[Panda]Trj/PSW.ICQ.Info

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing PWS.ICQInfo:

An up-to-date copy of ExterminateIt should detect and prevent infection from PWS.ICQInfo.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove PWS.ICQInfo manually.

To completely manually remove PWS.ICQInfo malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with PWS.ICQInfo.

  1. Use Task Manager to terminate the PWS.ICQInfo process.
  2. Delete the original PWS.ICQInfo file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes PWS.ICQInfo from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of PWS.ICQInfo!


Also Be Aware of the Following Threats:
Winsdoor Trojan Cleaner
PStats.com Tracking Cookie Information
Lineage.ACE Trojan Removal instruction
Bancos.HSO Trojan Removal instruction

Cyb Trojan

Cyb malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]Cybercide.2229,Cybercide.2256,Virus.DOS.Cybercide.2229,Virus.DOS.Cybercide.2256;
[McAfee]Pony;
[F-Prot]Cybercide.2256,Cybercide.2299;
[Panda]Cibercide;
[Computer Associates]Cyb-2299,Cybercide.846

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Cyb:

An up-to-date copy of ExterminateIt should detect and prevent infection from Cyb.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Cyb manually.

To completely manually remove Cyb malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Cyb.

  1. Use Task Manager to terminate the Cyb process.
  2. Delete the original Cyb file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Cyb from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Cyb!


Also Be Aware of the Following Threats:
Removing Vxidl.ADP Trojan
360i.com Tracking Cookie Symptoms
Win32.StartPage.Rfind Adware Cleaner
Removing Vlad.Mummy Trojan
Icelandic Trojan Removal

Bancos.HII Trojan

Bancos.HII malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bancos.HII:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bancos.HII.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bancos.HII manually.

To completely manually remove Bancos.HII malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.HII.

  1. Use Task Manager to terminate the Bancos.HII process.
  2. Delete the original Bancos.HII file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bancos.HII from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bancos.HII!


Also Be Aware of the Following Threats:
Removing FDoS.ICQRevenge Trojan
Filevector.class Trojan Information
Lambda Trojan Information
Remove AIMJacker Trojan
Remove Dowque.AAP Trojan

SubSeven.Fixes RAT

SubSeven.Fixes malware description and removal detail
Categories:RAT

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing SubSeven.Fixes:

An up-to-date copy of ExterminateIt should detect and prevent infection from SubSeven.Fixes.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove SubSeven.Fixes manually.

To completely manually remove SubSeven.Fixes malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SubSeven.Fixes.

  1. Use Task Manager to terminate the SubSeven.Fixes process.
  2. Delete the original SubSeven.Fixes file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes SubSeven.Fixes from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of SubSeven.Fixes!


Also Be Aware of the Following Threats:
PWS.Kruto Trojan Removal

Pluto Trojan

Pluto malware description and removal detail
Categories:Trojan,Backdoor,DoS
Also known as:

[Kaspersky]Backdoor.IRC.Pluto;
[Panda]Bck/IRC.Pluto.Cli;
[Computer Associates]mIRC/Pluto!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pluto:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pluto.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pluto manually.

To completely manually remove Pluto malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pluto.

  1. Use Task Manager to terminate the Pluto process.
  2. Delete the original Pluto file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pluto from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pluto!


Also Be Aware of the Following Threats:
Remove Abraham Hostile Code
MidAddle Trojan Removal
Dark.Connection.Inside Backdoor Removal

Supcount Trojan

Supcount malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Supcount:

An up-to-date copy of ExterminateIt should detect and prevent infection from Supcount.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Supcount manually.

To completely manually remove Supcount malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Supcount.

  1. Use Task Manager to terminate the Supcount process.
  2. Delete the original Supcount file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Supcount from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Supcount!


Also Be Aware of the Following Threats:
Trivial Trojan Cleaner

Pigeon.AVAU Trojan

Pigeon.AVAU malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.AVAU:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.AVAU.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.AVAU manually.

To completely manually remove Pigeon.AVAU malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.AVAU.

  1. Use Task Manager to terminate the Pigeon.AVAU process.
  2. Delete the original Pigeon.AVAU file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.AVAU from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.AVAU!


Also Be Aware of the Following Threats:
Barrotes.Tecla Trojan Information
Spook Trojan Cleaner

TrojanProxy.Win32.Symbad Trojan

TrojanProxy.Win32.Symbad malware description and removal detail
Categories:Trojan
Also known as:

[Other]W32/Agent.BLM,Backdoor.Trojan,TROJ_PROXY.O

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing TrojanProxy.Win32.Symbad:

An up-to-date copy of ExterminateIt should detect and prevent infection from TrojanProxy.Win32.Symbad.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove TrojanProxy.Win32.Symbad manually.

To completely manually remove TrojanProxy.Win32.Symbad malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with TrojanProxy.Win32.Symbad.

  1. Use Task Manager to terminate the TrojanProxy.Win32.Symbad process.
  2. Delete the original TrojanProxy.Win32.Symbad file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes TrojanProxy.Win32.Symbad from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of TrojanProxy.Win32.Symbad!


Also Be Aware of the Following Threats:
webspyshield Ransomware Information

Bat.Qlop Trojan

Bat.Qlop malware description and removal detail
Categories:Trojan
Also known as:

[Eset]BAT/IBBM.Qlop.646 virus;
[Panda]BAT/QLop.665;
[Computer Associates]Bat/Qlop.646

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bat.Qlop:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bat.Qlop.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bat.Qlop manually.

To completely manually remove Bat.Qlop malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bat.Qlop.

  1. Use Task Manager to terminate the Bat.Qlop process.
  2. Delete the original Bat.Qlop file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bat.Qlop from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bat.Qlop!


Also Be Aware of the Following Threats:
Plateau Trojan Symptoms
BI Adware Removal
One.of.The.last.Trojans Backdoor Removal instruction
MSN.VB.ae DoS Removal instruction

Frethog.AFL Trojan

Frethog.AFL malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]Trojan-PSW.Win32.Nilage.bty;
[Other]PWS:Win32/OnLineGames.CPJ,Win32/Frethog.AFL,Infostealer.Gampass,W32/OnLineGames.VUZ

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\drivers\9C421134.sys
[%SYSTEM%]\ProcSvr01.dll
[%SYSTEM%]\drivers\9C421134.sys
[%SYSTEM%]\ProcSvr01.dll

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Frethog.AFL:

Files:
[%SYSTEM%]\drivers\9C421134.sys
[%SYSTEM%]\ProcSvr01.dll
[%SYSTEM%]\drivers\9C421134.sys
[%SYSTEM%]\ProcSvr01.dll

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{4df4f122-943d-40f8-b3f2-72bd70e60d6c}

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks

Removing Frethog.AFL:

An up-to-date copy of ExterminateIt should detect and prevent infection from Frethog.AFL.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Frethog.AFL manually.

To completely manually remove Frethog.AFL malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Frethog.AFL.

  1. Use Task Manager to terminate the Frethog.AFL process.
  2. Delete the original Frethog.AFL file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Frethog.AFL from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Frethog.AFL!


Also Be Aware of the Following Threats:
Meats Trojan Removal
Removing Format.CQ Trojan
FHZ Backdoor Removal

Agent.nn Downloader

Agent.nn malware description and removal detail
Categories:Downloader

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Agent.nn:

An up-to-date copy of ExterminateIt should detect and prevent infection from Agent.nn.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Agent.nn manually.

To completely manually remove Agent.nn malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Agent.nn.

  1. Use Task Manager to terminate the Agent.nn process.
  2. Delete the original Agent.nn file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Agent.nn from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Agent.nn!


Also Be Aware of the Following Threats:
Bancos.GHP Trojan Symptoms

Demiz.Server Trojan

Demiz.Server malware description and removal detail
Categories:Trojan,Backdoor

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Demiz.Server:

An up-to-date copy of ExterminateIt should detect and prevent infection from Demiz.Server.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Demiz.Server manually.

To completely manually remove Demiz.Server malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Demiz.Server.

  1. Use Task Manager to terminate the Demiz.Server process.
  2. Delete the original Demiz.Server file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Demiz.Server from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Demiz.Server!


Also Be Aware of the Following Threats:
rtcode.com Tracking Cookie Removal
Removing PSWStealer.PerfectSpy Trojan
Remove DeltreeY.at Trojan

Bancos.HWY Trojan

Bancos.HWY malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bancos.HWY:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bancos.HWY.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bancos.HWY manually.

To completely manually remove Bancos.HWY malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.HWY.

  1. Use Task Manager to terminate the Bancos.HWY process.
  2. Delete the original Bancos.HWY file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bancos.HWY from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bancos.HWY!


Also Be Aware of the Following Threats:
Skull.Burrow.Connection.Bouncer Backdoor Symptoms
Voonda Toolbar Removal instruction

softure.com Tracking Cookie

softure.com malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing softure.com:

An up-to-date copy of ExterminateIt should detect and prevent infection from softure.com.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove softure.com manually.

To completely manually remove softure.com malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with softure.com.

  1. Use Task Manager to terminate the softure.com process.
  2. Delete the original softure.com file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes softure.com from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of softure.com!


Also Be Aware of the Following Threats:
Peccaminosa Hijacker Removal
Bancos.FXR Trojan Removal
Bancos.IJZ Trojan Removal instruction
Signs Trojan Symptoms
Razliv Trojan Information

Modtool Trojan

Modtool malware description and removal detail
Categories:Trojan,Hacker Tool
Also known as:

[Other]Win32/ModTool,Win32/ModTool.E,WIn32/ModTool.G,Win32/ModTool.M,Win32/ModTool.N,Win32/ModTool.P,Win32/ModTool.Q

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\MWWW\securaq.exe
[%SYSTEM%]\MWWW\securaq.exe

In order to ensure that the Modtool is launched automatically each time the system is booted, the Modtool adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%SYSTEM%]\MWWW\securaq.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Modtool:

Files:
[%SYSTEM%]\MWWW\securaq.exe
[%SYSTEM%]\MWWW\securaq.exe

Removing Modtool:

An up-to-date copy of ExterminateIt should detect and prevent infection from Modtool.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Modtool manually.

To completely manually remove Modtool malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Modtool.

  1. Use Task Manager to terminate the Modtool process.
  2. Delete the original Modtool file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Modtool from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Modtool!


Also Be Aware of the Following Threats:
MIRC.nHTMLn DoS Removal instruction
Pointex Backdoor Removal instruction
Pigeon.EFZ Trojan Removal instruction
customerreach.com Tracking Cookie Removal instruction

AXVenore Adware

AXVenore malware description and removal detail
Categories:Adware

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting AXVenore:

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run

Removing AXVenore:

An up-to-date copy of ExterminateIt should detect and prevent infection from AXVenore.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove AXVenore manually.

To completely manually remove AXVenore malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with AXVenore.

  1. Use Task Manager to terminate the AXVenore process.
  2. Delete the original AXVenore file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes AXVenore from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of AXVenore!


Also Be Aware of the Following Threats:
DBVG Trojan Cleaner
Vxidl.AAI Trojan Information
VBS.PSW.Lemir Trojan Removal

JS.LinkRun Trojan

JS.LinkRun malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing JS.LinkRun:

An up-to-date copy of ExterminateIt should detect and prevent infection from JS.LinkRun.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove JS.LinkRun manually.

To completely manually remove JS.LinkRun malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with JS.LinkRun.

  1. Use Task Manager to terminate the JS.LinkRun process.
  2. Delete the original JS.LinkRun file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes JS.LinkRun from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of JS.LinkRun!


Also Be Aware of the Following Threats:
Let.Me.Rule! Backdoor Removal instruction
Vxidl.BEP Trojan Symptoms
Revob Trojan Symptoms
SillyDl.BYS Trojan Symptoms

InCommander.KeySpy Trojan

InCommander.KeySpy malware description and removal detail
Categories:Trojan,Spyware,Backdoor
Also known as:

[Eset]Win32/InCommander.KeySpy.01 trojan;
[Computer Associates]Backdoor/InCommander.17.KeySpy.0

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing InCommander.KeySpy:

An up-to-date copy of ExterminateIt should detect and prevent infection from InCommander.KeySpy.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove InCommander.KeySpy manually.

To completely manually remove InCommander.KeySpy malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with InCommander.KeySpy.

  1. Use Task Manager to terminate the InCommander.KeySpy process.
  2. Delete the original InCommander.KeySpy file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes InCommander.KeySpy from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of InCommander.KeySpy!


Also Be Aware of the Following Threats:
Remove SillyDl.CCQ Trojan
Unmanarc.Remote.Control.Server.05b1 Backdoor Symptoms

Cyanure.Server Trojan

Cyanure.Server malware description and removal detail
Categories:Trojan,Backdoor

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Cyanure.Server:

An up-to-date copy of ExterminateIt should detect and prevent infection from Cyanure.Server.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Cyanure.Server manually.

To completely manually remove Cyanure.Server malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Cyanure.Server.

  1. Use Task Manager to terminate the Cyanure.Server process.
  2. Delete the original Cyanure.Server file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Cyanure.Server from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Cyanure.Server!


Also Be Aware of the Following Threats:
Disable.Task.Manager.Reg.Entry Trojan Removal
Removing Smitfraud.c Trojan
Pigeon.ALX Trojan Cleaner