Thursday, January 1, 2009

Edipole Adware

Edipole malware description and removal detail
Categories:Adware
Visible Symptoms:
Files in system folders:
[%DESKTOP%]\sitexxx.lnk
[%FAVORITES%]\Links\sitexxx.lnk
[%STARTMENU%]\sitexxx.lnk
[%DESKTOP%]\sitexxx.lnk
[%FAVORITES%]\Links\sitexxx.lnk
[%STARTMENU%]\sitexxx.lnk

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Edipole:

Files:
[%DESKTOP%]\sitexxx.lnk
[%FAVORITES%]\Links\sitexxx.lnk
[%STARTMENU%]\sitexxx.lnk
[%DESKTOP%]\sitexxx.lnk
[%FAVORITES%]\Links\sitexxx.lnk
[%STARTMENU%]\sitexxx.lnk

Folders:
[%PROGRAM_FILES%]\sitexxx

Removing Edipole:

An up-to-date copy of ExterminateIt should detect and prevent infection from Edipole.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Edipole manually.

To completely manually remove Edipole malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Edipole.

  1. Use Task Manager to terminate the Edipole process.
  2. Delete the original Edipole file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Edipole from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Edipole!


Also Be Aware of the Following Threats:
Psychward.r03a RAT Removal
Bancos.GOJ Trojan Symptoms

Backdoor.Tetris Trojan

Backdoor.Tetris malware description and removal detail
Categories:Trojan,Backdoor
Also known as:

[Kaspersky]TrojanDropper.Win32.Delf.bl;
[Eset]Win32/TrojanDropper.Delf.BL trojan;
[Panda]Bck/Tetris

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Backdoor.Tetris:

An up-to-date copy of ExterminateIt should detect and prevent infection from Backdoor.Tetris.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Backdoor.Tetris manually.

To completely manually remove Backdoor.Tetris malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Backdoor.Tetris.

  1. Use Task Manager to terminate the Backdoor.Tetris process.
  2. Delete the original Backdoor.Tetris file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Backdoor.Tetris from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Backdoor.Tetris!


Also Be Aware of the Following Threats:
Remove Vxidl.BEJ Trojan
Bancos.ASV Trojan Information
Badtrack Trojan Cleaner
Remove Gollum Trojan

Delf.hp.Server Backdoor

Delf.hp.Server malware description and removal detail
Categories:Backdoor
Also known as:

[Computer Associates]Backdoor/Delf.hp.Server

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Delf.hp.Server:

An up-to-date copy of ExterminateIt should detect and prevent infection from Delf.hp.Server.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Delf.hp.Server manually.

To completely manually remove Delf.hp.Server malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Delf.hp.Server.

  1. Use Task Manager to terminate the Delf.hp.Server process.
  2. Delete the original Delf.hp.Server file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Delf.hp.Server from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Delf.hp.Server!


Also Be Aware of the Following Threats:
PrivatePort.001a RAT Removal
DetectSatan Ransomware Information
Pigeon.AVGA Trojan Removal instruction
Almanahe Trojan Removal instruction
Stimp Trojan Removal

PswStor Trojan

PswStor malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]Trojan.SPS.100;
[Panda]Trj/SPS.100;
[Computer Associates]PswStor.A!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing PswStor:

An up-to-date copy of ExterminateIt should detect and prevent infection from PswStor.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove PswStor manually.

To completely manually remove PswStor malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with PswStor.

  1. Use Task Manager to terminate the PswStor process.
  2. Delete the original PswStor file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes PswStor from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of PswStor!


Also Be Aware of the Following Threats:
Remove BackDoor.GZ.gen Trojan

PWS.MSNCrack Backdoor

PWS.MSNCrack malware description and removal detail
Categories:Backdoor,Hacker Tool
Also known as:

[Kaspersky]Trojan.PSW.VB.l;
[McAfee]PWS-MSNCrack;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/MsnPassRipper;
[Computer Associates]Backdoor/MsnPassRipper

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing PWS.MSNCrack:

An up-to-date copy of ExterminateIt should detect and prevent infection from PWS.MSNCrack.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove PWS.MSNCrack manually.

To completely manually remove PWS.MSNCrack malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with PWS.MSNCrack.

  1. Use Task Manager to terminate the PWS.MSNCrack process.
  2. Delete the original PWS.MSNCrack file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes PWS.MSNCrack from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of PWS.MSNCrack!


Also Be Aware of the Following Threats:
Remove Clit10.sextracker.Tracking.Cookie Tracking Cookie
PSW.Justas Trojan Removal instruction
Removing Sect Trojan
Golden.Retriever Trojan Information

Bancos.GEX Trojan

Bancos.GEX malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bancos.GEX:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bancos.GEX.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bancos.GEX manually.

To completely manually remove Bancos.GEX malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.GEX.

  1. Use Task Manager to terminate the Bancos.GEX process.
  2. Delete the original Bancos.GEX file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bancos.GEX from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bancos.GEX!


Also Be Aware of the Following Threats:
SillyDl.CHE Trojan Symptoms

Chaos Trojan

Chaos malware description and removal detail
Categories:Trojan,Backdoor,Downloader,DoS
Also known as:

[Kaspersky]Chaos.1181,Virus.DOS.Chaos.1181,Virus.DOS.Chaos.1241;
[Eset]Chaos.1181.C virus,Chaos.1181.D virus,Chaos.1181.E virus,Chaos.1181.F virus,Chaos.1181.K virus,Chaos.1181.B virus;
[McAfee]Chaos.1181;
[F-Prot]Chaos.1181.C,Chaos.1181.damaged?,Chaos.1181.F;
[Panda]Chaos.1181,Spyer;
[Computer Associates]Chaos

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Chaos:

An up-to-date copy of ExterminateIt should detect and prevent infection from Chaos.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Chaos manually.

To completely manually remove Chaos malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Chaos.

  1. Use Task Manager to terminate the Chaos process.
  2. Delete the original Chaos file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Chaos from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Chaos!


Also Be Aware of the Following Threats:
Bancos.FTM Trojan Symptoms
APM.GreenStripes Trojan Symptoms

Troj.Agent.he Trojan

Troj.Agent.he malware description and removal detail
Categories:Trojan,Downloader
Also known as:

[Panda]Trj/Agent.AR

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Troj.Agent.he:

Registry Keys:
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_comxt
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\comxt

Removing Troj.Agent.he:

An up-to-date copy of ExterminateIt should detect and prevent infection from Troj.Agent.he.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Troj.Agent.he manually.

To completely manually remove Troj.Agent.he malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Troj.Agent.he.

  1. Use Task Manager to terminate the Troj.Agent.he process.
  2. Delete the original Troj.Agent.he file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Troj.Agent.he from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Troj.Agent.he!


Also Be Aware of the Following Threats:
Win32.Tormador Trojan Information
Remove Itavir Trojan
Losysi Trojan Removal instruction

MasterParadise.Setup Backdoor

MasterParadise.Setup malware description and removal detail
Categories:Backdoor

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing MasterParadise.Setup:

An up-to-date copy of ExterminateIt should detect and prevent infection from MasterParadise.Setup.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove MasterParadise.Setup manually.

To completely manually remove MasterParadise.Setup malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with MasterParadise.Setup.

  1. Use Task Manager to terminate the MasterParadise.Setup process.
  2. Delete the original MasterParadise.Setup file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes MasterParadise.Setup from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of MasterParadise.Setup!


Also Be Aware of the Following Threats:
SysUp Trojan Symptoms
Vidspy Trojan Removal instruction

Pigeon.EBW Trojan

Pigeon.EBW malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.EBW:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.EBW.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.EBW manually.

To completely manually remove Pigeon.EBW malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.EBW.

  1. Use Task Manager to terminate the Pigeon.EBW process.
  2. Delete the original Pigeon.EBW file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.EBW from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.EBW!


Also Be Aware of the Following Threats:
Vxidl.AQI Trojan Cleaner
SillyDl.CEL Trojan Removal
Pigeon.EXT Trojan Information
FloodBot DoS Removal instruction

SillyDl.BCL Downloader

SillyDl.BCL malware description and removal detail
Categories:Downloader
Also known as:

[Kaspersky]Trojan-Downloader.Win32.Cryptic.w;
[Other]Win32/SillyDl.BCL

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing SillyDl.BCL:

An up-to-date copy of ExterminateIt should detect and prevent infection from SillyDl.BCL.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove SillyDl.BCL manually.

To completely manually remove SillyDl.BCL malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SillyDl.BCL.

  1. Use Task Manager to terminate the SillyDl.BCL process.
  2. Delete the original SillyDl.BCL file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes SillyDl.BCL from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of SillyDl.BCL!


Also Be Aware of the Following Threats:
Hacksoff Trojan Information
Downloader.AWI Trojan Symptoms

Zlob.Fam.VideoAccessCodec Trojan

Zlob.Fam.VideoAccessCodec malware description and removal detail
Categories:Trojan,Popups

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Zlob.Fam.VideoAccessCodec:

Folders:
[%PROGRAM_FILES%]\VideoAccessCodec

Registry Keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\VideoAccessCodec

Removing Zlob.Fam.VideoAccessCodec:

An up-to-date copy of ExterminateIt should detect and prevent infection from Zlob.Fam.VideoAccessCodec.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Zlob.Fam.VideoAccessCodec manually.

To completely manually remove Zlob.Fam.VideoAccessCodec malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Zlob.Fam.VideoAccessCodec.

  1. Use Task Manager to terminate the Zlob.Fam.VideoAccessCodec process.
  2. Delete the original Zlob.Fam.VideoAccessCodec file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Zlob.Fam.VideoAccessCodec from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Zlob.Fam.VideoAccessCodec!


Also Be Aware of the Following Threats:
Setme Trojan Cleaner
Removing Startpage.GZ1 Trojan
Malum.EDD Trojan Removal
Bat.Attrib Trojan Information

Project98Macro.Eikrad Trojan

Project98Macro.Eikrad malware description and removal detail
Categories:Trojan,Backdoor,Downloader,DoS
Also known as:

[Panda]P98M/Eikrad.A;
[Computer Associates]Project98Macro/Eikrad.A

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Project98Macro.Eikrad:

An up-to-date copy of ExterminateIt should detect and prevent infection from Project98Macro.Eikrad.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Project98Macro.Eikrad manually.

To completely manually remove Project98Macro.Eikrad malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Project98Macro.Eikrad.

  1. Use Task Manager to terminate the Project98Macro.Eikrad process.
  2. Delete the original Project98Macro.Eikrad file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Project98Macro.Eikrad from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Project98Macro.Eikrad!


Also Be Aware of the Following Threats:
IELoader Adware Cleaner
Bancos.HLM Trojan Removal instruction
Removing Scapegoat Hostile Code
Remove Vxidl.ALW Trojan

Pigeon.AVBO Trojan

Pigeon.AVBO malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.AVBO:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.AVBO.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.AVBO manually.

To completely manually remove Pigeon.AVBO malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.AVBO.

  1. Use Task Manager to terminate the Pigeon.AVBO process.
  2. Delete the original Pigeon.AVBO file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.AVBO from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.AVBO!


Also Be Aware of the Following Threats:
Remove Bancos.FVL Trojan
Pigeon.AEF Trojan Information

KaZaA Worm

KaZaA malware description and removal detail
Categories:Worm
Also known as:

[Panda]Adware/BrilliantDigital,Adware/Medload,Adware/TopMoxie

Visible Symptoms:
Files in system folders:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Launch Kazaa.lnk
[%DESKTOP%]\kazaa media desktop.lnk
[%DESKTOP%]\kazaa promotions.url
[%DESKTOP%]\kazaa shop.lnk
[%DESKTOP%]\kazaa shop.url
[%DESKTOP%]\Kazaa.lnk
[%DESKTOP%]\kazaalite.lnk
[%DESKTOP%]\kazaa_setup.exe
[%DESKTOP%]\kazza.lnk
[%DESKTOP%]\kli.lnk
[%DESKTOP%]\kza.lnk
[%DESKTOP%]\my shared folder.lnk
[%DESKTOP%]\my shared folder.url
[%DESKTOP%]\play poker now!.lnk
[%DESKTOP%]\your free casino chips!.lnk
[%PROFILE%]\administrator\start menu\programs\altnet\peer points manager.lnk
[%PROFILE_TEMP%]\altnet\adm25.dll
[%PROFILE_TEMP%]\altnet\admdata.dll
[%PROFILE_TEMP%]\altnet\admdloader.dll
[%PROFILE_TEMP%]\altnet\admfdi.dll
[%PROFILE_TEMP%]\altnet\atl.dll
[%PROFILE_TEMP%]\altnet\msvcirt.dll
[%PROFILE_TEMP%]\altnet\setup.exe
[%PROFILE_TEMP%]\p2psetup.exe
[%PROGRAMS%]\kazaa media desktop\kazaa media desktop.lnk
[%PROGRAMS%]\kazaa.lnk
[%PROGRAMS%]\kazaaliyr.lnk
[%PROGRAMS%]\kza.lnk
[%SYSTEM%]\bifq5x5n.exe
[%SYSTEM%]\cd_clint.dll
[%SYSTEM%]\irqy.exe
[%SYSTEM%]\marshal.dll
[%SYSTEM%]\p2p networking v125.cpl
[%SYSTEM%]\p2pnetworking.exe
[%WINDOWS%]\cache371\b_371_0_1_586300.htm
[%WINDOWS%]\cache371\b_371_0_1_589300.htm
[%WINDOWS%]\cache371\b_371_0_1_589500.htm
[%WINDOWS%]\cache371\b_371_0_1_589600.htm
[%WINDOWS%]\cache371\b_371_0_1_591900.htm
[%WINDOWS%]\cache371\b_371_0_1_592000.htm
[%WINDOWS%]\cache371\b_371_0_1_592200.htm
[%WINDOWS%]\cache371\b_371_0_1_646000.htm
[%WINDOWS%]\cache371\b_371_0_1_648100.htm
[%WINDOWS%]\cache371\b_371_0_1_664000.htm
[%WINDOWS%]\cache371\b_371_0_1_668500.htm
[%WINDOWS%]\cache371\b_371_0_1_737400.htm
[%WINDOWS%]\cache371\b_371_0_1_775900.htm
[%WINDOWS%]\cache371\b_371_0_1_794100.htm
[%WINDOWS%]\cache371\b_371_2_1_536000.htm
[%WINDOWS%]\cache371\b_371_2_1_566600.htm
[%WINDOWS%]\cache371\b_371_2_1_567900.htm
[%WINDOWS%]\cache371\b_371_2_1_574200.htm
[%WINDOWS%]\cache371\b_371_2_1_576200.htm
[%WINDOWS%]\cache371\b_371_2_1_577800.htm
[%WINDOWS%]\cache371\b_371_2_1_593200.htm
[%WINDOWS%]\cache371\b_371_2_1_635400.htm
[%WINDOWS%]\cache371\b_371_2_1_649800.htm
[%WINDOWS%]\cache371\b_371_2_1_655600.htm
[%WINDOWS%]\cache371\b_371_2_1_662100.htm
[%WINDOWS%]\cache371\b_371_2_1_663900.htm
[%WINDOWS%]\cache371\b_371_2_1_667100.htm
[%WINDOWS%]\cache371\b_371_2_1_738900.htm
[%WINDOWS%]\cache371\b_371_2_1_739900.htm
[%WINDOWS%]\cache371\b_371_2_1_746100.htm
[%WINDOWS%]\cache371\b_371_2_1_755100.htm
[%WINDOWS%]\cache371\b_371_2_1_755600.htm
[%WINDOWS%]\cache371\b_371_2_1_756100.htm
[%WINDOWS%]\cache371\b_371_2_1_775400.htm
[%WINDOWS%]\cache371\b_371_2_1_777800.htm
[%WINDOWS%]\cache371\b_371_2_2_568100.htm
[%WINDOWS%]\cache371\b_371_2_2_570100.htm
[%WINDOWS%]\cache371\b_371_2_2_572300.htm
[%WINDOWS%]\cache371\b_371_2_2_573900.htm
[%WINDOWS%]\cache371\b_371_2_2_576000.htm
[%WINDOWS%]\cache371\b_371_2_2_649600.htm
[%WINDOWS%]\cache371\b_371_2_2_703900.htm
[%WINDOWS%]\cache371\b_371_2_2_712000.htm
[%WINDOWS%]\cache371\b_371_2_2_730800.htm
[%WINDOWS%]\cache371\b_371_2_2_731300.htm
[%WINDOWS%]\cache371\b_371_2_2_778600.htm
[%WINDOWS%]\cache371\b_371_2_3_519700.htm
[%WINDOWS%]\cache371\b_371_2_3_532200.htm
[%WINDOWS%]\cache371\b_371_2_3_558300.htm
[%WINDOWS%]\cache371\b_371_2_3_563900.htm
[%WINDOWS%]\cache371\b_371_2_3_588100.htm
[%WINDOWS%]\cache371\b_371_2_3_642300.htm
[%WINDOWS%]\cache371\b_371_2_3_670700.htm
[%WINDOWS%]\cache371\b_371_2_3_679500.htm
[%WINDOWS%]\cache371\b_371_2_3_778600.htm
[%WINDOWS%]\cache371\b_500600.htm
[%WINDOWS%]\cache371\b_501000.htm
[%WINDOWS%]\cache371\b_525900.htm
[%WINDOWS%]\cache371\b_604700.htm
[%WINDOWS%]\cache371\b_605600.htm
[%WINDOWS%]\cache371\b_605800.htm
[%WINDOWS%]\cache371\b_647400.htm
[%WINDOWS%]\cache371\b_647800.htm
[%WINDOWS%]\cache371\b_670300.htm
[%WINDOWS%]\cache371\b_727700.htm
[%WINDOWS%]\cache371\b_743700.htm
[%WINDOWS%]\cache371\b_753400.htm
[%WINDOWS%]\cache371\b_754300.htm
[%WINDOWS%]\cache371\b_775700.htm
[%WINDOWS%]\cache371\b_790700.htm
[%WINDOWS%]\cache371\t_b_371_0_1_591900.htm
[%WINDOWS%]\cache371\t_b_371_0_1_592000.htm
[%WINDOWS%]\cache371\t_b_371_0_1_592200.htm
[%WINDOWS%]\cache371\t_b_371_2_1_574200.htm
[%WINDOWS%]\cache371\t_b_371_2_1_576200.htm
[%WINDOWS%]\cache371\t_b_371_2_1_635400.htm
[%WINDOWS%]\cache371\t_b_371_2_1_662100.htm
[%WINDOWS%]\cache371\t_b_371_2_1_775400.htm
[%WINDOWS%]\cache371\t_b_371_2_2_712000.htm
[%WINDOWS%]\cache371\t_b_371_2_2_778600.htm
[%WINDOWS%]\cache371\t_b_371_2_3_558300.htm
[%WINDOWS%]\cache371\t_b_371_2_3_642300.htm
[%WINDOWS%]\cache371\t_b_500600.htm
[%WINDOWS%]\cache371\t_b_525900.htm
[%WINDOWS%]\cache371\t_b_604700.htm
[%WINDOWS%]\cache371\t_b_647400.htm
[%WINDOWS%]\cache371\t_b_647800.htm
[%WINDOWS%]\cache371\t_b_670300.htm
[%WINDOWS%]\cache371\t_b_727700.htm
[%WINDOWS%]\cache371\t_b_743700.htm
[%WINDOWS%]\cache371\t_b_753400.htm
[%WINDOWS%]\cache371\t_b_754300.htm
[%WINDOWS%]\cache371\t_b_775700.htm
[%WINDOWS%]\cache371\t_b_790700.htm
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Launch Kazaa.lnk
[%DESKTOP%]\kazaa media desktop.lnk
[%DESKTOP%]\kazaa promotions.url
[%DESKTOP%]\kazaa shop.lnk
[%DESKTOP%]\kazaa shop.url
[%DESKTOP%]\Kazaa.lnk
[%DESKTOP%]\kazaalite.lnk
[%DESKTOP%]\kazaa_setup.exe
[%DESKTOP%]\kazza.lnk
[%DESKTOP%]\kli.lnk
[%DESKTOP%]\kza.lnk
[%DESKTOP%]\my shared folder.lnk
[%DESKTOP%]\my shared folder.url
[%DESKTOP%]\play poker now!.lnk
[%DESKTOP%]\your free casino chips!.lnk
[%PROFILE%]\administrator\start menu\programs\altnet\peer points manager.lnk
[%PROFILE_TEMP%]\altnet\adm25.dll
[%PROFILE_TEMP%]\altnet\admdata.dll
[%PROFILE_TEMP%]\altnet\admdloader.dll
[%PROFILE_TEMP%]\altnet\admfdi.dll
[%PROFILE_TEMP%]\altnet\atl.dll
[%PROFILE_TEMP%]\altnet\msvcirt.dll
[%PROFILE_TEMP%]\altnet\setup.exe
[%PROFILE_TEMP%]\p2psetup.exe
[%PROGRAMS%]\kazaa media desktop\kazaa media desktop.lnk
[%PROGRAMS%]\kazaa.lnk
[%PROGRAMS%]\kazaaliyr.lnk
[%PROGRAMS%]\kza.lnk
[%SYSTEM%]\bifq5x5n.exe
[%SYSTEM%]\cd_clint.dll
[%SYSTEM%]\irqy.exe
[%SYSTEM%]\marshal.dll
[%SYSTEM%]\p2p networking v125.cpl
[%SYSTEM%]\p2pnetworking.exe
[%WINDOWS%]\cache371\b_371_0_1_586300.htm
[%WINDOWS%]\cache371\b_371_0_1_589300.htm
[%WINDOWS%]\cache371\b_371_0_1_589500.htm
[%WINDOWS%]\cache371\b_371_0_1_589600.htm
[%WINDOWS%]\cache371\b_371_0_1_591900.htm
[%WINDOWS%]\cache371\b_371_0_1_592000.htm
[%WINDOWS%]\cache371\b_371_0_1_592200.htm
[%WINDOWS%]\cache371\b_371_0_1_646000.htm
[%WINDOWS%]\cache371\b_371_0_1_648100.htm
[%WINDOWS%]\cache371\b_371_0_1_664000.htm
[%WINDOWS%]\cache371\b_371_0_1_668500.htm
[%WINDOWS%]\cache371\b_371_0_1_737400.htm
[%WINDOWS%]\cache371\b_371_0_1_775900.htm
[%WINDOWS%]\cache371\b_371_0_1_794100.htm
[%WINDOWS%]\cache371\b_371_2_1_536000.htm
[%WINDOWS%]\cache371\b_371_2_1_566600.htm
[%WINDOWS%]\cache371\b_371_2_1_567900.htm
[%WINDOWS%]\cache371\b_371_2_1_574200.htm
[%WINDOWS%]\cache371\b_371_2_1_576200.htm
[%WINDOWS%]\cache371\b_371_2_1_577800.htm
[%WINDOWS%]\cache371\b_371_2_1_593200.htm
[%WINDOWS%]\cache371\b_371_2_1_635400.htm
[%WINDOWS%]\cache371\b_371_2_1_649800.htm
[%WINDOWS%]\cache371\b_371_2_1_655600.htm
[%WINDOWS%]\cache371\b_371_2_1_662100.htm
[%WINDOWS%]\cache371\b_371_2_1_663900.htm
[%WINDOWS%]\cache371\b_371_2_1_667100.htm
[%WINDOWS%]\cache371\b_371_2_1_738900.htm
[%WINDOWS%]\cache371\b_371_2_1_739900.htm
[%WINDOWS%]\cache371\b_371_2_1_746100.htm
[%WINDOWS%]\cache371\b_371_2_1_755100.htm
[%WINDOWS%]\cache371\b_371_2_1_755600.htm
[%WINDOWS%]\cache371\b_371_2_1_756100.htm
[%WINDOWS%]\cache371\b_371_2_1_775400.htm
[%WINDOWS%]\cache371\b_371_2_1_777800.htm
[%WINDOWS%]\cache371\b_371_2_2_568100.htm
[%WINDOWS%]\cache371\b_371_2_2_570100.htm
[%WINDOWS%]\cache371\b_371_2_2_572300.htm
[%WINDOWS%]\cache371\b_371_2_2_573900.htm
[%WINDOWS%]\cache371\b_371_2_2_576000.htm
[%WINDOWS%]\cache371\b_371_2_2_649600.htm
[%WINDOWS%]\cache371\b_371_2_2_703900.htm
[%WINDOWS%]\cache371\b_371_2_2_712000.htm
[%WINDOWS%]\cache371\b_371_2_2_730800.htm
[%WINDOWS%]\cache371\b_371_2_2_731300.htm
[%WINDOWS%]\cache371\b_371_2_2_778600.htm
[%WINDOWS%]\cache371\b_371_2_3_519700.htm
[%WINDOWS%]\cache371\b_371_2_3_532200.htm
[%WINDOWS%]\cache371\b_371_2_3_558300.htm
[%WINDOWS%]\cache371\b_371_2_3_563900.htm
[%WINDOWS%]\cache371\b_371_2_3_588100.htm
[%WINDOWS%]\cache371\b_371_2_3_642300.htm
[%WINDOWS%]\cache371\b_371_2_3_670700.htm
[%WINDOWS%]\cache371\b_371_2_3_679500.htm
[%WINDOWS%]\cache371\b_371_2_3_778600.htm
[%WINDOWS%]\cache371\b_500600.htm
[%WINDOWS%]\cache371\b_501000.htm
[%WINDOWS%]\cache371\b_525900.htm
[%WINDOWS%]\cache371\b_604700.htm
[%WINDOWS%]\cache371\b_605600.htm
[%WINDOWS%]\cache371\b_605800.htm
[%WINDOWS%]\cache371\b_647400.htm
[%WINDOWS%]\cache371\b_647800.htm
[%WINDOWS%]\cache371\b_670300.htm
[%WINDOWS%]\cache371\b_727700.htm
[%WINDOWS%]\cache371\b_743700.htm
[%WINDOWS%]\cache371\b_753400.htm
[%WINDOWS%]\cache371\b_754300.htm
[%WINDOWS%]\cache371\b_775700.htm
[%WINDOWS%]\cache371\b_790700.htm
[%WINDOWS%]\cache371\t_b_371_0_1_591900.htm
[%WINDOWS%]\cache371\t_b_371_0_1_592000.htm
[%WINDOWS%]\cache371\t_b_371_0_1_592200.htm
[%WINDOWS%]\cache371\t_b_371_2_1_574200.htm
[%WINDOWS%]\cache371\t_b_371_2_1_576200.htm
[%WINDOWS%]\cache371\t_b_371_2_1_635400.htm
[%WINDOWS%]\cache371\t_b_371_2_1_662100.htm
[%WINDOWS%]\cache371\t_b_371_2_1_775400.htm
[%WINDOWS%]\cache371\t_b_371_2_2_712000.htm
[%WINDOWS%]\cache371\t_b_371_2_2_778600.htm
[%WINDOWS%]\cache371\t_b_371_2_3_558300.htm
[%WINDOWS%]\cache371\t_b_371_2_3_642300.htm
[%WINDOWS%]\cache371\t_b_500600.htm
[%WINDOWS%]\cache371\t_b_525900.htm
[%WINDOWS%]\cache371\t_b_604700.htm
[%WINDOWS%]\cache371\t_b_647400.htm
[%WINDOWS%]\cache371\t_b_647800.htm
[%WINDOWS%]\cache371\t_b_670300.htm
[%WINDOWS%]\cache371\t_b_727700.htm
[%WINDOWS%]\cache371\t_b_743700.htm
[%WINDOWS%]\cache371\t_b_753400.htm
[%WINDOWS%]\cache371\t_b_754300.htm
[%WINDOWS%]\cache371\t_b_775700.htm
[%WINDOWS%]\cache371\t_b_790700.htm

In order to ensure that the KaZaA is launched automatically each time the system is booted, the KaZaA adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%DESKTOP%]\kazaa_setup.exe
[%PROFILE_TEMP%]\altnet\setup.exe
[%PROFILE_TEMP%]\p2psetup.exe
[%SYSTEM%]\bifq5x5n.exe
[%SYSTEM%]\irqy.exe
[%SYSTEM%]\p2pnetworking.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting KaZaA:

Files:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Launch Kazaa.lnk
[%DESKTOP%]\kazaa media desktop.lnk
[%DESKTOP%]\kazaa promotions.url
[%DESKTOP%]\kazaa shop.lnk
[%DESKTOP%]\kazaa shop.url
[%DESKTOP%]\Kazaa.lnk
[%DESKTOP%]\kazaalite.lnk
[%DESKTOP%]\kazaa_setup.exe
[%DESKTOP%]\kazza.lnk
[%DESKTOP%]\kli.lnk
[%DESKTOP%]\kza.lnk
[%DESKTOP%]\my shared folder.lnk
[%DESKTOP%]\my shared folder.url
[%DESKTOP%]\play poker now!.lnk
[%DESKTOP%]\your free casino chips!.lnk
[%PROFILE%]\administrator\start menu\programs\altnet\peer points manager.lnk
[%PROFILE_TEMP%]\altnet\adm25.dll
[%PROFILE_TEMP%]\altnet\admdata.dll
[%PROFILE_TEMP%]\altnet\admdloader.dll
[%PROFILE_TEMP%]\altnet\admfdi.dll
[%PROFILE_TEMP%]\altnet\atl.dll
[%PROFILE_TEMP%]\altnet\msvcirt.dll
[%PROFILE_TEMP%]\altnet\setup.exe
[%PROFILE_TEMP%]\p2psetup.exe
[%PROGRAMS%]\kazaa media desktop\kazaa media desktop.lnk
[%PROGRAMS%]\kazaa.lnk
[%PROGRAMS%]\kazaaliyr.lnk
[%PROGRAMS%]\kza.lnk
[%SYSTEM%]\bifq5x5n.exe
[%SYSTEM%]\cd_clint.dll
[%SYSTEM%]\irqy.exe
[%SYSTEM%]\marshal.dll
[%SYSTEM%]\p2p networking v125.cpl
[%SYSTEM%]\p2pnetworking.exe
[%WINDOWS%]\cache371\b_371_0_1_586300.htm
[%WINDOWS%]\cache371\b_371_0_1_589300.htm
[%WINDOWS%]\cache371\b_371_0_1_589500.htm
[%WINDOWS%]\cache371\b_371_0_1_589600.htm
[%WINDOWS%]\cache371\b_371_0_1_591900.htm
[%WINDOWS%]\cache371\b_371_0_1_592000.htm
[%WINDOWS%]\cache371\b_371_0_1_592200.htm
[%WINDOWS%]\cache371\b_371_0_1_646000.htm
[%WINDOWS%]\cache371\b_371_0_1_648100.htm
[%WINDOWS%]\cache371\b_371_0_1_664000.htm
[%WINDOWS%]\cache371\b_371_0_1_668500.htm
[%WINDOWS%]\cache371\b_371_0_1_737400.htm
[%WINDOWS%]\cache371\b_371_0_1_775900.htm
[%WINDOWS%]\cache371\b_371_0_1_794100.htm
[%WINDOWS%]\cache371\b_371_2_1_536000.htm
[%WINDOWS%]\cache371\b_371_2_1_566600.htm
[%WINDOWS%]\cache371\b_371_2_1_567900.htm
[%WINDOWS%]\cache371\b_371_2_1_574200.htm
[%WINDOWS%]\cache371\b_371_2_1_576200.htm
[%WINDOWS%]\cache371\b_371_2_1_577800.htm
[%WINDOWS%]\cache371\b_371_2_1_593200.htm
[%WINDOWS%]\cache371\b_371_2_1_635400.htm
[%WINDOWS%]\cache371\b_371_2_1_649800.htm
[%WINDOWS%]\cache371\b_371_2_1_655600.htm
[%WINDOWS%]\cache371\b_371_2_1_662100.htm
[%WINDOWS%]\cache371\b_371_2_1_663900.htm
[%WINDOWS%]\cache371\b_371_2_1_667100.htm
[%WINDOWS%]\cache371\b_371_2_1_738900.htm
[%WINDOWS%]\cache371\b_371_2_1_739900.htm
[%WINDOWS%]\cache371\b_371_2_1_746100.htm
[%WINDOWS%]\cache371\b_371_2_1_755100.htm
[%WINDOWS%]\cache371\b_371_2_1_755600.htm
[%WINDOWS%]\cache371\b_371_2_1_756100.htm
[%WINDOWS%]\cache371\b_371_2_1_775400.htm
[%WINDOWS%]\cache371\b_371_2_1_777800.htm
[%WINDOWS%]\cache371\b_371_2_2_568100.htm
[%WINDOWS%]\cache371\b_371_2_2_570100.htm
[%WINDOWS%]\cache371\b_371_2_2_572300.htm
[%WINDOWS%]\cache371\b_371_2_2_573900.htm
[%WINDOWS%]\cache371\b_371_2_2_576000.htm
[%WINDOWS%]\cache371\b_371_2_2_649600.htm
[%WINDOWS%]\cache371\b_371_2_2_703900.htm
[%WINDOWS%]\cache371\b_371_2_2_712000.htm
[%WINDOWS%]\cache371\b_371_2_2_730800.htm
[%WINDOWS%]\cache371\b_371_2_2_731300.htm
[%WINDOWS%]\cache371\b_371_2_2_778600.htm
[%WINDOWS%]\cache371\b_371_2_3_519700.htm
[%WINDOWS%]\cache371\b_371_2_3_532200.htm
[%WINDOWS%]\cache371\b_371_2_3_558300.htm
[%WINDOWS%]\cache371\b_371_2_3_563900.htm
[%WINDOWS%]\cache371\b_371_2_3_588100.htm
[%WINDOWS%]\cache371\b_371_2_3_642300.htm
[%WINDOWS%]\cache371\b_371_2_3_670700.htm
[%WINDOWS%]\cache371\b_371_2_3_679500.htm
[%WINDOWS%]\cache371\b_371_2_3_778600.htm
[%WINDOWS%]\cache371\b_500600.htm
[%WINDOWS%]\cache371\b_501000.htm
[%WINDOWS%]\cache371\b_525900.htm
[%WINDOWS%]\cache371\b_604700.htm
[%WINDOWS%]\cache371\b_605600.htm
[%WINDOWS%]\cache371\b_605800.htm
[%WINDOWS%]\cache371\b_647400.htm
[%WINDOWS%]\cache371\b_647800.htm
[%WINDOWS%]\cache371\b_670300.htm
[%WINDOWS%]\cache371\b_727700.htm
[%WINDOWS%]\cache371\b_743700.htm
[%WINDOWS%]\cache371\b_753400.htm
[%WINDOWS%]\cache371\b_754300.htm
[%WINDOWS%]\cache371\b_775700.htm
[%WINDOWS%]\cache371\b_790700.htm
[%WINDOWS%]\cache371\t_b_371_0_1_591900.htm
[%WINDOWS%]\cache371\t_b_371_0_1_592000.htm
[%WINDOWS%]\cache371\t_b_371_0_1_592200.htm
[%WINDOWS%]\cache371\t_b_371_2_1_574200.htm
[%WINDOWS%]\cache371\t_b_371_2_1_576200.htm
[%WINDOWS%]\cache371\t_b_371_2_1_635400.htm
[%WINDOWS%]\cache371\t_b_371_2_1_662100.htm
[%WINDOWS%]\cache371\t_b_371_2_1_775400.htm
[%WINDOWS%]\cache371\t_b_371_2_2_712000.htm
[%WINDOWS%]\cache371\t_b_371_2_2_778600.htm
[%WINDOWS%]\cache371\t_b_371_2_3_558300.htm
[%WINDOWS%]\cache371\t_b_371_2_3_642300.htm
[%WINDOWS%]\cache371\t_b_500600.htm
[%WINDOWS%]\cache371\t_b_525900.htm
[%WINDOWS%]\cache371\t_b_604700.htm
[%WINDOWS%]\cache371\t_b_647400.htm
[%WINDOWS%]\cache371\t_b_647800.htm
[%WINDOWS%]\cache371\t_b_670300.htm
[%WINDOWS%]\cache371\t_b_727700.htm
[%WINDOWS%]\cache371\t_b_743700.htm
[%WINDOWS%]\cache371\t_b_753400.htm
[%WINDOWS%]\cache371\t_b_754300.htm
[%WINDOWS%]\cache371\t_b_775700.htm
[%WINDOWS%]\cache371\t_b_790700.htm
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Launch Kazaa.lnk
[%DESKTOP%]\kazaa media desktop.lnk
[%DESKTOP%]\kazaa promotions.url
[%DESKTOP%]\kazaa shop.lnk
[%DESKTOP%]\kazaa shop.url
[%DESKTOP%]\Kazaa.lnk
[%DESKTOP%]\kazaalite.lnk
[%DESKTOP%]\kazaa_setup.exe
[%DESKTOP%]\kazza.lnk
[%DESKTOP%]\kli.lnk
[%DESKTOP%]\kza.lnk
[%DESKTOP%]\my shared folder.lnk
[%DESKTOP%]\my shared folder.url
[%DESKTOP%]\play poker now!.lnk
[%DESKTOP%]\your free casino chips!.lnk
[%PROFILE%]\administrator\start menu\programs\altnet\peer points manager.lnk
[%PROFILE_TEMP%]\altnet\adm25.dll
[%PROFILE_TEMP%]\altnet\admdata.dll
[%PROFILE_TEMP%]\altnet\admdloader.dll
[%PROFILE_TEMP%]\altnet\admfdi.dll
[%PROFILE_TEMP%]\altnet\atl.dll
[%PROFILE_TEMP%]\altnet\msvcirt.dll
[%PROFILE_TEMP%]\altnet\setup.exe
[%PROFILE_TEMP%]\p2psetup.exe
[%PROGRAMS%]\kazaa media desktop\kazaa media desktop.lnk
[%PROGRAMS%]\kazaa.lnk
[%PROGRAMS%]\kazaaliyr.lnk
[%PROGRAMS%]\kza.lnk
[%SYSTEM%]\bifq5x5n.exe
[%SYSTEM%]\cd_clint.dll
[%SYSTEM%]\irqy.exe
[%SYSTEM%]\marshal.dll
[%SYSTEM%]\p2p networking v125.cpl
[%SYSTEM%]\p2pnetworking.exe
[%WINDOWS%]\cache371\b_371_0_1_586300.htm
[%WINDOWS%]\cache371\b_371_0_1_589300.htm
[%WINDOWS%]\cache371\b_371_0_1_589500.htm
[%WINDOWS%]\cache371\b_371_0_1_589600.htm
[%WINDOWS%]\cache371\b_371_0_1_591900.htm
[%WINDOWS%]\cache371\b_371_0_1_592000.htm
[%WINDOWS%]\cache371\b_371_0_1_592200.htm
[%WINDOWS%]\cache371\b_371_0_1_646000.htm
[%WINDOWS%]\cache371\b_371_0_1_648100.htm
[%WINDOWS%]\cache371\b_371_0_1_664000.htm
[%WINDOWS%]\cache371\b_371_0_1_668500.htm
[%WINDOWS%]\cache371\b_371_0_1_737400.htm
[%WINDOWS%]\cache371\b_371_0_1_775900.htm
[%WINDOWS%]\cache371\b_371_0_1_794100.htm
[%WINDOWS%]\cache371\b_371_2_1_536000.htm
[%WINDOWS%]\cache371\b_371_2_1_566600.htm
[%WINDOWS%]\cache371\b_371_2_1_567900.htm
[%WINDOWS%]\cache371\b_371_2_1_574200.htm
[%WINDOWS%]\cache371\b_371_2_1_576200.htm
[%WINDOWS%]\cache371\b_371_2_1_577800.htm
[%WINDOWS%]\cache371\b_371_2_1_593200.htm
[%WINDOWS%]\cache371\b_371_2_1_635400.htm
[%WINDOWS%]\cache371\b_371_2_1_649800.htm
[%WINDOWS%]\cache371\b_371_2_1_655600.htm
[%WINDOWS%]\cache371\b_371_2_1_662100.htm
[%WINDOWS%]\cache371\b_371_2_1_663900.htm
[%WINDOWS%]\cache371\b_371_2_1_667100.htm
[%WINDOWS%]\cache371\b_371_2_1_738900.htm
[%WINDOWS%]\cache371\b_371_2_1_739900.htm
[%WINDOWS%]\cache371\b_371_2_1_746100.htm
[%WINDOWS%]\cache371\b_371_2_1_755100.htm
[%WINDOWS%]\cache371\b_371_2_1_755600.htm
[%WINDOWS%]\cache371\b_371_2_1_756100.htm
[%WINDOWS%]\cache371\b_371_2_1_775400.htm
[%WINDOWS%]\cache371\b_371_2_1_777800.htm
[%WINDOWS%]\cache371\b_371_2_2_568100.htm
[%WINDOWS%]\cache371\b_371_2_2_570100.htm
[%WINDOWS%]\cache371\b_371_2_2_572300.htm
[%WINDOWS%]\cache371\b_371_2_2_573900.htm
[%WINDOWS%]\cache371\b_371_2_2_576000.htm
[%WINDOWS%]\cache371\b_371_2_2_649600.htm
[%WINDOWS%]\cache371\b_371_2_2_703900.htm
[%WINDOWS%]\cache371\b_371_2_2_712000.htm
[%WINDOWS%]\cache371\b_371_2_2_730800.htm
[%WINDOWS%]\cache371\b_371_2_2_731300.htm
[%WINDOWS%]\cache371\b_371_2_2_778600.htm
[%WINDOWS%]\cache371\b_371_2_3_519700.htm
[%WINDOWS%]\cache371\b_371_2_3_532200.htm
[%WINDOWS%]\cache371\b_371_2_3_558300.htm
[%WINDOWS%]\cache371\b_371_2_3_563900.htm
[%WINDOWS%]\cache371\b_371_2_3_588100.htm
[%WINDOWS%]\cache371\b_371_2_3_642300.htm
[%WINDOWS%]\cache371\b_371_2_3_670700.htm
[%WINDOWS%]\cache371\b_371_2_3_679500.htm
[%WINDOWS%]\cache371\b_371_2_3_778600.htm
[%WINDOWS%]\cache371\b_500600.htm
[%WINDOWS%]\cache371\b_501000.htm
[%WINDOWS%]\cache371\b_525900.htm
[%WINDOWS%]\cache371\b_604700.htm
[%WINDOWS%]\cache371\b_605600.htm
[%WINDOWS%]\cache371\b_605800.htm
[%WINDOWS%]\cache371\b_647400.htm
[%WINDOWS%]\cache371\b_647800.htm
[%WINDOWS%]\cache371\b_670300.htm
[%WINDOWS%]\cache371\b_727700.htm
[%WINDOWS%]\cache371\b_743700.htm
[%WINDOWS%]\cache371\b_753400.htm
[%WINDOWS%]\cache371\b_754300.htm
[%WINDOWS%]\cache371\b_775700.htm
[%WINDOWS%]\cache371\b_790700.htm
[%WINDOWS%]\cache371\t_b_371_0_1_591900.htm
[%WINDOWS%]\cache371\t_b_371_0_1_592000.htm
[%WINDOWS%]\cache371\t_b_371_0_1_592200.htm
[%WINDOWS%]\cache371\t_b_371_2_1_574200.htm
[%WINDOWS%]\cache371\t_b_371_2_1_576200.htm
[%WINDOWS%]\cache371\t_b_371_2_1_635400.htm
[%WINDOWS%]\cache371\t_b_371_2_1_662100.htm
[%WINDOWS%]\cache371\t_b_371_2_1_775400.htm
[%WINDOWS%]\cache371\t_b_371_2_2_712000.htm
[%WINDOWS%]\cache371\t_b_371_2_2_778600.htm
[%WINDOWS%]\cache371\t_b_371_2_3_558300.htm
[%WINDOWS%]\cache371\t_b_371_2_3_642300.htm
[%WINDOWS%]\cache371\t_b_500600.htm
[%WINDOWS%]\cache371\t_b_525900.htm
[%WINDOWS%]\cache371\t_b_604700.htm
[%WINDOWS%]\cache371\t_b_647400.htm
[%WINDOWS%]\cache371\t_b_647800.htm
[%WINDOWS%]\cache371\t_b_670300.htm
[%WINDOWS%]\cache371\t_b_727700.htm
[%WINDOWS%]\cache371\t_b_743700.htm
[%WINDOWS%]\cache371\t_b_753400.htm
[%WINDOWS%]\cache371\t_b_754300.htm
[%WINDOWS%]\cache371\t_b_775700.htm
[%WINDOWS%]\cache371\t_b_790700.htm

Folders:
[%PROFILE%]\start menu\programs\kazaa media desktop
[%PROFILE_TEMP%]\admcache
[%PROGRAMS%]\kazaa
[%PROGRAM_FILES%]\kazaa
[%WINDOWS%]\browserxtras\pn
[%WINDOWS%]\cache329

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{66fc8717-efa7-4546-8c4a-e224f3a80c76}
HKEY_CLASSES_ROOT\clsid\{726c99d0-50c5-404f-9efd-7b2834dfed50}
HKEY_CLASSES_ROOT\clsid\{f78b32d6-d6d8-4137-a18f-91ebe1a4aedb}
HKEY_CURRENT_USER\software\kazaa
HKEY_CURRENT_USER\software\kazaa tmp 0
HKEY_LOCAL_MACHINE\software\classes\adm.adm
HKEY_LOCAL_MACHINE\software\classes\adm.adm.1
HKEY_LOCAL_MACHINE\software\classes\adm25.adm25
HKEY_LOCAL_MACHINE\software\classes\adm25.adm25.1
HKEY_LOCAL_MACHINE\software\classes\adm4.adm4
HKEY_LOCAL_MACHINE\software\classes\adm4.adm4.1
HKEY_LOCAL_MACHINE\software\classes\appid\{8b0fef15-54dc-49f5-8377-8172de975f75}
HKEY_LOCAL_MACHINE\software\classes\appid\{99a8e2b2-3405-4c0d-9110-131c14caaf62}
HKEY_LOCAL_MACHINE\software\classes\clsid\{66fc8717-efa7-4546-8c4a-e224f3a80c76}
HKEY_LOCAL_MACHINE\software\classes\clsid\{c91e8926-d4be-4685-99f4-0d996b96bac0}
HKEY_LOCAL_MACHINE\software\classes\jcde_stack
HKEY_LOCAL_MACHINE\software\classes\jcde_stack.1
HKEY_LOCAL_MACHINE\software\classes\signingmodule.signingmodule
HKEY_LOCAL_MACHINE\software\classes\signingmodule.signingmodule.1
HKEY_LOCAL_MACHINE\software\classes\webp2pinstaller.installer
HKEY_LOCAL_MACHINE\software\classes\webp2pinstaller.installer.1
HKEY_LOCAL_MACHINE\software\kazaa
HKEY_LOCAL_MACHINE\software\lcaleb
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app management\arpcache\kazaa
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app management\arpcache\kza
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app management\arpcache\p2p networking
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\kazaa
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\kli
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\kza
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{01083175-01cc-42aa-9090-81dd0f88f28f}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{38c76428-6c9c-4cc6-b747-3ab6a4770225}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{726c99d0-50c5-404f-9efd-7b2834dfed50}
HKEY_LOCAL_MACHINE\software\sharman networks ltd

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{548d52a1-5620-4c11-8fa7-b95404fd9fcd}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{548d52a1-5620-4c11-8fa7-b95404fd9fcd}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{548d52a1-5620-4c11-8fa7-b95404fd9fcd}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{548d52a1-5620-4c11-8fa7-b95404fd9fcd}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{548d52a1-5620-4c11-8fa7-b95404fd9fcd}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{548d52a1-5620-4c11-8fa7-b95404fd9fcd}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{548d52a1-5620-4c11-8fa7-b95404fd9fcd}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{548d52a1-5620-4c11-8fa7-b95404fd9fcd}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{548d52a1-5620-4c11-8fa7-b95404fd9fcd}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{548d52a1-5620-4c11-8fa7-b95404fd9fcd}

Removing KaZaA:

An up-to-date copy of ExterminateIt should detect and prevent infection from KaZaA.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove KaZaA manually.

To completely manually remove KaZaA malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with KaZaA.

  1. Use Task Manager to terminate the KaZaA process.
  2. Delete the original KaZaA file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes KaZaA from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of KaZaA!


Also Be Aware of the Following Threats:
Watchful.Eye Spyware Information
Removing dynamics.de Tracking Cookie

Vxidl.AMK Trojan

Vxidl.AMK malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Vxidl.AMK:

An up-to-date copy of ExterminateIt should detect and prevent infection from Vxidl.AMK.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Vxidl.AMK manually.

To completely manually remove Vxidl.AMK malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Vxidl.AMK.

  1. Use Task Manager to terminate the Vxidl.AMK process.
  2. Delete the original Vxidl.AMK file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Vxidl.AMK from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Vxidl.AMK!


Also Be Aware of the Following Threats:
Kl0ne DoS Information
IPing32 DoS Cleaner
AOHell Trojan Cleaner
WM.FTP.Server Backdoor Information

Win32.Snatch Trojan

Win32.Snatch malware description and removal detail
Categories:Trojan
Also known as:

[Eset]Win32/Snatch.140 trojan;
[Panda]Trojan Horse

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Win32.Snatch:

An up-to-date copy of ExterminateIt should detect and prevent infection from Win32.Snatch.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Win32.Snatch manually.

To completely manually remove Win32.Snatch malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Win32.Snatch.

  1. Use Task Manager to terminate the Win32.Snatch process.
  2. Delete the original Win32.Snatch file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Win32.Snatch from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Win32.Snatch!


Also Be Aware of the Following Threats:
Pigeon.EEP Trojan Cleaner
Remove NakedBind Trojan
Removing Dr Trojan

Security Toolbar

Security malware description and removal detail
Categories:Toolbar
Also known as:

[Kaspersky]AdWare.Win32.Agent.nt;
[McAfee]Puper;
[Other]Win32/Boarim.AK,Downloader.MisleadApp,TrojanDownloader:Win32/Zlob.gen!Z,Troj/Zlobie-Gen

Visible Symptoms:
Files in system folders:
[%COMMON_STARTMENU%]\Live Safety Center.lnk
[%COMMON_STARTMENU%]\Online Security Guide.lnk
[%DESKTOP%]\Live Safety Center.lnk
[%DESKTOP%]\Online Security Guide.lnk
[%FAVORITES%]\Online Security Guide.lnk
[%PROGRAM_FILES%]\Hammer.dll
[%COMMON_STARTMENU%]\Live Safety Center.lnk
[%COMMON_STARTMENU%]\Online Security Guide.lnk
[%DESKTOP%]\Live Safety Center.lnk
[%DESKTOP%]\Online Security Guide.lnk
[%FAVORITES%]\Online Security Guide.lnk
[%PROGRAM_FILES%]\Hammer.dll

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Security:

Files:
[%COMMON_STARTMENU%]\Live Safety Center.lnk
[%COMMON_STARTMENU%]\Online Security Guide.lnk
[%DESKTOP%]\Live Safety Center.lnk
[%DESKTOP%]\Online Security Guide.lnk
[%FAVORITES%]\Online Security Guide.lnk
[%PROGRAM_FILES%]\Hammer.dll
[%COMMON_STARTMENU%]\Live Safety Center.lnk
[%COMMON_STARTMENU%]\Online Security Guide.lnk
[%DESKTOP%]\Live Safety Center.lnk
[%DESKTOP%]\Online Security Guide.lnk
[%FAVORITES%]\Online Security Guide.lnk
[%PROGRAM_FILES%]\Hammer.dll

Folders:
[%PROGRAM_FILES%]\Security Toolbar

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{11a69ae4-fbed-4832-a2bf-45af82825583}
HKEY_CLASSES_ROOT\clsid\{23ed2206-856d-461a-bbcf-1c2466ac5ae3}
HKEY_CLASSES_ROOT\clsid\{736b5468-bdad-41be-92d0-22ae2ddf7bcb}
HKEY_CLASSES_ROOT\clsid\{a95b2816-1d7e-4561-a202-68c0de02353a}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar\{736b5468-bdad-41be-92d0-22ae2ddf7bcb}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{a95b2816-1d7e-4561-a202-68c0de02353a}

Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar

Removing Security:

An up-to-date copy of ExterminateIt should detect and prevent infection from Security.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Security manually.

To completely manually remove Security malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Security.

  1. Use Task Manager to terminate the Security process.
  2. Delete the original Security file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Security from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Security!


Also Be Aware of the Following Threats:
Vxidl.ADT Trojan Removal instruction
Incognitomail2 Trojan Cleaner
Pigeon.EWG Trojan Information
Removing Win95.Babylonia Trojan
Phishbank.ADU Trojan Cleaner

BootDr70 Trojan

BootDr70 malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]Monkey.e;
[McAfee]BootDr70;
[Panda]Monkey.E;
[Computer Associates]Monkey 4

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing BootDr70:

An up-to-date copy of ExterminateIt should detect and prevent infection from BootDr70.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove BootDr70 manually.

To completely manually remove BootDr70 malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with BootDr70.

  1. Use Task Manager to terminate the BootDr70 process.
  2. Delete the original BootDr70 file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes BootDr70 from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of BootDr70!


Also Be Aware of the Following Threats:
Removing Pigeon.AUV Trojan

EXE.Blocker Trojan

EXE.Blocker malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing EXE.Blocker:

An up-to-date copy of ExterminateIt should detect and prevent infection from EXE.Blocker.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove EXE.Blocker manually.

To completely manually remove EXE.Blocker malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with EXE.Blocker.

  1. Use Task Manager to terminate the EXE.Blocker process.
  2. Delete the original EXE.Blocker file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes EXE.Blocker from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of EXE.Blocker!


Also Be Aware of the Following Threats:
Pigeon.EOY Trojan Cleaner
Removing mybloglog.com Tracking Cookie
Bancos.ZZS Trojan Information
Remove Destruction DoS

Diamond Trojan

Diamond malware description and removal detail
Categories:Trojan,Backdoor,Downloader,DoS
Also known as:

[Kaspersky]Diamond.Greemlin.1146,Diamond.1024.b,Murphy.1399;
[Eset]Diamond.1110 virus,Diamond.Greemlin virus,Diamond.Damage.1063 virus,Diamond.1024.B virus;
[McAfee]Diamond,Univ/g;
[F-Prot]Diamond.1024.B;
[Panda]Diamond.Iced.1086,Gremlim 0,Damage A,Diamond (444.1013),Diamond B;
[Computer Associates]Lucifer,Diamond

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Diamond:

An up-to-date copy of ExterminateIt should detect and prevent infection from Diamond.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Diamond manually.

To completely manually remove Diamond malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Diamond.

  1. Use Task Manager to terminate the Diamond process.
  2. Delete the original Diamond file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Diamond from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Diamond!


Also Be Aware of the Following Threats:
Remove PSW.Crazer Trojan

Pigeon.AVKH Trojan

Pigeon.AVKH malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.AVKH:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.AVKH.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.AVKH manually.

To completely manually remove Pigeon.AVKH malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.AVKH.

  1. Use Task Manager to terminate the Pigeon.AVKH process.
  2. Delete the original Pigeon.AVKH file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.AVKH from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.AVKH!


Also Be Aware of the Following Threats:
Bancos.HIT Trojan Removal instruction
IRC.Bun Trojan Cleaner

Vxidl.AOV Trojan

Vxidl.AOV malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Vxidl.AOV:

An up-to-date copy of ExterminateIt should detect and prevent infection from Vxidl.AOV.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Vxidl.AOV manually.

To completely manually remove Vxidl.AOV malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Vxidl.AOV.

  1. Use Task Manager to terminate the Vxidl.AOV process.
  2. Delete the original Vxidl.AOV file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Vxidl.AOV from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Vxidl.AOV!


Also Be Aware of the Following Threats:
Funny Trojan Symptoms
HotLog.ru Tracking Cookie Symptoms
Fake.login.for.Yahoo! Trojan Removal instruction
Remove Skiks Trojan
Bancos.AAT Trojan Symptoms