Thursday, January 8, 2009

Bat.Xop Trojan

Bat.Xop malware description and removal detail
Categories:Trojan,Backdoor,Downloader,DoS
Also known as:

[Kaspersky]BAT.Xop.a;
[Eset]Bat.XoP.367 virus,Bat.Wavefunc.Xop.Winstroy virus;
[Panda]BAT/Xop.A;
[Computer Associates]BAT.XoP,Bat/Xop

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bat.Xop:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bat.Xop.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bat.Xop manually.

To completely manually remove Bat.Xop malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bat.Xop.

  1. Use Task Manager to terminate the Bat.Xop process.
  2. Delete the original Bat.Xop file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bat.Xop from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bat.Xop!


Also Be Aware of the Following Threats:
Removing Blole Trojan
TrojanDownloader.VBS.Bikiwi Trojan Symptoms
SillyDl.AYP Downloader Symptoms
Silent.B0mb3r DoS Removal instruction
Aprsvr Trojan Removal instruction

HGZ Backdoor

HGZ malware description and removal detail
Categories:Backdoor,RAT
Also known as:

[Kaspersky]Backdoor.Delf.bv,Backdoor.GrayBird,Backdoor.GrayBird.a,Backdoor.Way.2002.b,Backdoor.GrayBird.b;
[McAfee]BackDoor-ALC,BackDoor-ARR;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program,Bck/Delf.VB,Bck/GrayBird,Bck/Graybird.A,Backdoor Program.LC,Bck/Delf.ei;
[Computer Associates]Backdoor/Delf.BV,Backdoor/Delf.BV!Server,Backdoor/GrayBird,Backdoor/Pigeon.01!Server,Win32.Pigeon.E,Backdoor/Pigeon.03!Server,Win32.Pigeon.F

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting HGZ:

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run

Removing HGZ:

An up-to-date copy of ExterminateIt should detect and prevent infection from HGZ.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove HGZ manually.

To completely manually remove HGZ malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with HGZ.

  1. Use Task Manager to terminate the HGZ process.
  2. Delete the original HGZ file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes HGZ from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of HGZ!


Also Be Aware of the Following Threats:
AdClicerk.gen.dr Trojan Removal

liveperson.net Tracking Cookie

liveperson.net malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing liveperson.net:

An up-to-date copy of ExterminateIt should detect and prevent infection from liveperson.net.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove liveperson.net manually.

To completely manually remove liveperson.net malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with liveperson.net.

  1. Use Task Manager to terminate the liveperson.net process.
  2. Delete the original liveperson.net file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes liveperson.net from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of liveperson.net!


Also Be Aware of the Following Threats:
Remove Frogs Trojan
IRCFlooder.Chamel DoS Symptoms
Removing SillyDl.CDU Trojan

conversionruler.com Tracking Cookie

conversionruler.com malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing conversionruler.com:

An up-to-date copy of ExterminateIt should detect and prevent infection from conversionruler.com.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove conversionruler.com manually.

To completely manually remove conversionruler.com malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with conversionruler.com.

  1. Use Task Manager to terminate the conversionruler.com process.
  2. Delete the original conversionruler.com file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes conversionruler.com from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of conversionruler.com!


Also Be Aware of the Following Threats:
Remove Lolkilla Trojan

FLN DoS

FLN malware description and removal detail
Categories:DoS

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing FLN:

An up-to-date copy of ExterminateIt should detect and prevent infection from FLN.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove FLN manually.

To completely manually remove FLN malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with FLN.

  1. Use Task Manager to terminate the FLN process.
  2. Delete the original FLN file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes FLN from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of FLN!


Also Be Aware of the Following Threats:
Remove Relzfu Trojan
Torero Trojan Removal

SubSeven.pac Backdoor

SubSeven.pac malware description and removal detail
Categories:Backdoor,RAT

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing SubSeven.pac:

An up-to-date copy of ExterminateIt should detect and prevent infection from SubSeven.pac.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove SubSeven.pac manually.

To completely manually remove SubSeven.pac malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SubSeven.pac.

  1. Use Task Manager to terminate the SubSeven.pac process.
  2. Delete the original SubSeven.pac file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes SubSeven.pac from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of SubSeven.pac!


Also Be Aware of the Following Threats:
BlackCore Trojan Removal

TLS.demo Trojan

TLS.demo malware description and removal detail
Categories:Trojan,Hacker Tool
Also known as:

[Kaspersky]VirTool.Win32.TLSDemo;
[F-Prot]destructive program;
[Panda]Virtool

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing TLS.demo:

An up-to-date copy of ExterminateIt should detect and prevent infection from TLS.demo.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove TLS.demo manually.

To completely manually remove TLS.demo malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with TLS.demo.

  1. Use Task Manager to terminate the TLS.demo process.
  2. Delete the original TLS.demo file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes TLS.demo from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of TLS.demo!


Also Be Aware of the Following Threats:
Sensive Trojan Cleaner
RbCalc.Poker Trojan Cleaner
Backdoor.Ptakks.R1.B1!Server Backdoor Removal

PSW.Lamot Trojan

PSW.Lamot malware description and removal detail
Categories:Trojan,Hacker Tool
Also known as:

[Kaspersky]Trojan-PSW.Win32.Lamot.b;
[Panda]Trj/PSW.Lamot.B;
[Computer Associates]Win32/Lamot.B!PWS!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing PSW.Lamot:

An up-to-date copy of ExterminateIt should detect and prevent infection from PSW.Lamot.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove PSW.Lamot manually.

To completely manually remove PSW.Lamot malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with PSW.Lamot.

  1. Use Task Manager to terminate the PSW.Lamot process.
  2. Delete the original PSW.Lamot file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes PSW.Lamot from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of PSW.Lamot!


Also Be Aware of the Following Threats:
XZip RAT Symptoms
Removing Port.Monitor DoS
Remove Sumatrix Trojan

Vxidl.ACR Trojan

Vxidl.ACR malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Vxidl.ACR:

An up-to-date copy of ExterminateIt should detect and prevent infection from Vxidl.ACR.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Vxidl.ACR manually.

To completely manually remove Vxidl.ACR malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Vxidl.ACR.

  1. Use Task Manager to terminate the Vxidl.ACR process.
  2. Delete the original Vxidl.ACR file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Vxidl.ACR from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Vxidl.ACR!


Also Be Aware of the Following Threats:
VBS.Riot Trojan Removal instruction
Removing Doubleheart Trojan
Removing Win32.Delf Trojan
Remove Adware.Ezula Adware
Removing Delf.AUU Backdoor

OKCounter Tracking Cookie

OKCounter malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing OKCounter:

An up-to-date copy of ExterminateIt should detect and prevent infection from OKCounter.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove OKCounter manually.

To completely manually remove OKCounter malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with OKCounter.

  1. Use Task Manager to terminate the OKCounter process.
  2. Delete the original OKCounter file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes OKCounter from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of OKCounter!


Also Be Aware of the Following Threats:
Removing Pigeon.Variant Trojan
Removing FDoS.Sumo Trojan
Comforest Trojan Removal instruction
Removing TrojanSpy.Win32.DKS Trojan

Vxidl.AVA Trojan

Vxidl.AVA malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Vxidl.AVA:

An up-to-date copy of ExterminateIt should detect and prevent infection from Vxidl.AVA.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Vxidl.AVA manually.

To completely manually remove Vxidl.AVA malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Vxidl.AVA.

  1. Use Task Manager to terminate the Vxidl.AVA process.
  2. Delete the original Vxidl.AVA file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Vxidl.AVA from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Vxidl.AVA!


Also Be Aware of the Following Threats:
Remove Afcore.ar Backdoor

Ortyc Trojan

Ortyc malware description and removal detail
Categories:Trojan
Also known as:

[Computer Associates]Win32/Ortyc!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Ortyc:

An up-to-date copy of ExterminateIt should detect and prevent infection from Ortyc.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Ortyc manually.

To completely manually remove Ortyc malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Ortyc.

  1. Use Task Manager to terminate the Ortyc process.
  2. Delete the original Ortyc file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Ortyc from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Ortyc!


Also Be Aware of the Following Threats:
Remove BAT.Filler Trojan
PSW.Johan Trojan Symptoms
Blue.Nine Trojan Cleaner
Removing Vxidl.AQR Trojan
Removing kYou.Voice.Bomber DoS

Pigeon.AVDV Trojan

Pigeon.AVDV malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.AVDV:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.AVDV.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.AVDV manually.

To completely manually remove Pigeon.AVDV malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.AVDV.

  1. Use Task Manager to terminate the Pigeon.AVDV process.
  2. Delete the original Pigeon.AVDV file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.AVDV from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.AVDV!


Also Be Aware of the Following Threats:
RIC Backdoor Information

Pigeon.EDZ Trojan

Pigeon.EDZ malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.EDZ:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.EDZ.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.EDZ manually.

To completely manually remove Pigeon.EDZ malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.EDZ.

  1. Use Task Manager to terminate the Pigeon.EDZ process.
  2. Delete the original Pigeon.EDZ file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.EDZ from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.EDZ!


Also Be Aware of the Following Threats:
Download4Money Tracking Cookie Removal instruction
Pigeon.AWKH Trojan Removal instruction
Noknok Trojan Cleaner

Rewind Trojan

Rewind malware description and removal detail
Categories:Trojan,Spyware,Backdoor,RAT
Also known as:

[Kaspersky]Backdoor.Rewindor.10,Backdoor.Rewindor.11,Backdoor.NetDevil.10.Logger,Backdoor.Rewindor.12;
[Eset]Win32/VB.MH trojan,Win32/Rewindor.11 trojan,Win32/Rewindor.12 trojan;
[Panda]Bck/VB.K,Backdoor Program,Trojan Horse,Bck/Rewind.A;
[Computer Associates]Backdoor/Rewind!Server,Backdoor/Rewind.InstallWS,Backdoor/Rewindor.11,Backdoor/Rewindor.12!Server,Backdoor/Rewindor.12.Notify

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Rewind:

An up-to-date copy of ExterminateIt should detect and prevent infection from Rewind.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Rewind manually.

To completely manually remove Rewind malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Rewind.

  1. Use Task Manager to terminate the Rewind process.
  2. Delete the original Rewind file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Rewind from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Rewind!


Also Be Aware of the Following Threats:
Bancos.ADN Trojan Information
Remove Bayda Trojan
Bancos.GGT Trojan Removal instruction
Hackboys.Bomber DoS Symptoms

Pigeon.AUZW Trojan

Pigeon.AUZW malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.AUZW:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.AUZW.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.AUZW manually.

To completely manually remove Pigeon.AUZW malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.AUZW.

  1. Use Task Manager to terminate the Pigeon.AUZW process.
  2. Delete the original Pigeon.AUZW file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.AUZW from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.AUZW!


Also Be Aware of the Following Threats:
Dowque.AFG Trojan Cleaner

Vxidl.AXM Trojan

Vxidl.AXM malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Vxidl.AXM:

An up-to-date copy of ExterminateIt should detect and prevent infection from Vxidl.AXM.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Vxidl.AXM manually.

To completely manually remove Vxidl.AXM malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Vxidl.AXM.

  1. Use Task Manager to terminate the Vxidl.AXM process.
  2. Delete the original Vxidl.AXM file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Vxidl.AXM from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Vxidl.AXM!


Also Be Aware of the Following Threats:
V2PX Trojan Cleaner
Bancos.CYP Trojan Information
SillyDl.BCQ Downloader Removal
Removing Vxidl.AEE Trojan

SC.KeyLog Spyware

SC.KeyLog malware description and removal detail
Categories:Spyware

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing SC.KeyLog:

An up-to-date copy of ExterminateIt should detect and prevent infection from SC.KeyLog.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove SC.KeyLog manually.

To completely manually remove SC.KeyLog malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SC.KeyLog.

  1. Use Task Manager to terminate the SC.KeyLog process.
  2. Delete the original SC.KeyLog file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes SC.KeyLog from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of SC.KeyLog!


Also Be Aware of the Following Threats:
Silencer Trojan Removal
Remove TrojanDownloader.Win32.VB Trojan
Pigeon.EXH Trojan Cleaner
Henbang Trojan Symptoms

Pigeon.AVL Trojan

Pigeon.AVL malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.AVL:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.AVL.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.AVL manually.

To completely manually remove Pigeon.AVL malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.AVL.

  1. Use Task Manager to terminate the Pigeon.AVL process.
  2. Delete the original Pigeon.AVL file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.AVL from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.AVL!


Also Be Aware of the Following Threats:
Bancos.FUJ Trojan Removal
Win32.Keylogger.G!Trojan Trojan Cleaner

SpyDawn Adware

SpyDawn malware description and removal detail
Categories:Adware,Ransomware
Also known as:

[Kaspersky]FraudTool.Win32.SpyHeal.a;
[McAfee]SpyDawn;
[Other]VirusBurst,Program:win32/SpyDawn

Visible Symptoms:
Files in system folders:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\SpyDawn 3.1.lnk
[%COOKIES%]\administrator@spydawn[1].txt
[%PROGRAM_FILES%]\SpyDawn\SpyDawn.exe
[%DESKTOP%]\SpyDawn.lnk
[%STARTMENU%]\SpyDawn 3.1.lnk
[%DESKTOP%]\SpyDawn.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\SpyDawn 3.1.lnk
[%COOKIES%]\administrator@spydawn[1].txt
[%PROGRAM_FILES%]\SpyDawn\SpyDawn.exe
[%DESKTOP%]\SpyDawn.lnk
[%STARTMENU%]\SpyDawn 3.1.lnk
[%DESKTOP%]\SpyDawn.lnk

In order to ensure that the SpyDawn is launched automatically each time the system is booted, the SpyDawn adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%PROGRAM_FILES%]\SpyDawn\SpyDawn.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting SpyDawn:

Files:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\SpyDawn 3.1.lnk
[%COOKIES%]\administrator@spydawn[1].txt
[%PROGRAM_FILES%]\SpyDawn\SpyDawn.exe
[%DESKTOP%]\SpyDawn.lnk
[%STARTMENU%]\SpyDawn 3.1.lnk
[%DESKTOP%]\SpyDawn.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\SpyDawn 3.1.lnk
[%COOKIES%]\administrator@spydawn[1].txt
[%PROGRAM_FILES%]\SpyDawn\SpyDawn.exe
[%DESKTOP%]\SpyDawn.lnk
[%STARTMENU%]\SpyDawn 3.1.lnk
[%DESKTOP%]\SpyDawn.lnk

Folders:
[%PROGRAMS%]\SpyDawn
[%PROGRAM_FILES%]\SpyDawn

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{c1df2728-8510-0773-96d8-5d0c1f27821b}
HKEY_CLASSES_ROOT\interface\{080c3ec1-ab54-40f3-88be-e6face068cf0}
HKEY_CLASSES_ROOT\interface\{101981f9-8ba3-4064-949b-3c5beb867134}
HKEY_CLASSES_ROOT\interface\{16992424-7ac2-47f6-8799-bf4e8ebbecc1}
HKEY_CLASSES_ROOT\interface\{28dc003f-7396-4b9d-8d0c-e40d8f4e3f4a}
HKEY_CLASSES_ROOT\interface\{3a9ccaf6-08b8-4163-8dd8-3d9200314533}
HKEY_CLASSES_ROOT\interface\{3f109e21-d00a-4222-9a42-4a7611122cf1}
HKEY_CLASSES_ROOT\interface\{4db7b2c0-c3be-4a1d-915b-9b04981cf4b4}
HKEY_CLASSES_ROOT\interface\{5fc90027-65c3-4e0c-91c7-e3d3296e3763}
HKEY_CLASSES_ROOT\interface\{63948a86-9227-4dab-8aa6-ccd2111264a0}
HKEY_CLASSES_ROOT\interface\{7a7ca289-6e1e-4a00-aa81-c5d252945645}
HKEY_CLASSES_ROOT\interface\{7de844a5-dc96-4cd5-b4ee-1c7ae0b5e62a}
HKEY_CLASSES_ROOT\interface\{929fc56a-ee5c-436c-bc73-68d583233485}
HKEY_CLASSES_ROOT\interface\{94596fc9-cbf8-4f61-8a02-aacbb86b51ba}
HKEY_CLASSES_ROOT\interface\{a048440c-9495-4757-8fb3-0383ade9e89d}
HKEY_CLASSES_ROOT\interface\{cc09ac3e-aa61-4cbd-a351-df435c8fe5c2}
HKEY_CLASSES_ROOT\interface\{cc61280d-617c-4007-9d21-3f6f7bba81fe}
HKEY_CLASSES_ROOT\typelib\{c7281808-f7c3-4bed-940f-40b9fd5784b6}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app paths\spydawn.exe
HKEY_CLASSES_ROOT\Interface\{189518DF-7EBA-4D31-A7E1-73B5BB60E8D5}
HKEY_CLASSES_ROOT\Interface\{23D627FE-3F02-44CF-9EE1-7B9E44BD9E13}
HKEY_CLASSES_ROOT\Interface\{43CFEFBE-8AE4-400E-BBE4-A2B61BB140FB}
HKEY_CLASSES_ROOT\Interface\{5790B963-23C5-43C1-BCF5-01C9B5A3E44E}
HKEY_CLASSES_ROOT\Interface\{5D42DDF4-81EB-4668-9951-819A1D5BEFC8}
HKEY_CLASSES_ROOT\Interface\{76D06077-D5D3-40CA-B32D-6A67A7FF3F06}
HKEY_CLASSES_ROOT\Interface\{86C7E6C3-EC47-44E5-AA08-EE0D0A25895F}
HKEY_CLASSES_ROOT\Interface\{9283DAC1-43F5-4580-BF86-841F22AF2335}
HKEY_CLASSES_ROOT\Interface\{AE90CAFC-09D4-47F0-9E11-CE621C424F08}
HKEY_CLASSES_ROOT\Interface\{BA397E39-F67F-423F-BC6E-65939450093A}
HKEY_CLASSES_ROOT\Interface\{BEC8A83D-01D4-4F15-B8A9-4B4AB24253A7}
HKEY_CLASSES_ROOT\Interface\{C4EEDC19-992D-409A-B323-ED57D511AFA5}
HKEY_CLASSES_ROOT\Interface\{DD90F677-D205-4F70-9014-659614AABCB2}
HKEY_CLASSES_ROOT\Interface\{E3DF91F3-F24F-441E-9001-D61F36024322}
HKEY_CLASSES_ROOT\Interface\{F459EADB-5903-48D5-864C-2B7B46AB1424}
HKEY_CLASSES_ROOT\Interface\{FC4EDF66-0547-4F1A-AE96-7CFCAD711C90}
HKEY_CLASSES_ROOT\TypeLib\{661173EE-FA31-4769-97D4-B556B5D09BDA}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3820350F-5092-2ADD-8A4C-8DE2C609FAE5}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{189518DF-7EBA-4D31-A7E1-73B5BB60E8D5}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{23D627FE-3F02-44CF-9EE1-7B9E44BD9E13}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{43CFEFBE-8AE4-400E-BBE4-A2B61BB140FB}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{5790B963-23C5-43C1-BCF5-01C9B5A3E44E}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{5D42DDF4-81EB-4668-9951-819A1D5BEFC8}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{76D06077-D5D3-40CA-B32D-6A67A7FF3F06}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{86C7E6C3-EC47-44E5-AA08-EE0D0A25895F}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9283DAC1-43F5-4580-BF86-841F22AF2335}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{AE90CAFC-09D4-47F0-9E11-CE621C424F08}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{BA397E39-F67F-423F-BC6E-65939450093A}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{BEC8A83D-01D4-4F15-B8A9-4B4AB24253A7}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{C4EEDC19-992D-409A-B323-ED57D511AFA5}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{DD90F677-D205-4F70-9014-659614AABCB2}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E3DF91F3-F24F-441E-9001-D61F36024322}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F459EADB-5903-48D5-864C-2B7B46AB1424}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{FC4EDF66-0547-4F1A-AE96-7CFCAD711C90}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{661173EE-FA31-4769-97D4-B556B5D09BDA}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\spydawn
HKEY_LOCAL_MACHINE\software\spydawn

Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing SpyDawn:

An up-to-date copy of ExterminateIt should detect and prevent infection from SpyDawn.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove SpyDawn manually.

To completely manually remove SpyDawn malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SpyDawn.

  1. Use Task Manager to terminate the SpyDawn process.
  2. Delete the original SpyDawn file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes SpyDawn from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of SpyDawn!


Also Be Aware of the Following Threats:
MyGeek Tracking Cookie Removal
Bancos.FXC Trojan Cleaner
SillyDl.CLY Trojan Removal instruction
Bat.Bat Trojan Information
Removing Backdoor.Backend Trojan

Pigeon.AVOP Trojan

Pigeon.AVOP malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.AVOP:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.AVOP.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.AVOP manually.

To completely manually remove Pigeon.AVOP malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.AVOP.

  1. Use Task Manager to terminate the Pigeon.AVOP process.
  2. Delete the original Pigeon.AVOP file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.AVOP from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.AVOP!


Also Be Aware of the Following Threats:
Win32.Snatch Trojan Information
Jubond Trojan Removal
Price Trojan Removal instruction

Neurotic Backdoor

Neurotic malware description and removal detail
Categories:Backdoor
Also known as:

[Panda]Bck/Neurotic.12.B;
[Computer Associates]Win32.Neurotic.12.B

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Neurotic:

An up-to-date copy of ExterminateIt should detect and prevent infection from Neurotic.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Neurotic manually.

To completely manually remove Neurotic malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Neurotic.

  1. Use Task Manager to terminate the Neurotic process.
  2. Delete the original Neurotic file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Neurotic from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Neurotic!


Also Be Aware of the Following Threats:
Pigeon.AVAU Trojan Removal
OnSrvr Adware Removal

Agent.hm Trojan

Agent.hm malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Agent.hm:

An up-to-date copy of ExterminateIt should detect and prevent infection from Agent.hm.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Agent.hm manually.

To completely manually remove Agent.hm malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Agent.hm.

  1. Use Task Manager to terminate the Agent.hm process.
  2. Delete the original Agent.hm file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Agent.hm from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Agent.hm!


Also Be Aware of the Following Threats:
Removing Delf Trojan
Remove SysLock Trojan
Pigeon.EIB Trojan Cleaner
Removing Muska54 Backdoor

W95.Prizzy Trojan

W95.Prizzy malware description and removal detail
Categories:Trojan,Backdoor,Downloader,DoS
Also known as:

[Kaspersky]Win95.Prizzy.a;
[McAfee]W95/Prizzy;
[F-Prot]could be infected with an unknown virus;
[Panda]Univ.B;
[Computer Associates]Win95.Prizzy.12948

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing W95.Prizzy:

An up-to-date copy of ExterminateIt should detect and prevent infection from W95.Prizzy.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove W95.Prizzy manually.

To completely manually remove W95.Prizzy malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with W95.Prizzy.

  1. Use Task Manager to terminate the W95.Prizzy process.
  2. Delete the original W95.Prizzy file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes W95.Prizzy from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of W95.Prizzy!


Also Be Aware of the Following Threats:
Pigeon.AVJZ Trojan Removal

clickhype.com Tracking Cookie

clickhype.com malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing clickhype.com:

An up-to-date copy of ExterminateIt should detect and prevent infection from clickhype.com.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove clickhype.com manually.

To completely manually remove clickhype.com malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with clickhype.com.

  1. Use Task Manager to terminate the clickhype.com process.
  2. Delete the original clickhype.com file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes clickhype.com from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of clickhype.com!


Also Be Aware of the Following Threats:
UlyssesTrojan Trojan Removal
Eatonway Trojan Removal
TrojanRunner.Loaderz Trojan Cleaner
IRC.Flood.ba Trojan Removal

On Trojan

On malware description and removal detail
Categories:Trojan,Backdoor,Downloader,DoS
Also known as:

[Kaspersky]V.696;
[Eset]probably modified virus On64.A (COM);
[Panda]ON_64.696;
[Computer Associates]On 64

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing On:

An up-to-date copy of ExterminateIt should detect and prevent infection from On.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove On manually.

To completely manually remove On malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with On.

  1. Use Task Manager to terminate the On process.
  2. Delete the original On file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes On from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of On!


Also Be Aware of the Following Threats:
Remove Win32.VB.gk Trojan
Remove NauPointBar Toolbar
Silver.FTP Backdoor Symptoms
Ecoly Trojan Removal
Remove PSW.Infos Trojan