Wednesday, January 14, 2009

PornDialer Trojan

PornDialer malware description and removal detail
Categories:Trojan,Adware
Also known as:

[Kaspersky]Porn-dialer.Win32.Agent.z,Porn-Dialer.Win32.CapreDeam.c,Dilaer.Win32.P2PAg.a,Porn-Dialer.Win32.Agent.ar,Trojan.Win32.Dialer.qn,Porn-Dialer.Win32.Generic,Packed.Win32.Klone.g,Trojan.Win32.Dialer.cb,Porn-Dialer.Win32.Agent.h,Porn-Dialer.Win32.XDialer.c,Porn-Dialer.Win32.CapreDiem.d,Porn-Dialer.Win32.Agent.aw;
[McAfee]Dialer-Generic.b,Generic PUP.a,Dialer-252;
[F-Prot]W32/Dialer.EYT;
[Other]Tool:PornDialer,Dialer.CarpeDiem,W32/Dialer.NOY,Dialer.Generic,W32/Dialer.BEQN,Dialer.Trojan,Dialer.XDialer,W32/Dialer.ABFV,W32/Dialer.AGUT,Dialer:Win32/ADialer,Trojan.Linkoptimizer.B

Visible Symptoms:
Files in system folders:
[%FAVORITES%]\vm18.url
[%DESKTOP%]\IQ-Test.lnk
[%PROGRAMS%]\vm18.LNK
[%PROGRAM_FILES%]\vm18.exe
[%STARTMENU%]\IQ-Test.lnk
[%STARTMENU%]\Programs\IQ-Test.lnk
[%WINDOWS%]\cibv\IQ-Test.exe
[%WINDOWS%]\cibv\IQ-Test.ini
[%FAVORITES%]\vm18.url
[%DESKTOP%]\IQ-Test.lnk
[%PROGRAMS%]\vm18.LNK
[%PROGRAM_FILES%]\vm18.exe
[%STARTMENU%]\IQ-Test.lnk
[%STARTMENU%]\Programs\IQ-Test.lnk
[%WINDOWS%]\cibv\IQ-Test.exe
[%WINDOWS%]\cibv\IQ-Test.ini

In order to ensure that the PornDialer is launched automatically each time the system is booted, the PornDialer adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%PROGRAM_FILES%]\vm18.exe
[%WINDOWS%]\cibv\IQ-Test.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting PornDialer:

Files:
[%FAVORITES%]\vm18.url
[%DESKTOP%]\IQ-Test.lnk
[%PROGRAMS%]\vm18.LNK
[%PROGRAM_FILES%]\vm18.exe
[%STARTMENU%]\IQ-Test.lnk
[%STARTMENU%]\Programs\IQ-Test.lnk
[%WINDOWS%]\cibv\IQ-Test.exe
[%WINDOWS%]\cibv\IQ-Test.ini
[%FAVORITES%]\vm18.url
[%DESKTOP%]\IQ-Test.lnk
[%PROGRAMS%]\vm18.LNK
[%PROGRAM_FILES%]\vm18.exe
[%STARTMENU%]\IQ-Test.lnk
[%STARTMENU%]\Programs\IQ-Test.lnk
[%WINDOWS%]\cibv\IQ-Test.exe
[%WINDOWS%]\cibv\IQ-Test.ini

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{b09b1d8b-88d6-4c91-bb62-378625e8c73e}
HKEY_CLASSES_ROOT\clsid\{ca93ef93-5ddc-11d7-a4ab-0090470164c3}
HKEY_CLASSES_ROOT\clsid\{ca93efd7-5ddc-11d7-a4ab-0090470164c3}
HKEY_CLASSES_ROOT\interface\{ba5e132c-ea8b-4df0-99a8-a1e72db8d91e}
HKEY_CLASSES_ROOT\interface\{ca93efd5-5ddc-11d7-a4ab-0090470164c3}
HKEY_CLASSES_ROOT\interface\{ca93efd6-5ddc-11d7-a4ab-0090470164c3}
HKEY_CLASSES_ROOT\interface\{fc09d7d2-cda1-4411-a7cb-2894d60f73d6}
HKEY_CLASSES_ROOT\premiumconnectload.premiumconnectloadctrl.1
HKEY_CLASSES_ROOT\typelib\{63e79d81-760c-4ab4-a5db-e35cd6fd8171}
HKEY_CLASSES_ROOT\typelib\{ca93efd4-5ddc-11d7-a4ab-0090470164c3}
HKEY_CLASSES_ROOT\xdial.xdialctrl.1

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing PornDialer:

An up-to-date copy of ExterminateIt should detect and prevent infection from PornDialer.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove PornDialer manually.

To completely manually remove PornDialer malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with PornDialer.

  1. Use Task Manager to terminate the PornDialer process.
  2. Delete the original PornDialer file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes PornDialer from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of PornDialer!


Also Be Aware of the Following Threats:
Pigeon.AXT Trojan Information
PSW.Lotusoft Trojan Removal instruction
SillyDl.CJP Trojan Removal
Remove IrSetup Backdoor
Tidcmp DoS Information

Vxidl.APX Trojan

Vxidl.APX malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Vxidl.APX:

An up-to-date copy of ExterminateIt should detect and prevent infection from Vxidl.APX.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Vxidl.APX manually.

To completely manually remove Vxidl.APX malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Vxidl.APX.

  1. Use Task Manager to terminate the Vxidl.APX process.
  2. Delete the original Vxidl.APX file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Vxidl.APX from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Vxidl.APX!


Also Be Aware of the Following Threats:
Perl.DC Trojan Symptoms
Remove Internet.Optimizer Adware
Decept Trojan Removal instruction
Bancos.INV Trojan Symptoms
Pigeon.EHM Trojan Symptoms

Stubot Trojan

Stubot malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]Trojan-Clicker.Win32.Delf.dp,Trojan.Win32.Agent.yr,Backdoor.Win32.Agent.oo;
[Other]Win32/Stubot.C,Win32/Stubot.D,Bloodhound.Win32.1

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Stubot:

An up-to-date copy of ExterminateIt should detect and prevent infection from Stubot.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Stubot manually.

To completely manually remove Stubot malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Stubot.

  1. Use Task Manager to terminate the Stubot process.
  2. Delete the original Stubot file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Stubot from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Stubot!


Also Be Aware of the Following Threats:
Removing TrojanDownloader.Sinteri Trojan
PswStor Trojan Symptoms
Galapoper Trojan Information

VBS.Maz Trojan

VBS.Maz malware description and removal detail
Categories:Trojan
Also known as:

[Panda]VBS/Inor.A;
[Computer Associates]VBS.Maz,VBS/Maz!Worm

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing VBS.Maz:

An up-to-date copy of ExterminateIt should detect and prevent infection from VBS.Maz.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove VBS.Maz manually.

To completely manually remove VBS.Maz malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with VBS.Maz.

  1. Use Task Manager to terminate the VBS.Maz process.
  2. Delete the original VBS.Maz file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes VBS.Maz from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of VBS.Maz!


Also Be Aware of the Following Threats:
Bancos.DTV Trojan Symptoms
Remove Bancos.IDD Trojan
Scramble2 Trojan Information
FWC1 Adware Cleaner

OnSrvr Adware

OnSrvr malware description and removal detail
Categories:Adware

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing OnSrvr:

An up-to-date copy of ExterminateIt should detect and prevent infection from OnSrvr.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove OnSrvr manually.

To completely manually remove OnSrvr malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with OnSrvr.

  1. Use Task Manager to terminate the OnSrvr process.
  2. Delete the original OnSrvr file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes OnSrvr from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of OnSrvr!


Also Be Aware of the Following Threats:
Hddk Trojan Removal
QDel114 Trojan Removal instruction

IRC.SdBot.ATH Trojan

IRC.SdBot.ATH malware description and removal detail
Categories:Trojan,Worm,Backdoor
Also known as:

[Kaspersky]Backdoor.Win32.SdBot.gen

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing IRC.SdBot.ATH:

An up-to-date copy of ExterminateIt should detect and prevent infection from IRC.SdBot.ATH.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove IRC.SdBot.ATH manually.

To completely manually remove IRC.SdBot.ATH malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with IRC.SdBot.ATH.

  1. Use Task Manager to terminate the IRC.SdBot.ATH process.
  2. Delete the original IRC.SdBot.ATH file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes IRC.SdBot.ATH from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of IRC.SdBot.ATH!


Also Be Aware of the Following Threats:
Remove Temp532 Adware
Bancos.IHB Trojan Cleaner
Travel Trojan Symptoms
Recso Trojan Cleaner

Pigeon.AZX Trojan

Pigeon.AZX malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.AZX:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.AZX.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.AZX manually.

To completely manually remove Pigeon.AZX malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.AZX.

  1. Use Task Manager to terminate the Pigeon.AZX process.
  2. Delete the original Pigeon.AZX file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.AZX from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.AZX!


Also Be Aware of the Following Threats:
MagicCenter Trojan Information
Remove Search.Matic2000 BHO

Treme Trojan

Treme malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]Trojan.AOL.Xtreme;
[Panda]Trojan Horse;
[Computer Associates]Win/AOL.Beazly!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Treme:

An up-to-date copy of ExterminateIt should detect and prevent infection from Treme.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Treme manually.

To completely manually remove Treme malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Treme.

  1. Use Task Manager to terminate the Treme process.
  2. Delete the original Treme file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Treme from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Treme!


Also Be Aware of the Following Threats:
Remove bastaya.exe Malware
WordMacro.Concept Trojan Symptoms
Dr Trojan Information
Remove Microphone.Recorder Backdoor
WWW.GlobeTechnology.com Tracking Cookie Information

ERRB Trojan

ERRB malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]Trojan.Win32.Erase2002.c;
[F-Prot]destructive program;
[Panda]Trojan Horse;
[Computer Associates]Win32/Erase2002.C!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing ERRB:

An up-to-date copy of ExterminateIt should detect and prevent infection from ERRB.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove ERRB manually.

To completely manually remove ERRB malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with ERRB.

  1. Use Task Manager to terminate the ERRB process.
  2. Delete the original ERRB file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes ERRB from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of ERRB!


Also Be Aware of the Following Threats:
Removing Bancos.GHX Trojan
Remove Bancos.GRQ Trojan
Remove Cutspeer Trojan
Remove NetBus.CABSetup Backdoor

revresda.com Tracking Cookie

revresda.com malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing revresda.com:

An up-to-date copy of ExterminateIt should detect and prevent infection from revresda.com.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove revresda.com manually.

To completely manually remove revresda.com malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with revresda.com.

  1. Use Task Manager to terminate the revresda.com process.
  2. Delete the original revresda.com file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes revresda.com from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of revresda.com!


Also Be Aware of the Following Threats:
U321 Trojan Removal instruction

SillyDl.CXH Trojan

SillyDl.CXH malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing SillyDl.CXH:

An up-to-date copy of ExterminateIt should detect and prevent infection from SillyDl.CXH.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove SillyDl.CXH manually.

To completely manually remove SillyDl.CXH malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SillyDl.CXH.

  1. Use Task Manager to terminate the SillyDl.CXH process.
  2. Delete the original SillyDl.CXH file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes SillyDl.CXH from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of SillyDl.CXH!


Also Be Aware of the Following Threats:
Keylog.MSGate Trojan Cleaner
RPStealer Trojan Removal instruction
euniverseads.com Tracking Cookie Removal instruction

Cussifide Trojan

Cussifide malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Cussifide:

An up-to-date copy of ExterminateIt should detect and prevent infection from Cussifide.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Cussifide manually.

To completely manually remove Cussifide malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Cussifide.

  1. Use Task Manager to terminate the Cussifide process.
  2. Delete the original Cussifide file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Cussifide from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Cussifide!


Also Be Aware of the Following Threats:
Vxidl.BBB Trojan Information

VB.gx Backdoor

VB.gx malware description and removal detail
Categories:Backdoor

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing VB.gx:

An up-to-date copy of ExterminateIt should detect and prevent infection from VB.gx.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove VB.gx manually.

To completely manually remove VB.gx malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with VB.gx.

  1. Use Task Manager to terminate the VB.gx process.
  2. Delete the original VB.gx file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes VB.gx from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of VB.gx!


Also Be Aware of the Following Threats:
Phishbank.ADW Trojan Removal instruction
Pugi.Qidion Toolbar Removal
Pigeon.AEU Trojan Removal instruction

Nuke.Knewk Trojan

Nuke.Knewk malware description and removal detail
Categories:Trojan,Hacker Tool
Also known as:

[Kaspersky]Nuker.Knewk;
[McAfee]Nuke-Knewk;
[F-Prot]destructive program;
[Panda]Trj/W32.Nuker.Knewk;
[Computer Associates]Win32.Nuker.Knewk

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Nuke.Knewk:

An up-to-date copy of ExterminateIt should detect and prevent infection from Nuke.Knewk.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Nuke.Knewk manually.

To completely manually remove Nuke.Knewk malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Nuke.Knewk.

  1. Use Task Manager to terminate the Nuke.Knewk process.
  2. Delete the original Nuke.Knewk file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Nuke.Knewk from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Nuke.Knewk!


Also Be Aware of the Following Threats:
Remove Macro.Word97.Marker Trojan
Remove Tarex.ow Trojan
Removing Dumbtrash Trojan
Removing Rootkit.exe Trojan

Pigeon.AQI Trojan

Pigeon.AQI malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.AQI:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.AQI.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.AQI manually.

To completely manually remove Pigeon.AQI malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.AQI.

  1. Use Task Manager to terminate the Pigeon.AQI process.
  2. Delete the original Pigeon.AQI file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.AQI from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.AQI!


Also Be Aware of the Following Threats:
Sean Backdoor Symptoms

CWS.SysTime Hijacker

CWS.SysTime malware description and removal detail
Categories:Hijacker

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting CWS.SysTime:

Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\main
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\main
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\main

Removing CWS.SysTime:

An up-to-date copy of ExterminateIt should detect and prevent infection from CWS.SysTime.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove CWS.SysTime manually.

To completely manually remove CWS.SysTime malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with CWS.SysTime.

  1. Use Task Manager to terminate the CWS.SysTime process.
  2. Delete the original CWS.SysTime file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes CWS.SysTime from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of CWS.SysTime!


Also Be Aware of the Following Threats:
ShareSearcher Spyware Removal

CiD.Help Adware

CiD.Help malware description and removal detail
Categories:Adware
Visible Symptoms:
Files in system folders:
[%MYMUSIC%]\sqmdata02.sqm
[%MYMUSIC%]\sqmnoopt02.sqm
[%PROGRAM_FILES%]\Adverts\uninst.exe
[%SYSTEM%]\drivers\etc\hosts
[%SYSTEM%]\drivers\etc\hosts.msn
[%PROFILE_TEMP%]\msgpl_d437.tmp\spinstall.exe
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor Agreement (es).rtf
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor Agreement (fr).rtf
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor Agreement (ne).rtf
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor Agreement (pt).rtf
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor Agreement.rtf
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor.dat
[%WINDOWS%]\Tasks\A03B8AA191D43CE1.job
[%MYMUSIC%]\sqmdata02.sqm
[%MYMUSIC%]\sqmnoopt02.sqm
[%PROGRAM_FILES%]\Adverts\uninst.exe
[%SYSTEM%]\drivers\etc\hosts
[%SYSTEM%]\drivers\etc\hosts.msn
[%PROFILE_TEMP%]\msgpl_d437.tmp\spinstall.exe
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor Agreement (es).rtf
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor Agreement (fr).rtf
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor Agreement (ne).rtf
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor Agreement (pt).rtf
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor Agreement.rtf
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor.dat
[%WINDOWS%]\Tasks\A03B8AA191D43CE1.job

In order to ensure that the CiD.Help is launched automatically each time the system is booted, the CiD.Help adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%PROGRAM_FILES%]\Adverts\uninst.exe
[%PROFILE_TEMP%]\msgpl_d437.tmp\spinstall.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting CiD.Help:

Files:
[%MYMUSIC%]\sqmdata02.sqm
[%MYMUSIC%]\sqmnoopt02.sqm
[%PROGRAM_FILES%]\Adverts\uninst.exe
[%SYSTEM%]\drivers\etc\hosts
[%SYSTEM%]\drivers\etc\hosts.msn
[%PROFILE_TEMP%]\msgpl_d437.tmp\spinstall.exe
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor Agreement (es).rtf
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor Agreement (fr).rtf
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor Agreement (ne).rtf
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor Agreement (pt).rtf
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor Agreement.rtf
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor.dat
[%WINDOWS%]\Tasks\A03B8AA191D43CE1.job
[%MYMUSIC%]\sqmdata02.sqm
[%MYMUSIC%]\sqmnoopt02.sqm
[%PROGRAM_FILES%]\Adverts\uninst.exe
[%SYSTEM%]\drivers\etc\hosts
[%SYSTEM%]\drivers\etc\hosts.msn
[%PROFILE_TEMP%]\msgpl_d437.tmp\spinstall.exe
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor Agreement (es).rtf
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor Agreement (fr).rtf
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor Agreement (ne).rtf
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor Agreement (pt).rtf
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor Agreement.rtf
[%PROFILE_TEMP%]\msgpl_d437.tmp\Sponsor.dat
[%WINDOWS%]\Tasks\A03B8AA191D43CE1.job

Folders:
[%APPDATA%]\Bind army eggs joy
[%COMMON_APPDATA%]\Bind army eggs joy

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing CiD.Help:

An up-to-date copy of ExterminateIt should detect and prevent infection from CiD.Help.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove CiD.Help manually.

To completely manually remove CiD.Help malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with CiD.Help.

  1. Use Task Manager to terminate the CiD.Help process.
  2. Delete the original CiD.Help file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes CiD.Help from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of CiD.Help!


Also Be Aware of the Following Threats:
Keylogger.King.Pro Spyware Symptoms

DollarRevenue.ajz Adware

DollarRevenue.ajz malware description and removal detail
Categories:Adware
Also known as:

[Kaspersky]Trojan-Downloader.Win32.VB.ajz;
[Other]Adware.DollarRevenue,W32/DLoader.AMVS

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing DollarRevenue.ajz:

An up-to-date copy of ExterminateIt should detect and prevent infection from DollarRevenue.ajz.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove DollarRevenue.ajz manually.

To completely manually remove DollarRevenue.ajz malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with DollarRevenue.ajz.

  1. Use Task Manager to terminate the DollarRevenue.ajz process.
  2. Delete the original DollarRevenue.ajz file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes DollarRevenue.ajz from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of DollarRevenue.ajz!


Also Be Aware of the Following Threats:
Bancos.BND Trojan Information
Remove Bat.BfV Trojan
BABCC Trojan Symptoms

SdBot.bb Backdoor

SdBot.bb malware description and removal detail
Categories:Backdoor

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing SdBot.bb:

An up-to-date copy of ExterminateIt should detect and prevent infection from SdBot.bb.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove SdBot.bb manually.

To completely manually remove SdBot.bb malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SdBot.bb.

  1. Use Task Manager to terminate the SdBot.bb process.
  2. Delete the original SdBot.bb file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes SdBot.bb from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of SdBot.bb!


Also Be Aware of the Following Threats:
Pigeon.EEX Trojan Removal

Sandrador Backdoor

Sandrador malware description and removal detail
Categories:Backdoor

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Sandrador:

An up-to-date copy of ExterminateIt should detect and prevent infection from Sandrador.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Sandrador manually.

To completely manually remove Sandrador malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Sandrador.

  1. Use Task Manager to terminate the Sandrador process.
  2. Delete the original Sandrador file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Sandrador from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Sandrador!


Also Be Aware of the Following Threats:
Remove JS.Avon Trojan
Removing cj Adware
Remove Tequila Trojan
SillyDl.CJJ Trojan Removal instruction

exitexchange.com Tracking Cookie

exitexchange.com malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing exitexchange.com:

An up-to-date copy of ExterminateIt should detect and prevent infection from exitexchange.com.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove exitexchange.com manually.

To completely manually remove exitexchange.com malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with exitexchange.com.

  1. Use Task Manager to terminate the exitexchange.com process.
  2. Delete the original exitexchange.com file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes exitexchange.com from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of exitexchange.com!


Also Be Aware of the Following Threats:
MIRC.Freeze DoS Cleaner
Mircgirl DoS Removal

SillyDl.DDT Trojan

SillyDl.DDT malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]Trojan-Dropper.Win32.Small.mh;
[McAfee]Generic MultiDropper.f;
[F-Prot]W32/SecondTh.E;
[Other]Win32/SillyDl.DDT,Trojan.Dropper,W32/Smalldrp.ADN,Mal/Behav-105

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing SillyDl.DDT:

An up-to-date copy of ExterminateIt should detect and prevent infection from SillyDl.DDT.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove SillyDl.DDT manually.

To completely manually remove SillyDl.DDT malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SillyDl.DDT.

  1. Use Task Manager to terminate the SillyDl.DDT process.
  2. Delete the original SillyDl.DDT file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes SillyDl.DDT from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of SillyDl.DDT!


Also Be Aware of the Following Threats:
Removing secure.banking.com Tracking Cookie