Tuesday, January 27, 2009

The.Thing Trojan

The.Thing malware description and removal detail
Categories:Trojan,Backdoor,RAT
Also known as:

[Kaspersky]Backdoor.TheThing.10,Backdoor.TheThing.11,Backdoor.Win16.Thing,Backdoor.TheThing.112,Backdoor.TheThing.15,Backdoor.TheThing.a,Backdoor.TheThing.16,Backdoor.TheThing.16.c,Backdoor.TheThing.b;
[Eset]Win32/TheThing.10 trojan,Win32/Thing.1_1 trojan,Win16/Thing trojan,Win32/Thing.1_12 trojan,Win32/TheThing.A trojan,Win32/TheThing.16.A trojan,Win32/TheThing.16.C trojan;
[McAfee]BackDoor-AB.cli,BackDoor-CC,BackDoor-AB,Generic,BackDoor-AB.svr;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/TheThing.10,Bck/TheThing.11,Bck/TheThing.1.11,Bck/TheThing112,Bck/TheThing.1.5.A,Bck/Thething.A.I,Backdoor Program,Bck/Onz,Bck/TheThing.16,Bck/XZip.6;
[Computer Associates]Backdoor/TheThing.10,Backdoor/TheThing.11,Backdoor/Win16.Thing,Win.Thing,Backdoor/TheThing.112,Backdoor/TheThing_Server_family,Backdoor/AVServ.A,Backdoor/TheThing.1_6!Server,Backdoor/TheThing.16

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing The.Thing:

An up-to-date copy of ExterminateIt should detect and prevent infection from The.Thing.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove The.Thing manually.

To completely manually remove The.Thing malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with The.Thing.

  1. Use Task Manager to terminate the The.Thing process.
  2. Delete the original The.Thing file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes The.Thing from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of The.Thing!


Also Be Aware of the Following Threats:
Frethog.ADQ Trojan Removal instruction
Removing Technical.Difficulties DoS
Pigeon.ALK Trojan Symptoms

immobilienscout24.de Tracking Cookie

immobilienscout24.de malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing immobilienscout24.de:

An up-to-date copy of ExterminateIt should detect and prevent infection from immobilienscout24.de.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove immobilienscout24.de manually.

To completely manually remove immobilienscout24.de malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with immobilienscout24.de.

  1. Use Task Manager to terminate the immobilienscout24.de process.
  2. Delete the original immobilienscout24.de file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes immobilienscout24.de from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of immobilienscout24.de!


Also Be Aware of the Following Threats:
Win32.Sepro Trojan Removal instruction

Dewdz Trojan

Dewdz malware description and removal detail
Categories:Trojan,Backdoor,Downloader,DoS
Also known as:

[Kaspersky]VirDem.601;
[Computer Associates]Dewdz

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Dewdz:

An up-to-date copy of ExterminateIt should detect and prevent infection from Dewdz.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Dewdz manually.

To completely manually remove Dewdz malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Dewdz.

  1. Use Task Manager to terminate the Dewdz process.
  2. Delete the original Dewdz file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Dewdz from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Dewdz!


Also Be Aware of the Following Threats:
Bed Trojan Removal instruction
VB.rc Backdoor Information
Banbra.bi Trojan Cleaner
Doomob Trojan Removal
Bancos.FRN Trojan Information

Bancos.FXC Trojan

Bancos.FXC malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bancos.FXC:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bancos.FXC.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bancos.FXC manually.

To completely manually remove Bancos.FXC malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.FXC.

  1. Use Task Manager to terminate the Bancos.FXC process.
  2. Delete the original Bancos.FXC file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bancos.FXC from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bancos.FXC!


Also Be Aware of the Following Threats:
EUniverse Adware Cleaner
Win95.Auryn Trojan Symptoms

StitchUp Trojan

StitchUp malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]Trojan.Win32.Colmatch;
[McAfee]StitchUp;
[F-Prot]destructive program;
[Panda]Trj/W32.Colmatch;
[Computer Associates]Win32.StitchUp,Win32/Colarmatch!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing StitchUp:

An up-to-date copy of ExterminateIt should detect and prevent infection from StitchUp.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove StitchUp manually.

To completely manually remove StitchUp malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with StitchUp.

  1. Use Task Manager to terminate the StitchUp process.
  2. Delete the original StitchUp file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes StitchUp from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of StitchUp!


Also Be Aware of the Following Threats:
AdClicker.AgeOfEmpires3 Adware Symptoms
Removing Peltry Trojan

SillyDl.COJ Trojan

SillyDl.COJ malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing SillyDl.COJ:

An up-to-date copy of ExterminateIt should detect and prevent infection from SillyDl.COJ.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove SillyDl.COJ manually.

To completely manually remove SillyDl.COJ malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SillyDl.COJ.

  1. Use Task Manager to terminate the SillyDl.COJ process.
  2. Delete the original SillyDl.COJ file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes SillyDl.COJ from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of SillyDl.COJ!


Also Be Aware of the Following Threats:
Goiter Trojan Cleaner
Dupe Hostile Code Cleaner
Removing Thrap Trojan
Guardian.Monitor Spyware Cleaner

JAVA.Class.Hole.Recently.Discovered Trojan

JAVA.Class.Hole.Recently.Discovered malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing JAVA.Class.Hole.Recently.Discovered:

An up-to-date copy of ExterminateIt should detect and prevent infection from JAVA.Class.Hole.Recently.Discovered.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove JAVA.Class.Hole.Recently.Discovered manually.

To completely manually remove JAVA.Class.Hole.Recently.Discovered malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with JAVA.Class.Hole.Recently.Discovered.

  1. Use Task Manager to terminate the JAVA.Class.Hole.Recently.Discovered process.
  2. Delete the original JAVA.Class.Hole.Recently.Discovered file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes JAVA.Class.Hole.Recently.Discovered from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of JAVA.Class.Hole.Recently.Discovered!


Also Be Aware of the Following Threats:
Stinkerot Trojan Information
FreeWire Worm Removal
AV&Firewall.Killer Trojan Removal instruction
Rightu Trojan Removal
Removing Banker.aq Spyware

Vxidl.AVE Trojan

Vxidl.AVE malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Vxidl.AVE:

An up-to-date copy of ExterminateIt should detect and prevent infection from Vxidl.AVE.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Vxidl.AVE manually.

To completely manually remove Vxidl.AVE malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Vxidl.AVE.

  1. Use Task Manager to terminate the Vxidl.AVE process.
  2. Delete the original Vxidl.AVE file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Vxidl.AVE from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Vxidl.AVE!


Also Be Aware of the Following Threats:
Removing Backdoor.BCZ Backdoor
Stealth.edition RAT Removal instruction
Removing Bat.BWG.gen Trojan

Opaserv Trojan

Opaserv malware description and removal detail
Categories:Trojan
Also known as:

[Panda]W32/Opaserv.Gen,W32/Opaserv.O;
[Computer Associates]Win32.Opaserv.M,Win32/OpaServ.17408.B!Worm,Win32.Opaserv.L,Win32.Opaserv.R,Win32/OpaServ.17408!Worm

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Opaserv:

An up-to-date copy of ExterminateIt should detect and prevent infection from Opaserv.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Opaserv manually.

To completely manually remove Opaserv malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Opaserv.

  1. Use Task Manager to terminate the Opaserv process.
  2. Delete the original Opaserv file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Opaserv from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Opaserv!


Also Be Aware of the Following Threats:
Bancos.DQY Trojan Information
ceramlinks.net Tracking Cookie Removal instruction
PSW.Temporizador Trojan Symptoms
Removing VBS.Format Trojan

Small.ev Trojan

Small.ev malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Small.ev:

Registry Keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Desktop Uninstall
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\desktop uninstall

Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices

Removing Small.ev:

An up-to-date copy of ExterminateIt should detect and prevent infection from Small.ev.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Small.ev manually.

To completely manually remove Small.ev malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Small.ev.

  1. Use Task Manager to terminate the Small.ev process.
  2. Delete the original Small.ev file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Small.ev from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Small.ev!


Also Be Aware of the Following Threats:
Remove Lucie Trojan
DlStwoyle Trojan Information
BAT.Bug Trojan Removal instruction

VB.qo Backdoor

VB.qo malware description and removal detail
Categories:Backdoor

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing VB.qo:

An up-to-date copy of ExterminateIt should detect and prevent infection from VB.qo.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove VB.qo manually.

To completely manually remove VB.qo malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with VB.qo.

  1. Use Task Manager to terminate the VB.qo process.
  2. Delete the original VB.qo file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes VB.qo from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of VB.qo!


Also Be Aware of the Following Threats:
Implia Trojan Symptoms
New.BackDoor2 Trojan Removal instruction
Httserv Trojan Cleaner
Remote.Computer.Control.Center RAT Cleaner
anm.co.uk Tracking Cookie Information

OnFlow Adware

OnFlow malware description and removal detail
Categories:Adware
Visible Symptoms:
Files in system folders:
[%PROGRAM_FILES%]\internet explorer\plugins\nponflow.dll
[%PROGRAM_FILES%]\internet explorer\plugins\onflowplayer0.dll
[%PROGRAM_FILES%]\internet explorer\plugins\onflowreport.exe
[%PROGRAM_FILES%]\intern~1\plugins\nponflow.dll
[%PROGRAM_FILES%]\intern~1\plugins\onflowplayer0.dll
[%WINDOWS%]\temp\of_stub_ins_w_2071.exe
[%PROGRAM_FILES%]\internet explorer\plugins\nponflow.dll
[%PROGRAM_FILES%]\internet explorer\plugins\onflowplayer0.dll
[%PROGRAM_FILES%]\internet explorer\plugins\onflowreport.exe
[%PROGRAM_FILES%]\intern~1\plugins\nponflow.dll
[%PROGRAM_FILES%]\intern~1\plugins\onflowplayer0.dll
[%WINDOWS%]\temp\of_stub_ins_w_2071.exe

In order to ensure that the OnFlow is launched automatically each time the system is booted, the OnFlow adds a link to its executable file in the system registry:
HKLM\Microsoft\Windows\CurrentVersion\Run
[%PROGRAM_FILES%]\internet explorer\plugins\onflowreport.exe
[%WINDOWS%]\temp\of_stub_ins_w_2071.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting OnFlow:

Files:
[%PROGRAM_FILES%]\internet explorer\plugins\nponflow.dll
[%PROGRAM_FILES%]\internet explorer\plugins\onflowplayer0.dll
[%PROGRAM_FILES%]\internet explorer\plugins\onflowreport.exe
[%PROGRAM_FILES%]\intern~1\plugins\nponflow.dll
[%PROGRAM_FILES%]\intern~1\plugins\onflowplayer0.dll
[%WINDOWS%]\temp\of_stub_ins_w_2071.exe
[%PROGRAM_FILES%]\internet explorer\plugins\nponflow.dll
[%PROGRAM_FILES%]\internet explorer\plugins\onflowplayer0.dll
[%PROGRAM_FILES%]\internet explorer\plugins\onflowreport.exe
[%PROGRAM_FILES%]\intern~1\plugins\nponflow.dll
[%PROGRAM_FILES%]\intern~1\plugins\onflowplayer0.dll
[%WINDOWS%]\temp\of_stub_ins_w_2071.exe

Folders:
[%PROGRAM_FILES%]\internet explorer\plugins\onflow
[%PROGRAM_FILES%]\internet explorer\plugins\ieonflow.dll
[%PROGRAM_FILES%]\onflow
[%WINDOWS%]\temp\onflow

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{0cef79cb-d373-11d3-a7d3-00062962bf17}
HKEY_CLASSES_ROOT\clsid\{0cef79d8-d373-11d3-a7d3-00062962bf17}
HKEY_CLASSES_ROOT\ieonflow.ieonflow1
HKEY_CLASSES_ROOT\ieonflow.ieonflow1.7
HKEY_LOCAL_MACHINE\software\classes\clsid\{0cef79d8-d373-11d3-a7d3-00062962bf17}
HKEY_LOCAL_MACHINE\software\classes\ieonflow.ieonflow1
HKEY_LOCAL_MACHINE\software\classes\ieonflow.ieonflow1.7
HKEY_LOCAL_MACHINE\software\classes\typelib\{0cef79cb-d373-11d3-a7d3-00062962bf17}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\plugins\extension\.ofb
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\onflow
HKEY_LOCAL_MACHINE\software\onflow

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\plugins\extension
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing OnFlow:

An up-to-date copy of ExterminateIt should detect and prevent infection from OnFlow.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove OnFlow manually.

To completely manually remove OnFlow malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with OnFlow.

  1. Use Task Manager to terminate the OnFlow process.
  2. Delete the original OnFlow file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes OnFlow from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of OnFlow!


Also Be Aware of the Following Threats:
Pigeon.ANE Trojan Cleaner
Netbus Trojan Removal
Pigeon.AMY Trojan Removal
Agent.pk Trojan Information

Pigeon.EPU Trojan

Pigeon.EPU malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pigeon.EPU:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pigeon.EPU.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pigeon.EPU manually.

To completely manually remove Pigeon.EPU malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.EPU.

  1. Use Task Manager to terminate the Pigeon.EPU process.
  2. Delete the original Pigeon.EPU file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pigeon.EPU from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pigeon.EPU!


Also Be Aware of the Following Threats:
Cram Toolbar Removal
hitsprocessor.com Tracking Cookie Cleaner
RemCmd RAT Cleaner
ActualNames BHO Cleaner
Crash Trojan Cleaner

Bridgetrack.com Tracking Cookie

Bridgetrack.com malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bridgetrack.com:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bridgetrack.com.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bridgetrack.com manually.

To completely manually remove Bridgetrack.com malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bridgetrack.com.

  1. Use Task Manager to terminate the Bridgetrack.com process.
  2. Delete the original Bridgetrack.com file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bridgetrack.com from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bridgetrack.com!


Also Be Aware of the Following Threats:
C50a Trojan Symptoms

Dirpo!Trojan Trojan

Dirpo!Trojan malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Dirpo!Trojan:

An up-to-date copy of ExterminateIt should detect and prevent infection from Dirpo!Trojan.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Dirpo!Trojan manually.

To completely manually remove Dirpo!Trojan malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Dirpo!Trojan.

  1. Use Task Manager to terminate the Dirpo!Trojan process.
  2. Delete the original Dirpo!Trojan file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Dirpo!Trojan from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Dirpo!Trojan!


Also Be Aware of the Following Threats:
Win32.Lioten.Variant Trojan Symptoms
Win.AOLPS.Bucop Trojan Cleaner
Mail.Bomber Hacker Tool Cleaner
Win32.Poitex Trojan Removal

CWS.XPSystem Hijacker

CWS.XPSystem malware description and removal detail
Categories:Hijacker

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing CWS.XPSystem:

An up-to-date copy of ExterminateIt should detect and prevent infection from CWS.XPSystem.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove CWS.XPSystem manually.

To completely manually remove CWS.XPSystem malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with CWS.XPSystem.

  1. Use Task Manager to terminate the CWS.XPSystem process.
  2. Delete the original CWS.XPSystem file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes CWS.XPSystem from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of CWS.XPSystem!


Also Be Aware of the Following Threats:
Removing Daemaen Trojan

Atobar Trojan

Atobar malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Atobar:

An up-to-date copy of ExterminateIt should detect and prevent infection from Atobar.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Atobar manually.

To completely manually remove Atobar malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Atobar.

  1. Use Task Manager to terminate the Atobar process.
  2. Delete the original Atobar file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Atobar from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Atobar!


Also Be Aware of the Following Threats:
Pigeon.APZ Trojan Removal
Free.Ice.Remote.Spy Spyware Symptoms
Remove Elza Trojan
Pigeon.AVDB Trojan Information
Pigeon.AVLD Trojan Information

Agent.BCC Downloader

Agent.BCC malware description and removal detail
Categories:Downloader
Also known as:

[Kaspersky]Trojan-Downloader.Win32.Agent.bcc;
[F-Prot]W32/Backdoor.ADMT;
[Other]Trojan.AdClicker,W32/Agent.BCBJ

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Agent.BCC:

An up-to-date copy of ExterminateIt should detect and prevent infection from Agent.BCC.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Agent.BCC manually.

To completely manually remove Agent.BCC malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Agent.BCC.

  1. Use Task Manager to terminate the Agent.BCC process.
  2. Delete the original Agent.BCC file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Agent.BCC from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Agent.BCC!


Also Be Aware of the Following Threats:
SrchUpdt Adware Information
SillyDl.BZH Trojan Removal instruction
Mirror.II Trojan Removal
Remove Backdoor.STLUndetected.2!Serve Backdoor

IROffer.303b Backdoor

IROffer.303b malware description and removal detail
Categories:Backdoor

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing IROffer.303b:

An up-to-date copy of ExterminateIt should detect and prevent infection from IROffer.303b.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove IROffer.303b manually.

To completely manually remove IROffer.303b malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with IROffer.303b.

  1. Use Task Manager to terminate the IROffer.303b process.
  2. Delete the original IROffer.303b file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes IROffer.303b from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of IROffer.303b!


Also Be Aware of the Following Threats:
Pigeon.AVCT Trojan Symptoms
Remove SillyDl.CXB Trojan
Micmim Trojan Cleaner

Beach.Girls Trojan

Beach.Girls malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]BadJoke.Win32.Delf.h;
[Other]Joke Program,Joke:Win32/Beachgirl.A

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Beach.Girls:

An up-to-date copy of ExterminateIt should detect and prevent infection from Beach.Girls.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Beach.Girls manually.

To completely manually remove Beach.Girls malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Beach.Girls.

  1. Use Task Manager to terminate the Beach.Girls process.
  2. Delete the original Beach.Girls file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Beach.Girls from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Beach.Girls!


Also Be Aware of the Following Threats:
Bat.Smev.ServU.based Backdoor Removal instruction
Dadobra.ez Downloader Information
Kolrav Trojan Cleaner
Vxidl.BCN Trojan Removal instruction

Swaptor Worm

Swaptor malware description and removal detail
Categories:Worm
Visible Symptoms:
Files in system folders:
[%PROGRAMS%]\swaptor\swaptor.lnk
[%PROGRAMS%]\swaptor\swaptor.lnk

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Swaptor:

Files:
[%PROGRAMS%]\swaptor\swaptor.lnk
[%PROGRAMS%]\swaptor\swaptor.lnk

Folders:
[%DESKTOP%]\swaptor.lnk
[%PROFILE%]\start menu\programs\swaptor
[%PROGRAM_FILES%]\swaptor

Registry Keys:
HKEY_CURRENT_USER\software\filenavigator_26
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\menuorder\start menu2\programs\swaptor
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\swaptor
HKEY_LOCAL_MACHINE\software\swaptor
HKEY_LOCAL_MACHINE\software\wise solutions\wise installation system\repair\[%PROGRAM_FILES%]\swaptor\install.log

Removing Swaptor:

An up-to-date copy of ExterminateIt should detect and prevent infection from Swaptor.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Swaptor manually.

To completely manually remove Swaptor malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Swaptor.

  1. Use Task Manager to terminate the Swaptor process.
  2. Delete the original Swaptor file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Swaptor from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Swaptor!


Also Be Aware of the Following Threats:
CWS.Control Hijacker Removal instruction
Remove Svs Trojan
AolNGP Trojan Cleaner

Bionet.Keyhook Backdoor

Bionet.Keyhook malware description and removal detail
Categories:Backdoor

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bionet.Keyhook:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bionet.Keyhook.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bionet.Keyhook manually.

To completely manually remove Bionet.Keyhook malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bionet.Keyhook.

  1. Use Task Manager to terminate the Bionet.Keyhook process.
  2. Delete the original Bionet.Keyhook file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bionet.Keyhook from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bionet.Keyhook!


Also Be Aware of the Following Threats:
Vxidl.AWH Trojan Information
Pigeon.EIT Trojan Information