BO2K.plugin.Interface Trojan

BO2K.plugin.Interface malware description and removal detail
Categories:Trojan,Backdoor

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing BO2K.plugin.Interface:

An up-to-date copy of ExterminateIt should detect and prevent infection from BO2K.plugin.Interface.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove BO2K.plugin.Interface manually.

To completely manually remove BO2K.plugin.Interface malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with BO2K.plugin.Interface.

  1. Use Task Manager to terminate the BO2K.plugin.Interface process.
  2. Delete the original BO2K.plugin.Interface file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes BO2K.plugin.Interface from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of BO2K.plugin.Interface!

Check now if your PC is infected with BO2K.plugin.Interface

You can buy full version of ExterminateIt at RegNow.com.


Also Be Aware of the Following Threats:
VirtualRoot Trojan Information
Remove MSS Adware
WLF Trojan Removal
Pigeon.AVID Trojan Information
Asylum.Web RAT Symptoms

Sleaop Trojan

Sleaop malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Sleaop:

An up-to-date copy of ExterminateIt should detect and prevent infection from Sleaop.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Sleaop manually.

To completely manually remove Sleaop malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Sleaop.

  1. Use Task Manager to terminate the Sleaop process.
  2. Delete the original Sleaop file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Sleaop from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Sleaop!

Check now if your PC is infected with Sleaop

You can buy full version of ExterminateIt at RegNow.com.


Also Be Aware of the Following Threats:
Remove Pigeon.AAM Trojan
Remove AmysHorse Trojan
Remove Vxidl.AOH Trojan
Mmail.olly2html Trojan Symptoms
Leskuil Trojan Symptoms

Bancos.FWE Trojan

Bancos.FWE malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Bancos.FWE:

An up-to-date copy of ExterminateIt should detect and prevent infection from Bancos.FWE.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Bancos.FWE manually.

To completely manually remove Bancos.FWE malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.FWE.

  1. Use Task Manager to terminate the Bancos.FWE process.
  2. Delete the original Bancos.FWE file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Bancos.FWE from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Bancos.FWE!

Check now if your PC is infected with Bancos.FWE

You can buy full version of ExterminateIt at RegNow.com.


Also Be Aware of the Following Threats:
Remove Comet.Systems BHO
Removing Nota.dr Backdoor
Remove hc Adware
Dyfuca Trojan Symptoms
Vxidl.AFH Trojan Cleaner

Femad Downloader

Femad malware description and removal detail
Categories:Downloader

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Femad:

An up-to-date copy of ExterminateIt should detect and prevent infection from Femad.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Femad manually.

To completely manually remove Femad malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Femad.

  1. Use Task Manager to terminate the Femad process.
  2. Delete the original Femad file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Femad from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Femad!

Check now if your PC is infected with Femad

You can buy full version of ExterminateIt at RegNow.com.


Also Be Aware of the Following Threats:
AMS RAT Symptoms
Remove TrojanDownloader.Win32.Small.eb Adware
Turtle.Identd RAT Removal instruction
Fakefmt Trojan Removal
Pigeon.AVGR Trojan Information

ComBat Trojan

ComBat malware description and removal detail
Categories:Trojan,Backdoor,Downloader,DoS
Also known as:

[Kaspersky]Virus.DOS.ComBat.154;
[Panda]Supra.172,Univ.EG

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing ComBat:

An up-to-date copy of ExterminateIt should detect and prevent infection from ComBat.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove ComBat manually.

To completely manually remove ComBat malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with ComBat.

  1. Use Task Manager to terminate the ComBat process.
  2. Delete the original ComBat file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes ComBat from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of ComBat!

Check now if your PC is infected with ComBat

You can buy full version of ExterminateIt at RegNow.com.


Also Be Aware of the Following Threats:
Nota.dr Backdoor Information
Pigeon.AVAI Trojan Cleaner
Hastings Trojan Cleaner
Removing CAN.virus Trojan
Host.Control Trojan Removal instruction

joe.com Tracking Cookie

joe.com malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing joe.com:

An up-to-date copy of ExterminateIt should detect and prevent infection from joe.com.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove joe.com manually.

To completely manually remove joe.com malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with joe.com.

  1. Use Task Manager to terminate the joe.com process.
  2. Delete the original joe.com file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes joe.com from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of joe.com!

Check now if your PC is infected with joe.com

You can buy full version of ExterminateIt at RegNow.com.


Also Be Aware of the Following Threats:
Removing Coma.Server Trojan
Urkel Trojan Cleaner
Sociable RAT Cleaner
hindiranks.com Tracking Cookie Removal instruction
PS.MPC Trojan Cleaner

Hastings Trojan

Hastings malware description and removal detail
Categories:Trojan,Backdoor,Downloader,DoS
Also known as:

[Kaspersky]Trivial.200;
[Panda]Hastings;
[Computer Associates]Hastings

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Hastings:

An up-to-date copy of ExterminateIt should detect and prevent infection from Hastings.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Hastings manually.

To completely manually remove Hastings malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Hastings.

  1. Use Task Manager to terminate the Hastings process.
  2. Delete the original Hastings file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Hastings from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Hastings!

Check now if your PC is infected with Hastings

You can buy full version of ExterminateIt at RegNow.com.


Also Be Aware of the Following Threats:
Removing Dumador Trojan
MSBot.C1.Server Trojan Cleaner
Agent.kp Downloader Symptoms
Remove Puper.BPA Trojan
Vxidl.AFH Trojan Cleaner

archive.org Tracking Cookie

archive.org malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing archive.org:

An up-to-date copy of ExterminateIt should detect and prevent infection from archive.org.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove archive.org manually.

To completely manually remove archive.org malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with archive.org.

  1. Use Task Manager to terminate the archive.org process.
  2. Delete the original archive.org file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes archive.org from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of archive.org!

Check now if your PC is infected with archive.org

You can buy full version of ExterminateIt at RegNow.com.


Also Be Aware of the Following Threats:
Teygol Trojan Removal
Removing Net.Metropolitan Spyware
Meot Trojan Cleaner
Remove Pigeon.AZW Trojan
Remove Delf.vb Trojan

Udibank Trojan

Udibank malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Udibank:

An up-to-date copy of ExterminateIt should detect and prevent infection from Udibank.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Udibank manually.

To completely manually remove Udibank malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Udibank.

  1. Use Task Manager to terminate the Udibank process.
  2. Delete the original Udibank file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Udibank from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Udibank!

Check now if your PC is infected with Udibank

You can buy full version of ExterminateIt at RegNow.com.


Also Be Aware of the Following Threats:
Alma Trojan Symptoms
Remove Backdoor.Assasin.Serverstub Trojan
Tofger.bd Spyware Removal instruction
Guerilla Trojan Symptoms
Remove Why.Windows Trojan

Destructive Trojan

Destructive malware description and removal detail
Categories:Trojan,DoS
Also known as:

[Kaspersky]Trojan.Win32.Rux;
[Eset]Win32/Rux trojan;
[McAfee]Destructive.u,Destructive.m;
[F-Prot]destructive program;
[Panda]Trj/W32.Rux,Trj/W32.Flood.c;
[Computer Associates]Win32/Rux!Trojan,Win32/Flood.C!Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Destructive:

An up-to-date copy of ExterminateIt should detect and prevent infection from Destructive.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Destructive manually.

To completely manually remove Destructive malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Destructive.

  1. Use Task Manager to terminate the Destructive process.
  2. Delete the original Destructive file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Destructive from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Destructive!

Check now if your PC is infected with Destructive

You can buy full version of ExterminateIt at RegNow.com.


Also Be Aware of the Following Threats:
Removing Bancos.DQY Trojan
Win32.MindControl Trojan Symptoms
net.revenue.net Tracking Cookie Information
Remove Anlept Trojan
Gavvo Trojan Removal

ilikeclick.com Tracking Cookie

ilikeclick.com malware description and removal detail
Categories:Tracking Cookie

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing ilikeclick.com:

An up-to-date copy of ExterminateIt should detect and prevent infection from ilikeclick.com.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove ilikeclick.com manually.

To completely manually remove ilikeclick.com malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with ilikeclick.com.

  1. Use Task Manager to terminate the ilikeclick.com process.
  2. Delete the original ilikeclick.com file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes ilikeclick.com from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of ilikeclick.com!

Check now if your PC is infected with ilikeclick.com

You can buy full version of ExterminateIt at RegNow.com.


Also Be Aware of the Following Threats:
Bancos.GEK Trojan Information
Hitpop Trojan Cleaner
ItEye RAT Removal
Removing Breath2001 Trojan
Pac.Man.Clyde Trojan Removal instruction

Portmap Trojan

Portmap malware description and removal detail
Categories:Trojan,DoS

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Portmap:

An up-to-date copy of ExterminateIt should detect and prevent infection from Portmap.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Portmap manually.

To completely manually remove Portmap malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Portmap.

  1. Use Task Manager to terminate the Portmap process.
  2. Delete the original Portmap file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Portmap from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Portmap!

Check now if your PC is infected with Portmap

You can buy full version of ExterminateIt at RegNow.com.


Also Be Aware of the Following Threats:
Remove XMLid BHO
Removing Tatss Adware
Ghost.Keylogger.Lite Spyware Removal instruction
Removing Tpvo Trojan
Removing Pigeon.AYR Trojan

Win16.Catchme Trojan

Win16.Catchme malware description and removal detail
Categories:Trojan

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Win16.Catchme:

An up-to-date copy of ExterminateIt should detect and prevent infection from Win16.Catchme.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Win16.Catchme manually.

To completely manually remove Win16.Catchme malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Win16.Catchme.

  1. Use Task Manager to terminate the Win16.Catchme process.
  2. Delete the original Win16.Catchme file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Win16.Catchme from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Win16.Catchme!

Check now if your PC is infected with Win16.Catchme

You can buy full version of ExterminateIt at RegNow.com.


Also Be Aware of the Following Threats:
Vxidl.AMS Trojan Removal
Remove Tooncom Downloader
Removing Bancos.GQS Trojan
Pigeon.AVSK Trojan Removal
Why.Windows Trojan Cleaner

Tagasaurus Adware

Tagasaurus malware description and removal detail
Categories:Adware
Also known as:

[Kaspersky]Trojan-Downloader.Win32.VB.tf;
[McAfee]Generic Downloader.a;
[F-Prot]W32/Downloader.KEH;
[Other]W32/DLoader.OVC,Troj/Dloadr-BK,Trojan.Startup.NameShifter.A,enbrowser,Adware:Win32/TagAsaurus

Visible Symptoms:
Files in system folders:
[%DESKTOP%]\SearchUs.exe
[%DESKTOP%]\TagASaurus.exe
[%WINDOWS%]\Gwang.exe
[%WINDOWS%]\Setup90.exe
[%WINDOWS%]\uninst104.exe
[%WINDOWS%]\uni_ehhhh.exe
[%DESKTOP%]\SearchUs.exe
[%DESKTOP%]\TagASaurus.exe
[%WINDOWS%]\g4356cbvy63.exe
[%WINDOWS%]\ms03122656409.exe
[%WINDOWS%]\ms04226564091.exe
[%WINDOWS%]\ms042265640912006.exe
[%WINDOWS%]\ms05265640912.exe
[%WINDOWS%]\ms06656409122.exe
[%WINDOWS%]\sys010912265642006.exe
[%WINDOWS%]\sys02912265640.exe
[%WINDOWS%]\sys09409122656.exe
[%WINDOWS%]\sys094091226562006.exe
[%WINDOWS%]\Tagasuarus2.exe
[%WINDOWS%]\tapeG22.exe
[%WINDOWS%]\uninst1014.exe
[%WINDOWS%]\uni_eh44.exe
[%WINDOWS%]\win3206656409122.exe
[%WINDOWS%]\win3207564091226.exe
[%WINDOWS%]\win32075640912262006.exe
[%WINDOWS%]\win3208640912265.exe
[%DESKTOP%]\SearchUs.exe
[%DESKTOP%]\TagASaurus.exe
[%WINDOWS%]\Gwang.exe
[%WINDOWS%]\Setup90.exe
[%WINDOWS%]\uninst104.exe
[%WINDOWS%]\uni_ehhhh.exe
[%DESKTOP%]\SearchUs.exe
[%DESKTOP%]\TagASaurus.exe
[%WINDOWS%]\g4356cbvy63.exe
[%WINDOWS%]\ms03122656409.exe
[%WINDOWS%]\ms04226564091.exe
[%WINDOWS%]\ms042265640912006.exe
[%WINDOWS%]\ms05265640912.exe
[%WINDOWS%]\ms06656409122.exe
[%WINDOWS%]\sys010912265642006.exe
[%WINDOWS%]\sys02912265640.exe
[%WINDOWS%]\sys09409122656.exe
[%WINDOWS%]\sys094091226562006.exe
[%WINDOWS%]\Tagasuarus2.exe
[%WINDOWS%]\tapeG22.exe
[%WINDOWS%]\uninst1014.exe
[%WINDOWS%]\uni_eh44.exe
[%WINDOWS%]\win3206656409122.exe
[%WINDOWS%]\win3207564091226.exe
[%WINDOWS%]\win32075640912262006.exe
[%WINDOWS%]\win3208640912265.exe

In order to ensure that the Tagasaurus is launched automatically each time the system is booted, the Tagasaurus adds a link to its executable file in the system registry:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
[%DESKTOP%]\SearchUs.exe
[%DESKTOP%]\TagASaurus.exe
[%WINDOWS%]\Gwang.exe
[%WINDOWS%]\Setup90.exe
[%WINDOWS%]\uninst104.exe
[%WINDOWS%]\uni_ehhhh.exe
[%DESKTOP%]\SearchUs.exe
[%DESKTOP%]\TagASaurus.exe
[%WINDOWS%]\g4356cbvy63.exe
[%WINDOWS%]\ms03122656409.exe
[%WINDOWS%]\ms04226564091.exe
[%WINDOWS%]\ms042265640912006.exe
[%WINDOWS%]\ms05265640912.exe
[%WINDOWS%]\ms06656409122.exe
[%WINDOWS%]\sys010912265642006.exe
[%WINDOWS%]\sys02912265640.exe
[%WINDOWS%]\sys09409122656.exe
[%WINDOWS%]\sys094091226562006.exe
[%WINDOWS%]\Tagasuarus2.exe
[%WINDOWS%]\tapeG22.exe
[%WINDOWS%]\uninst1014.exe
[%WINDOWS%]\uni_eh44.exe
[%WINDOWS%]\win3206656409122.exe
[%WINDOWS%]\win3207564091226.exe
[%WINDOWS%]\win32075640912262006.exe
[%WINDOWS%]\win3208640912265.exe

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Detecting Tagasaurus:

Files:
[%DESKTOP%]\SearchUs.exe
[%DESKTOP%]\TagASaurus.exe
[%WINDOWS%]\Gwang.exe
[%WINDOWS%]\Setup90.exe
[%WINDOWS%]\uninst104.exe
[%WINDOWS%]\uni_ehhhh.exe
[%DESKTOP%]\SearchUs.exe
[%DESKTOP%]\TagASaurus.exe
[%WINDOWS%]\g4356cbvy63.exe
[%WINDOWS%]\ms03122656409.exe
[%WINDOWS%]\ms04226564091.exe
[%WINDOWS%]\ms042265640912006.exe
[%WINDOWS%]\ms05265640912.exe
[%WINDOWS%]\ms06656409122.exe
[%WINDOWS%]\sys010912265642006.exe
[%WINDOWS%]\sys02912265640.exe
[%WINDOWS%]\sys09409122656.exe
[%WINDOWS%]\sys094091226562006.exe
[%WINDOWS%]\Tagasuarus2.exe
[%WINDOWS%]\tapeG22.exe
[%WINDOWS%]\uninst1014.exe
[%WINDOWS%]\uni_eh44.exe
[%WINDOWS%]\win3206656409122.exe
[%WINDOWS%]\win3207564091226.exe
[%WINDOWS%]\win32075640912262006.exe
[%WINDOWS%]\win3208640912265.exe
[%DESKTOP%]\SearchUs.exe
[%DESKTOP%]\TagASaurus.exe
[%WINDOWS%]\Gwang.exe
[%WINDOWS%]\Setup90.exe
[%WINDOWS%]\uninst104.exe
[%WINDOWS%]\uni_ehhhh.exe
[%DESKTOP%]\SearchUs.exe
[%DESKTOP%]\TagASaurus.exe
[%WINDOWS%]\g4356cbvy63.exe
[%WINDOWS%]\ms03122656409.exe
[%WINDOWS%]\ms04226564091.exe
[%WINDOWS%]\ms042265640912006.exe
[%WINDOWS%]\ms05265640912.exe
[%WINDOWS%]\ms06656409122.exe
[%WINDOWS%]\sys010912265642006.exe
[%WINDOWS%]\sys02912265640.exe
[%WINDOWS%]\sys09409122656.exe
[%WINDOWS%]\sys094091226562006.exe
[%WINDOWS%]\Tagasuarus2.exe
[%WINDOWS%]\tapeG22.exe
[%WINDOWS%]\uninst1014.exe
[%WINDOWS%]\uni_eh44.exe
[%WINDOWS%]\win3206656409122.exe
[%WINDOWS%]\win3207564091226.exe
[%WINDOWS%]\win32075640912262006.exe
[%WINDOWS%]\win3208640912265.exe

Registry Keys:
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system\sysold

Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\main
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\main
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system
HKEY_LOCAL_MACHINE\software\system

Removing Tagasaurus:

An up-to-date copy of ExterminateIt should detect and prevent infection from Tagasaurus.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Tagasaurus manually.

To completely manually remove Tagasaurus malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Tagasaurus.

  1. Use Task Manager to terminate the Tagasaurus process.
  2. Delete the original Tagasaurus file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Tagasaurus from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Tagasaurus!

Check now if your PC is infected with Tagasaurus

You can buy full version of ExterminateIt at RegNow.com.


Also Be Aware of the Following Threats:
Removing AdMoke Adware
Spambot Trojan Information
Removing net.revenue.net Tracking Cookie
Vxidl.AZR Trojan Information
Removing Bancos.FWM Trojan

BackDoor.AUP Trojan

BackDoor.AUP malware description and removal detail
Categories:Trojan
Also known as:

[Kaspersky]Backdoor.Lemerul.20.d;
[McAfee]BackDoor-AUP;
[F-Prot]security risk or a "backdoor" program

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing BackDoor.AUP:

An up-to-date copy of ExterminateIt should detect and prevent infection from BackDoor.AUP.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove BackDoor.AUP manually.

To completely manually remove BackDoor.AUP malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with BackDoor.AUP.

  1. Use Task Manager to terminate the BackDoor.AUP process.
  2. Delete the original BackDoor.AUP file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes BackDoor.AUP from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of BackDoor.AUP!

Check now if your PC is infected with BackDoor.AUP

You can buy full version of ExterminateIt at RegNow.com.


Also Be Aware of the Following Threats:
Removing Win32.EyeBlu Trojan
Removing Tooncom Downloader
Zomby Backdoor Information
HLLP.PePe Trojan Cleaner
Remove AlLight Trojan

Pass Trojan

Pass malware description and removal detail
Categories:Trojan,Hacker Tool

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Pass:

An up-to-date copy of ExterminateIt should detect and prevent infection from Pass.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Pass manually.

To completely manually remove Pass malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pass.

  1. Use Task Manager to terminate the Pass process.
  2. Delete the original Pass file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Pass from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Pass!

Check now if your PC is infected with Pass

You can buy full version of ExterminateIt at RegNow.com.


Also Be Aware of the Following Threats:
Remove ItEye RAT
Win32.Kaizer Downloader Removal instruction
Hupigon.mk Backdoor Cleaner
Removing Breath2001 Trojan
Removing EUPM Trojan

Tooncom Downloader

Tooncom malware description and removal detail
Categories:Downloader

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Tooncom:

An up-to-date copy of ExterminateIt should detect and prevent infection from Tooncom.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Tooncom manually.

To completely manually remove Tooncom malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Tooncom.

  1. Use Task Manager to terminate the Tooncom process.
  2. Delete the original Tooncom file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Tooncom from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Tooncom!

Check now if your PC is infected with Tooncom

You can buy full version of ExterminateIt at RegNow.com.


Also Be Aware of the Following Threats:
Basic Trojan Removal instruction
Removing Pigeon.BBL Trojan
Remove Vxidl.AQK Trojan
Eixes Trojan Information
Ecoli Trojan Cleaner

Crypto Trojan

Crypto malware description and removal detail
Categories:Trojan,Backdoor,Downloader,DoS
Also known as:

[Kaspersky]Win32.Crypto;
[McAfee]W32/Crypto;
[F-Prot]W32/Crypto.20220;
[Panda]W32/Crypto;
[Computer Associates]Win32.Crypto.20220

Platforms / OS: Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista

Removing Crypto:

An up-to-date copy of ExterminateIt should detect and prevent infection from Crypto.

If you do not have ExterminateIt and you are worried that you may have infected computer, you could run trial version of ExterminateIt, or remove Crypto manually.

To completely manually remove Crypto malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Crypto.

  1. Use Task Manager to terminate the Crypto process.
  2. Delete the original Crypto file and folders.
  3. Delete the system registry key parameters
  4. Update your antivirus databases or buy antivirus software and perform a full scan of the computer.

We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources.


ExterminateIt effectively and automatically removes Crypto from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware).

Download ExterminateIt! to instantly get rid of Crypto!

Check now if your PC is infected with Crypto

You can buy full version of ExterminateIt at RegNow.com.


Also Be Aware of the Following Threats:
Black.Dream Backdoor Information
Remove TrojanDropper.Win32.Small.cy Trojan
Iflar Trojan Cleaner
DNSChanger Trojan Removal
Removing HostDoor Trojan