tag:blogger.com,1999:blog-47850158331916641552024-03-13T12:22:36.453-07:00How To Remove VirusHow To Remove virus, trojan and malware from you computer. Tips and Tricks.Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.comBlogger3257125tag:blogger.com,1999:blog-4785015833191664155.post-34417895242561209782009-02-04T01:34:00.001-08:002009-02-04T01:34:42.363-08:00Reign TrojanReign malware description and removal detail<br/><strong>Categories:</strong>Trojan,Spyware,Backdoor,Downloader,Hacker Tool<br/><string>Also known as:</strong><br/><code><br/>[Panda]Trojan Horse,Trj/Agent.AA,Trj/Iyus.B,Trj/Iyus.F,Trj/Iyus.C,Trj/Bizex.B,Bck/Xordoor.A;<br/>[Computer Associates]Win32.Reign.K,Win32/Reign.K!Trojan,Win32/Reign.K!HookDLL!Trojan,Win32.Reign.O,Win32/Reign.O!Trojan,Win32.Reign.N,Win32/Reign.N!Trojan,Win32.Reign.Z,Win32/Reign!DLL.102400!Trojan,Win32/Reign.Z!Worm,Win32.Reign.X,Win32/Reign.X!Trojan</code><br/><strong>Visible Symptoms:</strong> <br/>Files in system folders:<CODE> <br/>[%SYSTEM%]\iyus.dll<br/>[%SYSTEM%]\iyus\ampgbbje.exe<br/>[%SYSTEM%]\iyus\foimeobm.exe<br/>[%SYSTEM%]\iyus\hqejkanf.exe<br/>[%SYSTEM%]\unic2_32.dll<br/>[%SYSTEM%]\x3yy\dbkajomk.exe<br/>[%SYSTEM%]\xor\svchost.exe<br/>[%SYSTEM%]\iyus.dll<br/>[%SYSTEM%]\iyus\ampgbbje.exe<br/>[%SYSTEM%]\iyus\foimeobm.exe<br/>[%SYSTEM%]\iyus\hqejkanf.exe<br/>[%SYSTEM%]\unic2_32.dll<br/>[%SYSTEM%]\x3yy\dbkajomk.exe<br/>[%SYSTEM%]\xor\svchost.exe </CODE> <p>In order to ensure that the Reign is launched automatically each time the system is booted, the Reign adds a link to its executable file in the system registry: <br/><code>HKLM\Software\Microsoft\Windows\CurrentVersion\Run <br/>[%SYSTEM%]\iyus\ampgbbje.exe<br/>[%SYSTEM%]\iyus\foimeobm.exe<br/>[%SYSTEM%]\iyus\hqejkanf.exe<br/>[%SYSTEM%]\x3yy\dbkajomk.exe<br/>[%SYSTEM%]\xor\svchost.exe <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p><h2>Detecting Reign:</h2></p> <p><strong>Files:</strong> <CODE> <br/>[%SYSTEM%]\iyus.dll<br/>[%SYSTEM%]\iyus\ampgbbje.exe<br/>[%SYSTEM%]\iyus\foimeobm.exe<br/>[%SYSTEM%]\iyus\hqejkanf.exe<br/>[%SYSTEM%]\unic2_32.dll<br/>[%SYSTEM%]\x3yy\dbkajomk.exe<br/>[%SYSTEM%]\xor\svchost.exe<br/>[%SYSTEM%]\iyus.dll<br/>[%SYSTEM%]\iyus\ampgbbje.exe<br/>[%SYSTEM%]\iyus\foimeobm.exe<br/>[%SYSTEM%]\iyus\hqejkanf.exe<br/>[%SYSTEM%]\unic2_32.dll<br/>[%SYSTEM%]\x3yy\dbkajomk.exe<br/>[%SYSTEM%]\xor\svchost.exe </CODE> </p> <p><strong>Registry Values:</strong> <CODE> <br/>HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run </CODE> </p> <p> <h2>Removing Reign:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>Reign</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove Reign manually</strong>.</p><p> To completely manually remove Reign malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Reign.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the Reign process.</li> <li> Delete the original Reign file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes Reign from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of Reign! </p> <p> Check now if your PC is infected with Reign </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://trojanpedia-infections-keylogger.blogspot.com/2009/01/wmnikita-trojan.html">Removing WM.Nikita Trojan</a><br/><a href="http://trojan-list-87.blogspot.com/2009/02/taintedbot-dos.html">Remove Tainted.Bot DoS</a><br/><a href="http://viruslist-c.blogspot.com/2009/01/bancosgst-trojan.html">Bancos.GST Trojan Removal instruction</a><br/><a href="http://trojan-list-65.blogspot.com/2009/01/vbsvbswgjmm-trojan.html">VBS.VBSWG.J@mm Trojan Information</a><br/><a href="http://trojan-list-24.blogspot.com/2009/01/sillydlcyi-trojan.html">SillyDl.CYI Trojan Cleaner</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-90498436719734412662009-02-04T01:00:00.001-08:002009-02-04T01:00:04.258-08:00Bancos.GKY TrojanBancos.GKY malware description and removal detail<br/><strong>Categories:</strong>Trojan <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p> <h2>Removing Bancos.GKY:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>Bancos.GKY</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove Bancos.GKY manually</strong>.</p><p> To completely manually remove Bancos.GKY malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.GKY.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the Bancos.GKY process.</li> <li> Delete the original Bancos.GKY file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes Bancos.GKY from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of Bancos.GKY! </p> <p> Check now if your PC is infected with Bancos.GKY </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://trojan-list-88.blogspot.com/2009/01/usbroot-trojan.html">USBroot Trojan Removal</a><br/><a href="http://trojan-list-87.blogspot.com/2009/01/xcrush-trojan.html">Xcrush Trojan Symptoms</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-36113621164581340832009-02-04T00:01:00.001-08:002009-02-04T00:01:56.029-08:00SillyDl.CEK TrojanSillyDl.CEK malware description and removal detail<br/><strong>Categories:</strong>Trojan <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p> <h2>Removing SillyDl.CEK:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>SillyDl.CEK</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove SillyDl.CEK manually</strong>.</p><p> To completely manually remove SillyDl.CEK malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SillyDl.CEK.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the SillyDl.CEK process.</li> <li> Delete the original SillyDl.CEK file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes SillyDl.CEK from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of SillyDl.CEK! </p> <p> Check now if your PC is infected with SillyDl.CEK </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://trojan-list-37.blogspot.com/2009/01/stealthshutdown-trojan.html">Stealth.Shutdown Trojan Removal instruction</a><br/><a href="http://howto-remove-virus.blogspot.com/2009/02/donalddick-trojan.html">DonaldDick Trojan Information</a><br/><a href="http://information-details-removal.blogspot.com/2009/01/pigeonaji-trojan.html">Pigeon.AJI Trojan Removal</a><br/><a href="http://trojan-list-93.blogspot.com/2009/01/win32killlavan-trojan.html">Win32.Killlav.an Trojan Removal instruction</a><br/><a href="http://trojan-list-49.blogspot.com/2009/02/qwinserver-trojan.html">Qwin.Server Trojan Removal</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-19361939057531115582009-02-03T23:51:00.001-08:002009-02-03T23:51:38.631-08:00SillyDl.CBR TrojanSillyDl.CBR malware description and removal detail<br/><strong>Categories:</strong>Trojan <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p> <h2>Removing SillyDl.CBR:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>SillyDl.CBR</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove SillyDl.CBR manually</strong>.</p><p> To completely manually remove SillyDl.CBR malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SillyDl.CBR.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the SillyDl.CBR process.</li> <li> Delete the original SillyDl.CBR file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes SillyDl.CBR from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of SillyDl.CBR! </p> <p> Check now if your PC is infected with SillyDl.CBR </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://trojan-list-90.blogspot.com/2009/01/shopforgood-adware.html">ShopForGood Adware Symptoms</a><br/><a href="http://virusinfo-4713.blogspot.com/2009/01/trojandownloaderwin32tooncom-trojan.html">TrojanDownloader.Win32.Tooncom Trojan Symptoms</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-11155888060255132009-02-03T21:17:00.001-08:002009-02-03T21:17:19.079-08:00WinTools AdwareWinTools malware description and removal detail<br/><strong>Categories:</strong>Adware<br/><strong>Visible Symptoms:</strong> <br/>Files in system folders:<CODE> <br/>[%PROGRAM_FILES_COMMON%]\WinTools\WSup.exe<br/>[%PROGRAM_FILES_COMMON%]\WinTools\WToolsA.exe<br/>[%PROGRAM_FILES_COMMON%]\WinTools\WToolsB.dll<br/>[%PROFILE_TEMP%]\tb_setup.exe<br/>[%PROGRAM_FILES_COMMON%]\WinTools\WSup.exe<br/>[%PROGRAM_FILES_COMMON%]\WinTools\WToolsA.exe<br/>[%PROGRAM_FILES_COMMON%]\WinTools\WToolsB.dll<br/>[%PROFILE_TEMP%]\tb_setup.exe </CODE> <p>In order to ensure that the WinTools is launched automatically each time the system is booted, the WinTools adds a link to its executable file in the system registry: <br/><code>HKLM\Software\Microsoft\Windows\CurrentVersion\Run <br/>[%PROGRAM_FILES_COMMON%]\WinTools\WSup.exe<br/>[%PROGRAM_FILES_COMMON%]\WinTools\WToolsA.exe<br/>[%PROFILE_TEMP%]\tb_setup.exe <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p><h2>Detecting WinTools:</h2></p> <p><strong>Files:</strong> <CODE> <br/>[%PROGRAM_FILES_COMMON%]\WinTools\WSup.exe<br/>[%PROGRAM_FILES_COMMON%]\WinTools\WToolsA.exe<br/>[%PROGRAM_FILES_COMMON%]\WinTools\WToolsB.dll<br/>[%PROFILE_TEMP%]\tb_setup.exe<br/>[%PROGRAM_FILES_COMMON%]\WinTools\WSup.exe<br/>[%PROGRAM_FILES_COMMON%]\WinTools\WToolsA.exe<br/>[%PROGRAM_FILES_COMMON%]\WinTools\WToolsB.dll<br/>[%PROFILE_TEMP%]\tb_setup.exe </CODE> </p> <p><strong>Registry Keys:</strong> <CODE> <br/>HKEY_CLASSES_ROOT\clsid\{87067f04-de4c-4688-bc3c-4fcf39d609e7}<br/>HKEY_CLASSES_ROOT\CLSID\{87766247-311C-43B4-8499-3D5FEC94A183}<br/>HKEY_CLASSES_ROOT\clsid\{a8deb4a5-d9ef-4d21-b4f6-921475004e7d}<br/>HKEY_CLASSES_ROOT\wtoolsb.resprotocol<br/>HKEY_CURRENT_USER\software\wintools<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\wintools<br/>HKEY_LOCAL_MACHINE\software\wintools<br/>HKEY_LOCAL_MACHINE\system\currentcontrolset\services\wintoolssvc<br/>HKEY_CLASSES_ROOT\clsid\{87766247-311c-43b4-8499-3d5fec94a183}<br/>HKEY_CLASSES_ROOT\wsg.wsgobj </CODE> </p> <p><strong>Registry Values:</strong> <CODE> <br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata<br/>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run<br/>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run<br/>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices<br/>HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservicesonce </CODE> </p> <p> <h2>Removing WinTools:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>WinTools</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove WinTools manually</strong>.</p><p> To completely manually remove WinTools malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with WinTools.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the WinTools process.</li> <li> Delete the original WinTools file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes WinTools from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of WinTools! </p> <p> Check now if your PC is infected with WinTools </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://trojan-list-87.blogspot.com/2009/01/funlovedr-trojan.html">FunLove.dr Trojan Information</a><br/><a href="http://trojan-list-55.blogspot.com/2009/01/pigeonavaf-trojan.html">Pigeon.AVAF Trojan Symptoms</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-23740837599018704772009-02-03T19:17:00.001-08:002009-02-03T19:17:46.737-08:00Pigeon.EQV TrojanPigeon.EQV malware description and removal detail<br/><strong>Categories:</strong>Trojan <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p> <h2>Removing Pigeon.EQV:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>Pigeon.EQV</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove Pigeon.EQV manually</strong>.</p><p> To completely manually remove Pigeon.EQV malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.EQV.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the Pigeon.EQV process.</li> <li> Delete the original Pigeon.EQV file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes Pigeon.EQV from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of Pigeon.EQV! </p> <p> Check now if your PC is infected with Pigeon.EQV </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://trojan-list-32.blogspot.com/2009/01/turtle-backdoor.html">Turtle Backdoor Symptoms</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-33249259947136679132009-02-03T18:51:00.001-08:002009-02-03T18:51:57.572-08:00SillyDl.CRO TrojanSillyDl.CRO malware description and removal detail<br/><strong>Categories:</strong>Trojan <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p> <h2>Removing SillyDl.CRO:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>SillyDl.CRO</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove SillyDl.CRO manually</strong>.</p><p> To completely manually remove SillyDl.CRO malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SillyDl.CRO.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the SillyDl.CRO process.</li> <li> Delete the original SillyDl.CRO file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes SillyDl.CRO from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of SillyDl.CRO! </p> <p> Check now if your PC is infected with SillyDl.CRO </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://trojan-list-78.blogspot.com/2009/01/ancli-downloader.html">Ancli Downloader Removal</a><br/><a href="http://trojan-list-36.blogspot.com/2009/01/krusvex-trojan.html">Remove Krusvex Trojan</a><br/><a href="http://remove-listing-pc.blogspot.com/2009/01/msgghost-trojan.html">MsgGhost Trojan Symptoms</a><br/><a href="http://trojan-list-54.blogspot.com/2009/01/sillydlctr-trojan.html">SillyDl.CTR Trojan Removal instruction</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com1tag:blogger.com,1999:blog-4785015833191664155.post-43573308517894378092009-02-03T18:00:00.001-08:002009-02-03T18:00:27.820-08:00SillyDl.CYV TrojanSillyDl.CYV malware description and removal detail<br/><strong>Categories:</strong>Trojan<br/><string>Also known as:</strong><br/><code><br/>[Kaspersky]Trojan-Downloader.Win32.Vb.aya;<br/>[Other]Win32/SillyDl.CYV</code><br/><strong>Visible Symptoms:</strong> <br/>Files in system folders:<CODE> <br/>[%PROFILE_TEMP%]\poolsv.exe<br/>[%WINDOWS%]\poolsv.exe<br/>[%PROFILE_TEMP%]\poolsv.exe<br/>[%WINDOWS%]\poolsv.exe </CODE> <p>In order to ensure that the SillyDl.CYV is launched automatically each time the system is booted, the SillyDl.CYV adds a link to its executable file in the system registry: <br/><code>HKLM\Software\Microsoft\Windows\CurrentVersion\Run <br/>[%PROFILE_TEMP%]\poolsv.exe<br/>[%WINDOWS%]\poolsv.exe <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p><h2>Detecting SillyDl.CYV:</h2></p> <p><strong>Files:</strong> <CODE> <br/>[%PROFILE_TEMP%]\poolsv.exe<br/>[%WINDOWS%]\poolsv.exe<br/>[%PROFILE_TEMP%]\poolsv.exe<br/>[%WINDOWS%]\poolsv.exe </CODE> </p> <p><strong>Registry Values:</strong> <CODE> <br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run </CODE> </p> <p> <h2>Removing SillyDl.CYV:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>SillyDl.CYV</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove SillyDl.CYV manually</strong>.</p><p> To completely manually remove SillyDl.CYV malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SillyDl.CYV.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the SillyDl.CYV process.</li> <li> Delete the original SillyDl.CYV file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes SillyDl.CYV from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of SillyDl.CYV! </p> <p> Check now if your PC is infected with SillyDl.CYV </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://trojan-list-45.blogspot.com/2009/01/subroot12server-backdoor.html">Subroot.12!Server Backdoor Removal instruction</a><br/><a href="http://trojan-list-48.blogspot.com/2009/01/antilamerlight-trojan.html">AntiLamer.Light Trojan Cleaner</a><br/><a href="http://virusinfo-1008.blogspot.com/2009/01/lomdoor-backdoor.html">Lomdoor Backdoor Symptoms</a><br/><a href="http://trojan-list-26.blogspot.com/2009/01/batbtg-trojan.html">Removing Bat.btg Trojan</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-52101086855779773452009-02-03T17:34:00.001-08:002009-02-03T17:34:00.073-08:00CWS.MSTaskm HijackerCWS.MSTaskm malware description and removal detail<br/><strong>Categories:</strong>Hijacker <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p> <h2>Removing CWS.MSTaskm:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>CWS.MSTaskm</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove CWS.MSTaskm manually</strong>.</p><p> To completely manually remove CWS.MSTaskm malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with CWS.MSTaskm.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the CWS.MSTaskm process.</li> <li> Delete the original CWS.MSTaskm file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes CWS.MSTaskm from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of CWS.MSTaskm! </p> <p> Check now if your PC is infected with CWS.MSTaskm </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://trojan-list-62.blogspot.com/2009/01/bancosgut-trojan.html">Bancos.GUT Trojan Cleaner</a><br/><a href="http://trojan-list-13.blogspot.com/2009/02/sillydldmm-trojan.html">SillyDl.DMM Trojan Symptoms</a><br/><a href="http://trojan-malwarepedia-info.blogspot.com/2009/01/gfg-trojan.html">GFG Trojan Symptoms</a><br/><a href="http://trojan-list-68.blogspot.com/2009/01/nobof-trojan.html">Nobof Trojan Cleaner</a><br/><a href="http://trojan-list-87.blogspot.com/2009/02/minioblivion-backdoor.html">Removing Mini.Oblivion Backdoor</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-33162528029923057682009-02-03T17:16:00.001-08:002009-02-03T17:16:55.960-08:00Willow TrojanWillow malware description and removal detail<br/><strong>Categories:</strong>Trojan,Backdoor,Downloader,DoS<br/><string>Also known as:</strong><br/><code><br/>[Eset]Willow.1870 virus,Willow.2013 virus;<br/>[McAfee]Willow;<br/>[Computer Associates]Willow</code> <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p> <h2>Removing Willow:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>Willow</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove Willow manually</strong>.</p><p> To completely manually remove Willow malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Willow.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the Willow process.</li> <li> Delete the original Willow file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes Willow from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of Willow! </p> <p> Check now if your PC is infected with Willow </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://trojan-list-05.blogspot.com/2009/01/arcvmore-trojan.html">Arcv.More Trojan Cleaner</a><br/><a href="http://trojan-list-63.blogspot.com/2009/01/sillydlbzq-trojan.html">Remove SillyDl.BZQ Trojan</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-24853311433517053292009-02-03T16:50:00.001-08:002009-02-03T16:50:48.838-08:00Priosted TrojanPriosted malware description and removal detail<br/><strong>Categories:</strong>Trojan <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p> <h2>Removing Priosted:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>Priosted</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove Priosted manually</strong>.</p><p> To completely manually remove Priosted malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Priosted.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the Priosted process.</li> <li> Delete the original Priosted file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes Priosted from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of Priosted! </p> <p> Check now if your PC is infected with Priosted </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://trojan-list-42.blogspot.com/2009/01/bancoshqf-trojan.html">Bancos.HQF Trojan Information</a><br/><a href="http://virusinfo-1005.blogspot.com/2009/02/bestpics-trojan.html">Remove BestPics Trojan</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-79886125841437351162009-02-03T14:33:00.001-08:002009-02-03T14:33:27.802-08:00Asterz WormAsterz malware description and removal detail<br/><strong>Categories:</strong>Worm,DoS<br/><string>Also known as:</strong><br/><code><br/>[Kaspersky]Worm.P2P.VB.a;<br/>[Panda]W32/Zaka;<br/>[Computer Associates]Win32.Asterz,Win32/VB.A!P2P!Worm</code> <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p> <h2>Removing Asterz:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>Asterz</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove Asterz manually</strong>.</p><p> To completely manually remove Asterz malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Asterz.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the Asterz process.</li> <li> Delete the original Asterz file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes Asterz from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of Asterz! </p> <p> Check now if your PC is infected with Asterz </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://virusinfo-3520.blogspot.com/2009/01/sillydlcjj-trojan.html">SillyDl.CJJ Trojan Removal</a><br/><a href="http://trojan-list-70.blogspot.com/2009/01/bancosgsq-trojan.html">Bancos.GSQ Trojan Cleaner</a><br/><a href="http://trojan-list-57.blogspot.com/2009/01/koreandoumi-adware.html">KoreanDoumi Adware Removal instruction</a><br/><a href="http://trojan-list-11.blogspot.com/2009/02/sillydlcug-trojan.html">Remove SillyDl.CUG Trojan</a><br/><a href="http://trojan-list-02.blogspot.com/2009/01/anlept-trojan.html">Anlept Trojan Cleaner</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-80065439636722936192009-02-03T14:00:00.001-08:002009-02-03T14:00:04.934-08:00Ratinin TrojanRatinin malware description and removal detail<br/><strong>Categories:</strong>Trojan<br/><string>Also known as:</strong><br/><code><br/>[Kaspersky]Trojan-PSW.Win32.Lmir.aip;<br/>[F-Prot]W32/PWStealer.MWT;<br/>[Other]Win32/Ratinin.H,W32/Lmir.IFL,Infostealer.Multigame,Troj/PWS-ANB</code> <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p> <h2>Removing Ratinin:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>Ratinin</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove Ratinin manually</strong>.</p><p> To completely manually remove Ratinin malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Ratinin.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the Ratinin process.</li> <li> Delete the original Ratinin file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes Ratinin from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of Ratinin! </p> <p> Check now if your PC is infected with Ratinin </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://virusinfo-3403.blogspot.com/2009/01/sillydldib-downloader.html">SillyDl.DIB Downloader Information</a><br/><a href="http://trojan-list-52.blogspot.com/2009/02/lufoure-trojan.html">Lufoure Trojan Removal instruction</a><br/><a href="http://computer-protect-virus.blogspot.com/2009/01/pigeonavug-trojan.html">Remove Pigeon.AVUG Trojan</a><br/><a href="http://trojan-list-67.blogspot.com/2009/01/javaredbrowser-trojan.html">Java.RedBrowser Trojan Information</a><br/><a href="http://virusinfo-2501.blogspot.com/2009/02/rmf-backdoor.html">RMF Backdoor Information</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-74983123170542064132009-02-03T13:17:00.001-08:002009-02-03T13:17:16.855-08:00Moses BackdoorMoses malware description and removal detail<br/><strong>Categories:</strong>Backdoor,RAT<br/><string>Also known as:</strong><br/><code><br/>[Kaspersky]Backdoor.Moses.115,Backdoor.Win32.Moses.115;<br/>[McAfee]BackDoor-PA;<br/>[F-Prot]security risk or a "backdoor" program;<br/>[Panda]Bck/Moses.115;<br/>[Computer Associates]Win32.Moses.115,Backdoor/Moses.115,Backdoor/Moses.115!Installer</code><br/><strong>Visible Symptoms:</strong> <br/>Files in system folders:<CODE> <br/>[%WINDOWS%]\system\userprof.dll<br/>[%WINDOWS%]\system\userprof.dll </CODE> <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p><h2>Detecting Moses:</h2></p> <p><strong>Files:</strong> <CODE> <br/>[%WINDOWS%]\system\userprof.dll<br/>[%WINDOWS%]\system\userprof.dll </CODE> </p> <p> <h2>Removing Moses:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>Moses</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove Moses manually</strong>.</p><p> To completely manually remove Moses malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Moses.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the Moses process.</li> <li> Delete the original Moses file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes Moses from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of Moses! </p> <p> Check now if your PC is infected with Moses </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://trojan-list-18.blogspot.com/2009/01/pwsalgus-trojan.html">Remove PWS.Algus Trojan</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-2101011937229538952009-02-03T12:02:00.001-08:002009-02-03T12:02:01.994-08:00Beovens.El TrojanBeovens.El malware description and removal detail<br/><strong>Categories:</strong>Trojan <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p> <h2>Removing Beovens.El:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>Beovens.El</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove Beovens.El manually</strong>.</p><p> To completely manually remove Beovens.El malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Beovens.El.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the Beovens.El process.</li> <li> Delete the original Beovens.El file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes Beovens.El from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of Beovens.El! </p> <p> Check now if your PC is infected with Beovens.El </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://virusinfo-0444.blogspot.com/2009/01/startpagegu-hijacker.html">StartPage.gu Hijacker Cleaner</a><br/><a href="http://trojan-list-71.blogspot.com/2009/01/netscope-hostile-code.html">Netscope Hostile Code Removal</a><br/><a href="http://computer-protect-virus.blogspot.com/2009/01/bancoshhb-trojan.html">Remove Bancos.HHB Trojan</a><br/><a href="http://trojan-list-57.blogspot.com/2009/01/stealthwebpagerecorder-spyware.html">Stealth.Web.Page.Recorder Spyware Removal</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-10706077192138625792009-02-03T11:34:00.001-08:002009-02-03T11:34:00.462-08:00Second.Sight SpywareSecond.Sight malware description and removal detail<br/><strong>Categories:</strong>Spyware<br/><strong>Visible Symptoms:</strong> <br/>Files in system folders:<CODE> <br/>[%SYSTEM%]\KMON.OCX<br/>[%SYSTEM%]\KTKBDHK3.DLL<br/>[%SYSTEM%]\KMON.OCX<br/>[%SYSTEM%]\KTKBDHK3.DLL </CODE> <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p><h2>Detecting Second.Sight:</h2></p> <p><strong>Files:</strong> <CODE> <br/>[%SYSTEM%]\KMON.OCX<br/>[%SYSTEM%]\KTKBDHK3.DLL<br/>[%SYSTEM%]\KMON.OCX<br/>[%SYSTEM%]\KTKBDHK3.DLL </CODE> </p> <p> <h2>Removing Second.Sight:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>Second.Sight</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove Second.Sight manually</strong>.</p><p> To completely manually remove Second.Sight malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Second.Sight.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the Second.Sight process.</li> <li> Delete the original Second.Sight file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes Second.Sight from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of Second.Sight! </p> <p> Check now if your PC is infected with Second.Sight </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://trojan-list-22.blogspot.com/2009/01/win32cws-downloader.html">Remove Win32.CWS Downloader</a><br/><a href="http://trojan-list-90.blogspot.com/2009/01/vxidlaks-trojan.html">Vxidl.AKS Trojan Removal</a><br/><a href="http://trojan-list-58.blogspot.com/2009/01/seekmo-adware.html">Seekmo Adware Information</a><br/><a href="http://trojan-list-39.blogspot.com/2009/01/irs97crk-trojan.html">Remove Irs97crk Trojan</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-39061122207922641392009-02-03T09:02:00.001-08:002009-02-03T09:02:25.956-08:00No5 TrojanNo5 malware description and removal detail<br/><strong>Categories:</strong>Trojan <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p> <h2>Removing No5:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>No5</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove No5 manually</strong>.</p><p> To completely manually remove No5 malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with No5.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the No5 process.</li> <li> Delete the original No5 file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes No5 from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of No5! </p> <p> Check now if your PC is infected with No5 </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://trojan-list-37.blogspot.com/2009/01/pigeonavtv-trojan.html">Pigeon.AVTV Trojan Removal</a><br/><a href="http://virusinfo-0010.blogspot.com/2009/02/vxidlaex-trojan.html">Vxidl.AEX Trojan Removal</a><br/><a href="http://spyware-list-infections.blogspot.com/2009/01/uploader0b4-trojan.html">Uploader.0b4 Trojan Removal instruction</a><br/><a href="http://trojan-list-77.blogspot.com/2009/01/kim-spyware.html">KIM Spyware Removal instruction</a><br/><a href="http://viruslist-viruspedia-list.blogspot.com/2009/01/bancosgor-trojan.html">Bancos.GOR Trojan Symptoms</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-14439708254344427882009-02-03T08:51:00.001-08:002009-02-03T08:51:24.963-08:00IGMP.Krust DoSIGMP.Krust malware description and removal detail<br/><strong>Categories:</strong>DoS<br/><string>Also known as:</strong><br/><code><br/>[Panda]DoS/IGMP.Krust.12;<br/>[Computer Associates]Win32/IGMP.Krust.12.DoS!Trojan</code> <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p> <h2>Removing IGMP.Krust:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>IGMP.Krust</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove IGMP.Krust manually</strong>.</p><p> To completely manually remove IGMP.Krust malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with IGMP.Krust.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the IGMP.Krust process.</li> <li> Delete the original IGMP.Krust file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes IGMP.Krust from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of IGMP.Krust! </p> <p> Check now if your PC is infected with IGMP.Krust </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://virusinfo-3715.blogspot.com/2009/02/vbskarmahotel-trojan.html">Remove VBS.Karmahotel Trojan</a><br/><a href="http://trojan-list-23.blogspot.com/2009/02/exebug-trojan.html">ExeBug Trojan Removal instruction</a><br/><a href="http://virusinfo-4516.blogspot.com/2009/01/taiwan-trojan.html">Taiwan Trojan Information</a><br/><a href="http://protection-protect-details.blogspot.com/2009/01/bancoshbd-trojan.html">Bancos.HBD Trojan Information</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-29448413384153692962009-02-03T08:34:00.001-08:002009-02-03T08:34:22.718-08:00Spabot.x TrojanSpabot.x malware description and removal detail<br/><strong>Categories:</strong>Trojan<br/><strong>Visible Symptoms:</strong> <br/>Files in system folders:<CODE> <br/>[%SYSTEM%]\spoolsvv.exe<br/>[%SYSTEM%]\spoolsvv.exe </CODE> <p>In order to ensure that the Spabot.x is launched automatically each time the system is booted, the Spabot.x adds a link to its executable file in the system registry: <br/><code>HKLM\Software\Microsoft\Windows\CurrentVersion\Run <br/>[%SYSTEM%]\spoolsvv.exe <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p><h2>Detecting Spabot.x:</h2></p> <p><strong>Files:</strong> <CODE> <br/>[%SYSTEM%]\spoolsvv.exe<br/>[%SYSTEM%]\spoolsvv.exe </CODE> </p> <p><strong>Registry Values:</strong> <CODE> <br/>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run </CODE> </p> <p> <h2>Removing Spabot.x:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>Spabot.x</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove Spabot.x manually</strong>.</p><p> To completely manually remove Spabot.x malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Spabot.x.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the Spabot.x process.</li> <li> Delete the original Spabot.x file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes Spabot.x from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of Spabot.x! </p> <p> Check now if your PC is infected with Spabot.x </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://viruslist-malware-infections.blogspot.com/2009/02/istbarep-downloader.html">IstBar.ep Downloader Cleaner</a><br/><a href="http://virusinfo-0108.blogspot.com/2009/01/sympatico-tracking-cookie.html">Sympatico Tracking Cookie Cleaner</a><br/><a href="http://trojan-list-10.blogspot.com/2009/02/blat-dos.html">Blat DoS Symptoms</a><br/><a href="http://trojan-list-10.blogspot.com/2009/01/pswlmirei-trojan.html">PSW.Lmir.ei Trojan Information</a><br/><a href="http://trojan-list-48.blogspot.com/2009/01/backdoorlitmus203server-backdoor.html">Removing Backdoor.Litmus.203!Server Backdoor</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-42268388529396507092009-02-03T08:19:00.001-08:002009-02-03T08:19:44.221-08:00ChatBlocker SpywareChatBlocker malware description and removal detail<br/><strong>Categories:</strong>Spyware<br/><strong>Visible Symptoms:</strong> <br/>Files in system folders:<CODE> <br/>[%WINDOWS%]\cbconfig.dat<br/>[%WINDOWS%]\cblog.dat<br/>[%WINDOWS%]\cbmsg.dat<br/>[%WINDOWS%]\cbphook.dll<br/>[%WINDOWS%]\cbsys32.dll<br/>[%WINDOWS%]\cbtril32.dll<br/>[%WINDOWS%]\cbconfig.dat<br/>[%WINDOWS%]\cblog.dat<br/>[%WINDOWS%]\cbmsg.dat<br/>[%WINDOWS%]\cbphook.dll<br/>[%WINDOWS%]\cbsys32.dll<br/>[%WINDOWS%]\cbtril32.dll </CODE> <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p><h2>Detecting ChatBlocker:</h2></p> <p><strong>Files:</strong> <CODE> <br/>[%WINDOWS%]\cbconfig.dat<br/>[%WINDOWS%]\cblog.dat<br/>[%WINDOWS%]\cbmsg.dat<br/>[%WINDOWS%]\cbphook.dll<br/>[%WINDOWS%]\cbsys32.dll<br/>[%WINDOWS%]\cbtril32.dll<br/>[%WINDOWS%]\cbconfig.dat<br/>[%WINDOWS%]\cblog.dat<br/>[%WINDOWS%]\cbmsg.dat<br/>[%WINDOWS%]\cbphook.dll<br/>[%WINDOWS%]\cbsys32.dll<br/>[%WINDOWS%]\cbtril32.dll </CODE> </p> <p><strong>Folders:</strong> <CODE> <br/>[%PROGRAMS%]\ChatBlocker </CODE> </p> <p><strong>Registry Keys:</strong> <CODE> <br/>HKEY_LOCAL_MACHINE\software\exploreanywhere software\cb<br/>HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\chatblocker </CODE> </p> <p> <h2>Removing ChatBlocker:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>ChatBlocker</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove ChatBlocker manually</strong>.</p><p> To completely manually remove ChatBlocker malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with ChatBlocker.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the ChatBlocker process.</li> <li> Delete the original ChatBlocker file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes ChatBlocker from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of ChatBlocker! </p> <p> Check now if your PC is infected with ChatBlocker </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://trojanpedia-infections-keylogger.blogspot.com/2009/01/bhomoneygainer-adware.html">BHOMoneyGainer Adware Symptoms</a><br/><a href="http://remove-listing-pc.blogspot.com/2009/01/smallabk-trojan.html">Remove Small.abk Trojan</a><br/><a href="http://computer-protect-virus.blogspot.com/2009/01/crsgate-backdoor.html">Remove CRS.Gate Backdoor</a><br/><a href="http://virusinfo-2327.blogspot.com/2009/01/proha-trojan.html">Remove Proha Trojan</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-373463070087526362009-02-03T07:16:00.001-08:002009-02-03T07:16:59.197-08:00steerco.fi Tracking Cookiesteerco.fi malware description and removal detail<br/><strong>Categories:</strong>Tracking Cookie <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p> <h2>Removing steerco.fi:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>steerco.fi</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove steerco.fi manually</strong>.</p><p> To completely manually remove steerco.fi malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with steerco.fi.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the steerco.fi process.</li> <li> Delete the original steerco.fi file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes steerco.fi from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of steerco.fi! </p> <p> Check now if your PC is infected with steerco.fi </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://trojan-list-69.blogspot.com/2009/02/wingateclone-dos.html">WinGate.clone DoS Information</a><br/><a href="http://trojan-list-94.blogspot.com/2009/01/hungryhands-adware.html">HungryHands Adware Information</a><br/><a href="http://trojan-list-45.blogspot.com/2009/01/win32trojandownloadervbaa3-downloader.html">Win32.TrojanDownloader.VB.AA3 Downloader Removal</a><br/><a href="http://remove-listing-pc.blogspot.com/2009/01/sillydlcdb-trojan.html">SillyDl.CDB Trojan Symptoms</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-25125240235156772402009-02-03T06:59:00.001-08:002009-02-03T06:59:48.858-08:00DonaldDick TrojanDonaldDick malware description and removal detail<br/><strong>Categories:</strong>Trojan,Backdoor<br/><string>Also known as:</strong><br/><code><br/>[Kaspersky]Backdoor.Win32.DonaldDick.152;<br/>[Eset]Win32/DonaldDick.1_52 trojan,Win32/DonaldDick.1_52.02 trojan,Win32/DonaldDick.1_52.B trojan;<br/>[McAfee]BackDoor-AQ;<br/>[F-Prot]W32/Backdoor.DonaldD.Server.v1;<br/>[Panda]Bck/Donald_Dick.152;<br/>[Computer Associates]Backdoor/DonaldDick.152.VxD,Backdoor/DonaldDick.A!Server,Win32.Donald.152,Win32.Donald.ldr,Backdoor/DonaldDick.1.5.2.B</code> <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p> <h2>Removing DonaldDick:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>DonaldDick</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove DonaldDick manually</strong>.</p><p> To completely manually remove DonaldDick malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with DonaldDick.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the DonaldDick process.</li> <li> Delete the original DonaldDick file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes DonaldDick from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of DonaldDick! </p> <p> Check now if your PC is infected with DonaldDick </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://spyware-list-infections.blogspot.com/2009/01/nuclearup-trojan.html">Remove NuclearUp Trojan</a><br/><a href="http://trojan-list-28.blogspot.com/2009/01/bancosaea-trojan.html">Remove Bancos.AEA Trojan</a><br/><a href="http://virusinfo-4832.blogspot.com/2009/02/number4-trojan.html">Number4 Trojan Removal instruction</a><br/><a href="http://virusinfo-3715.blogspot.com/2009/01/hackersparadise-backdoor.html">Hackers.Paradise Backdoor Cleaner</a><br/><a href="http://trojanpedia-infections-keylogger.blogspot.com/2009/01/bancosgkc-trojan.html">Bancos.GKC Trojan Cleaner</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-5942476313761741532009-02-03T05:35:00.001-08:002009-02-03T05:35:36.799-08:00Vxidl.ALV TrojanVxidl.ALV malware description and removal detail<br/><strong>Categories:</strong>Trojan <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p> <h2>Removing Vxidl.ALV:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>Vxidl.ALV</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove Vxidl.ALV manually</strong>.</p><p> To completely manually remove Vxidl.ALV malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Vxidl.ALV.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the Vxidl.ALV process.</li> <li> Delete the original Vxidl.ALV file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes Vxidl.ALV from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of Vxidl.ALV! </p> <p> Check now if your PC is infected with Vxidl.ALV </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://kill-computer-virus.blogspot.com/2009/02/delfgen-trojan.html">Removing Delf.GEN Trojan</a><br/><a href="http://trojan-list-30.blogspot.com/2009/01/agentbdo-trojan.html">Agent.BDO Trojan Information</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-72105986206239126712009-02-03T03:35:00.001-08:002009-02-03T03:35:54.275-08:00Ill.Aim.Jacker RATIll.Aim.Jacker malware description and removal detail<br/><strong>Categories:</strong>RAT <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p> <h2>Removing Ill.Aim.Jacker:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>Ill.Aim.Jacker</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove Ill.Aim.Jacker manually</strong>.</p><p> To completely manually remove Ill.Aim.Jacker malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Ill.Aim.Jacker.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the Ill.Aim.Jacker process.</li> <li> Delete the original Ill.Aim.Jacker file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes Ill.Aim.Jacker from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of Ill.Aim.Jacker! </p> <p> Check now if your PC is infected with Ill.Aim.Jacker </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://trojan-list-26.blogspot.com/2009/01/goesna-trojan.html">Goesna Trojan Information</a><br/><a href="http://infections-information-protect.blogspot.com/2009/02/ultimatedial-adware.html">UltimateDial Adware Information</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0tag:blogger.com,1999:blog-4785015833191664155.post-89119790999416342532009-02-03T01:52:00.001-08:002009-02-03T01:52:57.725-08:00MIRC Hacker ToolMIRC malware description and removal detail<br/><strong>Categories:</strong>Hacker Tool,DoS<br/><strong>Visible Symptoms:</strong> <br/>Files in system folders:<CODE> <br/>[%DESKTOP%]\fserv\mirc32.exe<br/>[%SYSTEM%]\EXPLORER.EXE<br/>[%SYSTEM%]\starbucks.exe<br/>[%DESKTOP%]\fserv\mirc32.exe<br/>[%SYSTEM%]\EXPLORER.EXE<br/>[%SYSTEM%]\starbucks.exe </CODE> <p>In order to ensure that the MIRC is launched automatically each time the system is booted, the MIRC adds a link to its executable file in the system registry: <br/><code>HKLM\Software\Microsoft\Windows\CurrentVersion\Run <br/>[%DESKTOP%]\fserv\mirc32.exe<br/>[%SYSTEM%]\starbucks.exe <p><strong>Platforms / OS:</strong> Windows 95, Windows 98, Windows 98 SE, Windows NT, Windows ME, Windows 2000, Windows XP, Windows 2003, Windows Vista</p> <p><h2>Detecting MIRC:</h2></p> <p><strong>Files:</strong> <CODE> <br/>[%DESKTOP%]\fserv\mirc32.exe<br/>[%SYSTEM%]\EXPLORER.EXE<br/>[%SYSTEM%]\starbucks.exe<br/>[%DESKTOP%]\fserv\mirc32.exe<br/>[%SYSTEM%]\EXPLORER.EXE<br/>[%SYSTEM%]\starbucks.exe </CODE> </p> <p> <h2>Removing MIRC:</h2></p><p> An up-to-date copy of <a href="http://ihitec.com/t.php?path=av-mp/hrv/1" rel="nofollow">ExterminateIt</a> should detect and prevent infection from <strong>MIRC</strong>.</p> <p> If you do not have ExterminateIt and you are worried that you may have infected computer, you could run <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">trial version of ExterminateIt</a>, or <strong>remove MIRC manually</strong>.</p><p> To completely manually remove MIRC malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with MIRC.</p><ol TYPE="1" START="1"> <li> Use Task Manager to terminate the MIRC process.</li> <li> Delete the original MIRC file and folders.</li> <li> Delete the system registry key parameters</li> <li> Update your antivirus databases or <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow">buy antivirus software</a> and perform a full scan of the computer.</li></ol><p> <BLOCKQUOTE> We recommends that all Internet users back up any important information on their computers, enable maximum protection from network attacks and malicious code on their computers, refrain from executing suspicious programs received from untrustworthy sources. </BLOCKQUOTE></p><hr/><em> <p> ExterminateIt effectively and automatically removes MIRC from you computer and is a good solution for those who are seeking easy and effective protection for their computer from Trojan Horses, Rootkits, Backdoors, spyware, botnets, keystroke loggers, dialers and other malicious software(malware). </p> <p> <a href="http://ihitec.com/t.php?path=av-dl/hrv/1" rel="nofollow">Download ExterminateIt!</a> to instantly get rid of MIRC! </p> <p> Check now if your PC is infected with MIRC </p> <p> You can buy full version of ExterminateIt <a href="http://ihitec.com/t.php?path=av-buy/hrv/1" rel="nofollow"> at RegNow.com.</a> </p></em><hr/><p>Also Be Aware of the Following Threats:<br/><a href="http://trojan-list-10.blogspot.com/2009/02/blat-dos.html">Removing Blat DoS</a><br/><a href="http://malware-list-info.blogspot.com/2009/01/icqbomberbeta-trojan.html">ICQ.Bomber.Beta Trojan Symptoms</a><br/><a href="http://trojan-list-87.blogspot.com/2009/01/win32netdown-trojan.html">Win32.NetDown Trojan Symptoms</a></p>Anthony Daltonhttp://www.blogger.com/profile/15535799975630236281noreply@blogger.com0