Saturday, January 31, 2009

Bancos.GQO Trojan

Click here to remove Bancos.GQO malware
Bancos.GQO description:
Bancos.GQO Category:Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Removing Bancos.GQO:

you can run trial version of ExterminateIt, or remove Bancos.GQO manually.


To completely manually remove Bancos.GQO malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.GQO.


Also Be Aware of the Following Threats:
SillyDl.DFE Trojan Removal
SillyDl.CJR Trojan Cleaner
Removing Win32.NetControl Trojan
Databound DoS Removal

WinShell Trojan

Click here to remove WinShell malware
WinShell description:
WinShell Category:Trojan,Backdoor,RAT
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Backdoors combine the functionality of most other types of in one package.
Backdoors have one especially dangerous sub-class: variants that can propagate like worms.

Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.

Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on
April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack.
They usually do whimsical things like flip the screen upside-down, open the CD-ROM tray,
and swap mouse buttons. However, they can be quite hard to remove.

Removing WinShell:

you can run trial version of ExterminateIt, or remove WinShell manually.


To completely manually remove WinShell malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with WinShell.


Also Be Aware of the Following Threats:
Softomate Adware Symptoms
Removing IRC.ColdLife Worm
ATM Trojan Cleaner

Poly Trojan

Click here to remove Poly malware
Poly description:
Poly Category:Trojan,RAT,Downloader,Hacker Tool
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on
April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack.

The downloader either launches the new malware or registers it to enable autorun
according to the local operating system requirements.
Exploits use vulnerabilities in operating systems and applications to achieve the same result.

Removing Poly:

you can run trial version of ExterminateIt, or remove Poly manually.


To completely manually remove Poly malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Poly.


Also Be Aware of the Following Threats:
Removing Bancos.HUL Trojan
SillyDl.CJN Trojan Removal
Attackthread Hostile Code Symptoms

Connector Trojan

Click here to remove Connector malware
Connector description:
Connector Category:Trojan,Hacker Tool
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Hacker Tools are designed to penetrate remote computers
in order to use them as zombies or to download other malicious programs to computer.

Removing Connector:

you can run trial version of ExterminateIt, or remove Connector manually.


To completely manually remove Connector malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Connector.


Also Be Aware of the Following Threats:
Tuloti Trojan Cleaner
statistici.ro Tracking Cookie Removal
StObj32 Trojan Cleaner
Win32.VB.ew Trojan Symptoms

Rael Trojan

Click here to remove Rael malware
Rael description:
Rael Category:Trojan,Backdoor,Downloader,DoS
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
They function in the same way as legal remote administration programs used by system administrators.
This makes them difficult to detect.

Backdoors are installed and launched without the consent of the user of computer.
Often the backdoor will not be visible in the log of active programs.

Once a backdoor has been successfully launched, the computer is wide open.
Backdoor functions can include:


  • Launching/ deleting files

  • Sending/ receiving files

  • Deleting data

  • Displaying notification

  • Rebooting the machine

  • Executing files




Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.
Backdoors combine the functionality of most other types of in one package.

Backdoors have one especially dangerous sub-class: variants that can propagate like worms.
Trojans-downloaders downloads and installs new malware or adware on the computer.

These programs attack web servers by sending numerous requests to the specified server,
often causing it to crash under an excessive volume of requests.

DoS trojans conduct such attacks from a single computer with the consent of the user.

Worms can carry a DoS procedure as part of their payload.

Detection Rael :

Rael Files:
[%PROFILE_TEMP%]\AutoUpdate0\setup.inf
[%PROFILE_TEMP%]\AutoUpdate1\setup.inf
[%PROFILE_TEMP%]\AutoUpdate0\setup.inf
[%PROFILE_TEMP%]\AutoUpdate1\setup.inf

Rael Folders:
[%PROGRAM_FILES%]\autoupdate

Rael Registry Keys:
HKEY_LOCAL_MACHINE\Software\AutoLoader

Removing Rael:

you can run trial version of ExterminateIt, or remove Rael manually.


To completely manually remove Rael malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Rael.


Also Be Aware of the Following Threats:
Major.ICQ.security.hole Trojan Removal

Remote.Hack Backdoor

Click here to remove Remote.Hack malware
Remote.Hack description:
Remote.Hack Category:Backdoor,RAT
Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.

Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.

Removing Remote.Hack:

you can run trial version of ExterminateIt, or remove Remote.Hack manually.


To completely manually remove Remote.Hack malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Remote.Hack.


Also Be Aware of the Following Threats:
CWS.Yexe Hijacker Cleaner
Awax Trojan Information
SystemSearch Adware Removal
NCase.Inst Downloader Removal
Pigeon.ALD Trojan Cleaner

Odigo BHO

Click here to remove Odigo malware
Odigo description:
Odigo Category:BHO
As this information is entered by the user, it is captured by the BHO (Browser Helper Object) and
sent back to the attacker.
Typically, keyloggers of this type will send the stolen information back to the attacker via email
or HTTP POST, which can appear suspicious.

Removing Odigo:

you can run trial version of ExterminateIt, or remove Odigo manually.


To completely manually remove Odigo malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Odigo.


Also Be Aware of the Following Threats:
Removing Dead.Locked DoS
DelArmgo Trojan Removal

Backdoor.IRCBot Trojan

Click here to remove Backdoor.IRCBot malware
Backdoor.IRCBot description:
Backdoor.IRCBot Category:Trojan,Worm,Backdoor,DoS
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Worms can be classified according to the propagation method they use,
i.e. how they deliver copies of themselves to new victim machines.
Worms can also be classified by installation method, launch method and finally according
to characteristics standard to all malware: polymorphism, stealth etc.

Many of the worms which managed to cause significant outbreaks use more then
one propagation method as well as more than one infection technique.
The methods are listed separately below.
Backdoors combine the functionality of most other types of in one package.
Backdoors have one especially dangerous sub-class: variants that can propagate like worms.

DoS trojans conduct attacks from a single computer with the consent of the user.

Removing Backdoor.IRCBot:

you can run trial version of ExterminateIt, or remove Backdoor.IRCBot manually.


To completely manually remove Backdoor.IRCBot malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Backdoor.IRCBot.


Also Be Aware of the Following Threats:
Bat.!Vir Trojan Cleaner

Puppetcorpse Trojan

Click here to remove Puppetcorpse malware
Puppetcorpse description:
Puppetcorpse Category:Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Detection Puppetcorpse :

Puppetcorpse Files:
[%SYSTEM%]\rpcs.dll
[%SYSTEM%]\rpcs.exe
[%SYSTEM%]\rpcs.dll
[%SYSTEM%]\rpcs.exe

Puppetcorpse Registry Keys:
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\rpcs

Removing Puppetcorpse:

you can run trial version of ExterminateIt, or remove Puppetcorpse manually.


To completely manually remove Puppetcorpse malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Puppetcorpse.


Also Be Aware of the Following Threats:
Removing for.Pitbul Trojan
Prosiak.70B Backdoor Information
Remove ZZ Backdoor
Piter Trojan Removal
Bancos.GHB Trojan Removal

vegas.com Tracking Cookie

Click here to remove vegas.com malware
vegas.com description:
vegas.com Category:Tracking Cookie
Tracking cookies, like regular cookies, are small files that get deposited
onto your computer's hard drive
as you browse the Internet.
Unlike harmless cookies that normally let you use certain websites more easily,
tracking cookies usually collect and report information about what websites you visit
and what you do at those websites.

If you fill out forms online with your real name and contact information,
click on banners and then purchase an item, or fill out sweepstakes or contests forms,
then it's possible that major online advertisers know your name and have associated it
with your IP address and other information.

Removing vegas.com:

you can run trial version of ExterminateIt, or remove vegas.com manually.


To completely manually remove vegas.com malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with vegas.com.


Also Be Aware of the Following Threats:
Noknok.50!Setup Backdoor Information

AlexMessoMalex Trojan

Click here to remove AlexMessoMalex malware
AlexMessoMalex description:
AlexMessoMalex Category:Trojan,Backdoor,RAT
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
Often the backdoor will not be visible in the log of active programs.
Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.

Removing AlexMessoMalex:

you can run trial version of ExterminateIt, or remove AlexMessoMalex manually.


To completely manually remove AlexMessoMalex malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with AlexMessoMalex.


Also Be Aware of the Following Threats:
Bancos.GYY Trojan Removal instruction
Removing Spy.CQMA Trojan

Mendrem Trojan

Click here to remove Mendrem malware
Mendrem description:
Mendrem Category:Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Detection Mendrem :

Mendrem Files:
[%SYSTEM%]\wndregmon32.DLL
[%SYSTEM%]\wndregmon32.DLL

Removing Mendrem:

you can run trial version of ExterminateIt, or remove Mendrem manually.


To completely manually remove Mendrem malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Mendrem.


Also Be Aware of the Following Threats:
Win32.TDS Trojan Symptoms
Wired.com Tracking Cookie Information
Skoob Trojan Removal
Backdoor.Lixy!DLL Trojan Removal
Ehg.Space.hitbox Tracking Cookie Removal instruction

Pigeon.EJS Trojan

Click here to remove Pigeon.EJS malware
Pigeon.EJS description:
Pigeon.EJS Category:Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Removing Pigeon.EJS:

you can run trial version of ExterminateIt, or remove Pigeon.EJS manually.


To completely manually remove Pigeon.EJS malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.EJS.


Also Be Aware of the Following Threats:
W95.Halen Trojan Removal instruction
Remove Backdoor.WinCmp32.Server Backdoor
Webcam Backdoor Removal instruction
Horse.Workshop Trojan Cleaner

War.ftpd.66x4s.and DoS

Click here to remove War.ftpd.66x4s.and malware
War.ftpd.66x4s.and description:
War.ftpd.66x4s.and Category:DoS
DoS trojans conduct attacks from a single computer with the consent of the user.

Removing War.ftpd.66x4s.and:

you can run trial version of ExterminateIt, or remove War.ftpd.66x4s.and manually.


To completely manually remove War.ftpd.66x4s.and malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with War.ftpd.66x4s.and.


Also Be Aware of the Following Threats:
Bionet.19b Trojan Symptoms
Ranck Trojan Removal instruction

Win32.Porndial.G!Trojan Adware

Click here to remove Win32.Porndial.G!Trojan malware
Win32.Porndial.G!Trojan description:
Win32.Porndial.G!Trojan Category:Adware,Downloader
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.

Trojans-downloaders downloads and installs new malware or adware on the computer.

Removing Win32.Porndial.G!Trojan:

you can run trial version of ExterminateIt, or remove Win32.Porndial.G!Trojan manually.


To completely manually remove Win32.Porndial.G!Trojan malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Win32.Porndial.G!Trojan.


Also Be Aware of the Following Threats:
Metallica Trojan Symptoms
Remove WurldMedia BHO
TrojanDownloader.Win32.Miled Trojan Cleaner
HideIt Trojan Removal
Soho.Anywhere Trojan Cleaner

Alicia Trojan

Click here to remove Alicia malware
Alicia description:
Alicia Category:Trojan,Backdoor,RAT
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Backdoors combine the functionality of most other types of in one package.
Backdoors have one especially dangerous sub-class: variants that can propagate like worms.

Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.

Detection Alicia :

Alicia Files:
[%WINDOWS%]\start menu\programs\startup\fastfinder.exe
[%WINDOWS%]\start menu\programs\startup\newstick.exe
[%WINDOWS%]\start menu\programs\startup\fastfinder.exe
[%WINDOWS%]\start menu\programs\startup\newstick.exe

Removing Alicia:

you can run trial version of ExterminateIt, or remove Alicia manually.


To completely manually remove Alicia malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Alicia.


Also Be Aware of the Following Threats:
Pigeon.AVHL Trojan Symptoms

Bancos.HTZ Trojan

Click here to remove Bancos.HTZ malware
Bancos.HTZ description:
Bancos.HTZ Category:Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Removing Bancos.HTZ:

you can run trial version of ExterminateIt, or remove Bancos.HTZ manually.


To completely manually remove Bancos.HTZ malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.HTZ.


Also Be Aware of the Following Threats:
Bancos.GAV Trojan Symptoms
yandex.ru Tracking Cookie Removal

Hav0kcore Backdoor

Click here to remove Hav0kcore malware
Hav0kcore description:
Hav0kcore Category:Backdoor,Hacker Tool
Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.

Exploits use vulnerabilities in operating systems and applications to achieve the same result.

Removing Hav0kcore:

you can run trial version of ExterminateIt, or remove Hav0kcore manually.


To completely manually remove Hav0kcore malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Hav0kcore.


Also Be Aware of the Following Threats:
Removing Key.Probe Trojan
Covesmer Trojan Cleaner

Zlob.Fam.VideoAccessCodec Trojan

Click here to remove Zlob.Fam.VideoAccessCodec malware
Zlob.Fam.VideoAccessCodec description:
Zlob.Fam.VideoAccessCodec Category:Trojan,Popups
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Adware is the class of programs that place advertisements on your screen.
These may be in the form of pop-ups, pop-unders, advertisements embedded in programs,
advertisements placed on top of ads in web sites, or any other way the authors can
think of showing you an ad.

The pop-ups generally will not be stopped by pop-up stoppers, and often are
not dependent on your having Internet Explorer open.
They may show up when you are playing a game, writing a document, listening to music,
or anything else. Should you be surfing, the advertisements will often be related to
the web page you are viewing.

Detection Zlob.Fam.VideoAccessCodec :

Zlob.Fam.VideoAccessCodec Folders:
[%PROGRAM_FILES%]\VideoAccessCodec

Zlob.Fam.VideoAccessCodec Registry Keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\VideoAccessCodec

Removing Zlob.Fam.VideoAccessCodec:

you can run trial version of ExterminateIt, or remove Zlob.Fam.VideoAccessCodec manually.


To completely manually remove Zlob.Fam.VideoAccessCodec malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Zlob.Fam.VideoAccessCodec.


Also Be Aware of the Following Threats:
Bancos.IJR Trojan Information
Pigeon.DZA Trojan Cleaner
Removing MediaLoads.Enhanced BHO
SillyDl.CXG Trojan Removal instruction
TrojanDownloader.Win32.Agent.af Trojan Removal

softure.com Tracking Cookie

Click here to remove softure.com malware
softure.com description:
softure.com Category:Tracking Cookie
Tracking cookies, like regular cookies, are small files that get deposited
onto your computer's hard drive
as you browse the Internet.
Unlike harmless cookies that normally let you use certain websites more easily,
tracking cookies usually collect and report information about what websites you visit
and what you do at those websites.

If you fill out forms online with your real name and contact information,
click on banners and then purchase an item, or fill out sweepstakes or contests forms,
then it's possible that major online advertisers know your name and have associated it
with your IP address and other information.

Removing softure.com:

you can run trial version of ExterminateIt, or remove softure.com manually.


To completely manually remove softure.com malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with softure.com.


Also Be Aware of the Following Threats:
W95.Bonk Trojan Cleaner

DealHelper.com Adware

Click here to remove DealHelper.com malware
DealHelper.com description:
DealHelper.com Category:Adware,BHO,Toolbar,Downloader
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.

BHO (Browser Helper Object) Trojan.
The BHO waits for the user to post personal information to a monitored website.
As this information is entered by the user, it is captured by the BHO and sent back to the attacker.
The method of network transport used by the attacker makes this Trojan unique.
Typically, keyloggers of this type will send the stolen information back to the attacker via email
or HTTP POST, which can appear suspicious.
Instead, this Trojan encodes the data with a simple XOR algorithm before placing it into
the data section of an ICMP ping packet." explained the company.
Toolbar presents itself as a helpful add-on for Internet Explorer but it is a real pest.
It replaces your start page, continuosly open a number of pop up windows and so on.
Trojans-downloaders downloads and installs new malware or adware on the computer.

Detection DealHelper.com :

DealHelper.com Files:
[%PROFILE_TEMP%]\_setupx.dll
[%SYSTEM%]\Dnlelq.exe
[%SYSTEM%]\dun.exe
[%SYSTEM%]\Eyerkt.exe
[%SYSTEM%]\Gkyzbs.exe
[%SYSTEM%]\HookPopup.dll
[%SYSTEM%]\Nwrseu.exe
[%SYSTEM%]\Werxtr.exe
[%SYSTEM%]\Xiclwf.exe
[%WINDOWS%]\appsinstalled.htm
[%WINDOWS%]\dealhlpr.dll
[%WINDOWS%]\dhdom.bin
[%WINDOWS%]\dhdomp.bin
[%WINDOWS%]\dhkw.bin
[%WINDOWS%]\dhp2.dll
[%WINDOWS%]\dsearch.bin
[%DESKTOP%]\dhbrwsr.exe
[%SYSTEM%]\dealhlpr.dll
[%SYSTEM%]\dp-him.exe
[%SYSTEM%]\dp-k13w13.exe
[%WINDOWS%]\dhbrwsr.exe
[%WINDOWS%]\dhp.dll
[%WINDOWS%]\dhsigned.ocx
[%WINDOWS%]\dhsvr.exe
[%WINDOWS%]\dhun.exe
[%WINDOWS%]\dhupdt.exe
[%WINDOWS%]\edow.exe
[%WINDOWS%]\system\dealhlpr.dll
[%WINDOWS%]\timesynchronize.exe
[%PROFILE_TEMP%]\_setupx.dll
[%SYSTEM%]\Dnlelq.exe
[%SYSTEM%]\dun.exe
[%SYSTEM%]\Eyerkt.exe
[%SYSTEM%]\Gkyzbs.exe
[%SYSTEM%]\HookPopup.dll
[%SYSTEM%]\Nwrseu.exe
[%SYSTEM%]\Werxtr.exe
[%SYSTEM%]\Xiclwf.exe
[%WINDOWS%]\appsinstalled.htm
[%WINDOWS%]\dealhlpr.dll
[%WINDOWS%]\dhdom.bin
[%WINDOWS%]\dhdomp.bin
[%WINDOWS%]\dhkw.bin
[%WINDOWS%]\dhp2.dll
[%WINDOWS%]\dsearch.bin
[%DESKTOP%]\dhbrwsr.exe
[%SYSTEM%]\dealhlpr.dll
[%SYSTEM%]\dp-him.exe
[%SYSTEM%]\dp-k13w13.exe
[%WINDOWS%]\dhbrwsr.exe
[%WINDOWS%]\dhp.dll
[%WINDOWS%]\dhsigned.ocx
[%WINDOWS%]\dhsvr.exe
[%WINDOWS%]\dhun.exe
[%WINDOWS%]\dhupdt.exe
[%WINDOWS%]\edow.exe
[%WINDOWS%]\system\dealhlpr.dll
[%WINDOWS%]\timesynchronize.exe

DealHelper.com Folders:
[%PROGRAM_FILES%]\dealhelper.com inc
[%PROGRAM_FILES%]\timesync
[%SYSTEM%]\dealhelper
[%PROGRAMS%]\dealhelper

DealHelper.com Registry Keys:
HKEY_CLASSES_ROOT\appid\{a1f53f1d-fb2d-4fe0-8ee8-7bbe69999d9f}
HKEY_CLASSES_ROOT\appid\{a57afb0f-c63e-4ae2-8a7b-bca01ba32cc5}
HKEY_CLASSES_ROOT\clsid\{1a2883f2-fdc7-4af2-b136-203adb475dd7}
HKEY_CLASSES_ROOT\clsid\{54a41ae7-b358-4d41-98bd-bbbffdf5186b}
HKEY_CLASSES_ROOT\clsid\{5e3e1dc0-239a-4067-a4a0-88902c108e58}
HKEY_CLASSES_ROOT\clsid\{6dd8b352-21a7-4c24-ac49-e9b4730c1823}
HKEY_CLASSES_ROOT\clsid\{7bc3ec59-a4a0-4638-a3bf-c20b0665947f}
HKEY_CLASSES_ROOT\clsid\{8b477303-698c-4eed-b9f6-c715842fbe33}
HKEY_CLASSES_ROOT\clsid\{8ee1aaf5-ed6b-4601-b333-cd30ffb8b39d}
HKEY_CLASSES_ROOT\clsid\{b8e910b5-7452-4a29-b121-08e8cf09ec07}
HKEY_CLASSES_ROOT\clsid\{bfef1779-0e92-45a1-bf5e-55991007f912}
HKEY_CLASSES_ROOT\CLSID\{D848A3CA-0BFB-4DE0-BA9E-A57F0CCA1C13}
HKEY_CLASSES_ROOT\clsid\{f00586de-a432-4b9f-877d-e29cd87efdd6}
HKEY_CLASSES_ROOT\clsid\{fe4bbea8-1efd-4b8a-bd1b-341ccdbeeaa6}
HKEY_CLASSES_ROOT\dealhlpr.band
HKEY_CLASSES_ROOT\dealhlpr.band.1
HKEY_CLASSES_ROOT\dealpop.cdealhelperpopup
HKEY_CLASSES_ROOT\dealpop.cdealhelperpopup.1
HKEY_CLASSES_ROOT\dealpop.dealpopevents
HKEY_CLASSES_ROOT\dealpop.dealpopevents.1
HKEY_CLASSES_ROOT\dhbrwsr.browserwindows
HKEY_CLASSES_ROOT\dhbrwsr.browserwindows.1
HKEY_CLASSES_ROOT\dhp.dhevents
HKEY_CLASSES_ROOT\dhp.dhevents.1
HKEY_CLASSES_ROOT\dhp.popup
HKEY_CLASSES_ROOT\dhp.popup.1
HKEY_CLASSES_ROOT\dhsigned.dhsignedctrl.1
HKEY_CLASSES_ROOT\dhsvr.cfiledatabase
HKEY_CLASSES_ROOT\dhsvr.cfiledatabase.1
HKEY_CLASSES_ROOT\dhsvr.dbhelper
HKEY_CLASSES_ROOT\dhsvr.dbhelper.1
HKEY_CLASSES_ROOT\dhsvr.even
HKEY_CLASSES_ROOT\dhsvr.even.1
HKEY_CLASSES_ROOT\dhsvr.webdealevents
HKEY_CLASSES_ROOT\dhsvr.webdealevents.1
HKEY_CLASSES_ROOT\interface\{06e53101-654c-45eb-bff6-e37e13b5972a}
HKEY_CLASSES_ROOT\interface\{0b16b278-b2e3-4cbf-85b5-e058878f728f}
HKEY_CLASSES_ROOT\interface\{1da40091-14b4-4c21-8170-a2ceede90b10}
HKEY_CLASSES_ROOT\interface\{3afae37a-56a3-4850-b599-4da9a9104b82}
HKEY_CLASSES_ROOT\interface\{3d89a731-9f4a-418f-a997-2d633c7c404c}
HKEY_CLASSES_ROOT\interface\{81739076-56b7-42ec-a0aa-692794fded1a}
HKEY_CLASSES_ROOT\interface\{a2cdafb4-eb9c-4efc-bcfc-a7aa6745ff7e}
HKEY_CLASSES_ROOT\interface\{b5146c72-3328-4240-97ed-3a23dcb656cf}
HKEY_CLASSES_ROOT\interface\{bf9ee3a0-1a02-4265-a65f-ac4d4447f6bf}
HKEY_CLASSES_ROOT\interface\{c2e6831b-822b-4a1f-9ef1-1d3eb7d3e985}
HKEY_CLASSES_ROOT\interface\{c9679631-7060-443f-bd37-88f9410ed8c3}
HKEY_CLASSES_ROOT\interface\{deba1742-2bec-4b78-a987-5837971193f7}
HKEY_CLASSES_ROOT\interface\{e9468a08-f790-48ce-ad30-eadeeab9b40c}
HKEY_CLASSES_ROOT\interface\{f3816084-9608-485a-b63b-cad8f931577e}
HKEY_LOCAL_MACHINE\software\classes\appid\{a1f53f1d-fb2d-4fe0-8ee8-7bbe69999d9f}
HKEY_LOCAL_MACHINE\software\classes\appid\{a57afb0f-c63e-4ae2-8a7b-bca01ba32cc5}
HKEY_LOCAL_MACHINE\software\classes\clsid\{1a2883f2-fdc7-4af2-b136-203adb475dd7}
HKEY_LOCAL_MACHINE\software\classes\clsid\{54a41ae7-b358-4d41-98bd-bbbffdf5186b}
HKEY_LOCAL_MACHINE\software\classes\clsid\{5e3e1dc0-239a-4067-a4a0-88902c108e58}
HKEY_LOCAL_MACHINE\software\classes\clsid\{6dd8b352-21a7-4c24-ac49-e9b4730c1823}
HKEY_LOCAL_MACHINE\software\classes\clsid\{7bc3ec59-a4a0-4638-a3bf-c20b0665947f}
HKEY_LOCAL_MACHINE\software\classes\clsid\{8b477303-698c-4eed-b9f6-c715842fbe33}
HKEY_LOCAL_MACHINE\software\classes\clsid\{8ee1aaf5-ed6b-4601-b333-cd30ffb8b39d}
HKEY_LOCAL_MACHINE\software\classes\clsid\{b8e910b5-7452-4a29-b121-08e8cf09ec07}
HKEY_LOCAL_MACHINE\software\classes\clsid\{bfef1779-0e92-45a1-bf5e-55991007f912}
HKEY_LOCAL_MACHINE\software\classes\clsid\{d848a3ca-0bfb-4de0-ba9e-a57f0cca1c13}
HKEY_LOCAL_MACHINE\software\classes\clsid\{f00586de-a432-4b9f-877d-e29cd87efdd6}
HKEY_LOCAL_MACHINE\software\classes\clsid\{fe4bbea8-1efd-4b8a-bd1b-341ccdbeeaa6}
HKEY_LOCAL_MACHINE\software\classes\interface\{06e53101-654c-45eb-bff6-e37e13b5972a}
HKEY_LOCAL_MACHINE\software\classes\interface\{0b16b278-b2e3-4cbf-85b5-e058878f728f}
HKEY_LOCAL_MACHINE\software\classes\interface\{1da40091-14b4-4c21-8170-a2ceede90b10}
HKEY_LOCAL_MACHINE\software\classes\interface\{3afae37a-56a3-4850-b599-4da9a9104b82}
HKEY_LOCAL_MACHINE\software\classes\interface\{3d89a731-9f4a-418f-a997-2d633c7c404c}
HKEY_LOCAL_MACHINE\software\classes\interface\{81739076-56b7-42ec-a0aa-692794fded1a}
HKEY_LOCAL_MACHINE\software\classes\interface\{a2cdafb4-eb9c-4efc-bcfc-a7aa6745ff7e}
HKEY_LOCAL_MACHINE\software\classes\interface\{b5146c72-3328-4240-97ed-3a23dcb656cf}
HKEY_LOCAL_MACHINE\software\classes\interface\{bf9ee3a0-1a02-4265-a65f-ac4d4447f6bf}
HKEY_LOCAL_MACHINE\software\classes\interface\{c2e6831b-822b-4a1f-9ef1-1d3eb7d3e985}
HKEY_LOCAL_MACHINE\software\classes\interface\{c9679631-7060-443f-bd37-88f9410ed8c3}
HKEY_LOCAL_MACHINE\software\classes\interface\{deba1742-2bec-4b78-a987-5837971193f7}
HKEY_LOCAL_MACHINE\software\classes\interface\{e9468a08-f790-48ce-ad30-eadeeab9b40c}
HKEY_LOCAL_MACHINE\software\classes\interface\{f3816084-9608-485a-b63b-cad8f931577e}
HKEY_LOCAL_MACHINE\software\classes\typelib\{25ab1639-3f81-45a8-8318-2dafba8b8f3d}
HKEY_LOCAL_MACHINE\software\classes\typelib\{4b76f69e-247a-4617-aba9-95774658afc5}
HKEY_LOCAL_MACHINE\software\classes\typelib\{5e19a321-635e-4ba5-8828-a5b6427cc61d}
HKEY_LOCAL_MACHINE\software\classes\typelib\{771262e0-8feb-4e78-b292-b01c4071b9d1}
HKEY_LOCAL_MACHINE\software\classes\typelib\{b82b9ecf-40ae-46f2-b98e-b87cf17f70d0}
HKEY_LOCAL_MACHINE\software\classes\typelib\{c2e2f4d7-2c20-492f-b179-d15ff876ab83}
HKEY_LOCAL_MACHINE\software\dealhelper
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{FE4BBEA8-1EFD-4B8A-BD1B-341CCDBEEAA6}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D848A3CA-0BFB-4DE0-BA9E-A57F0CCA1C13}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\dealhelper
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\windh
HKEY_CLASSES_ROOT\clsid\{d848a3ca-0bfb-4de0-ba9e-a57f0cca1c13}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{d848a3ca-0bfb-4de0-ba9e-a57f0cca1c13}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{fe4bbea8-1efd-4b8a-bd1b-341ccdbeeaa6}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{d848a3ca-0bfb-4de0-ba9e-a57f0cca1c13}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{8ce1d4a8-93fa-4815-8d95-baf6fe38483c}

DealHelper.com Registry Values:
HKEY_LOCAL_MACHINE\software\classes\appid\dhbrwsr.exe
HKEY_LOCAL_MACHINE\software\classes\appid\dhsvr.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CLASSES_ROOT\appid\dhbrwsr.exe
HKEY_CLASSES_ROOT\appid\dhsvr.exe
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\classes\appid\dhbrwsr.exe
HKEY_LOCAL_MACHINE\software\classes\appid\dhsvr.exe
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]/dhsigned.ocx
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]/dhsigned.ocx
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\timesync
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\timesync
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\timesync
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\timesync
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\timesync
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\timesync
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\timesync
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\timesync
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\timesync
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\timesync
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\timesync
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\timesync
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\timesync

Removing DealHelper.com:

you can run trial version of ExterminateIt, or remove DealHelper.com manually.


To completely manually remove DealHelper.com malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with DealHelper.com.


Also Be Aware of the Following Threats:
Remove Frog.Bomb DoS
Net.Raider Trojan Cleaner
RemCmd RAT Removal instruction

Friday, January 30, 2009

Net.Antrax Backdoor

Click here to remove Net.Antrax malware
Net.Antrax description:
Net.Antrax Category:Backdoor,RAT,Hacker Tool
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
They function in the same way as legal remote administration programs used by system administrators.
This makes them difficult to detect.

Backdoors are installed and launched without the consent of the user of computer.
Often the backdoor will not be visible in the log of active programs.

Once a backdoor has been successfully launched, the computer is wide open.
Backdoor functions can include:


  • Launching/ deleting files

  • Sending/ receiving files

  • Deleting data

  • Displaying notification

  • Rebooting the machine

  • Executing files




Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.
Backdoors combine the functionality of most other types of in one package.

Backdoors have one especially dangerous sub-class: variants that can propagate like worms.
Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.

Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on
April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack.
They usually do whimsical things like flip the screen upside-down, open the CD-ROM tray,
and swap mouse buttons. However, they can be quite hard to remove.
Hacker Tools are designed to penetrate remote computers
in order to use them as zombies or to download other malicious programs to computer.

Detection Net.Antrax :

Net.Antrax Files:
[%SYSTEM%]\rundll32a.exe
[%WINDOWS%]\installsd.exe
[%SYSTEM%]\rundll32a.exe
[%WINDOWS%]\installsd.exe

Net.Antrax Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run

Removing Net.Antrax:

you can run trial version of ExterminateIt, or remove Net.Antrax manually.


To completely manually remove Net.Antrax malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Net.Antrax.


Also Be Aware of the Following Threats:
Removing gamespy.com Tracking Cookie
Zlob.Fam.Image Addon Trojan Removal instruction
LB5.Bomb DoS Symptoms
Pigeon.EQP Trojan Information
Break Trojan Symptoms

Win32.Naldem Trojan

Click here to remove Win32.Naldem malware
Win32.Naldem description:
Win32.Naldem Category:Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Removing Win32.Naldem:

you can run trial version of ExterminateIt, or remove Win32.Naldem manually.


To completely manually remove Win32.Naldem malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Win32.Naldem.


Also Be Aware of the Following Threats:
VB.yq Backdoor Removal instruction
Pigeon.AAP Trojan Cleaner
Quick.Keylogger Spyware Information
Removing War.ftpd.66x4s.and DoS

Vbs.Evspy Backdoor

Click here to remove Vbs.Evspy malware
Vbs.Evspy description:
Vbs.Evspy Category:Backdoor
Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.

Removing Vbs.Evspy:

you can run trial version of ExterminateIt, or remove Vbs.Evspy manually.


To completely manually remove Vbs.Evspy malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Vbs.Evspy.


Also Be Aware of the Following Threats:
Snake Trojan Cleaner
Desktop.Authority RAT Symptoms
Snex Trojan Removal instruction
BackDoor.ARD Trojan Cleaner

Xupiter.com Tracking Cookie

Click here to remove Xupiter.com malware
Xupiter.com description:
Xupiter.com Category:Tracking Cookie
Tracking cookies, like regular cookies, are small files that get deposited
onto your computer's hard drive
as you browse the Internet.
Unlike harmless cookies that normally let you use certain websites more easily,
tracking cookies usually collect and report information about what websites you visit
and what you do at those websites.

If you fill out forms online with your real name and contact information,
click on banners and then purchase an item, or fill out sweepstakes or contests forms,
then it's possible that major online advertisers know your name and have associated it
with your IP address and other information.

Removing Xupiter.com:

you can run trial version of ExterminateIt, or remove Xupiter.com manually.


To completely manually remove Xupiter.com malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Xupiter.com.


Also Be Aware of the Following Threats:
Remove Dowque Trojan
Bancos.GWO Trojan Information
Win32.DelAll Trojan Information
Pigeon.AVDT Trojan Cleaner
QFat6 Trojan Cleaner

BannerBank.net Tracking Cookie

Click here to remove BannerBank.net malware
BannerBank.net description:
BannerBank.net Category:Tracking Cookie
Tracking cookies, like regular cookies, are small files that get deposited
onto your computer's hard drive as you browse the Internet.
Unlike harmless cookies that normally let you use certain websites more easily,
tracking cookies usually collect and report information about what websites you visit
and what you do at those websites.

Removing BannerBank.net:

you can run trial version of ExterminateIt, or remove BannerBank.net manually.


To completely manually remove BannerBank.net malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with BannerBank.net.


Also Be Aware of the Following Threats:
Arisgo Trojan Cleaner
Removing QuestMal Trojan

Bancos.HHB Trojan

Click here to remove Bancos.HHB malware
Bancos.HHB description:
Bancos.HHB Category:Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Removing Bancos.HHB:

you can run trial version of ExterminateIt, or remove Bancos.HHB manually.


To completely manually remove Bancos.HHB malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.HHB.


Also Be Aware of the Following Threats:
Pigeon.AMW Trojan Cleaner
Backdoor.Transistor Trojan Information
Gonads Trojan Removal instruction
BackDoor.CGX.svr Backdoor Information

IGetNet.Keywords BHO

Click here to remove IGetNet.Keywords malware
IGetNet.Keywords description:
IGetNet.Keywords Category:BHO,Hijacker
As this information is entered by the user, it is captured by the BHO (Browser Helper Object) and
sent back to the attacker.
Typically, keyloggers of this type will send the stolen information back to the attacker via email
or HTTP POST, which can appear suspicious.Hijackers are software programs that modify users' default browser home page,
search settings, error page settings, or desktop wallpaper without adequate notice, disclosure,
or user consent.

When the default home page is hijacked, the browser opens to the web page set by the hijacker
instead of the user's designated home page. In some cases, the hijacker may block users from
restoring their desired home page.

A search hijacker redirects search results to other pages and may
transmit search and browsing data to unknown servers. An error page hijacker directs
the browser to another page, usually an advertising page, instead of the usual error
page when the requested URL is not found.

A desktop hijacker replaces the desktop wallpaper with advertising
for products and services on the desktop.

Hijackers take control of various parts of your web browser, including your home page,
search pages, and search bar. They may also redirect you to certain sites should you
mistype an address or prevent you from going to a website they would rather you not,
such as sites that combat malware. Some will even redirect you to their own search engine
when you attempt a search. NB: hijackers almost exclusively target Internet Explorer.

Detection IGetNet.Keywords :

IGetNet.Keywords Registry Keys:
HKEY_CLASSES_ROOT\clsid\{730f2451-a3fe-4a72-938c-fc8a74f15978}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{730f2451-a3fe-4a72-938c-fc8a74f15978}
HKEY_LOCAL_MACHINE\software\classes\clsid\{730f2451-a3fe-4a72-938c-fc8a74f15978}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{730f2451-a3fe-4a72-938c-fc8a74f15978}

Removing IGetNet.Keywords:

you can run trial version of ExterminateIt, or remove IGetNet.Keywords manually.


To completely manually remove IGetNet.Keywords malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with IGetNet.Keywords.


Also Be Aware of the Following Threats:
Pigeon.AET Trojan Removal instruction
Removing Serve.ThisBanner.com Tracking Cookie
Bancos.GVD Trojan Symptoms
Remove DRCS RAT

AP.gh Trojan

Click here to remove AP.gh malware
AP.gh description:
AP.gh Category:Trojan,Backdoor,Downloader,DoS
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
They function in the same way as legal remote administration programs used by system administrators.
This makes them difficult to detect.

Backdoors are installed and launched without the consent of the user of computer.
Often the backdoor will not be visible in the log of active programs.

Once a backdoor has been successfully launched, the computer is wide open.
Backdoor functions can include:


  • Launching/ deleting files

  • Sending/ receiving files

  • Deleting data

  • Displaying notification

  • Rebooting the machine

  • Executing files




Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.
Backdoors combine the functionality of most other types of in one package.

Backdoors have one especially dangerous sub-class: variants that can propagate like worms.
Trojans-downloaders downloads and installs new malware or adware on the computer.

These programs attack web servers by sending numerous requests to the specified server,
often causing it to crash under an excessive volume of requests.

DoS trojans conduct such attacks from a single computer with the consent of the user.

Worms can carry a DoS procedure as part of their payload.

Removing AP.gh:

you can run trial version of ExterminateIt, or remove AP.gh manually.


To completely manually remove AP.gh malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with AP.gh.


Also Be Aware of the Following Threats:
KClient Spyware Symptoms
Advertor Trojan Removal
NBFind.Plugin RAT Removal
QQ.Murderer RAT Cleaner

Almaster RAT

Click here to remove Almaster malware
Almaster description:
Almaster Category:RAT
Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on
April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack.

Removing Almaster:

you can run trial version of ExterminateIt, or remove Almaster manually.


To completely manually remove Almaster malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Almaster.


Also Be Aware of the Following Threats:
Win32.Netsnake Backdoor Symptoms
ANew Trojan Removal
Removing Fujacks Trojan
Win32.Lithium Trojan Information

BAT.ClsV Trojan

Click here to remove BAT.ClsV malware
BAT.ClsV description:
BAT.ClsV Category:Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Removing BAT.ClsV:

you can run trial version of ExterminateIt, or remove BAT.ClsV manually.


To completely manually remove BAT.ClsV malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with BAT.ClsV.


Also Be Aware of the Following Threats:
Remove Pigeon.EJG Trojan
KGB.Keylogger Spyware Information
Remove Perl.Front.DoS!Trojan Trojan
Remove Bancos.GHD Trojan
Bancos.GKW Trojan Cleaner

Passgrab.Cab Hostile Code

Click here to remove Passgrab.Cab malware
Passgrab.Cab description:
Passgrab.Cab Category:Hostile Code
Hostile code is any process running on a system that is
not authorized by the system administrator, such as Trojans, viruses, or spyware.

Removing Passgrab.Cab:

you can run trial version of ExterminateIt, or remove Passgrab.Cab manually.


To completely manually remove Passgrab.Cab malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Passgrab.Cab.


Also Be Aware of the Following Threats:
SillyDl.CAU Trojan Symptoms

SillyDl.BZZ Trojan

Click here to remove SillyDl.BZZ malware
SillyDl.BZZ description:
SillyDl.BZZ Category:Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Removing SillyDl.BZZ:

you can run trial version of ExterminateIt, or remove SillyDl.BZZ manually.


To completely manually remove SillyDl.BZZ malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SillyDl.BZZ.


Also Be Aware of the Following Threats:
Paltry Trojan Cleaner
Leiame.Do.Hackers.Heaven Backdoor Removal instruction
Remove Win32.DlMersting.AX.DLL.Tr Trojan
Zlob.Fam.Video Access ActiveX Object Trojan Information
Remove hypercount.com Tracking Cookie

Frethog.ACF Trojan

Click here to remove Frethog.ACF malware
Frethog.ACF description:
Frethog.ACF Category:Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Removing Frethog.ACF:

you can run trial version of ExterminateIt, or remove Frethog.ACF manually.


To completely manually remove Frethog.ACF malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Frethog.ACF.


Also Be Aware of the Following Threats:
adaction.se Tracking Cookie Information
Bancos.IFV Trojan Removal
Bancos.FUG Trojan Information
Agent.NovelExe Trojan Cleaner

Lineage.ABB Trojan

Click here to remove Lineage.ABB malware
Lineage.ABB description:
Lineage.ABB Category:Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Removing Lineage.ABB:

you can run trial version of ExterminateIt, or remove Lineage.ABB manually.


To completely manually remove Lineage.ABB malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Lineage.ABB.


Also Be Aware of the Following Threats:
RASetup RAT Symptoms
Remove SysProg Trojan

Cosiam Trojan

Click here to remove Cosiam malware
Cosiam description:
Cosiam Category:Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Detection Cosiam :

Cosiam Files:
[%SYSTEM%]\thematrixhasyou.exe
[%SYSTEM%]\thematrixhasyou.exe

Removing Cosiam:

you can run trial version of ExterminateIt, or remove Cosiam manually.


To completely manually remove Cosiam malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Cosiam.


Also Be Aware of the Following Threats:
Remove W95.Yabram.dr Trojan

Thursday, January 29, 2009

Pigeon.AQO Trojan

Click here to remove Pigeon.AQO malware
Pigeon.AQO description:
Pigeon.AQO Category:Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Removing Pigeon.AQO:

you can run trial version of ExterminateIt, or remove Pigeon.AQO manually.


To completely manually remove Pigeon.AQO malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.AQO.


Also Be Aware of the Following Threats:
Removing Exploit.Zephyrus Trojan
Pigeon.APT Trojan Removal instruction
Bonzo.exe Trojan Removal instruction
Orig.Server Backdoor Removal
Optix.Lite.Firewall.Bypass RAT Cleaner

Cybertech.Family Trojan

Click here to remove Cybertech.Family malware
Cybertech.Family description:
Cybertech.Family Category:Trojan,Backdoor,Downloader,DoS
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
Often the backdoor will not be visible in the log of active programs.
This family of Trojans downloads and installs new malware or adware on the computer.
The downloader then either launches the new malware or registers it to enable autorun
according to the local operating system requirements.

The names and locations of malware to be downloaded are either coded into the
Trojan or downloaded from a specified website.
DoS trojans conduct attacks from a single computer with the consent of the user.

Removing Cybertech.Family:

you can run trial version of ExterminateIt, or remove Cybertech.Family manually.


To completely manually remove Cybertech.Family malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Cybertech.Family.


Also Be Aware of the Following Threats:
Skyscraper Backdoor Cleaner
Rybot Trojan Symptoms
Remove BAT.Ordin Trojan

SexList.com Tracking Cookie

Click here to remove SexList.com malware
SexList.com description:
SexList.com Category:Tracking Cookie
Tracking cookies, like regular cookies, are small files that get deposited
onto your computer's hard drive as you browse the Internet.
Unlike harmless cookies that normally let you use certain websites more easily,
tracking cookies usually collect and report information about what websites you visit
and what you do at those websites.

Removing SexList.com:

you can run trial version of ExterminateIt, or remove SexList.com manually.


To completely manually remove SexList.com malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SexList.com.


Also Be Aware of the Following Threats:
AskCosmo Tracking Cookie Cleaner
Win32.Agent.ut Trojan Removal instruction
Praize Toolbar Cleaner

SillyDl.BCQ Downloader

Click here to remove SillyDl.BCQ malware
SillyDl.BCQ description:
SillyDl.BCQ Category:Downloader
This family of Trojans downloads and installs new malware or adware on the computer.
The downloader then either launches the new malware or registers it to enable autorun
according to the local operating system requirements.

The names and locations of malware to be downloaded are either coded into the
Trojan or downloaded from a specified website.

Removing SillyDl.BCQ:

you can run trial version of ExterminateIt, or remove SillyDl.BCQ manually.


To completely manually remove SillyDl.BCQ malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SillyDl.BCQ.


Also Be Aware of the Following Threats:
Remove OnTarget Backdoor
Rst.flip DoS Information
Remove Vxidl.APD Trojan

Bancos.GIE Trojan

Click here to remove Bancos.GIE malware
Bancos.GIE description:
Bancos.GIE Category:Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Removing Bancos.GIE:

you can run trial version of ExterminateIt, or remove Bancos.GIE manually.


To completely manually remove Bancos.GIE malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.GIE.


Also Be Aware of the Following Threats:
Bancos.HVA Trojan Information
Vxidl.ARM Trojan Removal

Agent.iw Trojan

Click here to remove Agent.iw malware
Agent.iw description:
Agent.iw Category:Trojan,Backdoor
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
Often the backdoor will not be visible in the log of active programs.

Removing Agent.iw:

you can run trial version of ExterminateIt, or remove Agent.iw manually.


To completely manually remove Agent.iw malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Agent.iw.


Also Be Aware of the Following Threats:
Igin Trojan Information
Zlob-X Trojan Symptoms
Bancos.FYA Trojan Removal instruction

Dipti Backdoor

Click here to remove Dipti malware
Dipti description:
Dipti Category:Backdoor,Hacker Tool
Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.

These utilities are designed to penetrate remote computers
in order to use them as zombies (by using backdoors) or to download other malicious programs to computer.

Exploits use vulnerabilities in operating systems and applications to achieve the same result.

Detection Dipti :

Dipti Files:
[%WINDOWS%]\system\dipti .exe
[%WINDOWS%]\system\dipti .exe

Removing Dipti:

you can run trial version of ExterminateIt, or remove Dipti manually.


To completely manually remove Dipti malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Dipti.


Also Be Aware of the Following Threats:
Removing PCBB Trojan

Ehg.chrysler.hitbox Tracking Cookie

Click here to remove Ehg.chrysler.hitbox malware
Ehg.chrysler.hitbox description:
Ehg.chrysler.hitbox Category:Tracking Cookie
Tracking cookies, like regular cookies, are small files that get deposited
onto your computer's hard drive as you browse the Internet.
Unlike harmless cookies that normally let you use certain websites more easily,
tracking cookies usually collect and report information about what websites you visit
and what you do at those websites.

Removing Ehg.chrysler.hitbox:

you can run trial version of ExterminateIt, or remove Ehg.chrysler.hitbox manually.


To completely manually remove Ehg.chrysler.hitbox malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Ehg.chrysler.hitbox.


Also Be Aware of the Following Threats:
Remove TrojanDownloader.906e Downloader
Removing Pigeon.AVTQ Trojan
Remove QZap113 Trojan
Pigeon.ENI Trojan Removal
LDPinch.Variant Trojan Symptoms

MSN.BigBot Trojan

Click here to remove MSN.BigBot malware
MSN.BigBot description:
MSN.BigBot Category:Trojan,Backdoor
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Backdoors combine the functionality of most other types of in one package.
Backdoors have one especially dangerous sub-class: variants that can propagate like worms.

Removing MSN.BigBot:

you can run trial version of ExterminateIt, or remove MSN.BigBot manually.


To completely manually remove MSN.BigBot malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with MSN.BigBot.


Also Be Aware of the Following Threats:
Remove OneKo Downloader
Removing W95.Invir.dr Trojan
Remove PCBB Trojan
WordMacro.Over.B:intended Trojan Removal instruction

WWW.frenchcum.com Tracking Cookie

Click here to remove WWW.frenchcum.com malware
WWW.frenchcum.com description:
WWW.frenchcum.com Category:Tracking Cookie
Tracking cookies, like regular cookies, are small files that get deposited
onto your computer's hard drive as you browse the Internet.
Unlike harmless cookies that normally let you use certain websites more easily,
tracking cookies usually collect and report information about what websites you visit
and what you do at those websites.

Removing WWW.frenchcum.com:

you can run trial version of ExterminateIt, or remove WWW.frenchcum.com manually.


To completely manually remove WWW.frenchcum.com malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with WWW.frenchcum.com.


Also Be Aware of the Following Threats:
Removing Panther Hacker Tool
Vanti Trojan Cleaner
Pigeon.EXD Trojan Information

Pigeon.AWS Trojan

Click here to remove Pigeon.AWS malware
Pigeon.AWS description:
Pigeon.AWS Category:Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Removing Pigeon.AWS:

you can run trial version of ExterminateIt, or remove Pigeon.AWS manually.


To completely manually remove Pigeon.AWS malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.AWS.


Also Be Aware of the Following Threats:
Removing Alien Trojan
Rybot Trojan Symptoms

CWS.MSConfig Hijacker

Click here to remove CWS.MSConfig malware
CWS.MSConfig description:
CWS.MSConfig Category:Hijacker
A Search hijacker redirects search results to other pages and may
transmit search and browsing data to unknown servers. An error page hijacker directs
the browser to another page, usually an advertising page, instead of the usual error
page when the requested URL is not found.

Detection CWS.MSConfig :

CWS.MSConfig Files:
[%SYSTEM%]\openme.htm
[%SYSTEM%]\openme.htm

Removing CWS.MSConfig:

you can run trial version of ExterminateIt, or remove CWS.MSConfig manually.


To completely manually remove CWS.MSConfig malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with CWS.MSConfig.


Also Be Aware of the Following Threats:
Dollflort Trojan Cleaner

Bancos.GZP Trojan

Click here to remove Bancos.GZP malware
Bancos.GZP description:
Bancos.GZP Category:Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Removing Bancos.GZP:

you can run trial version of ExterminateIt, or remove Bancos.GZP manually.


To completely manually remove Bancos.GZP malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.GZP.


Also Be Aware of the Following Threats:
Backdoor.Netbus Trojan Cleaner
Removing Small.gv Trojan

CrocoPop Adware

Click here to remove CrocoPop malware
CrocoPop description:
CrocoPop Category:Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits

Detection CrocoPop :

CrocoPop Files:
[%WINDOWS%]\crocopop32.exe
[%WINDOWS%]\crocopop32.exe

CrocoPop Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing CrocoPop:

you can run trial version of ExterminateIt, or remove CrocoPop manually.


To completely manually remove CrocoPop malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with CrocoPop.


Also Be Aware of the Following Threats:
Remove NoCreditCard Adware
Removing Vxidl.BBV Trojan