Wednesday, February 4, 2009

mpsa.com Tracking Cookie

Click here to remove mpsa.com malware
mpsa.com description:
mpsa.com Category:Tracking Cookie
Tracking cookies, like regular cookies, are small files that get deposited
onto your computer's hard drive
as you browse the Internet.
Unlike harmless cookies that normally let you use certain websites more easily,
tracking cookies usually collect and report information about what websites you visit
and what you do at those websites.

If you fill out forms online with your real name and contact information,
click on banners and then purchase an item, or fill out sweepstakes or contests forms,
then it's possible that major online advertisers know your name and have associated it
with your IP address and other information.

Removing mpsa.com:

you can run trial version of ExterminateIt, or remove mpsa.com manually.


To completely manually remove mpsa.com malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with mpsa.com.


Also Be Aware of the Following Threats:
Locksky.ab Trojan Cleaner
Bancos.HNX Trojan Removal

Yaptaf Trojan

Click here to remove Yaptaf malware
Yaptaf description:
Yaptaf Category:Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Removing Yaptaf:

you can run trial version of ExterminateIt, or remove Yaptaf manually.


To completely manually remove Yaptaf malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Yaptaf.


Also Be Aware of the Following Threats:
Win32.Sepuc Trojan Information
Win.KaBoom Trojan Information
Removing SubCracker Trojan
ESDIexplorr Adware Removal

Tuesday, February 3, 2009

Dados Backdoor

Click here to remove Dados malware
Dados description:
Dados Category:Backdoor
Backdoors combine the functionality of most other types of in one package.
Backdoors have one especially dangerous sub-class: variants that can propagate like worms.

Removing Dados:

you can run trial version of ExterminateIt, or remove Dados manually.


To completely manually remove Dados malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Dados.


Also Be Aware of the Following Threats:
MPower Adware Information
Bancos.HYP Trojan Removal
Godmessage.IV.Creator Trojan Symptoms
ExtraToolbar Toolbar Cleaner
Kruszynka.Porn Adware Cleaner

Adsense.Helper.Object Adware

Click here to remove Adsense.Helper.Object malware
Adsense.Helper.Object description:
Adsense.Helper.Object Category:Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits

Detection Adsense.Helper.Object :

Adsense.Helper.Object Folders:
[%PROGRAM_FILES%]\Adsense Helper Object

Adsense.Helper.Object Registry Keys:
HKEY_CLASSES_ROOT\clsid\{b313d637-f405-4052-ac37-e2119ab3c8f8}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\ browser helper objects\{b313d637-f405-4052-ac37-e2119ab3c8f8}

Removing Adsense.Helper.Object:

you can run trial version of ExterminateIt, or remove Adsense.Helper.Object manually.


To completely manually remove Adsense.Helper.Object malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Adsense.Helper.Object.


Also Be Aware of the Following Threats:
Bugshell Trojan Removal instruction
Removing Bancos.HXV Trojan
Vxidl.ABB Trojan Cleaner
Bloopfit Trojan Symptoms
CK.VXE Trojan Cleaner

REA2 Backdoor

Click here to remove REA2 malware
REA2 description:
REA2 Category:Backdoor,RAT
Backdoors combine the functionality of most other types of in one package.
Backdoors have one especially dangerous sub-class: variants that can propagate like worms.

Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.

Removing REA2:

you can run trial version of ExterminateIt, or remove REA2 manually.


To completely manually remove REA2 malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with REA2.


Also Be Aware of the Following Threats:
Backdoor.AcidShiver Trojan Symptoms
W95.Segax Trojan Cleaner
SillyDl.BBW Downloader Cleaner

Dowque.AAU Trojan

Click here to remove Dowque.AAU malware
Dowque.AAU description:
Dowque.AAU Category:Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Removing Dowque.AAU:

you can run trial version of ExterminateIt, or remove Dowque.AAU manually.


To completely manually remove Dowque.AAU malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Dowque.AAU.


Also Be Aware of the Following Threats:
Remove One.of.the.last.Trojans.modified RAT
Vxidl.ATU Trojan Removal instruction

VirusLocker Ransomware

Click here to remove VirusLocker malware
VirusLocker description:
VirusLocker Category:Ransomware
A cryptovirus, cryptotrojan or cryptoworm is a type of
malware that encrypts the data belonging to an individual on a computer,
demanding a ransom for its restoration.

The term ransomware is commonly used to describe software that encrypts the data
belonging to an individual on a computer, demanding a ransom for its restoration.
Although the field known as cryptovirology predates the term "ransomware".

Detection VirusLocker :

VirusLocker Files:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusLocker 3.1.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusLocker 3.3.lnk
[%DESKTOP%]\VirusLocker.lnk
[%PROGRAM_FILES%]\VirusLocker\VirusLocker.exe
[%STARTMENU%]\VirusLocker 3.1.lnk
[%STARTMENU%]\VirusLocker 3.3.lnk
[%STARTMENU%]\VirusLocker 3.4.lnk
[%DESKTOP%]\VirusLocker.lnk
[%PROGRAMS%]\VirusLocker\Uninstall VirusLocker 3.3.lnk
[%PROGRAMS%]\VirusLocker\VirusLocker 3.3 Website.lnk
[%PROGRAMS%]\VirusLocker\VirusLocker 3.3.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusLocker 3.1.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusLocker 3.3.lnk
[%DESKTOP%]\VirusLocker.lnk
[%PROGRAM_FILES%]\VirusLocker\VirusLocker.exe
[%STARTMENU%]\VirusLocker 3.1.lnk
[%STARTMENU%]\VirusLocker 3.3.lnk
[%STARTMENU%]\VirusLocker 3.4.lnk
[%DESKTOP%]\VirusLocker.lnk
[%PROGRAMS%]\VirusLocker\Uninstall VirusLocker 3.3.lnk
[%PROGRAMS%]\VirusLocker\VirusLocker 3.3 Website.lnk
[%PROGRAMS%]\VirusLocker\VirusLocker 3.3.lnk

VirusLocker Folders:
[%COMMON_PROGRAMS%]\VirusLocker
[%PROGRAMS%]\VirusLocker
[%PROGRAM_FILES%]\VirusLocker

VirusLocker Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{979D896F-B47E-5D13-0D66-3DC25B122BF9}
HKEY_CLASSES_ROOT\Interface\{09D39780-1BBE-4D24-BDC7-9BE0B3B74F38}
HKEY_CLASSES_ROOT\Interface\{0E7BD9EA-1498-4961-A006-C86490194626}
HKEY_CLASSES_ROOT\Interface\{174805D2-C7EC-45B5-BD41-4B9F1B553144}
HKEY_CLASSES_ROOT\Interface\{2A009EBE-5493-415E-BEB9-81A1CFD6BD40}
HKEY_CLASSES_ROOT\Interface\{2D54F59C-5CC3-423A-9745-7F0B09049533}
HKEY_CLASSES_ROOT\Interface\{39D78623-1934-4B69-8F38-F3C11F12D85E}
HKEY_CLASSES_ROOT\Interface\{52C377BC-E3C9-43A6-9C6B-3D430C49EBF8}
HKEY_CLASSES_ROOT\Interface\{570C919E-92DA-4CAD-9153-F7BED05F675B}
HKEY_CLASSES_ROOT\Interface\{690E5D1E-CB12-47BC-9DA8-A0BD450B52F8}
HKEY_CLASSES_ROOT\Interface\{AEE402D2-A5DC-4AE2-B88A-413A505B67C2}
HKEY_CLASSES_ROOT\Interface\{B98F725D-1CD5-4EF2-B253-CD4553951EAA}
HKEY_CLASSES_ROOT\Interface\{D1642ABC-1B14-4B55-98BC-F735006390AD}
HKEY_CLASSES_ROOT\Interface\{D59FD0FC-89BC-4FEF-A2F1-8BC154466FC9}
HKEY_CLASSES_ROOT\Interface\{DC08C6E2-1A55-4DEA-935C-AE655CD6E63C}
HKEY_CLASSES_ROOT\Interface\{EB32A1F3-112C-410E-82CA-6B2748091624}
HKEY_CLASSES_ROOT\Interface\{F8AF6995-BB2B-423E-8F46-6A06732B476D}
HKEY_CLASSES_ROOT\TypeLib\{AF559AB0-E52B-44A8-9AC9-624902865B81}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\VirusLocker.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\VirusLocker
HKEY_LOCAL_MACHINE\SOFTWARE\VirusLocker
HKEY_CLASSES_ROOT\clsid\{979d896f-b47e-5d13-0d66-3dc25b122bf9}
HKEY_CLASSES_ROOT\interface\{0929176f-cb7d-4f1a-9e3e-9380f94b210b}
HKEY_CLASSES_ROOT\interface\{30599ca3-d7e4-4a38-9826-84d5a02813a8}
HKEY_CLASSES_ROOT\interface\{42ab5a3c-db89-452b-8e8e-cbdebd94524d}
HKEY_CLASSES_ROOT\interface\{4db7978d-79de-416b-8618-f5b269068747}
HKEY_CLASSES_ROOT\interface\{64cf952e-a574-4145-a9bf-b7e09fba934f}
HKEY_CLASSES_ROOT\interface\{64eebbfe-6817-4ba3-be1d-50b7695c5718}
HKEY_CLASSES_ROOT\interface\{6c3fa257-57f7-4d8d-8c9a-f751f534db01}
HKEY_CLASSES_ROOT\interface\{731334e1-4ffb-474b-b977-caa8bb6a2242}
HKEY_CLASSES_ROOT\interface\{80278229-a901-49ad-9416-e39645697cd8}
HKEY_CLASSES_ROOT\interface\{8ccfb7b6-0291-48dc-b24c-5c6d26316aab}
HKEY_CLASSES_ROOT\interface\{aaffe764-dcaf-4631-9c5a-2c9e7298a112}
HKEY_CLASSES_ROOT\interface\{c3ee9066-62e7-4606-9330-5d35391c2fa4}
HKEY_CLASSES_ROOT\interface\{ca97b783-d930-435c-8080-6bf800743e61}
HKEY_CLASSES_ROOT\interface\{de960a2a-a5e3-4356-884c-1a8c08768371}
HKEY_CLASSES_ROOT\interface\{e2b8a83d-7924-424a-82c9-44eda18ff672}
HKEY_CLASSES_ROOT\interface\{ed42f708-e3dc-48f1-b29c-88bf93b97afd}
HKEY_CLASSES_ROOT\typelib\{1cae9045-f188-4840-8a70-b5e135fe044e}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app paths\viruslocker.exe
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\viruslocker
HKEY_LOCAL_MACHINE\software\viruslocker

VirusLocker Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\software\microsoft\windows\shellnoroam\muicache
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing VirusLocker:

you can run trial version of ExterminateIt, or remove VirusLocker manually.


To completely manually remove VirusLocker malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with VirusLocker.


Also Be Aware of the Following Threats:
Fluxay.9!Setup Backdoor Removal
Remove Rbot.gen Backdoor

KBL.Uploader Downloader

Click here to remove KBL.Uploader malware
KBL.Uploader description:
KBL.Uploader Category:Downloader,Hacker Tool
The downloader either launches the new malware or registers it to enable autorun
according to the local operating system requirements.
These utilities are designed to penetrate remote computers
in order to use them as zombies (by using backdoors) or to download other malicious programs to computer.

Exploits use vulnerabilities in operating systems and applications to achieve the same result.

Removing KBL.Uploader:

you can run trial version of ExterminateIt, or remove KBL.Uploader manually.


To completely manually remove KBL.Uploader malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with KBL.Uploader.


Also Be Aware of the Following Threats:
Removing Bat.FormatCQU Trojan
Remove Undetected Trojan
Pigeon.AEL Trojan Information

statistici.ro Tracking Cookie

Click here to remove statistici.ro malware
statistici.ro description:
statistici.ro Category:Tracking Cookie
Tracking cookies, like regular cookies, are small files that get deposited
onto your computer's hard drive
as you browse the Internet.
Unlike harmless cookies that normally let you use certain websites more easily,
tracking cookies usually collect and report information about what websites you visit
and what you do at those websites.

If you fill out forms online with your real name and contact information,
click on banners and then purchase an item, or fill out sweepstakes or contests forms,
then it's possible that major online advertisers know your name and have associated it
with your IP address and other information.

Removing statistici.ro:

you can run trial version of ExterminateIt, or remove statistici.ro manually.


To completely manually remove statistici.ro malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with statistici.ro.


Also Be Aware of the Following Threats:
CashBar Adware Removal instruction
Yafo Trojan Information

SlyDude Trojan

Click here to remove SlyDude malware
SlyDude description:
SlyDude Category:Trojan,Backdoor,Hacker Tool
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
They function in the same way as legal remote administration programs used by system administrators.
This makes them difficult to detect.

Backdoors are installed and launched without the consent of the user of computer.
Often the backdoor will not be visible in the log of active programs.

Once a backdoor has been successfully launched, the computer is wide open.
Backdoor functions can include:


  • Launching/ deleting files

  • Sending/ receiving files

  • Deleting data

  • Displaying notification

  • Rebooting the machine

  • Executing files




Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.
Backdoors combine the functionality of most other types of in one package.

Backdoors have one especially dangerous sub-class: variants that can propagate like worms.
These utilities are designed to penetrate remote computers
in order to use them as zombies (by using backdoors) or to download other malicious programs to computer.

Exploits use vulnerabilities in operating systems and applications to achieve the same result.

Removing SlyDude:

you can run trial version of ExterminateIt, or remove SlyDude manually.


To completely manually remove SlyDude malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SlyDude.


Also Be Aware of the Following Threats:
Remove Win32.KillMF Trojan
IRC.Bircd Backdoor Removal instruction

Bancos.IDR Trojan

Click here to remove Bancos.IDR malware
Bancos.IDR description:
Bancos.IDR Category:Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Removing Bancos.IDR:

you can run trial version of ExterminateIt, or remove Bancos.IDR manually.


To completely manually remove Bancos.IDR malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.IDR.


Also Be Aware of the Following Threats:
Arb.bytefusion.pl DoS Removal

Wineatea Downloader

Click here to remove Wineatea malware
Wineatea description:
Wineatea Category:Downloader
The downloader either launches the new malware or registers it to enable autorun
according to the local operating system requirements.

Detection Wineatea :

Wineatea Registry Keys:
HKEY_LOCAL_MACHINE\software\wildmedia

Removing Wineatea:

you can run trial version of ExterminateIt, or remove Wineatea manually.


To completely manually remove Wineatea malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Wineatea.


Also Be Aware of the Following Threats:
FakeBlueScreen Trojan Symptoms
Checkin Adware Cleaner
Zlob.Fam.Image Addon Trojan Removal instruction

SillyDl.CAX Trojan

Click here to remove SillyDl.CAX malware
SillyDl.CAX description:
SillyDl.CAX Category:Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Removing SillyDl.CAX:

you can run trial version of ExterminateIt, or remove SillyDl.CAX manually.


To completely manually remove SillyDl.CAX malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SillyDl.CAX.


Also Be Aware of the Following Threats:
Pigeon.EIX Trojan Cleaner
Remove KeyToPorn Trojan

ThumbSnatcher Adware

Click here to remove ThumbSnatcher malware
ThumbSnatcher description:
ThumbSnatcher Category:Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits

Detection ThumbSnatcher :

ThumbSnatcher Files:
[%SYSTEM%]\gdiplus64.dll
[%SYSTEM%]\myaccess.dll
[%SYSTEM%]\gdiplus64.dll
[%SYSTEM%]\myaccess.dll

ThumbSnatcher Registry Keys:
HKEY_CLASSES_ROOT\clsid\{fa79fa22-8db3-43d1-997b-6dbfd8845569}
HKEY_CLASSES_ROOT\interface\{8522fd29-4d5f-4377-b4d6-b832954a7932}
HKEY_CLASSES_ROOT\popupper.popup
HKEY_CLASSES_ROOT\popupper.popup.1
HKEY_CLASSES_ROOT\typelib\{ece19baa-a2b5-4e77-9197-574b9873718c}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{fa79fa22-8db3-43d1-997b-6dbfd8845569}

Removing ThumbSnatcher:

you can run trial version of ExterminateIt, or remove ThumbSnatcher manually.


To completely manually remove ThumbSnatcher malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with ThumbSnatcher.


Also Be Aware of the Following Threats:
Pigeon.ARN Trojan Cleaner
Advert Trojan Removal
Removing Pigeon.ECL Trojan
Removing Marawi Trojan
Removing swiftnews.com Tracking Cookie

TrojanSpy.Win32.Delf Trojan

Click here to remove TrojanSpy.Win32.Delf malware
TrojanSpy.Win32.Delf description:
TrojanSpy.Win32.Delf Category:Trojan,Spyware,Hacker Tool
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Spyware programs can collect various types of personal information,
such as Internet surfing habit, sites that have been visited,
but can also interfere with user control of the computer in other ways,
such as installing additional software, redirecting Web browser activity,
accessing websites blindly that will cause more harmful viruses,
or diverting advertising revenue to a third party.
These utilities are designed to penetrate remote computers
in order to use them as zombies (by using backdoors) or to download other malicious programs to computer.

Exploits use vulnerabilities in operating systems and applications to achieve the same result.

Removing TrojanSpy.Win32.Delf:

you can run trial version of ExterminateIt, or remove TrojanSpy.Win32.Delf manually.


To completely manually remove TrojanSpy.Win32.Delf malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with TrojanSpy.Win32.Delf.


Also Be Aware of the Following Threats:
WebRSH RAT Cleaner
Remove Namaz Trojan
Yazzle.Snowball.Wars Adware Symptoms
JS.Seeker.Generic Trojan Cleaner

SillyDl.CYV Trojan

Click here to remove SillyDl.CYV malware
SillyDl.CYV description:
SillyDl.CYV Category:Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Detection SillyDl.CYV :

SillyDl.CYV Files:
[%PROFILE_TEMP%]\poolsv.exe
[%WINDOWS%]\poolsv.exe
[%PROFILE_TEMP%]\poolsv.exe
[%WINDOWS%]\poolsv.exe

SillyDl.CYV Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing SillyDl.CYV:

you can run trial version of ExterminateIt, or remove SillyDl.CYV manually.


To completely manually remove SillyDl.CYV malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SillyDl.CYV.


Also Be Aware of the Following Threats:
Arsd Trojan Removal
Pigeon.AXA Trojan Symptoms
Pigeon.EZX Trojan Removal instruction
Removing JPing DoS
Trb.Tracking.Cookie Tracking Cookie Cleaner

Ashley.100d Trojan

Click here to remove Ashley.100d malware
Ashley.100d description:
Ashley.100d Category:Trojan,Backdoor,RAT
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.

Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.

Removing Ashley.100d:

you can run trial version of ExterminateIt, or remove Ashley.100d manually.


To completely manually remove Ashley.100d malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Ashley.100d.


Also Be Aware of the Following Threats:
Delf.dg Trojan Removal instruction
Remove Pigeon.ERS Trojan

Lookup.Chgrgs BHO

Click here to remove Lookup.Chgrgs malware
Lookup.Chgrgs description:
Lookup.Chgrgs Category:BHO,Hijacker
As this information is entered by the user, it is captured by the BHO (Browser Helper Object) and
sent back to the attacker.
Typically, keyloggers of this type will send the stolen information back to the attacker via email
or HTTP POST, which can appear suspicious.Hijackers are software programs that modify users' default browser home page,
search settings, error page settings, or desktop wallpaper without adequate notice, disclosure,
or user consent.

When the default home page is hijacked, the browser opens to the web page set by the hijacker
instead of the user's designated home page. In some cases, the hijacker may block users from
restoring their desired home page.

A search hijacker redirects search results to other pages and may
transmit search and browsing data to unknown servers. An error page hijacker directs
the browser to another page, usually an advertising page, instead of the usual error
page when the requested URL is not found.

A desktop hijacker replaces the desktop wallpaper with advertising
for products and services on the desktop.

Hijackers take control of various parts of your web browser, including your home page,
search pages, and search bar. They may also redirect you to certain sites should you
mistype an address or prevent you from going to a website they would rather you not,
such as sites that combat malware. Some will even redirect you to their own search engine
when you attempt a search. NB: hijackers almost exclusively target Internet Explorer.

Detection Lookup.Chgrgs :

Lookup.Chgrgs Files:
[%SYSTEM%]\chgrgs.dll
[%WINDOWS%]\system\chgrgs.dll
[%SYSTEM%]\chgrgs.dll
[%WINDOWS%]\system\chgrgs.dll

Lookup.Chgrgs Registry Keys:
HKEY_CLASSES_ROOT\clsid\{35cc7369-c6eb-4a64-ab05-44cf0b5087a0}
HKEY_CLASSES_ROOT\clsid\{c82b55f0-60e0-478c-bc55-e4e22f11301d}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{35cc7369-c6eb-4a64-ab05-44cf0b5087a0}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{c82b55f0-60e0-478c-bc55-e4e22f11301d}
HKEY_LOCAL_MACHINE\software\classes\clsid\{35cc7369-c6eb-4a64-ab05-44cf0b5087a0}
HKEY_LOCAL_MACHINE\software\classes\clsid\{c82b55f0-60e0-478c-bc55-e4e22f11301d}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{35cc7369-c6eb-4a64-ab05-44cf0b5087a0}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{c82b55f0-60e0-478c-bc55-e4e22f11301d}

Removing Lookup.Chgrgs:

you can run trial version of ExterminateIt, or remove Lookup.Chgrgs manually.


To completely manually remove Lookup.Chgrgs malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Lookup.Chgrgs.


Also Be Aware of the Following Threats:
VB.vs Downloader Information
SillyDl.COZ Trojan Removal
Vxidl.AZY Trojan Symptoms
Remove Small.Muldrop Adware

Monday, February 2, 2009

Cyn.02a Backdoor

Click here to remove Cyn.02a malware
Cyn.02a description:
Cyn.02a Category:Backdoor,RAT
Backdoors combine the functionality of most other types of in one package.
Backdoors have one especially dangerous sub-class: variants that can propagate like worms.

Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.

Removing Cyn.02a:

you can run trial version of ExterminateIt, or remove Cyn.02a manually.


To completely manually remove Cyn.02a malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Cyn.02a.


Also Be Aware of the Following Threats:
Backdoor.EggDrop Backdoor Removal
PSW.VB.aq Trojan Information

Disnet Trojan

Click here to remove Disnet malware
Disnet description:
Disnet Category:Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Removing Disnet:

you can run trial version of ExterminateIt, or remove Disnet manually.


To completely manually remove Disnet malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Disnet.


Also Be Aware of the Following Threats:
Remove Bancos.GTF Trojan

DF.Dropper Trojan

Click here to remove DF.Dropper malware
DF.Dropper description:
DF.Dropper Category:Trojan,Backdoor,Downloader,DoS
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
Often the backdoor will not be visible in the log of active programs.
This family of Trojans downloads and installs new malware or adware on the computer.
The downloader then either launches the new malware or registers it to enable autorun
according to the local operating system requirements.

The names and locations of malware to be downloaded are either coded into the
Trojan or downloaded from a specified website.
These programs attack web servers by sending numerous requests to the specified server,
often causing it to crash under an excessive volume of requests.

DoS trojans conduct such attacks from a single computer with the consent of the user.

Worms can carry a DoS procedure as part of their payload.

Removing DF.Dropper:

you can run trial version of ExterminateIt, or remove DF.Dropper manually.


To completely manually remove DF.Dropper malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with DF.Dropper.


Also Be Aware of the Following Threats:
Makenmom Downloader Symptoms
Remove Sphere Backdoor

SillyDl.CHF Trojan

Click here to remove SillyDl.CHF malware
SillyDl.CHF description:
SillyDl.CHF Category:Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Removing SillyDl.CHF:

you can run trial version of ExterminateIt, or remove SillyDl.CHF manually.


To completely manually remove SillyDl.CHF malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SillyDl.CHF.


Also Be Aware of the Following Threats:
Wraith DoS Information

Win32.IISXploit!Trojan Trojan

Click here to remove Win32.IISXploit!Trojan malware
Win32.IISXploit!Trojan description:
Win32.IISXploit!Trojan Category:Trojan,Backdoor,Downloader,DoS
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Backdoors combine the functionality of most other types of in one package.
Backdoors have one especially dangerous sub-class: variants that can propagate like worms.

This family of Trojans downloads and installs new malware or adware on the computer.
The downloader then either launches the new malware or registers it to enable autorun
according to the local operating system requirements.

The names and locations of malware to be downloaded are either coded into the
Trojan or downloaded from a specified website.
DoS trojans conduct attacks from a single computer with the consent of the user.

Removing Win32.IISXploit!Trojan:

you can run trial version of ExterminateIt, or remove Win32.IISXploit!Trojan manually.


To completely manually remove Win32.IISXploit!Trojan malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Win32.IISXploit!Trojan.


Also Be Aware of the Following Threats:
Remove Active.Delivery Downloader
Nagtune Trojan Symptoms

FMSZ Trojan

Click here to remove FMSZ malware
FMSZ description:
FMSZ Category:Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Detection FMSZ :

FMSZ Files:
[%WINDOWS%]\fmsz.exe
[%WINDOWS%]\fmsz.exe

FMSZ Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing FMSZ:

you can run trial version of ExterminateIt, or remove FMSZ manually.


To completely manually remove FMSZ malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with FMSZ.


Also Be Aware of the Following Threats:
Zombie.version RAT Removal
Removing ESP Trojan

Vxidl.AZM Trojan

Click here to remove Vxidl.AZM malware
Vxidl.AZM description:
Vxidl.AZM Category:Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Removing Vxidl.AZM:

you can run trial version of ExterminateIt, or remove Vxidl.AZM manually.


To completely manually remove Vxidl.AZM malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Vxidl.AZM.


Also Be Aware of the Following Threats:
Remove JScript.NetMonn Trojan
Small.cgy Downloader Information
Bouffetroyen RAT Removal instruction
HLLP.Venta Trojan Information
Remove BAT.FF23 Trojan

A4Zeta.Beta RAT

Click here to remove A4Zeta.Beta malware
A4Zeta.Beta description:
A4Zeta.Beta Category:RAT
Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.

Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on
April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack.
They usually do whimsical things like flip the screen upside-down, open the CD-ROM tray,
and swap mouse buttons. However, they can be quite hard to remove.

Removing A4Zeta.Beta:

you can run trial version of ExterminateIt, or remove A4Zeta.Beta manually.


To completely manually remove A4Zeta.Beta malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with A4Zeta.Beta.


Also Be Aware of the Following Threats:
Vxidl.AFX Trojan Cleaner
Yarner.A@mm Trojan Cleaner

Deus.Cleaner Ransomware

Click here to remove Deus.Cleaner malware
Deus.Cleaner description:
Deus.Cleaner Category:Ransomware
A cryptovirus, cryptotrojan or cryptoworm is a type of
malware that encrypts the data belonging to an individual on a computer,
demanding a ransom for its restoration.

The term ransomware is commonly used to describe software that encrypts the data
belonging to an individual on a computer, demanding a ransom for its restoration.
Although the field known as cryptovirology predates the term "ransomware".

Detection Deus.Cleaner :

Deus.Cleaner Files:
[%COMMON_DESKTOPDIRECTORY%]\Deus Cleaner.lnk
[%COMMON_DESKTOPDIRECTORY%]\Deus Cleaner.lnk

Deus.Cleaner Folders:
[%COMMON_PROGRAMS%]\Deus Cleaner
[%PROGRAM_FILES%]\Deus Cleaner

Deus.Cleaner Registry Keys:
HKEY_CLASSES_ROOT\*\shellex\contextmenuhandlers\deus cleaner
HKEY_CLASSES_ROOT\clsid\{f3175b35-99ce-4297-a7e1-292562dd7af3}
HKEY_CLASSES_ROOT\directory\shellex\contextmenuhandlers\deus cleaner
HKEY_CLASSES_ROOT\sdmodul.secure delete with deus cleaner
HKEY_CURRENT_USER\software\deus cleaner
HKEY_LOCAL_MACHINE\software\deus cleaner
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\deus cleaner_is1

Deus.Cleaner Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shell extensions\approved

Removing Deus.Cleaner:

you can run trial version of ExterminateIt, or remove Deus.Cleaner manually.


To completely manually remove Deus.Cleaner malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Deus.Cleaner.


Also Be Aware of the Following Threats:
WPCB Trojan Symptoms

Excel.Yohimbe Trojan

Click here to remove Excel.Yohimbe malware
Excel.Yohimbe description:
Excel.Yohimbe Category:Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Detection Excel.Yohimbe :

Excel.Yohimbe Files:
[%DESKTOP%]\USB Drive\Tetrinet\TETRINET.TXT
[%DESKTOP%]\USB Drive\Tetrinet\TETRINET.TXT

Removing Excel.Yohimbe:

you can run trial version of ExterminateIt, or remove Excel.Yohimbe manually.


To completely manually remove Excel.Yohimbe malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Excel.Yohimbe.


Also Be Aware of the Following Threats:
W95.Sill.cav Trojan Removal instruction
Vxidl.AGA Trojan Cleaner

Bancos.FXL Trojan

Click here to remove Bancos.FXL malware
Bancos.FXL description:
Bancos.FXL Category:Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Removing Bancos.FXL:

you can run trial version of ExterminateIt, or remove Bancos.FXL manually.


To completely manually remove Bancos.FXL malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Bancos.FXL.


Also Be Aware of the Following Threats:
Removing Frethog.AEX Trojan
Removing BAT.Paisak Trojan
Removing Bizdup Trojan

Pigeon.FAW Trojan

Click here to remove Pigeon.FAW malware
Pigeon.FAW description:
Pigeon.FAW Category:Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Removing Pigeon.FAW:

you can run trial version of ExterminateIt, or remove Pigeon.FAW manually.


To completely manually remove Pigeon.FAW malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.FAW.


Also Be Aware of the Following Threats:
MBS Bill (Micro Bill Systems) Trojan Symptoms

KeyHook Trojan

Click here to remove KeyHook malware
KeyHook description:
KeyHook Category:Trojan,Spyware,Backdoor,Hacker Tool
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Spyware programs can collect various types of personal information,
such as Internet surfing habit, sites that have been visited,
but can also interfere with user control of the computer in other ways,
such as installing additional software, redirecting Web browser activity,
accessing websites blindly that will cause more harmful viruses,
or diverting advertising revenue to a third party.
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
They function in the same way as legal remote administration programs used by system administrators.
This makes them difficult to detect.

Backdoors are installed and launched without the consent of the user of computer.
Often the backdoor will not be visible in the log of active programs.

Once a backdoor has been successfully launched, the computer is wide open.
Backdoor functions can include:


  • Launching/ deleting files

  • Sending/ receiving files

  • Deleting data

  • Displaying notification

  • Rebooting the machine

  • Executing files




Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.
Backdoors combine the functionality of most other types of in one package.

Backdoors have one especially dangerous sub-class: variants that can propagate like worms.
These utilities are designed to penetrate remote computers
in order to use them as zombies (by using backdoors) or to download other malicious programs to computer.

Exploits use vulnerabilities in operating systems and applications to achieve the same result.

Removing KeyHook:

you can run trial version of ExterminateIt, or remove KeyHook manually.


To completely manually remove KeyHook malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with KeyHook.


Also Be Aware of the Following Threats:
Tenumax Downloader Symptoms
Remove Ice.Storm.Killerz RAT
Removing Telefoon Trojan

Win.TheKill Trojan

Click here to remove Win.TheKill malware
Win.TheKill description:
Win.TheKill Category:Trojan,Backdoor
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Backdoors combine the functionality of most other types of in one package.
Backdoors have one especially dangerous sub-class: variants that can propagate like worms.

Removing Win.TheKill:

you can run trial version of ExterminateIt, or remove Win.TheKill manually.


To completely manually remove Win.TheKill malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Win.TheKill.


Also Be Aware of the Following Threats:
Win32.Skoob Trojan Removal
Bancos.FYI Trojan Cleaner
Fula Trojan Information

Rotate Trojan

Click here to remove Rotate malware
Rotate description:
Rotate Category:Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Removing Rotate:

you can run trial version of ExterminateIt, or remove Rotate manually.


To completely manually remove Rotate malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Rotate.


Also Be Aware of the Following Threats:
Bancos.HOL Trojan Information

Apher.gen Downloader

Click here to remove Apher.gen malware
Apher.gen description:
Apher.gen Category:Downloader
The downloader either launches the new malware or registers it to enable autorun
according to the local operating system requirements.

Removing Apher.gen:

you can run trial version of ExterminateIt, or remove Apher.gen manually.


To completely manually remove Apher.gen malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Apher.gen.


Also Be Aware of the Following Threats:
Removing EZ.Killa Trojan

Sunday, February 1, 2009

TrojanProxy.Win32.Cidra Backdoor

Click here to remove TrojanProxy.Win32.Cidra malware
TrojanProxy.Win32.Cidra description:
TrojanProxy.Win32.Cidra Category:Backdoor,Hacker Tool
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
They function in the same way as legal remote administration programs used by system administrators.
This makes them difficult to detect.

Backdoors are installed and launched without the consent of the user of computer.
Often the backdoor will not be visible in the log of active programs.

Once a backdoor has been successfully launched, the computer is wide open.
Backdoor functions can include:


  • Launching/ deleting files

  • Sending/ receiving files

  • Deleting data

  • Displaying notification

  • Rebooting the machine

  • Executing files




Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.
Backdoors combine the functionality of most other types of in one package.

Backdoors have one especially dangerous sub-class: variants that can propagate like worms.
These utilities are designed to penetrate remote computers
in order to use them as zombies (by using backdoors) or to download other malicious programs to computer.

Exploits use vulnerabilities in operating systems and applications to achieve the same result.

Detection TrojanProxy.Win32.Cidra :

TrojanProxy.Win32.Cidra Files:
[%SYSTEM%]\usb_d.exe
[%SYSTEM%]\usb_d.exe

TrojanProxy.Win32.Cidra Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing TrojanProxy.Win32.Cidra:

you can run trial version of ExterminateIt, or remove TrojanProxy.Win32.Cidra manually.


To completely manually remove TrojanProxy.Win32.Cidra malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with TrojanProxy.Win32.Cidra.


Also Be Aware of the Following Threats:
APS Trojan Removal

SillyDl.DOV Trojan

Click here to remove SillyDl.DOV malware
SillyDl.DOV description:
SillyDl.DOV Category:Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Removing SillyDl.DOV:

you can run trial version of ExterminateIt, or remove SillyDl.DOV manually.


To completely manually remove SillyDl.DOV malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with SillyDl.DOV.


Also Be Aware of the Following Threats:
Marlo Trojan Removal instruction

Pigeon.AOB Trojan

Click here to remove Pigeon.AOB malware
Pigeon.AOB description:
Pigeon.AOB Category:Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Removing Pigeon.AOB:

you can run trial version of ExterminateIt, or remove Pigeon.AOB manually.


To completely manually remove Pigeon.AOB malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.AOB.


Also Be Aware of the Following Threats:
ZombGet Trojan Information
Bancos.HVA Trojan Symptoms
Retribution.Command.Centre Backdoor Symptoms

Pigeon.ANY Trojan

Click here to remove Pigeon.ANY malware
Pigeon.ANY description:
Pigeon.ANY Category:Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Removing Pigeon.ANY:

you can run trial version of ExterminateIt, or remove Pigeon.ANY manually.


To completely manually remove Pigeon.ANY malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Pigeon.ANY.


Also Be Aware of the Following Threats:
Mystic Trojan Symptoms
Akl2 Spyware Information
Remove realtechnetwork.net Tracking Cookie
Dir Trojan Information

adblock Adware

Click here to remove adblock malware
adblock description:
adblock Category:Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits

Removing adblock:

you can run trial version of ExterminateIt, or remove adblock manually.


To completely manually remove adblock malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with adblock.


Also Be Aware of the Following Threats:
Devil's.Dance Trojan Removal
StartPage.bx Hijacker Removal
Remove Banker.abs Trojan

Win32.Qoologic Trojan

Click here to remove Win32.Qoologic malware
Win32.Qoologic description:
Win32.Qoologic Category:Trojan,Downloader
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Trojans-downloaders downloads and installs new malware or adware on the computer.

Detection Win32.Qoologic :

Win32.Qoologic Files:
[%PROFILE_TEMP%]\tp7543.exe
[%SYSTEM%]\paquk.dat
[%WINDOWS%]\installer_251.exe
[%WINDOWS%]\unwn.exe
[%WINDOWS%]\adolib32.dll
[%PROFILE_TEMP%]\tp7543.exe
[%SYSTEM%]\paquk.dat
[%WINDOWS%]\installer_251.exe
[%WINDOWS%]\unwn.exe
[%WINDOWS%]\adolib32.dll

Win32.Qoologic Registry Keys:
HKEY_CLASSES_ROOT\clsid\{ce3a44d8-bc88-4d62-a890-42d96245f8d6}
HKEY_CLASSES_ROOT\folder\shellex\columnhandlers\{ce3a44d8-bc88-4d62-a890-42d96245f8d6}
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Extensions\{4ABF810A-F11D-4169-9D5F-7D274F2270A1}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\extensions\{4abf810a-f11d-4169-9d5f-7d274f2270a1}

Removing Win32.Qoologic:

you can run trial version of ExterminateIt, or remove Win32.Qoologic manually.


To completely manually remove Win32.Qoologic malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Win32.Qoologic.


Also Be Aware of the Following Threats:
Rslocal Trojan Removal instruction
Sheep.Goat.14K Backdoor Information
Pigeon.EBX Trojan Removal
MetaSearch Adware Symptoms

Zlob.Fake Security Alerts Trojan

Click here to remove Zlob.Fake Security Alerts malware
Zlob.Fake Security Alerts description:
Zlob.Fake Security Alerts Category:Trojan,Popups
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
The pop-ups generally will not be stopped by pop-up stoppers, and often are
not dependent on your having Internet Explorer open.

Detection Zlob.Fake Security Alerts :

Zlob.Fake Security Alerts Files:
[%SYSTEM%]\AceExt32.dll
[%SYSTEM%]\afzdbl.dll
[%SYSTEM%]\aghmao.dll
[%SYSTEM%]\ayjhc.dll
[%SYSTEM%]\beahahl.dll
[%SYSTEM%]\bgwttyl.dll
[%SYSTEM%]\bqrcr.dll
[%SYSTEM%]\bubbj.dll
[%SYSTEM%]\ccyszwl.dll
[%SYSTEM%]\cfqbw.dll
[%SYSTEM%]\chzbi.dll
[%SYSTEM%]\cjuvwa.dll
[%SYSTEM%]\clbrcek.dll
[%SYSTEM%]\cqsfk.dll
[%SYSTEM%]\cthkpcv.dll
[%SYSTEM%]\cwgppb.dll
[%SYSTEM%]\czxtyx.dll
[%SYSTEM%]\d3acdb.dll
[%SYSTEM%]\dcvwaah.dll
[%SYSTEM%]\ddllup.dll
[%SYSTEM%]\ddomv.dll
[%SYSTEM%]\dfrep.dll
[%SYSTEM%]\dooep.dll
[%SYSTEM%]\dpfwu.dll
[%SYSTEM%]\duznhje.dll
[%SYSTEM%]\dxmpp.dll
[%SYSTEM%]\dyrwls.dll
[%SYSTEM%]\e404d.dll
[%SYSTEM%]\ecxwp.dll
[%SYSTEM%]\eeuydc.dll
[%SYSTEM%]\eigbbb.dll
[%SYSTEM%]\EOZfG8vL.dll
[%SYSTEM%]\eulbn.dll
[%SYSTEM%]\fdpzgi.dll
[%SYSTEM%]\fftktmk.dll
[%SYSTEM%]\fifzqip.dll
[%SYSTEM%]\flirek.dll
[%SYSTEM%]\fnczfh.dll
[%SYSTEM%]\fnexvt.dll
[%SYSTEM%]\fqdqs.dll
[%SYSTEM%]\fqgwiw.dll
[%SYSTEM%]\fshqaln.dll
[%SYSTEM%]\fwjgtk.dll
[%SYSTEM%]\fwrkqfl.dll
[%SYSTEM%]\fwzozx.dll
[%SYSTEM%]\fyhwfc.dll
[%SYSTEM%]\fyxkaah.dll
[%SYSTEM%]\gbjkog.dll
[%SYSTEM%]\gdrtul.dll
[%SYSTEM%]\geplxss.dll
[%SYSTEM%]\gkymhk.dll
[%SYSTEM%]\gnjsjc.dll
[%SYSTEM%]\gtawclv.dll
[%SYSTEM%]\gusur.dll
[%SYSTEM%]\guxmhcd.dll
[%SYSTEM%]\gwquvw.dll
[%SYSTEM%]\higehsg.dll
[%SYSTEM%]\hjpprpu.dll
[%SYSTEM%]\hteogat.dll
[%SYSTEM%]\hu.dll
[%SYSTEM%]\hymww.dll
[%SYSTEM%]\igkvf.dll
[%SYSTEM%]\igpfced.dll
[%SYSTEM%]\igzxwrl.dll
[%SYSTEM%]\iheuv.dll
[%SYSTEM%]\iklqcx.dll
[%SYSTEM%]\ilmpjy.dll
[%SYSTEM%]\indwvm.dll
[%SYSTEM%]\iolchsmxrhfi.dll
[%SYSTEM%]\itdtjjf.dll
[%SYSTEM%]\ivrllc.dll
[%SYSTEM%]\jrpkmgh.dll
[%SYSTEM%]\khtbpdl.dll
[%SYSTEM%]\kvfvw.dll
[%SYSTEM%]\kzpkwj.dll
[%SYSTEM%]\lapmvzf.dll
[%SYSTEM%]\lgaac.dll
[%SYSTEM%]\mivmv.dll
[%SYSTEM%]\monem.dll
[%SYSTEM%]\moywh.dll
[%SYSTEM%]\muvdjo.dll
[%SYSTEM%]\mvwqn.dll
[%SYSTEM%]\mxhfjy.dll
[%SYSTEM%]\myqlejy.dll
[%SYSTEM%]\nbbrhbd.dll
[%SYSTEM%]\ncrjf.dll
[%SYSTEM%]\nczupfw.dll
[%SYSTEM%]\nexpegp.dll
[%SYSTEM%]\onljweo.dll
[%SYSTEM%]\osdjhjc.dll
[%SYSTEM%]\oyopu.dll
[%SYSTEM%]\pfrmj.dll
[%SYSTEM%]\pjgerka.dll
[%SYSTEM%]\pkgvyg.dll
[%SYSTEM%]\pluwue.dll
[%SYSTEM%]\psndz.dll
[%SYSTEM%]\qzviz.dll
[%SYSTEM%]\rldyt.dll
[%SYSTEM%]\rmtdvc.dll
[%SYSTEM%]\rnxwph.dll
[%SYSTEM%]\runsrv32.dll
[%SYSTEM%]\ryxrho.dll
[%SYSTEM%]\sacskza.dll
[%SYSTEM%]\siiyal.dll
[%SYSTEM%]\sttwrd.dll
[%SYSTEM%]\surzzh.dll
[%SYSTEM%]\swqzdtj.dll
[%SYSTEM%]\tczij.dll
[%SYSTEM%]\tiqmcx.dll
[%SYSTEM%]\tkosvv.dll
[%SYSTEM%]\tkrsw.dll
[%SYSTEM%]\tmxxxh.dll
[%SYSTEM%]\tqcwm.dll
[%SYSTEM%]\tvomnc.dll
[%SYSTEM%]\tvtpwp.dll
[%SYSTEM%]\txfdb32.dll
[%SYSTEM%]\txxkb.dll
[%SYSTEM%]\ucmbegr.dll
[%SYSTEM%]\ugbtna.dll
[%SYSTEM%]\uglgs.dll
[%SYSTEM%]\ugofuq.dll
[%SYSTEM%]\uimcu.dll
[%SYSTEM%]\unpfrwb.dll
[%SYSTEM%]\uoricweppdhx.dll
[%SYSTEM%]\vblhanf.dll
[%SYSTEM%]\vcehaeb.dll
[%SYSTEM%]\veptlh.dll
[%SYSTEM%]\vgibz.dll
[%SYSTEM%]\vjxwnn.dll
[%SYSTEM%]\vmlwp.dll
[%SYSTEM%]\vophqmn.dll
[%SYSTEM%]\vpccw.dll
[%SYSTEM%]\vusxqm.dll
[%SYSTEM%]\vwfps.dll
[%SYSTEM%]\vzfhprk.dll
[%SYSTEM%]\winapi32.dll
[%SYSTEM%]\wowlze.dll
[%SYSTEM%]\wqzdtjg.dll
[%SYSTEM%]\wstart.dll
[%SYSTEM%]\wxinptv.dll
[%SYSTEM%]\wygomd.dll
[%SYSTEM%]\wzhtjqo.dll
[%SYSTEM%]\xedasn.dll
[%SYSTEM%]\xikor.dll
[%SYSTEM%]\xnvaogd.dll
[%SYSTEM%]\xovdzz.dll
[%SYSTEM%]\xtsyynm.dll
[%SYSTEM%]\xyxuic.dll
[%SYSTEM%]\ymmzwd.dll
[%SYSTEM%]\yneid.dll
[%SYSTEM%]\zcwlnic.dll
[%SYSTEM%]\zdwii.dll
[%SYSTEM%]\zkpssqa.dll
[%SYSTEM%]\zpeolvh.dll
[%SYSTEM%]\zpuwriz.dll
[%SYSTEM%]\zqhy.dll
[%SYSTEM%]\AceExt32.dll
[%SYSTEM%]\afzdbl.dll
[%SYSTEM%]\aghmao.dll
[%SYSTEM%]\ayjhc.dll
[%SYSTEM%]\beahahl.dll
[%SYSTEM%]\bgwttyl.dll
[%SYSTEM%]\bqrcr.dll
[%SYSTEM%]\bubbj.dll
[%SYSTEM%]\ccyszwl.dll
[%SYSTEM%]\cfqbw.dll
[%SYSTEM%]\chzbi.dll
[%SYSTEM%]\cjuvwa.dll
[%SYSTEM%]\clbrcek.dll
[%SYSTEM%]\cqsfk.dll
[%SYSTEM%]\cthkpcv.dll
[%SYSTEM%]\cwgppb.dll
[%SYSTEM%]\czxtyx.dll
[%SYSTEM%]\d3acdb.dll
[%SYSTEM%]\dcvwaah.dll
[%SYSTEM%]\ddllup.dll
[%SYSTEM%]\ddomv.dll
[%SYSTEM%]\dfrep.dll
[%SYSTEM%]\dooep.dll
[%SYSTEM%]\dpfwu.dll
[%SYSTEM%]\duznhje.dll
[%SYSTEM%]\dxmpp.dll
[%SYSTEM%]\dyrwls.dll
[%SYSTEM%]\e404d.dll
[%SYSTEM%]\ecxwp.dll
[%SYSTEM%]\eeuydc.dll
[%SYSTEM%]\eigbbb.dll
[%SYSTEM%]\EOZfG8vL.dll
[%SYSTEM%]\eulbn.dll
[%SYSTEM%]\fdpzgi.dll
[%SYSTEM%]\fftktmk.dll
[%SYSTEM%]\fifzqip.dll
[%SYSTEM%]\flirek.dll
[%SYSTEM%]\fnczfh.dll
[%SYSTEM%]\fnexvt.dll
[%SYSTEM%]\fqdqs.dll
[%SYSTEM%]\fqgwiw.dll
[%SYSTEM%]\fshqaln.dll
[%SYSTEM%]\fwjgtk.dll
[%SYSTEM%]\fwrkqfl.dll
[%SYSTEM%]\fwzozx.dll
[%SYSTEM%]\fyhwfc.dll
[%SYSTEM%]\fyxkaah.dll
[%SYSTEM%]\gbjkog.dll
[%SYSTEM%]\gdrtul.dll
[%SYSTEM%]\geplxss.dll
[%SYSTEM%]\gkymhk.dll
[%SYSTEM%]\gnjsjc.dll
[%SYSTEM%]\gtawclv.dll
[%SYSTEM%]\gusur.dll
[%SYSTEM%]\guxmhcd.dll
[%SYSTEM%]\gwquvw.dll
[%SYSTEM%]\higehsg.dll
[%SYSTEM%]\hjpprpu.dll
[%SYSTEM%]\hteogat.dll
[%SYSTEM%]\hu.dll
[%SYSTEM%]\hymww.dll
[%SYSTEM%]\igkvf.dll
[%SYSTEM%]\igpfced.dll
[%SYSTEM%]\igzxwrl.dll
[%SYSTEM%]\iheuv.dll
[%SYSTEM%]\iklqcx.dll
[%SYSTEM%]\ilmpjy.dll
[%SYSTEM%]\indwvm.dll
[%SYSTEM%]\iolchsmxrhfi.dll
[%SYSTEM%]\itdtjjf.dll
[%SYSTEM%]\ivrllc.dll
[%SYSTEM%]\jrpkmgh.dll
[%SYSTEM%]\khtbpdl.dll
[%SYSTEM%]\kvfvw.dll
[%SYSTEM%]\kzpkwj.dll
[%SYSTEM%]\lapmvzf.dll
[%SYSTEM%]\lgaac.dll
[%SYSTEM%]\mivmv.dll
[%SYSTEM%]\monem.dll
[%SYSTEM%]\moywh.dll
[%SYSTEM%]\muvdjo.dll
[%SYSTEM%]\mvwqn.dll
[%SYSTEM%]\mxhfjy.dll
[%SYSTEM%]\myqlejy.dll
[%SYSTEM%]\nbbrhbd.dll
[%SYSTEM%]\ncrjf.dll
[%SYSTEM%]\nczupfw.dll
[%SYSTEM%]\nexpegp.dll
[%SYSTEM%]\onljweo.dll
[%SYSTEM%]\osdjhjc.dll
[%SYSTEM%]\oyopu.dll
[%SYSTEM%]\pfrmj.dll
[%SYSTEM%]\pjgerka.dll
[%SYSTEM%]\pkgvyg.dll
[%SYSTEM%]\pluwue.dll
[%SYSTEM%]\psndz.dll
[%SYSTEM%]\qzviz.dll
[%SYSTEM%]\rldyt.dll
[%SYSTEM%]\rmtdvc.dll
[%SYSTEM%]\rnxwph.dll
[%SYSTEM%]\runsrv32.dll
[%SYSTEM%]\ryxrho.dll
[%SYSTEM%]\sacskza.dll
[%SYSTEM%]\siiyal.dll
[%SYSTEM%]\sttwrd.dll
[%SYSTEM%]\surzzh.dll
[%SYSTEM%]\swqzdtj.dll
[%SYSTEM%]\tczij.dll
[%SYSTEM%]\tiqmcx.dll
[%SYSTEM%]\tkosvv.dll
[%SYSTEM%]\tkrsw.dll
[%SYSTEM%]\tmxxxh.dll
[%SYSTEM%]\tqcwm.dll
[%SYSTEM%]\tvomnc.dll
[%SYSTEM%]\tvtpwp.dll
[%SYSTEM%]\txfdb32.dll
[%SYSTEM%]\txxkb.dll
[%SYSTEM%]\ucmbegr.dll
[%SYSTEM%]\ugbtna.dll
[%SYSTEM%]\uglgs.dll
[%SYSTEM%]\ugofuq.dll
[%SYSTEM%]\uimcu.dll
[%SYSTEM%]\unpfrwb.dll
[%SYSTEM%]\uoricweppdhx.dll
[%SYSTEM%]\vblhanf.dll
[%SYSTEM%]\vcehaeb.dll
[%SYSTEM%]\veptlh.dll
[%SYSTEM%]\vgibz.dll
[%SYSTEM%]\vjxwnn.dll
[%SYSTEM%]\vmlwp.dll
[%SYSTEM%]\vophqmn.dll
[%SYSTEM%]\vpccw.dll
[%SYSTEM%]\vusxqm.dll
[%SYSTEM%]\vwfps.dll
[%SYSTEM%]\vzfhprk.dll
[%SYSTEM%]\winapi32.dll
[%SYSTEM%]\wowlze.dll
[%SYSTEM%]\wqzdtjg.dll
[%SYSTEM%]\wstart.dll
[%SYSTEM%]\wxinptv.dll
[%SYSTEM%]\wygomd.dll
[%SYSTEM%]\wzhtjqo.dll
[%SYSTEM%]\xedasn.dll
[%SYSTEM%]\xikor.dll
[%SYSTEM%]\xnvaogd.dll
[%SYSTEM%]\xovdzz.dll
[%SYSTEM%]\xtsyynm.dll
[%SYSTEM%]\xyxuic.dll
[%SYSTEM%]\ymmzwd.dll
[%SYSTEM%]\yneid.dll
[%SYSTEM%]\zcwlnic.dll
[%SYSTEM%]\zdwii.dll
[%SYSTEM%]\zkpssqa.dll
[%SYSTEM%]\zpeolvh.dll
[%SYSTEM%]\zpuwriz.dll
[%SYSTEM%]\zqhy.dll

Zlob.Fake Security Alerts Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{0123eb75-964c-4cb3-b796-431cc9099570}
HKEY_CLASSES_ROOT\CLSID\{01b55afa-f451-474b-9e91-c35b24d02641}
HKEY_CLASSES_ROOT\CLSID\{02e155c1-202c-43a5-a212-58bb67d4341c}
HKEY_CLASSES_ROOT\CLSID\{05a91164-3c96-47d6-aa74-2c855791b2d0}
HKEY_CLASSES_ROOT\CLSID\{075a465d-0af2-4b79-8db3-2fda0fd8d74c}
HKEY_CLASSES_ROOT\CLSID\{0e4e5110-a772-4c4a-a7dc-137fe10abd6e}
HKEY_CLASSES_ROOT\CLSID\{0ee82408-3eef-49e3-9370-f94cf2e4034a}
HKEY_CLASSES_ROOT\CLSID\{1152a0e8-5be5-41cc-8312-556581690a61}
HKEY_CLASSES_ROOT\CLSID\{11853d5f-f894-4cc7-bbc3-fc7a9dcfd896}
HKEY_CLASSES_ROOT\CLSID\{12a8c4e6-06c8-4ab3-9274-a0cde148e3da}
HKEY_CLASSES_ROOT\CLSID\{1428963F-BE82-3C95-DA61-BDAE53AA4DF1}
HKEY_CLASSES_ROOT\CLSID\{143404b0-ee92-40a7-8705-06fba9a7abf4}
HKEY_CLASSES_ROOT\CLSID\{16be3225-e902-4d2a-ac98-aab162796927}
HKEY_CLASSES_ROOT\CLSID\{1817ab5d-25bf-4d5e-ba90-6e5fe658fc5f}
HKEY_CLASSES_ROOT\CLSID\{18a8f76b-804b-4981-b87c-460699971a4b}
HKEY_CLASSES_ROOT\CLSID\{1977ce08-a38f-43db-a856-f4aa6122131b}
HKEY_CLASSES_ROOT\CLSID\{1b17f1db-790e-4d42-8e0c-d4d19123ee5b}
HKEY_CLASSES_ROOT\CLSID\{1c6fd4e6-49ce-4178-875b-df70eac260c5}
HKEY_CLASSES_ROOT\CLSID\{2016a466-91a2-43c6-97d8-2fd380f065ef}
HKEY_CLASSES_ROOT\CLSID\{24E27EA9-FCF3-444F-BD80-20543BA5D946}
HKEY_CLASSES_ROOT\CLSID\{25b7d2fd-4f71-46d1-801a-7de323e4ec82}
HKEY_CLASSES_ROOT\CLSID\{27321538-5739-4aa1-b84c-7d18e4383f1f}
HKEY_CLASSES_ROOT\CLSID\{27882a9f-8937-4ae4-87ab-ed669c8b6d7a}
HKEY_CLASSES_ROOT\CLSID\{2acf3add-34a1-4f2f-99cf-cc69785d1e90}
HKEY_CLASSES_ROOT\CLSID\{2bb2b2d6-8b86-412e-acca-d656a8979b3e}
HKEY_CLASSES_ROOT\CLSID\{2dcea392-ea10-4e6d-aba4-329ac377119c}
HKEY_CLASSES_ROOT\CLSID\{2fdde73c-273e-4e55-84dc-455de06e4866}
HKEY_CLASSES_ROOT\CLSID\{3162ba5b-4f2d-40c5-8fb6-36c6a0d639e6}
HKEY_CLASSES_ROOT\CLSID\{33b8d257-07f6-4c06-8605-94bc21728635}
HKEY_CLASSES_ROOT\CLSID\{34ec76b6-53c4-4686-822f-910c790683fb}
HKEY_CLASSES_ROOT\CLSID\{3578CC4F-0E1F-445E-8072-E78435C71001}
HKEY_CLASSES_ROOT\clsid\{35cec8a3-2be6-11d2-8773-92e220524150}
HKEY_CLASSES_ROOT\CLSID\{3750da11-9b0c-4a75-9c8a-bbcbfcd1ccea}
HKEY_CLASSES_ROOT\CLSID\{37ba7add-75f6-498f-a07a-2b0403e34401}
HKEY_CLASSES_ROOT\CLSID\{3ae12a89-2063-409b-87f2-f809a6e76862}
HKEY_CLASSES_ROOT\CLSID\{3aea41ad-3ce4-48d9-acab-be40ad329e40}
HKEY_CLASSES_ROOT\CLSID\{3baa1ad8-ee49-4772-bf0b-f55083e0f7aa}
HKEY_CLASSES_ROOT\CLSID\{3c767c6b-602d-4b9b-829d-a3dc5b2d89dd}
HKEY_CLASSES_ROOT\CLSID\{3da6d3a3-a220-491e-be22-39c03e04a85b}
HKEY_CLASSES_ROOT\CLSID\{41591d7f-9e25-4bd0-af53-9908fcf3a738}
HKEY_CLASSES_ROOT\CLSID\{41eaa909-24be-4d24-877f-076a0576a6fd}
HKEY_CLASSES_ROOT\CLSID\{42248C91-2117-477B-AC0E-C280556B1001}
HKEY_CLASSES_ROOT\CLSID\{4233ac08-a2c4-4742-a0b4-83719613d62c}
HKEY_CLASSES_ROOT\CLSID\{44e670f2-d57b-4815-a576-955d17dbbf2d}
HKEY_CLASSES_ROOT\CLSID\{4688f900-0d0c-4788-b297-59cc10e70ccc}
HKEY_CLASSES_ROOT\CLSID\{46f5a8b0-0b73-48c5-9e40-3c443a43c161}
HKEY_CLASSES_ROOT\CLSID\{48a7a70a-e118-4506-a373-c9d4e8a212a1}
HKEY_CLASSES_ROOT\CLSID\{4a9e875b-d032-45e4-8294-789fe3be5b19}
HKEY_CLASSES_ROOT\CLSID\{4d993022-0899-4599-b4b6-0f887d0802e6}
HKEY_CLASSES_ROOT\CLSID\{4f5f16ef-af9d-4fe6-8410-f0670b58979d}
HKEY_CLASSES_ROOT\CLSID\{4fc003c3-87a0-489c-85cd-878246eb2d18}
HKEY_CLASSES_ROOT\CLSID\{53B5F2B1-94DD-43E5-8187-EB4E31F00701}
HKEY_CLASSES_ROOT\CLSID\{547aaa89-7e6b-42b4-b112-a64955f86a2a}
HKEY_CLASSES_ROOT\CLSID\{596e4935-4d3b-4a3c-842d-2efd1b3de598}
HKEY_CLASSES_ROOT\CLSID\{5aaf6542-f4ba-4df4-873d-4902ecbe794c}
HKEY_CLASSES_ROOT\CLSID\{5c770fbc-cc2f-4acd-93e8-e6f0594307fd}
HKEY_CLASSES_ROOT\CLSID\{5feba593-3e6d-4606-ae6e-0680501cd29e}
HKEY_CLASSES_ROOT\CLSID\{60dea04c-9817-4309-bfa2-f8a1766c3cd1}
HKEY_CLASSES_ROOT\CLSID\{634be415-da12-496b-b89e-329b73c4807f}
HKEY_CLASSES_ROOT\CLSID\{64ba30a2-811a-4597-b0af-d551128be340}
HKEY_CLASSES_ROOT\CLSID\{655560a9-3ca8-4509-9632-6abbef21426b}
HKEY_CLASSES_ROOT\CLSID\{6625fc6c-731c-443a-b3f0-2c8c520a1766}
HKEY_CLASSES_ROOT\CLSID\{6747456b-cea8-463d-ad2a-50d67ae73d30}
HKEY_CLASSES_ROOT\CLSID\{6ad686b9-ab56-4ebc-a804-9f70b55b4577}
HKEY_CLASSES_ROOT\CLSID\{6af69c4d-420a-4c95-b34f-e4635f84f53b}
HKEY_CLASSES_ROOT\CLSID\{6e886df7-914d-48f0-86b3-a5cf24385361}
HKEY_CLASSES_ROOT\CLSID\{6f396a67-f473-48c9-9950-636ce17e584e}
HKEY_CLASSES_ROOT\CLSID\{70d17a5f-ef27-4295-90f5-20ad6f24834f}
HKEY_CLASSES_ROOT\CLSID\{735e980d-45d2-4777-af82-9923d3c8d3ae}
HKEY_CLASSES_ROOT\CLSID\{75a65a53-15c9-4a0c-bb40-a7ca8b24f544}
HKEY_CLASSES_ROOT\CLSID\{76fbb79c-2ec6-4962-a324-fd4362588e1c}
HKEY_CLASSES_ROOT\CLSID\{7999c5e2-b500-4ba5-8e9a-99639eca65fc}
HKEY_CLASSES_ROOT\CLSID\{79cdca21-5055-4cae-b609-e1685ef55cf7}
HKEY_CLASSES_ROOT\CLSID\{7b1eeccd-0a6d-4ad5-8ac1-4af5722b3885}
HKEY_CLASSES_ROOT\CLSID\{7dfa04a9-5e60-458b-ace4-4a7613504e8d}
HKEY_CLASSES_ROOT\CLSID\{8068bf35-3711-4dce-a2f3-f008cecfe894}
HKEY_CLASSES_ROOT\CLSID\{80ced3d6-ece9-48ba-8df8-2503d8d87c2b}
HKEY_CLASSES_ROOT\CLSID\{8329660f-e248-4872-98cc-fb9c4fec7ba8}
HKEY_CLASSES_ROOT\CLSID\{8373a2e0-bdd0-42bd-b4ec-ba5451eb6607}
HKEY_CLASSES_ROOT\CLSID\{837d024d-e0fb-44e8-acb1-24ec2309c487}
HKEY_CLASSES_ROOT\CLSID\{874443fe-aa33-4ebf-a6ac-73208787e62d}
HKEY_CLASSES_ROOT\CLSID\{8a96d76c-97fc-42c8-8e68-5613bacef854}
HKEY_CLASSES_ROOT\CLSID\{8aa7a4d2-73c7-4fca-bef7-7923e38a3b1c}
HKEY_CLASSES_ROOT\CLSID\{8b87dcc7-9b89-4205-aa82-076b2a1edfe0}
HKEY_CLASSES_ROOT\CLSID\{8bbe40fd-0416-4c3f-80ea-0c7ad5fb1aab}
HKEY_CLASSES_ROOT\CLSID\{8d8c2387-7f80-4022-9be6-43630a969558}
HKEY_CLASSES_ROOT\CLSID\{8dc1f789-e073-4363-b40d-07376bc5ecc5}
HKEY_CLASSES_ROOT\CLSID\{903902a8-0691-460e-8351-24df3d425e9c}
HKEY_CLASSES_ROOT\CLSID\{92050ffb-b796-4146-ae27-7e5e1d93b8a8}
HKEY_CLASSES_ROOT\CLSID\{94524218-9af3-4643-9687-cbc2880e54da}
HKEY_CLASSES_ROOT\CLSID\{951a98d0-dad6-4a77-8280-a494279a884b}
HKEY_CLASSES_ROOT\CLSID\{95a4b6d8-dcd9-453a-aedf-f5d10af2519a}
HKEY_CLASSES_ROOT\CLSID\{95dde900-8bf3-428c-b9be-8345c9d194f7}
HKEY_CLASSES_ROOT\CLSID\{95ed0779-42e8-41d3-a2e3-01691fb2fd5d}
HKEY_CLASSES_ROOT\CLSID\{98013eb8-258b-4979-bfd5-04ecd93f765c}
HKEY_CLASSES_ROOT\CLSID\{98ca7898-6029-41ab-8f67-ea4f5e1afc22}
HKEY_CLASSES_ROOT\CLSID\{9af8f31b-b778-4413-b8ed-ae63a62e1f7d}
HKEY_CLASSES_ROOT\CLSID\{9b7958db-d4ef-4879-8044-e156a58c1a61}
HKEY_CLASSES_ROOT\CLSID\{9d635a36-6b3c-4146-8625-f3aaf507bbf8}
HKEY_CLASSES_ROOT\CLSID\{9d6fac42-a7be-4702-87ef-75d8dc14249e}
HKEY_CLASSES_ROOT\CLSID\{9f5cb985-d4a4-49af-9185-133f956b5756}
HKEY_CLASSES_ROOT\CLSID\{a1c16871-b797-4ec7-bbee-83852379c390}
HKEY_CLASSES_ROOT\CLSID\{A1D9D3F0-8C2A-9A1D-A376-2CACFB10AB72}
HKEY_CLASSES_ROOT\CLSID\{A2C8F6B1-7C2A-3D1C-A3C6-A1FDA113B43F}
HKEY_CLASSES_ROOT\CLSID\{a4029063-4fe3-422c-ac72-12905c09642a}
HKEY_CLASSES_ROOT\CLSID\{a47e7ce0-263d-40aa-86bc-27c1f6433143}
HKEY_CLASSES_ROOT\CLSID\{a6d478c6-7961-4fe9-be4b-e621dd640112}
HKEY_CLASSES_ROOT\CLSID\{a6fddce1-36ae-41c1-87d3-f49e514273d4}
HKEY_CLASSES_ROOT\CLSID\{aa6d4f53-4c8d-4549-84d2-02d584acc4e9}
HKEY_CLASSES_ROOT\CLSID\{ab340860-fd81-4a65-b345-82eb77a66b5e}
HKEY_CLASSES_ROOT\CLSID\{ab75cc7d-2751-4144-a278-5462d5a5884c}
HKEY_CLASSES_ROOT\CLSID\{abef791f-947e-4cdf-83c3-e72a240afb67}
HKEY_CLASSES_ROOT\CLSID\{adf64b1b-c68c-4ce8-bb55-258b7b8b0f81}
HKEY_CLASSES_ROOT\CLSID\{aed6f6a3-183c-488d-9f90-23db99f56e7f}
HKEY_CLASSES_ROOT\CLSID\{af3fd9a8-1287-4159-9212-9a5b4494af70}
HKEY_CLASSES_ROOT\CLSID\{af4fd984-a939-4c32-82b2-8bae7abe9aec}
HKEY_CLASSES_ROOT\CLSID\{b02c6db1-a1ea-470f-8100-b1391463ba92}
HKEY_CLASSES_ROOT\CLSID\{b0883848-1466-4470-a418-3fe7d36694b9}
HKEY_CLASSES_ROOT\CLSID\{b0ded443-5e68-4001-a81b-0a0001621ab8}
HKEY_CLASSES_ROOT\CLSID\{b292ec9f-a074-4115-8342-1f459702d8d2}
HKEY_CLASSES_ROOT\CLSID\{b585105c-0e84-4ef0-9c6a-fbe134a72945}
HKEY_CLASSES_ROOT\CLSID\{b8b3850e-a22e-43ab-a15e-63f6e47db7e6}
HKEY_CLASSES_ROOT\CLSID\{b8ea5f37-7327-4923-9808-8fd3b6f0d529}
HKEY_CLASSES_ROOT\CLSID\{bd0fc212-0a36-4232-83cc-2063fb9282e0}
HKEY_CLASSES_ROOT\CLSID\{bd1299cd-b98a-4ee1-9ae3-d3cb3da41d0d}
HKEY_CLASSES_ROOT\CLSID\{bd2948f8-c949-464f-824a-6272608c739e}
HKEY_CLASSES_ROOT\CLSID\{c0ca766d-060c-48e1-b536-205e321bd174}
HKEY_CLASSES_ROOT\CLSID\{C1A2FDA2-1A5B-2A8F-F3A2-B22DA1A3C41D}
HKEY_CLASSES_ROOT\CLSID\{C1A8B6A1-2C81-1C3D-A3C6-A1CCDB10B47F}
HKEY_CLASSES_ROOT\CLSID\{c4da240e-7525-404a-b366-f50a422376d8}
HKEY_CLASSES_ROOT\CLSID\{c704547b-26c0-4222-a034-81653c07b494}
HKEY_CLASSES_ROOT\CLSID\{c74f7434-a6e7-46c3-bf60-62a005074fe5}
HKEY_CLASSES_ROOT\CLSID\{c82e1789-207a-4b8a-806f-76b62dfac2a2}
HKEY_CLASSES_ROOT\CLSID\{cc824bb2-d4b3-41f1-bba0-f8240e4cc495}
HKEY_CLASSES_ROOT\CLSID\{cd0e4a1a-dbc2-48f7-9a6a-a41cac20bddc}
HKEY_CLASSES_ROOT\CLSID\{CD5E2AC9-25CE-A1C5-D1E2-DC6B28A6ED5A}
HKEY_CLASSES_ROOT\CLSID\{cea2e5cd-e849-427b-80f0-59298caef1c4}
HKEY_CLASSES_ROOT\CLSID\{ceca6f2b-247b-4ece-9b7a-d0135c8036fc}
HKEY_CLASSES_ROOT\CLSID\{ced7d5f3-74cc-4c2f-8d60-62ebcdda0a22}
HKEY_CLASSES_ROOT\CLSID\{cfda6372-043c-48d2-ba3c-7bfe1cf71854}
HKEY_CLASSES_ROOT\CLSID\{d1e5ca97-235e-4ff0-9b92-7543c9d61ff4}
HKEY_CLASSES_ROOT\CLSID\{d4c4bc43-0974-4dec-a669-9f7bfcb3503d}
HKEY_CLASSES_ROOT\CLSID\{d653e105-3e53-480a-b129-54d957d174bb}
HKEY_CLASSES_ROOT\CLSID\{d66c22b6-2217-4d1a-9a90-1a54de1fc706}
HKEY_CLASSES_ROOT\CLSID\{d6ef030a-a235-41ba-9ead-89b6ff542f00}
HKEY_CLASSES_ROOT\CLSID\{d7058baa-49a4-40b7-95c2-eec95cdf51f3}
HKEY_CLASSES_ROOT\CLSID\{d8b937a4-cdad-497b-a872-8da7c4c3ef6f}
HKEY_CLASSES_ROOT\CLSID\{da3b49f6-8c54-4429-a275-21a86dcca413}
HKEY_CLASSES_ROOT\CLSID\{daecb1b9-9f49-40f3-873d-5db0fdb14d7d}
HKEY_CLASSES_ROOT\CLSID\{de313bc7-422a-4344-a9aa-3e703922345c}
HKEY_CLASSES_ROOT\CLSID\{de5ede53-9db0-422d-b32d-5c41c96d6f52}
HKEY_CLASSES_ROOT\CLSID\{dec5caa7-8045-495c-8034-35aff489fedf}
HKEY_CLASSES_ROOT\CLSID\{df8c3aed-b58e-4bcb-96b3-aa1b7bbdbbd4}
HKEY_CLASSES_ROOT\CLSID\{dfa61db1-388e-4c87-8d56-540fa229bcb4}
HKEY_CLASSES_ROOT\CLSID\{e0f691d7-01bf-4fed-926c-7368034a45e3}
HKEY_CLASSES_ROOT\CLSID\{e1adb94e-0dc6-487c-b274-981bee6301a1}
HKEY_CLASSES_ROOT\CLSID\{e221f0dc-2696-4b2e-bd63-25b33dc19b6e}
HKEY_CLASSES_ROOT\CLSID\{e2b8cea1-c8a7-48e2-b2fd-89ae5c608fb8}
HKEY_CLASSES_ROOT\CLSID\{e5b1e382-817e-4b74-8a96-ec78751e6acf}
HKEY_CLASSES_ROOT\CLSID\{e6adaaf0-79b2-4cf1-a660-50a0b33991a1}
HKEY_CLASSES_ROOT\CLSID\{e71aba09-d81a-4876-baa3-df133c1dfc48}
HKEY_CLASSES_ROOT\CLSID\{e758745e-b8aa-47ac-a652-6307ff5f3ebf}
HKEY_CLASSES_ROOT\CLSID\{e7aff349-39e1-4a96-a13d-24983440b44a}
HKEY_CLASSES_ROOT\CLSID\{EA26CE12-DE64-A1C5-9A4F-FC1A64E6AC2E}
HKEY_CLASSES_ROOT\CLSID\{eb4c6870-721f-4989-9c90-8cbfa46d0298}
HKEY_CLASSES_ROOT\CLSID\{eb86b46a-d6db-4478-8f5f-06cb2ebc1b35}
HKEY_CLASSES_ROOT\CLSID\{ECC52856-466F-82FC-EC6F-C28CBFF896FD}
HKEY_CLASSES_ROOT\CLSID\{ede8bed5-92cf-4482-8f51-a01cd9b3ea37}
HKEY_CLASSES_ROOT\CLSID\{ee6bd1ad-1992-4f2c-8ea2-edc6eee4548b}
HKEY_CLASSES_ROOT\CLSID\{f0c5ef8b-f4bb-4612-9ea8-361fff3da3d5}
HKEY_CLASSES_ROOT\CLSID\{f31aee4a-1530-4fef-8537-79c6973bff9a}
HKEY_CLASSES_ROOT\CLSID\{f39d0dee-b2f0-4591-9187-1cc39c1df98a}
HKEY_CLASSES_ROOT\CLSID\{f8d02387-789a-4c0f-a1d8-8a93f33ee4df}
HKEY_CLASSES_ROOT\CLSID\{fa19bd7e-50bc-4203-80ac-c4edc81ca9a3}
HKEY_CLASSES_ROOT\CLSID\{fa55d551-9698-48ac-b639-9b00cf1a6ea0}
HKEY_CLASSES_ROOT\CLSID\{fc7cbb1b-2da6-4e7d-a1ea-bf6705dd0f8c}
HKEY_CLASSES_ROOT\CLSID\{FCADDC14-BD46-408A-9842-CDBE1C6D37EB}
HKEY_CLASSES_ROOT\CLSID\{fde1bd72-ca80-443f-9526-595337b73878}
HKEY_CLASSES_ROOT\CLSID\{fedff4ae-1302-4b8a-bda9-43b9f67b9749}
HKEY_CLASSES_ROOT\CLSID\{}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{d66c22b6-2217-4d1a-9a90-1a54de1fc706}

Zlob.Fake Security Alerts Registry Values:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad

Removing Zlob.Fake Security Alerts:

you can run trial version of ExterminateIt, or remove Zlob.Fake Security Alerts manually.


To completely manually remove Zlob.Fake Security Alerts malware from your computer, you need to delete the Windows registry keys and registry values, the files and folders associated with Zlob.Fake Security Alerts.


Also Be Aware of the Following Threats:
PC.Activity.Monitor.Lite Spyware Information
Removing Netdeny.A Trojan
NewTrack Trojan Removal instruction