Sunday, November 23, 2008

KGB.Spy.Software Spyware

How To Remove KGB.Spy.Software?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
KGB.Spy.Software is dangerous virus:
Spyware can even change computer settings, resulting in slow connection speeds,
different home pages, and loss of Internet or other programs.
In an attempt to increase the understanding of spyware, a more formal classification
of its included software types is captured under the term privacy-invasive software.


KGB.Spy.Software It also known as:

[Kaspersky]Monitor.Win32.KGBSpy.34

KGB.Spy.Software Symptoms:

Files:
[%PROGRAM_FILES%]\KGB Keylogger\winlogon.dll
[%DESKTOP%]\KGB Spy.lnk
[%PROGRAM_FILES%]\KGB Keylogger\winlogon.dll
[%DESKTOP%]\KGB Spy.lnk

Folders:
[%PROGRAM_FILES%]\kgb spy
[%COMMON_PROGRAMS%]\KGB Spy
[%PROGRAMS%]\kgb spy

Registry Keys:
HKEY_CURRENT_USER\software\kgb spy
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\kgb spy

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Hatter.dr Trojan Removal instruction
Bancos.INN Trojan Symptoms

Acropolis Trojan

How To Remove Acropolis?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Acropolis is dangerous virus:
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.

Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.


Acropolis It also known as:

[Kaspersky]Backdoor.Acropolis.10;
[Eset]Win32/Acropolis.10 trojan;
[McAfee]BackDoor-NM;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Acropolis.10;
[Computer Associates]Win32.Acropolis.10,Win32/Acropolis.10.Trojan

Acropolis Symptoms:

Files:
[%WINDOWS%]\localbase.dll
[%WINDOWS%]\winport.com
[%WINDOWS%]\localbase.dll
[%WINDOWS%]\winport.com

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
SillyDl.DCV Trojan Cleaner

ESyndicate Adware

How To Remove ESyndicate?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
ESyndicate is dangerous virus:
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.



ESyndicate Symptoms:

Files:
[%PROFILE_TEMP%]\eSyndicateInst.exe
[%PROGRAM_FILES%]\eSyndicate\esyn.dll
[%PROGRAMS%]\documents and settings\douglas\local settings\temp\esyndicateinst.exe
[%PROFILE_TEMP%]\eSyndicateInst.exe
[%PROGRAM_FILES%]\eSyndicate\esyn.dll
[%PROGRAMS%]\documents and settings\douglas\local settings\temp\esyndicateinst.exe

Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{CC378B83-9577-44D0-B4F8-0DD965E176FC}
HKEY_CLASSES_ROOT\esyn.band.1
HKEY_CLASSES_ROOT\typelib\{4e627a1e-bc4b-4faf-8de8-1d9a54d37da3}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{CC378B83-9577-44D0-B4F8-0DD965E176FC}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\esyndicate
HKEY_CLASSES_ROOT\clsid\{cc378b83-9577-44d0-b4f8-0dd965e176fc}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{cc378b83-9577-44d0-b4f8-0dd965e176fc}

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
WIC Trojan Removal
TopFiveSearch Adware Information

Banker.ahy Trojan

How To Remove Banker.ahy?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Banker.ahy is dangerous virus:
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Spyware programs can collect various types of personal information,
such as Internet surfing habit, sites that have been visited,
but can also interfere with user control of the computer in other ways,
such as installing additional software, redirecting Web browser activity,
accessing websites blindly that will cause more harmful viruses,
or diverting advertising revenue to a third party.


Banker.ahy Symptoms:

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
AdultChat Adware Symptoms
Removing Zlob.Fam.SoftCodec Trojan
Devil Trojan Removal

RBot.GRU Spyware

How To Remove RBot.GRU?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
RBot.GRU is dangerous virus:
Spyware can even change computer settings, resulting in slow connection speeds,
different home pages, and loss of Internet or other programs.
In an attempt to increase the understanding of spyware, a more formal classification
of its included software types is captured under the term privacy-invasive software.
Worms can be classified according to the propagation method they use,
i.e. how they deliver copies of themselves to new victim machines.
Worms can also be classified by installation method, launch method and finally according
to characteristics standard to all malware: polymorphism, stealth etc.

Many of the worms which managed to cause significant outbreaks use more then
one propagation method as well as more than one infection technique.
The methods are listed separately below.


RBot.GRU Symptoms:

Files:
[%SYSTEM%]\winbo32.exe
[%SYSTEM%]\winbo32.exe

Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
BookmarkExpress Adware Cleaner
DarkSky.Server Trojan Symptoms
Removing Frogs Trojan
TrojanDropper.Win32.Small.ab Trojan Removal

Mitglieder.Q Trojan

How To Remove Mitglieder.Q?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Mitglieder.Q is dangerous virus:
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.


Mitglieder.Q Symptoms:

Files:
[%SYSTEM%]\wintems.exe
[%SYSTEM%]\wintems.exe

Registry Values:
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\Software\DateTime4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
MalwareMonitor Ransomware Symptoms

Screen.Screw Trojan

How To Remove Screen.Screw?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Screen.Screw is dangerous virus:
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.


Screen.Screw Symptoms:

Files:
[%PROFILE_TEMP%]\readme.htm
[%PROFILE_TEMP%]\screenscrew.exe
[%PROFILE_TEMP%]\readme.htm
[%PROFILE_TEMP%]\screenscrew.exe


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Small.em Trojan Information
CWS.Winproc32 Hijacker Removal

BrainSpy RAT

How To Remove BrainSpy?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
BrainSpy is dangerous virus:
Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.
This family of Trojans downloads and installs new malware or adware on the computer.
The downloader then either launches the new malware or registers it to enable autorun
according to the local operating system requirements.

The names and locations of malware to be downloaded are either coded into the
Trojan or downloaded from a specified website.


BrainSpy Symptoms:

Files:
[%WINDOWS%]\system\brainspy .exe
[%WINDOWS%]\system\brainspy .exe


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Nuclear.Scan.beta Trojan Removal instruction
Remove Satans.Back.Door Trojan

Seecha Adware

How To Remove Seecha?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Seecha is dangerous virus:
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.



Seecha It also known as:

[Kaspersky]Adware.Win32.SeeCha.b,Adware.Win32.Seecha,Adware.Win32.SeeCha.a;
[Other]Adware/Seecha

Seecha Symptoms:

Files:
[%SYSTEM%]\sctongji04.dll
[%SYSTEM%]\sctongji04.dll

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{083863f1-70de-11d0-bd40-00a0c911ce86}\instance\{5531fd0a-6293-46b2-9075-c6845576f522}
HKEY_CLASSES_ROOT\clsid\{083863f1-70de-11d0-bd40-00a0c911ce86}\instance\{5592d97a-b649-4606-b7dc-470bfe2a3036}
HKEY_CLASSES_ROOT\clsid\{5531fd0a-6293-46b2-9075-c6845576f522}
HKEY_CLASSES_ROOT\clsid\{5592d97a-b649-4606-b7dc-470bfe2a3036}
HKEY_CURRENT_USER\software\seecha


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
TextBox DoS Symptoms
System.Sleuth Spyware Symptoms
MyTool Adware Information
Remove VB.in Trojan

in.webcounter.cc Hijacker

How To Remove in.webcounter.cc?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
in.webcounter.cc is dangerous virus:
A Search hijacker redirects search results to other pages and may
transmit search and browsing data to unknown servers. An error page hijacker directs
the browser to another page, usually an advertising page, instead of the usual error
page when the requested URL is not found.


in.webcounter.cc Symptoms:

Folders:
[%PROGRAM_FILES%]\Malware-Wiped

Registry Keys:
HKEY_CLASSES_ROOT\AppID\MalwareWipe.EXE
HKEY_CLASSES_ROOT\AppID\{70F17C8C-1744-41B6-9D07-575DB448DCC5}
HKEY_CLASSES_ROOT\CLSID\{035C1836-0D78-DABC-F4A7-D5D0517EE1F9}
HKEY_CLASSES_ROOT\Interface\{16CE4DF1-88FC-4843-9134-F13D4C7BF3EE}
HKEY_CLASSES_ROOT\Interface\{17811539-2602-4840-A189-DE2F58C61038}
HKEY_CLASSES_ROOT\Interface\{24368407-E9FC-45CD-B403-AC9FCDB8988C}
HKEY_CLASSES_ROOT\Interface\{36A742EE-7EB2-428C-BF53-FD44E8D24A6B}
HKEY_CLASSES_ROOT\Interface\{419813FC-0271-4521-8855-4AD41884CB73}
HKEY_CLASSES_ROOT\Interface\{49AB62F1-1F76-4D45-8830-FDA6B3C3B4DE}
HKEY_CLASSES_ROOT\Interface\{58120ABA-BEB7-4459-8297-8CBCB2E9D795}
HKEY_CLASSES_ROOT\Interface\{631C5E80-EF5A-436A-ACEE-603844A024B4}
HKEY_CLASSES_ROOT\Interface\{6B2C0504-130C-486F-A2BB-000E53BCF48C}
HKEY_CLASSES_ROOT\Interface\{716C0242-551E-429C-A93C-955016678C4D}
HKEY_CLASSES_ROOT\Interface\{83198DC1-CB01-457A-A375-A23CC9A0055B}
HKEY_CLASSES_ROOT\Interface\{A9EE6184-0DFA-4296-94B4-CC19111A586B}
HKEY_CLASSES_ROOT\Interface\{B09F616C-B561-4111-BD8F-D7D7E5BD0341}
HKEY_CLASSES_ROOT\Interface\{B41D39A9-1044-4A96-979B-6B43718E5680}
HKEY_CLASSES_ROOT\Interface\{D973304C-F078-4BA4-B295-F53006FE330A}
HKEY_CLASSES_ROOT\Interface\{E72ECD09-2B43-4687-938A-4485CA0E91F7}
HKEY_CLASSES_ROOT\TypeLib\{70BD49C5-7776-46B8-B025-E5E34CED92C3}
HKEY_LOCAL_MACHINE\SOFTWARE\Malware-Wiped


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Removing Kara Trojan
WinADiscount Adware Removal instruction
Bancos.HKW Trojan Information
Bancos.IHE Trojan Removal instruction
Ive Trojan Symptoms

Afnb Trojan

How To Remove Afnb?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Afnb is dangerous virus:
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.


Afnb Symptoms:

Registry Values:
HKEY_CURRENT_USER\software\microsoft


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Remove Wasteful DoS
Removing Avone.beta Trojan
Remove Small.Big.Brother.2b1 Trojan

BackSpace (BookedSpace) Adware

How To Remove BackSpace (BookedSpace)?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
BackSpace (BookedSpace) is dangerous virus:
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.

The BHO (Browser Helper Object) waits for the user to post personal information to a monitored website.
As this information is entered by the user, it is captured by the BHO and sent back to the attacker.
Toolbar presents itself as a helpful add-on for Internet Explorer but it is a real pest.

BackSpace (BookedSpace) Symptoms:

Files:
[%WINDOWS%]\cfg32.exe
[%WINDOWS%]\cfg32o.dll
[%WINDOWS%]\cfg32.exe
[%WINDOWS%]\cfg32o.dll

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{c68ae9c0-0909-4ddc-b661-c1afb9f59898}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C68AE9C0-0909-4DDC-B661-C1AFB9F59898}

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Removing Backdoor.Splintex Backdoor
Removing SillyDl.BZA Trojan
Removing Digi.Watcher Spyware
China Trojan Information

Baiso Trojan

How To Remove Baiso?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Baiso is dangerous virus:
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.


Baiso It also known as:

[Other]Trojan.Baiso

Baiso Symptoms:

Files:
[%WINDOWS%]\winampr.exe
[%WINDOWS%]\winampr.exe

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\.setupf
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\.setupf
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\.setupf


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
HyperBar Adware Removal instruction
Removing ElitemediaPop Adware
Remove Joshi Trojan

SillyDI.DGI Trojan

How To Remove SillyDI.DGI?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
SillyDI.DGI is dangerous virus:
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.


SillyDI.DGI Symptoms:

Files:
[%WINDOWS%]\b103.exe
[%WINDOWS%]\b103.exe

Registry Keys:
HKEY_CURRENT_USER\software\classes\clsid\{f862b760-0af0-1033-0729-0529050001}


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Fresh.Devices Adware Removal
Aureate Adware Cleaner
ExecTCP RAT Information
Zlob.Fam.ToolBar888 Trojan Removal
Pigeon.ELI Trojan Symptoms

Cmapp Adware

How To Remove Cmapp?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Cmapp is dangerous virus:
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.



Cmapp Symptoms:

Files:
[%PROFILE_TEMP%]\cmfibula.exe
[%SYSTEM%]\Targets.dat
[%SYSTEM%]\tpuninstall.exe
[%PROFILE_TEMP%]\cmfibula.exe
[%SYSTEM%]\Targets.dat
[%SYSTEM%]\tpuninstall.exe

Folders:
[%PROGRAM_FILES%]\cmfibula

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
SillyDl.CHO Trojan Information
Central Adware Information
RaxSearch Adware Cleaner
Vxidl.AHI Trojan Removal instruction

Perfect.Keylogger Spyware

How To Remove Perfect.Keylogger?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Perfect.Keylogger is dangerous virus:
Spyware can even change computer settings, resulting in slow connection speeds,
different home pages, and loss of Internet or other programs.
In an attempt to increase the understanding of spyware, a more formal classification
of its included software types is captured under the term privacy-invasive software.


Perfect.Keylogger It also known as:

[Kaspersky]KeyLogger.Win32.PerfectKeyLogger.141;
[Computer Associates]Win32.Perflogger.A,Win32/PerfectKeyLogger.141!Troja,Win32/Perflogger.A!Trojan

Perfect.Keylogger Symptoms:

Files:
[%DESKTOP%]\this folder leads to all of my other folders ok\bpk.exe
[%PROFILE_TEMP%]\RarSFX0\rinst.exe
[%PROFILE_TEMP%]\RarSFX1\rinst.exe
[%PROFILE_TEMP%]\RarSFX3\rinst.exe
[%PROGRAMS%]\blazingtools perfect keylogger\blazingtools perfect keylogger.lnk
[%PROGRAMS%]\blazingtools perfect keylogger\more useful programs.lnk
[%PROGRAMS%]\blazingtools perfect keylogger\order now!.lnk
[%PROGRAMS%]\blazingtools perfect keylogger\perfect keylogger help.lnk
[%PROGRAMS%]\blazingtools perfect keylogger\uninstall perfect keylogger.lnk
[%PROGRAM_FILES%]\BPK\bpk.chm
[%PROGRAM_FILES%]\bpk\bpk.dat
[%PROGRAM_FILES%]\BPK\bpk.exe
[%PROGRAM_FILES%]\bpk\bpk.exe
[%PROGRAM_FILES%]\BPK\bpkhk.dll
[%PROGRAM_FILES%]\bpk\bpkhk.dll
[%PROGRAM_FILES%]\bpk\bpki.dll
[%PROGRAM_FILES%]\BPK\bpkr.exe
[%PROGRAM_FILES%]\BPK\bpkun.exe
[%PROGRAM_FILES%]\bpk\bpkun.exe
[%PROGRAM_FILES%]\BPK\bpkvw.exe
[%PROGRAM_FILES%]\bpk\bpkvw.exe
[%PROGRAM_FILES%]\BPK\bpkwb.dll
[%PROGRAM_FILES%]\BPK\downloads.url
[%PROGRAM_FILES%]\bpk\downloads.url
[%PROGRAM_FILES%]\bpk\inst.bin
[%PROGRAM_FILES%]\bpk\install.log
[%PROGRAM_FILES%]\BPK\license.txt
[%PROGRAM_FILES%]\bpk\license.txt
[%PROGRAM_FILES%]\BPK\order.url
[%PROGRAM_FILES%]\bpk\order.url
[%PROGRAM_FILES%]\bpk\pk.bin
[%PROGRAM_FILES%]\bpk\web.dat
[%SYSTEM%]\bpk.bin
[%SYSTEM%]\bpk.dat
[%SYSTEM%]\bpk.exe
[%SYSTEM%]\bpkhk.dll
[%SYSTEM%]\bpkr.exe
[%SYSTEM%]\bpkwb.dll
[%SYSTEM%]\Kazaa+.exe
[%SYSTEM%]\Kazaa+hk.dll
[%SYSTEM%]\Kazaa+wb.dll
[%SYSTEM%]\Keyloggerhk.dll
[%SYSTEM%]\Keyloggerr.exe
[%SYSTEM%]\l2w.exe
[%SYSTEM%]\l2whk.dll
[%SYSTEM%]\l2wwb.dll
[%SYSTEM%]\PROGRAM FILES.EXE
[%SYSTEM%]\PROGRAM FILESHK.DLL
[%SYSTEM%]\Program Fileswb.dll
[%SYSTEM%]\rinst.exe
[%WINDOWS%]\WinXp\downloads.url
[%PROFILE%]\Impostazioni locali\Temp\RarSFX0\rinst.exe
[%PROFILE%]\Impostazioni locali\Temp\RarSFX1\rinst.exe
[%PROFILE%]\Impostazioni locali\Temp\RarSFX3\rinst.exe
[%PROGRAM_FILES%]\bpk\.exe
[%PROGRAM_FILES%]\bpk\bpk.chm
[%PROGRAM_FILES%]\bpk\bpkr.exe
[%PROGRAM_FILES%]\bpk\bpkwb.dll
[%PROGRAM_FILES%]\bpk\dumbo.exe
[%PROGRAM_FILES%]\bpk\dumbohk.dll
[%PROGRAM_FILES%]\bpk\hk.dll
[%PROGRAM_FILES%]\bpk\i.dll
[%PROGRAM_FILES%]\bpk\r.exe
[%PROGRAM_FILES%]\bpk\un.exe
[%PROGRAM_FILES%]\bpk\vw.exe
[%PROGRAM_FILES%]\bpk\wb.dll
[%DESKTOP%]\this folder leads to all of my other folders ok\bpk.exe
[%PROFILE_TEMP%]\RarSFX0\rinst.exe
[%PROFILE_TEMP%]\RarSFX1\rinst.exe
[%PROFILE_TEMP%]\RarSFX3\rinst.exe
[%PROGRAMS%]\blazingtools perfect keylogger\blazingtools perfect keylogger.lnk
[%PROGRAMS%]\blazingtools perfect keylogger\more useful programs.lnk
[%PROGRAMS%]\blazingtools perfect keylogger\order now!.lnk
[%PROGRAMS%]\blazingtools perfect keylogger\perfect keylogger help.lnk
[%PROGRAMS%]\blazingtools perfect keylogger\uninstall perfect keylogger.lnk
[%PROGRAM_FILES%]\BPK\bpk.chm
[%PROGRAM_FILES%]\bpk\bpk.dat
[%PROGRAM_FILES%]\BPK\bpk.exe
[%PROGRAM_FILES%]\bpk\bpk.exe
[%PROGRAM_FILES%]\BPK\bpkhk.dll
[%PROGRAM_FILES%]\bpk\bpkhk.dll
[%PROGRAM_FILES%]\bpk\bpki.dll
[%PROGRAM_FILES%]\BPK\bpkr.exe
[%PROGRAM_FILES%]\BPK\bpkun.exe
[%PROGRAM_FILES%]\bpk\bpkun.exe
[%PROGRAM_FILES%]\BPK\bpkvw.exe
[%PROGRAM_FILES%]\bpk\bpkvw.exe
[%PROGRAM_FILES%]\BPK\bpkwb.dll
[%PROGRAM_FILES%]\BPK\downloads.url
[%PROGRAM_FILES%]\bpk\downloads.url
[%PROGRAM_FILES%]\bpk\inst.bin
[%PROGRAM_FILES%]\bpk\install.log
[%PROGRAM_FILES%]\BPK\license.txt
[%PROGRAM_FILES%]\bpk\license.txt
[%PROGRAM_FILES%]\BPK\order.url
[%PROGRAM_FILES%]\bpk\order.url
[%PROGRAM_FILES%]\bpk\pk.bin
[%PROGRAM_FILES%]\bpk\web.dat
[%SYSTEM%]\bpk.bin
[%SYSTEM%]\bpk.dat
[%SYSTEM%]\bpk.exe
[%SYSTEM%]\bpkhk.dll
[%SYSTEM%]\bpkr.exe
[%SYSTEM%]\bpkwb.dll
[%SYSTEM%]\Kazaa+.exe
[%SYSTEM%]\Kazaa+hk.dll
[%SYSTEM%]\Kazaa+wb.dll
[%SYSTEM%]\Keyloggerhk.dll
[%SYSTEM%]\Keyloggerr.exe
[%SYSTEM%]\l2w.exe
[%SYSTEM%]\l2whk.dll
[%SYSTEM%]\l2wwb.dll
[%SYSTEM%]\PROGRAM FILES.EXE
[%SYSTEM%]\PROGRAM FILESHK.DLL
[%SYSTEM%]\Program Fileswb.dll
[%SYSTEM%]\rinst.exe
[%WINDOWS%]\WinXp\downloads.url
[%PROFILE%]\Impostazioni locali\Temp\RarSFX0\rinst.exe
[%PROFILE%]\Impostazioni locali\Temp\RarSFX1\rinst.exe
[%PROFILE%]\Impostazioni locali\Temp\RarSFX3\rinst.exe
[%PROGRAM_FILES%]\bpk\.exe
[%PROGRAM_FILES%]\bpk\bpk.chm
[%PROGRAM_FILES%]\bpk\bpkr.exe
[%PROGRAM_FILES%]\bpk\bpkwb.dll
[%PROGRAM_FILES%]\bpk\dumbo.exe
[%PROGRAM_FILES%]\bpk\dumbohk.dll
[%PROGRAM_FILES%]\bpk\hk.dll
[%PROGRAM_FILES%]\bpk\i.dll
[%PROGRAM_FILES%]\bpk\r.exe
[%PROGRAM_FILES%]\bpk\un.exe
[%PROGRAM_FILES%]\bpk\vw.exe
[%PROGRAM_FILES%]\bpk\wb.dll

Folders:
[%PROGRAM_FILES%]\bpk\dt

Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}
HKEY_CLASSES_ROOT\interface\{1e1b2878-88ff-11d3-8d96-d7acac95951a}
HKEY_CLASSES_ROOT\pk.ie
HKEY_CLASSES_ROOT\pk.ie.1
HKEY_CLASSES_ROOT\typelib\{1e1b286c-88ff-11d3-8d96-d7acac95951a}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\perfect keylogger
HKEY_CLASSES_ROOT\clsid\{1e1b2879-88ff-11d3-8d96-d7acac95951a}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{1e1b2879-88ff-11d3-8d96-d7acac95951a}

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
BackDoor.AOQ Backdoor Removal instruction

GreenScreen Trojan

How To Remove GreenScreen?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
GreenScreen is dangerous virus:
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Spyware is computer software that is installed surreptitiously on a personal computer
to with the computer, without the user's informed consent.
Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.


GreenScreen It also known as:

[Kaspersky]Trojan.Spy.GreenScreen.099,TrojanSpy.Win32.GreenScreen.099;
[F-Prot]destructive program;
[Panda]Trojan Horse,Trojan Horse.LC;
[Computer Associates]Win32/GreenScreen.099!Trojan

GreenScreen Symptoms:

Files:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Launch Kazaa.lnk
[%DESKTOP%]\Kazaa.lnk
[%DESKTOP%]\kazaa_setup.exe
[%DESKTOP%]\my shared folder.lnk
[%DESKTOP%]\my shared folder.url
[%DESKTOP%]\Shortcuts\Music\kazaa_setup.exe
[%DESKTOP%]\Unused Desktop Shortcuts\Kazaa Promotions.url
[%DESKTOP%]\Unused Desktop Shortcuts\My Shared Folder.url
[%PROFILE_TEMP%]\p2psetup.exe
[%PROGRAMS%]\kazaa media desktop\kazaa media desktop.lnk
[%PROGRAMS%]\KaZaA Media Desktop\Kazaa Website.url
[%PROGRAMS%]\Kazaa\Kazaa Website.url
[%PROGRAM_FILES%]\FlashGet\UninstallLib.exe
[%PROGRAM_FILES%]\InstallShield Installation Information\{1C3CCE60-7E1F-4CA5-A071-DB32D288BF23}\_setup.dll
[%PROGRAM_FILES%]\InstallShield Installation Information\{38C76428-6C9C-4CC6-B747-3AB6A4770225}\_setup.dll
[%PROGRAM_FILES%]\InstallShield Installation Information\{A05908FF-E003-4DA5-8111-04468E81EB20}\_setup.dll
[%PROGRAM_FILES%]\Kazaa\Db\bb2.db
[%PROGRAM_FILES%]\Kazaa\Help\h_mykazaa.gif
[%PROGRAM_FILES%]\Kazaa\Help\h_myMedia.gif
[%PROGRAM_FILES%]\Kazaa\Help\h_myplaylists.gif
[%PROGRAM_FILES%]\Kazaa\Help\myKapsules.gif
[%PROGRAM_FILES%]\Kazaa\Help\mykapsules.htm
[%PROGRAM_FILES%]\Kazaa\Help\mykazaa.css
[%PROGRAM_FILES%]\Kazaa\Help\mykazaa.htm
[%PROGRAM_FILES%]\Kazaa\Help\mymedia.htm
[%PROGRAM_FILES%]\Kazaa\Help\myplaylists.htm
[%PROGRAM_FILES%]\Kazaa\kazaa.exe
[%PROGRAM_FILES%]\Kazaa\Kazaa.url
[%PROGRAM_FILES%]\Kazaa\kzscan.dll
[%PROGRAM_FILES%]\Kazaa\magnet.exe
[%PROGRAM_FILES%]\Kazaa\My Channels\Bin\crazyplaygames.kcd
[%PROGRAM_FILES%]\Kazaa\My Channels\Bin\dating.kcd
[%PROGRAM_FILES%]\Kazaa\My Channels\Bin\emerging_artists.kcd
[%PROGRAM_FILES%]\Kazaa\My Channels\Bin\g_spot.kcd
[%PROGRAM_FILES%]\Kazaa\My Channels\Bin\onelove_browse.kcd
[%PROGRAM_FILES%]\Kazaa\My Channels\Bin\ringtonechannel.kcd
[%PROGRAM_FILES%]\Kazaa\My Channels\Bin\rshiphop.kcd
[%PROGRAM_FILES%]\Kazaa\My Channels\Bin\skilledgames.kcd
[%PROGRAM_FILES%]\Kazaa\My Channels\Images\crazyplaygames.bmp
[%PROGRAM_FILES%]\Kazaa\My Channels\Images\onelove_browse.bmp
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Alternative Rock.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Barrington Levy.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Electronica.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Fine Arts Militia Album.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Folk.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Funk.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Hip Hop.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Jazz.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Pop Rock.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Public Enemy Revolverlution Album.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - R&B.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Reggae.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - The Honey Palace Album.kpl
[%PROGRAM_FILES%]\Kazaa\Promotions\Play Poker Now.ico
[%PROGRAM_FILES%]\Kazaa\Promotions\Play Poker Now.url
[%PROGRAM_FILES%]\Kazaa\Promotions\Your Free Casino Chips.ico
[%PROGRAM_FILES%]\Kazaa\Promotions\Your Free Casino Chips.url
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\License.txt
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_mykazaa.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_mykazaa_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_mykazaa_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_mykazaa_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_peer.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_peer_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_peer_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_peer_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_search.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_search_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_search_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_search_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_shop.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_shop_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_shop_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_shop_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_start.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_start_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_start_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_start_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_tell.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_tell_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_tell_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_tell_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_theatre.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_theatre_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_theatre_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_theatre_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_traffic.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_traffic_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_traffic_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_traffic_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_addtoplay.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_addtoplay_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_addtoplay_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_addtoplay_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_next.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_next_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_next_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_next_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_pause.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_pause_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_pause_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_pause_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_play.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_play_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_play_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_play_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_prev.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_prev_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_prev_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_prev_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_slider.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_sliderThumb.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_sliderThumb_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_stop.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_stop_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_stop_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_stop_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_volume.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_volume_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_volume_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_volume_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_delete.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_delete_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_delete_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_delete_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_folders.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_folders_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_folders_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_folders_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_moreinfo.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_moreinfo_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_moreinfo_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_moreinfo_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_share.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_share_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_share_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_share_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\skin.xml
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_back.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_back_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_back_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_back_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_fwd.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_fwd_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_fwd_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_fwd_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_home.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_home_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_home_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_home_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_refresh.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_refresh_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_refresh_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_refresh_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_stop.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_stop_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_stop_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_stop_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\theatrebar_fullscreen.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\theatrebar_fullscreen_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\theatrebar_fullscreen_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\theatrebar_fullscreen_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\trafficbar_cancel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\trafficbar_cancel_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\trafficbar_cancel_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\trafficbar_cancel_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\trafficbar_pause.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\trafficbar_pause_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\trafficbar_pause_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\trafficbar_pause_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_close.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_close_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_close_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_close_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_maximise.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_maximise_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_maximise_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_maximise_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_minimise.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_minimise_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_minimise_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_minimise_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_restore.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_restore_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_restore_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_restore_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Orbital Shadows\License.txt
[%PROGRAM_FILES%]\Kazaa\TopSearch.dll
[%PROGRAM_FILES%]\MyWay\myBar\1.bin\PARTNER3.DAT
[%PROGRAM_FILES%]\MyWay\myBar\1.bin\PARTNER4.DAT
[%PROGRAM_FILES%]\MyWay\myBar\1.bin\PARTNER5.DAT
[%PROGRAM_FILES%]\MyWay\myBar\1.bin\PARTNER6.DAT
[%PROGRAM_FILES_COMMON%]\MSSoap\Binaries\HLSC10.dll
[%PROGRAM_FILES_COMMON%]\MSSoap\Binaries\SOAPISAP.dll
[%PROGRAM_FILES_COMMON%]\MSSoap\Binaries\XHSC10.dll
[%WINDOWS%]\cdmxtras\uninst.exe
[%WINDOWS%]\Temp\Altnet\adm.exe
[%WINDOWS%]\Temp\Altnet\adm25.dll
[%WINDOWS%]\Temp\Altnet\adm4.dll
[%WINDOWS%]\Temp\Altnet\admdata.dll
[%WINDOWS%]\Temp\Altnet\admdloader.dll
[%WINDOWS%]\Temp\Altnet\admfdi.dll
[%WINDOWS%]\Temp\Altnet\admprog.dll
[%WINDOWS%]\Temp\Altnet\mysearch.cab
[%WINDOWS%]\Temp\msxml_cabinstall.exe
[%WINDOWS%]\system\scp\services.exe
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Launch Kazaa.lnk
[%DESKTOP%]\Kazaa.lnk
[%DESKTOP%]\kazaa_setup.exe
[%DESKTOP%]\my shared folder.lnk
[%DESKTOP%]\my shared folder.url
[%DESKTOP%]\Shortcuts\Music\kazaa_setup.exe
[%DESKTOP%]\Unused Desktop Shortcuts\Kazaa Promotions.url
[%DESKTOP%]\Unused Desktop Shortcuts\My Shared Folder.url
[%PROFILE_TEMP%]\p2psetup.exe
[%PROGRAMS%]\kazaa media desktop\kazaa media desktop.lnk
[%PROGRAMS%]\KaZaA Media Desktop\Kazaa Website.url
[%PROGRAMS%]\Kazaa\Kazaa Website.url
[%PROGRAM_FILES%]\FlashGet\UninstallLib.exe
[%PROGRAM_FILES%]\InstallShield Installation Information\{1C3CCE60-7E1F-4CA5-A071-DB32D288BF23}\_setup.dll
[%PROGRAM_FILES%]\InstallShield Installation Information\{38C76428-6C9C-4CC6-B747-3AB6A4770225}\_setup.dll
[%PROGRAM_FILES%]\InstallShield Installation Information\{A05908FF-E003-4DA5-8111-04468E81EB20}\_setup.dll
[%PROGRAM_FILES%]\Kazaa\Db\bb2.db
[%PROGRAM_FILES%]\Kazaa\Help\h_mykazaa.gif
[%PROGRAM_FILES%]\Kazaa\Help\h_myMedia.gif
[%PROGRAM_FILES%]\Kazaa\Help\h_myplaylists.gif
[%PROGRAM_FILES%]\Kazaa\Help\myKapsules.gif
[%PROGRAM_FILES%]\Kazaa\Help\mykapsules.htm
[%PROGRAM_FILES%]\Kazaa\Help\mykazaa.css
[%PROGRAM_FILES%]\Kazaa\Help\mykazaa.htm
[%PROGRAM_FILES%]\Kazaa\Help\mymedia.htm
[%PROGRAM_FILES%]\Kazaa\Help\myplaylists.htm
[%PROGRAM_FILES%]\Kazaa\kazaa.exe
[%PROGRAM_FILES%]\Kazaa\Kazaa.url
[%PROGRAM_FILES%]\Kazaa\kzscan.dll
[%PROGRAM_FILES%]\Kazaa\magnet.exe
[%PROGRAM_FILES%]\Kazaa\My Channels\Bin\crazyplaygames.kcd
[%PROGRAM_FILES%]\Kazaa\My Channels\Bin\dating.kcd
[%PROGRAM_FILES%]\Kazaa\My Channels\Bin\emerging_artists.kcd
[%PROGRAM_FILES%]\Kazaa\My Channels\Bin\g_spot.kcd
[%PROGRAM_FILES%]\Kazaa\My Channels\Bin\onelove_browse.kcd
[%PROGRAM_FILES%]\Kazaa\My Channels\Bin\ringtonechannel.kcd
[%PROGRAM_FILES%]\Kazaa\My Channels\Bin\rshiphop.kcd
[%PROGRAM_FILES%]\Kazaa\My Channels\Bin\skilledgames.kcd
[%PROGRAM_FILES%]\Kazaa\My Channels\Images\crazyplaygames.bmp
[%PROGRAM_FILES%]\Kazaa\My Channels\Images\onelove_browse.bmp
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Alternative Rock.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Barrington Levy.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Electronica.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Fine Arts Militia Album.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Folk.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Funk.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Hip Hop.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Jazz.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Pop Rock.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Public Enemy Revolverlution Album.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - R&B.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - Reggae.kpl
[%PROGRAM_FILES%]\Kazaa\My Unshared Folder\Audio - The Honey Palace Album.kpl
[%PROGRAM_FILES%]\Kazaa\Promotions\Play Poker Now.ico
[%PROGRAM_FILES%]\Kazaa\Promotions\Play Poker Now.url
[%PROGRAM_FILES%]\Kazaa\Promotions\Your Free Casino Chips.ico
[%PROGRAM_FILES%]\Kazaa\Promotions\Your Free Casino Chips.url
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\License.txt
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_mykazaa.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_mykazaa_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_mykazaa_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_mykazaa_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_peer.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_peer_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_peer_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_peer_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_search.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_search_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_search_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_search_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_shop.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_shop_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_shop_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_shop_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_start.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_start_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_start_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_start_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_tell.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_tell_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_tell_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_tell_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_theatre.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_theatre_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_theatre_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_theatre_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_traffic.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_traffic_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_traffic_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mainbar_traffic_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_addtoplay.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_addtoplay_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_addtoplay_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_addtoplay_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_next.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_next_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_next_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_next_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_pause.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_pause_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_pause_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_pause_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_play.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_play_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_play_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_play_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_prev.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_prev_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_prev_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_prev_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_slider.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_sliderThumb.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_sliderThumb_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_stop.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_stop_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_stop_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_stop_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_volume.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_volume_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_volume_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mediabar_volume_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_delete.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_delete_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_delete_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_delete_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_folders.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_folders_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_folders_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_folders_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_moreinfo.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_moreinfo_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_moreinfo_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_moreinfo_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_share.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_share_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_share_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\mykazaabar_share_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\skin.xml
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_back.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_back_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_back_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_back_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_fwd.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_fwd_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_fwd_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_fwd_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_home.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_home_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_home_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_home_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_refresh.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_refresh_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_refresh_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_refresh_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_stop.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_stop_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_stop_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\startbar_stop_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\theatrebar_fullscreen.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\theatrebar_fullscreen_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\theatrebar_fullscreen_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\theatrebar_fullscreen_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\trafficbar_cancel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\trafficbar_cancel_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\trafficbar_cancel_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\trafficbar_cancel_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\trafficbar_pause.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\trafficbar_pause_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\trafficbar_pause_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\trafficbar_pause_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_close.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_close_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_close_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_close_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_maximise.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_maximise_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_maximise_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_maximise_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_minimise.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_minimise_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_minimise_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_minimise_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_restore.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_restore_dis.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_restore_over.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Black Glass\windowbar_restore_sel.bmp
[%PROGRAM_FILES%]\Kazaa\Skins\Orbital Shadows\License.txt
[%PROGRAM_FILES%]\Kazaa\TopSearch.dll
[%PROGRAM_FILES%]\MyWay\myBar\1.bin\PARTNER3.DAT
[%PROGRAM_FILES%]\MyWay\myBar\1.bin\PARTNER4.DAT
[%PROGRAM_FILES%]\MyWay\myBar\1.bin\PARTNER5.DAT
[%PROGRAM_FILES%]\MyWay\myBar\1.bin\PARTNER6.DAT
[%PROGRAM_FILES_COMMON%]\MSSoap\Binaries\HLSC10.dll
[%PROGRAM_FILES_COMMON%]\MSSoap\Binaries\SOAPISAP.dll
[%PROGRAM_FILES_COMMON%]\MSSoap\Binaries\XHSC10.dll
[%WINDOWS%]\cdmxtras\uninst.exe
[%WINDOWS%]\Temp\Altnet\adm.exe
[%WINDOWS%]\Temp\Altnet\adm25.dll
[%WINDOWS%]\Temp\Altnet\adm4.dll
[%WINDOWS%]\Temp\Altnet\admdata.dll
[%WINDOWS%]\Temp\Altnet\admdloader.dll
[%WINDOWS%]\Temp\Altnet\admfdi.dll
[%WINDOWS%]\Temp\Altnet\admprog.dll
[%WINDOWS%]\Temp\Altnet\mysearch.cab
[%WINDOWS%]\Temp\msxml_cabinstall.exe
[%WINDOWS%]\system\scp\services.exe

Folders:
[%PROGRAMS%]\kazaa
[%PROGRAM_FILES%]\kazaa
[%STARTMENU%]\programs\kazaa media desktop
[%WINDOWS%]\browserxtras\pn
[%WINDOWS%]\cache329

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{66fc8717-efa7-4546-8c4a-e224f3a80c76}
HKEY_CLASSES_ROOT\clsid\{f78b32d6-d6d8-4137-a18f-91ebe1a4aedb}
HKEY_CURRENT_USER\software\kazaa
HKEY_LOCAL_MACHINE\software\classes\adm25.adm25
HKEY_LOCAL_MACHINE\software\classes\adm25.adm25.1
HKEY_LOCAL_MACHINE\software\classes\adm4.adm4
HKEY_LOCAL_MACHINE\software\classes\adm4.adm4.1
HKEY_LOCAL_MACHINE\software\classes\appid\{8b0fef15-54dc-49f5-8377-8172de975f75}
HKEY_LOCAL_MACHINE\software\classes\appid\{99a8e2b2-3405-4c0d-9110-131c14caaf62}
HKEY_LOCAL_MACHINE\software\classes\clsid\{66fc8717-efa7-4546-8c4a-e224f3a80c76}
HKEY_LOCAL_MACHINE\software\classes\clsid\{c91e8926-d4be-4685-99f4-0d996b96bac0}
HKEY_LOCAL_MACHINE\software\classes\jcde_stack
HKEY_LOCAL_MACHINE\software\classes\jcde_stack.1
HKEY_LOCAL_MACHINE\software\classes\webp2pinstaller.installer
HKEY_LOCAL_MACHINE\software\classes\webp2pinstaller.installer.1
HKEY_LOCAL_MACHINE\software\kazaa
HKEY_LOCAL_MACHINE\software\magnet
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app management\arpcache\p2p networking
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{38c76428-6c9c-4cc6-b747-3ab6a4770225}
HKEY_LOCAL_MACHINE\software\sharman networks ltd


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Pigeon.AVHW Trojan Removal instruction
Nilage Trojan Cleaner
DetectSatan Ransomware Symptoms

ProRat Trojan

How To Remove ProRat?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
ProRat is dangerous virus:
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
They function in the same way as legal remote administration programs used by system administrators.
This makes them difficult to detect.

Backdoors are installed and launched without the consent of the user of computer.
Often the backdoor will not be visible in the log of active programs.

Once a backdoor has been successfully launched, the computer is wide open.
Backdoor functions can include:


  • Launching/ deleting files

  • Sending/ receiving files

  • Deleting data

  • Displaying notification

  • Rebooting the machine

  • Executing files




Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.
Backdoors combine the functionality of most other types of in one package.

Backdoors have one especially dangerous sub-class: variants that can propagate like worms.
Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on
April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack.



ProRat It also known as:

[Kaspersky]Backdoor.Prorat.10.a,TrojanDropper.Win32.Agent.av,Backdoor.Prorat.10.c;
[Eset]Win32/Prorat.14 trojan,Win32/Prorat.16 trojan,Win32/Prorat.17 trojan,Win32/Prorat.11 trojan,Win32/Prorat.10.C trojan;
[Panda]Trojan Horse,Bck/Prorat.B,Backdoor Program,Bck/Prorat.D,Backdoor Program.LC,Bck/Prorat.A;
[Computer Associates]Backdoor/Prorat.14!Server,Backdoor/Prorat.14.Server,Win32.ProRat.14.A,Win32.ProRat.D,Win32/Prorat.12.2768!Trojan,Win32/Prorat.12.2768.Trojan,Backdoor/Prorat.14.B!Server,Backdoor/Prorat.14.Server.HookDL,Backdoor/Prorat.DLL,Win32.ProRat,Win32.ProRat.17.A,Win32.ProRat.E,Win32.ProRat.G,Backdoor/ProRat.11,Backdoor/Prorat.10.a,Backdoor/Prorat.323584!Server,Win32.ProRat.A,Win32/ProRat.10.A!Trojan,Backdoor/Prorat.17,Win32.Prorat.18.A;
[Other]Win32/ProRat.Z

ProRat Symptoms:

Files:
[%SYSTEM%]\fservice.exe
[%SYSTEM%]\reginv.dll
[%SYSTEM%]\winkey.dll
[%WINDOWS%]\ktd32.atm
[%WINDOWS%]\system\sservice.exe
[%PROGRAM_FILES%]\norton systemworks\norton antivirus\quarantine\32fd2804.dll
[%PROGRAM_FILES%]\norton systemworks\norton antivirus\quarantine\331c7edf.dll
[%PROGRAM_FILES%]\norton systemworks\norton antivirus\quarantine\331f28db.dll
[%SYSTEM%]\wininv.dll
[%SYSTEM%]\fservice.exe
[%SYSTEM%]\reginv.dll
[%SYSTEM%]\winkey.dll
[%WINDOWS%]\ktd32.atm
[%WINDOWS%]\system\sservice.exe
[%PROGRAM_FILES%]\norton systemworks\norton antivirus\quarantine\32fd2804.dll
[%PROGRAM_FILES%]\norton systemworks\norton antivirus\quarantine\331c7edf.dll
[%PROGRAM_FILES%]\norton systemworks\norton antivirus\quarantine\331f28db.dll
[%SYSTEM%]\wininv.dll

Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{5y99ae78-58tt-11dw-be53-y67078979y}

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Ezik Spyware Symptoms
USSR Trojan Symptoms

VB Trojan

How To Remove VB?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
VB is dangerous virus:
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.

Spyware is computer software that is installed surreptitiously on a personal computer
to with the computer, without the user's informed consent.
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
They function in the same way as legal remote administration programs used by system administrators.
This makes them difficult to detect.

Backdoors are installed and launched without the consent of the user of computer.
Often the backdoor will not be visible in the log of active programs.

Once a backdoor has been successfully launched, the computer is wide open.
Backdoor functions can include:


  • Launching/ deleting files

  • Sending/ receiving files

  • Deleting data

  • Displaying notification

  • Rebooting the machine

  • Executing files




Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.
Backdoors combine the functionality of most other types of in one package.

Backdoors have one especially dangerous sub-class: variants that can propagate like worms.
A Search hijacker redirects search results to other pages and may
transmit search and browsing data to unknown servers. An error page hijacker directs
the browser to another page, usually an advertising page, instead of the usual error
page when the requested URL is not found.
The downloader either launches the new malware or registers it to enable autorun
according to the local operating system requirements.
These utilities are designed to penetrate remote computers
in order to use them as zombies (by using backdoors) or to download other malicious programs to computer.

Exploits use vulnerabilities in operating systems and applications to achieve the same result.
DoS trojans conduct attacks from a single computer with the consent of the user.


VB It also known as:

[Kaspersky]Trojan.Spy.VB.g,TrojanSpy.Win32.VB.g,TrojanDownloader.Win32.VB.aa;
[Eset]Win32/VB.GN trojan,Win32/VB.KX trojan,Win32/VB.AO trojan,Win32/VB.KP trojan,Win32/VB.IY trojan,Win32/VB.LV trojan,Win32/VB.KC trojan,Win32/VB.BX trojan,Win32/VB.E trojan,Win32/VB.IZ trojan,Win32/VB.KD trojan,Win32/TrojanClicker.VB.P trojan,Win32/VB.JQ trojan,Win32/VB.MG trojan;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program,Trojan Horse,Bck/X2a,Backdoor Program.LC,Trj/W32.VB,Trj/VB.N,Trojan Horse.LC,Spyware/Adclicker,Bck/VB.V,Trj/W32.VB.F;
[Computer Associates]Win32/VB.g!Spy!Trojan,Win32/VB.h!Trojan,Win32/VB.M!Spy!Trojan,Backdoor/VB.GN,Backdoor/VB.KX,Backdoor/VB.AO,Backdoor/VB.KP,Win32.Force.161.B,Win32/VB.U!Spy!Trojan,Backdoor/VB.IY,Backdoor/VB.LV!Server,Backdoor/VB.KC,Win32/VB.BS!PWS!Trojan,Win32/VB.r!PWS!Trojan,Win32/VB.AJ.12288!Trojan,Backdoor/VB.BX,Backdoor/VB.E,Backdoor/VB.IZ,Win32/VB.L!Spy!Trojan,Win32/VB.Z!PWS!Trojan,Win32/VB.AV!Trojan,Win32/VB.BH!Trojan,Win32/VB.n!Trojan,Win32/VB.r!Trojan,Win32/VB.x!Trojan,Win32/VB.a!Trojan,Win32/VB.AY!PWS!Trojan,Win32/VB.NU.14336!Trojan,Win32/VB.NZ.28672!Trojan,Win32/VB.AE!PWS!Trojan,Win32/VB.AG!PWS!Trojan,Win32/VB.AW!Binder!Trojan,Win32/VB.A!Exploit!Trojan,Backdoor/VB.258048,Win32/VB.p!Trojan,Backdoor/VB.JQ,Backdoor/VB.OU!Server,Win32/VB.f!Trojan,Win32/VB.w!Trojan,Win32/VB.d!Trojan,Win32/VB.A1!Downloader,Win32/VB.b!Downloader,Win32/VB.y!Trojan,Win32/VB.j!Trojan,Backdoor/VB.77824

VB Symptoms:

Files:
[%PROGRAM_FILES%]\thaimeaning4.0\Msstdfmt.dll
[%SYSTEM%]\MSSTDFMT.DLL
[%SYSTEM%]\sendmail.ocx
[%SYSTEM%]\autodiscx32.dll
[%SYSTEM%]\W32SillySpy-CZ.exe
[%PROGRAM_FILES%]\thaimeaning4.0\Msstdfmt.dll
[%SYSTEM%]\MSSTDFMT.DLL
[%SYSTEM%]\sendmail.ocx
[%SYSTEM%]\autodiscx32.dll
[%SYSTEM%]\W32SillySpy-CZ.exe

Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\klgr


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Removing Thrap Trojan

Sverdlov Trojan

How To Remove Sverdlov?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Sverdlov is dangerous virus:
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
They function in the same way as legal remote administration programs used by system administrators.
This makes them difficult to detect.

Backdoors are installed and launched without the consent of the user of computer.
Often the backdoor will not be visible in the log of active programs.

Once a backdoor has been successfully launched, the computer is wide open.
Backdoor functions can include:


  • Launching/ deleting files

  • Sending/ receiving files

  • Deleting data

  • Displaying notification

  • Rebooting the machine

  • Executing files




Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.
Backdoors combine the functionality of most other types of in one package.

Backdoors have one especially dangerous sub-class: variants that can propagate like worms.
This family of Trojans downloads and installs new malware or adware on the computer.
The downloader then either launches the new malware or registers it to enable autorun
according to the local operating system requirements.

The names and locations of malware to be downloaded are either coded into the
Trojan or downloaded from a specified website.
DoS trojans conduct attacks from a single computer with the consent of the user.


Sverdlov Symptoms:

Files:
[%SYSTEM%]\test3a_1.dll
[%SYSTEM%]\test3a_1.dll


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Zatekey Trojan Information
Removing Win32.HackTool.Auha Trojan
Remove Kakkeys Trojan
Istbar.dr Downloader Symptoms

Unknown.Toolbar4 BHO

How To Remove Unknown.Toolbar4?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Unknown.Toolbar4 is dangerous virus:
The BHO (Browser Helper Object) waits for the user to post personal information to a monitored website.
As this information is entered by the user, it is captured by the BHO and sent back to the attacker.
Toolbar presents itself as a helpful add-on for Internet Explorer but it is a real pest.
It replaces your start page, continuosly open a number of pop up windows and so on.


Unknown.Toolbar4 Symptoms:

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{629eb713-96da-93a8-9e88-5e1188dd5d51}
HKEY_CLASSES_ROOT\clsid\{d6ec5a49-3966-55e7-d372-fd18c4391ca0}
HKEY_LOCAL_MACHINE\software\classes\clsid\{629eb713-96da-93a8-9e88-5e1188dd5d51}
HKEY_LOCAL_MACHINE\software\classes\clsid\{d6ec5a49-3966-55e7-d372-fd18c4391ca0}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{629eb713-96da-93a8-9e88-5e1188dd5d51}

Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Removing SpyArsenal.ICQ.Logger Spyware
agent.eb Downloader Cleaner

OrbitExplorer Adware

How To Remove OrbitExplorer?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
OrbitExplorer is dangerous virus:
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.

Toolbar presents itself as a helpful add-on for Internet Explorer but it is a real pest.
It replaces your start page, continuosly open a number of pop up windows and so on.


OrbitExplorer Symptoms:

Registry Keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{197AB1D7-A7DD-4C86-A938-1FCC0DB21B85}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{197ab1d7-a7dd-4c86-a938-1fcc0db21b85}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{cdf2114e-8ff2-49e6-9ea9-10ac826298cf}


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Removing Aureate.Group.Mail Adware
Removing Wantvi Trojan
WinSpy Trojan Symptoms
ESurveiller Spyware Information
CWS.DataNotary Hijacker Removal

AppsTraka Spyware

How To Remove AppsTraka?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
AppsTraka is dangerous virus:
Spyware is computer software that is installed surreptitiously on a personal computer
to intercept or take partial control over the user's interaction
with the computer, without the user's informed consent.

While the term spyware suggests software that secretly monitors the user's behavior,
the functions of spyware extend well beyond simple monitoring.

Spyware programs can collect various types of personal information,
such as Internet surfing habit, sites that have been visited,
but can also interfere with user control of the computer in other ways,
such as installing additional software, redirecting Web browser activity,
accessing websites blindly that will cause more harmful viruses,
or diverting advertising revenue to a third party.

Spyware can even change computer settings, resulting in slow connection speeds,
different home pages, and loss of Internet or other programs.
In an attempt to increase the understanding of spyware, a more formal classification
of its included software types is captured under the term privacy-invasive software.


AppsTraka Symptoms:

Files:
[%DESKTOP%]\AppsTraka.lnk
[%SYSTEM%]\Akeylg32.dll
[%SYSTEM%]\Appdlg32.dll
[%DESKTOP%]\AppsTraka.lnk
[%SYSTEM%]\Akeylg32.dll
[%SYSTEM%]\Appdlg32.dll

Folders:
[%PROGRAMS%]\AppsTraka
[%PROGRAM_FILES%]\AppsTraka

Registry Keys:
HKEY_LOCAL_MACHINE\system\controlset001\services\dtsagntsvc
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\appstraka_is1
HKEY_LOCAL_MACHINE\software\odisoft

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runndows\currentversion\run


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Remove Bancos.GRO Trojan
Removing Ziocom Adware
MIRC.IRCFlood Trojan Information

TrojanDownloader.Win32.PurityScan Downloader

How To Remove TrojanDownloader.Win32.PurityScan?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
TrojanDownloader.Win32.PurityScan is dangerous virus:
Trojans-downloaders downloads and installs new malware or adware on the computer.



TrojanDownloader.Win32.PurityScan It also known as:

[Panda]Adware/BuddyLinks,Adware/PurityScan

TrojanDownloader.Win32.PurityScan Symptoms:

Files:
[%SYSTEM%]\lib.dll
[%SYSTEM%]\wdm.dll
[%APPDATA%]\edtc.exe
[%APPDATA%]\lmur.exe
[%APPDATA%]\saei.exe
[%APPDATA%]\ttuh.exe
[%SYSTEM%]\bgurfny.dll
[%SYSTEM%]\clxyf.exe
[%SYSTEM%]\djnzgde.dll
[%SYSTEM%]\ekdcxir.dll
[%SYSTEM%]\eqlv.dll
[%SYSTEM%]\imjhv.dll
[%SYSTEM%]\lsi.dll
[%SYSTEM%]\ltjouq.dll
[%SYSTEM%]\nbgs.dll
[%SYSTEM%]\oozdaqbc.exe
[%SYSTEM%]\ownrggx.dll
[%SYSTEM%]\qdg.dll
[%SYSTEM%]\rass.exe
[%SYSTEM%]\rvlyklrt.exe
[%SYSTEM%]\spqh.exe
[%SYSTEM%]\svpyq.dll
[%SYSTEM%]\tmno.exe
[%SYSTEM%]\umnt.exe
[%SYSTEM%]\vbcj.dll
[%SYSTEM%]\viav.dll
[%SYSTEM%]\vylod.exe
[%SYSTEM%]\xlkpncbm.dll
[%WINDOWS%]\application data\ssme.exe
[%WINDOWS%]\system\exaz.dll
[%WINDOWS%]\system\mvfpecjl.exe
[%WINDOWS%]\system\vnkjipfc.dll
[%SYSTEM%]\lib.dll
[%SYSTEM%]\wdm.dll
[%APPDATA%]\edtc.exe
[%APPDATA%]\lmur.exe
[%APPDATA%]\saei.exe
[%APPDATA%]\ttuh.exe
[%SYSTEM%]\bgurfny.dll
[%SYSTEM%]\clxyf.exe
[%SYSTEM%]\djnzgde.dll
[%SYSTEM%]\ekdcxir.dll
[%SYSTEM%]\eqlv.dll
[%SYSTEM%]\imjhv.dll
[%SYSTEM%]\lsi.dll
[%SYSTEM%]\ltjouq.dll
[%SYSTEM%]\nbgs.dll
[%SYSTEM%]\oozdaqbc.exe
[%SYSTEM%]\ownrggx.dll
[%SYSTEM%]\qdg.dll
[%SYSTEM%]\rass.exe
[%SYSTEM%]\rvlyklrt.exe
[%SYSTEM%]\spqh.exe
[%SYSTEM%]\svpyq.dll
[%SYSTEM%]\tmno.exe
[%SYSTEM%]\umnt.exe
[%SYSTEM%]\vbcj.dll
[%SYSTEM%]\viav.dll
[%SYSTEM%]\vylod.exe
[%SYSTEM%]\xlkpncbm.dll
[%WINDOWS%]\application data\ssme.exe
[%WINDOWS%]\system\exaz.dll
[%WINDOWS%]\system\mvfpecjl.exe
[%WINDOWS%]\system\vnkjipfc.dll

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Frethog.ACB Trojan Cleaner

Lithog Trojan

How To Remove Lithog?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Lithog is dangerous virus:
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.


Lithog Symptoms:

Files:
[%SYSTEM%]\l33t.dat
[%SYSTEM%]\l33t.exe
[%SYSTEM%]\l33t.dat
[%SYSTEM%]\l33t.exe

Registry Keys:
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\l33t


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Boss.Everyware Spyware Symptoms
Removing RSM Backdoor
HMToolbar Toolbar Information
Quick.Launch Spyware Information

Golden.Eye Spyware

How To Remove Golden.Eye?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Golden.Eye is dangerous virus:
Spyware is computer software that is installed surreptitiously on a personal computer
to with the computer, without the user's informed consent.
Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on
April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack.



Golden.Eye It also known as:

[Kaspersky]packed: ASProtect

Golden.Eye Symptoms:

Files:
[%PROGRAM_FILES%]\AGSeydsApp\GEHP.dll
[%SYSTEM%]\keybhook.dll
[%SYSTEM%]\KeybHookpro.dll
[%APPDATA%]\lhgsyfe
[%DESKTOP%]\golden eye.lnk
[%DESKTOP%]\golden eye.lnk
[%PROGRAMS%]\golden eye\golden eye.lnk
[%PROGRAMS%]\golden eye\help.lnk
[%PROGRAMS%]\golden eye\uninstall.lnk
[%SYSTEM%]\goldneye.lnk
[%WINDOWS%]\goldeneye.lnk
[%PROGRAM_FILES%]\AGSeydsApp\GEHP.dll
[%SYSTEM%]\keybhook.dll
[%SYSTEM%]\KeybHookpro.dll
[%APPDATA%]\lhgsyfe
[%DESKTOP%]\golden eye.lnk
[%DESKTOP%]\golden eye.lnk
[%PROGRAMS%]\golden eye\golden eye.lnk
[%PROGRAMS%]\golden eye\help.lnk
[%PROGRAMS%]\golden eye\uninstall.lnk
[%SYSTEM%]\goldneye.lnk
[%WINDOWS%]\goldeneye.lnk

Folders:
[%SYSTEM%]\sys52data
[%COMMON_PROGRAMS%]\Golden Eye
[%PROGRAMS%]\golden eye
[%PROGRAM_FILES%]\a8gsdsapp
[%PROGRAM_FILES%]\golden eye

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Web.CPR Adware Symptoms
TotalVelocity.zSearch BHO Symptoms
Windows Safety Alert Trojan Information
CMD Backdoor Information
WinPup32 Trojan Removal instruction

MediaUpdate.SafeSurfing BHO

How To Remove MediaUpdate.SafeSurfing?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
MediaUpdate.SafeSurfing is dangerous virus:
As this information is entered by the user, it is captured by the BHO (Browser Helper Object) and
sent back to the attacker.
Typically, keyloggers of this type will send the stolen information back to the attacker via email
or HTTP POST, which can appear suspicious.A desktop hijacker replaces the desktop wallpaper with advertising
for products and services on the desktop.


MediaUpdate.SafeSurfing Symptoms:

Files:
[%SYSTEM%]\ssurf022.dll
[%WINDOWS%]\system\ssurf022.dll
[%SYSTEM%]\ssurf022.dll
[%WINDOWS%]\system\ssurf022.dll

Registry Keys:
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{d8e25c53-9508-4f5c-9249-d98d438891d5}
HKEY_LOCAL_MACHINE\software\classes\clsid\{d8e25c53-9508-4f5c-9249-d98d438891d5}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{d8e25c53-9508-4f5c-9249-d98d438891d5}


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Removing VIP.NetLink BHO
Removing Bancos.GCZ Trojan

Backage Trojan

How To Remove Backage?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Backage is dangerous virus:
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
They function in the same way as legal remote administration programs used by system administrators.
This makes them difficult to detect.

Backdoors are installed and launched without the consent of the user of computer.
Often the backdoor will not be visible in the log of active programs.

Once a backdoor has been successfully launched, the computer is wide open.
Backdoor functions can include:


  • Launching/ deleting files

  • Sending/ receiving files

  • Deleting data

  • Displaying notification

  • Rebooting the machine

  • Executing files




Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.
Backdoors combine the functionality of most other types of in one package.

Backdoors have one especially dangerous sub-class: variants that can propagate like worms.
Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on
April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack.



Backage It also known as:

[Kaspersky]Backdoor.Backage.30,Backdoor.Backage.301,Backdoor.Backage.32;
[Eset]Win32/Backage.30.Client trojan,Win32/Backage.30.Server trojan,Win32/Backage.301.Server trojan,Win32/Backage.301 trojan,Win32/Backage.301.Client trojan,Win32/Backage.32 trojan;
[McAfee]BackDoor-GW;
[F-Prot]security risk or a "backdoor" program;
[Computer Associates]Backdoor/Backage.30.Client,Backdoor/Backage.30.Server,Backdoor/Backage.301,Backdoor/Backage_32.Dropper

Backage Symptoms:

Files:
[%WINDOWS%]\mskernel16.exe
[%WINDOWS%]\winstop32.exe
[%WINDOWS%]\mskernel16.exe
[%WINDOWS%]\winstop32.exe


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Cygo Adware Symptoms
Removing OnlineHelpmate Ransomware
Remove VTLBar Adware
Bitch.Controller Trojan Cleaner
AdServerNow Adware Symptoms