Wednesday, December 3, 2008

Agent.SBB Trojan

How To Remove Agent.SBB?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Agent.SBB is dangerous virus:
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.



Agent.SBB It also known as:

[Kaspersky]AdWare.Win32.VB.c;
[McAfee]Generic PUP.a;
[Other]W32/Agent.SBB

Agent.SBB Symptoms:

Files:
[%PROFILE_TEMP%]\outme.exe
[%PROFILE_TEMP%]\WinMt.exe
[%PROFILE_TEMP%]\WinoutMtt.exe
[%PROFILE_TEMP%]\outme.exe
[%PROFILE_TEMP%]\WinMt.exe
[%PROFILE_TEMP%]\WinoutMtt.exe


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
DBL Trojan Symptoms
Way.skyfire RAT Removal

Gilamodin Trojan

How To Remove Gilamodin?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Gilamodin is dangerous virus:
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.


Gilamodin It also known as:

[Other]Win32/Gilamodin,Win32/Gilamodin.A,Infostealer

Gilamodin Symptoms:

Files:
[%SYSTEM%]\rund1132.exe
[%SYSTEM%]\ansend.exe
[%SYSTEM%]\CTFM0N.exe
[%SYSTEM%]\insrv.exe
[%SYSTEM%]\rund1132.exe
[%SYSTEM%]\ansend.exe
[%SYSTEM%]\CTFM0N.exe
[%SYSTEM%]\insrv.exe

Registry Keys:
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_race
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\race


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
BookedSpace.Remanent BHO Information
Remotcon Trojan Removal instruction
Removing KeySnatch Spyware
SpyHeal Trojan Removal instruction
Win32.EasyGet Trojan Cleaner

Adware.2Search Adware

How To Remove Adware.2Search?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Adware.2Search is dangerous virus:
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits


Adware.2Search It also known as:

[Kaspersky]AdWare.Win32.2Search.h;
[McAfee]Adware-2Search;
[Other]Adware.IMNames

Adware.2Search Symptoms:

Folders:
[%PROGRAM_FILES%]\Instant Messenger Names

Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{4508E20C-ACAD-11D2-9FC0-00550076E06F}
HKEY_CURRENT_USER\software\imadvertiser
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\browser helper objects\{4508e20c-acad-11d2-9fc0-00550076e06f}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\imnames
HKEY_CLASSES_ROOT\clsid\{4508e20c-acad-11d2-9fc0-00550076e06f}

Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Removing Banned Trojan
Inwin Trojan Symptoms

Clisser Downloader

How To Remove Clisser?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Clisser is dangerous virus:
The downloader either launches the new malware or registers it to enable autorun
according to the local operating system requirements.


Clisser Symptoms:

Files:
[%SYSTEM%]\sfpsvr.exe
[%SYSTEM%]\sfpsvr.exe

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Vgvpo.ANSI.Bomb Worm Symptoms
Remove SillyDl.CTK Trojan
Remove Musliv Trojan
Grad Hacker Tool Symptoms
Cool.Search BHO Removal

Vanquish Trojan

How To Remove Vanquish?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Vanquish is dangerous virus:
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.


Vanquish It also known as:

[Kaspersky]Trojan.Win32.Rootkit.d;
[Panda]Trojan Horse;
[Computer Associates]Win32/Vanquish!Rootkit!Trojan,Win32.Efewe,Win32.He4Hook

Vanquish Symptoms:

Files:
[%PROFILE_TEMP%]\p2psetup.exe
[%SYSTEM%]\icsxml\P2P Networking\MARSHAL2.DLL
[%SYSTEM%]\p2p networking v126.cpl
[%SYSTEM%]\P2P Networking\MARSHAL2.DLL
[%WINDOWS%]\Downloaded Program Files\WebP2PInstaller.dll
[%WINDOWS%]\vanquish.dll
[%WINDOWS%]\vanquish.exe
[%PROFILE_TEMP%]\p2psetup.exe
[%SYSTEM%]\icsxml\P2P Networking\MARSHAL2.DLL
[%SYSTEM%]\p2p networking v126.cpl
[%SYSTEM%]\P2P Networking\MARSHAL2.DLL
[%WINDOWS%]\Downloaded Program Files\WebP2PInstaller.dll
[%WINDOWS%]\vanquish.dll
[%WINDOWS%]\vanquish.exe

Folders:
[%PROGRAM_FILES%]\need2find

Registry Keys:
HKEY_CURRENT_USER\software\p2p networking
HKEY_LOCAL_MACHINE\software\classes\clsid\{1d6711c8-7154-40bb-8380-3dea45b69cbf}
HKEY_LOCAL_MACHINE\software\classes\clsid\{cc7a6223-3759-4075-8cea-971f5cfc0ed2}
HKEY_LOCAL_MACHINE\software\classes\interface\{c91e8926-d4be-4685-99f4-0d996b96bac0}
HKEY_LOCAL_MACHINE\software\classes\typelib\{f720b40f-3a38-4b22-b30d-dcf095d42498}
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\vanquish


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
ABetterInternet.Ceres Adware Information

Win32.DlMersting.AM.DLL.Tr Trojan

How To Remove Win32.DlMersting.AM.DLL.Tr?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Win32.DlMersting.AM.DLL.Tr is dangerous virus:
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
When the default home page is hijacked, the browser opens to the web page set by the hijacker
instead of the user's designated home page. In some cases, the hijacker may block users from
restoring their desired home page.


Win32.DlMersting.AM.DLL.Tr It also known as:

[Kaspersky]Trojan.Win32.StartPage.ix;
[Panda]Trj/StartPage.FH;
[Computer Associates]Win32.Startpage.FZ,Win32/DlMersting.AM.30720!DLL!Tr

Win32.DlMersting.AM.DLL.Tr Symptoms:

Files:
[%SYSTEM%]\ccnk.dll
[%SYSTEM%]\ccnk.dll


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Regzone Trojan Removal instruction
Remove SillyDl.CYF Trojan
Devil Trojan Cleaner
Delf.cc Trojan Removal

Agent.ag Backdoor

How To Remove Agent.ag?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Agent.ag is dangerous virus:
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
They function in the same way as legal remote administration programs used by system administrators.
This makes them difficult to detect.

Backdoors are installed and launched without the consent of the user of computer.
Often the backdoor will not be visible in the log of active programs.

Once a backdoor has been successfully launched, the computer is wide open.
Backdoor functions can include:


  • Launching/ deleting files

  • Sending/ receiving files

  • Deleting data

  • Displaying notification

  • Rebooting the machine

  • Executing files




Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.
Backdoors combine the functionality of most other types of in one package.

Backdoors have one especially dangerous sub-class: variants that can propagate like worms.


Agent.ag Symptoms:

Files:
[%SYSTEM%]\phomac.exe
[%SYSTEM%]\phomac.exe


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
KidLogger Spyware Cleaner
Remove Restina Trojan

Adware.RBlast Trojan

How To Remove Adware.RBlast?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Adware.RBlast is dangerous virus:
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.

Hijackers are software programs that modify users' default browser home page,
search settings, error page settings, or desktop wallpaper without adequate notice, disclosure,
or user consent.

When the default home page is hijacked, the browser opens to the web page set by the hijacker
instead of the user's designated home page. In some cases, the hijacker may block users from
restoring their desired home page.

A search hijacker redirects search results to other pages and may
transmit search and browsing data to unknown servers. An error page hijacker directs
the browser to another page, usually an advertising page, instead of the usual error
page when the requested URL is not found.

A desktop hijacker replaces the desktop wallpaper with advertising
for products and services on the desktop.

Hijackers take control of various parts of your web browser, including your home page,
search pages, and search bar. They may also redirect you to certain sites should you
mistype an address or prevent you from going to a website they would rather you not,
such as sites that combat malware. Some will even redirect you to their own search engine
when you attempt a search. NB: hijackers almost exclusively target Internet Explorer.
The downloader either launches the new malware or registers it to enable autorun
according to the local operating system requirements.


Adware.RBlast It also known as:

[Kaspersky]TrojanDownloader.Win32.Delf.j,TrojanDownloader.Win32.IstBar.ak,TrojanDownloader.Win32.IstBar.ar,TrojanDownloader.Win32.IstBar.g,TrojanDropper.Win32.RunMe;
[Eset]Win32/TrojanDownloader.IstBar.AR trojan,Win32/TrojanDownloader.IstBar.G trojan;
[McAfee]Adware-RBlast;
[Panda]Spyware/ISTbar,Trj/W32.Delf;
[Computer Associates]Win32/IstBar.g!Downloader;
[Other]Win32/Rbot.DPG,W32/Rbot-AOK,Trojan.Dropper,Backdoor.Win32.Rbot.xn,Backdoor.Win32.IRCBot.bl

Adware.RBlast Symptoms:

Files:
[%PROGRAM_FILES%]\rb32\rb32.exe
[%PROGRAM_FILES%]\rb32\rb32.exe

Folders:
[%PROGRAM_FILES%]\fwn toolbar
[%PROGRAM_FILES%]\rapidblaster
[%PROGRAM_FILES%]\belmontsoft

Registry Keys:
HKEY_LOCAL_MACHINE\software\classes\appid\{f72cbc6d-6cbe-4570-ad54-4a51bff58036}
HKEY_LOCAL_MACHINE\software\classes\clsid\{01fc5803-8644-45d7-877b-5a3924d8ecc4}
HKEY_LOCAL_MACHINE\software\classes\clsid\{3d0bdab3-12f4-471c-8966-e35a2c6c7de7}
HKEY_LOCAL_MACHINE\software\classes\clsid\{3d156636-3f7e-46c9-9ac1-5e4d8202aa23}
HKEY_LOCAL_MACHINE\software\classes\clsid\{7eb15626-cb8e-4174-8a72-c055b12b4310}
HKEY_LOCAL_MACHINE\software\classes\clsid\{bcaa3a19-1051-4c2f-88b9-4d05985aa2c6}
HKEY_LOCAL_MACHINE\software\classes\fwn.fwntoolbar
HKEY_LOCAL_MACHINE\software\classes\fwn.isubclass
HKEY_LOCAL_MACHINE\software\classes\interface\{10d4adb7-0842-42eb-8c97-d94233d2dd5a}
HKEY_LOCAL_MACHINE\software\classes\interface\{3b879007-84a4-476a-82b0-819b3f1f9a6e}
HKEY_LOCAL_MACHINE\software\classes\interface\{3dbbf8b7-a97c-4a92-8d27-d29222e6b60f}
HKEY_LOCAL_MACHINE\software\classes\interface\{68831d00-169e-4feb-89b9-e099df439321}
HKEY_LOCAL_MACHINE\software\classes\interface\{ea9d65a3-8fa2-433e-9caf-68c6e43555af}
HKEY_LOCAL_MACHINE\software\classes\qd2.qd2loader
HKEY_LOCAL_MACHINE\software\classes\qd2.qd2loader.1
HKEY_LOCAL_MACHINE\software\classes\typelib\{0e9db3ab-d16a-47cf-b59a-f74d649bea5b}
HKEY_LOCAL_MACHINE\software\classes\typelib\{15e7d23b-736e-46fa-bffd-cbec4126befd}
HKEY_LOCAL_MACHINE\software\classes\typelib\{f72cbc6d-6cbe-4570-ad54-4a51bff58036}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{7EB15626-CB8E-4174-8A72-C055B12B4310}
HKEY_CLASSES_ROOT\clsid\{67d26f9a-4ece-4ba8-bf86-41398d5f25e9}
HKEY_CLASSES_ROOT\clsid\{efd0334a-d40b-4937-8b09-271a4ac78ac6}
HKEY_CLASSES_ROOT\clsid\{f0aa2376-f073-4e57-86e8-0238f99087c7}
HKEY_CLASSES_ROOT\interface\{67d26f9a-4ece-4ba8-bf86-41398d5f25e9}
HKEY_CLASSES_ROOT\typelib\{efd0334a-d40b-4937-8b09-271a4ac78ac6}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{7eb15626-cb8e-4174-8a72-c055b12b4310}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{f0aa2376-f073-4e57-86e8-0238f99087c7}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\notepad
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\rapidblaster
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\rb32
HKEY_LOCAL_MACHINE\software\rapidblaster

Registry Values:
HKEY_LOCAL_MACHINE\software\classes\appid\qd2.dll
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shell extensions\approved
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\fwn toolbar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\fwn toolbar
HKEY_LOCAL_MACHINE\software\classes\appid\qd2.dll
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]/downloaded program files/installer.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]/downloaded program files/installer.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls\[%WINDOWS%]\downloaded program files
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shell extensions\approved
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\fwn toolbar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\fwn toolbar


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
CQTS Trojan Removal instruction
Win32.T39424 Trojan Cleaner

OnlineGuard Ransomware

How To Remove OnlineGuard?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
OnlineGuard is dangerous virus:
A cryptovirus, cryptotrojan or cryptoworm is a type of
malware that encrypts the data belonging to an individual on a computer,
demanding a ransom for its restoration.

The term ransomware is commonly used to describe such software,
although the field known as cryptovirology predates the term "ransomware".

This type of ransom attack can be accomplished by (for example) attaching
a specially crafted file/program to an e-mail message and sending this to the victim.

If the victim opens/executes the attachment, the program encrypts
a number of files on the victim's computer. A ransom note is then left behind for the victim.

The victim will be unable to open the encrypted files without the correct decryption key.
Once the ransom demanded in the ransom note is paid, the cracker may (or may not)
send the decryption key, enabling decryption of the "kidnapped" files.


OnlineGuard Symptoms:

Files:
[%DESKTOP%]\OnlineGuard.lnk
[%DESKTOP%]\OnlineGuard.lnk

Folders:
[%PROGRAMS%]\OnlineGuard
[%PROGRAM_FILES%]\OnlineGuard

Registry Keys:
HKEY_CURRENT_USER\software\onlineguard
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\onlineguard

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
aSpy Spyware Symptoms
Ribbon Trojan Information
SpyHeal Trojan Removal instruction

Win32.AdURL Adware

How To Remove Win32.AdURL?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Win32.AdURL is dangerous virus:
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits


Win32.AdURL Symptoms:

Files:
[%WINDOWS%]\icont.exe
[%DESKTOP%]\$25 free!.url
[%DESKTOP%]\discount travel specials.url
[%DESKTOP%]\free games - cash prizes.url
[%DESKTOP%]\instant love alert.url
[%WINDOWS%]\icont.exe
[%DESKTOP%]\$25 free!.url
[%DESKTOP%]\discount travel specials.url
[%DESKTOP%]\free games - cash prizes.url
[%DESKTOP%]\instant love alert.url


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Activex.Runner Trojan Cleaner
Q3Smash Trojan Removal
Removing Zlob.br Downloader
Anonbomb DoS Information
kazaa.com Tracking Cookie Cleaner

Phasma Hacker Tool

How To Remove Phasma?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Phasma is dangerous virus:
Exploits use vulnerabilities in operating systems and applications to achieve the same result.
DoS trojans conduct attacks from a single computer with the consent of the user.


Phasma It also known as:

[Kaspersky]Flooder.MailSpam.Phasma.13;
[F-Prot]destructive program;
[Panda]Flooder/Phasma

Phasma Symptoms:

Files:
[%PROGRAMS%]\advanced instant messengers password recovery\advanced instant messengers password recovery.lnk
[%PROGRAMS%]\advanced instant messengers password recovery\aimpr tutorial.lnk
[%PROGRAMS%]\advanced instant messengers password recovery\how to order.lnk
[%PROGRAMS%]\advanced instant messengers password recovery\readme.lnk
[%PROGRAMS%]\advanced instant messengers password recovery\uninstall aimpr.lnk
[%PROGRAMS%]\advanced instant messengers password recovery\advanced instant messengers password recovery.lnk
[%PROGRAMS%]\advanced instant messengers password recovery\aimpr tutorial.lnk
[%PROGRAMS%]\advanced instant messengers password recovery\how to order.lnk
[%PROGRAMS%]\advanced instant messengers password recovery\readme.lnk
[%PROGRAMS%]\advanced instant messengers password recovery\uninstall aimpr.lnk

Folders:
[%PROFILE%]\start menu\programs\advanced instant messengers password recovery
[%PROGRAM_FILES%]\aimpr

Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\advanced instant messengers password recovery


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
BAT.Ordin Trojan Information

7FaSSt Spyware

How To Remove 7FaSSt?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
7FaSSt is dangerous virus:
Spyware programs can collect various types of personal information,
such as Internet surfing habit, sites that have been visited,
but can also interfere with user control of the computer in other ways,
such as installing additional software, redirecting Web browser activity,
accessing websites blindly that will cause more harmful viruses,
or diverting advertising revenue to a third party.
The BHO (Browser Helper Object) waits for the user to post personal information to a monitored website.
As this information is entered by the user, it is captured by the BHO and sent back to the attacker.
A Search hijacker redirects search results to other pages and may
transmit search and browsing data to unknown servers. An error page hijacker directs
the browser to another page, usually an advertising page, instead of the usual error
page when the requested URL is not found.
Toolbar presents itself as a helpful add-on for Internet Explorer but it is a real pest.
It replaces your start page, continuosly open a number of pop up windows and so on.


7FaSSt Symptoms:

Files:
[%SYSTEM%]\7search.dll
[%WINDOWS%]\system\7search.dll
[%SYSTEM%]\7search.dll
[%WINDOWS%]\system\7search.dll

Folders:
[%PROGRAM_FILES%]\fs

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{06dfedaa-6196-11d5-bfc8-00508b4a487d}
HKEY_CLASSES_ROOT\clsid\{669695bc-a811-4a9d-8cdf-ba8c795f261e}
HKEY_CLASSES_ROOT\clsid\{b8875bfe-b021-11d4-bfa8-00508b8e9bd3}
HKEY_CLASSES_ROOT\kbbar.kbbarband
HKEY_CLASSES_ROOT\kbbar.kbbarband.1
HKEY_LOCAL_MACHINE\software\classes\clsid\{06dfedaa-6196-11d5-bfc8-00508b4a487d}
HKEY_LOCAL_MACHINE\software\classes\typelib\{3277cd27-4001-4ef8-9d96-c6ca745ac2f9}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{06dfedaa-6196-11d5-bfc8-00508b4a487d}
HKEY_CLASSES_ROOT\clsid\{3277cd27-4001-4ef8-9d96-c6ca745ac2f9}
HKEY_CLASSES_ROOT\clsid\{37686c62-d497-42e3-baab-78d89a74e151}
HKEY_CLASSES_ROOT\interface\{06dfeda9-6196-11d5-bfc8-00508b4a487d}
HKEY_CLASSES_ROOT\kbbar.showbar
HKEY_CLASSES_ROOT\kbbar.showbar.1
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{06dfedaa-6196-11d5-bfc8-00508b4a487d}
HKEY_CLASSES_ROOT\typelib\{37686c62-d497-42e3-baab-78d89a74e151}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{06dfedaa-6196-11d5-bfc8-00508b4a487d}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\7fasstsearch (version 3.0)

Registry Values:
HKEY_CURRENT_USER\software\microsoft\main
HKEY_CURRENT_USER\software\microsoft\main
HKEY_LOCAL_MACHINE\software\microsoft\search


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Gator.GAIN.Claria Adware Symptoms
Bat.Zeke Trojan Removal

ABetterInternet.Ceres Adware

How To Remove ABetterInternet.Ceres?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
ABetterInternet.Ceres is dangerous virus:
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits


ABetterInternet.Ceres Symptoms:

Files:
[%PROFILE_TEMP%]\ceres.inf
[%PROFILE_TEMP%]\DrTemp\ceres.inf
[%PROFILE_TEMP%]\THI3F8.tmp\ceres.dll
[%WINDOWS%]\ceres.dll
[%WINDOWS%]\inf\ceres.inf
[%PROFILE_TEMP%]\ceres.inf
[%PROFILE_TEMP%]\DrTemp\ceres.inf
[%PROFILE_TEMP%]\THI3F8.tmp\ceres.dll
[%WINDOWS%]\ceres.dll
[%WINDOWS%]\inf\ceres.inf

Registry Keys:
HKEY_CLASSES_ROOT\CeresDll.CeresDllObj
HKEY_CLASSES_ROOT\CeresDll.CeresDllObj.1
HKEY_CURRENT_USER\software\ceres
HKEY_CLASSES_ROOT\ceresdll.ceresdllobj
HKEY_CLASSES_ROOT\ceresdll.ceresdllobj.1
HKEY_CLASSES_ROOT\{00000049-8f91-4d9c-9573-f016e7626484}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\ceres


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Removing Upset Trojan
Removing Postal.Nemesis DoS

Deskbar Adware

How To Remove Deskbar?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Deskbar is dangerous virus:
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.

A desktop hijacker replaces the desktop wallpaper with advertising
for products and services on the desktop.
Toolbar presents itself as a helpful add-on for Internet Explorer but it is a real pest.

Deskbar It also known as:

[Other]desktop bar,Adware.Look2Me

Deskbar Symptoms:

Files:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\SpyLocked 3.1.lnk
[%DESKTOP%]\SpyLocked.lnk
[%PROGRAM_FILES%]\DeskAlerts\deskbar.dll
[%PROGRAM_FILES%]\Deskbar\deskbar.dll
[%STARTMENU%]\SpyLocked 3.1.lnk
[%SYSTEM%]\Deskbar\deskbar.dll
[%SYSTEM%]\Favorites\deskbar.dll
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\SpyLocked 3.1.lnk
[%DESKTOP%]\SpyLocked.lnk
[%PROGRAM_FILES%]\DeskAlerts\deskbar.dll
[%PROGRAM_FILES%]\Deskbar\deskbar.dll
[%STARTMENU%]\SpyLocked 3.1.lnk
[%SYSTEM%]\Deskbar\deskbar.dll
[%SYSTEM%]\Favorites\deskbar.dll

Folders:
[%PROGRAMS%]\SpyLocked
[%PROGRAM_FILES%]\SpyLocked
[%PROGRAM_FILES%]\Deskbar

Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{1F101905-C9C7-4B92-BDE6-4F8E76C5A7DB}
HKEY_CLASSES_ROOT\CLSID\{5121B863-FAE8-4935-BA76-0ABE0239AECA}
HKEY_CLASSES_ROOT\CLSID\{652383EE-CA01-4aec-A763-50A08062AC58}
HKEY_CLASSES_ROOT\CLSID\{65E03378-E22E-4F50-BE9D-588A889B24C9}
HKEY_CLASSES_ROOT\CLSID\{67A8D847-B79F-403e-8D2B-D2CADE3A967F}
HKEY_CLASSES_ROOT\CLSID\{69DACF5A-70EF-4363-A036-89450346121F}
HKEY_CLASSES_ROOT\CLSID\{9DD77D09-901B-4af0-8F89-812950DB6FF2}
HKEY_CLASSES_ROOT\clsid\{a8b28872-3324-4cd2-8aa3-7d555c872d96}
HKEY_CLASSES_ROOT\CLSID\{CC79522A-9E3B-4bc9-9218-D95EC5DA5349}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D06E2EAE-1922-4A0B-6A7C-8D9E3DE0E708}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{2C5B5226-045D-4A46-B4FC-228B0891FEEC}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{314120E4-5A05-492C-9BF2-22558CF0F202}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{392D4A36-6ADF-4A99-A820-3014A53E62E3}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3BF6C840-4D12-4FB5-88A2-E2BC03461DC2}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{42F16135-D0A4-43A2-990C-27FCABD9C19F}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{43DF1CEE-70B3-4E2D-A740-4AC468786207}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{5CA1A9F6-10F8-4008-B884-755B25B6848A}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{630CBF61-54CC-4AC3-97B0-D4071345807C}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AFB5B8E-ACFD-4489-91B3-DAA1388A31EC}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{815B01A0-BF97-41E9-ACF2-32B76F98A960}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{C5BF4465-5322-462F-B41F-459F649F3996}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E4703CF2-7F82-4AD7-B317-8EC1CBC9B619}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E9817993-83FF-4343-B14E-6CDFB378B21D}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{EDE2A2B4-B1CB-4BF8-93D1-154E49284A71}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F5D23930-23C6-440E-AB55-D019E1171539}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{50450F27-B90B-422B-A4C9-5EC5A5B78001}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\SpyLocked.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1F101905-C9C7-4B92-BDE6-4F8E76C5A7DB}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5121B863-FAE8-4935-BA76-0ABE0239AECA}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{652383EE-CA01-4aec-A763-50A08062AC58}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{65E03378-E22E-4F50-BE9D-588A889B24C9}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{67A8D847-B79F-403e-8D2B-D2CADE3A967F}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{69DACF5A-70EF-4363-A036-89450346121F}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9DD77D09-901B-4af0-8F89-812950DB6FF2}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A8B28872-3324-4CD2-8AA3-7D555C872D96}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{CC79522A-9E3B-4bc9-9218-D95EC5DA5349}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SpyLocked
HKEY_LOCAL_MACHINE\SOFTWARE\SpyLocked
HKEY_CLASSES_ROOT\clsid\{d7cc80d4-376c-4586-b023-4f35c2ceb28e}
HKEY_CLASSES_ROOT\clsid\{d8c2d4b4-eeaf-4ec4-b1f8-9b6ed15d5a38}
HKEY_CLASSES_ROOT\dbtb00001.dbtb00001
HKEY_CLASSES_ROOT\dbtb00001.dbtb00001.1
HKEY_CLASSES_ROOT\dbtb00001.deskbar
HKEY_CLASSES_ROOT\dbtb00001.deskbar.1
HKEY_CLASSES_ROOT\dbtb00001.deskbarbho
HKEY_CLASSES_ROOT\dbtb00001.deskbarbho.1
HKEY_CLASSES_ROOT\dbtb00001.deskbarenabler
HKEY_CLASSES_ROOT\dbtb00001.deskbarenabler.1
HKEY_CLASSES_ROOT\interface\{8f15b157-40d9-4b20-8d3b-b1f8b475b58d}
HKEY_CLASSES_ROOT\interface\{a0881aa1-68be-41ac-9c0d-4c8a69c6c72c}
HKEY_CLASSES_ROOT\interface\{e827ffd9-95d1-4b49-beb3-5d49e688c108}
HKEY_CLASSES_ROOT\typelib\{a4c8f181-6cdb-4dcc-9fc9-bb9933c81e1f}
HKEY_CURRENT_USER\software\dbtb00001
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{a8b28872-3324-4cd2-8aa3-7d555c872d96}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\dbtb00001.dbtb00001deskbar

Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\urlsearchhooks


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Pigeon.DSI Trojan Information

Adtraffic Hijacker

How To Remove Adtraffic?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Adtraffic is dangerous virus:
Hijackers take control of various parts of your web browser, including your home page,
search pages, and search bar. They may also redirect you to certain sites should you
mistype an address or prevent you from going to a website they would rather you not,
such as sites that combat malware. Some will even redirect you to their own search engine
when you attempt a search.


Adtraffic Symptoms:

Files:
[%WINDOWS%]\temp\ee.exe
[%WINDOWS%]\temp\ee.exe

Folders:
[%PROGRAM_FILES%]\ee

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{0f9c37fc-72c6-4d7c-887e-21fb58da7a41}
HKEY_CLASSES_ROOT\clsid\{9516919a-9d32-4b17-bd14-2ce488599f65}
HKEY_CLASSES_ROOT\eef.redirect
HKEY_CLASSES_ROOT\eef.redirect.1
HKEY_CLASSES_ROOT\interface\{17808054-5679-46a5-b2f2-54496900332b}
HKEY_CLASSES_ROOT\interface\{a07f8651-d428-4b89-b722-926a14a31ffb}
HKEY_CLASSES_ROOT\sef.searchhook
HKEY_CLASSES_ROOT\sef.searchhook.1
HKEY_CLASSES_ROOT\typelib\{40ce5a28-d816-4f52-9777-70054c35425a}
HKEY_CLASSES_ROOT\typelib\{dc7152cf-16a1-4f9a-a7af-a4e0911034e1}
HKEY_CURRENT_USER\software\eei
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\ee

Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\urlsearchhooks


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
artpc.com Tracking Cookie Removal
NetSlayer Backdoor Removal
Removing Win32.LikeSurf DoS
Willow Trojan Symptoms
Pigeon.ATC Trojan Symptoms

Intexp Downloader

How To Remove Intexp?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Intexp is dangerous virus:
This family of Trojans downloads and installs new malware or adware on the computer.
The downloader then either launches the new malware or registers it to enable autorun
according to the local operating system requirements.

The names and locations of malware to be downloaded are either coded into the
Trojan or downloaded from a specified website.


Intexp Symptoms:

Files:
[%WINDOWS%]\dinst.exe
[%WINDOWS%]\dinst.exe

Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Backdoor.Lithium Trojan Information
Bancos.GSI Trojan Removal instruction
CWS.OEMSysPNP Hijacker Information
Invisible.Keylogger.Stealth Spyware Removal

Activex.Dialer Adware

How To Remove Activex.Dialer?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Activex.Dialer is dangerous virus:
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits


Activex.Dialer Symptoms:

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{1d2dca0d-b30f-40ad-9690-087105f214ec}
HKEY_CLASSES_ROOT\clsid\{10a1b95d-5e35-4935-8bc3-d43e81e8105e}
HKEY_CLASSES_ROOT\clsid\{a45f39dc-3608-4237-8f0e-139f1bc49464}
HKEY_CLASSES_ROOT\clsid\{c771b05e-e725-4516-97a5-4ce5eb163cfb}


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Removing Win32.Songon Trojan
JS.Payly Trojan Symptoms
Stoolbar BHO Information
Backdoor.Prowler Trojan Removal instruction
Remove Bat.Comp Trojan

Win32.Bagle Worm

How To Remove Win32.Bagle?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Win32.Bagle is dangerous virus:
Worms can be classified according to the propagation method they use,
i.e. how they deliver copies of themselves to new victim machines.
Worms can also be classified by installation method, launch method and finally according
to characteristics standard to all malware: polymorphism, stealth etc.

Many of the worms which managed to cause significant outbreaks use more then
one propagation method as well as more than one infection technique.
The methods are listed separately below.


Win32.Bagle Symptoms:

Files:
[%SYSTEM%]\windll.exe
[%SYSTEM%]\windll.exe

Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Removing WinVNC.dr Spyware
Pigeon.AVKT Trojan Information

FairyTale Adware

How To Remove FairyTale?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
FairyTale is dangerous virus:
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits


FairyTale Symptoms:

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{940ec490-8c20-4360-a725-1f44984933df}


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
BI Adware Removal instruction
DBestRelief Adware Cleaner
SearchNet Trojan Information
Remove Baidu (BDSearch) Adware
Adware.Baidu Trojan Symptoms

TrafficSector BHO

How To Remove TrafficSector?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
TrafficSector is dangerous virus:
BHO (Browser Helper Object) Trojan.
The BHO waits for the user to post personal information to a monitored website.
As this information is entered by the user, it is captured by the BHO and sent back to the attacker.
The method of network transport used by the attacker makes this Trojan unique.
Typically, keyloggers of this type will send the stolen information back to the attacker via email
or HTTP POST, which can appear suspicious.
Instead, this Trojan encodes the data with a simple XOR algorithm before placing it into
the data section of an ICMP ping packet." explained the company.
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.



TrafficSector Symptoms:

Files:
[%PROFILE_TEMP%]\aupd.exe
[%SYSTEM%]\cpmrotate.dll
[%PROFILE_TEMP%]\aupd.exe
[%SYSTEM%]\cpmrotate.dll

Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{BDD8121B-D4AE-4AC9-AD54-C8DC3F1155E6}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{BDD8121B-D4AE-4AC9-AD54-C8DC3F1155E6}


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
ImIServer.IEPlugin Adware Cleaner
Kakkeys Trojan Cleaner

Adultlinks.Quickbar Hijacker

How To Remove Adultlinks.Quickbar?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Adultlinks.Quickbar is dangerous virus:
Hijackers take control of various parts of your web browser, including your home page,
search pages, and search bar. They may also redirect you to certain sites should you
mistype an address or prevent you from going to a website they would rather you not,
such as sites that combat malware. Some will even redirect you to their own search engine
when you attempt a search.


Adultlinks.Quickbar Symptoms:

Folders:
[%APPDATA%]\qcbar

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{965e6b07-6832-4738-bdbe-25f226ba2ab0}
HKEY_CLASSES_ROOT\clsid\{dd1bca06-f674-424d-a08e-42da97c4d5dd}
HKEY_CLASSES_ROOT\typelib\{d02ee3a0-1881-419f-a5ed-737223463292}
HKEY_LOCAL_MACHINE\software\qcbar


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
ASpam.Drvman RAT Symptoms

PS.Rex Trojan

How To Remove PS.Rex?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
PS.Rex is dangerous virus:
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.

The downloader either launches the new malware or registers it to enable autorun
according to the local operating system requirements.
These programs attack web servers by sending numerous requests to the specified server,
often causing it to crash under an excessive volume of requests.

DoS trojans conduct such attacks from a single computer with the consent of the user.

Worms can carry a DoS procedure as part of their payload.


PS.Rex It also known as:

[Kaspersky]PS-MPC.Alien.733,PS-MPC-based;
[Eset]Butt virus,modified Psmpc.Alien.571 virus,modified Psmpc.Alien.625 virus;
[Panda]Univ;
[Computer Associates]PS T-Rex,PS-MPC

PS.Rex Symptoms:

Files:
[%WINDOWS%]\downloaded program files\install.exe
[%WINDOWS%]\downloaded program files\install.exe


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Vxidl.AMV Trojan Removal instruction
Removing TSpy Spyware
Teen.free Tracking Cookie Removal
Remove Spurf DoS
Pigeon.BAK Trojan Cleaner

Comet.Systems BHO

How To Remove Comet.Systems?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Comet.Systems is dangerous virus:
The BHO (Browser Helper Object) waits for the user to post personal information to a monitored website.
As this information is entered by the user, it is captured by the BHO and sent back to the attacker.
Hijackers are software programs that modify users' default browser home page,
search settings, error page settings, or desktop wallpaper without adequate notice, disclosure,
or user consent.


Comet.Systems Symptoms:

Files:
[%WINDOWS%]\inf\cc_43.inf
[%DESKTOP%]\comet cursor.lnk
[%PROGRAMS%]\comet cursor.lnk
[%WINDOWS%]\inf\cc_43.inf
[%DESKTOP%]\comet cursor.lnk
[%PROGRAMS%]\comet cursor.lnk

Folders:
[%PROGRAM_FILES%]\comet
[%PROGRAM_FILES%]\comet systems

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{16bc6464-196a-4bab-a14b-f69f8a0a60f7}
HKEY_CLASSES_ROOT\clsid\{197ab1d7-a7dd-4c86-a938-1fcc0db21b85}
HKEY_CLASSES_ROOT\clsid\{e28fcb54-8c8e-11d3-80d1-00500487b1c5}
HKEY_CLASSES_ROOT\clsid\{f59c663d-e891-492c-86e3-0758c71885c2}
HKEY_CLASSES_ROOT\cssecurity.htmlsecurity
HKEY_CLASSES_ROOT\cssecurity.htmlsecurity.1
HKEY_CLASSES_ROOT\dmproxy.dmproxyctl
HKEY_CLASSES_ROOT\dmproxy.dmproxyctl.1
HKEY_CLASSES_ROOT\dmserver.dmnotify
HKEY_CLASSES_ROOT\dmserver.dmnotify.1
HKEY_CLASSES_ROOT\interface\{1e587528-41aa-4f19-97e8-bb75acc3035c}
HKEY_CLASSES_ROOT\interface\{2fcfb3fd-7184-4c42-aed3-30fff0119964}
HKEY_CLASSES_ROOT\interface\{34fdd882-5530-4a90-89cd-416612c8855e}
HKEY_CLASSES_ROOT\interface\{58c59f56-ca66-4b5d-9132-ecea5193be5a}
HKEY_CLASSES_ROOT\interface\{665abe65-2c16-4341-b4b8-01ff799e8f4c}
HKEY_CLASSES_ROOT\interface\{788e0d0e-caf7-473b-9183-76be6d30dc9a}
HKEY_CLASSES_ROOT\interface\{7aa7d1c3-f0f8-460c-936d-b5886d0928eb}
HKEY_CLASSES_ROOT\interface\{832786ec-9632-4919-8972-59f79d621c87}
HKEY_CLASSES_ROOT\interface\{97284959-a553-4576-859c-b3b3ff283de0}
HKEY_CLASSES_ROOT\interface\{a0ca55a1-a112-11d3-80d6-00500487b1c5}
HKEY_CLASSES_ROOT\interface\{a4b977f5-1efc-4da0-b9c2-67c53cba140f}
HKEY_CLASSES_ROOT\interface\{a9e67cbe-7a42-47be-962a-c07e73c34fba}
HKEY_CLASSES_ROOT\interface\{aeb17fc4-2a52-4945-9866-81cc343a59e3}
HKEY_CLASSES_ROOT\interface\{b0e9399e-fe6f-43b0-98d3-2f47080dde4a}
HKEY_CLASSES_ROOT\interface\{bfcbf73b-6eb2-49c1-adca-cf0cd589b140}
HKEY_CLASSES_ROOT\interface\{c4d86dc8-b73b-4470-9914-3dac14ee6f95}
HKEY_CLASSES_ROOT\interface\{dc86768f-5adf-4d84-9de8-fd047b1fe8f5}
HKEY_CLASSES_ROOT\interface\{ddd1e8ca-678d-4c9a-a472-ce9578b14dc5}
HKEY_CLASSES_ROOT\typelib\{32ba13af-001c-456e-8825-8d53077460ac}
HKEY_CLASSES_ROOT\typelib\{5d2d50f6-6be2-41a0-b827-1accd3e2e2f7}
HKEY_CLASSES_ROOT\typelib\{844c39ec-7ea4-4f11-bce6-28404fd768e3}
HKEY_CLASSES_ROOT\typelib\{878ace1b-8db0-4d75-9034-504756ad4215}
HKEY_CLASSES_ROOT\typelib\{8fcd3b3f-6f3e-4bb2-9c37-b03b27f71857}
HKEY_LOCAL_MACHINE\software\comet systems
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D14D6793-9B65-11D3-80B6-00500487BDBA}
HKEY_CLASSES_ROOT\clsid\{212b99a1-9cf6-11d3-80b7-0500487bdba}
HKEY_CLASSES_ROOT\clsid\{39e01e09-2b45-11d4-810d-00500487d1c5}
HKEY_CLASSES_ROOT\clsid\{90c61707-c8f8-43db-a25c-c1f4b18ee41e}
HKEY_CLASSES_ROOT\clsid\{c38fc998-3b1b-4f59-a710-5a6c9cf8bd92}
HKEY_CLASSES_ROOT\clsid\{cd74b159-a1d3-11d3-80bc-0500487bdba}
HKEY_CLASSES_ROOT\clsid\{d14d6793-9b65-11d3-80b6-00500487bdba}
HKEY_CLASSES_ROOT\clsid\{da0882fb-49a3-4a9e-bb09-5e15347b5647}
HKEY_CLASSES_ROOT\clsid\{e5c39db-9dcc-11d3-80d6-00500487d1c5}
HKEY_CLASSES_ROOT\clsid\{edc4193f-34ad-4d07-aa87-e3fdb89e3e76}
HKEY_CLASSES_ROOT\clsid\{fe6bc4ef-5676-484b-88ae-883323913256}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{d14d6793-9b65-11d3-80b6-00500487bdba}

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\ccar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\ccar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\puk
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\puk


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Crusc Trojan Cleaner
QaBar.Adult.Links.Toolband BHO Symptoms

stingware.keylogger Spyware

How To Remove stingware.keylogger?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
stingware.keylogger is dangerous virus:
Spyware can even change computer settings, resulting in slow connection speeds,
different home pages, and loss of Internet or other programs.
In an attempt to increase the understanding of spyware, a more formal classification
of its included software types is captured under the term privacy-invasive software.


stingware.keylogger Symptoms:

Files:
[%PROGRAMS%]\StingWare\KeyLogger Support.lnk
[%PROGRAMS%]\StingWare\KeyLogger.lnk
[%PROGRAMS%]\StingWare\Uninstall.lnk
[%PROGRAM_FILES%]\StingWare\KeyLogger Support.url
[%PROGRAM_FILES%]\StingWare\stng.dat
[%PROGRAM_FILES%]\StingWare\svchost.exe
[%PROGRAM_FILES%]\{36B40193-4F10-4D8C-96D7-8544CCC6F704}\StingWare KeyLogger.msi
[%PROGRAMS%]\StingWare\KeyLogger Support.lnk
[%PROGRAMS%]\StingWare\KeyLogger.lnk
[%PROGRAMS%]\StingWare\Uninstall.lnk
[%PROGRAM_FILES%]\StingWare\KeyLogger Support.url
[%PROGRAM_FILES%]\StingWare\stng.dat
[%PROGRAM_FILES%]\StingWare\svchost.exe
[%PROGRAM_FILES%]\{36B40193-4F10-4D8C-96D7-8544CCC6F704}\StingWare KeyLogger.msi

Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{76e2367e-9311-47fc-a83e-7375099675c5}

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\folders
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\folders
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Pigeon.EVS Trojan Symptoms
EasyServ Trojan Information
Crystalys.Media Toolbar Information
Removing FlyAgent Trojan
Remove Backdoor.Server Trojan

ISpyNow Trojan

How To Remove ISpyNow?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
ISpyNow is dangerous virus:
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Spyware programs can collect various types of personal information,
such as Internet surfing habit, sites that have been visited,
but can also interfere with user control of the computer in other ways,
such as installing additional software, redirecting Web browser activity,
accessing websites blindly that will cause more harmful viruses,
or diverting advertising revenue to a third party.
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
Often the backdoor will not be visible in the log of active programs.


ISpyNow It also known as:

[Kaspersky]Trojan.Spy.Justin,TrojanSpy.Win32.Justin;
[Eset]Win32/Spy.Justin.A trojan;
[McAfee]iSpyNOW;
[F-Prot]security risk or a "backdoor" program;
[Panda]Trj/Spy.Justin;
[Computer Associates]Win32/Justin.A!Spy!Trojan

ISpyNow Symptoms:

Files:
[%WINDOWS%]\ISNSYS.dll
[%WINDOWS%]\ISNSYS.dll

Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
AMS RAT Cleaner
Stylersom Trojan Cleaner
HgWeb Downloader Symptoms
TrojanDownloader.Win32.VB.av Trojan Symptoms
Remove SillyDl.COW Trojan

MyDailyHoroscope Adware

How To Remove MyDailyHoroscope?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
MyDailyHoroscope is dangerous virus:
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits


MyDailyHoroscope It also known as:

[Panda]Adware/MyDailyHoroscope

MyDailyHoroscope Symptoms:

Files:
[%PROGRAMS%]\my daily horoscope\mydailyhoroscope.lnk
[%SYSTEM%]\emqvdm.exe
[%SYSTEM%]\setup_silent_26222.exe
[%SYSTEM%]\thin-94-2-x-x.exe
[%PROGRAMS%]\my daily horoscope\mydailyhoroscope.lnk
[%SYSTEM%]\emqvdm.exe
[%SYSTEM%]\setup_silent_26222.exe
[%SYSTEM%]\thin-94-2-x-x.exe

Folders:
[%PROGRAM_FILES%]\my daily horoscope

Registry Keys:
HKEY_CLASSES_ROOT\appid\mydailyhoroscope.exe
HKEY_CLASSES_ROOT\appid\{6e0afb50-ab22-477c-b16a-aa155937791c}
HKEY_CURRENT_USER\software\enconfidence
HKEY_LOCAL_MACHINE\software\enconfidence
HKEY_CLASSES_ROOT\appid\{6e0afb50-ab22-477c-b16a-aa15593779ac}
HKEY_CURRENT_USER\software\econfidence
HKEY_LOCAL_MACHINE\software\econfidence
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\my daily horoscope

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
StartPage.cr Hijacker Symptoms
Remove Port.Blocker DoS
Remove ezPorn Trojan
SillyDl.CHP Trojan Cleaner
Vienna Trojan Information

Employee.Watcher Spyware

How To Remove Employee.Watcher?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Employee.Watcher is dangerous virus:
Spyware is computer software that is installed surreptitiously on a personal computer
to intercept or take partial control over the user's interaction
with the computer, without the user's informed consent.

While the term spyware suggests software that secretly monitors the user's behavior,
the functions of spyware extend well beyond simple monitoring.

Spyware programs can collect various types of personal information,
such as Internet surfing habit, sites that have been visited,
but can also interfere with user control of the computer in other ways,
such as installing additional software, redirecting Web browser activity,
accessing websites blindly that will cause more harmful viruses,
or diverting advertising revenue to a third party.

Spyware can even change computer settings, resulting in slow connection speeds,
different home pages, and loss of Internet or other programs.
In an attempt to increase the understanding of spyware, a more formal classification
of its included software types is captured under the term privacy-invasive software.


Employee.Watcher Symptoms:

Folders:
c:\windowsupdate\ufp\ew7

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{0468c950-83e2-11d3-be51-00c0dfc2e32c}
HKEY_CLASSES_ROOT\clsid\{22b4c8f5-a686-42cc-8224-e4817445109f}
HKEY_CLASSES_ROOT\clsid\{8b8bb3a2-8576-11d3-be51-00c0dfc2e32c}
HKEY_CLASSES_ROOT\clsid\{de5c2449-65d5-4413-bfcf-6bfcdf294665}
HKEY_CLASSES_ROOT\interface\{0468c94f-83e2-11d3-be51-00c0dfc2e32c}
HKEY_CLASSES_ROOT\interface\{0468c951-83e2-11d3-be51-00c0dfc2e32c}
HKEY_CLASSES_ROOT\interface\{3e3621c0-8635-11d3-be51-00c0dfc2e32c}
HKEY_CLASSES_ROOT\interface\{8b8bb3a1-8576-11d3-be51-00c0dfc2e32c}
HKEY_CLASSES_ROOT\interface\{8b8bb3a3-8576-11d3-be51-00c0dfc2e32c}
HKEY_CLASSES_ROOT\interface\{ab14f05e-4c1d-49dc-8bd5-9e6b510b3eba}
HKEY_CLASSES_ROOT\interface\{b78b0e98-0431-4a6b-8c3d-f240fe8725f5}
HKEY_CLASSES_ROOT\interface\{d937a3c0-8634-11d3-be51-00c0dfc2e32c}
HKEY_CLASSES_ROOT\interface\{f7c1a3fa-c511-488a-b583-4f153b9368c4}
HKEY_CLASSES_ROOT\typelib\{0468c933-83e2-11d3-be51-00c0dfc2e32c}
HKEY_CLASSES_ROOT\typelib\{0468c941-83e2-11d3-be51-00c0dfc2e32c}
HKEY_CLASSES_ROOT\typelib\{1faa49c4-16b7-4d28-8930-31be1810d943}

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
PSWSpider Trojan Removal
UBend DoS Information

Surfairy Adware

How To Remove Surfairy?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Surfairy is dangerous virus:
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits


Surfairy Symptoms:

Registry Keys:
HKEY_CURRENT_USER\software\surfairy


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Zlob.Fam.SoftCodec Trojan Removal
SPCRM RAT Symptoms
Removing BackDoor.CGX.svr Backdoor

AlertSpy Ransomware

How To Remove AlertSpy?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
AlertSpy is dangerous virus:
The term ransomware is commonly used to describe such software,
although the field known as cryptovirology predates the term "ransomware".

This type of ransom attack can be accomplished by (for example) attaching
a specially crafted file/program to an e-mail message and sending this to the victim.


AlertSpy It also known as:

[Panda]Trj/Agent.DIL;
[Other]AlertSpy Installer,AlexaBar.I,SpyDestroy,ADW_ALEXA.AX

AlertSpy Symptoms:

Files:
[%DESKTOP%]\AlertSpy.lnk
[%DESKTOP%]\AlertSpy.lnk

Folders:
[%PROGRAMS%]\AlertSpy
[%PROGRAM_FILES%]\AlertSpy

Registry Keys:
HKEY_CURRENT_USER\software\local appwizard-generated applications\alertspy
HKEY_LOCAL_MACHINE\software\mandel enterprises\alertspy
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app paths\alertspy.exe
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\alertspy

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\shellnoroam\muicache


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
maxserving.com Tracking Cookie Cleaner

PWS Trojan

How To Remove PWS?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
PWS is dangerous virus:
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Spyware can even change computer settings, resulting in slow connection speeds,
different home pages, and loss of Internet or other programs.
In an attempt to increase the understanding of spyware, a more formal classification
of its included software types is captured under the term privacy-invasive software.
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
Often the backdoor will not be visible in the log of active programs.
Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.
These utilities are designed to penetrate remote computers
in order to use them as zombies (by using backdoors) or to download other malicious programs to computer.

Exploits use vulnerabilities in operating systems and applications to achieve the same result.


PWS It also known as:

[Kaspersky]Trojan.PSW.Ajan.10,Trojan.PSW.Ajan.11,Trojan.PSW.Pec.e,Trojan.PSW.Platan.a,Trojan.PSW.Barrio.310,Trojan.PSW.DUT,Trojan.PSW.TFC,Trojan.PSW.Eps.109,Trojan.PSW.Eps.151,packed: LzExe,Trojan.PSW.Glyph,Trojan.PSW.Gip.112,Trojan.PSW.Gip.113,Trojan.PSW.Gip.113.a,Trojan.PSW.Gip.113.b,Trojan.PSW.Hooker.f,Trojan.PSW.Gip.107,Trojan.PSW.ICQ.Spaels,Trojan.PSW.Gip.108,Trojan.PSW.Coced,Trojan.PSW.Coced.215,Trojan.PSW.Spion.b,Trojan.PSW.Coced.233,Trojan.PSW.Hooker.a,Trojan-PSW.Win32.Hooker.a,Trojan.PSW.INet20.a,Trojan.PSW.INet20.b,Trojan.PSW.Weird.d,Trojan.PSW.RemBomb,Trojan.PSW.Hooker.b,Trojan.PSW.Hooker.e,Trojan.PSW.M2.147,Trojan.PSW.Platan.g,Trojan.PSW.Platan.5.c,Trojan.PSW.Platan.f,Trojan.PSW.Nemotron,Trojan.PSW.Platan.5.d,Trojan.PSW.Stealth.d,Trojan.PSW.Stealth2,Trojan.PSW.Thief.b,Trojan.PSW.Hooker.g,Trojan.PSW.M2.148,Trojan.PSW.M2.15,Trojan.PSW.Unite.d,Trojan.PSW.Atomic.a,Trojan.PSW.Buf,Trojan.PSW.Hooker.25,Trojan.PSW.Gip.110.a,Trojan.PSW.Gip.110.d,Trojan.PSW.Meteor.a,Trojan.PSW.Gip.111,Trojan.PSW.Delarm,Trojan.PSW.Kuang.d,Trojan.Win32.PassW,Trojan.PSW.M2.16,Trojan.PSW.Promail,Trojan.PSW.PMail.b,Trojan.PSW.Thif,Trojan.PSW.Eps.165,Trojan.PSW.MSN.Faker.j,Trojan.PSW.AOLPass,Trojan.PSW.QQcv.13,Trojan-PSW.Win32.HackPass,Trojan.PSW.Rit,Trojan.PSW.HackPass,Trojan-PSW.Win32.Rit,Trojan.PSW.Gip.based,TrojanDropper.Win32.Small.v,Trojan.PSW.Kuang.a,Trojan-Dropper.Win32.Agent.abo;
[Eset]PSW.Ajan trojan,PSW.Pec.E trojan,PSW.Platan.A trojan,Win32/PSW.Barrio.310 trojan,_MX trojan,Win32/Badtrans.13312 trojan,Win32/PSW.Gip.113.B trojan,Naebi.2_33 trojan,Win32/PSW.Stealth.G2 trojan,Win32/PSW.M2.15 trojan,PSW.Atomic trojan,Win32/PSW.Atomic.A trojan,Win32/PSW.AOLPass trojan,SubSeven.1_9 trojan,Win32/PSW.Rit trojan;
[McAfee]PWS,PWS-DZ,PWS-Platan,PWS-CT,PWS-CG,PWS-CL,PWS-DB,PWS-AA,PWS-BY,PWS-BV,PWS-CK,PWS-CK.cfg,PWS-CP,PWS-CE,PWS-CI,PWS-CD,PWS-DL,PWS-FF,PWS-CA,PWS-HB,PWS-BH,PWS-AC,PWS-FO,PWS-M2,PWS-EV,PWS-FT,PWS-Hooker.cfg,PWS-FI,PWS-BN,PWS-BP,PWS-HE,PWS-HF,PWS-CM,PWS-AG,PWS-FG,PWS-EPS,RingZero.gen,PWS-Hooker.dll,PWS-AH,PWS-PM,PWS-W,PWS-HY,PWS-IN,PWS-JA;
[F-Prot]destructive program,security risk or a "backdoor" program,W32/Fix.36864,W32/Trojan.Kuang.A,W32/Trojan.Pmail.B,W32/Trojan.Hackpass,SubSeven.backdoor.v19,W32/Trojan.Kuang.C;
[Panda]Trj/PSW.Ajan.1.1,Trj/PSW.Pec.E,Trj/PSW.Platan.A,Trj/PSW.Barrio.310,Trj/PSW.DUT,Trj/PSW.TFC,Trj/PSW.Eps.109,Trj/PSW.Eps.151,Trj/PSW.Glyph,Trj/PSW.Gip.112,Trj/PSW.gip.113,Trj/PSW.Gip.113.III,Trj/PSW.Gip.113.IV,Trj/PSW.Gip.1.13,Trj/PSW.Hooker.F,Trj/PSW.Gip.1.07,Trj/Gip.1082,Trj/PSW.Gip.108,Trj/PSW.Coced,Trj/PSW.Coced.215,Trj/PSW.Coced.215.II,Trj/PSW.Spion.B,Trj/PSW.Coced233,Trj/PSW.Hooker.A,Trj/PSW.Inet20,Trj/PSW.Inet20.A,Trj/PSW.Inet20.B,Trj/PSW.DupView,Trj/PSW.RemBomb,Trj/PSW.Hooker.E,Trj/W32.M2.147,Trj/W32.M2.147.A,Trojan Horse,Trojan Horse.LC,Trj/PSW.Platan.G,Trj/PSW.Asp.i,Trj/PSW.Platan.F,Trj/PSW.Asp.s,Trj/PSW.Nemotron,Trj/PSW.HackOf,Trj/DUNPWS.AC,Trj/PSW.Stealth5,Trj/PSW.Thief.b,Trj/PSW.Hooker.G,Bck/M2Trojan.15,Trj/PSW.Stealth1,Trj/PSW.Atomic,Trj/PSW.Buf,Trj/PSW.Hooker.25,Trj/Gip.110.A,Trj/PSW.Gip.110.a,Trj/PSW.Meteor.A,Trj/Gip.1112.A,Trj/Gip.1112.B,Trj/PSW.Gip.1.11,Trj/PSW.Gip.1.12,Trj/PSW.Delarm,Trj/PSW.Kuang.D,Trj/PSW.Platan.I,Backdoor Program,Trj/ProMail,Trj/PSW.PMail.b,Trj/PSW.Thif,Trj/PSW.Eps.161,Trj/PSW.Ring0.B,Trj/PSW.Faker,Trj/PSW.M2.16,Bck/HackPass,Trj/PSW.HackPass,Bck/Sub7.Apocalypse,Trj/PSW.Dripper,Trj/PSW.Kuang.C,Trj/W32.StuKach,Trj/PSW.Kuang.A;
[Computer Associates]Win32/Ajan!PWS!Trojan,Pec.D!PWS!Trojan,Win32/Platan.a!PWS!Trojan,Win32/Barrio.310!PWS!Trojan,Win32/PWS.Barrio.3_10.Trojan,Win32/DUT!PWS!Trojan,Backdoor/Zorro_Server,Win32/Glyph!PWS!Trojan,Win32.PSW.Gip.112.B,Win32/Gip.112.B!PWS!Trojan,Backdoor/Gip,Win32.PSW.Gip.113,Win32/Gip.113!PWS!Trojan,Win32.PSW.Gip.113.B,Win32.PSW.Hooker,Win32/Badtrans.B.Kern32!PWS!Troj,Win32/Gip.113.B!PWS!Trojan,Win32.PSW.Gip.107,Win32/Gip.107!PWS!Trojan,Win32/Price!Trojan,Win32.PSW.Gip.108,Win32/Gip.108!PWS!Trojan,Win32/Coced.220.L!PWS!Trojan,Win32/Coced.215!PWS!Trojan,Win32.PSW.Coced.216/217,Win32/Coced!PWS!Trojan,Win32/Coced.233!PWS!Trojan,Win32/Badtrans.B!PWS!Worm,Pif/Inet!PWS!Trojan,Win32.PSW.Inet.20,Win32/Inet!PWS!Trojan,Backdoor/Kuang.Weird.A,Win32/RemBomb!PWS!Trojan,Win32.PSW.Hooker.B,Win32.PSW.Hooker.E,Win32.PSW.M2.147,Win32/Hooker.D!PWS!Trojan,Win32/Hooker.E!PWS!Trojan,Win32/M2.1.4.7!PWS!Trojan,Win32/M2.1_47!PWS!Trojan,Win32/Platan.A!PWS!Trojan,Win32.PSW.Platan.B,Win32.PSW.Photo,Win32/Asp.i!PWS!Trojan,Win32/Platan.5.C!PWS!Trojan,Win32/Asp.C!PWS!Trojan,Win32/Nemotron!PWS!Trojan,Win32/Hackof!PWS!Trojan,Win32.PSW.Stealth2.A,Win32/StealthCFG!PWS!Trojan,Thief.V2!Client,Win32.PSW.M2.148,Win32/M2.1_48!PWS!Trojan,Win32/M2.147!Trojan,Win32.PSW.M2.15,Win32/M2.1_5!PWS!Trojan,Win32.PSW.Unite.D,Win32/Unite.D!PWS!Trojan,StealthCfg!Trojan,Backdoor/Asylum,Win32/Atomic!PWS!Trojan,Win32.PSW.Hooker.25,Win32/Buf!PWS!Trojan,Win32/Hooker.25!PWS!Trojan,Win32.PSW.Gip.110,Win32/Gip.110.a!PWS!Trojan,Win32.PSW.Meteor,Win32/Meteor.A!PWS!Trojan,Win32.PSW.Gip.111,Win32.PSW.Gip.112,Win32/Gip.111!PWS!Trojan,Win32/Gip111!Trojan,Win32/Delarm!PWS!Trojan,Win32/Gip.112!PWS!Trojan,Kuang!PWS!Trojan,Win32.Kuang.D,Win32.PSW.Platan.I,Win32/Platan.I!PWS!Trojan,Win32/PSW.Platan.I!Trojan,Win32/WinPass!Trojan,Win32.PSW.M2.16,Win32/M216!PWS!Trojan,Win32.PSW.PMail.b,Win32/PMail.b!PWS!Trojan,Win32/Thif!PWS!Trojan,Win95.RingZero,Win32/PSW.MSN.Faker.j!Trojan,KeyLog!DLL!Trojan,Win32/AOLPass!PWS!Trojan,Win32/PSW.QQcv.13.86016!Trojan,Win32/Platan.G!PWS!Trojan,Win32.PSW.HackPass,Win32/HackPass.A!PWS!Trojan,Win32/HackPass.B!PWS!Trojan,Win32/PM.B!Trojan,Backdoor/SubSeven_Server_family,Win32.SubSeven.K,Win32/Dripper!Trojan,Win32.Kuang.C,Win32.PSW.Rit,Win32/Rit!PWS!Trojan,Win32.Kuang.A;
[Other]Win32/Sagic.F,W32/Smalldrp.GHR,Troj/Torpig-L

PWS Symptoms:

Files:
[%SYSTEM%]\grwinsthlp.exe
[%WINDOWS%]\TM\INSTHLP.DAT
[%WINDOWS%]\os3211.exe
[%WINDOWS%]\system\kedwin.dll
[%WINDOWS%]\system\mailer.dll
[%SYSTEM%]\grwinsthlp.exe
[%WINDOWS%]\TM\INSTHLP.DAT
[%WINDOWS%]\os3211.exe
[%WINDOWS%]\system\kedwin.dll
[%WINDOWS%]\system\mailer.dll

Folders:
[%FAVORITES%]\netpal games

Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\dmo
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\npo

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Remove Pigeon.AVSV Trojan
Pigeon.AWHZ Trojan Removal instruction
Remove Hunling Trojan
Uhil Backdoor Information

Jraun Trojan

How To Remove Jraun?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Jraun is dangerous virus:
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits
Trojans-downloaders downloads and installs new malware or adware on the computer.



Jraun It also known as:

[Kaspersky]Trojan.Win32.KeyHost.c,TrojanDownloader.Win32.Small.ek;
[Panda]Trojan Horse

Jraun Symptoms:

Files:
[%SYSTEM%]\keyhost.htm
[%SYSTEM%]\keyhost.htm

Registry Keys:
HKEY_LOCAL_MACHINE\software\redirectkey

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\abouturls


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Remove Expir Backdoor
Remove SillyDl.DES Trojan
Remove IEBarUp Adware
ByWater Trojan Information
Remove Small.ex Trojan

Vxidl.AVC Trojan

How To Remove Vxidl.AVC?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Vxidl.AVC is dangerous virus:
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.


Vxidl.AVC Symptoms:

Files:
[%WINDOWS%]\bobsaver.exe
[%WINDOWS%]\bobsaver.scr
[%WINDOWS%]\bobsaver.exe
[%WINDOWS%]\bobsaver.scr

Registry Keys:
HKEY_LOCAL_MACHINE\software\classes\interface\{665abe65-2c16-4341-b4b8-01ff799e8f4c}

Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:
Herman.Uploader.Public.Beta Backdoor Removal
Removing Win32.NGVCK Trojan
avirtexp.exe Adware Cleaner
Removing F**ker DoS