Wednesday, February 4, 2009

Virtumonde.by Adware

Removing Virtumonde.by
Categories: Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\efcccbb.dll
[%SYSTEM%]\efcccbb.dll

How to detect Virtumonde.by:

Files:
[%SYSTEM%]\efcccbb.dll
[%SYSTEM%]\efcccbb.dll

Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{6D794CB4-C7CD-4C6F-BFDC-9B77AFBDC02C}
HKEY_CLASSES_ROOT\clsid\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{6b69e170-f59b-4897-b51c-3bb214d099ae}

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks

Removing Virtumonde.by:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Removing SillyDl.CEY Trojan
Nikademus Trojan Removal

CRS.Gate Backdoor

Removing CRS.Gate
Categories: Backdoor,RAT
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
They function in the same way as legal remote administration programs used by system administrators.
This makes them difficult to detect.

Backdoors are installed and launched without the consent of the user of computer.
Often the backdoor will not be visible in the log of active programs.

Once a backdoor has been successfully launched, the computer is wide open.
Backdoor functions can include:


  • Launching/ deleting files

  • Sending/ receiving files

  • Deleting data

  • Displaying notification

  • Rebooting the machine

  • Executing files




Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.
Backdoors combine the functionality of most other types of in one package.

Backdoors have one especially dangerous sub-class: variants that can propagate like worms.
Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on
April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack.


CRS.Gate Also known as:

[Kaspersky]Backdoor.CRS-Gate;
[Panda]Backdoor Program,Bck/CRS-Gate;
[Computer Associates]Backdoor/CRS-Gate!Server

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\system\regsys32.dll
[%WINDOWS%]\system\regsys32.exe
[%WINDOWS%]\system\regsys32.dll
[%WINDOWS%]\system\regsys32.exe

How to detect CRS.Gate:

Files:
[%WINDOWS%]\system\regsys32.dll
[%WINDOWS%]\system\regsys32.exe
[%WINDOWS%]\system\regsys32.dll
[%WINDOWS%]\system\regsys32.exe

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices

Removing CRS.Gate:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Net.Administrator Backdoor Symptoms
countomat.com Tracking Cookie Removal instruction
PC.Remote.Control RAT Information

Alureon Trojan

Removing Alureon
Categories: Trojan,BHO,Hijacker,Downloader
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
BHO (Browser Helper Object) Trojan.
The BHO waits for the user to post personal information to a monitored website.
As this information is entered by the user, it is captured by the BHO and sent back to the attacker.
The method of network transport used by the attacker makes this Trojan unique.
Typically, keyloggers of this type will send the stolen information back to the attacker via email
or HTTP POST, which can appear suspicious.
Instead, this Trojan encodes the data with a simple XOR algorithm before placing it into
the data section of an ICMP ping packet." explained the company.
A desktop hijacker replaces the desktop wallpaper with advertising
for products and services on the desktop.
Trojans-downloaders downloads and installs new malware or adware on the computer.


Alureon Also known as:

[Kaspersky]Trojan-Downloader.Win32.Small.den,Trojan.Win32.DNSChanger.ef,Trojan.Win32.DNSChanger.fc,Trojan.Win32.DNSChanger.ge,Trojan.Win32.Agent.r,Trojan-Downloader.Win32.Murlo.d,Trojan.Win32.DNSChanger.iq,Trojan.Win32.DNSChanger.iu,Trojan.Win32.DNSChanger.abk,Trojan.Win32.DNSChanger.abf,Trojan.Win32.DNSChanger.abe;
[McAfee]DNSChanger.a,DNSChanger.gen;
[F-Prot]W32/Trojan2.HSQ (exact),W32/Trojan2.HSG (exact);
[Panda]Adware/Oner,Trojan Horse;
[Computer Associates]Win32.Alureon.B,Win32/Alureon.B!DLL!Trojan,Win32.Alureon.A,Win32/Alureon.A!DLL!Trojan,Win32/Alureon.A.20285!Trojan;
[Other]Win32.Alueon.AU,Win32.Alureon.AV,Trojan.Win32.DNSChanger.ef,Win32/Alureon.T,Win32.Alureon.AX,Win32/Alureon.AZ,Win32/Alureon.BN,Win32/Alureon.BO,Win32/Alureon.BP,Win32/Alureon.BQ,Win32/Alureon.Y,W32/Downloader.NNL,Win32/Alureon.BX,Win32/Alureon.CE,Win32/Alureon!generic,Troj/RuinDl-Gen,Win32/Alureon.A,Win32/Alureon.CH,Trujan.Flush.K,Win32/Alureon.CI,WIn32/Alureon.CJ,Win32/Alureon.CQ,Win32/Alureon.CR,Trojan.Emcodec,Win32/Alureon.CS,Trojan.Zlob,Trojan.Flush.L,DNSChanger.gen9,Troj/Zlobar-Fam,Troj/Zlob-ADO,Win32/Alureon.DB,Trojan.Flush.G,Win32/Alureon.DE,Win32/Alureon.EM

Visible Symptoms:
Files in system folders:
[%LOCAL_APPDATA%]\Temp\~nsu.tmp\Au_.exe
[%SYSTEM%]\winnet.dll
[%WINDOWS%]\image.dll
[%DESKTOP%]\asd3.dll
[%DESKTOP%]\playercodec1000.exe
[%DESKTOP%]\tbar.exe
[%FAVORITES%]\!!! exclusive youngest porn !!!.url
[%FAVORITES%]\censored youngest porn.url
[%FAVORITES%]\free hidden cams world.url
[%FAVORITES%]\free spy cam.url
[%FAVORITES%]\free web cams chats.url
[%FAVORITES%]\free xxx pics & movies.url
[%FAVORITES%]\fresh xxx pics & movie.url
[%FAVORITES%]\get this 4 free.url
[%FAVORITES%]\super xxx pics.url
[%FAVORITES%]\young masha sucking huge dick until her lips teared open.url
[%FAVORITES%]\~ fully categories porn database. enjoy!.url
[%FAVORITES%]\~ new porn pics everyday.url
[%PROGRAMS%]\FreeVideo\Uninstall.lnk
[%SYSTEM%]\dmcal.exe
[%SYSTEM%]\dmfap.exe
[%SYSTEM%]\dmfsg.exe
[%SYSTEM%]\dmrfp.exe
[%SYSTEM%]\dmthp.exe
[%SYSTEM%]\kddmx.exe
[%SYSTEM%]\kdoxr.exe
[%SYSTEM%]\mlwlr.exe
[%SYSTEM%]\msmk.dll
[%SYSTEM%]\nzbxn.exe
[%SYSTEM%]\sysobjwertb.dll
[%SYSTEM%]\wmstrbum.exe
[%WINDOWS%]\cracrwinz.exe
[%WINDOWS%]\msew\msew32.dll
[%WINDOWS%]\msew\msiesh.dll
[%WINDOWS%]\msew\mssearch.dll
[%WINDOWS%]\tromomwin32.exe
[%LOCAL_APPDATA%]\Temp\~nsu.tmp\Au_.exe
[%SYSTEM%]\winnet.dll
[%WINDOWS%]\image.dll
[%DESKTOP%]\asd3.dll
[%DESKTOP%]\playercodec1000.exe
[%DESKTOP%]\tbar.exe
[%FAVORITES%]\!!! exclusive youngest porn !!!.url
[%FAVORITES%]\censored youngest porn.url
[%FAVORITES%]\free hidden cams world.url
[%FAVORITES%]\free spy cam.url
[%FAVORITES%]\free web cams chats.url
[%FAVORITES%]\free xxx pics & movies.url
[%FAVORITES%]\fresh xxx pics & movie.url
[%FAVORITES%]\get this 4 free.url
[%FAVORITES%]\super xxx pics.url
[%FAVORITES%]\young masha sucking huge dick until her lips teared open.url
[%FAVORITES%]\~ fully categories porn database. enjoy!.url
[%FAVORITES%]\~ new porn pics everyday.url
[%PROGRAMS%]\FreeVideo\Uninstall.lnk
[%SYSTEM%]\dmcal.exe
[%SYSTEM%]\dmfap.exe
[%SYSTEM%]\dmfsg.exe
[%SYSTEM%]\dmrfp.exe
[%SYSTEM%]\dmthp.exe
[%SYSTEM%]\kddmx.exe
[%SYSTEM%]\kdoxr.exe
[%SYSTEM%]\mlwlr.exe
[%SYSTEM%]\msmk.dll
[%SYSTEM%]\nzbxn.exe
[%SYSTEM%]\sysobjwertb.dll
[%SYSTEM%]\wmstrbum.exe
[%WINDOWS%]\cracrwinz.exe
[%WINDOWS%]\msew\msew32.dll
[%WINDOWS%]\msew\msiesh.dll
[%WINDOWS%]\msew\mssearch.dll
[%WINDOWS%]\tromomwin32.exe

How to detect Alureon:

Files:
[%LOCAL_APPDATA%]\Temp\~nsu.tmp\Au_.exe
[%SYSTEM%]\winnet.dll
[%WINDOWS%]\image.dll
[%DESKTOP%]\asd3.dll
[%DESKTOP%]\playercodec1000.exe
[%DESKTOP%]\tbar.exe
[%FAVORITES%]\!!! exclusive youngest porn !!!.url
[%FAVORITES%]\censored youngest porn.url
[%FAVORITES%]\free hidden cams world.url
[%FAVORITES%]\free spy cam.url
[%FAVORITES%]\free web cams chats.url
[%FAVORITES%]\free xxx pics & movies.url
[%FAVORITES%]\fresh xxx pics & movie.url
[%FAVORITES%]\get this 4 free.url
[%FAVORITES%]\super xxx pics.url
[%FAVORITES%]\young masha sucking huge dick until her lips teared open.url
[%FAVORITES%]\~ fully categories porn database. enjoy!.url
[%FAVORITES%]\~ new porn pics everyday.url
[%PROGRAMS%]\FreeVideo\Uninstall.lnk
[%SYSTEM%]\dmcal.exe
[%SYSTEM%]\dmfap.exe
[%SYSTEM%]\dmfsg.exe
[%SYSTEM%]\dmrfp.exe
[%SYSTEM%]\dmthp.exe
[%SYSTEM%]\kddmx.exe
[%SYSTEM%]\kdoxr.exe
[%SYSTEM%]\mlwlr.exe
[%SYSTEM%]\msmk.dll
[%SYSTEM%]\nzbxn.exe
[%SYSTEM%]\sysobjwertb.dll
[%SYSTEM%]\wmstrbum.exe
[%WINDOWS%]\cracrwinz.exe
[%WINDOWS%]\msew\msew32.dll
[%WINDOWS%]\msew\msiesh.dll
[%WINDOWS%]\msew\mssearch.dll
[%WINDOWS%]\tromomwin32.exe
[%LOCAL_APPDATA%]\Temp\~nsu.tmp\Au_.exe
[%SYSTEM%]\winnet.dll
[%WINDOWS%]\image.dll
[%DESKTOP%]\asd3.dll
[%DESKTOP%]\playercodec1000.exe
[%DESKTOP%]\tbar.exe
[%FAVORITES%]\!!! exclusive youngest porn !!!.url
[%FAVORITES%]\censored youngest porn.url
[%FAVORITES%]\free hidden cams world.url
[%FAVORITES%]\free spy cam.url
[%FAVORITES%]\free web cams chats.url
[%FAVORITES%]\free xxx pics & movies.url
[%FAVORITES%]\fresh xxx pics & movie.url
[%FAVORITES%]\get this 4 free.url
[%FAVORITES%]\super xxx pics.url
[%FAVORITES%]\young masha sucking huge dick until her lips teared open.url
[%FAVORITES%]\~ fully categories porn database. enjoy!.url
[%FAVORITES%]\~ new porn pics everyday.url
[%PROGRAMS%]\FreeVideo\Uninstall.lnk
[%SYSTEM%]\dmcal.exe
[%SYSTEM%]\dmfap.exe
[%SYSTEM%]\dmfsg.exe
[%SYSTEM%]\dmrfp.exe
[%SYSTEM%]\dmthp.exe
[%SYSTEM%]\kddmx.exe
[%SYSTEM%]\kdoxr.exe
[%SYSTEM%]\mlwlr.exe
[%SYSTEM%]\msmk.dll
[%SYSTEM%]\nzbxn.exe
[%SYSTEM%]\sysobjwertb.dll
[%SYSTEM%]\wmstrbum.exe
[%WINDOWS%]\cracrwinz.exe
[%WINDOWS%]\msew\msew32.dll
[%WINDOWS%]\msew\msiesh.dll
[%WINDOWS%]\msew\mssearch.dll
[%WINDOWS%]\tromomwin32.exe

Folders:
[%PROGRAMS%]\HQvideo
[%PROGRAMS%]\MovieBox
[%PROGRAMS%]\PornoPlayer
[%PROGRAMS%]\VideoBox
[%PROGRAMS%]\VideoPlugin
[%PROGRAMS%]\XXXAccess
[%PROGRAMS%]\XXXPlugin
[%PROGRAM_FILES%]\FreeVideo
[%PROGRAM_FILES%]\HQvideo
[%PROGRAM_FILES%]\MovieBox
[%PROGRAM_FILES%]\PornoPlayer
[%PROGRAM_FILES%]\VideoBox
[%PROGRAM_FILES%]\VideoPlugin
[%PROGRAM_FILES%]\XXXAccess
[%PROGRAM_FILES%]\XXXPlugin
[%PROGRAMS%]\SelectiveAdmission
[%PROGRAM_FILES%]\SelectiveAdmission
[%PROGRAM_FILES%]\WinMsg

Registry Keys:
HKEY_CLASSES_ROOT\freevideo
HKEY_CLASSES_ROOT\HQvideo
HKEY_CLASSES_ROOT\MovieBox
HKEY_CLASSES_ROOT\pornoplayer
HKEY_CLASSES_ROOT\VideoBox
HKEY_CLASSES_ROOT\videoplugin
HKEY_CLASSES_ROOT\xxxaccess
HKEY_CLASSES_ROOT\xxxplugin
HKEY_CURRENT_USER\software\freevideo
HKEY_CURRENT_USER\Software\HQvideo
HKEY_CURRENT_USER\Software\MovieBox
HKEY_CURRENT_USER\software\pornoplayer
HKEY_CURRENT_USER\Software\VideoBox
HKEY_CURRENT_USER\software\videoplugin
HKEY_CURRENT_USER\software\xxxaccess
HKEY_CURRENT_USER\software\xxxplugin
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\FreeVideo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\VideoBox
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\videoplugin
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\xxxplugin
HKEY_CLASSES_ROOT\clsid\{85cbfde0-b26b-4ee5-bd3c-4de111de763e}
HKEY_CLASSES_ROOT\hqvideo
HKEY_CLASSES_ROOT\moviebox
HKEY_CLASSES_ROOT\selectiveadmission
HKEY_CLASSES_ROOT\videobox
HKEY_CURRENT_USER\software\hqvideo
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\_r
HKEY_CURRENT_USER\software\moviebox
HKEY_CURRENT_USER\software\selectiveadmission
HKEY_CURRENT_USER\software\videobox
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversino\uninstall\moviebox
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversino\uninstall\pornoplayer
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{85cbfde0-b26b-4ee5-bd3c-4de111de763e}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\freevideo
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\selectiveadmission
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\videobox
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\xxxaccess
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\windows management service

Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\urlsearchhooks
HKEY_CURRENT_USER\software\microsoft\windows\currentversion
HKEY_CURRENT_USER\software\microsoft\windows\currentversion
HKEY_CURRENT_USER\software\microsoft\windows\currentversion
HKEY_CURRENT_USER\software\microsoft\windows\currentversion
HKEY_CURRENT_USER\software\microsoft\windows\currentversion
HKEY_CURRENT_USER\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\searchbar
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\tcpip\parameters\interfaces\{9c830788-3ef6-4c70-8fce-1e890dc53533}, dhcpnameserver=85.255.115.42
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\tcpip\parameters\interfaces\{9c830788-3ef6-4c70-8fce-1e890dc53533}, dhcpnameserver=85.255.115.82
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\tcpip\parameters\interfaces\{9c830788-3ef6-4c70-8fce-1e890dc53533}, nameserver=85.255.115.82

Removing Alureon:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Spytector Spyware Removal instruction
Jeem Trojan Removal
Win32.SDBot!Backdoor!Server.Vari Worm Symptoms
Remove Zapchast.bl Trojan

Tuesday, February 3, 2009

Starware.Recipe Hijacker

Removing Starware.Recipe
Categories: Hijacker
Hijackers are software programs that modify users' default browser home page,
search settings, error page settings, or desktop wallpaper without adequate notice, disclosure,
or user consent.

When the default home page is hijacked, the browser opens to the web page set by the hijacker
instead of the user's designated home page. In some cases, the hijacker may block users from
restoring their desired home page.

A search hijacker redirects search results to other pages and may
transmit search and browsing data to unknown servers. An error page hijacker directs
the browser to another page, usually an advertising page, instead of the usual error
page when the requested URL is not found.

A desktop hijacker replaces the desktop wallpaper with advertising
for products and services on the desktop.

Hijackers take control of various parts of your web browser, including your home page,
search pages, and search bar. They may also redirect you to certain sites should you
mistype an address or prevent you from going to a website they would rather you not,
such as sites that combat malware. Some will even redirect you to their own search engine
when you attempt a search. NB: hijackers almost exclusively target Internet Explorer.

Visible Symptoms:
Files in system folders:
[%PROGRAM_FILES%]\Starware316\bin\Starware316.dll
[%PROGRAM_FILES%]\Starware316\bin\Starware316.dll

How to detect Starware.Recipe:

Files:
[%PROGRAM_FILES%]\Starware316\bin\Starware316.dll
[%PROGRAM_FILES%]\Starware316\bin\Starware316.dll

Folders:
[%APPDATA%]\Starware337
[%PROGRAM_FILES%]\Starware337

Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{1962c5bc-e475-465b-823b-133e711bceb9}
HKEY_CLASSES_ROOT\CLSID\{5f90c0e3-4c0a-4d54-a8ac-5afe6163a99e}
HKEY_CLASSES_ROOT\clsid\{ab3dfa03-f743-4302-81dd-c370bffeca23}
HKEY_CLASSES_ROOT\clsid\{e550dc77-ef3b-474f-b59c-b3e2aa1fa6a5}
HKEY_CURRENT_USER\software\starware337
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5f90c0e3-4c0a-4d54-a8ac-5afe6163a99e}
HKEY_CLASSES_ROOT\clsid\{1962c5bc-e475-465b-823b-133e711bceb9}
HKEY_CLASSES_ROOT\clsid\{5f90c0e3-4c0a-4d54-a8ac-5afe6163a99e}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{5f90c0e3-4c0a-4d54-a8ac-5afe6163a99e}

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\runonce
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar

Removing Starware.Recipe:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
VxsKey Trojan Removal instruction
Bancos.IEM Trojan Cleaner
Pigeon.AVJQ Trojan Removal instruction

Kraimer Trojan

Removing Kraimer
Categories: Trojan,Spyware,Backdoor,RAT
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Spyware is computer software that is installed surreptitiously on a personal computer
to intercept or take partial control over the user's interaction
with the computer, without the user's informed consent.

While the term spyware suggests software that secretly monitors the user's behavior,
the functions of spyware extend well beyond simple monitoring.

Spyware programs can collect various types of personal information,
such as Internet surfing habit, sites that have been visited,
but can also interfere with user control of the computer in other ways,
such as installing additional software, redirecting Web browser activity,
accessing websites blindly that will cause more harmful viruses,
or diverting advertising revenue to a third party.

Spyware can even change computer settings, resulting in slow connection speeds,
different home pages, and loss of Internet or other programs.
In an attempt to increase the understanding of spyware, a more formal classification
of its included software types is captured under the term privacy-invasive software.
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
Often the backdoor will not be visible in the log of active programs.
Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.

Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on
April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack.
They usually do whimsical things like flip the screen upside-down, open the CD-ROM tray,
and swap mouse buttons. However, they can be quite hard to remove.

Kraimer Also known as:

[Kaspersky]Backdoor.Kraimer.11,Trojan.Spy.Kraimer.12,TrojanSpy.Win32.Kraimer.12,Sniffer.Win32.IPGrabber,Backdoor.Kraimer.13;
[Eset]Win32/Kraimer.13 trojan;
[McAfee]W32/Kraimer.worm,Kraimer;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Kraimer.11,Trojan Horse,Backdoor Program;
[Computer Associates]Backdoor/Kraimer.11,Win32.Kraimer.11,Backdoor/Kraimer.12,Win32.Kraimer.12,Win32.KraimGrab,Win32/Ipgrab2!Worm,Backdoor/KrAIMer.13,Win32.Kraimer.13

Visible Symptoms:
Files in system folders:
[%STARTUP%]\aolstart.exe
[%STARTUP%]\aolstart.exe

How to detect Kraimer:

Files:
[%STARTUP%]\aolstart.exe
[%STARTUP%]\aolstart.exe

Removing Kraimer:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Infantile Backdoor Symptoms

KnightSeven Backdoor

Removing KnightSeven
Categories: Backdoor,RAT
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
They function in the same way as legal remote administration programs used by system administrators.
This makes them difficult to detect.

Backdoors are installed and launched without the consent of the user of computer.
Often the backdoor will not be visible in the log of active programs.

Once a backdoor has been successfully launched, the computer is wide open.
Backdoor functions can include:


  • Launching/ deleting files

  • Sending/ receiving files

  • Deleting data

  • Displaying notification

  • Rebooting the machine

  • Executing files




Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.
Backdoors combine the functionality of most other types of in one package.

Backdoors have one especially dangerous sub-class: variants that can propagate like worms.
Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.

Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on
April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack.
They usually do whimsical things like flip the screen upside-down, open the CD-ROM tray,
and swap mouse buttons. However, they can be quite hard to remove.

KnightSeven Also known as:

[Kaspersky]Backdoor.Knightseven.10;
[Panda]Backdoor Program;
[Computer Associates]Backdoor/Knightseven.1_0

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\sndctl32.cfg
[%WINDOWS%]\sndctl32.exe
[%WINDOWS%]\sndctl32.cfg
[%WINDOWS%]\sndctl32.exe

How to detect KnightSeven:

Files:
[%WINDOWS%]\sndctl32.cfg
[%WINDOWS%]\sndctl32.exe
[%WINDOWS%]\sndctl32.cfg
[%WINDOWS%]\sndctl32.exe

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing KnightSeven:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
cpase.com Tracking Cookie Information
Destruction DoS Symptoms
WhitehouseCn DoS Information
00d Adware Information

ActualNames.SearchPike BHO

Removing ActualNames.SearchPike
Categories: BHO,Hijacker
As this information is entered by the user, it is captured by the BHO (Browser Helper Object) and
sent back to the attacker.
Typically, keyloggers of this type will send the stolen information back to the attacker via email
or HTTP POST, which can appear suspicious.Hijackers are software programs that modify users' default browser home page,
search settings, error page settings, or desktop wallpaper without adequate notice, disclosure,
or user consent.

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\spredirect.dll
[%WINDOWS%]\system\spredirect.dll
[%SYSTEM%]\spredirect.dll
[%WINDOWS%]\system\spredirect.dll

How to detect ActualNames.SearchPike:

Files:
[%SYSTEM%]\spredirect.dll
[%WINDOWS%]\system\spredirect.dll
[%SYSTEM%]\spredirect.dll
[%WINDOWS%]\system\spredirect.dll

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{92c7d65c-52f3-4545-8a35-213d730db1ed}
HKEY_LOCAL_MACHINE\software\classes\clsid\{92c7d65c-52f3-4545-8a35-213d730db1ed}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{92c7d65c-52f3-4545-8a35-213d730db1ed}

Removing ActualNames.SearchPike:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Elotus Trojan Removal instruction
Removing Bancos.HNB Trojan
Remove TrojanDownloader.Win32.Skoob Downloader