Tuesday, November 11, 2008

Security.iGuard Hijacker

Removing Security.iGuard
Categories: Hijacker,Hoax
Hijackers take control of various parts of your web browser, including your home page,
search pages, and search bar. They may also redirect you to certain sites should you
mistype an address or prevent you from going to a website they would rather you not,
such as sites that combat malware. Some will even redirect you to their own search engine
when you attempt a search.
A computer virus hoax is a false email message warning the recipient
of a virus that is going around. The message usually serves as a chain e-mail that
tells the recipient to forward it to everyone they know.

How to detect Security.iGuard:

Folders:
[%APPDATA%]\rex-services\security iguard
[%PROGRAMS%]\security iguard
[%PROGRAM_FILES%]\security iguard

Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\security iguard
HKEY_LOCAL_MACHINE\software\rex-services\security iguard

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Security.iGuard:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:

FastSearch Toolbar

Removing FastSearch
Categories: Toolbar
Toolbar presents itself as a helpful add-on for Internet Explorer but it is a real pest.
It replaces your start page, continuosly open a number of pop up windows and so on.

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\fsearchbar.dll
[%SYSTEM%]\fsearchbar.dll

How to detect FastSearch:

Files:
[%SYSTEM%]\fsearchbar.dll
[%SYSTEM%]\fsearchbar.dll

Registry Keys:
HKEY_CLASSES_ROOT\appid\fsearchbar.dll
HKEY_CLASSES_ROOT\clsid\{044d9f9f-0ee0-4e9b-b89b-5ebca0f852cc}
HKEY_CLASSES_ROOT\fsearchbar.fbarstart
HKEY_CLASSES_ROOT\fsearchbar.fbarstart.1
HKEY_CLASSES_ROOT\fsearchbar.fsearchband
HKEY_CLASSES_ROOT\fsearchbar.fsearchband.1
HKEY_LOCAL_MACHINE\software\fsbar

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar

Removing FastSearch:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:

SpywareQuake Trojan

Removing SpywareQuake
Categories: Trojan,Adware,Ransomware
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.

The term ransomware is commonly used to describe such software,
although the field known as cryptovirology predates the term "ransomware".

This type of ransom attack can be accomplished by (for example) attaching
a specially crafted file/program to an e-mail message and sending this to the victim.

Visible Symptoms:
Files in system folders:
[%PROFILE_TEMP%]\sa1.exe
[%PROFILE_TEMP%]\sa11.exe
[%PROFILE_TEMP%]\sa13.exe
[%PROFILE_TEMP%]\sa2.exe
[%PROFILE_TEMP%]\sa21.exe
[%PROFILE_TEMP%]\sa245.exe
[%PROFILE_TEMP%]\sa24A.exe
[%PROFILE_TEMP%]\sa24C.exe
[%PROFILE_TEMP%]\sa24E.exe
[%PROFILE_TEMP%]\sa253.exe
[%PROFILE_TEMP%]\sa27.exe
[%PROFILE_TEMP%]\sa28.exe
[%PROFILE_TEMP%]\sa293.exe
[%PROFILE_TEMP%]\sa2C.exe
[%PROFILE_TEMP%]\sa3.exe
[%PROFILE_TEMP%]\sa31.exe
[%PROFILE_TEMP%]\sa3A.exe
[%PROFILE_TEMP%]\sa4.exe
[%PROFILE_TEMP%]\sa40.exe
[%PROFILE_TEMP%]\sa46.exe
[%PROFILE_TEMP%]\sa50.exe
[%PROFILE_TEMP%]\sa6.exe
[%PROFILE_TEMP%]\sa7C.exe
[%PROFILE_TEMP%]\saA.exe
[%PROFILE_TEMP%]\saB.exe
[%PROFILE_TEMP%]\saC.exe
[%PROFILE_TEMP%]\SQLanguage.ini
[%PROFILE_TEMP%]\temp.fr????
[%PROFILE_TEMP%]\temp.fr????\SpywareQuake.url
[%PROFILE_TEMP%]\temp.fr????\uninst.exe
[%STARTMENU%]\SpywareQuake.com 2.1.lnk
[%SYSTEM%]\dfrgsrv.exe
[%SYSTEM%]\viruxz.dll
[%WINDOWS%]\Temp\SQLanguage.ini
[%PROGRAM_FILES%]\SpyQuake2.com\blacklist.txt
[%PROGRAM_FILES%]\SpyQuake2.com\ignored.lst
[%PROGRAM_FILES%]\SpyQuake2.com\msvcp71.dll
[%PROGRAM_FILES%]\SpyQuake2.com\msvcr71.dll
[%PROGRAM_FILES%]\SpyQuake2.com\ref.dat
[%PROGRAM_FILES%]\SpyQuake2.com\Spy-Quake2.exe
[%PROGRAM_FILES%]\SpyQuake2.com\SpyQuake2.com.url
[%PROGRAM_FILES%]\SpyQuake2.com\sq.ini
[%PROGRAM_FILES%]\SpyQuake2.com\uninst.exe
[%PROGRAM_FILES%]\SpywareQuake\blacklist.txt
[%PROGRAM_FILES%]\SpywareQuake\msvcp71.dll
[%PROGRAM_FILES%]\SpywareQuake\msvcr71.dll
[%PROGRAM_FILES%]\SpywareQuake\ref.dat
[%PROGRAM_FILES%]\SpywareQuake\SpywareQuake.exe
[%PROGRAM_FILES%]\SpywareQuake\SpywareQuake.url
[%PROGRAM_FILES%]\SpywareQuake\uninst.exe
[%STARTMENU%]\SpyQuake2.com 2.3.lnk
[%STARTMENU%]\SpywareQuake 2.0.lnk
[%SYSTEM%]\1024\ld4BC3.tmp.{693c6e81-eef2-4844-a8d3-08bad6f7ae0c}.QQQ
[%SYSTEM%]\1024\{ALL_FILES}}
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\SpywareQuake 2.0.lnk
[%DESKTOP%]\dfrgsrv.exe
[%DESKTOP%]\SpyQuake2.com.lnk
[%DESKTOP%]\SpywareQuake.com.lnk
[%DESKTOP%]\spywarequake.lnk
[%DESKTOP%]\spywarequakeinstaller.exe
[%STARTMENU%]\spywarequake 2.0.lnk
[%SYSTEM%]\guxxa.dll
[%SYSTEM%]\mssearchnet.exe
[%SYSTEM%]\stickrep.dll
[%WINDOWS%]\Temp\sa47.exe
[%PROFILE_TEMP%]\sa1.exe
[%PROFILE_TEMP%]\sa11.exe
[%PROFILE_TEMP%]\sa13.exe
[%PROFILE_TEMP%]\sa2.exe
[%PROFILE_TEMP%]\sa21.exe
[%PROFILE_TEMP%]\sa245.exe
[%PROFILE_TEMP%]\sa24A.exe
[%PROFILE_TEMP%]\sa24C.exe
[%PROFILE_TEMP%]\sa24E.exe
[%PROFILE_TEMP%]\sa253.exe
[%PROFILE_TEMP%]\sa27.exe
[%PROFILE_TEMP%]\sa28.exe
[%PROFILE_TEMP%]\sa293.exe
[%PROFILE_TEMP%]\sa2C.exe
[%PROFILE_TEMP%]\sa3.exe
[%PROFILE_TEMP%]\sa31.exe
[%PROFILE_TEMP%]\sa3A.exe
[%PROFILE_TEMP%]\sa4.exe
[%PROFILE_TEMP%]\sa40.exe
[%PROFILE_TEMP%]\sa46.exe
[%PROFILE_TEMP%]\sa50.exe
[%PROFILE_TEMP%]\sa6.exe
[%PROFILE_TEMP%]\sa7C.exe
[%PROFILE_TEMP%]\saA.exe
[%PROFILE_TEMP%]\saB.exe
[%PROFILE_TEMP%]\saC.exe
[%PROFILE_TEMP%]\SQLanguage.ini
[%PROFILE_TEMP%]\temp.fr????
[%PROFILE_TEMP%]\temp.fr????\SpywareQuake.url
[%PROFILE_TEMP%]\temp.fr????\uninst.exe
[%STARTMENU%]\SpywareQuake.com 2.1.lnk
[%SYSTEM%]\dfrgsrv.exe
[%SYSTEM%]\viruxz.dll
[%WINDOWS%]\Temp\SQLanguage.ini
[%PROGRAM_FILES%]\SpyQuake2.com\blacklist.txt
[%PROGRAM_FILES%]\SpyQuake2.com\ignored.lst
[%PROGRAM_FILES%]\SpyQuake2.com\msvcp71.dll
[%PROGRAM_FILES%]\SpyQuake2.com\msvcr71.dll
[%PROGRAM_FILES%]\SpyQuake2.com\ref.dat
[%PROGRAM_FILES%]\SpyQuake2.com\Spy-Quake2.exe
[%PROGRAM_FILES%]\SpyQuake2.com\SpyQuake2.com.url
[%PROGRAM_FILES%]\SpyQuake2.com\sq.ini
[%PROGRAM_FILES%]\SpyQuake2.com\uninst.exe
[%PROGRAM_FILES%]\SpywareQuake\blacklist.txt
[%PROGRAM_FILES%]\SpywareQuake\msvcp71.dll
[%PROGRAM_FILES%]\SpywareQuake\msvcr71.dll
[%PROGRAM_FILES%]\SpywareQuake\ref.dat
[%PROGRAM_FILES%]\SpywareQuake\SpywareQuake.exe
[%PROGRAM_FILES%]\SpywareQuake\SpywareQuake.url
[%PROGRAM_FILES%]\SpywareQuake\uninst.exe
[%STARTMENU%]\SpyQuake2.com 2.3.lnk
[%STARTMENU%]\SpywareQuake 2.0.lnk
[%SYSTEM%]\1024\ld4BC3.tmp.{693c6e81-eef2-4844-a8d3-08bad6f7ae0c}.QQQ
[%SYSTEM%]\1024\{ALL_FILES}}
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\SpywareQuake 2.0.lnk
[%DESKTOP%]\dfrgsrv.exe
[%DESKTOP%]\SpyQuake2.com.lnk
[%DESKTOP%]\SpywareQuake.com.lnk
[%DESKTOP%]\spywarequake.lnk
[%DESKTOP%]\spywarequakeinstaller.exe
[%STARTMENU%]\spywarequake 2.0.lnk
[%SYSTEM%]\guxxa.dll
[%SYSTEM%]\mssearchnet.exe
[%SYSTEM%]\stickrep.dll
[%WINDOWS%]\Temp\sa47.exe

How to detect SpywareQuake:

Files:
[%PROFILE_TEMP%]\sa1.exe
[%PROFILE_TEMP%]\sa11.exe
[%PROFILE_TEMP%]\sa13.exe
[%PROFILE_TEMP%]\sa2.exe
[%PROFILE_TEMP%]\sa21.exe
[%PROFILE_TEMP%]\sa245.exe
[%PROFILE_TEMP%]\sa24A.exe
[%PROFILE_TEMP%]\sa24C.exe
[%PROFILE_TEMP%]\sa24E.exe
[%PROFILE_TEMP%]\sa253.exe
[%PROFILE_TEMP%]\sa27.exe
[%PROFILE_TEMP%]\sa28.exe
[%PROFILE_TEMP%]\sa293.exe
[%PROFILE_TEMP%]\sa2C.exe
[%PROFILE_TEMP%]\sa3.exe
[%PROFILE_TEMP%]\sa31.exe
[%PROFILE_TEMP%]\sa3A.exe
[%PROFILE_TEMP%]\sa4.exe
[%PROFILE_TEMP%]\sa40.exe
[%PROFILE_TEMP%]\sa46.exe
[%PROFILE_TEMP%]\sa50.exe
[%PROFILE_TEMP%]\sa6.exe
[%PROFILE_TEMP%]\sa7C.exe
[%PROFILE_TEMP%]\saA.exe
[%PROFILE_TEMP%]\saB.exe
[%PROFILE_TEMP%]\saC.exe
[%PROFILE_TEMP%]\SQLanguage.ini
[%PROFILE_TEMP%]\temp.fr????
[%PROFILE_TEMP%]\temp.fr????\SpywareQuake.url
[%PROFILE_TEMP%]\temp.fr????\uninst.exe
[%STARTMENU%]\SpywareQuake.com 2.1.lnk
[%SYSTEM%]\dfrgsrv.exe
[%SYSTEM%]\viruxz.dll
[%WINDOWS%]\Temp\SQLanguage.ini
[%PROGRAM_FILES%]\SpyQuake2.com\blacklist.txt
[%PROGRAM_FILES%]\SpyQuake2.com\ignored.lst
[%PROGRAM_FILES%]\SpyQuake2.com\msvcp71.dll
[%PROGRAM_FILES%]\SpyQuake2.com\msvcr71.dll
[%PROGRAM_FILES%]\SpyQuake2.com\ref.dat
[%PROGRAM_FILES%]\SpyQuake2.com\Spy-Quake2.exe
[%PROGRAM_FILES%]\SpyQuake2.com\SpyQuake2.com.url
[%PROGRAM_FILES%]\SpyQuake2.com\sq.ini
[%PROGRAM_FILES%]\SpyQuake2.com\uninst.exe
[%PROGRAM_FILES%]\SpywareQuake\blacklist.txt
[%PROGRAM_FILES%]\SpywareQuake\msvcp71.dll
[%PROGRAM_FILES%]\SpywareQuake\msvcr71.dll
[%PROGRAM_FILES%]\SpywareQuake\ref.dat
[%PROGRAM_FILES%]\SpywareQuake\SpywareQuake.exe
[%PROGRAM_FILES%]\SpywareQuake\SpywareQuake.url
[%PROGRAM_FILES%]\SpywareQuake\uninst.exe
[%STARTMENU%]\SpyQuake2.com 2.3.lnk
[%STARTMENU%]\SpywareQuake 2.0.lnk
[%SYSTEM%]\1024\ld4BC3.tmp.{693c6e81-eef2-4844-a8d3-08bad6f7ae0c}.QQQ
[%SYSTEM%]\1024\{ALL_FILES}}
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\SpywareQuake 2.0.lnk
[%DESKTOP%]\dfrgsrv.exe
[%DESKTOP%]\SpyQuake2.com.lnk
[%DESKTOP%]\SpywareQuake.com.lnk
[%DESKTOP%]\spywarequake.lnk
[%DESKTOP%]\spywarequakeinstaller.exe
[%STARTMENU%]\spywarequake 2.0.lnk
[%SYSTEM%]\guxxa.dll
[%SYSTEM%]\mssearchnet.exe
[%SYSTEM%]\stickrep.dll
[%WINDOWS%]\Temp\sa47.exe
[%PROFILE_TEMP%]\sa1.exe
[%PROFILE_TEMP%]\sa11.exe
[%PROFILE_TEMP%]\sa13.exe
[%PROFILE_TEMP%]\sa2.exe
[%PROFILE_TEMP%]\sa21.exe
[%PROFILE_TEMP%]\sa245.exe
[%PROFILE_TEMP%]\sa24A.exe
[%PROFILE_TEMP%]\sa24C.exe
[%PROFILE_TEMP%]\sa24E.exe
[%PROFILE_TEMP%]\sa253.exe
[%PROFILE_TEMP%]\sa27.exe
[%PROFILE_TEMP%]\sa28.exe
[%PROFILE_TEMP%]\sa293.exe
[%PROFILE_TEMP%]\sa2C.exe
[%PROFILE_TEMP%]\sa3.exe
[%PROFILE_TEMP%]\sa31.exe
[%PROFILE_TEMP%]\sa3A.exe
[%PROFILE_TEMP%]\sa4.exe
[%PROFILE_TEMP%]\sa40.exe
[%PROFILE_TEMP%]\sa46.exe
[%PROFILE_TEMP%]\sa50.exe
[%PROFILE_TEMP%]\sa6.exe
[%PROFILE_TEMP%]\sa7C.exe
[%PROFILE_TEMP%]\saA.exe
[%PROFILE_TEMP%]\saB.exe
[%PROFILE_TEMP%]\saC.exe
[%PROFILE_TEMP%]\SQLanguage.ini
[%PROFILE_TEMP%]\temp.fr????
[%PROFILE_TEMP%]\temp.fr????\SpywareQuake.url
[%PROFILE_TEMP%]\temp.fr????\uninst.exe
[%STARTMENU%]\SpywareQuake.com 2.1.lnk
[%SYSTEM%]\dfrgsrv.exe
[%SYSTEM%]\viruxz.dll
[%WINDOWS%]\Temp\SQLanguage.ini
[%PROGRAM_FILES%]\SpyQuake2.com\blacklist.txt
[%PROGRAM_FILES%]\SpyQuake2.com\ignored.lst
[%PROGRAM_FILES%]\SpyQuake2.com\msvcp71.dll
[%PROGRAM_FILES%]\SpyQuake2.com\msvcr71.dll
[%PROGRAM_FILES%]\SpyQuake2.com\ref.dat
[%PROGRAM_FILES%]\SpyQuake2.com\Spy-Quake2.exe
[%PROGRAM_FILES%]\SpyQuake2.com\SpyQuake2.com.url
[%PROGRAM_FILES%]\SpyQuake2.com\sq.ini
[%PROGRAM_FILES%]\SpyQuake2.com\uninst.exe
[%PROGRAM_FILES%]\SpywareQuake\blacklist.txt
[%PROGRAM_FILES%]\SpywareQuake\msvcp71.dll
[%PROGRAM_FILES%]\SpywareQuake\msvcr71.dll
[%PROGRAM_FILES%]\SpywareQuake\ref.dat
[%PROGRAM_FILES%]\SpywareQuake\SpywareQuake.exe
[%PROGRAM_FILES%]\SpywareQuake\SpywareQuake.url
[%PROGRAM_FILES%]\SpywareQuake\uninst.exe
[%STARTMENU%]\SpyQuake2.com 2.3.lnk
[%STARTMENU%]\SpywareQuake 2.0.lnk
[%SYSTEM%]\1024\ld4BC3.tmp.{693c6e81-eef2-4844-a8d3-08bad6f7ae0c}.QQQ
[%SYSTEM%]\1024\{ALL_FILES}}
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\SpywareQuake 2.0.lnk
[%DESKTOP%]\dfrgsrv.exe
[%DESKTOP%]\SpyQuake2.com.lnk
[%DESKTOP%]\SpywareQuake.com.lnk
[%DESKTOP%]\spywarequake.lnk
[%DESKTOP%]\spywarequakeinstaller.exe
[%STARTMENU%]\spywarequake 2.0.lnk
[%SYSTEM%]\guxxa.dll
[%SYSTEM%]\mssearchnet.exe
[%SYSTEM%]\stickrep.dll
[%WINDOWS%]\Temp\sa47.exe

Folders:
[%PROGRAM_FILES%]\SpyQuake2.com
[%PROGRAM_FILES%]\SpywareQuake
[%PROGRAM_FILES%]\SpywareQuake.com
[%SYSTEM%]\1024
[%COMMON_PROGRAMS%]\spywarequake
[%PROGRAMS%]\SpyQuake2.com
[%PROGRAMS%]\SpywareQuake
[%PROGRAMS%]\SpywareQuake.com
[%STARTMENU%]\SpyQuake2.com 2.3.lnk
[%WINDOWS%]\system\1024

Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{1da7dbe8-c51b-4ae4-bc6e-21863349b0b4}
HKEY_CLASSES_ROOT\CLSID\{5839511e-ec1b-4f91-ace3-fb88e52f5239}
HKEY_CLASSES_ROOT\CLSID\{5B55C4E3-C179-BA0B-B4FD-F2DB862D6202}
HKEY_CLASSES_ROOT\CLSID\{874443fe-aa33-4ebf-a6ac-73208787e62d}
HKEY_CLASSES_ROOT\interface\{02b7b1e9-55a8-41c2-bb1f-2d6a878da48a}
HKEY_CLASSES_ROOT\interface\{0b9d2c57-6fa0-4ced-8beb-781391024cfc}
HKEY_CLASSES_ROOT\interface\{179518df-7eba-4d31-a7e1-73b5bb60e8d5}
HKEY_CLASSES_ROOT\Interface\{189518DF-7EBA-4D31-A7E1-73B5BB60E8D5}
HKEY_CLASSES_ROOT\Interface\{23D627FE-3F02-44CF-9EE1-7B9E44BD9E13}
HKEY_CLASSES_ROOT\interface\{24d627fe-3f02-44cf-9ee1-7b9e44bd9e13}
HKEY_CLASSES_ROOT\interface\{2541bf4a-7c5d-44b4-b032-c41c8192808a}
HKEY_CLASSES_ROOT\interface\{25a2eb70-c636-4d59-8915-1e58f3c18ee9}
HKEY_CLASSES_ROOT\interface\{25b9c83f-a38a-4a0e-a3bd-cfe9a1347dfa}
HKEY_CLASSES_ROOT\interface\{27ff7b0f-a511-4a49-9013-0bcf4d256fa4}
HKEY_CLASSES_ROOT\Interface\{2DD8D482-8F1C-4180-AA8E-9D5819E5F2EA}
HKEY_CLASSES_ROOT\Interface\{411F83B1-A0EC-4155-AF99-0137F5EFB270}
HKEY_CLASSES_ROOT\interface\{42cfefbe-8ae4-400e-bbe4-a2b61bb140fb}
HKEY_CLASSES_ROOT\Interface\{43CFEFBE-8AE4-400E-BBE4-A2B61BB140FB}
HKEY_CLASSES_ROOT\interface\{441e9bc9-09a8-4217-9328-85d82a5aee4e}
HKEY_CLASSES_ROOT\interface\{4790b963-23c5-43c1-bcf5-01c9b5a3e44e}
HKEY_CLASSES_ROOT\Interface\{4E3645AF-7A81-4F83-9B8C-1E4F930D873F}
HKEY_CLASSES_ROOT\Interface\{5790B963-23C5-43C1-BCF5-01C9B5A3E44E}
HKEY_CLASSES_ROOT\interface\{5a03cd74-86e0-47f5-b3ef-eb996a6ab955}
HKEY_CLASSES_ROOT\interface\{5c42ddf4-81eb-4668-9951-819a1d5befc8}
HKEY_CLASSES_ROOT\Interface\{5D42DDF4-81EB-4668-9951-819A1D5BEFC8}
HKEY_CLASSES_ROOT\Interface\{61032A65-2371-4C89-B5BB-DF73090FB5EA}
HKEY_CLASSES_ROOT\interface\{6348f4dc-2a27-4ab8-b067-fb03004136ff}
HKEY_CLASSES_ROOT\Interface\{66189AF2-7726-46E8-8628-0F95AB854792}
HKEY_CLASSES_ROOT\interface\{6dcf2fbb-d4d1-4ea1-b36a-b1114334909f}
HKEY_CLASSES_ROOT\interface\{75d06077-d5d3-40ca-b32d-6a67a7ff3f06}
HKEY_CLASSES_ROOT\Interface\{76D06077-D5D3-40CA-B32D-6A67A7FF3F06}
HKEY_CLASSES_ROOT\Interface\{7A2F6251-6C99-4DA5-9827-954EB45DCB82}
HKEY_CLASSES_ROOT\interface\{8155b8b6-643c-4540-85e2-a535640781d7}
HKEY_CLASSES_ROOT\Interface\{82C6C396-DD7B-4CE5-B668-C0087D1F3A1F}
HKEY_CLASSES_ROOT\Interface\{853E0D78-F4C2-47CB-A3F5-A774DA60DFCD}
HKEY_CLASSES_ROOT\interface\{85c7e6c3-ec47-44e5-aa08-ee0d0a25895f}
HKEY_CLASSES_ROOT\Interface\{86C7E6C3-EC47-44E5-AA08-EE0D0A25895F}
HKEY_CLASSES_ROOT\Interface\{9283DAC1-43F5-4580-BF86-841F22AF2335}
HKEY_CLASSES_ROOT\interface\{9383dac1-43f5-4580-bf86-841f22af2335}
HKEY_CLASSES_ROOT\Interface\{94786C47-EB3F-4BD5-A66B-0D49E2C90541}
HKEY_CLASSES_ROOT\Interface\{9989A9BC-9828-467E-AF06-E3B279E6E97B}
HKEY_CLASSES_ROOT\interface\{a0648dfa-652c-44ac-8497-2d6b9aa27d7a}
HKEY_CLASSES_ROOT\Interface\{AE90CAFC-09D4-47F0-9E11-CE621C424F08}
HKEY_CLASSES_ROOT\interface\{af90cafc-09d4-47f0-9e11-ce621c424f08}
HKEY_CLASSES_ROOT\Interface\{B2B3702A-5425-489E-A3AF-EDCCAFEBA019}
HKEY_CLASSES_ROOT\interface\{b8013930-1c39-4d74-98c2-6500cb95eccf}
HKEY_CLASSES_ROOT\Interface\{BA397E39-F67F-423F-BC6E-65939450093A}
HKEY_CLASSES_ROOT\interface\{bac8a83d-01d4-4f15-b8a9-4b4ab24253a7}
HKEY_CLASSES_ROOT\interface\{bc397e39-f67f-423f-bc6e-65939450093a}
HKEY_CLASSES_ROOT\Interface\{BEC8A83D-01D4-4F15-B8A9-4B4AB24253A7}
HKEY_CLASSES_ROOT\Interface\{C1C56112-2B2E-4D3C-8CFC-7E10C77FACEF}
HKEY_CLASSES_ROOT\interface\{c3eedc19-992d-409a-b323-ed57d511afa5}
HKEY_CLASSES_ROOT\Interface\{C4EEDC19-992D-409A-B323-ED57D511AFA5}
HKEY_CLASSES_ROOT\interface\{ca755757-a60f-45ef-b62a-46fe0ee37951}
HKEY_CLASSES_ROOT\Interface\{D01D4AAB-22C5-427F-A941-C4B65A3D8A23}
HKEY_CLASSES_ROOT\interface\{dc90f677-d205-4f70-9014-659614aabcb2}
HKEY_CLASSES_ROOT\Interface\{DD90F677-D205-4F70-9014-659614AABCB2}
HKEY_CLASSES_ROOT\Interface\{DDB0D689-FAE0-4165-9F7C-877602F9DD66}
HKEY_CLASSES_ROOT\interface\{e2df91f3-f24f-441e-9001-d61f36024322}
HKEY_CLASSES_ROOT\Interface\{E3DF91F3-F24F-441E-9001-D61F36024322}
HKEY_CLASSES_ROOT\Interface\{E5AD5BD5-C710-45E0-ABD3-E770FE85DAE8}
HKEY_CLASSES_ROOT\Interface\{EB5CA3AF-26C1-467B-9A55-2820E0451AAB}
HKEY_CLASSES_ROOT\interface\{ebb2169e-9c3d-4133-91cc-3bcfb47a9b50}
HKEY_CLASSES_ROOT\interface\{eff47498-ef07-4617-a209-85e69de9d73c}
HKEY_CLASSES_ROOT\interface\{f259eadb-5903-48d5-864c-2b7b46ab1424}
HKEY_CLASSES_ROOT\Interface\{F459EADB-5903-48D5-864C-2B7B46AB1424}
HKEY_CLASSES_ROOT\interface\{fb4edf66-0547-4f1a-ae96-7cfcad711c90}
HKEY_CLASSES_ROOT\Interface\{FC4EDF66-0547-4F1A-AE96-7CFCAD711C90}
HKEY_CLASSES_ROOT\TypeLib\{5E05EA9F-1EA7-4D0B-A09B-D5E29EC758B9}
HKEY_CLASSES_ROOT\TypeLib\{661173EE-FA31-4769-97D4-B556B5D09BDA}
HKEY_CLASSES_ROOT\typelib\{9163b40f-fed6-4b74-a4b2-b73b24e8b0e6}
HKEY_CURRENT_USER\software\classes\clsid\{e2ca7cd1-1ad9-f1c4-3d2a-dc1a33e7af9d}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Spy-Quake2.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Spyware-Quake.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\SpywareQuake.exe
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1da7dbe8-c51b-4ae4-bc6e-21863349b0b4}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SpyQuake2.com
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SpywareQuake
HKEY_LOCAL_MACHINE\SOFTWARE\SpyQuake2.com
HKEY_LOCAL_MACHINE\SOFTWARE\SpywareQuake
HKEY_LOCAL_MACHINE\SOFTWARE\SpywareQuake.com
HKEY_CLASSES_ROOT\CLSID\{35a88e51-b53d-43e9-b8a7-75d4c31b4676}
HKEY_CLASSES_ROOT\CLSID\{4da4616d-7e6e-4fd9-a2d5-b6c535733e22}
HKEY_CLASSES_ROOT\CLSID\{CD5E2AC9-25CE-A1C5-D1E2-DC6B28A6ED5A}
HKEY_CLASSES_ROOT\CLSID\{E2CA7CD1-1AD9-F1C4-3D2A-DC1A33E7AF9D}
HKEY_CLASSES_ROOT\clsid\{1da7dbe8-c51b-4ae4-bc6e-21863349b0b4}
HKEY_CLASSES_ROOT\clsid\{5839511e-ec1b-4f91-ace3-fb88e52f5239}
HKEY_CLASSES_ROOT\clsid\{5b55c4e3-c179-ba0b-b4fd-f2db862d6202}
HKEY_CLASSES_ROOT\clsid\{874443fe-aa33-4ebf-a6ac-73208787e62d}
HKEY_CLASSES_ROOT\interface\{189518df-7eba-4d31-a7e1-73b5bb60e8d5}
HKEY_CLASSES_ROOT\interface\{23d627fe-3f02-44cf-9ee1-7b9e44bd9e13}
HKEY_CLASSES_ROOT\interface\{2dd8d482-8f1c-4180-aa8e-9d5819e5f2ea}
HKEY_CLASSES_ROOT\interface\{411f83b1-a0ec-4155-af99-0137f5efb270}
HKEY_CLASSES_ROOT\interface\{43cfefbe-8ae4-400e-bbe4-a2b61bb140fb}
HKEY_CLASSES_ROOT\interface\{4e3645af-7a81-4f83-9b8c-1e4f930d873f}
HKEY_CLASSES_ROOT\interface\{5790b963-23c5-43c1-bcf5-01c9b5a3e44e}
HKEY_CLASSES_ROOT\interface\{5d42ddf4-81eb-4668-9951-819a1d5befc8}
HKEY_CLASSES_ROOT\interface\{61032a65-2371-4c89-b5bb-df73090fb5ea}
HKEY_CLASSES_ROOT\interface\{66189af2-7726-46e8-8628-0f95ab854792}
HKEY_CLASSES_ROOT\interface\{76d06077-d5d3-40ca-b32d-6a67a7ff3f06}
HKEY_CLASSES_ROOT\interface\{7a2f6251-6c99-4da5-9827-954eb45dcb82}
HKEY_CLASSES_ROOT\interface\{82c6c396-dd7b-4ce5-b668-c0087d1f3a1f}
HKEY_CLASSES_ROOT\interface\{853e0d78-f4c2-47cb-a3f5-a774da60dfcd}
HKEY_CLASSES_ROOT\interface\{86c7e6c3-ec47-44e5-aa08-ee0d0a25895f}
HKEY_CLASSES_ROOT\interface\{9283dac1-43f5-4580-bf86-841f22af2335}
HKEY_CLASSES_ROOT\interface\{94786c47-eb3f-4bd5-a66b-0d49e2c90541}
HKEY_CLASSES_ROOT\interface\{9989a9bc-9828-467e-af06-e3b279e6e97b}
HKEY_CLASSES_ROOT\interface\{ae90cafc-09d4-47f0-9e11-ce621c424f08}
HKEY_CLASSES_ROOT\interface\{b2b3702a-5425-489e-a3af-edccafeba019}
HKEY_CLASSES_ROOT\interface\{ba397e39-f67f-423f-bc6e-65939450093a}
HKEY_CLASSES_ROOT\interface\{bec8a83d-01d4-4f15-b8a9-4b4ab24253a7}
HKEY_CLASSES_ROOT\interface\{c1c56112-2b2e-4d3c-8cfc-7e10c77facef}
HKEY_CLASSES_ROOT\interface\{c4eedc19-992d-409a-b323-ed57d511afa5}
HKEY_CLASSES_ROOT\interface\{d01d4aab-22c5-427f-a941-c4b65a3d8a23}
HKEY_CLASSES_ROOT\interface\{dd90f677-d205-4f70-9014-659614aabcb2}
HKEY_CLASSES_ROOT\interface\{ddb0d689-fae0-4165-9f7c-877602f9dd66}
HKEY_CLASSES_ROOT\interface\{e3df91f3-f24f-441e-9001-d61f36024322}
HKEY_CLASSES_ROOT\interface\{e5ad5bd5-c710-45e0-abd3-e770fe85dae8}
HKEY_CLASSES_ROOT\interface\{eb5ca3af-26c1-467b-9a55-2820e0451aab}
HKEY_CLASSES_ROOT\interface\{f459eadb-5903-48d5-864c-2b7b46ab1424}
HKEY_CLASSES_ROOT\interface\{fc4edf66-0547-4f1a-ae96-7cfcad711c90}
HKEY_CLASSES_ROOT\typelib\{5e05ea9f-1ea7-4d0b-a09b-d5e29ec758b9}
HKEY_CLASSES_ROOT\typelib\{651173ee-fa31-4769-97d4-b556b5d09bda}
HKEY_CLASSES_ROOT\typelib\{661173ee-fa31-4769-97d4-b556b5d09bda}
HKEY_CURRENT_USER\clsid\{af3fd9a8-1287-4159-9212-9a5b4494af70}
HKEY_CURRENT_USER\clsid\{e2ca7cd1-1ad9-f1c4-3d2a-dc1a33e7af9d}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app paths\spy-quake2.exe
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app paths\spyware-quake.exe
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app paths\spywarequake.exe
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{1da7dbe8-c51b-4ae4-bc6e-21863349b0b4}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\spyquake2.com
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\spywarequake
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\spywarequake.com
HKEY_LOCAL_MACHINE\software\spyquake2.com
HKEY_LOCAL_MACHINE\software\spywarequake
HKEY_LOCAL_MACHINE\software\spywarequake.com

Registry Values:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Spy-Quake2.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\SpywareQuake.exe
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\software\classes\clsid\{af3fd9a8-1287-4159-9212-9a5b4494af70}\inprocserver32
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\sharedtaskscheduler
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\sharedtaskscheduler
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\sharedtaskscheduler
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\sharedtaskscheduler
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shellserviceobjectdelayload
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shellserviceobjectdelayload

Removing SpywareQuake:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:

MegaSearch Hijacker

Removing MegaSearch
Categories: Hijacker
Hijackers are software programs that modify users' default browser home page,
search settings, error page settings, or desktop wallpaper without adequate notice, disclosure,
or user consent.

When the default home page is hijacked, the browser opens to the web page set by the hijacker
instead of the user's designated home page. In some cases, the hijacker may block users from
restoring their desired home page.

A search hijacker redirects search results to other pages and may
transmit search and browsing data to unknown servers. An error page hijacker directs
the browser to another page, usually an advertising page, instead of the usual error
page when the requested URL is not found.

A desktop hijacker replaces the desktop wallpaper with advertising
for products and services on the desktop.

Hijackers take control of various parts of your web browser, including your home page,
search pages, and search bar. They may also redirect you to certain sites should you
mistype an address or prevent you from going to a website they would rather you not,
such as sites that combat malware. Some will even redirect you to their own search engine
when you attempt a search. NB: hijackers almost exclusively target Internet Explorer.

How to detect MegaSearch:

Registry Keys:
HKEY_CURRENT_USER\software\megasear toolbar cfgid 1
HKEY_CURRENT_USER\software\megasear toolbar clientid 228
HKEY_CURRENT_USER\software\megasear toolbar lastleft 12
HKEY_CURRENT_USER\software\megasear toolbar setupinit 1

Removing MegaSearch:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:

Generic.Downloader Trojan

Removing Generic.Downloader
Categories: Trojan,Adware,Downloader
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits
The downloader either launches the new malware or registers it to enable autorun
according to the local operating system requirements.

Generic.Downloader Also known as:

[Kaspersky]Trojan-Downloader.Win32.Agent.tn,Trojan-Downloader.Win32.Agent.atb,Trojan-Downloader.Win32.Tiny.bn,Trojan-Proxy.Win32.Agent.ji;
[McAfee]Generic.Downloader.h,Generic.Downloader.k,Generic Downloader.q,Generic Downloader.s,Generic Downloader.r,Generic Downloader.k,Generic Downloader.y;
[F-Prot]W32/Downloader.HNK;
[Other]W32/Dloader.CNT,TROJ_H.A,Win32/Discoslent.A,Win32/SillyDL4128!Trojan,Troj/Dloader-TP,Download.Trojan,Troj/Delf-SF,W32/DLoader.DTL,W32/DLoader.ABDY,TROJ_VB.ACJ,Troj/VB-AZA,Win32.Cadux.AV,Trojan-Downloader.Win32.VB.ajp,Win32/SillyDl.AVD,trojan downloader apher,Scam.Iwin,Win32/Shadown!generic,Downloader,enbrowser,Troj/Voter-A,Trojan.Vxgame.z,Win32/Matcash.BF,TROJ_DLOADER.QNF,BrowserModifier:Win32/Matcash

Visible Symptoms:
Files in system folders:
[%PROFILE_TEMP%]\qv3xt3.game
[%PROFILE_TEMP%]\qvxt42.game
[%PROFILE_TEMP%]\Setup100.exe
[%SYSTEM%]\agibukww.exe
[%SYSTEM%]\dowhrqyg.exe
[%SYSTEM%]\jkzfsjru.exe
[%SYSTEM%]\meoybrof.exe
[%SYSTEM%]\nejfxbgx.exe
[%SYSTEM%]\uygemmke.exe
[%SYSTEM%]\vdamcczs.exe
[%SYSTEM%]\xzclrczo.exe
[%WINDOWS%]\retadpu922.exe
[%PROFILE_TEMP%]\dnlsvc.exe
[%PROFILE_TEMP%]\dnsec.exe
[%PROFILE_TEMP%]\ms-38.exe
[%SYSTEM%]\msdirect.sys
[%WINDOWS%]\ifqtmpy.exe
[%WINDOWS%]\ifqtmpyA.exe
[%WINDOWS%]\Temp\ms-39.exe
[%WINDOWS%]\zmovpbf.exe
[%WINDOWS%]\zmovpbfA.exe
[%PROFILE_TEMP%]\qv3xt3.game
[%PROFILE_TEMP%]\qvxt42.game
[%PROFILE_TEMP%]\Setup100.exe
[%SYSTEM%]\agibukww.exe
[%SYSTEM%]\dowhrqyg.exe
[%SYSTEM%]\jkzfsjru.exe
[%SYSTEM%]\meoybrof.exe
[%SYSTEM%]\nejfxbgx.exe
[%SYSTEM%]\uygemmke.exe
[%SYSTEM%]\vdamcczs.exe
[%SYSTEM%]\xzclrczo.exe
[%WINDOWS%]\retadpu922.exe
[%PROFILE_TEMP%]\dnlsvc.exe
[%PROFILE_TEMP%]\dnsec.exe
[%PROFILE_TEMP%]\ms-38.exe
[%SYSTEM%]\msdirect.sys
[%WINDOWS%]\ifqtmpy.exe
[%WINDOWS%]\ifqtmpyA.exe
[%WINDOWS%]\Temp\ms-39.exe
[%WINDOWS%]\zmovpbf.exe
[%WINDOWS%]\zmovpbfA.exe

How to detect Generic.Downloader:

Files:
[%PROFILE_TEMP%]\qv3xt3.game
[%PROFILE_TEMP%]\qvxt42.game
[%PROFILE_TEMP%]\Setup100.exe
[%SYSTEM%]\agibukww.exe
[%SYSTEM%]\dowhrqyg.exe
[%SYSTEM%]\jkzfsjru.exe
[%SYSTEM%]\meoybrof.exe
[%SYSTEM%]\nejfxbgx.exe
[%SYSTEM%]\uygemmke.exe
[%SYSTEM%]\vdamcczs.exe
[%SYSTEM%]\xzclrczo.exe
[%WINDOWS%]\retadpu922.exe
[%PROFILE_TEMP%]\dnlsvc.exe
[%PROFILE_TEMP%]\dnsec.exe
[%PROFILE_TEMP%]\ms-38.exe
[%SYSTEM%]\msdirect.sys
[%WINDOWS%]\ifqtmpy.exe
[%WINDOWS%]\ifqtmpyA.exe
[%WINDOWS%]\Temp\ms-39.exe
[%WINDOWS%]\zmovpbf.exe
[%WINDOWS%]\zmovpbfA.exe
[%PROFILE_TEMP%]\qv3xt3.game
[%PROFILE_TEMP%]\qvxt42.game
[%PROFILE_TEMP%]\Setup100.exe
[%SYSTEM%]\agibukww.exe
[%SYSTEM%]\dowhrqyg.exe
[%SYSTEM%]\jkzfsjru.exe
[%SYSTEM%]\meoybrof.exe
[%SYSTEM%]\nejfxbgx.exe
[%SYSTEM%]\uygemmke.exe
[%SYSTEM%]\vdamcczs.exe
[%SYSTEM%]\xzclrczo.exe
[%WINDOWS%]\retadpu922.exe
[%PROFILE_TEMP%]\dnlsvc.exe
[%PROFILE_TEMP%]\dnsec.exe
[%PROFILE_TEMP%]\ms-38.exe
[%SYSTEM%]\msdirect.sys
[%WINDOWS%]\ifqtmpy.exe
[%WINDOWS%]\ifqtmpyA.exe
[%WINDOWS%]\Temp\ms-39.exe
[%WINDOWS%]\zmovpbf.exe
[%WINDOWS%]\zmovpbfA.exe

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{6f26ed6f-82c2-4b64-b1a7-40e644225e97}
HKEY_CLASSES_ROOT\clsid\{a405d44c-4b7b-43ea-a3ea-7e0e3065220e}
HKEY_CLASSES_ROOT\skymmstp.cfiledownload
HKEY_CLASSES_ROOT\skymmstp.cvirus
HKEY_CLASSES_ROOT\typelib\{a67726d9-4100-4582-8620-5a7e27d3ec3b}
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\dnlsvc
HKEY_CLASSES_ROOT\clsid\{721e6521-4cad-4a8d-a7f1-4e230b31ef19}
HKEY_CLASSES_ROOT\interface\{2be09adf-e81b-4b3a-bc93-267af94a7994}
HKEY_CLASSES_ROOT\interface\{4cff74bb-586f-4140-857c-05c96682ce7b}
HKEY_CLASSES_ROOT\interface\{d5722cec-adc9-4dfc-a25c-649dd0808161}
HKEY_CLASSES_ROOT\mshlp.mshlper
HKEY_CLASSES_ROOT\mshlp.mshlper.1
HKEY_CLASSES_ROOT\prjdownsecuxxx.cfiledownload
HKEY_CLASSES_ROOT\prjdownsecuxxx.cvirus
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\msdirect

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Generic.Downloader:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:

Mmviewer Adware

Removing Mmviewer
Categories: Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.


Visible Symptoms:
Files in system folders:
[%SYSTEM%]\mmview_101.dll
[%SYSTEM%]\mmview_101.dll

How to detect Mmviewer:

Files:
[%SYSTEM%]\mmview_101.dll
[%SYSTEM%]\mmview_101.dll

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion
HKEY_CURRENT_USER\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion

Removing Mmviewer:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:

Ultimate.Defender Trojan

Removing Ultimate.Defender
Categories: Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Visible Symptoms:
Files in system folders:
[%DESKTOP%]\ultimate defender.lnk
[%DESKTOP%]\ultimate defender.pkg
[%DESKTOP%]\ultimate defender.lnk
[%DESKTOP%]\ultimate defender.pkg

How to detect Ultimate.Defender:

Files:
[%DESKTOP%]\ultimate defender.lnk
[%DESKTOP%]\ultimate defender.pkg
[%DESKTOP%]\ultimate defender.lnk
[%DESKTOP%]\ultimate defender.pkg

Folders:
[%APPDATA%]\ultimate defender
[%COMMON_STARTMENU%]\Ultimate Defender
[%PROGRAM_FILES%]\ultimate defender
[%COMMON_PROGRAMS%]\Ultimate Defender
[%PROFILE%]\start menu\ultimate defender

Registry Keys:
HKEY_CURRENT_USER\software\ultimate defender
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\ultimate defender
HKEY_LOCAL_MACHINE\software\ultimate defender

Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Ultimate.Defender:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:

Ardamax.Keylogger Spyware

Removing Ardamax.Keylogger
Categories: Spyware
Spyware is computer software that is installed surreptitiously on a personal computer
to with the computer, without the user's informed consent.

Visible Symptoms:
Files in system folders:
[%PROGRAM_FILES%]\WGV\menu.gif
[%PROGRAM_FILES%]\WGV\tray.gif
[%SYSTEM%]\Explorer.006
[%SYSTEM%]\Explorer.007
[%PROGRAM_FILES%]\nsk\akv.exe
[%PROGRAM_FILES%]\nsk\nsk.exe
[%PROGRAM_FILES%]\TND\AKV.exe
[%PROGRAM_FILES%]\TND\akv.ini
[%PROGRAM_FILES%]\TND\menu.gif
[%PROGRAM_FILES%]\TND\qs.html
[%PROGRAM_FILES%]\TND\TND.002
[%PROGRAM_FILES%]\TND\TND.003
[%PROGRAM_FILES%]\TND\TND.004
[%PROGRAM_FILES%]\TND\TND.006
[%PROGRAM_FILES%]\TND\TND.007
[%PROGRAM_FILES%]\TND\TND.chm
[%PROGRAM_FILES%]\TND\TND.exe
[%PROGRAM_FILES%]\TND\tray.gif
[%PROGRAM_FILES%]\TND\Uninstall.exe
[%SYSTEM%]\nsk.exe
[%SYSTEM%]\Sys\AKV.exe
[%SYSTEM%]\Sys\PEFK.001
[%SYSTEM%]\Sys\PEFK.005
[%SYSTEM%]\Sys\PEFK.006
[%SYSTEM%]\Sys\PEFK.007
[%SYSTEM%]\Sys\PEFK.exe
[%PROGRAM_FILES%]\WGV\menu.gif
[%PROGRAM_FILES%]\WGV\tray.gif
[%SYSTEM%]\Explorer.006
[%SYSTEM%]\Explorer.007
[%PROGRAM_FILES%]\nsk\akv.exe
[%PROGRAM_FILES%]\nsk\nsk.exe
[%PROGRAM_FILES%]\TND\AKV.exe
[%PROGRAM_FILES%]\TND\akv.ini
[%PROGRAM_FILES%]\TND\menu.gif
[%PROGRAM_FILES%]\TND\qs.html
[%PROGRAM_FILES%]\TND\TND.002
[%PROGRAM_FILES%]\TND\TND.003
[%PROGRAM_FILES%]\TND\TND.004
[%PROGRAM_FILES%]\TND\TND.006
[%PROGRAM_FILES%]\TND\TND.007
[%PROGRAM_FILES%]\TND\TND.chm
[%PROGRAM_FILES%]\TND\TND.exe
[%PROGRAM_FILES%]\TND\tray.gif
[%PROGRAM_FILES%]\TND\Uninstall.exe
[%SYSTEM%]\nsk.exe
[%SYSTEM%]\Sys\AKV.exe
[%SYSTEM%]\Sys\PEFK.001
[%SYSTEM%]\Sys\PEFK.005
[%SYSTEM%]\Sys\PEFK.006
[%SYSTEM%]\Sys\PEFK.007
[%SYSTEM%]\Sys\PEFK.exe

How to detect Ardamax.Keylogger:

Files:
[%PROGRAM_FILES%]\WGV\menu.gif
[%PROGRAM_FILES%]\WGV\tray.gif
[%SYSTEM%]\Explorer.006
[%SYSTEM%]\Explorer.007
[%PROGRAM_FILES%]\nsk\akv.exe
[%PROGRAM_FILES%]\nsk\nsk.exe
[%PROGRAM_FILES%]\TND\AKV.exe
[%PROGRAM_FILES%]\TND\akv.ini
[%PROGRAM_FILES%]\TND\menu.gif
[%PROGRAM_FILES%]\TND\qs.html
[%PROGRAM_FILES%]\TND\TND.002
[%PROGRAM_FILES%]\TND\TND.003
[%PROGRAM_FILES%]\TND\TND.004
[%PROGRAM_FILES%]\TND\TND.006
[%PROGRAM_FILES%]\TND\TND.007
[%PROGRAM_FILES%]\TND\TND.chm
[%PROGRAM_FILES%]\TND\TND.exe
[%PROGRAM_FILES%]\TND\tray.gif
[%PROGRAM_FILES%]\TND\Uninstall.exe
[%SYSTEM%]\nsk.exe
[%SYSTEM%]\Sys\AKV.exe
[%SYSTEM%]\Sys\PEFK.001
[%SYSTEM%]\Sys\PEFK.005
[%SYSTEM%]\Sys\PEFK.006
[%SYSTEM%]\Sys\PEFK.007
[%SYSTEM%]\Sys\PEFK.exe
[%PROGRAM_FILES%]\WGV\menu.gif
[%PROGRAM_FILES%]\WGV\tray.gif
[%SYSTEM%]\Explorer.006
[%SYSTEM%]\Explorer.007
[%PROGRAM_FILES%]\nsk\akv.exe
[%PROGRAM_FILES%]\nsk\nsk.exe
[%PROGRAM_FILES%]\TND\AKV.exe
[%PROGRAM_FILES%]\TND\akv.ini
[%PROGRAM_FILES%]\TND\menu.gif
[%PROGRAM_FILES%]\TND\qs.html
[%PROGRAM_FILES%]\TND\TND.002
[%PROGRAM_FILES%]\TND\TND.003
[%PROGRAM_FILES%]\TND\TND.004
[%PROGRAM_FILES%]\TND\TND.006
[%PROGRAM_FILES%]\TND\TND.007
[%PROGRAM_FILES%]\TND\TND.chm
[%PROGRAM_FILES%]\TND\TND.exe
[%PROGRAM_FILES%]\TND\tray.gif
[%PROGRAM_FILES%]\TND\Uninstall.exe
[%SYSTEM%]\nsk.exe
[%SYSTEM%]\Sys\AKV.exe
[%SYSTEM%]\Sys\PEFK.001
[%SYSTEM%]\Sys\PEFK.005
[%SYSTEM%]\Sys\PEFK.006
[%SYSTEM%]\Sys\PEFK.007
[%SYSTEM%]\Sys\PEFK.exe

Folders:
[%PROGRAMS%]\ardamax keylogger
[%PROGRAM_FILES%]\ckm
[%PROGRAM_FILES%]\fkg

Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\ardamax keylogger

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\userassist\{75048700-ef1f-11d0-9888-006097deacf9}\count
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\userassist\{75048700-ef1f-11d0-9888-006097deacf9}\count
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\userassist\{75048700-ef1f-11d0-9888-006097deacf9}\count
HKEY_CURRENT_USER\software\microsoft\windows\shellnoroam\muicache\[%SYSTEM%]\sys
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Ardamax.Keylogger:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:

PrizeSurfer Trojan

Removing PrizeSurfer
Categories: Trojan,Adware
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits

PrizeSurfer Also known as:

[Kaspersky]Trojan.Win32.RCSync;
[Panda]Adware/RCSync

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\downloaded program files\passkey.dll
[%WINDOWS%]\downloaded program files\passkey.dll

How to detect PrizeSurfer:

Files:
[%WINDOWS%]\downloaded program files\passkey.dll
[%WINDOWS%]\downloaded program files\passkey.dll

Folders:
[%PROGRAM_FILES%]\rcprograms
[%PROGRAM_FILES%]\rcprograms1
[%PROGRAM_FILES%]\rcprograms2

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{7b91df1f-96e8-42ba-ab39-e1db9ce9f371}
HKEY_CLASSES_ROOT\interface\{6d846abd-9ece-44ad-bb1b-e1b0b20e352f}
HKEY_CLASSES_ROOT\passkey.validate
HKEY_CLASSES_ROOT\passkey.validate.1
HKEY_CLASSES_ROOT\typelib\{be055af3-6567-4678-a901-d4b7d92e55fe}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{7b91df1f-96e8-42ba-ab39-e1db9ce9f371}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]\downloaded program files\passkey.dll

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls\[%WINDOWS%]\downloaded program files

Removing PrizeSurfer:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:

Boss.Everyware Spyware

Removing Boss.Everyware
Categories: Spyware
Spyware is computer software that is installed surreptitiously on a personal computer
to intercept or take partial control over the user's interaction
with the computer, without the user's informed consent.

While the term spyware suggests software that secretly monitors the user's behavior,
the functions of spyware extend well beyond simple monitoring.

Spyware programs can collect various types of personal information,
such as Internet surfing habit, sites that have been visited,
but can also interfere with user control of the computer in other ways,
such as installing additional software, redirecting Web browser activity,
accessing websites blindly that will cause more harmful viruses,
or diverting advertising revenue to a third party.

Spyware can even change computer settings, resulting in slow connection speeds,
different home pages, and loss of Internet or other programs.
In an attempt to increase the understanding of spyware, a more formal classification
of its included software types is captured under the term privacy-invasive software.

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\bewldr32.exe
[%SYSTEM%]\wsa32.dll
[%SYSTEM%]\wsa32.exe
[%SYSTEM%]\bewldr32.exe
[%SYSTEM%]\wsa32.dll
[%SYSTEM%]\wsa32.exe

How to detect Boss.Everyware:

Files:
[%SYSTEM%]\bewldr32.exe
[%SYSTEM%]\wsa32.dll
[%SYSTEM%]\wsa32.exe
[%SYSTEM%]\bewldr32.exe
[%SYSTEM%]\wsa32.dll
[%SYSTEM%]\wsa32.exe

Folders:
[%PROFILE%]\start menu\programs\boss everyware 2
[%PROGRAMS%]\boss everyware 2
[%SYSTEM%]\wsa32

Registry Keys:
HKEY_LOCAL_MACHINE\software\jmerik\bosseveryware
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app paths\beconfig.exe
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app paths\bewrep.exe
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app paths\wsa32.exe
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\boss everyware 2.8_is1

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Boss.Everyware:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:

AntiSpywareBot Ransomware

Removing AntiSpywareBot
Categories: Ransomware
A cryptovirus, cryptotrojan or cryptoworm is a type of
malware that encrypts the data belonging to an individual on a computer,
demanding a ransom for its restoration.

The term ransomware is commonly used to describe software that encrypts the data
belonging to an individual on a computer, demanding a ransom for its restoration.
Although the field known as cryptovirology predates the term "ransomware".

Visible Symptoms:
Files in system folders:
[%PROGRAM_FILES%]\AntiSpywareBot\AntiSpywareBot.exe
[%PROGRAM_FILES%]\AntiSpywareBot\AntiSpywareBot.exe

How to detect AntiSpywareBot:

Files:
[%PROGRAM_FILES%]\AntiSpywareBot\AntiSpywareBot.exe
[%PROGRAM_FILES%]\AntiSpywareBot\AntiSpywareBot.exe

Folders:
[%PROGRAM_FILES%]\AntiSpywareBot

Registry Values:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Removing AntiSpywareBot:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:

Puper.dr Trojan

Removing Puper.dr
Categories: Trojan,Downloader
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
The downloader either launches the new malware or registers it to enable autorun
according to the local operating system requirements.

Puper.dr Also known as:

[McAfee]Puper.dr;
[Other]Win32/Nuvens.H,Trojan-Downloader.Win32.Zlob.abz,Trojan.Zlob,Win32/Alureon.CF,Trojan.Flush.K

How to detect Puper.dr:

Folders:
[%PROGRAMS%]\PrivateVideo
[%PROGRAM_FILES%]\PrivateVideo

Registry Keys:
HKEY_CLASSES_ROOT\privatevideo

Removing Puper.dr:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:

Lager Trojan

Removing Lager
Categories: Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Lager Also known as:

[Kaspersky]Trojan.Proxy.Win32.Lager.ch,Trojan-Prox.Win32.Lager.dt;
[Other]W32/Crypt.gen4,TROJ_LAGER.AR

Visible Symptoms:
Files in system folders:
[%PROFILE_TEMP%]\WER54.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER55.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER56.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER57.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER58.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER59.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5A.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5B.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5C.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5D.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5E.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5F.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER60.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER61.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER62.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER63.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER64.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER65.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER66.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER67.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER68.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER69.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER6A.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER54.tmp
[%PROFILE_TEMP%]\WER55.tmp
[%PROFILE_TEMP%]\WER56.tmp
[%PROFILE_TEMP%]\WER57.tmp
[%PROFILE_TEMP%]\WER58.tmp
[%PROFILE_TEMP%]\WER59.tmp
[%PROFILE_TEMP%]\WER5A.tmp
[%PROFILE_TEMP%]\WER5B.tmp
[%PROFILE_TEMP%]\WER5C.tmp
[%PROFILE_TEMP%]\WER5D.tmp
[%PROFILE_TEMP%]\WER5E.tmp
[%PROFILE_TEMP%]\WER5F.tmp
[%PROFILE_TEMP%]\WER60.tmp
[%PROFILE_TEMP%]\WER61.tmp
[%PROFILE_TEMP%]\WER62.tmp
[%PROFILE_TEMP%]\WER63.tmp
[%PROFILE_TEMP%]\WER64.tmp
[%PROFILE_TEMP%]\WER65.tmp
[%PROFILE_TEMP%]\WER66.tmp
[%PROFILE_TEMP%]\WER67.tmp
[%PROFILE_TEMP%]\WER68.tmp
[%PROFILE_TEMP%]\WER69.tmp
[%PROFILE_TEMP%]\WER6A.tmp
[%PROFILE_TEMP%]\WER54.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER55.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER56.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER57.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER58.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER59.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5A.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5B.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5C.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5D.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5E.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5F.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER60.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER61.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER62.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER63.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER64.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER65.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER66.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER67.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER68.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER69.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER6A.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER54.tmp
[%PROFILE_TEMP%]\WER55.tmp
[%PROFILE_TEMP%]\WER56.tmp
[%PROFILE_TEMP%]\WER57.tmp
[%PROFILE_TEMP%]\WER58.tmp
[%PROFILE_TEMP%]\WER59.tmp
[%PROFILE_TEMP%]\WER5A.tmp
[%PROFILE_TEMP%]\WER5B.tmp
[%PROFILE_TEMP%]\WER5C.tmp
[%PROFILE_TEMP%]\WER5D.tmp
[%PROFILE_TEMP%]\WER5E.tmp
[%PROFILE_TEMP%]\WER5F.tmp
[%PROFILE_TEMP%]\WER60.tmp
[%PROFILE_TEMP%]\WER61.tmp
[%PROFILE_TEMP%]\WER62.tmp
[%PROFILE_TEMP%]\WER63.tmp
[%PROFILE_TEMP%]\WER64.tmp
[%PROFILE_TEMP%]\WER65.tmp
[%PROFILE_TEMP%]\WER66.tmp
[%PROFILE_TEMP%]\WER67.tmp
[%PROFILE_TEMP%]\WER68.tmp
[%PROFILE_TEMP%]\WER69.tmp
[%PROFILE_TEMP%]\WER6A.tmp

How to detect Lager:

Files:
[%PROFILE_TEMP%]\WER54.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER55.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER56.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER57.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER58.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER59.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5A.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5B.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5C.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5D.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5E.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5F.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER60.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER61.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER62.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER63.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER64.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER65.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER66.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER67.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER68.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER69.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER6A.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER54.tmp
[%PROFILE_TEMP%]\WER55.tmp
[%PROFILE_TEMP%]\WER56.tmp
[%PROFILE_TEMP%]\WER57.tmp
[%PROFILE_TEMP%]\WER58.tmp
[%PROFILE_TEMP%]\WER59.tmp
[%PROFILE_TEMP%]\WER5A.tmp
[%PROFILE_TEMP%]\WER5B.tmp
[%PROFILE_TEMP%]\WER5C.tmp
[%PROFILE_TEMP%]\WER5D.tmp
[%PROFILE_TEMP%]\WER5E.tmp
[%PROFILE_TEMP%]\WER5F.tmp
[%PROFILE_TEMP%]\WER60.tmp
[%PROFILE_TEMP%]\WER61.tmp
[%PROFILE_TEMP%]\WER62.tmp
[%PROFILE_TEMP%]\WER63.tmp
[%PROFILE_TEMP%]\WER64.tmp
[%PROFILE_TEMP%]\WER65.tmp
[%PROFILE_TEMP%]\WER66.tmp
[%PROFILE_TEMP%]\WER67.tmp
[%PROFILE_TEMP%]\WER68.tmp
[%PROFILE_TEMP%]\WER69.tmp
[%PROFILE_TEMP%]\WER6A.tmp
[%PROFILE_TEMP%]\WER54.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER55.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER56.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER57.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER58.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER59.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5A.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5B.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5C.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5D.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5E.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5F.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER60.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER61.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER62.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER63.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER64.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER65.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER66.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER67.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER68.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER69.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER6A.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER54.tmp
[%PROFILE_TEMP%]\WER55.tmp
[%PROFILE_TEMP%]\WER56.tmp
[%PROFILE_TEMP%]\WER57.tmp
[%PROFILE_TEMP%]\WER58.tmp
[%PROFILE_TEMP%]\WER59.tmp
[%PROFILE_TEMP%]\WER5A.tmp
[%PROFILE_TEMP%]\WER5B.tmp
[%PROFILE_TEMP%]\WER5C.tmp
[%PROFILE_TEMP%]\WER5D.tmp
[%PROFILE_TEMP%]\WER5E.tmp
[%PROFILE_TEMP%]\WER5F.tmp
[%PROFILE_TEMP%]\WER60.tmp
[%PROFILE_TEMP%]\WER61.tmp
[%PROFILE_TEMP%]\WER62.tmp
[%PROFILE_TEMP%]\WER63.tmp
[%PROFILE_TEMP%]\WER64.tmp
[%PROFILE_TEMP%]\WER65.tmp
[%PROFILE_TEMP%]\WER66.tmp
[%PROFILE_TEMP%]\WER67.tmp
[%PROFILE_TEMP%]\WER68.tmp
[%PROFILE_TEMP%]\WER69.tmp
[%PROFILE_TEMP%]\WER6A.tmp

Removing Lager:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:

TopRebates Adware

Removing TopRebates
Categories: Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits

TopRebates Also known as:

[Kaspersky]TrojanClicker.Win32.Delf.z,TrojanDownloader.Win32.Agent.y,TrojanSpy.Win32.Spung.a;
[Panda]Adware/TopRebates,Trojan Horse

Visible Symptoms:
Files in system folders:
[%PROFILE_TEMP%]\djtopr1150.exe
[%PROFILE_TEMP%]\temp.fr????\websrebates\Images\topr_c_hdr_autotrack_remove.gif
[%PROFILE_TEMP%]\temp.fr????\websrebates\Images\topr_c_hdr_settings.gif
[%PROFILE_TEMP%]\temp.fr????\websrebates\Images\topr_c_pop_circles_bg2.gif
[%PROGRAM_FILES%]\Rebate_Nation\Sy5300\Sy5300\5300_1.dat
[%SYSTEM%]\FWNToolbar.dll.manifest
[%WINDOWS%]\345a8.exe
[%WINDOWS%]\artmmp.ini
[%WINDOWS%]\neti.dll
[%SYSTEM%]\webrebates.exe
[%WINDOWS%]\cache371\b_371_0_1_501300.htm
[%WINDOWS%]\cache371\b_371_0_1_569200.htm
[%WINDOWS%]\cache371\b_371_0_1_582200.htm
[%PROFILE_TEMP%]\djtopr1150.exe
[%PROFILE_TEMP%]\temp.fr????\websrebates\Images\topr_c_hdr_autotrack_remove.gif
[%PROFILE_TEMP%]\temp.fr????\websrebates\Images\topr_c_hdr_settings.gif
[%PROFILE_TEMP%]\temp.fr????\websrebates\Images\topr_c_pop_circles_bg2.gif
[%PROGRAM_FILES%]\Rebate_Nation\Sy5300\Sy5300\5300_1.dat
[%SYSTEM%]\FWNToolbar.dll.manifest
[%WINDOWS%]\345a8.exe
[%WINDOWS%]\artmmp.ini
[%WINDOWS%]\neti.dll
[%SYSTEM%]\webrebates.exe
[%WINDOWS%]\cache371\b_371_0_1_501300.htm
[%WINDOWS%]\cache371\b_371_0_1_569200.htm
[%WINDOWS%]\cache371\b_371_0_1_582200.htm

How to detect TopRebates:

Files:
[%PROFILE_TEMP%]\djtopr1150.exe
[%PROFILE_TEMP%]\temp.fr????\websrebates\Images\topr_c_hdr_autotrack_remove.gif
[%PROFILE_TEMP%]\temp.fr????\websrebates\Images\topr_c_hdr_settings.gif
[%PROFILE_TEMP%]\temp.fr????\websrebates\Images\topr_c_pop_circles_bg2.gif
[%PROGRAM_FILES%]\Rebate_Nation\Sy5300\Sy5300\5300_1.dat
[%SYSTEM%]\FWNToolbar.dll.manifest
[%WINDOWS%]\345a8.exe
[%WINDOWS%]\artmmp.ini
[%WINDOWS%]\neti.dll
[%SYSTEM%]\webrebates.exe
[%WINDOWS%]\cache371\b_371_0_1_501300.htm
[%WINDOWS%]\cache371\b_371_0_1_569200.htm
[%WINDOWS%]\cache371\b_371_0_1_582200.htm
[%PROFILE_TEMP%]\djtopr1150.exe
[%PROFILE_TEMP%]\temp.fr????\websrebates\Images\topr_c_hdr_autotrack_remove.gif
[%PROFILE_TEMP%]\temp.fr????\websrebates\Images\topr_c_hdr_settings.gif
[%PROFILE_TEMP%]\temp.fr????\websrebates\Images\topr_c_pop_circles_bg2.gif
[%PROGRAM_FILES%]\Rebate_Nation\Sy5300\Sy5300\5300_1.dat
[%SYSTEM%]\FWNToolbar.dll.manifest
[%WINDOWS%]\345a8.exe
[%WINDOWS%]\artmmp.ini
[%WINDOWS%]\neti.dll
[%SYSTEM%]\webrebates.exe
[%WINDOWS%]\cache371\b_371_0_1_501300.htm
[%WINDOWS%]\cache371\b_371_0_1_569200.htm
[%WINDOWS%]\cache371\b_371_0_1_582200.htm

Registry Keys:
HKEY_CURRENT_USER\software\microsoft\internet explorer\menuext\web rebates

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing TopRebates:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:

Awax Trojan

Removing Awax
Categories: Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Awax Also known as:

[Kaspersky]AdWare.Win32.Virtumonde.jd;
[Other]Trojan.Awax

How to detect Awax:

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{3106e6f3-84b4-4a08-b7b7-6efe2d7596f9}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{3106e6f3-84b4-4a08-b7b7-6efe2d7596f9}

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks

Removing Awax:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:

Kilo Backdoor

Removing Kilo
Categories: Backdoor,RAT
Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.

Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on
April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack.


Kilo Also known as:

[Kaspersky]Backdoor.Kilo.0119,Backdoor.Kilo.016;
[McAfee]BackDoor-PL;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program,Bck/Kilo,Bck/Kilo.0119_(565);
[Computer Associates]Backdoor/Kilo.0119,Backdoor/Kilo.0119!Client

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\system\ubzup.exe
[%WINDOWS%]\system\ubzup.exe

How to detect Kilo:

Files:
[%WINDOWS%]\system\ubzup.exe
[%WINDOWS%]\system\ubzup.exe

Removing Kilo:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:

WinWhatWhere Spyware

Removing WinWhatWhere
Categories: Spyware
Spyware can even change computer settings, resulting in slow connection speeds,
different home pages, and loss of Internet or other programs.
In an attempt to increase the understanding of spyware, a more formal classification
of its included software types is captured under the term privacy-invasive software.

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\ImgX4.dll
[%DESKTOP%]\investigator reports.lnk
[%DESKTOP%]\investigator setup.lnk
[%DESKTOP%]\tamsetup.exe
[%DESKTOP%]\trueactive setup.lnk
[%PROFILE%]\recent\tamsetup.lnk
[%PROGRAM_FILES%]\tam\tamrpt.exe
[%PROGRAM_FILES%]\tam\tamset.exe
[%SYSTEM%]\olbe\msdfcng.exe
[%SYSTEM%]\olbe\updsem.exe
[%SYSTEM%]\olbe\windsdoc8.sys
[%SYSTEM%]\olbe\winsdoc16.sys
[%SYSTEM%]\olbe\winsdoc32.sys
[%SYSTEM%]\olbe\winsutl.sys
[%WINDOWS%]\fonts\afbloc.dat
[%SYSTEM%]\ImgX4.dll
[%DESKTOP%]\investigator reports.lnk
[%DESKTOP%]\investigator setup.lnk
[%DESKTOP%]\tamsetup.exe
[%DESKTOP%]\trueactive setup.lnk
[%PROFILE%]\recent\tamsetup.lnk
[%PROGRAM_FILES%]\tam\tamrpt.exe
[%PROGRAM_FILES%]\tam\tamset.exe
[%SYSTEM%]\olbe\msdfcng.exe
[%SYSTEM%]\olbe\updsem.exe
[%SYSTEM%]\olbe\windsdoc8.sys
[%SYSTEM%]\olbe\winsdoc16.sys
[%SYSTEM%]\olbe\winsdoc32.sys
[%SYSTEM%]\olbe\winsutl.sys
[%WINDOWS%]\fonts\afbloc.dat

How to detect WinWhatWhere:

Files:
[%SYSTEM%]\ImgX4.dll
[%DESKTOP%]\investigator reports.lnk
[%DESKTOP%]\investigator setup.lnk
[%DESKTOP%]\tamsetup.exe
[%DESKTOP%]\trueactive setup.lnk
[%PROFILE%]\recent\tamsetup.lnk
[%PROGRAM_FILES%]\tam\tamrpt.exe
[%PROGRAM_FILES%]\tam\tamset.exe
[%SYSTEM%]\olbe\msdfcng.exe
[%SYSTEM%]\olbe\updsem.exe
[%SYSTEM%]\olbe\windsdoc8.sys
[%SYSTEM%]\olbe\winsdoc16.sys
[%SYSTEM%]\olbe\winsdoc32.sys
[%SYSTEM%]\olbe\winsutl.sys
[%WINDOWS%]\fonts\afbloc.dat
[%SYSTEM%]\ImgX4.dll
[%DESKTOP%]\investigator reports.lnk
[%DESKTOP%]\investigator setup.lnk
[%DESKTOP%]\tamsetup.exe
[%DESKTOP%]\trueactive setup.lnk
[%PROFILE%]\recent\tamsetup.lnk
[%PROGRAM_FILES%]\tam\tamrpt.exe
[%PROGRAM_FILES%]\tam\tamset.exe
[%SYSTEM%]\olbe\msdfcng.exe
[%SYSTEM%]\olbe\updsem.exe
[%SYSTEM%]\olbe\windsdoc8.sys
[%SYSTEM%]\olbe\winsdoc16.sys
[%SYSTEM%]\olbe\winsdoc32.sys
[%SYSTEM%]\olbe\winsutl.sys
[%WINDOWS%]\fonts\afbloc.dat

Folders:
[%APPDATA%]\tam

Registry Keys:
HKEY_CLASSES_ROOT\.sem
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app paths\msdfcng.exe

Removing WinWhatWhere:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:

Zlob.Fake Security Alerts Trojan

Removing Zlob.Fake Security Alerts
Categories: Trojan,Popups
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Adware is the class of programs that place advertisements on your screen.
These may be in the form of pop-ups, pop-unders, advertisements embedded in programs,
advertisements placed on top of ads in web sites, or any other way the authors can
think of showing you an ad.

The pop-ups generally will not be stopped by pop-up stoppers, and often are
not dependent on your having Internet Explorer open.
They may show up when you are playing a game, writing a document, listening to music,
or anything else. Should you be surfing, the advertisements will often be related to
the web page you are viewing.

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\AceExt32.dll
[%SYSTEM%]\afzdbl.dll
[%SYSTEM%]\aghmao.dll
[%SYSTEM%]\ayjhc.dll
[%SYSTEM%]\beahahl.dll
[%SYSTEM%]\bgwttyl.dll
[%SYSTEM%]\bqrcr.dll
[%SYSTEM%]\bubbj.dll
[%SYSTEM%]\ccyszwl.dll
[%SYSTEM%]\cfqbw.dll
[%SYSTEM%]\chzbi.dll
[%SYSTEM%]\cjuvwa.dll
[%SYSTEM%]\clbrcek.dll
[%SYSTEM%]\cqsfk.dll
[%SYSTEM%]\cthkpcv.dll
[%SYSTEM%]\cwgppb.dll
[%SYSTEM%]\czxtyx.dll
[%SYSTEM%]\d3acdb.dll
[%SYSTEM%]\dcvwaah.dll
[%SYSTEM%]\ddllup.dll
[%SYSTEM%]\ddomv.dll
[%SYSTEM%]\dfrep.dll
[%SYSTEM%]\dooep.dll
[%SYSTEM%]\dpfwu.dll
[%SYSTEM%]\duznhje.dll
[%SYSTEM%]\dxmpp.dll
[%SYSTEM%]\dyrwls.dll
[%SYSTEM%]\e404d.dll
[%SYSTEM%]\ecxwp.dll
[%SYSTEM%]\eeuydc.dll
[%SYSTEM%]\eigbbb.dll
[%SYSTEM%]\EOZfG8vL.dll
[%SYSTEM%]\eulbn.dll
[%SYSTEM%]\fdpzgi.dll
[%SYSTEM%]\fftktmk.dll
[%SYSTEM%]\fifzqip.dll
[%SYSTEM%]\flirek.dll
[%SYSTEM%]\fnczfh.dll
[%SYSTEM%]\fnexvt.dll
[%SYSTEM%]\fqdqs.dll
[%SYSTEM%]\fqgwiw.dll
[%SYSTEM%]\fshqaln.dll
[%SYSTEM%]\fwjgtk.dll
[%SYSTEM%]\fwrkqfl.dll
[%SYSTEM%]\fwzozx.dll
[%SYSTEM%]\fyhwfc.dll
[%SYSTEM%]\fyxkaah.dll
[%SYSTEM%]\gbjkog.dll
[%SYSTEM%]\gdrtul.dll
[%SYSTEM%]\geplxss.dll
[%SYSTEM%]\gkymhk.dll
[%SYSTEM%]\gnjsjc.dll
[%SYSTEM%]\gtawclv.dll
[%SYSTEM%]\gusur.dll
[%SYSTEM%]\guxmhcd.dll
[%SYSTEM%]\gwquvw.dll
[%SYSTEM%]\higehsg.dll
[%SYSTEM%]\hjpprpu.dll
[%SYSTEM%]\hteogat.dll
[%SYSTEM%]\hu.dll
[%SYSTEM%]\hymww.dll
[%SYSTEM%]\igkvf.dll
[%SYSTEM%]\igpfced.dll
[%SYSTEM%]\igzxwrl.dll
[%SYSTEM%]\iheuv.dll
[%SYSTEM%]\iklqcx.dll
[%SYSTEM%]\ilmpjy.dll
[%SYSTEM%]\indwvm.dll
[%SYSTEM%]\iolchsmxrhfi.dll
[%SYSTEM%]\itdtjjf.dll
[%SYSTEM%]\ivrllc.dll
[%SYSTEM%]\jrpkmgh.dll
[%SYSTEM%]\khtbpdl.dll
[%SYSTEM%]\kvfvw.dll
[%SYSTEM%]\kzpkwj.dll
[%SYSTEM%]\lapmvzf.dll
[%SYSTEM%]\lgaac.dll
[%SYSTEM%]\mivmv.dll
[%SYSTEM%]\monem.dll
[%SYSTEM%]\moywh.dll
[%SYSTEM%]\muvdjo.dll
[%SYSTEM%]\mvwqn.dll
[%SYSTEM%]\mxhfjy.dll
[%SYSTEM%]\myqlejy.dll
[%SYSTEM%]\nbbrhbd.dll
[%SYSTEM%]\ncrjf.dll
[%SYSTEM%]\nczupfw.dll
[%SYSTEM%]\nexpegp.dll
[%SYSTEM%]\onljweo.dll
[%SYSTEM%]\osdjhjc.dll
[%SYSTEM%]\oyopu.dll
[%SYSTEM%]\pfrmj.dll
[%SYSTEM%]\pjgerka.dll
[%SYSTEM%]\pkgvyg.dll
[%SYSTEM%]\pluwue.dll
[%SYSTEM%]\psndz.dll
[%SYSTEM%]\qzviz.dll
[%SYSTEM%]\rldyt.dll
[%SYSTEM%]\rmtdvc.dll
[%SYSTEM%]\rnxwph.dll
[%SYSTEM%]\runsrv32.dll
[%SYSTEM%]\ryxrho.dll
[%SYSTEM%]\sacskza.dll
[%SYSTEM%]\siiyal.dll
[%SYSTEM%]\sttwrd.dll
[%SYSTEM%]\surzzh.dll
[%SYSTEM%]\swqzdtj.dll
[%SYSTEM%]\tczij.dll
[%SYSTEM%]\tiqmcx.dll
[%SYSTEM%]\tkosvv.dll
[%SYSTEM%]\tkrsw.dll
[%SYSTEM%]\tmxxxh.dll
[%SYSTEM%]\tqcwm.dll
[%SYSTEM%]\tvomnc.dll
[%SYSTEM%]\tvtpwp.dll
[%SYSTEM%]\txfdb32.dll
[%SYSTEM%]\txxkb.dll
[%SYSTEM%]\ucmbegr.dll
[%SYSTEM%]\ugbtna.dll
[%SYSTEM%]\uglgs.dll
[%SYSTEM%]\ugofuq.dll
[%SYSTEM%]\uimcu.dll
[%SYSTEM%]\unpfrwb.dll
[%SYSTEM%]\uoricweppdhx.dll
[%SYSTEM%]\vblhanf.dll
[%SYSTEM%]\vcehaeb.dll
[%SYSTEM%]\veptlh.dll
[%SYSTEM%]\vgibz.dll
[%SYSTEM%]\vjxwnn.dll
[%SYSTEM%]\vmlwp.dll
[%SYSTEM%]\vophqmn.dll
[%SYSTEM%]\vpccw.dll
[%SYSTEM%]\vusxqm.dll
[%SYSTEM%]\vwfps.dll
[%SYSTEM%]\vzfhprk.dll
[%SYSTEM%]\winapi32.dll
[%SYSTEM%]\wowlze.dll
[%SYSTEM%]\wqzdtjg.dll
[%SYSTEM%]\wstart.dll
[%SYSTEM%]\wxinptv.dll
[%SYSTEM%]\wygomd.dll
[%SYSTEM%]\wzhtjqo.dll
[%SYSTEM%]\xedasn.dll
[%SYSTEM%]\xikor.dll
[%SYSTEM%]\xnvaogd.dll
[%SYSTEM%]\xovdzz.dll
[%SYSTEM%]\xtsyynm.dll
[%SYSTEM%]\xyxuic.dll
[%SYSTEM%]\ymmzwd.dll
[%SYSTEM%]\yneid.dll
[%SYSTEM%]\zcwlnic.dll
[%SYSTEM%]\zdwii.dll
[%SYSTEM%]\zkpssqa.dll
[%SYSTEM%]\zpeolvh.dll
[%SYSTEM%]\zpuwriz.dll
[%SYSTEM%]\zqhy.dll
[%SYSTEM%]\AceExt32.dll
[%SYSTEM%]\afzdbl.dll
[%SYSTEM%]\aghmao.dll
[%SYSTEM%]\ayjhc.dll
[%SYSTEM%]\beahahl.dll
[%SYSTEM%]\bgwttyl.dll
[%SYSTEM%]\bqrcr.dll
[%SYSTEM%]\bubbj.dll
[%SYSTEM%]\ccyszwl.dll
[%SYSTEM%]\cfqbw.dll
[%SYSTEM%]\chzbi.dll
[%SYSTEM%]\cjuvwa.dll
[%SYSTEM%]\clbrcek.dll
[%SYSTEM%]\cqsfk.dll
[%SYSTEM%]\cthkpcv.dll
[%SYSTEM%]\cwgppb.dll
[%SYSTEM%]\czxtyx.dll
[%SYSTEM%]\d3acdb.dll
[%SYSTEM%]\dcvwaah.dll
[%SYSTEM%]\ddllup.dll
[%SYSTEM%]\ddomv.dll
[%SYSTEM%]\dfrep.dll
[%SYSTEM%]\dooep.dll
[%SYSTEM%]\dpfwu.dll
[%SYSTEM%]\duznhje.dll
[%SYSTEM%]\dxmpp.dll
[%SYSTEM%]\dyrwls.dll
[%SYSTEM%]\e404d.dll
[%SYSTEM%]\ecxwp.dll
[%SYSTEM%]\eeuydc.dll
[%SYSTEM%]\eigbbb.dll
[%SYSTEM%]\EOZfG8vL.dll
[%SYSTEM%]\eulbn.dll
[%SYSTEM%]\fdpzgi.dll
[%SYSTEM%]\fftktmk.dll
[%SYSTEM%]\fifzqip.dll
[%SYSTEM%]\flirek.dll
[%SYSTEM%]\fnczfh.dll
[%SYSTEM%]\fnexvt.dll
[%SYSTEM%]\fqdqs.dll
[%SYSTEM%]\fqgwiw.dll
[%SYSTEM%]\fshqaln.dll
[%SYSTEM%]\fwjgtk.dll
[%SYSTEM%]\fwrkqfl.dll
[%SYSTEM%]\fwzozx.dll
[%SYSTEM%]\fyhwfc.dll
[%SYSTEM%]\fyxkaah.dll
[%SYSTEM%]\gbjkog.dll
[%SYSTEM%]\gdrtul.dll
[%SYSTEM%]\geplxss.dll
[%SYSTEM%]\gkymhk.dll
[%SYSTEM%]\gnjsjc.dll
[%SYSTEM%]\gtawclv.dll
[%SYSTEM%]\gusur.dll
[%SYSTEM%]\guxmhcd.dll
[%SYSTEM%]\gwquvw.dll
[%SYSTEM%]\higehsg.dll
[%SYSTEM%]\hjpprpu.dll
[%SYSTEM%]\hteogat.dll
[%SYSTEM%]\hu.dll
[%SYSTEM%]\hymww.dll
[%SYSTEM%]\igkvf.dll
[%SYSTEM%]\igpfced.dll
[%SYSTEM%]\igzxwrl.dll
[%SYSTEM%]\iheuv.dll
[%SYSTEM%]\iklqcx.dll
[%SYSTEM%]\ilmpjy.dll
[%SYSTEM%]\indwvm.dll
[%SYSTEM%]\iolchsmxrhfi.dll
[%SYSTEM%]\itdtjjf.dll
[%SYSTEM%]\ivrllc.dll
[%SYSTEM%]\jrpkmgh.dll
[%SYSTEM%]\khtbpdl.dll
[%SYSTEM%]\kvfvw.dll
[%SYSTEM%]\kzpkwj.dll
[%SYSTEM%]\lapmvzf.dll
[%SYSTEM%]\lgaac.dll
[%SYSTEM%]\mivmv.dll
[%SYSTEM%]\monem.dll
[%SYSTEM%]\moywh.dll
[%SYSTEM%]\muvdjo.dll
[%SYSTEM%]\mvwqn.dll
[%SYSTEM%]\mxhfjy.dll
[%SYSTEM%]\myqlejy.dll
[%SYSTEM%]\nbbrhbd.dll
[%SYSTEM%]\ncrjf.dll
[%SYSTEM%]\nczupfw.dll
[%SYSTEM%]\nexpegp.dll
[%SYSTEM%]\onljweo.dll
[%SYSTEM%]\osdjhjc.dll
[%SYSTEM%]\oyopu.dll
[%SYSTEM%]\pfrmj.dll
[%SYSTEM%]\pjgerka.dll
[%SYSTEM%]\pkgvyg.dll
[%SYSTEM%]\pluwue.dll
[%SYSTEM%]\psndz.dll
[%SYSTEM%]\qzviz.dll
[%SYSTEM%]\rldyt.dll
[%SYSTEM%]\rmtdvc.dll
[%SYSTEM%]\rnxwph.dll
[%SYSTEM%]\runsrv32.dll
[%SYSTEM%]\ryxrho.dll
[%SYSTEM%]\sacskza.dll
[%SYSTEM%]\siiyal.dll
[%SYSTEM%]\sttwrd.dll
[%SYSTEM%]\surzzh.dll
[%SYSTEM%]\swqzdtj.dll
[%SYSTEM%]\tczij.dll
[%SYSTEM%]\tiqmcx.dll
[%SYSTEM%]\tkosvv.dll
[%SYSTEM%]\tkrsw.dll
[%SYSTEM%]\tmxxxh.dll
[%SYSTEM%]\tqcwm.dll
[%SYSTEM%]\tvomnc.dll
[%SYSTEM%]\tvtpwp.dll
[%SYSTEM%]\txfdb32.dll
[%SYSTEM%]\txxkb.dll
[%SYSTEM%]\ucmbegr.dll
[%SYSTEM%]\ugbtna.dll
[%SYSTEM%]\uglgs.dll
[%SYSTEM%]\ugofuq.dll
[%SYSTEM%]\uimcu.dll
[%SYSTEM%]\unpfrwb.dll
[%SYSTEM%]\uoricweppdhx.dll
[%SYSTEM%]\vblhanf.dll
[%SYSTEM%]\vcehaeb.dll
[%SYSTEM%]\veptlh.dll
[%SYSTEM%]\vgibz.dll
[%SYSTEM%]\vjxwnn.dll
[%SYSTEM%]\vmlwp.dll
[%SYSTEM%]\vophqmn.dll
[%SYSTEM%]\vpccw.dll
[%SYSTEM%]\vusxqm.dll
[%SYSTEM%]\vwfps.dll
[%SYSTEM%]\vzfhprk.dll
[%SYSTEM%]\winapi32.dll
[%SYSTEM%]\wowlze.dll
[%SYSTEM%]\wqzdtjg.dll
[%SYSTEM%]\wstart.dll
[%SYSTEM%]\wxinptv.dll
[%SYSTEM%]\wygomd.dll
[%SYSTEM%]\wzhtjqo.dll
[%SYSTEM%]\xedasn.dll
[%SYSTEM%]\xikor.dll
[%SYSTEM%]\xnvaogd.dll
[%SYSTEM%]\xovdzz.dll
[%SYSTEM%]\xtsyynm.dll
[%SYSTEM%]\xyxuic.dll
[%SYSTEM%]\ymmzwd.dll
[%SYSTEM%]\yneid.dll
[%SYSTEM%]\zcwlnic.dll
[%SYSTEM%]\zdwii.dll
[%SYSTEM%]\zkpssqa.dll
[%SYSTEM%]\zpeolvh.dll
[%SYSTEM%]\zpuwriz.dll
[%SYSTEM%]\zqhy.dll

How to detect Zlob.Fake Security Alerts:

Files:
[%SYSTEM%]\AceExt32.dll
[%SYSTEM%]\afzdbl.dll
[%SYSTEM%]\aghmao.dll
[%SYSTEM%]\ayjhc.dll
[%SYSTEM%]\beahahl.dll
[%SYSTEM%]\bgwttyl.dll
[%SYSTEM%]\bqrcr.dll
[%SYSTEM%]\bubbj.dll
[%SYSTEM%]\ccyszwl.dll
[%SYSTEM%]\cfqbw.dll
[%SYSTEM%]\chzbi.dll
[%SYSTEM%]\cjuvwa.dll
[%SYSTEM%]\clbrcek.dll
[%SYSTEM%]\cqsfk.dll
[%SYSTEM%]\cthkpcv.dll
[%SYSTEM%]\cwgppb.dll
[%SYSTEM%]\czxtyx.dll
[%SYSTEM%]\d3acdb.dll
[%SYSTEM%]\dcvwaah.dll
[%SYSTEM%]\ddllup.dll
[%SYSTEM%]\ddomv.dll
[%SYSTEM%]\dfrep.dll
[%SYSTEM%]\dooep.dll
[%SYSTEM%]\dpfwu.dll
[%SYSTEM%]\duznhje.dll
[%SYSTEM%]\dxmpp.dll
[%SYSTEM%]\dyrwls.dll
[%SYSTEM%]\e404d.dll
[%SYSTEM%]\ecxwp.dll
[%SYSTEM%]\eeuydc.dll
[%SYSTEM%]\eigbbb.dll
[%SYSTEM%]\EOZfG8vL.dll
[%SYSTEM%]\eulbn.dll
[%SYSTEM%]\fdpzgi.dll
[%SYSTEM%]\fftktmk.dll
[%SYSTEM%]\fifzqip.dll
[%SYSTEM%]\flirek.dll
[%SYSTEM%]\fnczfh.dll
[%SYSTEM%]\fnexvt.dll
[%SYSTEM%]\fqdqs.dll
[%SYSTEM%]\fqgwiw.dll
[%SYSTEM%]\fshqaln.dll
[%SYSTEM%]\fwjgtk.dll
[%SYSTEM%]\fwrkqfl.dll
[%SYSTEM%]\fwzozx.dll
[%SYSTEM%]\fyhwfc.dll
[%SYSTEM%]\fyxkaah.dll
[%SYSTEM%]\gbjkog.dll
[%SYSTEM%]\gdrtul.dll
[%SYSTEM%]\geplxss.dll
[%SYSTEM%]\gkymhk.dll
[%SYSTEM%]\gnjsjc.dll
[%SYSTEM%]\gtawclv.dll
[%SYSTEM%]\gusur.dll
[%SYSTEM%]\guxmhcd.dll
[%SYSTEM%]\gwquvw.dll
[%SYSTEM%]\higehsg.dll
[%SYSTEM%]\hjpprpu.dll
[%SYSTEM%]\hteogat.dll
[%SYSTEM%]\hu.dll
[%SYSTEM%]\hymww.dll
[%SYSTEM%]\igkvf.dll
[%SYSTEM%]\igpfced.dll
[%SYSTEM%]\igzxwrl.dll
[%SYSTEM%]\iheuv.dll
[%SYSTEM%]\iklqcx.dll
[%SYSTEM%]\ilmpjy.dll
[%SYSTEM%]\indwvm.dll
[%SYSTEM%]\iolchsmxrhfi.dll
[%SYSTEM%]\itdtjjf.dll
[%SYSTEM%]\ivrllc.dll
[%SYSTEM%]\jrpkmgh.dll
[%SYSTEM%]\khtbpdl.dll
[%SYSTEM%]\kvfvw.dll
[%SYSTEM%]\kzpkwj.dll
[%SYSTEM%]\lapmvzf.dll
[%SYSTEM%]\lgaac.dll
[%SYSTEM%]\mivmv.dll
[%SYSTEM%]\monem.dll
[%SYSTEM%]\moywh.dll
[%SYSTEM%]\muvdjo.dll
[%SYSTEM%]\mvwqn.dll
[%SYSTEM%]\mxhfjy.dll
[%SYSTEM%]\myqlejy.dll
[%SYSTEM%]\nbbrhbd.dll
[%SYSTEM%]\ncrjf.dll
[%SYSTEM%]\nczupfw.dll
[%SYSTEM%]\nexpegp.dll
[%SYSTEM%]\onljweo.dll
[%SYSTEM%]\osdjhjc.dll
[%SYSTEM%]\oyopu.dll
[%SYSTEM%]\pfrmj.dll
[%SYSTEM%]\pjgerka.dll
[%SYSTEM%]\pkgvyg.dll
[%SYSTEM%]\pluwue.dll
[%SYSTEM%]\psndz.dll
[%SYSTEM%]\qzviz.dll
[%SYSTEM%]\rldyt.dll
[%SYSTEM%]\rmtdvc.dll
[%SYSTEM%]\rnxwph.dll
[%SYSTEM%]\runsrv32.dll
[%SYSTEM%]\ryxrho.dll
[%SYSTEM%]\sacskza.dll
[%SYSTEM%]\siiyal.dll
[%SYSTEM%]\sttwrd.dll
[%SYSTEM%]\surzzh.dll
[%SYSTEM%]\swqzdtj.dll
[%SYSTEM%]\tczij.dll
[%SYSTEM%]\tiqmcx.dll
[%SYSTEM%]\tkosvv.dll
[%SYSTEM%]\tkrsw.dll
[%SYSTEM%]\tmxxxh.dll
[%SYSTEM%]\tqcwm.dll
[%SYSTEM%]\tvomnc.dll
[%SYSTEM%]\tvtpwp.dll
[%SYSTEM%]\txfdb32.dll
[%SYSTEM%]\txxkb.dll
[%SYSTEM%]\ucmbegr.dll
[%SYSTEM%]\ugbtna.dll
[%SYSTEM%]\uglgs.dll
[%SYSTEM%]\ugofuq.dll
[%SYSTEM%]\uimcu.dll
[%SYSTEM%]\unpfrwb.dll
[%SYSTEM%]\uoricweppdhx.dll
[%SYSTEM%]\vblhanf.dll
[%SYSTEM%]\vcehaeb.dll
[%SYSTEM%]\veptlh.dll
[%SYSTEM%]\vgibz.dll
[%SYSTEM%]\vjxwnn.dll
[%SYSTEM%]\vmlwp.dll
[%SYSTEM%]\vophqmn.dll
[%SYSTEM%]\vpccw.dll
[%SYSTEM%]\vusxqm.dll
[%SYSTEM%]\vwfps.dll
[%SYSTEM%]\vzfhprk.dll
[%SYSTEM%]\winapi32.dll
[%SYSTEM%]\wowlze.dll
[%SYSTEM%]\wqzdtjg.dll
[%SYSTEM%]\wstart.dll
[%SYSTEM%]\wxinptv.dll
[%SYSTEM%]\wygomd.dll
[%SYSTEM%]\wzhtjqo.dll
[%SYSTEM%]\xedasn.dll
[%SYSTEM%]\xikor.dll
[%SYSTEM%]\xnvaogd.dll
[%SYSTEM%]\xovdzz.dll
[%SYSTEM%]\xtsyynm.dll
[%SYSTEM%]\xyxuic.dll
[%SYSTEM%]\ymmzwd.dll
[%SYSTEM%]\yneid.dll
[%SYSTEM%]\zcwlnic.dll
[%SYSTEM%]\zdwii.dll
[%SYSTEM%]\zkpssqa.dll
[%SYSTEM%]\zpeolvh.dll
[%SYSTEM%]\zpuwriz.dll
[%SYSTEM%]\zqhy.dll
[%SYSTEM%]\AceExt32.dll
[%SYSTEM%]\afzdbl.dll
[%SYSTEM%]\aghmao.dll
[%SYSTEM%]\ayjhc.dll
[%SYSTEM%]\beahahl.dll
[%SYSTEM%]\bgwttyl.dll
[%SYSTEM%]\bqrcr.dll
[%SYSTEM%]\bubbj.dll
[%SYSTEM%]\ccyszwl.dll
[%SYSTEM%]\cfqbw.dll
[%SYSTEM%]\chzbi.dll
[%SYSTEM%]\cjuvwa.dll
[%SYSTEM%]\clbrcek.dll
[%SYSTEM%]\cqsfk.dll
[%SYSTEM%]\cthkpcv.dll
[%SYSTEM%]\cwgppb.dll
[%SYSTEM%]\czxtyx.dll
[%SYSTEM%]\d3acdb.dll
[%SYSTEM%]\dcvwaah.dll
[%SYSTEM%]\ddllup.dll
[%SYSTEM%]\ddomv.dll
[%SYSTEM%]\dfrep.dll
[%SYSTEM%]\dooep.dll
[%SYSTEM%]\dpfwu.dll
[%SYSTEM%]\duznhje.dll
[%SYSTEM%]\dxmpp.dll
[%SYSTEM%]\dyrwls.dll
[%SYSTEM%]\e404d.dll
[%SYSTEM%]\ecxwp.dll
[%SYSTEM%]\eeuydc.dll
[%SYSTEM%]\eigbbb.dll
[%SYSTEM%]\EOZfG8vL.dll
[%SYSTEM%]\eulbn.dll
[%SYSTEM%]\fdpzgi.dll
[%SYSTEM%]\fftktmk.dll
[%SYSTEM%]\fifzqip.dll
[%SYSTEM%]\flirek.dll
[%SYSTEM%]\fnczfh.dll
[%SYSTEM%]\fnexvt.dll
[%SYSTEM%]\fqdqs.dll
[%SYSTEM%]\fqgwiw.dll
[%SYSTEM%]\fshqaln.dll
[%SYSTEM%]\fwjgtk.dll
[%SYSTEM%]\fwrkqfl.dll
[%SYSTEM%]\fwzozx.dll
[%SYSTEM%]\fyhwfc.dll
[%SYSTEM%]\fyxkaah.dll
[%SYSTEM%]\gbjkog.dll
[%SYSTEM%]\gdrtul.dll
[%SYSTEM%]\geplxss.dll
[%SYSTEM%]\gkymhk.dll
[%SYSTEM%]\gnjsjc.dll
[%SYSTEM%]\gtawclv.dll
[%SYSTEM%]\gusur.dll
[%SYSTEM%]\guxmhcd.dll
[%SYSTEM%]\gwquvw.dll
[%SYSTEM%]\higehsg.dll
[%SYSTEM%]\hjpprpu.dll
[%SYSTEM%]\hteogat.dll
[%SYSTEM%]\hu.dll
[%SYSTEM%]\hymww.dll
[%SYSTEM%]\igkvf.dll
[%SYSTEM%]\igpfced.dll
[%SYSTEM%]\igzxwrl.dll
[%SYSTEM%]\iheuv.dll
[%SYSTEM%]\iklqcx.dll
[%SYSTEM%]\ilmpjy.dll
[%SYSTEM%]\indwvm.dll
[%SYSTEM%]\iolchsmxrhfi.dll
[%SYSTEM%]\itdtjjf.dll
[%SYSTEM%]\ivrllc.dll
[%SYSTEM%]\jrpkmgh.dll
[%SYSTEM%]\khtbpdl.dll
[%SYSTEM%]\kvfvw.dll
[%SYSTEM%]\kzpkwj.dll
[%SYSTEM%]\lapmvzf.dll
[%SYSTEM%]\lgaac.dll
[%SYSTEM%]\mivmv.dll
[%SYSTEM%]\monem.dll
[%SYSTEM%]\moywh.dll
[%SYSTEM%]\muvdjo.dll
[%SYSTEM%]\mvwqn.dll
[%SYSTEM%]\mxhfjy.dll
[%SYSTEM%]\myqlejy.dll
[%SYSTEM%]\nbbrhbd.dll
[%SYSTEM%]\ncrjf.dll
[%SYSTEM%]\nczupfw.dll
[%SYSTEM%]\nexpegp.dll
[%SYSTEM%]\onljweo.dll
[%SYSTEM%]\osdjhjc.dll
[%SYSTEM%]\oyopu.dll
[%SYSTEM%]\pfrmj.dll
[%SYSTEM%]\pjgerka.dll
[%SYSTEM%]\pkgvyg.dll
[%SYSTEM%]\pluwue.dll
[%SYSTEM%]\psndz.dll
[%SYSTEM%]\qzviz.dll
[%SYSTEM%]\rldyt.dll
[%SYSTEM%]\rmtdvc.dll
[%SYSTEM%]\rnxwph.dll
[%SYSTEM%]\runsrv32.dll
[%SYSTEM%]\ryxrho.dll
[%SYSTEM%]\sacskza.dll
[%SYSTEM%]\siiyal.dll
[%SYSTEM%]\sttwrd.dll
[%SYSTEM%]\surzzh.dll
[%SYSTEM%]\swqzdtj.dll
[%SYSTEM%]\tczij.dll
[%SYSTEM%]\tiqmcx.dll
[%SYSTEM%]\tkosvv.dll
[%SYSTEM%]\tkrsw.dll
[%SYSTEM%]\tmxxxh.dll
[%SYSTEM%]\tqcwm.dll
[%SYSTEM%]\tvomnc.dll
[%SYSTEM%]\tvtpwp.dll
[%SYSTEM%]\txfdb32.dll
[%SYSTEM%]\txxkb.dll
[%SYSTEM%]\ucmbegr.dll
[%SYSTEM%]\ugbtna.dll
[%SYSTEM%]\uglgs.dll
[%SYSTEM%]\ugofuq.dll
[%SYSTEM%]\uimcu.dll
[%SYSTEM%]\unpfrwb.dll
[%SYSTEM%]\uoricweppdhx.dll
[%SYSTEM%]\vblhanf.dll
[%SYSTEM%]\vcehaeb.dll
[%SYSTEM%]\veptlh.dll
[%SYSTEM%]\vgibz.dll
[%SYSTEM%]\vjxwnn.dll
[%SYSTEM%]\vmlwp.dll
[%SYSTEM%]\vophqmn.dll
[%SYSTEM%]\vpccw.dll
[%SYSTEM%]\vusxqm.dll
[%SYSTEM%]\vwfps.dll
[%SYSTEM%]\vzfhprk.dll
[%SYSTEM%]\winapi32.dll
[%SYSTEM%]\wowlze.dll
[%SYSTEM%]\wqzdtjg.dll
[%SYSTEM%]\wstart.dll
[%SYSTEM%]\wxinptv.dll
[%SYSTEM%]\wygomd.dll
[%SYSTEM%]\wzhtjqo.dll
[%SYSTEM%]\xedasn.dll
[%SYSTEM%]\xikor.dll
[%SYSTEM%]\xnvaogd.dll
[%SYSTEM%]\xovdzz.dll
[%SYSTEM%]\xtsyynm.dll
[%SYSTEM%]\xyxuic.dll
[%SYSTEM%]\ymmzwd.dll
[%SYSTEM%]\yneid.dll
[%SYSTEM%]\zcwlnic.dll
[%SYSTEM%]\zdwii.dll
[%SYSTEM%]\zkpssqa.dll
[%SYSTEM%]\zpeolvh.dll
[%SYSTEM%]\zpuwriz.dll
[%SYSTEM%]\zqhy.dll

Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{0123eb75-964c-4cb3-b796-431cc9099570}
HKEY_CLASSES_ROOT\CLSID\{01b55afa-f451-474b-9e91-c35b24d02641}
HKEY_CLASSES_ROOT\CLSID\{02e155c1-202c-43a5-a212-58bb67d4341c}
HKEY_CLASSES_ROOT\CLSID\{05a91164-3c96-47d6-aa74-2c855791b2d0}
HKEY_CLASSES_ROOT\CLSID\{075a465d-0af2-4b79-8db3-2fda0fd8d74c}
HKEY_CLASSES_ROOT\CLSID\{0e4e5110-a772-4c4a-a7dc-137fe10abd6e}
HKEY_CLASSES_ROOT\CLSID\{0ee82408-3eef-49e3-9370-f94cf2e4034a}
HKEY_CLASSES_ROOT\CLSID\{1152a0e8-5be5-41cc-8312-556581690a61}
HKEY_CLASSES_ROOT\CLSID\{11853d5f-f894-4cc7-bbc3-fc7a9dcfd896}
HKEY_CLASSES_ROOT\CLSID\{12a8c4e6-06c8-4ab3-9274-a0cde148e3da}
HKEY_CLASSES_ROOT\CLSID\{1428963F-BE82-3C95-DA61-BDAE53AA4DF1}
HKEY_CLASSES_ROOT\CLSID\{143404b0-ee92-40a7-8705-06fba9a7abf4}
HKEY_CLASSES_ROOT\CLSID\{16be3225-e902-4d2a-ac98-aab162796927}
HKEY_CLASSES_ROOT\CLSID\{1817ab5d-25bf-4d5e-ba90-6e5fe658fc5f}
HKEY_CLASSES_ROOT\CLSID\{18a8f76b-804b-4981-b87c-460699971a4b}
HKEY_CLASSES_ROOT\CLSID\{1977ce08-a38f-43db-a856-f4aa6122131b}
HKEY_CLASSES_ROOT\CLSID\{1b17f1db-790e-4d42-8e0c-d4d19123ee5b}
HKEY_CLASSES_ROOT\CLSID\{1c6fd4e6-49ce-4178-875b-df70eac260c5}
HKEY_CLASSES_ROOT\CLSID\{2016a466-91a2-43c6-97d8-2fd380f065ef}
HKEY_CLASSES_ROOT\CLSID\{24E27EA9-FCF3-444F-BD80-20543BA5D946}
HKEY_CLASSES_ROOT\CLSID\{25b7d2fd-4f71-46d1-801a-7de323e4ec82}
HKEY_CLASSES_ROOT\CLSID\{27321538-5739-4aa1-b84c-7d18e4383f1f}
HKEY_CLASSES_ROOT\CLSID\{27882a9f-8937-4ae4-87ab-ed669c8b6d7a}
HKEY_CLASSES_ROOT\CLSID\{2acf3add-34a1-4f2f-99cf-cc69785d1e90}
HKEY_CLASSES_ROOT\CLSID\{2bb2b2d6-8b86-412e-acca-d656a8979b3e}
HKEY_CLASSES_ROOT\CLSID\{2dcea392-ea10-4e6d-aba4-329ac377119c}
HKEY_CLASSES_ROOT\CLSID\{2fdde73c-273e-4e55-84dc-455de06e4866}
HKEY_CLASSES_ROOT\CLSID\{3162ba5b-4f2d-40c5-8fb6-36c6a0d639e6}
HKEY_CLASSES_ROOT\CLSID\{33b8d257-07f6-4c06-8605-94bc21728635}
HKEY_CLASSES_ROOT\CLSID\{34ec76b6-53c4-4686-822f-910c790683fb}
HKEY_CLASSES_ROOT\CLSID\{3578CC4F-0E1F-445E-8072-E78435C71001}
HKEY_CLASSES_ROOT\clsid\{35cec8a3-2be6-11d2-8773-92e220524150}
HKEY_CLASSES_ROOT\CLSID\{3750da11-9b0c-4a75-9c8a-bbcbfcd1ccea}
HKEY_CLASSES_ROOT\CLSID\{37ba7add-75f6-498f-a07a-2b0403e34401}
HKEY_CLASSES_ROOT\CLSID\{3ae12a89-2063-409b-87f2-f809a6e76862}
HKEY_CLASSES_ROOT\CLSID\{3aea41ad-3ce4-48d9-acab-be40ad329e40}
HKEY_CLASSES_ROOT\CLSID\{3baa1ad8-ee49-4772-bf0b-f55083e0f7aa}
HKEY_CLASSES_ROOT\CLSID\{3c767c6b-602d-4b9b-829d-a3dc5b2d89dd}
HKEY_CLASSES_ROOT\CLSID\{3da6d3a3-a220-491e-be22-39c03e04a85b}
HKEY_CLASSES_ROOT\CLSID\{41591d7f-9e25-4bd0-af53-9908fcf3a738}
HKEY_CLASSES_ROOT\CLSID\{41eaa909-24be-4d24-877f-076a0576a6fd}
HKEY_CLASSES_ROOT\CLSID\{42248C91-2117-477B-AC0E-C280556B1001}
HKEY_CLASSES_ROOT\CLSID\{4233ac08-a2c4-4742-a0b4-83719613d62c}
HKEY_CLASSES_ROOT\CLSID\{44e670f2-d57b-4815-a576-955d17dbbf2d}
HKEY_CLASSES_ROOT\CLSID\{4688f900-0d0c-4788-b297-59cc10e70ccc}
HKEY_CLASSES_ROOT\CLSID\{46f5a8b0-0b73-48c5-9e40-3c443a43c161}
HKEY_CLASSES_ROOT\CLSID\{48a7a70a-e118-4506-a373-c9d4e8a212a1}
HKEY_CLASSES_ROOT\CLSID\{4a9e875b-d032-45e4-8294-789fe3be5b19}
HKEY_CLASSES_ROOT\CLSID\{4d993022-0899-4599-b4b6-0f887d0802e6}
HKEY_CLASSES_ROOT\CLSID\{4f5f16ef-af9d-4fe6-8410-f0670b58979d}
HKEY_CLASSES_ROOT\CLSID\{4fc003c3-87a0-489c-85cd-878246eb2d18}
HKEY_CLASSES_ROOT\CLSID\{53B5F2B1-94DD-43E5-8187-EB4E31F00701}
HKEY_CLASSES_ROOT\CLSID\{547aaa89-7e6b-42b4-b112-a64955f86a2a}
HKEY_CLASSES_ROOT\CLSID\{596e4935-4d3b-4a3c-842d-2efd1b3de598}
HKEY_CLASSES_ROOT\CLSID\{5aaf6542-f4ba-4df4-873d-4902ecbe794c}
HKEY_CLASSES_ROOT\CLSID\{5c770fbc-cc2f-4acd-93e8-e6f0594307fd}
HKEY_CLASSES_ROOT\CLSID\{5feba593-3e6d-4606-ae6e-0680501cd29e}
HKEY_CLASSES_ROOT\CLSID\{60dea04c-9817-4309-bfa2-f8a1766c3cd1}
HKEY_CLASSES_ROOT\CLSID\{634be415-da12-496b-b89e-329b73c4807f}
HKEY_CLASSES_ROOT\CLSID\{64ba30a2-811a-4597-b0af-d551128be340}
HKEY_CLASSES_ROOT\CLSID\{655560a9-3ca8-4509-9632-6abbef21426b}
HKEY_CLASSES_ROOT\CLSID\{6625fc6c-731c-443a-b3f0-2c8c520a1766}
HKEY_CLASSES_ROOT\CLSID\{6747456b-cea8-463d-ad2a-50d67ae73d30}
HKEY_CLASSES_ROOT\CLSID\{6ad686b9-ab56-4ebc-a804-9f70b55b4577}
HKEY_CLASSES_ROOT\CLSID\{6af69c4d-420a-4c95-b34f-e4635f84f53b}
HKEY_CLASSES_ROOT\CLSID\{6e886df7-914d-48f0-86b3-a5cf24385361}
HKEY_CLASSES_ROOT\CLSID\{6f396a67-f473-48c9-9950-636ce17e584e}
HKEY_CLASSES_ROOT\CLSID\{70d17a5f-ef27-4295-90f5-20ad6f24834f}
HKEY_CLASSES_ROOT\CLSID\{735e980d-45d2-4777-af82-9923d3c8d3ae}
HKEY_CLASSES_ROOT\CLSID\{75a65a53-15c9-4a0c-bb40-a7ca8b24f544}
HKEY_CLASSES_ROOT\CLSID\{76fbb79c-2ec6-4962-a324-fd4362588e1c}
HKEY_CLASSES_ROOT\CLSID\{7999c5e2-b500-4ba5-8e9a-99639eca65fc}
HKEY_CLASSES_ROOT\CLSID\{79cdca21-5055-4cae-b609-e1685ef55cf7}
HKEY_CLASSES_ROOT\CLSID\{7b1eeccd-0a6d-4ad5-8ac1-4af5722b3885}
HKEY_CLASSES_ROOT\CLSID\{7dfa04a9-5e60-458b-ace4-4a7613504e8d}
HKEY_CLASSES_ROOT\CLSID\{8068bf35-3711-4dce-a2f3-f008cecfe894}
HKEY_CLASSES_ROOT\CLSID\{80ced3d6-ece9-48ba-8df8-2503d8d87c2b}
HKEY_CLASSES_ROOT\CLSID\{8329660f-e248-4872-98cc-fb9c4fec7ba8}
HKEY_CLASSES_ROOT\CLSID\{8373a2e0-bdd0-42bd-b4ec-ba5451eb6607}
HKEY_CLASSES_ROOT\CLSID\{837d024d-e0fb-44e8-acb1-24ec2309c487}
HKEY_CLASSES_ROOT\CLSID\{874443fe-aa33-4ebf-a6ac-73208787e62d}
HKEY_CLASSES_ROOT\CLSID\{8a96d76c-97fc-42c8-8e68-5613bacef854}
HKEY_CLASSES_ROOT\CLSID\{8aa7a4d2-73c7-4fca-bef7-7923e38a3b1c}
HKEY_CLASSES_ROOT\CLSID\{8b87dcc7-9b89-4205-aa82-076b2a1edfe0}
HKEY_CLASSES_ROOT\CLSID\{8bbe40fd-0416-4c3f-80ea-0c7ad5fb1aab}
HKEY_CLASSES_ROOT\CLSID\{8d8c2387-7f80-4022-9be6-43630a969558}
HKEY_CLASSES_ROOT\CLSID\{8dc1f789-e073-4363-b40d-07376bc5ecc5}
HKEY_CLASSES_ROOT\CLSID\{903902a8-0691-460e-8351-24df3d425e9c}
HKEY_CLASSES_ROOT\CLSID\{92050ffb-b796-4146-ae27-7e5e1d93b8a8}
HKEY_CLASSES_ROOT\CLSID\{94524218-9af3-4643-9687-cbc2880e54da}
HKEY_CLASSES_ROOT\CLSID\{951a98d0-dad6-4a77-8280-a494279a884b}
HKEY_CLASSES_ROOT\CLSID\{95a4b6d8-dcd9-453a-aedf-f5d10af2519a}
HKEY_CLASSES_ROOT\CLSID\{95dde900-8bf3-428c-b9be-8345c9d194f7}
HKEY_CLASSES_ROOT\CLSID\{95ed0779-42e8-41d3-a2e3-01691fb2fd5d}
HKEY_CLASSES_ROOT\CLSID\{98013eb8-258b-4979-bfd5-04ecd93f765c}
HKEY_CLASSES_ROOT\CLSID\{98ca7898-6029-41ab-8f67-ea4f5e1afc22}
HKEY_CLASSES_ROOT\CLSID\{9af8f31b-b778-4413-b8ed-ae63a62e1f7d}
HKEY_CLASSES_ROOT\CLSID\{9b7958db-d4ef-4879-8044-e156a58c1a61}
HKEY_CLASSES_ROOT\CLSID\{9d635a36-6b3c-4146-8625-f3aaf507bbf8}
HKEY_CLASSES_ROOT\CLSID\{9d6fac42-a7be-4702-87ef-75d8dc14249e}
HKEY_CLASSES_ROOT\CLSID\{9f5cb985-d4a4-49af-9185-133f956b5756}
HKEY_CLASSES_ROOT\CLSID\{a1c16871-b797-4ec7-bbee-83852379c390}
HKEY_CLASSES_ROOT\CLSID\{A1D9D3F0-8C2A-9A1D-A376-2CACFB10AB72}
HKEY_CLASSES_ROOT\CLSID\{A2C8F6B1-7C2A-3D1C-A3C6-A1FDA113B43F}
HKEY_CLASSES_ROOT\CLSID\{a4029063-4fe3-422c-ac72-12905c09642a}
HKEY_CLASSES_ROOT\CLSID\{a47e7ce0-263d-40aa-86bc-27c1f6433143}
HKEY_CLASSES_ROOT\CLSID\{a6d478c6-7961-4fe9-be4b-e621dd640112}
HKEY_CLASSES_ROOT\CLSID\{a6fddce1-36ae-41c1-87d3-f49e514273d4}
HKEY_CLASSES_ROOT\CLSID\{aa6d4f53-4c8d-4549-84d2-02d584acc4e9}
HKEY_CLASSES_ROOT\CLSID\{ab340860-fd81-4a65-b345-82eb77a66b5e}
HKEY_CLASSES_ROOT\CLSID\{ab75cc7d-2751-4144-a278-5462d5a5884c}
HKEY_CLASSES_ROOT\CLSID\{abef791f-947e-4cdf-83c3-e72a240afb67}
HKEY_CLASSES_ROOT\CLSID\{adf64b1b-c68c-4ce8-bb55-258b7b8b0f81}
HKEY_CLASSES_ROOT\CLSID\{aed6f6a3-183c-488d-9f90-23db99f56e7f}
HKEY_CLASSES_ROOT\CLSID\{af3fd9a8-1287-4159-9212-9a5b4494af70}
HKEY_CLASSES_ROOT\CLSID\{af4fd984-a939-4c32-82b2-8bae7abe9aec}
HKEY_CLASSES_ROOT\CLSID\{b02c6db1-a1ea-470f-8100-b1391463ba92}
HKEY_CLASSES_ROOT\CLSID\{b0883848-1466-4470-a418-3fe7d36694b9}
HKEY_CLASSES_ROOT\CLSID\{b0ded443-5e68-4001-a81b-0a0001621ab8}
HKEY_CLASSES_ROOT\CLSID\{b292ec9f-a074-4115-8342-1f459702d8d2}
HKEY_CLASSES_ROOT\CLSID\{b585105c-0e84-4ef0-9c6a-fbe134a72945}
HKEY_CLASSES_ROOT\CLSID\{b8b3850e-a22e-43ab-a15e-63f6e47db7e6}
HKEY_CLASSES_ROOT\CLSID\{b8ea5f37-7327-4923-9808-8fd3b6f0d529}
HKEY_CLASSES_ROOT\CLSID\{bd0fc212-0a36-4232-83cc-2063fb9282e0}
HKEY_CLASSES_ROOT\CLSID\{bd1299cd-b98a-4ee1-9ae3-d3cb3da41d0d}
HKEY_CLASSES_ROOT\CLSID\{bd2948f8-c949-464f-824a-6272608c739e}
HKEY_CLASSES_ROOT\CLSID\{c0ca766d-060c-48e1-b536-205e321bd174}
HKEY_CLASSES_ROOT\CLSID\{C1A2FDA2-1A5B-2A8F-F3A2-B22DA1A3C41D}
HKEY_CLASSES_ROOT\CLSID\{C1A8B6A1-2C81-1C3D-A3C6-A1CCDB10B47F}
HKEY_CLASSES_ROOT\CLSID\{c4da240e-7525-404a-b366-f50a422376d8}
HKEY_CLASSES_ROOT\CLSID\{c704547b-26c0-4222-a034-81653c07b494}
HKEY_CLASSES_ROOT\CLSID\{c74f7434-a6e7-46c3-bf60-62a005074fe5}
HKEY_CLASSES_ROOT\CLSID\{c82e1789-207a-4b8a-806f-76b62dfac2a2}
HKEY_CLASSES_ROOT\CLSID\{cc824bb2-d4b3-41f1-bba0-f8240e4cc495}
HKEY_CLASSES_ROOT\CLSID\{cd0e4a1a-dbc2-48f7-9a6a-a41cac20bddc}
HKEY_CLASSES_ROOT\CLSID\{CD5E2AC9-25CE-A1C5-D1E2-DC6B28A6ED5A}
HKEY_CLASSES_ROOT\CLSID\{cea2e5cd-e849-427b-80f0-59298caef1c4}
HKEY_CLASSES_ROOT\CLSID\{ceca6f2b-247b-4ece-9b7a-d0135c8036fc}
HKEY_CLASSES_ROOT\CLSID\{ced7d5f3-74cc-4c2f-8d60-62ebcdda0a22}
HKEY_CLASSES_ROOT\CLSID\{cfda6372-043c-48d2-ba3c-7bfe1cf71854}
HKEY_CLASSES_ROOT\CLSID\{d1e5ca97-235e-4ff0-9b92-7543c9d61ff4}
HKEY_CLASSES_ROOT\CLSID\{d4c4bc43-0974-4dec-a669-9f7bfcb3503d}
HKEY_CLASSES_ROOT\CLSID\{d653e105-3e53-480a-b129-54d957d174bb}
HKEY_CLASSES_ROOT\CLSID\{d66c22b6-2217-4d1a-9a90-1a54de1fc706}
HKEY_CLASSES_ROOT\CLSID\{d6ef030a-a235-41ba-9ead-89b6ff542f00}
HKEY_CLASSES_ROOT\CLSID\{d7058baa-49a4-40b7-95c2-eec95cdf51f3}
HKEY_CLASSES_ROOT\CLSID\{d8b937a4-cdad-497b-a872-8da7c4c3ef6f}
HKEY_CLASSES_ROOT\CLSID\{da3b49f6-8c54-4429-a275-21a86dcca413}
HKEY_CLASSES_ROOT\CLSID\{daecb1b9-9f49-40f3-873d-5db0fdb14d7d}
HKEY_CLASSES_ROOT\CLSID\{de313bc7-422a-4344-a9aa-3e703922345c}
HKEY_CLASSES_ROOT\CLSID\{de5ede53-9db0-422d-b32d-5c41c96d6f52}
HKEY_CLASSES_ROOT\CLSID\{dec5caa7-8045-495c-8034-35aff489fedf}
HKEY_CLASSES_ROOT\CLSID\{df8c3aed-b58e-4bcb-96b3-aa1b7bbdbbd4}
HKEY_CLASSES_ROOT\CLSID\{dfa61db1-388e-4c87-8d56-540fa229bcb4}
HKEY_CLASSES_ROOT\CLSID\{e0f691d7-01bf-4fed-926c-7368034a45e3}
HKEY_CLASSES_ROOT\CLSID\{e1adb94e-0dc6-487c-b274-981bee6301a1}
HKEY_CLASSES_ROOT\CLSID\{e221f0dc-2696-4b2e-bd63-25b33dc19b6e}
HKEY_CLASSES_ROOT\CLSID\{e2b8cea1-c8a7-48e2-b2fd-89ae5c608fb8}
HKEY_CLASSES_ROOT\CLSID\{e5b1e382-817e-4b74-8a96-ec78751e6acf}
HKEY_CLASSES_ROOT\CLSID\{e6adaaf0-79b2-4cf1-a660-50a0b33991a1}
HKEY_CLASSES_ROOT\CLSID\{e71aba09-d81a-4876-baa3-df133c1dfc48}
HKEY_CLASSES_ROOT\CLSID\{e758745e-b8aa-47ac-a652-6307ff5f3ebf}
HKEY_CLASSES_ROOT\CLSID\{e7aff349-39e1-4a96-a13d-24983440b44a}
HKEY_CLASSES_ROOT\CLSID\{EA26CE12-DE64-A1C5-9A4F-FC1A64E6AC2E}
HKEY_CLASSES_ROOT\CLSID\{eb4c6870-721f-4989-9c90-8cbfa46d0298}
HKEY_CLASSES_ROOT\CLSID\{eb86b46a-d6db-4478-8f5f-06cb2ebc1b35}
HKEY_CLASSES_ROOT\CLSID\{ECC52856-466F-82FC-EC6F-C28CBFF896FD}
HKEY_CLASSES_ROOT\CLSID\{ede8bed5-92cf-4482-8f51-a01cd9b3ea37}
HKEY_CLASSES_ROOT\CLSID\{ee6bd1ad-1992-4f2c-8ea2-edc6eee4548b}
HKEY_CLASSES_ROOT\CLSID\{f0c5ef8b-f4bb-4612-9ea8-361fff3da3d5}
HKEY_CLASSES_ROOT\CLSID\{f31aee4a-1530-4fef-8537-79c6973bff9a}
HKEY_CLASSES_ROOT\CLSID\{f39d0dee-b2f0-4591-9187-1cc39c1df98a}
HKEY_CLASSES_ROOT\CLSID\{f8d02387-789a-4c0f-a1d8-8a93f33ee4df}
HKEY_CLASSES_ROOT\CLSID\{fa19bd7e-50bc-4203-80ac-c4edc81ca9a3}
HKEY_CLASSES_ROOT\CLSID\{fa55d551-9698-48ac-b639-9b00cf1a6ea0}
HKEY_CLASSES_ROOT\CLSID\{fc7cbb1b-2da6-4e7d-a1ea-bf6705dd0f8c}
HKEY_CLASSES_ROOT\CLSID\{FCADDC14-BD46-408A-9842-CDBE1C6D37EB}
HKEY_CLASSES_ROOT\CLSID\{fde1bd72-ca80-443f-9526-595337b73878}
HKEY_CLASSES_ROOT\CLSID\{fedff4ae-1302-4b8a-bda9-43b9f67b9749}
HKEY_CLASSES_ROOT\CLSID\{}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{d66c22b6-2217-4d1a-9a90-1a54de1fc706}

Registry Values:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad

Removing Zlob.Fake Security Alerts:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats: