Saturday, November 15, 2008

Loki Trojan

Removing Loki
Categories: Trojan,Backdoor,Downloader,DoS
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
They function in the same way as legal remote administration programs used by system administrators.
This makes them difficult to detect.

Backdoors are installed and launched without the consent of the user of computer.
Often the backdoor will not be visible in the log of active programs.

Once a backdoor has been successfully launched, the computer is wide open.
Backdoor functions can include:


  • Launching/ deleting files

  • Sending/ receiving files

  • Deleting data

  • Displaying notification

  • Rebooting the machine

  • Executing files




Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.
Backdoors combine the functionality of most other types of in one package.

Backdoors have one especially dangerous sub-class: variants that can propagate like worms.
The downloader either launches the new malware or registers it to enable autorun
according to the local operating system requirements.
DoS programs attack web servers by sending numerous requests to the specified server,
often causing it to crash under an excessive volume of requests.



Loki Also known as:

[Panda]Loki.1234.1st;
[Computer Associates]Loki

Visible Symptoms:
Files in system folders:
[%PROFILE_TEMP%]\EaslME.exe
[%PROFILE_TEMP%]\EFJa7E.exe
[%PROFILE_TEMP%]\OaKDu7.exe
[%PROGRAM_FILES%]\default.skn
[%PROGRAM_FILES%]\skins\default.skn
[%SYSTEM%]\acsproxy.lib
[%SYSTEM%]\bw6mds51.ocx
[%SYSTEM%]\chat.dat
[%SYSTEM%]\ezines.dat
[%SYSTEM%]\home.dat
[%SYSTEM%]\imgconv.dll
[%SYSTEM%]\longtimer.ocx
[%SYSTEM%]\mciwndx.ocx
[%SYSTEM%]\olelib.tlb
[%SYSTEM%]\paysites.dat
[%SYSTEM%]\pics.dat
[%SYSTEM%]\unregister.exe
[%SYSTEM%]\VIC32.DLL
[%SYSTEM%]\videos.dat
[%WINDOWS%]\alchem.ini
[%WINDOWS%]\msbb.exe
[%PROFILE_TEMP%]\EaslME.exe
[%PROFILE_TEMP%]\EFJa7E.exe
[%PROFILE_TEMP%]\OaKDu7.exe
[%PROGRAM_FILES%]\default.skn
[%PROGRAM_FILES%]\skins\default.skn
[%SYSTEM%]\acsproxy.lib
[%SYSTEM%]\bw6mds51.ocx
[%SYSTEM%]\chat.dat
[%SYSTEM%]\ezines.dat
[%SYSTEM%]\home.dat
[%SYSTEM%]\imgconv.dll
[%SYSTEM%]\longtimer.ocx
[%SYSTEM%]\mciwndx.ocx
[%SYSTEM%]\olelib.tlb
[%SYSTEM%]\paysites.dat
[%SYSTEM%]\pics.dat
[%SYSTEM%]\unregister.exe
[%SYSTEM%]\VIC32.DLL
[%SYSTEM%]\videos.dat
[%WINDOWS%]\alchem.ini
[%WINDOWS%]\msbb.exe

How to detect Loki:

Files:
[%PROFILE_TEMP%]\EaslME.exe
[%PROFILE_TEMP%]\EFJa7E.exe
[%PROFILE_TEMP%]\OaKDu7.exe
[%PROGRAM_FILES%]\default.skn
[%PROGRAM_FILES%]\skins\default.skn
[%SYSTEM%]\acsproxy.lib
[%SYSTEM%]\bw6mds51.ocx
[%SYSTEM%]\chat.dat
[%SYSTEM%]\ezines.dat
[%SYSTEM%]\home.dat
[%SYSTEM%]\imgconv.dll
[%SYSTEM%]\longtimer.ocx
[%SYSTEM%]\mciwndx.ocx
[%SYSTEM%]\olelib.tlb
[%SYSTEM%]\paysites.dat
[%SYSTEM%]\pics.dat
[%SYSTEM%]\unregister.exe
[%SYSTEM%]\VIC32.DLL
[%SYSTEM%]\videos.dat
[%WINDOWS%]\alchem.ini
[%WINDOWS%]\msbb.exe
[%PROFILE_TEMP%]\EaslME.exe
[%PROFILE_TEMP%]\EFJa7E.exe
[%PROFILE_TEMP%]\OaKDu7.exe
[%PROGRAM_FILES%]\default.skn
[%PROGRAM_FILES%]\skins\default.skn
[%SYSTEM%]\acsproxy.lib
[%SYSTEM%]\bw6mds51.ocx
[%SYSTEM%]\chat.dat
[%SYSTEM%]\ezines.dat
[%SYSTEM%]\home.dat
[%SYSTEM%]\imgconv.dll
[%SYSTEM%]\longtimer.ocx
[%SYSTEM%]\mciwndx.ocx
[%SYSTEM%]\olelib.tlb
[%SYSTEM%]\paysites.dat
[%SYSTEM%]\pics.dat
[%SYSTEM%]\unregister.exe
[%SYSTEM%]\VIC32.DLL
[%SYSTEM%]\videos.dat
[%WINDOWS%]\alchem.ini
[%WINDOWS%]\msbb.exe

Folders:
[%PROGRAM_FILES_COMMON%]\totem shared
[%PROGRAM_FILES%]\search bar

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{771a1334-6b08-4a6b-aedc-cf994ba2cebe}
HKEY_CLASSES_ROOT\clsid\{dc341f1b-ec77-47be-8f58-96e83861cc5a}
HKEY_CLASSES_ROOT\interface\{90ce74cc-788a-4a00-b38d-cbca08cc9e8f}
HKEY_CLASSES_ROOT\interface\{bf06da8e-2beb-4816-9bbd-f7625246e245}
HKEY_CLASSES_ROOT\istx.installer.2
HKEY_CLASSES_ROOT\typelib\{cc257918-f435-4a33-8231-2b8195990cca}
HKEY_CLASSES_ROOT\typelib\{db447818-96b4-40df-8a55-720da496f514}
HKEY_CURRENT_USER\software\ist
HKEY_LOCAL_MACHINE\software\classes\appid\{11baf79b-530c-4200-a33d-48be83fc75be}
HKEY_LOCAL_MACHINE\software\classes\appid\{5fb747f9-320c-47b4-9ce8-545fb4f3ba81}
HKEY_LOCAL_MACHINE\software\classes\atltoolbar.tbar
HKEY_LOCAL_MACHINE\software\classes\atltoolbar.tbar.1
HKEY_LOCAL_MACHINE\software\classes\bho.bhoobject
HKEY_LOCAL_MACHINE\software\classes\bho.bhoobject.1
HKEY_LOCAL_MACHINE\software\classes\clsid\{68706808-7097-4818-9aec-cb1a0e7aca51}
HKEY_LOCAL_MACHINE\software\classes\clsid\{98a8315e-667a-11d5-87a3-bb213c32b44b}
HKEY_LOCAL_MACHINE\software\classes\clsid\{aa8c93e1-7e5f-497e-b67c-cc8fe2a40d3b}
HKEY_LOCAL_MACHINE\software\classes\clsid\{f3e7ff6d-dca1-11d4-95df-00c0dfe9982c}
HKEY_LOCAL_MACHINE\software\classes\imgconv.clsimgconv
HKEY_LOCAL_MACHINE\software\classes\interface\{2ddd90d6-f153-4ea7-a324-4b2d83d1027e}
HKEY_LOCAL_MACHINE\software\classes\interface\{788bd7b7-fa4f-4fd3-b63e-e3fbc0aa7d0a}
HKEY_LOCAL_MACHINE\software\classes\interface\{79bf9dcd-c52d-4da8-b15e-ac2a88e96b0a}
HKEY_LOCAL_MACHINE\software\classes\interface\{7ed9e9b8-e1d4-4576-aec2-2a70bb3caa1c}
HKEY_LOCAL_MACHINE\software\classes\interface\{98a8315d-667a-11d5-87a3-bb213c32b44b}
HKEY_LOCAL_MACHINE\software\classes\interface\{98a8315f-667a-11d5-87a3-bb213c32b44b}
HKEY_LOCAL_MACHINE\software\classes\interface\{996b33c1-8e19-4f4f-ab6c-52a2c523b7d3}
HKEY_LOCAL_MACHINE\software\classes\interface\{9ce15eb5-6b39-4656-9e1f-2d219ee42e0e}
HKEY_LOCAL_MACHINE\software\classes\typelib\{17ed04b9-6c71-11d4-87a3-daa6b6b40e8f}
HKEY_LOCAL_MACHINE\software\classes\typelib\{7c9e9a74-1922-409e-ab46-e48784336c3a}
HKEY_LOCAL_MACHINE\software\classes\typelib\{b1c5c992-23df-4704-9f7a-155b575ed19a}
HKEY_LOCAL_MACHINE\software\classes\typelib\{d956a47d-73cd-4ee9-bbf7-b06c14100c41}
HKEY_LOCAL_MACHINE\software\classes\typelib\{f3e7ff6b-dca1-11d4-95df-00c0dfe9982c}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{7C559105-9ECF-42B8-B3F7-832E75EDD959}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\internet settings\zonemap\domains\contentmatch.net
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\c:\windows\downloaded program files\istactivex.dll

Registry Values:
HKEY_LOCAL_MACHINE\software\classes\appid\atltoolbar.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer

Removing Loki:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Findit.Quick.BrowserAid Adware Symptoms
Musdie Trojan Information

Digital.Upload Backdoor

Removing Digital.Upload
Categories: Backdoor,RAT,Downloader
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
They function in the same way as legal remote administration programs used by system administrators.
This makes them difficult to detect.

Backdoors are installed and launched without the consent of the user of computer.
Often the backdoor will not be visible in the log of active programs.

Once a backdoor has been successfully launched, the computer is wide open.
Backdoor functions can include:


  • Launching/ deleting files

  • Sending/ receiving files

  • Deleting data

  • Displaying notification

  • Rebooting the machine

  • Executing files




Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.
Backdoors combine the functionality of most other types of in one package.

Backdoors have one especially dangerous sub-class: variants that can propagate like worms.
Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.
The downloader either launches the new malware or registers it to enable autorun
according to the local operating system requirements.

Digital.Upload Also known as:

[Kaspersky]Backdoor.Digitul;
[McAfee]Generic BackDoor.b,SennaSpy2001;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program,Bck/Digitul;
[Computer Associates]Backdoor/Digitul.10!Client,Backdoor/Digitul.10!Server

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\system\kernelxp.exe
[%WINDOWS%]\system\kernelxp.exe

How to detect Digital.Upload:

Files:
[%WINDOWS%]\system\kernelxp.exe
[%WINDOWS%]\system\kernelxp.exe

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\12112-121312-12342-13432

Removing Digital.Upload:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Win32.bh Adware Information
LolaWeb.Winhost Trojan Cleaner
KD Adware Removal
Remove Rebrand.ComputerMonitorKeylogger Spyware
XtrmOffer Adware Symptoms

DameWare.Mini.Remote.Control RAT

Removing DameWare.Mini.Remote.Control
Categories: RAT
Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.

Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on
April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack.
They usually do whimsical things like flip the screen upside-down, open the CD-ROM tray,
and swap mouse buttons. However, they can be quite hard to remove.

Visible Symptoms:
Files in system folders:
[%DESKTOP%]\dwmrcw.exe
[%PROGRAMS%]\dameware mini remote control\dameware mini remote control help.lnk
[%PROGRAMS%]\dameware mini remote control\dameware mini remote control.lnk
[%PROGRAMS%]\dameware mini remote control\install dmrc service.lnk
[%PROGRAMS%]\dameware mini remote control\remove dmrc service.lnk
[%PROGRAMS%]\dameware mini remote control\service install & remove wizard.lnk
[%DESKTOP%]\dwmrcw.exe
[%PROGRAMS%]\dameware mini remote control\dameware mini remote control help.lnk
[%PROGRAMS%]\dameware mini remote control\dameware mini remote control.lnk
[%PROGRAMS%]\dameware mini remote control\install dmrc service.lnk
[%PROGRAMS%]\dameware mini remote control\remove dmrc service.lnk
[%PROGRAMS%]\dameware mini remote control\service install & remove wizard.lnk

How to detect DameWare.Mini.Remote.Control:

Files:
[%DESKTOP%]\dwmrcw.exe
[%PROGRAMS%]\dameware mini remote control\dameware mini remote control help.lnk
[%PROGRAMS%]\dameware mini remote control\dameware mini remote control.lnk
[%PROGRAMS%]\dameware mini remote control\install dmrc service.lnk
[%PROGRAMS%]\dameware mini remote control\remove dmrc service.lnk
[%PROGRAMS%]\dameware mini remote control\service install & remove wizard.lnk
[%DESKTOP%]\dwmrcw.exe
[%PROGRAMS%]\dameware mini remote control\dameware mini remote control help.lnk
[%PROGRAMS%]\dameware mini remote control\dameware mini remote control.lnk
[%PROGRAMS%]\dameware mini remote control\install dmrc service.lnk
[%PROGRAMS%]\dameware mini remote control\remove dmrc service.lnk
[%PROGRAMS%]\dameware mini remote control\service install & remove wizard.lnk

Folders:
[%PROGRAM_FILES%]\dameware development

Registry Keys:
HKEY_CURRENT_USER\software\dameware development
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\menuorder\start menu2\programs\dameware mini remote control
HKEY_LOCAL_MACHINE\software\dameware development\dwrcs

Registry Values:
HKEY_CURRENT_USER\software\microsoft\installer\features\0fe858bbc088f154fad5c167b51f7167
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\folders
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\folders
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{bb858ef0-880c-451f-af5d-1c765bf11776}
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\dwmrcs
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\dwmrcs
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\dwmrcs
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\dwmrcs
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\dwmrcs
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\dwmrcs

Removing DameWare.Mini.Remote.Control:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Remove Bancos.GDK Trojan

Boarim Trojan

Removing Boarim
Categories: Trojan,Toolbar
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Toolbar presents itself as a helpful add-on for Internet Explorer but it is a real pest.

Boarim Also known as:

[Kaspersky]AdWare.Win32.ProtectionBar.a,AdWare.Win32.Agent.cu,Trojan-Downloader.Win32.Zlob.djx;
[McAfee]FakeAlert-B;
[Other]Win32/Boarim.E,TROJ_ZLOB.UC,Win32/Boarim.AI,TrojanDownloader:Win32/Zlob,Troj/Zlobie-Gen,Win32/Boarim.AM

Visible Symptoms:
Files in system folders:
[%PROGRAM_FILES%]\Video Access ActiveX Object\iesplugin.dll
[%PROGRAM_FILES%]\Video Access ActiveX Object\iesuninst.exe
[%PROGRAM_FILES%]\Video ActiveX Object\iesplugin.dll
[%PROGRAM_FILES%]\Video ActiveX Object\iesuninst.exe
[%PROGRAM_FILES%]\Video Access ActiveX Object\iesplugin.dll
[%PROGRAM_FILES%]\Video Access ActiveX Object\iesuninst.exe
[%PROGRAM_FILES%]\Video ActiveX Object\iesplugin.dll
[%PROGRAM_FILES%]\Video ActiveX Object\iesuninst.exe

How to detect Boarim:

Files:
[%PROGRAM_FILES%]\Video Access ActiveX Object\iesplugin.dll
[%PROGRAM_FILES%]\Video Access ActiveX Object\iesuninst.exe
[%PROGRAM_FILES%]\Video ActiveX Object\iesplugin.dll
[%PROGRAM_FILES%]\Video ActiveX Object\iesuninst.exe
[%PROGRAM_FILES%]\Video Access ActiveX Object\iesplugin.dll
[%PROGRAM_FILES%]\Video Access ActiveX Object\iesuninst.exe
[%PROGRAM_FILES%]\Video ActiveX Object\iesplugin.dll
[%PROGRAM_FILES%]\Video ActiveX Object\iesuninst.exe

Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{0D045BAA-4BD3-4C94-BE8B-21536BD6BD9F}
HKEY_CLASSES_ROOT\CLSID\{29C5A3B6-9A8D-4FA0-B5AD-3E20F4AA5C00}
HKEY_CLASSES_ROOT\CLSID\{5d4831e0-5a7c-4a46-afd5-a79ab8ce36c2}
HKEY_CLASSES_ROOT\CLSID\{a2595f37-48d0-46a1-9b51-478591a97764}
HKEY_CLASSES_ROOT\clsid\{0d045baa-4bd3-4c94-be8b-21536bd6bd9f}
HKEY_CLASSES_ROOT\clsid\{29c5a3b6-9a8d-4fa0-b5ad-3e20f4aa5c00}
HKEY_CLASSES_ROOT\clsid\{5d4831e0-5a7c-4a46-afd5-a79ab8ce36c2}
HKEY_CLASSES_ROOT\clsid\{a2595f37-48d0-46a1-9b51-478591a97764}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar\{29c5a3b6-9a8d-4fa0-b5ad-3e20f4aa5c00}

Registry Values:
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar

Removing Boarim:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
URLBlaze BHO Symptoms
China Trojan Information
Bancos.HWS Trojan Removal

Zango.Sudoku Adware

Removing Zango.Sudoku
Categories: Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.


Zango.Sudoku Also known as:

[Kaspersky]AdWare.Win32.180Sulotions.as;
[McAfee]Adware-ZangoSA

Visible Symptoms:
Files in system folders:
[%PROGRAM_FILES%]\Mozilla Firefox\plugins\npclntax.dll
[%COMMON_DESKTOPDIRECTORY%]\Active Sudoku 1.0.lnk
[%COMMON_PROGRAMS%]\Active Sudoku\Active Sudoku 1.0.lnk
[%COMMON_PROGRAMS%]\Active Sudoku\Skins editor.lnk
[%COMMON_PROGRAMS%]\Active Sudoku\Uninstall Active Sudoku.lnk
[%PROGRAM_FILES%]\Active Sudoku\Skins\BrownGlass.sui
[%PROGRAM_FILES%]\Active Sudoku\Skins\Longhorn.sui
[%PROGRAM_FILES%]\Active Sudoku\Skins\RealOne.sui
[%PROGRAM_FILES%]\Active Sudoku\Skins\SportsBlue.sui
[%PROGRAM_FILES%]\Active Sudoku\Skins\ThemeBuilder.EXE
[%PROGRAM_FILES%]\Active Sudoku\Skins\xpsilver.sui
[%PROGRAM_FILES%]\Active Sudoku\Sudoku.exe
[%PROGRAM_FILES%]\Active Sudoku\Sudoku.ini
[%PROGRAM_FILES%]\Active Sudoku\unins000.dat
[%PROGRAM_FILES%]\Active Sudoku\unins000.exe
[%PROGRAM_FILES%]\Mozilla Firefox\plugins\npclntax.dll
[%COMMON_DESKTOPDIRECTORY%]\Active Sudoku 1.0.lnk
[%COMMON_PROGRAMS%]\Active Sudoku\Active Sudoku 1.0.lnk
[%COMMON_PROGRAMS%]\Active Sudoku\Skins editor.lnk
[%COMMON_PROGRAMS%]\Active Sudoku\Uninstall Active Sudoku.lnk
[%PROGRAM_FILES%]\Active Sudoku\Skins\BrownGlass.sui
[%PROGRAM_FILES%]\Active Sudoku\Skins\Longhorn.sui
[%PROGRAM_FILES%]\Active Sudoku\Skins\RealOne.sui
[%PROGRAM_FILES%]\Active Sudoku\Skins\SportsBlue.sui
[%PROGRAM_FILES%]\Active Sudoku\Skins\ThemeBuilder.EXE
[%PROGRAM_FILES%]\Active Sudoku\Skins\xpsilver.sui
[%PROGRAM_FILES%]\Active Sudoku\Sudoku.exe
[%PROGRAM_FILES%]\Active Sudoku\Sudoku.ini
[%PROGRAM_FILES%]\Active Sudoku\unins000.dat
[%PROGRAM_FILES%]\Active Sudoku\unins000.exe

How to detect Zango.Sudoku:

Files:
[%PROGRAM_FILES%]\Mozilla Firefox\plugins\npclntax.dll
[%COMMON_DESKTOPDIRECTORY%]\Active Sudoku 1.0.lnk
[%COMMON_PROGRAMS%]\Active Sudoku\Active Sudoku 1.0.lnk
[%COMMON_PROGRAMS%]\Active Sudoku\Skins editor.lnk
[%COMMON_PROGRAMS%]\Active Sudoku\Uninstall Active Sudoku.lnk
[%PROGRAM_FILES%]\Active Sudoku\Skins\BrownGlass.sui
[%PROGRAM_FILES%]\Active Sudoku\Skins\Longhorn.sui
[%PROGRAM_FILES%]\Active Sudoku\Skins\RealOne.sui
[%PROGRAM_FILES%]\Active Sudoku\Skins\SportsBlue.sui
[%PROGRAM_FILES%]\Active Sudoku\Skins\ThemeBuilder.EXE
[%PROGRAM_FILES%]\Active Sudoku\Skins\xpsilver.sui
[%PROGRAM_FILES%]\Active Sudoku\Sudoku.exe
[%PROGRAM_FILES%]\Active Sudoku\Sudoku.ini
[%PROGRAM_FILES%]\Active Sudoku\unins000.dat
[%PROGRAM_FILES%]\Active Sudoku\unins000.exe
[%PROGRAM_FILES%]\Mozilla Firefox\plugins\npclntax.dll
[%COMMON_DESKTOPDIRECTORY%]\Active Sudoku 1.0.lnk
[%COMMON_PROGRAMS%]\Active Sudoku\Active Sudoku 1.0.lnk
[%COMMON_PROGRAMS%]\Active Sudoku\Skins editor.lnk
[%COMMON_PROGRAMS%]\Active Sudoku\Uninstall Active Sudoku.lnk
[%PROGRAM_FILES%]\Active Sudoku\Skins\BrownGlass.sui
[%PROGRAM_FILES%]\Active Sudoku\Skins\Longhorn.sui
[%PROGRAM_FILES%]\Active Sudoku\Skins\RealOne.sui
[%PROGRAM_FILES%]\Active Sudoku\Skins\SportsBlue.sui
[%PROGRAM_FILES%]\Active Sudoku\Skins\ThemeBuilder.EXE
[%PROGRAM_FILES%]\Active Sudoku\Skins\xpsilver.sui
[%PROGRAM_FILES%]\Active Sudoku\Sudoku.exe
[%PROGRAM_FILES%]\Active Sudoku\Sudoku.ini
[%PROGRAM_FILES%]\Active Sudoku\unins000.dat
[%PROGRAM_FILES%]\Active Sudoku\unins000.exe

Registry Keys:
HKEY_CLASSES_ROOT\sudokupuzzle
HKEY_LOCAL_MACHINE\software\sudoku

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\active sudoku_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\active sudoku_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\active sudoku_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\active sudoku_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\active sudoku_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\active sudoku_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\active sudoku_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\active sudoku_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\active sudoku_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\active sudoku_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\active sudoku_is1

Removing Zango.Sudoku:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Removing Lookup Adware

CWS.TheRealSearch Hijacker

Removing CWS.TheRealSearch
Categories: Hijacker
When the default home page is hijacked, the browser opens to the web page set by the hijacker
instead of the user's designated home page. In some cases, the hijacker may block users from
restoring their desired home page.

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\editpad.exe
[%WINDOWS%]\quicken.exe
[%WINDOWS%]\editpad.exe
[%WINDOWS%]\quicken.exe

How to detect CWS.TheRealSearch:

Files:
[%WINDOWS%]\editpad.exe
[%WINDOWS%]\quicken.exe
[%WINDOWS%]\editpad.exe
[%WINDOWS%]\quicken.exe

Removing CWS.TheRealSearch:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Ofbyon Trojan Removal instruction
Venuv Trojan Removal
Bisier Trojan Removal

IntexusDial Adware

Removing IntexusDial
Categories: Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits

Visible Symptoms:
Files in system folders:
[%DESKTOP%]\feier feier.lnk
[%DESKTOP%]\fitomat fit-10006.lnk
[%DESKTOP%]\Geburtstag grg-10073.lnk
[%DESKTOP%]\GrussProfi gpr-10016.lnk
[%DESKTOP%]\iqtest iqtest.lnk
[%DESKTOP%]\P2P p2p-11066.lnk
[%DESKTOP%]\Rezeptsammlung.com rmm-10007.lnk
[%DESKTOP%]\Routenplaner Profi rai-10040.lnk
[%DESKTOP%]\Routenplanung routenplanung.lnk
[%DESKTOP%]\SMS-Stadt sst-10003.lnk
[%DESKTOP%]\feier feier.lnk
[%DESKTOP%]\fitomat fit-10006.lnk
[%DESKTOP%]\Geburtstag grg-10073.lnk
[%DESKTOP%]\GrussProfi gpr-10016.lnk
[%DESKTOP%]\iqtest iqtest.lnk
[%DESKTOP%]\P2P p2p-11066.lnk
[%DESKTOP%]\Rezeptsammlung.com rmm-10007.lnk
[%DESKTOP%]\Routenplaner Profi rai-10040.lnk
[%DESKTOP%]\Routenplanung routenplanung.lnk
[%DESKTOP%]\SMS-Stadt sst-10003.lnk

How to detect IntexusDial:

Files:
[%DESKTOP%]\feier feier.lnk
[%DESKTOP%]\fitomat fit-10006.lnk
[%DESKTOP%]\Geburtstag grg-10073.lnk
[%DESKTOP%]\GrussProfi gpr-10016.lnk
[%DESKTOP%]\iqtest iqtest.lnk
[%DESKTOP%]\P2P p2p-11066.lnk
[%DESKTOP%]\Rezeptsammlung.com rmm-10007.lnk
[%DESKTOP%]\Routenplaner Profi rai-10040.lnk
[%DESKTOP%]\Routenplanung routenplanung.lnk
[%DESKTOP%]\SMS-Stadt sst-10003.lnk
[%DESKTOP%]\feier feier.lnk
[%DESKTOP%]\fitomat fit-10006.lnk
[%DESKTOP%]\Geburtstag grg-10073.lnk
[%DESKTOP%]\GrussProfi gpr-10016.lnk
[%DESKTOP%]\iqtest iqtest.lnk
[%DESKTOP%]\P2P p2p-11066.lnk
[%DESKTOP%]\Rezeptsammlung.com rmm-10007.lnk
[%DESKTOP%]\Routenplaner Profi rai-10040.lnk
[%DESKTOP%]\Routenplanung routenplanung.lnk
[%DESKTOP%]\SMS-Stadt sst-10003.lnk

Folders:
[%PROGRAMS%]\- P2P -
[%PROGRAMS%]\- feier -
[%PROGRAMS%]\- fitomat -
[%PROGRAMS%]\- Geburtstag -
[%PROGRAMS%]\- GrussProfi -
[%PROGRAMS%]\- iqtest -
[%PROGRAMS%]\- Rezeptsammlung.com -
[%PROGRAMS%]\- Routenplaner Profi -
[%PROGRAMS%]\- Routenplanung -

Removing IntexusDial:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Remove SeeqBar Adware
Deggoo Trojan Cleaner
Downloadalot.com Tracking Cookie Information
Vxidl.AWZ Trojan Symptoms
CWS Homepage Hijacker Hijacker Symptoms

Handy.Keylogger Spyware

Removing Handy.Keylogger
Categories: Spyware
Spyware is computer software that is installed surreptitiously on a personal computer
to intercept or take partial control over the user's interaction
with the computer, without the user's informed consent.

While the term spyware suggests software that secretly monitors the user's behavior,
the functions of spyware extend well beyond simple monitoring.

Spyware programs can collect various types of personal information,
such as Internet surfing habit, sites that have been visited,
but can also interfere with user control of the computer in other ways,
such as installing additional software, redirecting Web browser activity,
accessing websites blindly that will cause more harmful viruses,
or diverting advertising revenue to a third party.

Spyware can even change computer settings, resulting in slow connection speeds,
different home pages, and loss of Internet or other programs.
In an attempt to increase the understanding of spyware, a more formal classification
of its included software types is captured under the term privacy-invasive software.

How to detect Handy.Keylogger:

Folders:
[%SYSTEM%]\xmlext

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{d8f6a9af-4f03-88bb-298b-f16260e36c29}
HKEY_LOCAL_MACHINE\software\microsoft\wabcom

Removing Handy.Keylogger:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
ro2cn Adware Removal instruction
MasterDialer Adware Removal instruction

Hidden.Camera Spyware

Removing Hidden.Camera
Categories: Spyware
Spyware can even change computer settings, resulting in slow connection speeds,
different home pages, and loss of Internet or other programs.
In an attempt to increase the understanding of spyware, a more formal classification
of its included software types is captured under the term privacy-invasive software.

Visible Symptoms:
Files in system folders:
[%DESKTOP%]\Desktop\Hidden Camera Manager.lnk
[%DESKTOP%]\Start Menu\Programs\Hidden Camera\External Archive Viewer.lnk
[%DESKTOP%]\Start Menu\Programs\Hidden Camera\Help.lnk
[%DESKTOP%]\Start Menu\Programs\Hidden Camera\Hidden Camera Manager.lnk
[%DESKTOP%]\Start Menu\Programs\Hidden Camera\License.lnk
[%DESKTOP%]\Desktop\Hidden Camera Manager.lnk
[%DESKTOP%]\Start Menu\Programs\Hidden Camera\External Archive Viewer.lnk
[%DESKTOP%]\Start Menu\Programs\Hidden Camera\Help.lnk
[%DESKTOP%]\Start Menu\Programs\Hidden Camera\Hidden Camera Manager.lnk
[%DESKTOP%]\Start Menu\Programs\Hidden Camera\License.lnk

How to detect Hidden.Camera:

Files:
[%DESKTOP%]\Desktop\Hidden Camera Manager.lnk
[%DESKTOP%]\Start Menu\Programs\Hidden Camera\External Archive Viewer.lnk
[%DESKTOP%]\Start Menu\Programs\Hidden Camera\Help.lnk
[%DESKTOP%]\Start Menu\Programs\Hidden Camera\Hidden Camera Manager.lnk
[%DESKTOP%]\Start Menu\Programs\Hidden Camera\License.lnk
[%DESKTOP%]\Desktop\Hidden Camera Manager.lnk
[%DESKTOP%]\Start Menu\Programs\Hidden Camera\External Archive Viewer.lnk
[%DESKTOP%]\Start Menu\Programs\Hidden Camera\Help.lnk
[%DESKTOP%]\Start Menu\Programs\Hidden Camera\Hidden Camera Manager.lnk
[%DESKTOP%]\Start Menu\Programs\Hidden Camera\License.lnk

Folders:
[%PROGRAM_FILES%]\Oleansoft\Hc

Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\hidden camera

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Hidden.Camera:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Removing Balloon.Pop.Word.Game Trojan
W32.MSNBancos Trojan Symptoms
XtrmOffer Adware Symptoms
Removing MediaMotor Adware
Autorun Malware Malware Removal instruction

SillyDl.BAR Downloader

Removing SillyDl.BAR
Categories: Downloader
This family of Trojans downloads and installs new malware or adware on the computer.
The downloader then either launches the new malware or registers it to enable autorun
according to the local operating system requirements.

The names and locations of malware to be downloaded are either coded into the
Trojan or downloaded from a specified website.

Visible Symptoms:
Files in system folders:
[%PROFILE_TEMP%]\v5x4.ga2me
[%SYSTEM%]\vexg6ame4.exe
[%PROFILE_TEMP%]\v5x4.ga2me
[%SYSTEM%]\vexg6ame4.exe

How to detect SillyDl.BAR:

Files:
[%PROFILE_TEMP%]\v5x4.ga2me
[%SYSTEM%]\vexg6ame4.exe
[%PROFILE_TEMP%]\v5x4.ga2me
[%SYSTEM%]\vexg6ame4.exe

Removing SillyDl.BAR:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Armax Trojan Information
Replacer.exe Trojan Cleaner
Freeze.Screensaver Toolbar Symptoms
WinGuardian Spyware Cleaner
Removing ZeroPopup Hijacker

SuperBar Adware

Removing SuperBar
Categories: Adware,BHO,Hijacker,Toolbar
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.

The BHO (Browser Helper Object) waits for the user to post personal information to a monitored website.
As this information is entered by the user, it is captured by the BHO and sent back to the attacker.
Hijackers take control of various parts of your web browser, including your home page,
search pages, and search bar. They may also redirect you to certain sites should you
mistype an address or prevent you from going to a website they would rather you not,
such as sites that combat malware. Some will even redirect you to their own search engine
when you attempt a search.
Toolbar presents itself as a helpful add-on for Internet Explorer but it is a real pest.
It replaces your start page, continuosly open a number of pop up windows and so on.

SuperBar Also known as:

[Panda]Adware/Superbar

Visible Symptoms:
Files in system folders:
[%PROFILE_TEMP%]\superbarinstall.exe
[%PROFILE_TEMP%]\container.exe
[%PROGRAM_FILES%]\installshield installation information\{8669bd13-2c83-431a-95a9-24b69daf3a41}\layout.bin
[%PROGRAM_FILES%]\installshield installation information\{8669bd13-2c83-431a-95a9-24b69daf3a41}\setup.exe
[%PROGRAM_FILES%]\installshield installation information\{8669bd13-2c83-431a-95a9-24b69daf3a41}\setup.ini
[%PROGRAM_FILES%]\_superbar\_superbar.dll
[%SYSTEM%]\astart.exe
[%SYSTEM%]\cerjtmgr.dll
[%SYSTEM%]\dnasrslvr.dll
[%SYSTEM%]\superbar.dll
[%WINDOWS%]\pspmpsp.exe
[%WINDOWS%]\system\superbar.dll
[%PROFILE_TEMP%]\superbarinstall.exe
[%PROFILE_TEMP%]\container.exe
[%PROGRAM_FILES%]\installshield installation information\{8669bd13-2c83-431a-95a9-24b69daf3a41}\layout.bin
[%PROGRAM_FILES%]\installshield installation information\{8669bd13-2c83-431a-95a9-24b69daf3a41}\setup.exe
[%PROGRAM_FILES%]\installshield installation information\{8669bd13-2c83-431a-95a9-24b69daf3a41}\setup.ini
[%PROGRAM_FILES%]\_superbar\_superbar.dll
[%SYSTEM%]\astart.exe
[%SYSTEM%]\cerjtmgr.dll
[%SYSTEM%]\dnasrslvr.dll
[%SYSTEM%]\superbar.dll
[%WINDOWS%]\pspmpsp.exe
[%WINDOWS%]\system\superbar.dll

How to detect SuperBar:

Files:
[%PROFILE_TEMP%]\superbarinstall.exe
[%PROFILE_TEMP%]\container.exe
[%PROGRAM_FILES%]\installshield installation information\{8669bd13-2c83-431a-95a9-24b69daf3a41}\layout.bin
[%PROGRAM_FILES%]\installshield installation information\{8669bd13-2c83-431a-95a9-24b69daf3a41}\setup.exe
[%PROGRAM_FILES%]\installshield installation information\{8669bd13-2c83-431a-95a9-24b69daf3a41}\setup.ini
[%PROGRAM_FILES%]\_superbar\_superbar.dll
[%SYSTEM%]\astart.exe
[%SYSTEM%]\cerjtmgr.dll
[%SYSTEM%]\dnasrslvr.dll
[%SYSTEM%]\superbar.dll
[%WINDOWS%]\pspmpsp.exe
[%WINDOWS%]\system\superbar.dll
[%PROFILE_TEMP%]\superbarinstall.exe
[%PROFILE_TEMP%]\container.exe
[%PROGRAM_FILES%]\installshield installation information\{8669bd13-2c83-431a-95a9-24b69daf3a41}\layout.bin
[%PROGRAM_FILES%]\installshield installation information\{8669bd13-2c83-431a-95a9-24b69daf3a41}\setup.exe
[%PROGRAM_FILES%]\installshield installation information\{8669bd13-2c83-431a-95a9-24b69daf3a41}\setup.ini
[%PROGRAM_FILES%]\_superbar\_superbar.dll
[%SYSTEM%]\astart.exe
[%SYSTEM%]\cerjtmgr.dll
[%SYSTEM%]\dnasrslvr.dll
[%SYSTEM%]\superbar.dll
[%WINDOWS%]\pspmpsp.exe
[%WINDOWS%]\system\superbar.dll

Folders:
[%PROGRAM_FILES%]\superbar
[%PROGRAM_FILES%]\\superbar

Registry Keys:
HKEY_CLASSES_ROOT\typelib\{60f8fb2a-9915-4202-967d-1fa694a8bcf5}
HKEY_LOCAL_MACHINE\software\classes\clsid\{49c3014f-03ed-4634-9fb2-2881f2c7a057}
HKEY_LOCAL_MACHINE\software\classes\clsid\{cf1e49b3-24a6-4b17-94be-c25102e3bf04}
HKEY_LOCAL_MACHINE\software\classes\clsid\{d7f2fd62-6c1b-4b52-85b1-f65a414bf050}
HKEY_LOCAL_MACHINE\software\classes\clsid\{e5dfb380-3988-4c07-8afb-8a47769d9db5}
HKEY_LOCAL_MACHINE\software\classes\interface\{9d1b86c7-1b93-4586-9009-ea3bd0ad63a5}
HKEY_LOCAL_MACHINE\software\classes\interface\{b8afa251-4efb-4703-87d4-da7d2435ba5e}
HKEY_LOCAL_MACHINE\software\classes\interface\{df7d760c-b7e2-4735-bb77-f5a1a9745e16}
HKEY_LOCAL_MACHINE\software\classes\superbar.component
HKEY_LOCAL_MACHINE\software\classes\superbarbho.component
HKEY_LOCAL_MACHINE\software\classes\superbarbl.component
HKEY_LOCAL_MACHINE\software\classes\superbarcws.component
HKEY_LOCAL_MACHINE\software\classes\superbarexts.savedatainterface
HKEY_LOCAL_MACHINE\software\classes\superbarexts.userprofileinterface
HKEY_LOCAL_MACHINE\software\classes\superbarse.component
HKEY_LOCAL_MACHINE\software\classes\typelib\{60f8fb2a-9915-4202-967d-1fa694a8bcf5}
HKEY_CLASSES_ROOT\clsid\{00ec76b0-1952-4f0e-a5e0-f14ffaf01f61}
HKEY_CLASSES_ROOT\clsid\{0af014f4-cbdf-4fd5-8cc4-11c0156e8aec}
HKEY_CLASSES_ROOT\clsid\{0cebef5f-8c3d-4afb-894c-ae547509a7c5}
HKEY_CLASSES_ROOT\clsid\{130dfec0-29ea-11d8-99de-00600fe1a94f}
HKEY_CLASSES_ROOT\clsid\{1548c55c-b1e7-483f-973d-11c58ad44d4a}
HKEY_CLASSES_ROOT\clsid\{20594b79-beba-49c4-a3d6-4bc74fef4746}
HKEY_CLASSES_ROOT\clsid\{3c525947-f2b1-4237-a02b-2ac0ffdab8fb}
HKEY_CLASSES_ROOT\clsid\{450c33b9-5592-49b3-ab91-0681601b63a8}
HKEY_CLASSES_ROOT\clsid\{4d77d848-2989-4c70-9e02-b144bf2808d1}
HKEY_CLASSES_ROOT\clsid\{5b3364b6-7e31-4b06-961c-43a164a8ea09}
HKEY_CLASSES_ROOT\clsid\{66fdb831-bacd-4abe-8035-cfbcbc22cf72}
HKEY_CLASSES_ROOT\clsid\{8c06d78b-93ce-4255-8fa2-c18dd509f18f}
HKEY_CLASSES_ROOT\clsid\{9b065794-84fc-47ec-a99c-8fd33436c2f6}
HKEY_CLASSES_ROOT\clsid\{a693a29b-931c-4367-9c60-ca3c303e35fb3}
HKEY_CLASSES_ROOT\clsid\{b17aba78-ebb3-483c-a56c-d2969e84e6f1}
HKEY_CLASSES_ROOT\clsid\{b8c44339-f1a5-46d5-a207-45cf02db88e8}
HKEY_CLASSES_ROOT\clsid\{c5a80b44-892e-4f46-be6e-db45479787e7}
HKEY_CLASSES_ROOT\clsid\{c776136e-fdb9-4f4b-837d-90593fb5a3fa}
HKEY_CLASSES_ROOT\clsid\{d2af0096-9a71-4bdf-90da-508634fba976}
HKEY_CLASSES_ROOT\clsid\{d33aaf20-50c1-4a4c-9b83-b3b1946aa821}
HKEY_CLASSES_ROOT\clsid\{e513445c-e14a-4b63-8092-49fe687ae023}
HKEY_CLASSES_ROOT\clsid\{f7e5c3b2-2087-458b-9084-61d93b3b17de}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{136a9d1d-1f4b-43d4-8359-6f2382449255}
HKEY_CLASSES_ROOT\typelib\{00ec76b0-1952-4f0e-a5e0-f14ffaf01f61}
HKEY_CLASSES_ROOT\typelib\{1548c55c-b1e7-483f-973d-11c58ad44d4a}
HKEY_CLASSES_ROOT\typelib\{3c525947-f2b1-4237-a02b-2ac0ffdab8fb}
HKEY_CLASSES_ROOT\typelib\{a693a29b-931c-4367-9c60-ca3c303e35fb3}
HKEY_CLASSES_ROOT\typelib\{c5a80b44-892e-4f46-be6e-db45479787e7}
HKEY_CLASSES_ROOT\typelib\{d33aaf20-50c1-4a4c-9b83-b3b1946aa821}
HKEY_CLASSES_ROOT\typelib\{e513445c-e14a-4b63-8092-49fe687ae023}
HKEY_LOCAL_MACHINE\software\classes\clsid\{********-****-****-****-************}
HKEY_LOCAL_MACHINE\software\classes\clsid\{0af014f4-cbdf-4fd5-8cc4-11c0156e8aec}
HKEY_LOCAL_MACHINE\software\classes\clsid\{0cebef5f-8c3d-4afb-894c-ae547509a7c5}
HKEY_LOCAL_MACHINE\software\classes\clsid\{130dfec0-29ea-11d8-99de-00600fe1a94f}
HKEY_LOCAL_MACHINE\software\classes\clsid\{136a9d1d-1f4b-43d4-8359-6f2382449255}
HKEY_LOCAL_MACHINE\software\classes\clsid\{20594b79-beba-49c4-a3d6-4bc74fef4746}
HKEY_LOCAL_MACHINE\software\classes\clsid\{4d77d848-2989-4c70-9e02-b144bf2808d1}
HKEY_LOCAL_MACHINE\software\classes\clsid\{5b3364b6-7e31-4b06-961c-43a164a8ea09}
HKEY_LOCAL_MACHINE\software\classes\clsid\{5f2edea3-930b-45d5-9e9c-9ede29a85ed6}
HKEY_LOCAL_MACHINE\software\classes\clsid\{77f5ace5-ee66-4905-9dfd-ea0d5a7c1ba2}
HKEY_LOCAL_MACHINE\software\classes\clsid\{9b065794-84fc-47ec-a99c-8fd33436c2f6}
HKEY_LOCAL_MACHINE\software\classes\clsid\{b03902b4-d8e5-4d00-8859-a4861e35c3f9}
HKEY_LOCAL_MACHINE\software\classes\clsid\{b17aba78-ebb3-483c-a56c-d2969e84e6f1}
HKEY_LOCAL_MACHINE\software\classes\clsid\{b8c44339-f1a5-46d5-a207-45cf02db88e8}
HKEY_LOCAL_MACHINE\software\classes\clsid\{f7e5c3b2-2087-458b-9084-61d93b3b17de}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{9b065794-84fc-47ec-a99c-8fd33436c2f6}

Registry Values:
HKEY_CLASSES_ROOT\clsid\{721b9490-da39-42ae-a00b-4d9f5e4420b2}
HKEY_CLASSES_ROOT\clsid\{721b9490-da39-42ae-a00b-4d9f5e4420b2}\inprocserver32
HKEY_CURRENT_USER\software\1622439085
HKEY_CURRENT_USER\software\dnasrslvr
HKEY_CURRENT_USER\software\dnasrslvr
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\shellbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\shellbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\internet settings\5.0\cache\extensible cache\mshist012004111620041117
HKEY_LOCAL_MACHINE\software\cvryptdll
HKEY_LOCAL_MACHINE\software\cvryptdll
HKEY_LOCAL_MACHINE\software\cvryptdll
HKEY_LOCAL_MACHINE\software\cvryptdll
HKEY_LOCAL_MACHINE\software\cvryptdll
HKEY_LOCAL_MACHINE\software\cvryptdll
HKEY_LOCAL_MACHINE\software\dnasrslvr
HKEY_LOCAL_MACHINE\software\dnasrslvr
HKEY_LOCAL_MACHINE\software\dnasrslvr
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{8669bd13-2c83-431a-95a9-24b69daf3a41}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{8669bd13-2c83-431a-95a9-24b69daf3a41}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{8669bd13-2c83-431a-95a9-24b69daf3a41}

Removing SuperBar:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
PKings.IEHelper BHO Symptoms
ZeroPopup Hijacker Symptoms
InLook.Express Spyware Removal
Remove Midnight Trojan
Remove WinADiscount Adware

StartPage.yp Hijacker

Removing StartPage.yp
Categories: Hijacker
Hijackers are software programs that modify users' default browser home page,
search settings, error page settings, or desktop wallpaper without adequate notice, disclosure,
or user consent.

When the default home page is hijacked, the browser opens to the web page set by the hijacker
instead of the user's designated home page. In some cases, the hijacker may block users from
restoring their desired home page.

A search hijacker redirects search results to other pages and may
transmit search and browsing data to unknown servers. An error page hijacker directs
the browser to another page, usually an advertising page, instead of the usual error
page when the requested URL is not found.

A desktop hijacker replaces the desktop wallpaper with advertising
for products and services on the desktop.

Hijackers take control of various parts of your web browser, including your home page,
search pages, and search bar. They may also redirect you to certain sites should you
mistype an address or prevent you from going to a website they would rather you not,
such as sites that combat malware. Some will even redirect you to their own search engine
when you attempt a search. NB: hijackers almost exclusively target Internet Explorer.

How to detect StartPage.yp:

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\runservices

Removing StartPage.yp:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Remove CHCB Backdoor
SillyDl.ATE Downloader Information

SillyDl.DOT Trojan

Removing SillyDl.DOT
Categories: Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

SillyDl.DOT Also known as:

[Other]Trojan.Goldun

Visible Symptoms:
Files in system folders:
[%PROFILE_TEMP%]\msconfig.exe
[%PROFILE_TEMP%]\self.bat
[%PROFILE_TEMP%]\wfdr.exe
[%PROFILE_TEMP%]\msconfig.exe
[%PROFILE_TEMP%]\self.bat
[%PROFILE_TEMP%]\wfdr.exe

How to detect SillyDl.DOT:

Files:
[%PROFILE_TEMP%]\msconfig.exe
[%PROFILE_TEMP%]\self.bat
[%PROFILE_TEMP%]\wfdr.exe
[%PROFILE_TEMP%]\msconfig.exe
[%PROFILE_TEMP%]\self.bat
[%PROFILE_TEMP%]\wfdr.exe

Removing SillyDl.DOT:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
SoftEther RAT Cleaner
TrojanDownloader.Win32.Agent.nj Downloader Symptoms
Skyper DoS Removal
VBS.Vicety Trojan Symptoms

Win32.bh Adware

Removing Win32.bh
Categories: Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits

Win32.bh Also known as:

[Panda]Dialer.LN

Visible Symptoms:
Files in system folders:
[%DESKTOP%]\pleasure network.lnk
[%SYSTEM%]\services\seasx.exe
[%SYSTEM%]\services\sesx.exe
[%DESKTOP%]\pleasure network.lnk
[%SYSTEM%]\services\seasx.exe
[%SYSTEM%]\services\sesx.exe

How to detect Win32.bh:

Files:
[%DESKTOP%]\pleasure network.lnk
[%SYSTEM%]\services\seasx.exe
[%SYSTEM%]\services\sesx.exe
[%DESKTOP%]\pleasure network.lnk
[%SYSTEM%]\services\seasx.exe
[%SYSTEM%]\services\sesx.exe

Removing Win32.bh:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Agent.BOQ Trojan Removal
Removing Infiltrator Trojan
Win32.TrojanDownloader.IstBar.NAD Downloader Removal instruction

Browserplugin.com BHO

Removing Browserplugin.com
Categories: BHO
The BHO (Browser Helper Object) waits for the user to post personal information to a monitored website.
As this information is entered by the user, it is captured by the BHO and sent back to the attacker.

Visible Symptoms:
Files in system folders:
[%PROFILE%]\my documents\wh5_1843040.dll
[%PROFILE%]\my documents\wh5_1843040.dll

How to detect Browserplugin.com:

Files:
[%PROFILE%]\my documents\wh5_1843040.dll
[%PROFILE%]\my documents\wh5_1843040.dll

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{1bdd55b8-3985-4e59-b906-5e0ad56d6710}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{1bdd55b8-3985-4e59-b906-5e0ad56d6710}
HKEY_LOCAL_MACHINE\software\classes\clsid\{1bdd55b8-3985-4e59-b906-5e0ad56d6710}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{1bdd55b8-3985-4e59-b906-5e0ad56d6710}

Removing Browserplugin.com:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Freeze.Screensaver Toolbar Cleaner
Anti.MSN Backdoor Cleaner
PSW.Spider Trojan Information
SearchMaid Adware Symptoms
Shpiel Trojan Cleaner

IrcContact Backdoor

Removing IrcContact
Categories: Backdoor,RAT,DoS
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
Often the backdoor will not be visible in the log of active programs.
Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.

Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on
April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack.
They usually do whimsical things like flip the screen upside-down, open the CD-ROM tray,
and swap mouse buttons. However, they can be quite hard to remove.
DoS programs attack web servers by sending numerous requests to the specified server,
often causing it to crash under an excessive volume of requests.



IrcContact Also known as:

[Kaspersky]Backdoor.IrcContact.30;
[Panda]Bck/Irccontact.A;
[Computer Associates]Backdoor/IRC.Contact.30!Server,Win32.Contact.30

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\ajout.ini
[%WINDOWS%]\closew.bat
[%WINDOWS%]\instll.bat
[%WINDOWS%]\ipservu.txt
[%WINDOWS%]\irchack.exe
[%WINDOWS%]\rundlls.exe
[%WINDOWS%]\serv-u.ini
[%WINDOWS%]\win.ori
[%WINDOWS%]\ajout.ini
[%WINDOWS%]\closew.bat
[%WINDOWS%]\instll.bat
[%WINDOWS%]\ipservu.txt
[%WINDOWS%]\irchack.exe
[%WINDOWS%]\rundlls.exe
[%WINDOWS%]\serv-u.ini
[%WINDOWS%]\win.ori

How to detect IrcContact:

Files:
[%WINDOWS%]\ajout.ini
[%WINDOWS%]\closew.bat
[%WINDOWS%]\instll.bat
[%WINDOWS%]\ipservu.txt
[%WINDOWS%]\irchack.exe
[%WINDOWS%]\rundlls.exe
[%WINDOWS%]\serv-u.ini
[%WINDOWS%]\win.ori
[%WINDOWS%]\ajout.ini
[%WINDOWS%]\closew.bat
[%WINDOWS%]\instll.bat
[%WINDOWS%]\ipservu.txt
[%WINDOWS%]\irchack.exe
[%WINDOWS%]\rundlls.exe
[%WINDOWS%]\serv-u.ini
[%WINDOWS%]\win.ori

Removing IrcContact:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
HLLT.8288a Trojan Symptoms
Remove Rads01.Quadrogram Adware
Keycorder Spyware Removal

Clickspring Adware

Removing Clickspring
Categories: Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits

Clickspring Also known as:

[Kaspersky]AdWare.Win32.PurityScan.en,Trojan-Downloader.Win32.PurityScan.cu,Trojan-Downloader.Win32.PurityScan.dad,AdWare.Win32.PurityScan.ep,Trojan.Win32.Scapur.k,Trojan-Downloader.Win32.PurityScan.cr,AdWare.Win32.PurityScan.ak,Adware.Win32.PurityScan.ak,Trojan-Downloader.Win32.PurityScan.eg;
[McAfee]Downlaoder-EV,Downloader-EV,Adware-ClickSpring;
[Other]Adware.Purityscan,Win32/Clspring.FD,Win32/Clspring.FA,Win32/Clspring.FF,Win32/Clspring.FE,Adware-Purityscan,Win32/ClickSpring.FH,Win32.Clspring.EZ,AdWare.Win32.PurityScan.en,Win32/Clspring.FB,Trojan.Popper,Win32?ClickSpring.FB,Win32/Clspring.EM,Win32/Clspring.FC,Win32/Clspring.FR,Win32/Clspring.FU,Win32/Clspring.FW,Win32/Clickspring.GM,Adware.MediaTicket,Win32/Clickspring.GK,Win32/Clspring.GL,Win32/Clspring.GN

Visible Symptoms:
Files in system folders:
[%INTERNET_CACHE%]\Content.IE5\OLE7SDI7\mulbin32[1].exe
[%PROFILE_TEMP%]\!update.exe
[%PROFILE_TEMP%]\axsetup1.exe
[%PROFILE_TEMP%]\qr.exe
[%PROFILE_TEMP%]\recife.exe
[%PROFILE_TEMP%]\sdexe.exe
[%PROFILE_TEMP%]\win??.tmp.exe
[%PROFILE_TEMP%]\~nsu.tmp\Au_.exe
[%PROFILE_TEMP%]\~nsu.tmp\Bu_.exe
[%PROGRAM_FILES_COMMON%]\SEMBLY~1\fast.exe
[%PROGRAM_FILES_COMMON%]\Yazzle1162OinAdmin.exe
[%PROGRAM_FILES_COMMON%]\Yazzle1162OinUninstaller.exe
[%PROGRAM_FILES_COMMON%]\YSTEM~1\logonui.exe
[%SYSTEM%]\dllhost.dll
[%SYSTEM%]\logonui.dll
[%SYSTEM%]\oins.exe
[%SYSTEM%]\pkpmbzoy.dll
[%SYSTEM%]\SKS~1\dvdplay.exe
[%SYSTEM%]\swwad.dll
[%SYSTEM%]\tracert.dll
[%WINDOWS%]\ICROSO~1.NET\lsass.exe
[%WINDOWS%]\run2.exe
[%WINDOWS%]\TEMP\!update.exe
[%WINDOWS%]\Temp\win16C.tmp.exe
[%WINDOWS%]\Temp\win1B4.tmp.exe
[%WINDOWS%]\waol.exe
[%WINDOWS%]\yzd.exe
[%INTERNET_CACHE%]\Content.IE5\OLE7SDI7\mulbin32[1].exe
[%PROFILE_TEMP%]\!update.exe
[%PROFILE_TEMP%]\axsetup1.exe
[%PROFILE_TEMP%]\qr.exe
[%PROFILE_TEMP%]\recife.exe
[%PROFILE_TEMP%]\sdexe.exe
[%PROFILE_TEMP%]\win??.tmp.exe
[%PROFILE_TEMP%]\~nsu.tmp\Au_.exe
[%PROFILE_TEMP%]\~nsu.tmp\Bu_.exe
[%PROGRAM_FILES_COMMON%]\SEMBLY~1\fast.exe
[%PROGRAM_FILES_COMMON%]\Yazzle1162OinAdmin.exe
[%PROGRAM_FILES_COMMON%]\Yazzle1162OinUninstaller.exe
[%PROGRAM_FILES_COMMON%]\YSTEM~1\logonui.exe
[%SYSTEM%]\dllhost.dll
[%SYSTEM%]\logonui.dll
[%SYSTEM%]\oins.exe
[%SYSTEM%]\pkpmbzoy.dll
[%SYSTEM%]\SKS~1\dvdplay.exe
[%SYSTEM%]\swwad.dll
[%SYSTEM%]\tracert.dll
[%WINDOWS%]\ICROSO~1.NET\lsass.exe
[%WINDOWS%]\run2.exe
[%WINDOWS%]\TEMP\!update.exe
[%WINDOWS%]\Temp\win16C.tmp.exe
[%WINDOWS%]\Temp\win1B4.tmp.exe
[%WINDOWS%]\waol.exe
[%WINDOWS%]\yzd.exe

How to detect Clickspring:

Files:
[%INTERNET_CACHE%]\Content.IE5\OLE7SDI7\mulbin32[1].exe
[%PROFILE_TEMP%]\!update.exe
[%PROFILE_TEMP%]\axsetup1.exe
[%PROFILE_TEMP%]\qr.exe
[%PROFILE_TEMP%]\recife.exe
[%PROFILE_TEMP%]\sdexe.exe
[%PROFILE_TEMP%]\win??.tmp.exe
[%PROFILE_TEMP%]\~nsu.tmp\Au_.exe
[%PROFILE_TEMP%]\~nsu.tmp\Bu_.exe
[%PROGRAM_FILES_COMMON%]\SEMBLY~1\fast.exe
[%PROGRAM_FILES_COMMON%]\Yazzle1162OinAdmin.exe
[%PROGRAM_FILES_COMMON%]\Yazzle1162OinUninstaller.exe
[%PROGRAM_FILES_COMMON%]\YSTEM~1\logonui.exe
[%SYSTEM%]\dllhost.dll
[%SYSTEM%]\logonui.dll
[%SYSTEM%]\oins.exe
[%SYSTEM%]\pkpmbzoy.dll
[%SYSTEM%]\SKS~1\dvdplay.exe
[%SYSTEM%]\swwad.dll
[%SYSTEM%]\tracert.dll
[%WINDOWS%]\ICROSO~1.NET\lsass.exe
[%WINDOWS%]\run2.exe
[%WINDOWS%]\TEMP\!update.exe
[%WINDOWS%]\Temp\win16C.tmp.exe
[%WINDOWS%]\Temp\win1B4.tmp.exe
[%WINDOWS%]\waol.exe
[%WINDOWS%]\yzd.exe
[%INTERNET_CACHE%]\Content.IE5\OLE7SDI7\mulbin32[1].exe
[%PROFILE_TEMP%]\!update.exe
[%PROFILE_TEMP%]\axsetup1.exe
[%PROFILE_TEMP%]\qr.exe
[%PROFILE_TEMP%]\recife.exe
[%PROFILE_TEMP%]\sdexe.exe
[%PROFILE_TEMP%]\win??.tmp.exe
[%PROFILE_TEMP%]\~nsu.tmp\Au_.exe
[%PROFILE_TEMP%]\~nsu.tmp\Bu_.exe
[%PROGRAM_FILES_COMMON%]\SEMBLY~1\fast.exe
[%PROGRAM_FILES_COMMON%]\Yazzle1162OinAdmin.exe
[%PROGRAM_FILES_COMMON%]\Yazzle1162OinUninstaller.exe
[%PROGRAM_FILES_COMMON%]\YSTEM~1\logonui.exe
[%SYSTEM%]\dllhost.dll
[%SYSTEM%]\logonui.dll
[%SYSTEM%]\oins.exe
[%SYSTEM%]\pkpmbzoy.dll
[%SYSTEM%]\SKS~1\dvdplay.exe
[%SYSTEM%]\swwad.dll
[%SYSTEM%]\tracert.dll
[%WINDOWS%]\ICROSO~1.NET\lsass.exe
[%WINDOWS%]\run2.exe
[%WINDOWS%]\TEMP\!update.exe
[%WINDOWS%]\Temp\win16C.tmp.exe
[%WINDOWS%]\Temp\win1B4.tmp.exe
[%WINDOWS%]\waol.exe
[%WINDOWS%]\yzd.exe

Registry Keys:
HKEY_LOCAL_MACHINE\software\clickspring
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\yazzle1162oin

Removing Clickspring:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
PrizeSurfer Trojan Removal instruction
Phishbank.APO Trojan Removal instruction

Zlob.Fam.SiteTicket Trojan

Removing Zlob.Fam.SiteTicket
Categories: Trojan,Popups
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
The pop-ups generally will not be stopped by pop-up stoppers, and often are
not dependent on your having Internet Explorer open.

How to detect Zlob.Fam.SiteTicket:

Folders:
[%PROGRAMS%]\SiteTicket
[%PROGRAM_FILES%]\SiteTicket

Registry Keys:
HKEY_CLASSES_ROOT\SiteTicket
HKEY_CURRENT_USER\Software\SiteTicket
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SiteTicket

Removing Zlob.Fam.SiteTicket:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Super.Stealth.Key.Capturer Spyware Removal
IamBigBrother Spyware Information
Remove System61 BHO
Removing KGTrial Spyware
INetSpeak.Iexplorr Adware Symptoms