Thursday, November 20, 2008

Evilbot Backdoor

Removing Evilbot
Categories: Backdoor,DoS
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
Often the backdoor will not be visible in the log of active programs.
DoS programs attack web servers by sending numerous requests to the specified server,
often causing it to crash under an excessive volume of requests.



Visible Symptoms:
Files in system folders:
[%WINDOWS%]\newname.exe
[%WINDOWS%]\newname.exe

How to detect Evilbot:

Files:
[%WINDOWS%]\newname.exe
[%WINDOWS%]\newname.exe

Removing Evilbot:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
ComAnywhere RAT Symptoms
Removing SideFind Trojan
Cyn Trojan Symptoms
VBS.BackdoorPing Trojan Symptoms

Scaggy Adware

Removing Scaggy
Categories: Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.


Scaggy Also known as:

[Kaspersky]AdWare.Win32.BookedSpace,AdWare.Win32.BookedSpace.h;
[McAfee]Adware-BkdSpace.dr,Adware-BkdSpace;
[Other]Adware.PStrip

Visible Symptoms:
Files in system folders:
[%PROFILE_TEMP%]\temp.fr????
[%WINDOWS%]\cfg32.exe
[%WINDOWS%]\cfg32.ex_
[%WINDOWS%]\cfg32a.exe
[%WINDOWS%]\cfg32o.dll
[%WINDOWS%]\cfg32o.dll_tobedeleted
[%WINDOWS%]\cfg32r.dll
[%WINDOWS%]\cfg32s.dll
[%WINDOWS%]\cs_cache.ini
[%WINDOWS%]\stub_mma2.exe
[%WINDOWS%]\stub_track4.exe
[%WINDOWS%]\Uninstall.exe
[%WINDOWS%]\__delete_on_reboot__c_f_g_3_2_._e_x_e_
[%WINDOWS%]\stub_track3.exe
[%PROFILE_TEMP%]\temp.fr????
[%WINDOWS%]\cfg32.exe
[%WINDOWS%]\cfg32.ex_
[%WINDOWS%]\cfg32a.exe
[%WINDOWS%]\cfg32o.dll
[%WINDOWS%]\cfg32o.dll_tobedeleted
[%WINDOWS%]\cfg32r.dll
[%WINDOWS%]\cfg32s.dll
[%WINDOWS%]\cs_cache.ini
[%WINDOWS%]\stub_mma2.exe
[%WINDOWS%]\stub_track4.exe
[%WINDOWS%]\Uninstall.exe
[%WINDOWS%]\__delete_on_reboot__c_f_g_3_2_._e_x_e_
[%WINDOWS%]\stub_track3.exe

How to detect Scaggy:

Files:
[%PROFILE_TEMP%]\temp.fr????
[%WINDOWS%]\cfg32.exe
[%WINDOWS%]\cfg32.ex_
[%WINDOWS%]\cfg32a.exe
[%WINDOWS%]\cfg32o.dll
[%WINDOWS%]\cfg32o.dll_tobedeleted
[%WINDOWS%]\cfg32r.dll
[%WINDOWS%]\cfg32s.dll
[%WINDOWS%]\cs_cache.ini
[%WINDOWS%]\stub_mma2.exe
[%WINDOWS%]\stub_track4.exe
[%WINDOWS%]\Uninstall.exe
[%WINDOWS%]\__delete_on_reboot__c_f_g_3_2_._e_x_e_
[%WINDOWS%]\stub_track3.exe
[%PROFILE_TEMP%]\temp.fr????
[%WINDOWS%]\cfg32.exe
[%WINDOWS%]\cfg32.ex_
[%WINDOWS%]\cfg32a.exe
[%WINDOWS%]\cfg32o.dll
[%WINDOWS%]\cfg32o.dll_tobedeleted
[%WINDOWS%]\cfg32r.dll
[%WINDOWS%]\cfg32s.dll
[%WINDOWS%]\cs_cache.ini
[%WINDOWS%]\stub_mma2.exe
[%WINDOWS%]\stub_track4.exe
[%WINDOWS%]\Uninstall.exe
[%WINDOWS%]\__delete_on_reboot__c_f_g_3_2_._e_x_e_
[%WINDOWS%]\stub_track3.exe

Registry Keys:
HKEY_CLASSES_ROOT\appid\scaggy.dll
HKEY_CLASSES_ROOT\appid\{90a52f08-64ac-4dc6-9d7d-451667029898}
HKEY_CLASSES_ROOT\clsid\{c68ae9c0-0909-4ddc-b661-c1afb9f59898}
HKEY_CLASSES_ROOT\interface\{38493f7f-2922-4c6c-9a9a-8da2c940d0ee}
HKEY_CLASSES_ROOT\interface\{6c51f7e9-8542-4f25-a30f-2060157752e1}
HKEY_CLASSES_ROOT\scaggy.insert
HKEY_CLASSES_ROOT\scaggy.insert.1
HKEY_CLASSES_ROOT\typelib\{90a52f08-64ac-4dc6-9d7d-451667029898}
HKEY_CURRENT_USER\software\cfg32
HKEY_CURRENT_USER\software\zabstract
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C68AE9C0-0909-4DDC-B661-C1AFB9F59898}
HKEY_LOCAL_MACHINE\software\zabstract
HKEY_CLASSES_ROOT\typelib\{3277cd27-4001-4ef8-9d96-c6ca745ac2f9}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{c68ae9c0-0909-4ddc-b661-c1afb9f59898}

Registry Values:
HKEY_CURRENT_USER\software\cfg32\contextserver
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Scaggy:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
AQP Trojan Information
MoneyTree.DyFuCA Trojan Removal instruction

toolband BHO

Removing toolband
Categories: BHO,Toolbar
BHO (Browser Helper Object) Trojan.
The BHO waits for the user to post personal information to a monitored website.
As this information is entered by the user, it is captured by the BHO and sent back to the attacker.
The method of network transport used by the attacker makes this Trojan unique.
Typically, keyloggers of this type will send the stolen information back to the attacker via email
or HTTP POST, which can appear suspicious.
Instead, this Trojan encodes the data with a simple XOR algorithm before placing it into
the data section of an ICMP ping packet." explained the company.
Toolbar presents itself as a helpful add-on for Internet Explorer but it is a real pest.

How to detect toolband:

Registry Keys:
HKEY_CLASSES_ROOT\toolband.toolbandobj
HKEY_CLASSES_ROOT\clsid\{441354c5-409b-9a66-a11d6d4e1a22}
HKEY_CLASSES_ROOT\interface\{1aa58304-832c-47fd-8d20-48677243f9e1}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar\{0e1230f8-ea50-42a9-983c-d22abc2eed3b}

Removing toolband:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Cropo Trojan Information

Taposier Trojan

Removing Taposier
Categories: Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

How to detect Taposier:

Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\sv_chost

Removing Taposier:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Win32.Qoologic.bj Downloader Symptoms
WinAntiSpywareDown Downloader Removal instruction

EZToolbar Adware

Removing EZToolbar
Categories: Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\downloaded program files\potwbar.dll
[%WINDOWS%]\downloaded program files\potwbar.dll

How to detect EZToolbar:

Files:
[%WINDOWS%]\downloaded program files\potwbar.dll
[%WINDOWS%]\downloaded program files\potwbar.dll

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{4e7bd74f-2b8d-469e-c0ff-fd7ba09aaa7d}
HKEY_CLASSES_ROOT\potwbar.potwbar
HKEY_CURRENT_USER\software\dynamic toolbar\potwbar
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{4e7bd74f-2b8d-469e-c0ff-fd7ba09aaa7d}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{4e7bd74f-2b8d-469e-c0ff-fd7ba09aaa7d}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\potwbar

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar

Removing EZToolbar:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Removing OneClickNetSearch Trojan
Remove ScreenNameHackerV1 Trojan

FCHelp Adware

Removing FCHelp
Categories: Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits

How to detect FCHelp:

Folders:
[%PROGRAM_FILES%]\fcman
[%PROGRAM_FILES%]\fchelp

Registry Keys:
HKEY_CURRENT_USER\software\fcman
HKEY_CLASSES_ROOT\clsid\{994d478a-2bd0-4db4-288b1e346e99}
HKEY_LOCAL_MACHINE\software\typelib\{1b8b502e-465b-4022-be4f-fb6d9f808a18}

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run

Removing FCHelp:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Remove MySpaceBar.IE Hijacker
Pigeon.ABW Trojan Removal instruction
CWS.GonnaSearch BHO Cleaner
DialerActiveX Adware Symptoms
JS.Mijail Trojan Symptoms

Dark.Omen Spyware

Removing Dark.Omen
Categories: Spyware,Backdoor,RAT,Hacker Tool
Spyware is computer software that is installed surreptitiously on a personal computer
to with the computer, without the user's informed consent.
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
They function in the same way as legal remote administration programs used by system administrators.
This makes them difficult to detect.

Backdoors are installed and launched without the consent of the user of computer.
Often the backdoor will not be visible in the log of active programs.

Once a backdoor has been successfully launched, the computer is wide open.
Backdoor functions can include:


  • Launching/ deleting files

  • Sending/ receiving files

  • Deleting data

  • Displaying notification

  • Rebooting the machine

  • Executing files




Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.
Backdoors combine the functionality of most other types of in one package.

Backdoors have one especially dangerous sub-class: variants that can propagate like worms.
Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.
Exploits use vulnerabilities in operating systems and applications to achieve the same result.

Dark.Omen Also known as:

[Kaspersky]Backdoor.DarkSky.25,Trojan.Spy.DakrOmen.13,TrojanSpy.Win32.DakrOmen.13;
[McAfee]BackDoor-JA;
[F-Prot]destructive program,security risk named W32/DarkSky.B;
[Panda]Backdoor Program,Bck/DarkSky,Trojan Horse.LC;
[Computer Associates]Backdoor/DarkSky.25,Backdoor/DarkSky.250!Server,Win32.DarkSky.250

How to detect Dark.Omen:

Folders:
[%WINDOWS%]\directxupd

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices

Removing Dark.Omen:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Bancos.GKR Trojan Symptoms
Meredrop Trojan Symptoms
Remove Coulomb Adware

Syscerun Adware

Removing Syscerun
Categories: Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.


Syscerun Also known as:

[Kaspersky]Virus.Win32.VB.av,Virus.Win32.VB;
[Other]Trojan.AdClicker

How to detect Syscerun:

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Syscerun:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Subadown Trojan Cleaner
TrafficHog Adware Symptoms
Sybuex Trojan Information
Removing Silly Trojan
Remove Ac3 Downloader

WhenU.WeatherCast Adware

Removing WhenU.WeatherCast
Categories: Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.


WhenU.WeatherCast Also known as:

[Panda]Adware/SaveNow,Adware/WeatherCast

Visible Symptoms:
Files in system folders:
[%PROGRAM_FILES%]\DAEMON Tools SearchBar\search.htm
[%PROGRAM_FILES%]\weathe~1\weather.exe
[%PROGRAM_FILES%]\WhenUSearch\search.htm
[%WINDOWS%]\downloaded program files\saveinst.inf
[%WINDOWS%]\downloaded program files\sndbmark.dll
[%PROGRAM_FILES%]\aws\weathercast\lfcmp10n.dll
[%PROGRAM_FILES%]\aws\weathercast\lfimg10n.dll
[%PROGRAM_FILES%]\aws\weathercast\ltdis10n.dll
[%PROGRAM_FILES%]\aws\weathercast\ltfil10n.dll
[%PROGRAM_FILES%]\aws\weathercast\ltkrn10n.dll
[%WINDOWS%]\downloaded program files\conflict.1\sndbmark.dll
[%WINDOWS%]\downloaded program files\conflict.2\sndbmark.dll
[%WINDOWS%]\dowssnloaded program files\sndbmark.dll
[%WINDOWS%]\temp\icd1.tmp\sndbmark.dll
[%PROGRAM_FILES%]\DAEMON Tools SearchBar\search.htm
[%PROGRAM_FILES%]\weathe~1\weather.exe
[%PROGRAM_FILES%]\WhenUSearch\search.htm
[%WINDOWS%]\downloaded program files\saveinst.inf
[%WINDOWS%]\downloaded program files\sndbmark.dll
[%PROGRAM_FILES%]\aws\weathercast\lfcmp10n.dll
[%PROGRAM_FILES%]\aws\weathercast\lfimg10n.dll
[%PROGRAM_FILES%]\aws\weathercast\ltdis10n.dll
[%PROGRAM_FILES%]\aws\weathercast\ltfil10n.dll
[%PROGRAM_FILES%]\aws\weathercast\ltkrn10n.dll
[%WINDOWS%]\downloaded program files\conflict.1\sndbmark.dll
[%WINDOWS%]\downloaded program files\conflict.2\sndbmark.dll
[%WINDOWS%]\dowssnloaded program files\sndbmark.dll
[%WINDOWS%]\temp\icd1.tmp\sndbmark.dll

How to detect WhenU.WeatherCast:

Files:
[%PROGRAM_FILES%]\DAEMON Tools SearchBar\search.htm
[%PROGRAM_FILES%]\weathe~1\weather.exe
[%PROGRAM_FILES%]\WhenUSearch\search.htm
[%WINDOWS%]\downloaded program files\saveinst.inf
[%WINDOWS%]\downloaded program files\sndbmark.dll
[%PROGRAM_FILES%]\aws\weathercast\lfcmp10n.dll
[%PROGRAM_FILES%]\aws\weathercast\lfimg10n.dll
[%PROGRAM_FILES%]\aws\weathercast\ltdis10n.dll
[%PROGRAM_FILES%]\aws\weathercast\ltfil10n.dll
[%PROGRAM_FILES%]\aws\weathercast\ltkrn10n.dll
[%WINDOWS%]\downloaded program files\conflict.1\sndbmark.dll
[%WINDOWS%]\downloaded program files\conflict.2\sndbmark.dll
[%WINDOWS%]\dowssnloaded program files\sndbmark.dll
[%WINDOWS%]\temp\icd1.tmp\sndbmark.dll
[%PROGRAM_FILES%]\DAEMON Tools SearchBar\search.htm
[%PROGRAM_FILES%]\weathe~1\weather.exe
[%PROGRAM_FILES%]\WhenUSearch\search.htm
[%WINDOWS%]\downloaded program files\saveinst.inf
[%WINDOWS%]\downloaded program files\sndbmark.dll
[%PROGRAM_FILES%]\aws\weathercast\lfcmp10n.dll
[%PROGRAM_FILES%]\aws\weathercast\lfimg10n.dll
[%PROGRAM_FILES%]\aws\weathercast\ltdis10n.dll
[%PROGRAM_FILES%]\aws\weathercast\ltfil10n.dll
[%PROGRAM_FILES%]\aws\weathercast\ltkrn10n.dll
[%WINDOWS%]\downloaded program files\conflict.1\sndbmark.dll
[%WINDOWS%]\downloaded program files\conflict.2\sndbmark.dll
[%WINDOWS%]\dowssnloaded program files\sndbmark.dll
[%WINDOWS%]\temp\icd1.tmp\sndbmark.dll

Folders:
[%PROGRAMS%]\weathercast
[%PROGRAM_FILES_COMMON%]\whenu
[%PROGRAM_FILES%]\vvsn
[%PROGRAM_FILES%]\weathercast
[%STARTMENU%]\programs\weathercast
[%PROFILE%]\start menu\programs\weathercast
[%PROGRAMS%]\start menu\programs\weathercast
[%PROGRAM_FILES%]\common files\whenu
[%PROGRAM_FILES%]\start menu\programs\weathercast
[%WINDOWS%]\start menu\programs\weathercast

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{389a5a59-1306-4389-a779-2eb9d0bc1ffb}
HKEY_CLASSES_ROOT\interface\{711648f0-5ff5-4c81-805e-a1aedbab4951}
HKEY_CLASSES_ROOT\typelib\{20752c25-2d97-4e6f-9ee2-94b74d202875}\1.0
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\weathercast
HKEY_CLASSES_ROOT\clsid\{fc327b3f-377b-4cb7-8b61-27cd69816bc3}
HKEY_CLASSES_ROOT\clsid\{fc327b3f-377b-4cb7-8b61-27cd69816bc}
HKEY_CLASSES_ROOT\whenu.embedse
HKEY_CLASSES_ROOT\whenu.embedse.1
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{fc327b3f-377b-4cb7-8b61-27cd69816bc3}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]\downloaded program files\sndbmark.dll

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls
HKEY_USERS\.default\software\microsoft\windows\currentversion\run

Removing WhenU.WeatherCast:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
SpySpotter Ransomware Cleaner
Maxifiles Adware Cleaner
Removing Sys.Detective+ Spyware
Banich Trojan Removal instruction
AntivirusGolden Ransomware Removal instruction

Yazzle.Active Adware

Removing Yazzle.Active
Categories: Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits

How to detect Yazzle.Active:

Registry Keys:
HKEY_CLASSES_ROOT\typelib\{95c2547b-0785-4278-9aea-ce65d78d853d}

Registry Values:
HKEY_CLASSES_ROOT\interface\{665ac8e7-8b9b-40d9-a24d-c134052b6168}\typelib
HKEY_CLASSES_ROOT\interface\{665ac8e7-8b9b-40d9-a24d-c134052b6168}\typelib

Removing Yazzle.Active:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
BLHouse Trojan Cleaner
Remove hitvirus Ransomware

BAT.Ekizbot Hostile Code

Removing BAT.Ekizbot
Categories: Hostile Code
Hostile code is any process running on a system that is
not authorized by the system administrator, such as Trojans, viruses, or spyware.

How to detect BAT.Ekizbot:

Registry Keys:
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\abel

Removing BAT.Ekizbot:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Townews Adware Symptoms
Shockdown Downloader Symptoms
Kuku Trojan Symptoms
DarkSky.Server Trojan Removal

SpyDldr.J Trojan

Removing SpyDldr.J
Categories: Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Visible Symptoms:
Files in system folders:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Antispyware Soldier.lnk
[%DESKTOP%]\Antispyware Soldier.lnk
[%PROFILE%]\cmd.exe
[%PROFILE%]\start
[%PROGRAM_FILES%]\Antispyware Soldier\antispysoldier.url
[%PROGRAM_FILES%]\Antispyware Soldier\unins000.dat
[%STARTUP%]\antispysoldier.lnk
[%SYSTEM%]\a.exe
[%SYSTEM%]\alxres.dll
[%SYSTEM%]\bridge.dll
[%SYSTEM%]\dailytoolbar.dll
[%SYSTEM%]\jao.dll
[%SYSTEM%]\lfd.dat
[%SYSTEM%]\oiso.bin
[%SYSTEM%]\questmod.dll
[%SYSTEM%]\runsrv32.dll
[%SYSTEM%]\runsrv32.exe
[%SYSTEM%]\sumsw32.exe
[%SYSTEM%]\SUSP.exe
[%SYSTEM%]\tcpservice2.exe
[%SYSTEM%]\txfdb32.dll
[%SYSTEM%]\udpmod.dll
[%SYSTEM%]\wstart.dll
[%WINDOWS%]\alexaie.dll
[%WINDOWS%]\alxie328.dll
[%WINDOWS%]\alxtb1.dll
[%WINDOWS%]\bg_bg.gif
[%WINDOWS%]\big_red_x.gif
[%WINDOWS%]\BTGrab.dll
[%WINDOWS%]\buy_now.gif
[%WINDOWS%]\click_for_free_scan.gif
[%WINDOWS%]\close_ico.gif
[%WINDOWS%]\dlmax.dll
[%WINDOWS%]\download.gif
[%WINDOWS%]\download_product.gif
[%WINDOWS%]\free_scan_red_btn.gif
[%WINDOWS%]\icon_warning_big.gif
[%WINDOWS%]\infected_top_bg.gif
[%WINDOWS%]\logo.gif
[%WINDOWS%]\navibar_bg.gif
[%WINDOWS%]\navibar_corner_left.gif
[%WINDOWS%]\navibar_corner_right.gif
[%WINDOWS%]\product_box.gif
[%WINDOWS%]\Pynix.dll
[%WINDOWS%]\red_warning_ico.gif
[%WINDOWS%]\remove_spyware_header.gif
[%WINDOWS%]\safe_and_trusted.gif
[%WINDOWS%]\spyware_detected.gif
[%WINDOWS%]\susp.exe
[%WINDOWS%]\yellow_warning_ico.gif
[%WINDOWS%]\yod.htm
[%WINDOWS%]\ZServ.dll
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Antispyware Soldier.lnk
[%DESKTOP%]\Antispyware Soldier.lnk
[%PROFILE%]\cmd.exe
[%PROFILE%]\start
[%PROGRAM_FILES%]\Antispyware Soldier\antispysoldier.url
[%PROGRAM_FILES%]\Antispyware Soldier\unins000.dat
[%STARTUP%]\antispysoldier.lnk
[%SYSTEM%]\a.exe
[%SYSTEM%]\alxres.dll
[%SYSTEM%]\bridge.dll
[%SYSTEM%]\dailytoolbar.dll
[%SYSTEM%]\jao.dll
[%SYSTEM%]\lfd.dat
[%SYSTEM%]\oiso.bin
[%SYSTEM%]\questmod.dll
[%SYSTEM%]\runsrv32.dll
[%SYSTEM%]\runsrv32.exe
[%SYSTEM%]\sumsw32.exe
[%SYSTEM%]\SUSP.exe
[%SYSTEM%]\tcpservice2.exe
[%SYSTEM%]\txfdb32.dll
[%SYSTEM%]\udpmod.dll
[%SYSTEM%]\wstart.dll
[%WINDOWS%]\alexaie.dll
[%WINDOWS%]\alxie328.dll
[%WINDOWS%]\alxtb1.dll
[%WINDOWS%]\bg_bg.gif
[%WINDOWS%]\big_red_x.gif
[%WINDOWS%]\BTGrab.dll
[%WINDOWS%]\buy_now.gif
[%WINDOWS%]\click_for_free_scan.gif
[%WINDOWS%]\close_ico.gif
[%WINDOWS%]\dlmax.dll
[%WINDOWS%]\download.gif
[%WINDOWS%]\download_product.gif
[%WINDOWS%]\free_scan_red_btn.gif
[%WINDOWS%]\icon_warning_big.gif
[%WINDOWS%]\infected_top_bg.gif
[%WINDOWS%]\logo.gif
[%WINDOWS%]\navibar_bg.gif
[%WINDOWS%]\navibar_corner_left.gif
[%WINDOWS%]\navibar_corner_right.gif
[%WINDOWS%]\product_box.gif
[%WINDOWS%]\Pynix.dll
[%WINDOWS%]\red_warning_ico.gif
[%WINDOWS%]\remove_spyware_header.gif
[%WINDOWS%]\safe_and_trusted.gif
[%WINDOWS%]\spyware_detected.gif
[%WINDOWS%]\susp.exe
[%WINDOWS%]\yellow_warning_ico.gif
[%WINDOWS%]\yod.htm
[%WINDOWS%]\ZServ.dll

How to detect SpyDldr.J:

Files:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Antispyware Soldier.lnk
[%DESKTOP%]\Antispyware Soldier.lnk
[%PROFILE%]\cmd.exe
[%PROFILE%]\start
[%PROGRAM_FILES%]\Antispyware Soldier\antispysoldier.url
[%PROGRAM_FILES%]\Antispyware Soldier\unins000.dat
[%STARTUP%]\antispysoldier.lnk
[%SYSTEM%]\a.exe
[%SYSTEM%]\alxres.dll
[%SYSTEM%]\bridge.dll
[%SYSTEM%]\dailytoolbar.dll
[%SYSTEM%]\jao.dll
[%SYSTEM%]\lfd.dat
[%SYSTEM%]\oiso.bin
[%SYSTEM%]\questmod.dll
[%SYSTEM%]\runsrv32.dll
[%SYSTEM%]\runsrv32.exe
[%SYSTEM%]\sumsw32.exe
[%SYSTEM%]\SUSP.exe
[%SYSTEM%]\tcpservice2.exe
[%SYSTEM%]\txfdb32.dll
[%SYSTEM%]\udpmod.dll
[%SYSTEM%]\wstart.dll
[%WINDOWS%]\alexaie.dll
[%WINDOWS%]\alxie328.dll
[%WINDOWS%]\alxtb1.dll
[%WINDOWS%]\bg_bg.gif
[%WINDOWS%]\big_red_x.gif
[%WINDOWS%]\BTGrab.dll
[%WINDOWS%]\buy_now.gif
[%WINDOWS%]\click_for_free_scan.gif
[%WINDOWS%]\close_ico.gif
[%WINDOWS%]\dlmax.dll
[%WINDOWS%]\download.gif
[%WINDOWS%]\download_product.gif
[%WINDOWS%]\free_scan_red_btn.gif
[%WINDOWS%]\icon_warning_big.gif
[%WINDOWS%]\infected_top_bg.gif
[%WINDOWS%]\logo.gif
[%WINDOWS%]\navibar_bg.gif
[%WINDOWS%]\navibar_corner_left.gif
[%WINDOWS%]\navibar_corner_right.gif
[%WINDOWS%]\product_box.gif
[%WINDOWS%]\Pynix.dll
[%WINDOWS%]\red_warning_ico.gif
[%WINDOWS%]\remove_spyware_header.gif
[%WINDOWS%]\safe_and_trusted.gif
[%WINDOWS%]\spyware_detected.gif
[%WINDOWS%]\susp.exe
[%WINDOWS%]\yellow_warning_ico.gif
[%WINDOWS%]\yod.htm
[%WINDOWS%]\ZServ.dll
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Antispyware Soldier.lnk
[%DESKTOP%]\Antispyware Soldier.lnk
[%PROFILE%]\cmd.exe
[%PROFILE%]\start
[%PROGRAM_FILES%]\Antispyware Soldier\antispysoldier.url
[%PROGRAM_FILES%]\Antispyware Soldier\unins000.dat
[%STARTUP%]\antispysoldier.lnk
[%SYSTEM%]\a.exe
[%SYSTEM%]\alxres.dll
[%SYSTEM%]\bridge.dll
[%SYSTEM%]\dailytoolbar.dll
[%SYSTEM%]\jao.dll
[%SYSTEM%]\lfd.dat
[%SYSTEM%]\oiso.bin
[%SYSTEM%]\questmod.dll
[%SYSTEM%]\runsrv32.dll
[%SYSTEM%]\runsrv32.exe
[%SYSTEM%]\sumsw32.exe
[%SYSTEM%]\SUSP.exe
[%SYSTEM%]\tcpservice2.exe
[%SYSTEM%]\txfdb32.dll
[%SYSTEM%]\udpmod.dll
[%SYSTEM%]\wstart.dll
[%WINDOWS%]\alexaie.dll
[%WINDOWS%]\alxie328.dll
[%WINDOWS%]\alxtb1.dll
[%WINDOWS%]\bg_bg.gif
[%WINDOWS%]\big_red_x.gif
[%WINDOWS%]\BTGrab.dll
[%WINDOWS%]\buy_now.gif
[%WINDOWS%]\click_for_free_scan.gif
[%WINDOWS%]\close_ico.gif
[%WINDOWS%]\dlmax.dll
[%WINDOWS%]\download.gif
[%WINDOWS%]\download_product.gif
[%WINDOWS%]\free_scan_red_btn.gif
[%WINDOWS%]\icon_warning_big.gif
[%WINDOWS%]\infected_top_bg.gif
[%WINDOWS%]\logo.gif
[%WINDOWS%]\navibar_bg.gif
[%WINDOWS%]\navibar_corner_left.gif
[%WINDOWS%]\navibar_corner_right.gif
[%WINDOWS%]\product_box.gif
[%WINDOWS%]\Pynix.dll
[%WINDOWS%]\red_warning_ico.gif
[%WINDOWS%]\remove_spyware_header.gif
[%WINDOWS%]\safe_and_trusted.gif
[%WINDOWS%]\spyware_detected.gif
[%WINDOWS%]\susp.exe
[%WINDOWS%]\yellow_warning_ico.gif
[%WINDOWS%]\yod.htm
[%WINDOWS%]\ZServ.dll

Folders:
[%COMMON_PROGRAMS%]\Antispyware Soldier
[%PROGRAM_FILES%]\Antispyware Soldier

Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{00000000-59D4-4008-9058-080011001200}
HKEY_CLASSES_ROOT\CLSID\{00000000-C1EC-0345-6EC2-4D0300000000}
HKEY_CLASSES_ROOT\CLSID\{00000000-F09C-02B4-6EC2-AD0300000000}
HKEY_CLASSES_ROOT\CLSID\{3ceff6cd-6f08-4e4d-bccd-ff7415288c3b}
HKEY_CLASSES_ROOT\CLSID\{7b55bb05-0b4d-44fd-81a6-b136188f5deb}
HKEY_CLASSES_ROOT\CLSID\{8333C319-0669-4893-A418-F56D9249FCA6}
HKEY_CLASSES_ROOT\CLSID\{E52DEDBB-D168-4BDB-B229-C48160800E81}
HKEY_CURRENT_USER\Software\ADV
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00000000-59D4-4008-9058-080011001200}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00000000-C1EC-0345-6EC2-4D0300000000}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00000000-F09C-02B4-6EC2-AD0300000000}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3ceff6cd-6f08-4e4d-bccd-ff7415288c3b}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7b55bb05-0b4d-44fd-81a6-b136188f5deb}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8333c319-0669-4893-a418-f56d9249fca6}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9c691a33-7dda-4c2f-be4c-c176083f35cf}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e52dedbb-d168-4bdb-b229-c48160800e81}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ffd2825e-0785-40c5-9a41-518f53a8261f}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Antispyware Soldier_is1

Registry Values:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

Removing SpyDldr.J:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Conistall Trojan Cleaner

Sears.com Spyware

Removing Sears.com
Categories: Spyware
Spyware programs can collect various types of personal information,
such as Internet surfing habit, sites that have been visited,
but can also interfere with user control of the computer in other ways,
such as installing additional software, redirecting Web browser activity,
accessing websites blindly that will cause more harmful viruses,
or diverting advertising revenue to a third party.

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\srhc.exe
[%SYSTEM%]\srls.dll
[%SYSTEM%]\srls.dl_
[%SYSTEM%]\srph.dll
[%SYSTEM%]\srhc.exe
[%SYSTEM%]\srls.dll
[%SYSTEM%]\srls.dl_
[%SYSTEM%]\srph.dll

How to detect Sears.com:

Files:
[%SYSTEM%]\srhc.exe
[%SYSTEM%]\srls.dll
[%SYSTEM%]\srls.dl_
[%SYSTEM%]\srph.dll
[%SYSTEM%]\srhc.exe
[%SYSTEM%]\srls.dll
[%SYSTEM%]\srls.dl_
[%SYSTEM%]\srph.dll

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{2e4a92ab-f2c0-456a-9935-b715439790d7}
HKEY_CLASSES_ROOT\typelib\{0156ca3c-89c4-4d1d-8eb1-aaf4588b929b}
HKEY_CURRENT_USER\software\netsetterconfig
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{2e4a92ab-f2c0-456a-9935-b715439790d7}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{a1edb681-9002-4e83-9074-98848f56baaf}

Registry Values:
HKEY_CLASSES_ROOT\appid\csetup.dll
HKEY_CLASSES_ROOT\interface\{1e24e145-d17c-4343-bb61-83b515f3cf53}\typelib
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata\s-1-5-21-1659004503-2077806209-839522115-500\components\87654321432143212143214365870921
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%SYSTEM%]/cinstaller_xp.msi
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%SYSTEM%]/cinstaller_xp.msi
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]/downloaded program files/csetup.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]/downloaded program files/csetup.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls

Removing Sears.com:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Wollf Trojan Cleaner
Snap Toolbar Cleaner

Reload Backdoor

Removing Reload
Categories: Backdoor
Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.


Reload Also known as:

[Other]Win32/Reload.A,BKDR_RELOAD.D,W32/Reload.W

Visible Symptoms:
Files in system folders:
[%PROFILE_TEMP%]\kenaux.jpg
[%PROFILE_TEMP%]\serwer.exe
[%SYSTEM%]\schost31.exe
[%PROFILE_TEMP%]\kenaux.jpg
[%PROFILE_TEMP%]\serwer.exe
[%SYSTEM%]\schost31.exe

How to detect Reload:

Files:
[%PROFILE_TEMP%]\kenaux.jpg
[%PROFILE_TEMP%]\serwer.exe
[%SYSTEM%]\schost31.exe
[%PROFILE_TEMP%]\kenaux.jpg
[%PROFILE_TEMP%]\serwer.exe
[%SYSTEM%]\schost31.exe

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Reload:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
KBDPQL1 BHO Cleaner
Cibleclick Tracking Cookie Cleaner
SmartPops Adware Cleaner
Remove TrojanDownloader.Win32.Dluca Trojan

Donise Trojan

Removing Donise
Categories: Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Donise Also known as:

[Kaspersky]Trojan-Clicker.Win32.Small.cc;
[Other]Win32/Donise.D

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\zlysz.dll
[%SYSTEM%]\zqhy.dll
[%SYSTEM%]\zlysz.dll
[%SYSTEM%]\zqhy.dll

How to detect Donise:

Files:
[%SYSTEM%]\zlysz.dll
[%SYSTEM%]\zqhy.dll
[%SYSTEM%]\zlysz.dll
[%SYSTEM%]\zqhy.dll

Removing Donise:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
UCSearch Downloader Cleaner
BrowserToolbar Adware Removal instruction
Trust.Cleaner Ransomware Removal instruction
GameBar Adware Cleaner
Remove SillyDl.BBM Trojan

Diallegit Adware

Removing Diallegit
Categories: Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.


Diallegit Also known as:

[Kaspersky]Trojan.Win32.Dialer.rt;
[Other]Trojan.Linkoptimizer.B

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\msmmi.exe
[%SYSTEM%]\msmmi.exe

How to detect Diallegit:

Files:
[%SYSTEM%]\msmmi.exe
[%SYSTEM%]\msmmi.exe

Registry Keys:
HKEY_LOCAL_MACHINE\software\msmmi

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Diallegit:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Removing Unknown Trojan
Removing Donnic Trojan
Ransom Trojan Symptoms
Hornet Backdoor Cleaner
BackDoor Trojan Information

Eclypse Backdoor

Removing Eclypse
Categories: Backdoor,RAT
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
They function in the same way as legal remote administration programs used by system administrators.
This makes them difficult to detect.

Backdoors are installed and launched without the consent of the user of computer.
Often the backdoor will not be visible in the log of active programs.

Once a backdoor has been successfully launched, the computer is wide open.
Backdoor functions can include:


  • Launching/ deleting files

  • Sending/ receiving files

  • Deleting data

  • Displaying notification

  • Rebooting the machine

  • Executing files




Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.
Backdoors combine the functionality of most other types of in one package.

Backdoors have one especially dangerous sub-class: variants that can propagate like worms.
Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.

Eclypse Also known as:

[Kaspersky]Backdoor.Eclypse;
[McAfee]BackDoor-EQ;
[F-Prot]W32/Backdoor.Eclyp;
[Panda]Bck/Eclypse.I,Bck/Eclypse.II;
[Computer Associates]Backdoor/Eclypse_2.0!Client,Backdoor/Eclypse_2.0!Server

How to detect Eclypse:

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Eclypse:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Pigeon.AVEY Trojan Symptoms
Remove GloboSearch Trojan

Pynix Adware

Removing Pynix
Categories: Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.


Visible Symptoms:
Files in system folders:
[%PROFILE_TEMP%]\THI3382.tmp\Pynix.inf
[%PROFILE_TEMP%]\THI7537.tmp\Pynix.inf
[%PROFILE_TEMP%]\THI3382.tmp\Pynix.inf
[%PROFILE_TEMP%]\THI7537.tmp\Pynix.inf

How to detect Pynix:

Files:
[%PROFILE_TEMP%]\THI3382.tmp\Pynix.inf
[%PROFILE_TEMP%]\THI7537.tmp\Pynix.inf
[%PROFILE_TEMP%]\THI3382.tmp\Pynix.inf
[%PROFILE_TEMP%]\THI7537.tmp\Pynix.inf

Removing Pynix:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Avalent Trojan Symptoms
Windows.Family.Safety Spyware Symptoms
Triple.Threat Hostile Code Cleaner
Adware.MokeAd Trojan Removal instruction
Remove Bancos.GAM Trojan

Webdesk Trojan

Removing Webdesk
Categories: Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Webdesk Also known as:

[Kaspersky]Trojan-Dropper.Win32.Agent.azv,Trojan-Downloader.Win32.Agent.bch;
[McAfee]Webdesk.dr;
[F-Prot]W32/Dropper.DKJ;
[Other]Trojan.VirusKiller

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\webdesk.dll
[%SYSTEM%]\webdesk.dll

How to detect Webdesk:

Files:
[%SYSTEM%]\webdesk.dll
[%SYSTEM%]\webdesk.dll

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{ad42064f-2c53-cb42-1263-6a7f24c2b819}
HKEY_CLASSES_ROOT\clsid\{bd2e165d-1bc6-23aa-345b-1c234f173cbd}
HKEY_CLASSES_ROOT\interface\{bda8125f-55ca-4168-6d9a-168e76c11abd}
HKEY_CLASSES_ROOT\typelib\{8e28de0a-6a2e-4cb8-bbf0-bd131dc1a3b4}
HKEY_CLASSES_ROOT\webdesk.webq
HKEY_CLASSES_ROOT\webdesk.webq.1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{ad42064f-2c53-cb42-1263-6a7f24c2b819}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{bd2e165d-1bc6-23aa-345b-1c234f173cbd}

Removing Webdesk:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
DeskAlerts Adware Information
PopUp.Network Hijacker Cleaner
UpSpiral Toolbar Removal
Removing SaferScan Adware

Private.Eye Spyware

Removing Private.Eye
Categories: Spyware
Spyware programs can collect various types of personal information,
such as Internet surfing habit, sites that have been visited,
but can also interfere with user control of the computer in other ways,
such as installing additional software, redirecting Web browser activity,
accessing websites blindly that will cause more harmful viruses,
or diverting advertising revenue to a third party.

Visible Symptoms:
Files in system folders:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Private Eye 2004.lnk
[%DESKTOP%]\pit.exe
[%DESKTOP%]\Private Eye 2004.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Private Eye 2004.lnk
[%DESKTOP%]\pit.exe
[%DESKTOP%]\Private Eye 2004.lnk

How to detect Private.Eye:

Files:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Private Eye 2004.lnk
[%DESKTOP%]\pit.exe
[%DESKTOP%]\Private Eye 2004.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Private Eye 2004.lnk
[%DESKTOP%]\pit.exe
[%DESKTOP%]\Private Eye 2004.lnk

Folders:
[%PROGRAMS%]\Private Eye 2004

Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\private eye 2004_is1

Removing Private.Eye:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
LMD Trojan Removal

System61 BHO

Removing System61
Categories: BHO,Hijacker,Toolbar
As this information is entered by the user, it is captured by the BHO (Browser Helper Object) and
sent back to the attacker.
Typically, keyloggers of this type will send the stolen information back to the attacker via email
or HTTP POST, which can appear suspicious.Hijackers take control of various parts of your web browser, including your home page,
search pages, and search bar. They may also redirect you to certain sites should you
mistype an address or prevent you from going to a website they would rather you not,
such as sites that combat malware. Some will even redirect you to their own search engine
when you attempt a search.
Toolbar presents itself as a helpful add-on for Internet Explorer but it is a real pest.

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\system61.dll
[%WINDOWS%]\system\system61.dll
[%SYSTEM%]\system61.dll
[%WINDOWS%]\system\system61.dll

How to detect System61:

Files:
[%SYSTEM%]\system61.dll
[%WINDOWS%]\system\system61.dll
[%SYSTEM%]\system61.dll
[%WINDOWS%]\system\system61.dll

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{c7967580-5f17-11d4-aac2-0000b4936e0c}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{c7967580-5f17-11d4-aac2-0000b4936e0c}
HKEY_LOCAL_MACHINE\software\classes\clsid\{c7967580-5f17-11d4-aac2-0000b4936e0c}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{c7967580-5f17-11d4-aac2-0000b4936e0c}

Removing System61:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Pigeon.EHP Trojan Removal
IROffer.2b9 Backdoor Cleaner

Spy Guard Ransomware

Removing Spy Guard
Categories: Ransomware
The term ransomware is commonly used to describe such software,
although the field known as cryptovirology predates the term "ransomware".

This type of ransom attack can be accomplished by (for example) attaching
a specially crafted file/program to an e-mail message and sending this to the victim.

How to detect Spy Guard:

Registry Values:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Removing Spy Guard:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
H3ll.Messenger DoS Removal
Zlob.Fam.VideoAccessCodec Trojan Symptoms
Zetronic RAT Information
Removing CommAd Adware

Cracking.Tool Trojan

Removing Cracking.Tool
Categories: Trojan,Worm,Backdoor,Hacker Tool
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Many of the worms which managed to cause significant outbreaks use more then
one propagation method as well as more than one infection technique.

Backdoors are used by virus writers to detect and download confidential information,
execute malicious code, destroy data, include the machine in bot networks and so forth.

Exploits use vulnerabilities in operating systems and applications to achieve the same result.

Cracking.Tool Also known as:

[Kaspersky]packed: Apack,packed: ASPack,packed: Com2Exe,packed: WWPACK;
[F-Prot]->mainskin.ini

Visible Symptoms:
Files in system folders:
[%DESKTOP%]\delete me\MIDI'S Midi\Bangles-egyptian.mid
[%DESKTOP%]\Desktop\Games\Ghost Recon\ghostr\bps-0wnz.nfo
[%DESKTOP%]\disco diego\PC\Stwars_Galactic_Battlegrounds\bps-0wnz.nfo
[%DESKTOP%]\Nachox\Escritorio\Propietario\Escritorio\NaChOx\cool\bps-0wnz.nfo
[%PROFILE%]\Shared\PC Games - Ghost Recon\ghostr\bps-0wnz.nfo
[%PROFILE_TEMP%]\Temporary Directory 1 for (pc games) Age Of Empires 2 The Conquerors Expansion.also full aoe2.zip\airforceone.nfo
[%PROFILE_TEMP%]\Temporary Directory 1 for (pc games) Age Of Empires 2 The Conquerors Expansion.also full aoe2.zip\airforceone.nfo
[%PROFILE_TEMP%]\Temporary Directory 1 for Ring Tones For all nextels that take ringtones(1).zip\Ring Tones For all nextels that take ringtones\Bangles\walk_like_an_egyptian.mid
[%PROFILE_TEMP%]\Temporary Directory 2 for (pc games) Age Of Empires 2 The Conquerors Expansion.also full aoe2.zip\airforceone.nfo
[%PROGRAM_FILES%]\Music Station\shared\(pc games) Age Of Empires 2 The Conquerors Expansion\airforceone.nfo
[%PROGRAM_FILES%]\PROGRAMMING TOOLS\CrackersKit\CrackersKit2\Patchers\PELG\PCNFO.EXE
[%DESKTOP%]\delete me\MIDI'S Midi\Bangles-egyptian.mid
[%DESKTOP%]\Desktop\Games\Ghost Recon\ghostr\bps-0wnz.nfo
[%DESKTOP%]\disco diego\PC\Stwars_Galactic_Battlegrounds\bps-0wnz.nfo
[%DESKTOP%]\Nachox\Escritorio\Propietario\Escritorio\NaChOx\cool\bps-0wnz.nfo
[%PROFILE%]\Shared\PC Games - Ghost Recon\ghostr\bps-0wnz.nfo
[%PROFILE_TEMP%]\Temporary Directory 1 for (pc games) Age Of Empires 2 The Conquerors Expansion.also full aoe2.zip\airforceone.nfo
[%PROFILE_TEMP%]\Temporary Directory 1 for (pc games) Age Of Empires 2 The Conquerors Expansion.also full aoe2.zip\airforceone.nfo
[%PROFILE_TEMP%]\Temporary Directory 1 for Ring Tones For all nextels that take ringtones(1).zip\Ring Tones For all nextels that take ringtones\Bangles\walk_like_an_egyptian.mid
[%PROFILE_TEMP%]\Temporary Directory 2 for (pc games) Age Of Empires 2 The Conquerors Expansion.also full aoe2.zip\airforceone.nfo
[%PROGRAM_FILES%]\Music Station\shared\(pc games) Age Of Empires 2 The Conquerors Expansion\airforceone.nfo
[%PROGRAM_FILES%]\PROGRAMMING TOOLS\CrackersKit\CrackersKit2\Patchers\PELG\PCNFO.EXE

How to detect Cracking.Tool:

Files:
[%DESKTOP%]\delete me\MIDI'S Midi\Bangles-egyptian.mid
[%DESKTOP%]\Desktop\Games\Ghost Recon\ghostr\bps-0wnz.nfo
[%DESKTOP%]\disco diego\PC\Stwars_Galactic_Battlegrounds\bps-0wnz.nfo
[%DESKTOP%]\Nachox\Escritorio\Propietario\Escritorio\NaChOx\cool\bps-0wnz.nfo
[%PROFILE%]\Shared\PC Games - Ghost Recon\ghostr\bps-0wnz.nfo
[%PROFILE_TEMP%]\Temporary Directory 1 for (pc games) Age Of Empires 2 The Conquerors Expansion.also full aoe2.zip\airforceone.nfo
[%PROFILE_TEMP%]\Temporary Directory 1 for (pc games) Age Of Empires 2 The Conquerors Expansion.also full aoe2.zip\airforceone.nfo
[%PROFILE_TEMP%]\Temporary Directory 1 for Ring Tones For all nextels that take ringtones(1).zip\Ring Tones For all nextels that take ringtones\Bangles\walk_like_an_egyptian.mid
[%PROFILE_TEMP%]\Temporary Directory 2 for (pc games) Age Of Empires 2 The Conquerors Expansion.also full aoe2.zip\airforceone.nfo
[%PROGRAM_FILES%]\Music Station\shared\(pc games) Age Of Empires 2 The Conquerors Expansion\airforceone.nfo
[%PROGRAM_FILES%]\PROGRAMMING TOOLS\CrackersKit\CrackersKit2\Patchers\PELG\PCNFO.EXE
[%DESKTOP%]\delete me\MIDI'S Midi\Bangles-egyptian.mid
[%DESKTOP%]\Desktop\Games\Ghost Recon\ghostr\bps-0wnz.nfo
[%DESKTOP%]\disco diego\PC\Stwars_Galactic_Battlegrounds\bps-0wnz.nfo
[%DESKTOP%]\Nachox\Escritorio\Propietario\Escritorio\NaChOx\cool\bps-0wnz.nfo
[%PROFILE%]\Shared\PC Games - Ghost Recon\ghostr\bps-0wnz.nfo
[%PROFILE_TEMP%]\Temporary Directory 1 for (pc games) Age Of Empires 2 The Conquerors Expansion.also full aoe2.zip\airforceone.nfo
[%PROFILE_TEMP%]\Temporary Directory 1 for (pc games) Age Of Empires 2 The Conquerors Expansion.also full aoe2.zip\airforceone.nfo
[%PROFILE_TEMP%]\Temporary Directory 1 for Ring Tones For all nextels that take ringtones(1).zip\Ring Tones For all nextels that take ringtones\Bangles\walk_like_an_egyptian.mid
[%PROFILE_TEMP%]\Temporary Directory 2 for (pc games) Age Of Empires 2 The Conquerors Expansion.also full aoe2.zip\airforceone.nfo
[%PROGRAM_FILES%]\Music Station\shared\(pc games) Age Of Empires 2 The Conquerors Expansion\airforceone.nfo
[%PROGRAM_FILES%]\PROGRAMMING TOOLS\CrackersKit\CrackersKit2\Patchers\PELG\PCNFO.EXE

Removing Cracking.Tool:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Ricercadoppia Toolbar Symptoms
BAT.Noshare Trojan Removal instruction
Netpumper Adware Removal
Thiefem Trojan Removal

Tinecuf Trojan

Removing Tinecuf
Categories: Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Tinecuf Also known as:

[Kaspersky]Backdoor.Win32.Agent.ani;
[Other]Win32/Tinecuf,Win32/Tinecuf.A

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\AceExt32.dll
[%WINDOWS%]\Downloaded Program Files\CxUSBKey.exe
[%WINDOWS%]\Downloaded Program Files\ZipExt32.dll
[%SYSTEM%]\AceExt32.dll
[%WINDOWS%]\Downloaded Program Files\CxUSBKey.exe
[%WINDOWS%]\Downloaded Program Files\ZipExt32.dll

How to detect Tinecuf:

Files:
[%SYSTEM%]\AceExt32.dll
[%WINDOWS%]\Downloaded Program Files\CxUSBKey.exe
[%WINDOWS%]\Downloaded Program Files\ZipExt32.dll
[%SYSTEM%]\AceExt32.dll
[%WINDOWS%]\Downloaded Program Files\CxUSBKey.exe
[%WINDOWS%]\Downloaded Program Files\ZipExt32.dll

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{35cec8a3-2be6-11d2-8773-92e220524150}
HKEY_CLASSES_ROOT\clsid\{35cec8a3-2be6-11d2-8773-92e220524140}

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shellserviceobjectdelayload

Removing Tinecuf:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
PStopper Adware Removal
AIG Backdoor Removal

Ac3 Downloader

Removing Ac3
Categories: Downloader
The downloader either launches the new malware or registers it to enable autorun
according to the local operating system requirements.

Ac3 Also known as:

[Kaspersky]Trojan-Downloader.Win32.Small.cyh,Trojan-Dropper.Win32.Agent.ata;
[Other]Trojan-downloader-ac2,W32/AXF.CYH!tr.dldr,trojan-downloader-ac2

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\xfz42d7a.dll
[%WINDOWS%]\ac3_0002.exe
[%SYSTEM%]\set39699.dll
[%SYSTEM%]\set39699.sys
[%WINDOWS%]\ac3_0008.exe
[%SYSTEM%]\xfz42d7a.dll
[%WINDOWS%]\ac3_0002.exe
[%SYSTEM%]\set39699.dll
[%SYSTEM%]\set39699.sys
[%WINDOWS%]\ac3_0008.exe

How to detect Ac3:

Files:
[%SYSTEM%]\xfz42d7a.dll
[%WINDOWS%]\ac3_0002.exe
[%SYSTEM%]\set39699.dll
[%SYSTEM%]\set39699.sys
[%WINDOWS%]\ac3_0008.exe
[%SYSTEM%]\xfz42d7a.dll
[%WINDOWS%]\ac3_0002.exe
[%SYSTEM%]\set39699.dll
[%SYSTEM%]\set39699.sys
[%WINDOWS%]\ac3_0008.exe

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run, vsm62b17=rundll32.exe w3a0cd8f.dll

Removing Ac3:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Random.Wallpaper.Changer Trojan Removal instruction
Cracking.Tool Trojan Removal

Arcvvir Trojan

Removing Arcvvir
Categories: Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Arcvvir Also known as:

[Kaspersky]Australian.AIH.591,DirII.1024.j,packed: PkLite,Virus.DOS.DirII.1024.j;
[Eset]Ap.591 virus,Dir2.Ba virus;
[McAfee]Dir-II,Univ/f;
[F-Prot]DIR-II.2048.B;
[Panda]Aih,DIR-II {2};
[Computer Associates]Arcvvir,DIR-II.AJ,DIR-II.E,Ozpar.D

How to detect Arcvvir:

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{7e5da25b-1c13-4b78-837a-b938624eba41}
HKEY_CLASSES_ROOT\typelib\{ed15346e-0aec-4b72-b23c-ed6f420fcba7}
HKEY_CURRENT_USER\software\wurld media
HKEY_LOCAL_MACHINE\software\morp

Removing Arcvvir:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Sstorm DoS Information
Removing Tubby Adware
Agobot.bk Trojan Information

Agent.jt Downloader

Removing Agent.jt
Categories: Downloader
This family of Trojans downloads and installs new malware or adware on the computer.
The downloader then either launches the new malware or registers it to enable autorun
according to the local operating system requirements.

The names and locations of malware to be downloaded are either coded into the
Trojan or downloaded from a specified website.

How to detect Agent.jt:

Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\c:\windows\downloaded program files\ds3.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]\downloaded program files\ds3.dll

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls

Removing Agent.jt:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Removing Bancos.IDQ Trojan
Removing RingZero.gen Trojan
IMesh Trojan Information

Pigeon.AXH Trojan

Removing Pigeon.AXH
Categories: Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Pigeon.AXH Also known as:

[Kaspersky]Backdoor.Win32.Hupigon.tzx

How to detect Pigeon.AXH:

Registry Keys:
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_welligent_transfer_service
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\welligent transfer service

Removing Pigeon.AXH:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Removing Pigeon.Graybird Trojan

Zlob.Fam.Silver Codec Trojan

Removing Zlob.Fam.Silver Codec
Categories: Trojan,Popups
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
The pop-ups generally will not be stopped by pop-up stoppers, and often are
not dependent on your having Internet Explorer open.

How to detect Zlob.Fam.Silver Codec:

Folders:
[%PROGRAM_FILES%]\Silver Codec

Registry Keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Silver Codec

Removing Zlob.Fam.Silver Codec:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
KissThis Trojan Removal
TrojanDropper.Win32.VB.aj Trojan Cleaner
Removing Registry.Defender Adware

ExactSearchBar BHO

Removing ExactSearchBar
Categories: BHO,Toolbar
BHO (Browser Helper Object) Trojan.
The BHO waits for the user to post personal information to a monitored website.
As this information is entered by the user, it is captured by the BHO and sent back to the attacker.
The method of network transport used by the attacker makes this Trojan unique.
Typically, keyloggers of this type will send the stolen information back to the attacker via email
or HTTP POST, which can appear suspicious.
Instead, this Trojan encodes the data with a simple XOR algorithm before placing it into
the data section of an ICMP ping packet." explained the company.
Toolbar presents itself as a helpful add-on for Internet Explorer but it is a real pest.

ExactSearchBar Also known as:

[Panda]Adware/Etoolbar,Adware/ExactSearch,Spyware/BargainBuddy

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\exacctsetup3.exe
[%SYSTEM%]\exactsetup.dll
[%SYSTEM%]\ezstubi.dll
[%SYSTEM%]\trkgif.exe
[%SYSTEM%]\exacttoolbar.dll
[%SYSTEM%]\ezstubi.exe
[%SYSTEM%]\s4bar.dll
[%WINDOWS%]\system\exacttoolbar.dll
[%WINDOWS%]\system\s4bar.dll
[%SYSTEM%]\exacctsetup3.exe
[%SYSTEM%]\exactsetup.dll
[%SYSTEM%]\ezstubi.dll
[%SYSTEM%]\trkgif.exe
[%SYSTEM%]\exacttoolbar.dll
[%SYSTEM%]\ezstubi.exe
[%SYSTEM%]\s4bar.dll
[%WINDOWS%]\system\exacttoolbar.dll
[%WINDOWS%]\system\s4bar.dll

How to detect ExactSearchBar:

Files:
[%SYSTEM%]\exacctsetup3.exe
[%SYSTEM%]\exactsetup.dll
[%SYSTEM%]\ezstubi.dll
[%SYSTEM%]\trkgif.exe
[%SYSTEM%]\exacttoolbar.dll
[%SYSTEM%]\ezstubi.exe
[%SYSTEM%]\s4bar.dll
[%WINDOWS%]\system\exacttoolbar.dll
[%WINDOWS%]\system\s4bar.dll
[%SYSTEM%]\exacctsetup3.exe
[%SYSTEM%]\exactsetup.dll
[%SYSTEM%]\ezstubi.dll
[%SYSTEM%]\trkgif.exe
[%SYSTEM%]\exacttoolbar.dll
[%SYSTEM%]\ezstubi.exe
[%SYSTEM%]\s4bar.dll
[%WINDOWS%]\system\exacttoolbar.dll
[%WINDOWS%]\system\s4bar.dll

Folders:
[%PROGRAMS%]\NaviSearch
[%PROGRAM_FILES%]\exact
[%PROGRAM_FILES%]\navisearch

Registry Keys:
HKEY_CLASSES_ROOT\typelib\{53f066f0-a4c0-4f46-83eb-2dfd03f938cf}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\NaviSearch
HKEY_CLASSES_ROOT\clsid\{224530a0-c9cb-4aee-9c0f-54ac1b533211}
HKEY_CLASSES_ROOT\clsid\{f9765480-72d1-11d4-a75a-004f49045a87}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{f9765480-72d1-11d4-a75a-004f49045a87}
HKEY_LOCAL_MACHINE\software\classes\clsid\{224530a0-c9cb-4aee-9c0f-54ac1b533211}
HKEY_LOCAL_MACHINE\software\classes\clsid\{f9765480-72d1-11d4-a75a-004f49045a87}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{f9765480-72d1-11d4-a75a-004f49045a87}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shell extensions\approved\{224530a0-c9cb-4aee-9c0f-54ac1b533211}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shell extensions\approved\{f9765480-72d1-11d4-a75a-004f49045a87}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\exact search bar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\navisearch

Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\exact
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_LOCAL_MACHINE\software\exact
HKEY_LOCAL_MACHINE\software\exact
HKEY_LOCAL_MACHINE\software\exact
HKEY_LOCAL_MACHINE\software\exact
HKEY_LOCAL_MACHINE\software\exact
HKEY_LOCAL_MACHINE\software\exact
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shell extensions\approved
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shell extensions\approved

Removing ExactSearchBar:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Removing Fake.MSN Trojan
Remove VirtSpell Backdoor
Removing Small.B Trojan
Removing KeyKap Trojan

LzioMediaUpdater Downloader

Removing LzioMediaUpdater
Categories: Downloader
The downloader either launches the new malware or registers it to enable autorun
according to the local operating system requirements.

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\lziomediaupdater.exe
[%SYSTEM%]\lziomediaupdater.exe

How to detect LzioMediaUpdater:

Files:
[%SYSTEM%]\lziomediaupdater.exe
[%SYSTEM%]\lziomediaupdater.exe

Removing LzioMediaUpdater:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Dubfouf Adware Symptoms
Remove Sincom.ad Trojan
Lecna Trojan Removal instruction
Zlob.mo Downloader Information

UltraVNC RAT

Removing UltraVNC
Categories: RAT
Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.

Visible Symptoms:
Files in system folders:
[%DESKTOP%]\UltraVNC Server.lnk
[%DESKTOP%]\UltraVNC Viewer.lnk
[%PROGRAMS%]\ultravnc\doc\documentation.lnk
[%PROGRAMS%]\ultravnc\doc\licence.lnk
[%PROGRAMS%]\ultravnc\doc\readme.lnk
[%PROGRAMS%]\ultravnc\doc\whatsnew.lnk
[%PROGRAMS%]\ultravnc\ultravnc repeater\install repeater service.lnk
[%PROGRAMS%]\ultravnc\ultravnc repeater\remove repeater service.lnk
[%PROGRAMS%]\ultravnc\ultravnc repeater\run.lnk
[%PROGRAMS%]\ultravnc\ultravnc server.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\install default registry settings.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\install winvnc service silent.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\install winvnc service.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\reinstall winvnc service (silent).lnk
[%PROGRAMS%]\ultravnc\ultravnc server\remove winvnc service.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\run service helper.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\show about box.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\show default settings.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\show user settings.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\show winvnc server help.lnk
[%PROGRAMS%]\ultravnc\ultravnc viewer.lnk
[%PROGRAMS%]\ultravnc\ultravnc viewer\run ultravnc viewer (listen mode).lnk
[%PROGRAMS%]\ultravnc\ultravnc viewer\show ultravnc viewer help.lnk
[%SYSTEM%]\drivers\vnccom.SYS
[%SYSTEM%]\drivers\vncdrv.sys
[%SYSTEM%]\vncdrv.dll
[%SYSTEM%]\vnchelp.dll
[%DESKTOP%]\UltraVNC Server.lnk
[%DESKTOP%]\UltraVNC Viewer.lnk
[%PROGRAMS%]\ultravnc\doc\documentation.lnk
[%PROGRAMS%]\ultravnc\doc\licence.lnk
[%PROGRAMS%]\ultravnc\doc\readme.lnk
[%PROGRAMS%]\ultravnc\doc\whatsnew.lnk
[%PROGRAMS%]\ultravnc\ultravnc repeater\install repeater service.lnk
[%PROGRAMS%]\ultravnc\ultravnc repeater\remove repeater service.lnk
[%PROGRAMS%]\ultravnc\ultravnc repeater\run.lnk
[%PROGRAMS%]\ultravnc\ultravnc server.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\install default registry settings.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\install winvnc service silent.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\install winvnc service.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\reinstall winvnc service (silent).lnk
[%PROGRAMS%]\ultravnc\ultravnc server\remove winvnc service.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\run service helper.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\show about box.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\show default settings.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\show user settings.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\show winvnc server help.lnk
[%PROGRAMS%]\ultravnc\ultravnc viewer.lnk
[%PROGRAMS%]\ultravnc\ultravnc viewer\run ultravnc viewer (listen mode).lnk
[%PROGRAMS%]\ultravnc\ultravnc viewer\show ultravnc viewer help.lnk
[%SYSTEM%]\drivers\vnccom.SYS
[%SYSTEM%]\drivers\vncdrv.sys
[%SYSTEM%]\vncdrv.dll
[%SYSTEM%]\vnchelp.dll

How to detect UltraVNC:

Files:
[%DESKTOP%]\UltraVNC Server.lnk
[%DESKTOP%]\UltraVNC Viewer.lnk
[%PROGRAMS%]\ultravnc\doc\documentation.lnk
[%PROGRAMS%]\ultravnc\doc\licence.lnk
[%PROGRAMS%]\ultravnc\doc\readme.lnk
[%PROGRAMS%]\ultravnc\doc\whatsnew.lnk
[%PROGRAMS%]\ultravnc\ultravnc repeater\install repeater service.lnk
[%PROGRAMS%]\ultravnc\ultravnc repeater\remove repeater service.lnk
[%PROGRAMS%]\ultravnc\ultravnc repeater\run.lnk
[%PROGRAMS%]\ultravnc\ultravnc server.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\install default registry settings.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\install winvnc service silent.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\install winvnc service.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\reinstall winvnc service (silent).lnk
[%PROGRAMS%]\ultravnc\ultravnc server\remove winvnc service.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\run service helper.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\show about box.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\show default settings.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\show user settings.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\show winvnc server help.lnk
[%PROGRAMS%]\ultravnc\ultravnc viewer.lnk
[%PROGRAMS%]\ultravnc\ultravnc viewer\run ultravnc viewer (listen mode).lnk
[%PROGRAMS%]\ultravnc\ultravnc viewer\show ultravnc viewer help.lnk
[%SYSTEM%]\drivers\vnccom.SYS
[%SYSTEM%]\drivers\vncdrv.sys
[%SYSTEM%]\vncdrv.dll
[%SYSTEM%]\vnchelp.dll
[%DESKTOP%]\UltraVNC Server.lnk
[%DESKTOP%]\UltraVNC Viewer.lnk
[%PROGRAMS%]\ultravnc\doc\documentation.lnk
[%PROGRAMS%]\ultravnc\doc\licence.lnk
[%PROGRAMS%]\ultravnc\doc\readme.lnk
[%PROGRAMS%]\ultravnc\doc\whatsnew.lnk
[%PROGRAMS%]\ultravnc\ultravnc repeater\install repeater service.lnk
[%PROGRAMS%]\ultravnc\ultravnc repeater\remove repeater service.lnk
[%PROGRAMS%]\ultravnc\ultravnc repeater\run.lnk
[%PROGRAMS%]\ultravnc\ultravnc server.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\install default registry settings.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\install winvnc service silent.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\install winvnc service.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\reinstall winvnc service (silent).lnk
[%PROGRAMS%]\ultravnc\ultravnc server\remove winvnc service.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\run service helper.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\show about box.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\show default settings.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\show user settings.lnk
[%PROGRAMS%]\ultravnc\ultravnc server\show winvnc server help.lnk
[%PROGRAMS%]\ultravnc\ultravnc viewer.lnk
[%PROGRAMS%]\ultravnc\ultravnc viewer\run ultravnc viewer (listen mode).lnk
[%PROGRAMS%]\ultravnc\ultravnc viewer\show ultravnc viewer help.lnk
[%SYSTEM%]\drivers\vnccom.SYS
[%SYSTEM%]\drivers\vncdrv.sys
[%SYSTEM%]\vncdrv.dll
[%SYSTEM%]\vnchelp.dll

Folders:
[%COMMON_PROGRAMS%]\UltraVNC
[%PROGRAM_FILES%]\ultravnc

Registry Keys:
HKEY_CURRENT_USER\software\orl\vncviewer
HKEY_CURRENT_USER\software\orl\winvnc3
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{a8ad990e-355a-4413-8647-a9b168978423}_is1
HKEY_LOCAL_MACHINE\software\ultravnc
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_vnccom
HKEY_LOCAL_MACHINE\system\currentcontrolset\hardware profiles\current\system\currentcontrolset\services\vncdrv
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\eventlog\system\vncdrv
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\vnccom
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\vncdrv

Registry Values:
HKEY_LOCAL_MACHINE\hardware\devicemap\video

Removing UltraVNC:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
VBVirul Trojan Cleaner
NaviSearch Adware Information
Win32.Hlife DoS Cleaner

SillyDl.ASB Trojan

Removing SillyDl.ASB
Categories: Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

How to detect SillyDl.ASB:

Registry Keys:
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\brgns
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\clipart

Removing SillyDl.ASB:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Dubrundl Downloader Removal