Wednesday, December 3, 2008

PWS.Hook.dll Trojan

Removing PWS.Hook.dll
Categories: Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

PWS.Hook.dll Also known as:

[Kaspersky]Trojan-PSW.WIn32.Agent.ix;
[McAfee]PWS-Hook.dll;
[Other]Win32/Niblenyo.Q,Win32/Niblenyo.Z,Troj/Hook-Gen,Infostealer

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\mywl.dll
[%SYSTEM%]\svvosts.exe
[%SYSTEM%]\mywl.dll
[%SYSTEM%]\svvosts.exe

How to detect PWS.Hook.dll:

Files:
[%SYSTEM%]\mywl.dll
[%SYSTEM%]\svvosts.exe
[%SYSTEM%]\mywl.dll
[%SYSTEM%]\svvosts.exe

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer\run

Removing PWS.Hook.dll:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
H2000 Spyware Information
Remove Zlob.Fam.Video AX Object Trojan
TrojanClicker.Win32.Delf Trojan Cleaner
egroup.no Tracking Cookie Removal

Blss Trojan

Removing Blss
Categories: Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Visible Symptoms:
Files in system folders:
[%PROGRAM_FILES%]\blss\blss.exe
[%PROGRAM_FILES%]\blss\un-bl.exe
[%PROGRAM_FILES%]\blss\blss.exe
[%PROGRAM_FILES%]\blss\un-bl.exe

How to detect Blss:

Files:
[%PROGRAM_FILES%]\blss\blss.exe
[%PROGRAM_FILES%]\blss\un-bl.exe
[%PROGRAM_FILES%]\blss\blss.exe
[%PROGRAM_FILES%]\blss\un-bl.exe

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Blss:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Pigeon.FAH Trojan Cleaner

AdGoblin.AdsInContext Adware

Removing AdGoblin.AdsInContext
Categories: Adware,BHO,Hijacker
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.

As this information is entered by the user, it is captured by the BHO (Browser Helper Object) and
sent back to the attacker.
Typically, keyloggers of this type will send the stolen information back to the attacker via email
or HTTP POST, which can appear suspicious.When the default home page is hijacked, the browser opens to the web page set by the hijacker
instead of the user's designated home page. In some cases, the hijacker may block users from
restoring their desired home page.

AdGoblin.AdsInContext Also known as:

[Panda]Adware/AdsInContext

Visible Symptoms:
Files in system folders:
[%PROFILE_TEMP%]\_ps_inst.exe
[%PROFILE_TEMP%]\iicc6.exe
[%SYSTEM%]\a3cd.dll
[%SYSTEM%]\atkctirs.dll
[%SYSTEM%]\daxtime.dll
[%SYSTEM%]\drmv21clt.dll
[%SYSTEM%]\eaxasc3.dll
[%SYSTEM%]\eventlowg.dll
[%SYSTEM%]\icbmp.dll
[%SYSTEM%]\iucstl.dll
[%SYSTEM%]\iudq.dll
[%SYSTEM%]\kybdlt1.dll
[%SYSTEM%]\mwsexch35.dll
[%SYSTEM%]\thid.dll
[%WINDOWS%]\system\ftpcutrs2.dll
[%WINDOWS%]\system\iccmpeg.dll
[%PROFILE_TEMP%]\_ps_inst.exe
[%PROFILE_TEMP%]\iicc6.exe
[%SYSTEM%]\a3cd.dll
[%SYSTEM%]\atkctirs.dll
[%SYSTEM%]\daxtime.dll
[%SYSTEM%]\drmv21clt.dll
[%SYSTEM%]\eaxasc3.dll
[%SYSTEM%]\eventlowg.dll
[%SYSTEM%]\icbmp.dll
[%SYSTEM%]\iucstl.dll
[%SYSTEM%]\iudq.dll
[%SYSTEM%]\kybdlt1.dll
[%SYSTEM%]\mwsexch35.dll
[%SYSTEM%]\thid.dll
[%WINDOWS%]\system\ftpcutrs2.dll
[%WINDOWS%]\system\iccmpeg.dll

How to detect AdGoblin.AdsInContext:

Files:
[%PROFILE_TEMP%]\_ps_inst.exe
[%PROFILE_TEMP%]\iicc6.exe
[%SYSTEM%]\a3cd.dll
[%SYSTEM%]\atkctirs.dll
[%SYSTEM%]\daxtime.dll
[%SYSTEM%]\drmv21clt.dll
[%SYSTEM%]\eaxasc3.dll
[%SYSTEM%]\eventlowg.dll
[%SYSTEM%]\icbmp.dll
[%SYSTEM%]\iucstl.dll
[%SYSTEM%]\iudq.dll
[%SYSTEM%]\kybdlt1.dll
[%SYSTEM%]\mwsexch35.dll
[%SYSTEM%]\thid.dll
[%WINDOWS%]\system\ftpcutrs2.dll
[%WINDOWS%]\system\iccmpeg.dll
[%PROFILE_TEMP%]\_ps_inst.exe
[%PROFILE_TEMP%]\iicc6.exe
[%SYSTEM%]\a3cd.dll
[%SYSTEM%]\atkctirs.dll
[%SYSTEM%]\daxtime.dll
[%SYSTEM%]\drmv21clt.dll
[%SYSTEM%]\eaxasc3.dll
[%SYSTEM%]\eventlowg.dll
[%SYSTEM%]\icbmp.dll
[%SYSTEM%]\iucstl.dll
[%SYSTEM%]\iudq.dll
[%SYSTEM%]\kybdlt1.dll
[%SYSTEM%]\mwsexch35.dll
[%SYSTEM%]\thid.dll
[%WINDOWS%]\system\ftpcutrs2.dll
[%WINDOWS%]\system\iccmpeg.dll

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{029e02f0-a0e5-4b19-b958-7bf2db29fb13}
HKEY_CLASSES_ROOT\clsid\{37b9ff8c-01d9-4fdc-a6a2-08183915c71d}
HKEY_CLASSES_ROOT\clsid\{98349900-adc7-11d7-8515-0040050362d3}
HKEY_CLASSES_ROOT\clsid\{a3a3043d-749e-433f-a26e-6227d5e9bfcd}
HKEY_CLASSES_ROOT\clsid\{a94b52a0-0863-11d8-99de-444553540000}
HKEY_CLASSES_ROOT\clsid\{cfcc098c-f293-41ea-8e30-a842524bb3c2}
HKEY_CLASSES_ROOT\clsid\{d3512525-e159-421f-a154-a60a738f7f6d}
HKEY_CLASSES_ROOT\clsid\{e5074421-25b8-4854-8479-8e81a86c2e1f}
HKEY_CLASSES_ROOT\clsid\{f53d14a9-c1e7-409d-8521-99032d94b1ba}
HKEY_CLASSES_ROOT\clsid\{fad0b5cb-1ec4-4f37-8ecb-520faf3b9afa}
HKEY_CLASSES_ROOT\typelib\{98349900-adc7-11d7-8515-0040050362d3}
HKEY_CLASSES_ROOT\typelib\{a3a3043d-749e-433f-a26e-6227d5e9bfcd}
HKEY_CLASSES_ROOT\typelib\{d212259d-4648-4903-9fbd-02e88785d33c}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{37b9ff8c-01d9-4fdc-a6a2-08183915c71d}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{a94b52a0-0863-11d8-99de-444553540000}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{d3512525-e159-421f-a154-a60a738f7f6d}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{e5074421-25b8-4854-8479-8e81a86c2e1f}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{fad0b5cb-1ec4-4f37-8ecb-520faf3b9afa}

Removing AdGoblin.AdsInContext:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Zlob.Fam.NewMediaCodec Trojan Information
CookieMonster Trojan Removal instruction
Removing WordMacro.Ice Trojan

Stealth.Folder.Hider Spyware

Removing Stealth.Folder.Hider
Categories: Spyware
Spyware is computer software that is installed surreptitiously on a personal computer
to with the computer, without the user's informed consent.

Visible Symptoms:
Files in system folders:
[%PROGRAMS%]\Stealth Folder\Stealth Folder.LNK
[%PROGRAMS%]\Stealth Folder\Stealth Folder.LNK

How to detect Stealth.Folder.Hider:

Files:
[%PROGRAMS%]\Stealth Folder\Stealth Folder.LNK
[%PROGRAMS%]\Stealth Folder\Stealth Folder.LNK

Registry Keys:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\menuorder\start menu\programs\stealth folder

Registry Values:
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset
HKEY_LOCAL_MACHINE\software\sfset

Removing Stealth.Folder.Hider:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Removing traceics.com.es Tracking Cookie
Banker.rq Spyware Information
Remove TrojanDropper.Win32.Siboco Trojan
Trojan.Dropper.Win32.Agent.apw Trojan Removal instruction
Fexper Trojan Symptoms

Activity.Monitor Spyware

Removing Activity.Monitor
Categories: Spyware
Spyware is computer software that is installed surreptitiously on a personal computer
to intercept or take partial control over the user's interaction
with the computer, without the user's informed consent.

While the term spyware suggests software that secretly monitors the user's behavior,
the functions of spyware extend well beyond simple monitoring.

Spyware programs can collect various types of personal information,
such as Internet surfing habit, sites that have been visited,
but can also interfere with user control of the computer in other ways,
such as installing additional software, redirecting Web browser activity,
accessing websites blindly that will cause more harmful viruses,
or diverting advertising revenue to a third party.

Spyware can even change computer settings, resulting in slow connection speeds,
different home pages, and loss of Internet or other programs.
In an attempt to increase the understanding of spyware, a more formal classification
of its included software types is captured under the term privacy-invasive software.

Visible Symptoms:
Files in system folders:
[%APPDATA%]\amguid.dat
[%APPDATA%]\amopn.dat
[%COMMON_APPDATA%]\amlistx.dat
[%COMMON_APPDATA%]\awmsg.dat
[%PROFILE%]\recent\activmon.lnk
[%APPDATA%]\amlistx.dat
[%APPDATA%]\amprm.dat
[%APPDATA%]\awmsg.dat
[%APPDATA%]\winam.dat
[%DESKTOP%]\Activity Monitor.lnk
[%DESKTOP%]\amagent39.exe
[%WINDOWS%]\winam.dat
[%APPDATA%]\amguid.dat
[%APPDATA%]\amopn.dat
[%COMMON_APPDATA%]\amlistx.dat
[%COMMON_APPDATA%]\awmsg.dat
[%PROFILE%]\recent\activmon.lnk
[%APPDATA%]\amlistx.dat
[%APPDATA%]\amprm.dat
[%APPDATA%]\awmsg.dat
[%APPDATA%]\winam.dat
[%DESKTOP%]\Activity Monitor.lnk
[%DESKTOP%]\amagent39.exe
[%WINDOWS%]\winam.dat

How to detect Activity.Monitor:

Files:
[%APPDATA%]\amguid.dat
[%APPDATA%]\amopn.dat
[%COMMON_APPDATA%]\amlistx.dat
[%COMMON_APPDATA%]\awmsg.dat
[%PROFILE%]\recent\activmon.lnk
[%APPDATA%]\amlistx.dat
[%APPDATA%]\amprm.dat
[%APPDATA%]\awmsg.dat
[%APPDATA%]\winam.dat
[%DESKTOP%]\Activity Monitor.lnk
[%DESKTOP%]\amagent39.exe
[%WINDOWS%]\winam.dat
[%APPDATA%]\amguid.dat
[%APPDATA%]\amopn.dat
[%COMMON_APPDATA%]\amlistx.dat
[%COMMON_APPDATA%]\awmsg.dat
[%PROFILE%]\recent\activmon.lnk
[%APPDATA%]\amlistx.dat
[%APPDATA%]\amprm.dat
[%APPDATA%]\awmsg.dat
[%APPDATA%]\winam.dat
[%DESKTOP%]\Activity Monitor.lnk
[%DESKTOP%]\amagent39.exe
[%WINDOWS%]\winam.dat

Folders:
[%PROGRAM_FILES%]\amsys
[%COMMON_PROGRAMS%]\Activity Monitor
[%PROGRAMS%]\activity monitor
[%PROGRAM_FILES%]\Activity Monitor
[%PROGRAM_FILES%]\AMSys

Registry Keys:
HKEY_CURRENT_USER\software\deep software\activity monitor
HKEY_CURRENT_USER\software\softactivity\activity monitor
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{142e758e-2ac3-443a-a549-7e6a036285a2}_is1
HKEY_LOCAL_MACHINE\software\winl

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\group policy objects\localmachine\software\policies\microsoft\pchealth\errorreporting\exclusionlist
HKEY_LOCAL_MACHINE\software\policies\microsoft\pchealth\errorreporting\exclusionlist
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\group policy objects\localmachine\software\policies\microsoft\pchealth\errorreporting\exclusionlist
HKEY_LOCAL_MACHINE\software\policies\microsoft\pchealth\errorreporting\exclusionlist

Removing Activity.Monitor:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Removing Ertfor Trojan
Remove AdvertMen Adware
Removing BackDoor.AUF.svr Trojan

Kongrid Trojan

Removing Kongrid
Categories: Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Kongrid Also known as:

[Kaspersky]Trojan.Win32.Agent.ado,Virus.Win32.Agent.l;
[McAfee]BackDoor-DIQ,W32/Generic.y;
[Other]Win32/Kongrid.A,Backdoor:Win32/Difeqs.gen,W32/Agent.AWLA,W32.SillyFDC,Worm:Win32/SillyFDC,WORM_SILLYFDC.BN

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\cologsver.exe
[%SYSTEM%]\cscripts.exe
[%SYSTEM%]\xbox.dll
[%SYSTEM%]\cologsver.exe
[%SYSTEM%]\cscripts.exe
[%SYSTEM%]\xbox.dll

How to detect Kongrid:

Files:
[%SYSTEM%]\cologsver.exe
[%SYSTEM%]\cscripts.exe
[%SYSTEM%]\xbox.dll
[%SYSTEM%]\cologsver.exe
[%SYSTEM%]\cscripts.exe
[%SYSTEM%]\xbox.dll

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{72637363-7069-7374-652e-336d65747300}

Removing Kongrid:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Win32.Lioten Trojan Cleaner
WurldMedia.Mo Hijacker Removal
Cashon Adware Removal
WurldMedia BHO Symptoms
2020Search Adware Symptoms

Bancos.DA Trojan

Removing Bancos.DA
Categories: Trojan,Spyware
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Spyware programs can collect various types of personal information,
such as Internet surfing habit, sites that have been visited,
but can also interfere with user control of the computer in other ways,
such as installing additional software, redirecting Web browser activity,
accessing websites blindly that will cause more harmful viruses,
or diverting advertising revenue to a third party.

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\kernels32.exe
[%SYSTEM%]\vxgame1.exe
[%SYSTEM%]\vxgame4.exe
[%SYSTEM%]\vxgame6.exe
[%SYSTEM%]\VXH8JKDQ2.EXE
[%SYSTEM%]\VXH8JKDQ6.EXE
[%SYSTEM%]\kernels32.exe
[%SYSTEM%]\vxgame1.exe
[%SYSTEM%]\vxgame4.exe
[%SYSTEM%]\vxgame6.exe
[%SYSTEM%]\VXH8JKDQ2.EXE
[%SYSTEM%]\VXH8JKDQ6.EXE

How to detect Bancos.DA:

Files:
[%SYSTEM%]\kernels32.exe
[%SYSTEM%]\vxgame1.exe
[%SYSTEM%]\vxgame4.exe
[%SYSTEM%]\vxgame6.exe
[%SYSTEM%]\VXH8JKDQ2.EXE
[%SYSTEM%]\VXH8JKDQ6.EXE
[%SYSTEM%]\kernels32.exe
[%SYSTEM%]\vxgame1.exe
[%SYSTEM%]\vxgame4.exe
[%SYSTEM%]\vxgame6.exe
[%SYSTEM%]\VXH8JKDQ2.EXE
[%SYSTEM%]\VXH8JKDQ6.EXE

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Bancos.DA:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Remove BackSocket Backdoor
180Solutions Trojan Information

7000n Adware

Removing 7000n
Categories: Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.


Visible Symptoms:
Files in system folders:
[%SYSTEM%]\twain_16.dll
[%SYSTEM%]\twain_16.dll

How to detect 7000n:

Files:
[%SYSTEM%]\twain_16.dll
[%SYSTEM%]\twain_16.dll

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{ae21a223-c4ca-43d7-9764-4fc6df529f4d}
HKEY_CLASSES_ROOT\interface\{6f9d44b8-e418-49c1-885c-1015dddbffc4}
HKEY_CLASSES_ROOT\twain_16.iebho
HKEY_CLASSES_ROOT\twain_16.iebho.1
HKEY_CLASSES_ROOT\typelib\{f05fc250-632c-424c-83d8-64640b6bed21}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{ae21a223-c4ca-43d7-9764-4fc6df529f4d}

Removing 7000n:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Nuclear.FTPd Trojan Cleaner
Removing SSoft Downloader
Removing TrojanDropper.Win32.AphexLace Trojan
W95.HPS Trojan Information

Lookup.GWS BHO

Removing Lookup.GWS
Categories: BHO,Hijacker,Toolbar
As this information is entered by the user, it is captured by the BHO (Browser Helper Object) and
sent back to the attacker.
Typically, keyloggers of this type will send the stolen information back to the attacker via email
or HTTP POST, which can appear suspicious.A desktop hijacker replaces the desktop wallpaper with advertising
for products and services on the desktop.
Toolbar presents itself as a helpful add-on for Internet Explorer but it is a real pest.
It replaces your start page, continuosly open a number of pop up windows and so on.

Lookup.GWS Also known as:

[Kaspersky]TrojanSpy.Win32.Globar.a

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\winenc32.dll
[%WINDOWS%]\system\winenc32.dll
[%SYSTEM%]\winenc32.dll
[%WINDOWS%]\system\winenc32.dll

How to detect Lookup.GWS:

Files:
[%SYSTEM%]\winenc32.dll
[%WINDOWS%]\system\winenc32.dll
[%SYSTEM%]\winenc32.dll
[%WINDOWS%]\system\winenc32.dll

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{423bd222-52be-471a-be01-75fcceb3d48f}
HKEY_CLASSES_ROOT\clsid\{e539dea3-ba67-4f1f-a897-5f2f4f29a063}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{0428ffc7-1931-45b7-95cb-3cbb919777e1}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{e539dea3-ba67-4f1f-a897-5f2f4f29a063}
HKEY_LOCAL_MACHINE\software\classes\clsid\{423bd222-52be-471a-be01-75fcceb3d48f}
HKEY_LOCAL_MACHINE\software\classes\clsid\{e539dea3-ba67-4f1f-a897-5f2f4f29a063}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{e539dea3-ba67-4f1f-a897-5f2f4f29a063}

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar

Removing Lookup.GWS:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
agent.eb Downloader Symptoms
Activity.Logger Spyware Cleaner

Rotcev Trojan

Removing Rotcev
Categories: Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\adodbc.exe
[%SYSTEM%]\adodbc.exe

How to detect Rotcev:

Files:
[%SYSTEM%]\adodbc.exe
[%SYSTEM%]\adodbc.exe

Removing Rotcev:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
NetBull Trojan Symptoms

Skiks Trojan

Removing Skiks
Categories: Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Visible Symptoms:
Files in system folders:
[%COMMON_DESKTOPDIRECTORY%]\sp.exe
[%SYSTEM%]\wmp.exe
[%COMMON_DESKTOPDIRECTORY%]\sp.exe
[%SYSTEM%]\wmp.exe

How to detect Skiks:

Files:
[%COMMON_DESKTOPDIRECTORY%]\sp.exe
[%SYSTEM%]\wmp.exe
[%COMMON_DESKTOPDIRECTORY%]\sp.exe
[%SYSTEM%]\wmp.exe

Registry Keys:
HKEY_CURRENT_USER\software\microsoft\esevcbko

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{2d0cce2d-2eef-4432-0503-020002010803}

Removing Skiks:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
ChatBlocker Spyware Cleaner

DropSpam Adware

Removing DropSpam
Categories: Adware,Hijacker
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits
A Search hijacker redirects search results to other pages and may
transmit search and browsing data to unknown servers. An error page hijacker directs
the browser to another page, usually an advertising page, instead of the usual error
page when the requested URL is not found.

Visible Symptoms:
Files in system folders:
[%APPDATA%]\microsoft\addins\ewwotb.dll
[%PROFILE_TEMP%]\updrun.exe
[%PROGRAM_FILES%]\dslifestyle\dslifestyle.exe
[%WINDOWS%]\aac.exe
[%WINDOWS%]\appupdate.exe
[%WINDOWS%]\dslife.exe
[%WINDOWS%]\ewwsetup.exe
[%WINDOWS%]\invupd.exe
[%WINDOWS%]\invupdate.exe
[%WINDOWS%]\updrun.exe
[%WINDOWS%]\aae1.exe
[%APPDATA%]\microsoft\addins\ewwotb.dll
[%PROFILE_TEMP%]\updrun.exe
[%PROGRAM_FILES%]\dslifestyle\dslifestyle.exe
[%WINDOWS%]\aac.exe
[%WINDOWS%]\appupdate.exe
[%WINDOWS%]\dslife.exe
[%WINDOWS%]\ewwsetup.exe
[%WINDOWS%]\invupd.exe
[%WINDOWS%]\invupdate.exe
[%WINDOWS%]\updrun.exe
[%WINDOWS%]\aae1.exe

How to detect DropSpam:

Files:
[%APPDATA%]\microsoft\addins\ewwotb.dll
[%PROFILE_TEMP%]\updrun.exe
[%PROGRAM_FILES%]\dslifestyle\dslifestyle.exe
[%WINDOWS%]\aac.exe
[%WINDOWS%]\appupdate.exe
[%WINDOWS%]\dslife.exe
[%WINDOWS%]\ewwsetup.exe
[%WINDOWS%]\invupd.exe
[%WINDOWS%]\invupdate.exe
[%WINDOWS%]\updrun.exe
[%WINDOWS%]\aae1.exe
[%APPDATA%]\microsoft\addins\ewwotb.dll
[%PROFILE_TEMP%]\updrun.exe
[%PROGRAM_FILES%]\dslifestyle\dslifestyle.exe
[%WINDOWS%]\aac.exe
[%WINDOWS%]\appupdate.exe
[%WINDOWS%]\dslife.exe
[%WINDOWS%]\ewwsetup.exe
[%WINDOWS%]\invupd.exe
[%WINDOWS%]\invupdate.exe
[%WINDOWS%]\updrun.exe
[%WINDOWS%]\aae1.exe

Folders:
[%PROGRAMS%]\drop spam
[%PROGRAM_FILES%]\dropspam
[%PROGRAM_FILES%]\dslifestyle
[%COMMON_PROGRAMS%]\Drop Spam

Registry Keys:
HKEY_CLASSES_ROOT\appid\oesrv.exe
HKEY_CLASSES_ROOT\appid\{54ac0313-c709-4f55-a430-ec7e89f74665}
HKEY_CLASSES_ROOT\clsid\{1d95d4b4-f3de-4bde-af1d-219b23b58986}
HKEY_CLASSES_ROOT\CLSID\{2DEA8791-C2B7-48E1-8992-8E8E6A6FE789}
HKEY_CLASSES_ROOT\clsid\{3058b2ea-a146-451a-916a-a5dcce7fa0b7}
HKEY_CLASSES_ROOT\clsid\{5d50d513-e136-4f9f-b610-c7805e5f2491}
HKEY_CLASSES_ROOT\clsid\{88b79166-13ab-4d04-aee8-7ab1cde75d7e}
HKEY_CLASSES_ROOT\ewwie.band
HKEY_CLASSES_ROOT\ewwie.band.1
HKEY_CLASSES_ROOT\ewwie.popcounter
HKEY_CLASSES_ROOT\ewwie.popcounter.1
HKEY_CLASSES_ROOT\ewwotb.addin
HKEY_CLASSES_ROOT\ewwotb.addin.1
HKEY_CLASSES_ROOT\interface\{1e98666f-6260-42c9-b846-32b20fdefe7b}
HKEY_CLASSES_ROOT\interface\{1fa6a0f9-705d-4c47-b67c-f12d5f171470}
HKEY_CLASSES_ROOT\interface\{34dae02f-aac8-4a32-a188-7444bcdae162}
HKEY_CLASSES_ROOT\interface\{4cd72ddb-061e-4366-8a47-babde2dcdba0}
HKEY_CLASSES_ROOT\interface\{68b8dcdb-efa4-420a-bb8a-71b9892a2063}
HKEY_CLASSES_ROOT\interface\{a3080819-9a46-4acf-aa24-b34d59715c5e}
HKEY_CLASSES_ROOT\interface\{a5f6c90c-abe4-4c57-a421-8c5a202aa9f8}
HKEY_CLASSES_ROOT\interface\{a7c16b8f-9eea-4e6b-abf8-34e492e14019}
HKEY_CLASSES_ROOT\interface\{b13281cf-8778-4c98-ae23-abba4637a33d}
HKEY_CLASSES_ROOT\oehk.oerebar
HKEY_CLASSES_ROOT\oehk.oerebar.1
HKEY_CLASSES_ROOT\oesrv.oeinterface
HKEY_CLASSES_ROOT\oesrv.oeinterface.1
HKEY_CLASSES_ROOT\typelib\{8220059c-d959-4f27-b559-179a8c5efdc1}
HKEY_CLASSES_ROOT\typelib\{9ca78f1b-ee6b-4fd0-84e0-794d58a51496}
HKEY_CLASSES_ROOT\typelib\{cc1074c2-0ca2-408e-81f9-ca8ad68d31a9}
HKEY_CLASSES_ROOT\typelib\{de6317f7-6ef0-45c2-88d1-8e09415817f1}
HKEY_CLASSES_ROOT\typelib\{f45e6252-3fb8-4876-b185-cdc91f42165d}
HKEY_CURRENT_USER\software\dropspam
HKEY_CURRENT_USER\software\dropspamtoolbar
HKEY_CURRENT_USER\software\microsoft\office\outlook\addins\ewwotb.addin.1
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Extensions\{B6E649FA-5461-40d7-AB4D-54FC3C8DB767}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2DEA8791-C2B7-48E1-8992-8E8E6A6FE789}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\drop spam
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\internet explorer toolbar - dropspam
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\lifestyle . dropspam
HKEY_CLASSES_ROOT\clsid\{2dea8791-c2b7-48e1-8992-8e8e6a6fe789}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\extensions\{b6e649fa-5461-40d7-ab4d-54fc3c8db767}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{2dea8791-c2b7-48e1-8992-8e8e6a6fe789}

Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\search assistant
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\search assistant
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing DropSpam:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Stealth.Keylogger Spyware Cleaner
Backdoor.EggDrop.Server Trojan Symptoms
Remove Hpt Trojan
Delf.zc Downloader Removal

Bredolab Trojan

Removing Bredolab
Categories: Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Bredolab Also known as:

[Kaspersky]Email-Worm.Win32.Zhelatin.hu,Trojan-Dropper.Win32.Delf.va;
[McAfee]Generic.ei;
[F-Prot]damaged);
[Other]Win32/Bredolab.F,Trojan Horse,Trojan:Win32/Meredrop,W32/Delf.ZUE

How to detect Bredolab:

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run

Removing Bredolab:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
BOXP Trojan Symptoms
PsychWard.big RAT Removal
Superlogy.com BHO Information
Remove Comet.Systems BHO
DealTime Tracking Cookie Cleaner

WhenUSave Adware

Removing WhenUSave
Categories: Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.


WhenUSave Also known as:

[Panda]Adware/ClockSync

Visible Symptoms:
Files in system folders:
[%PROFILE_TEMP%]\savedisclosure.exe
[%PROFILE_TEMP%]\savedisclosure.exe

How to detect WhenUSave:

Files:
[%PROFILE_TEMP%]\savedisclosure.exe
[%PROFILE_TEMP%]\savedisclosure.exe

Folders:
[%PROGRAMS%]\whenu
[%PROGRAM_FILES%]\save

Registry Keys:
HKEY_CLASSES_ROOT\wusn.1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\whenusavemsg
HKEY_LOCAL_MACHINE\software\whenusave
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\whenusavepbtb

Registry Values:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing WhenUSave:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Freak Trojan Symptoms

Win32.TrojanDownloader.Small Trojan

Removing Win32.TrojanDownloader.Small
Categories: Trojan,Downloader
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Trojans-downloaders downloads and installs new malware or adware on the computer.


Win32.TrojanDownloader.Small Also known as:

[Kaspersky]TrojanDownloader.Win32.Small.qg;
[Eset]Win32/TrojanDownloader.Small.DO trojan,Win32/TrojanDownloader.Small.KM trojan,Win32/TrojanDownloader.Small.IC trojan;
[Panda]Trj/Downloader.KQ,Trj/Downloader.OK

Visible Symptoms:
Files in system folders:
[%PROGRAM_FILES%]\internet explorer\feycfjyw.exe
[%PROGRAM_FILES%]\internet explorer\kffttsug.exe
[%PROGRAM_FILES%]\internet explorer\pnqncoba.exe
[%PROGRAM_FILES%]\internet explorer\zmfkyqeu.exe
[%PROGRAM_FILES%]\internet explorer\feycfjyw.exe
[%PROGRAM_FILES%]\internet explorer\kffttsug.exe
[%PROGRAM_FILES%]\internet explorer\pnqncoba.exe
[%PROGRAM_FILES%]\internet explorer\zmfkyqeu.exe

How to detect Win32.TrojanDownloader.Small:

Files:
[%PROGRAM_FILES%]\internet explorer\feycfjyw.exe
[%PROGRAM_FILES%]\internet explorer\kffttsug.exe
[%PROGRAM_FILES%]\internet explorer\pnqncoba.exe
[%PROGRAM_FILES%]\internet explorer\zmfkyqeu.exe
[%PROGRAM_FILES%]\internet explorer\feycfjyw.exe
[%PROGRAM_FILES%]\internet explorer\kffttsug.exe
[%PROGRAM_FILES%]\internet explorer\pnqncoba.exe
[%PROGRAM_FILES%]\internet explorer\zmfkyqeu.exe

Removing Win32.TrojanDownloader.Small:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
WebDir Adware Removal instruction
Removing RFM Backdoor
Remove Hooker.Keylogger Spyware

Ehks Trojan

Removing Ehks
Categories: Trojan,Spyware,Backdoor
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Spyware is computer software that is installed surreptitiously on a personal computer
to with the computer, without the user's informed consent.
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
Often the backdoor will not be visible in the log of active programs.

Ehks Also known as:

[Kaspersky]Backdoor.Ehks.22;
[McAfee]BackDoor-ASZ;
[F-Prot]security risk or a "backdoor" program;
[Panda]Trj/Keylog.Ehks.22;
[Computer Associates]Backdoor/Ehks.2.2!Client,Backdoor/Evogger.A

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\system\evlog.dat
[%WINDOWS%]\system\smsg.html
[%WINDOWS%]\system\ymupdater.exe
[%WINDOWS%]\system\evlog.dat
[%WINDOWS%]\system\smsg.html
[%WINDOWS%]\system\ymupdater.exe

How to detect Ehks:

Files:
[%WINDOWS%]\system\evlog.dat
[%WINDOWS%]\system\smsg.html
[%WINDOWS%]\system\ymupdater.exe
[%WINDOWS%]\system\evlog.dat
[%WINDOWS%]\system\smsg.html
[%WINDOWS%]\system\ymupdater.exe

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Ehks:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Removing Pigeon.AWGD Trojan
Vxidl.BDV Trojan Cleaner
Removing Pigeon.AZM Trojan
TrojanDropper.JS.Mimail Trojan Symptoms
NavExcel Adware Removal instruction

Bancos.HPF Trojan

Removing Bancos.HPF
Categories: Trojan
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\mac.dll
[%SYSTEM%]\mac.dll

How to detect Bancos.HPF:

Files:
[%SYSTEM%]\mac.dll
[%SYSTEM%]\mac.dll

Removing Bancos.HPF:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Dref.K Worm Information
Removing WebCrawler Toolbar
Remove Vxidl.AMJ Trojan
Removing Zuten Trojan
W95.Zombie Backdoor Cleaner

SillyDl.AZG Trojan

Removing SillyDl.AZG
Categories: Trojan
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\srvcvthkxg.exe
[%WINDOWS%]\srvrmvefxv.exe
[%WINDOWS%]\srvsrjvwzt.exe
[%WINDOWS%]\srvzpgbhnd.exe
[%WINDOWS%]\srvcvthkxg.exe
[%WINDOWS%]\srvrmvefxv.exe
[%WINDOWS%]\srvsrjvwzt.exe
[%WINDOWS%]\srvzpgbhnd.exe

How to detect SillyDl.AZG:

Files:
[%WINDOWS%]\srvcvthkxg.exe
[%WINDOWS%]\srvrmvefxv.exe
[%WINDOWS%]\srvsrjvwzt.exe
[%WINDOWS%]\srvzpgbhnd.exe
[%WINDOWS%]\srvcvthkxg.exe
[%WINDOWS%]\srvrmvefxv.exe
[%WINDOWS%]\srvsrjvwzt.exe
[%WINDOWS%]\srvzpgbhnd.exe

Removing SillyDl.AZG:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Removing Pigeon.AVB Trojan
IRCFlood.RTEM Trojan Removal instruction

Roings.com Adware

Removing Roings.com
Categories: Adware,BHO,Hijacker,Toolbar
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.

As this information is entered by the user, it is captured by the BHO (Browser Helper Object) and
sent back to the attacker.
Typically, keyloggers of this type will send the stolen information back to the attacker via email
or HTTP POST, which can appear suspicious.A Search hijacker redirects search results to other pages and may
transmit search and browsing data to unknown servers. An error page hijacker directs
the browser to another page, usually an advertising page, instead of the usual error
page when the requested URL is not found.
Toolbar presents itself as a helpful add-on for Internet Explorer but it is a real pest.
It replaces your start page, continuosly open a number of pop up windows and so on.

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\unstall.exe
[%SYSTEM%]\wat.dll
[%WINDOWS%]\system\wat.dll
[%WINDOWS%]\unstall.exe
[%SYSTEM%]\wat.dll
[%WINDOWS%]\system\wat.dll

How to detect Roings.com:

Files:
[%WINDOWS%]\unstall.exe
[%SYSTEM%]\wat.dll
[%WINDOWS%]\system\wat.dll
[%WINDOWS%]\unstall.exe
[%SYSTEM%]\wat.dll
[%WINDOWS%]\system\wat.dll

Registry Keys:
HKEY_LOCAL_MACHINE\software\roimoi
HKEY_CLASSES_ROOT\clsid\{e0ce16cb-741c-4b24-8d04-a817856e07f4}
HKEY_CLASSES_ROOT\clsid\{f2863ede-7980-443a-aea2-0f46076d590f}
HKEY_CLASSES_ROOT\interface\{3e4bcf50-865b-4ef4-a0bc-bf57229ea525}
HKEY_CLASSES_ROOT\interface\{64a5bd22-8d8a-4193-9cf8-7db5212abb17}
HKEY_CLASSES_ROOT\interface\{9f61cfdf-5c79-4d35-b4da-766b28367223}
HKEY_CLASSES_ROOT\interface\{e832ffde-8ed2-47b7-be50-729a238040a0}
HKEY_CLASSES_ROOT\iobjsafety.democtl
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{f2863ede-7980-443a-aea2-0f46076d590f}
HKEY_CLASSES_ROOT\typelib\{78a163d2-2358-464d-807b-0e2a078c7727}
HKEY_LOCAL_MACHINE\software\classes\clsid\{f2863ede-7980-443a-aea2-0f46076d590f}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{f2863ede-7980-443a-aea2-0f46076d590f}

Removing Roings.com:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Removing SearchUrl (SearchSpy) Adware
Spabot.x Trojan Removal
TrojanDownloader.BDCJ01 Trojan Removal instruction
Xenozbot Backdoor Removal instruction

Windows.Remote RAT

Removing Windows.Remote
Categories: RAT
Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on
April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack.


Visible Symptoms:
Files in system folders:
[%PROGRAMS%]\winfingerprint\uninstall winfingerprint.lnk
[%PROGRAMS%]\winfingerprint\winfingerprint.lnk
[%PROGRAMS%]\winfingerprint\uninstall winfingerprint.lnk
[%PROGRAMS%]\winfingerprint\winfingerprint.lnk

How to detect Windows.Remote:

Files:
[%PROGRAMS%]\winfingerprint\uninstall winfingerprint.lnk
[%PROGRAMS%]\winfingerprint\winfingerprint.lnk
[%PROGRAMS%]\winfingerprint\uninstall winfingerprint.lnk
[%PROGRAMS%]\winfingerprint\winfingerprint.lnk

Folders:
[%PROGRAMS%]\all users\start menu\programs\windows remote client
[%PROGRAMS%]\windows remote client
[%PROGRAM_FILES%]\windows remote client
[%PROGRAM_FILES%]\winfingerprint

Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\windows remote client
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\winfingerprint
HKEY_LOCAL_MACHINE\software\winfingerprint.sourceforge.net\winfingerprint

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app paths\windowsremote.exe

Removing Windows.Remote:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Remove AntiPascal Trojan
BackDoor.AWQ Trojan Cleaner
AirBot Trojan Symptoms

SearchEnhancement Hijacker

Removing SearchEnhancement
Categories: Hijacker
A desktop hijacker replaces the desktop wallpaper with advertising
for products and services on the desktop.

SearchEnhancement Also known as:

[Panda]Adware/Scbar,Adware/WindowEnhancer

Visible Symptoms:
Files in system folders:
[%PROFILE_TEMP%]\data\baccarat\3d\xl\card_away_player.ani
[%PROFILE_TEMP%]\data\baccarat\3d\xl\card_draw_player.ani
[%PROFILE_TEMP%]\data\cashier\rtf\deposit_900pay.rtf
[%PROFILE_TEMP%]\data\cashier\rtf\deposit_bank.rtf
[%PROFILE_TEMP%]\data\common\fonts\system12.fon
[%PROFILE_TEMP%]\data\common\fonts\tahoma10.fon
[%PROFILE_TEMP%]\data\common\fonts\tahoma10b.fon
[%PROFILE_TEMP%]\data\common\fonts\tahoma8.fon
[%PROFILE_TEMP%]\data\common\fonts\tahoma8b.fon
[%PROFILE_TEMP%]\data\common\fonts\ui8.fon
[%PROFILE_TEMP%]\data\shared\3d\card_stand_dealer_face_down.ani
[%PROFILE_TEMP%]\data\shared\3d\slots3reel_reel0_xl.slt
[%PROFILE_TEMP%]\data\shared\3d\slots3reel_reel1_xl.slt
[%PROFILE_TEMP%]\data\shared\3d\slots3reel_reel2_xl.slt
[%PROFILE_TEMP%]\data\shared\3d\slots5reel_xl_reel0.slt
[%PROFILE_TEMP%]\data\shared\3d\slots5reel_xl_reel1.slt
[%PROFILE_TEMP%]\data\shared\3d\slots5reel_xl_reel2.slt
[%PROFILE_TEMP%]\data\shared\3d\slots5reel_xl_reel3.slt
[%PROFILE_TEMP%]\data\shared\3d\slots5reel_xl_reel4.slt
[%PROFILE_TEMP%]\data\shared\3d\videoslots_9line1.slt
[%PROFILE_TEMP%]\data\shared\3d\xl\card_draw_left_face_down.ani
[%PROFILE_TEMP%]\data\shared\3d\xl\card_draw_right_face_down.ani
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots3reel_reel0_xl.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots3reel_reel1_xl.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots3reel_reel2_xl.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots5reel_xl_reel0.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots5reel_xl_reel1.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots5reel_xl_reel2.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots5reel_xl_reel3.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots5reel_xl_reel4.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\videoslots_9line1.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\baccarat\3d\xl\card_away_player.ani
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\baccarat\3d\xl\card_draw_player.ani
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\cashier\rtf\deposit_900pay.rtf
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\cashier\rtf\deposit_bank.rtf
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\system12.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\tahoma10.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\tahoma10b.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\tahoma8.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\tahoma8b.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\ui8.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\card_stand_dealer_face_down.ani
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots3reel_reel0_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots3reel_reel1_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots3reel_reel2_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots5reel_xl_reel0.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots5reel_xl_reel1.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots5reel_xl_reel2.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots5reel_xl_reel3.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots5reel_xl_reel4.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\videoslots_9line1.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\xl\card_draw_left_face_down.ani
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\xl\card_draw_right_face_down.ani
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots3reel_reel0_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots3reel_reel1_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots3reel_reel2_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots5reel_xl_reel0.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots5reel_xl_reel1.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots5reel_xl_reel2.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots5reel_xl_reel3.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots5reel_xl_reel4.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\videoslots_9line1.slt
[%PROFILE_TEMP%]\wz48e3\data\cashier\rtf\deposit_900pay.rtf
[%PROFILE_TEMP%]\wz48e3\data\cashier\rtf\deposit_bank.rtf
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\system12.fon
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\tahoma10.fon
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\tahoma10b.fon
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\tahoma8.fon
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\tahoma8b.fon
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\ui8.fon
[%PROFILE_TEMP%]\data\baccarat\3d\xl\card_away_player.ani
[%PROFILE_TEMP%]\data\baccarat\3d\xl\card_draw_player.ani
[%PROFILE_TEMP%]\data\cashier\rtf\deposit_900pay.rtf
[%PROFILE_TEMP%]\data\cashier\rtf\deposit_bank.rtf
[%PROFILE_TEMP%]\data\common\fonts\system12.fon
[%PROFILE_TEMP%]\data\common\fonts\tahoma10.fon
[%PROFILE_TEMP%]\data\common\fonts\tahoma10b.fon
[%PROFILE_TEMP%]\data\common\fonts\tahoma8.fon
[%PROFILE_TEMP%]\data\common\fonts\tahoma8b.fon
[%PROFILE_TEMP%]\data\common\fonts\ui8.fon
[%PROFILE_TEMP%]\data\shared\3d\card_stand_dealer_face_down.ani
[%PROFILE_TEMP%]\data\shared\3d\slots3reel_reel0_xl.slt
[%PROFILE_TEMP%]\data\shared\3d\slots3reel_reel1_xl.slt
[%PROFILE_TEMP%]\data\shared\3d\slots3reel_reel2_xl.slt
[%PROFILE_TEMP%]\data\shared\3d\slots5reel_xl_reel0.slt
[%PROFILE_TEMP%]\data\shared\3d\slots5reel_xl_reel1.slt
[%PROFILE_TEMP%]\data\shared\3d\slots5reel_xl_reel2.slt
[%PROFILE_TEMP%]\data\shared\3d\slots5reel_xl_reel3.slt
[%PROFILE_TEMP%]\data\shared\3d\slots5reel_xl_reel4.slt
[%PROFILE_TEMP%]\data\shared\3d\videoslots_9line1.slt
[%PROFILE_TEMP%]\data\shared\3d\xl\card_draw_left_face_down.ani
[%PROFILE_TEMP%]\data\shared\3d\xl\card_draw_right_face_down.ani
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots3reel_reel0_xl.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots3reel_reel1_xl.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots3reel_reel2_xl.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots5reel_xl_reel0.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots5reel_xl_reel1.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots5reel_xl_reel2.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots5reel_xl_reel3.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots5reel_xl_reel4.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\videoslots_9line1.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\baccarat\3d\xl\card_away_player.ani
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\baccarat\3d\xl\card_draw_player.ani
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\cashier\rtf\deposit_900pay.rtf
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\cashier\rtf\deposit_bank.rtf
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\system12.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\tahoma10.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\tahoma10b.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\tahoma8.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\tahoma8b.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\ui8.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\card_stand_dealer_face_down.ani
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots3reel_reel0_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots3reel_reel1_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots3reel_reel2_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots5reel_xl_reel0.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots5reel_xl_reel1.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots5reel_xl_reel2.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots5reel_xl_reel3.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots5reel_xl_reel4.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\videoslots_9line1.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\xl\card_draw_left_face_down.ani
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\xl\card_draw_right_face_down.ani
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots3reel_reel0_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots3reel_reel1_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots3reel_reel2_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots5reel_xl_reel0.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots5reel_xl_reel1.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots5reel_xl_reel2.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots5reel_xl_reel3.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots5reel_xl_reel4.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\videoslots_9line1.slt
[%PROFILE_TEMP%]\wz48e3\data\cashier\rtf\deposit_900pay.rtf
[%PROFILE_TEMP%]\wz48e3\data\cashier\rtf\deposit_bank.rtf
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\system12.fon
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\tahoma10.fon
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\tahoma10b.fon
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\tahoma8.fon
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\tahoma8b.fon
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\ui8.fon

How to detect SearchEnhancement:

Files:
[%PROFILE_TEMP%]\data\baccarat\3d\xl\card_away_player.ani
[%PROFILE_TEMP%]\data\baccarat\3d\xl\card_draw_player.ani
[%PROFILE_TEMP%]\data\cashier\rtf\deposit_900pay.rtf
[%PROFILE_TEMP%]\data\cashier\rtf\deposit_bank.rtf
[%PROFILE_TEMP%]\data\common\fonts\system12.fon
[%PROFILE_TEMP%]\data\common\fonts\tahoma10.fon
[%PROFILE_TEMP%]\data\common\fonts\tahoma10b.fon
[%PROFILE_TEMP%]\data\common\fonts\tahoma8.fon
[%PROFILE_TEMP%]\data\common\fonts\tahoma8b.fon
[%PROFILE_TEMP%]\data\common\fonts\ui8.fon
[%PROFILE_TEMP%]\data\shared\3d\card_stand_dealer_face_down.ani
[%PROFILE_TEMP%]\data\shared\3d\slots3reel_reel0_xl.slt
[%PROFILE_TEMP%]\data\shared\3d\slots3reel_reel1_xl.slt
[%PROFILE_TEMP%]\data\shared\3d\slots3reel_reel2_xl.slt
[%PROFILE_TEMP%]\data\shared\3d\slots5reel_xl_reel0.slt
[%PROFILE_TEMP%]\data\shared\3d\slots5reel_xl_reel1.slt
[%PROFILE_TEMP%]\data\shared\3d\slots5reel_xl_reel2.slt
[%PROFILE_TEMP%]\data\shared\3d\slots5reel_xl_reel3.slt
[%PROFILE_TEMP%]\data\shared\3d\slots5reel_xl_reel4.slt
[%PROFILE_TEMP%]\data\shared\3d\videoslots_9line1.slt
[%PROFILE_TEMP%]\data\shared\3d\xl\card_draw_left_face_down.ani
[%PROFILE_TEMP%]\data\shared\3d\xl\card_draw_right_face_down.ani
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots3reel_reel0_xl.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots3reel_reel1_xl.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots3reel_reel2_xl.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots5reel_xl_reel0.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots5reel_xl_reel1.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots5reel_xl_reel2.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots5reel_xl_reel3.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots5reel_xl_reel4.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\videoslots_9line1.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\baccarat\3d\xl\card_away_player.ani
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\baccarat\3d\xl\card_draw_player.ani
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\cashier\rtf\deposit_900pay.rtf
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\cashier\rtf\deposit_bank.rtf
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\system12.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\tahoma10.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\tahoma10b.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\tahoma8.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\tahoma8b.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\ui8.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\card_stand_dealer_face_down.ani
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots3reel_reel0_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots3reel_reel1_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots3reel_reel2_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots5reel_xl_reel0.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots5reel_xl_reel1.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots5reel_xl_reel2.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots5reel_xl_reel3.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots5reel_xl_reel4.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\videoslots_9line1.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\xl\card_draw_left_face_down.ani
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\xl\card_draw_right_face_down.ani
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots3reel_reel0_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots3reel_reel1_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots3reel_reel2_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots5reel_xl_reel0.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots5reel_xl_reel1.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots5reel_xl_reel2.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots5reel_xl_reel3.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots5reel_xl_reel4.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\videoslots_9line1.slt
[%PROFILE_TEMP%]\wz48e3\data\cashier\rtf\deposit_900pay.rtf
[%PROFILE_TEMP%]\wz48e3\data\cashier\rtf\deposit_bank.rtf
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\system12.fon
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\tahoma10.fon
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\tahoma10b.fon
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\tahoma8.fon
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\tahoma8b.fon
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\ui8.fon
[%PROFILE_TEMP%]\data\baccarat\3d\xl\card_away_player.ani
[%PROFILE_TEMP%]\data\baccarat\3d\xl\card_draw_player.ani
[%PROFILE_TEMP%]\data\cashier\rtf\deposit_900pay.rtf
[%PROFILE_TEMP%]\data\cashier\rtf\deposit_bank.rtf
[%PROFILE_TEMP%]\data\common\fonts\system12.fon
[%PROFILE_TEMP%]\data\common\fonts\tahoma10.fon
[%PROFILE_TEMP%]\data\common\fonts\tahoma10b.fon
[%PROFILE_TEMP%]\data\common\fonts\tahoma8.fon
[%PROFILE_TEMP%]\data\common\fonts\tahoma8b.fon
[%PROFILE_TEMP%]\data\common\fonts\ui8.fon
[%PROFILE_TEMP%]\data\shared\3d\card_stand_dealer_face_down.ani
[%PROFILE_TEMP%]\data\shared\3d\slots3reel_reel0_xl.slt
[%PROFILE_TEMP%]\data\shared\3d\slots3reel_reel1_xl.slt
[%PROFILE_TEMP%]\data\shared\3d\slots3reel_reel2_xl.slt
[%PROFILE_TEMP%]\data\shared\3d\slots5reel_xl_reel0.slt
[%PROFILE_TEMP%]\data\shared\3d\slots5reel_xl_reel1.slt
[%PROFILE_TEMP%]\data\shared\3d\slots5reel_xl_reel2.slt
[%PROFILE_TEMP%]\data\shared\3d\slots5reel_xl_reel3.slt
[%PROFILE_TEMP%]\data\shared\3d\slots5reel_xl_reel4.slt
[%PROFILE_TEMP%]\data\shared\3d\videoslots_9line1.slt
[%PROFILE_TEMP%]\data\shared\3d\xl\card_draw_left_face_down.ani
[%PROFILE_TEMP%]\data\shared\3d\xl\card_draw_right_face_down.ani
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots3reel_reel0_xl.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots3reel_reel1_xl.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots3reel_reel2_xl.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots5reel_xl_reel0.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots5reel_xl_reel1.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots5reel_xl_reel2.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots5reel_xl_reel3.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\slots5reel_xl_reel4.slt
[%PROFILE_TEMP%]\ngtemp\data\shared\3d\videoslots_9line1.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\baccarat\3d\xl\card_away_player.ani
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\baccarat\3d\xl\card_draw_player.ani
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\cashier\rtf\deposit_900pay.rtf
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\cashier\rtf\deposit_bank.rtf
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\system12.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\tahoma10.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\tahoma10b.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\tahoma8.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\tahoma8b.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\common\fonts\ui8.fon
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\card_stand_dealer_face_down.ani
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots3reel_reel0_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots3reel_reel1_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots3reel_reel2_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots5reel_xl_reel0.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots5reel_xl_reel1.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots5reel_xl_reel2.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots5reel_xl_reel3.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\slots5reel_xl_reel4.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\videoslots_9line1.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\xl\card_draw_left_face_down.ani
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\data\shared\3d\xl\card_draw_right_face_down.ani
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots3reel_reel0_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots3reel_reel1_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots3reel_reel2_xl.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots5reel_xl_reel0.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots5reel_xl_reel1.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots5reel_xl_reel2.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots5reel_xl_reel3.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\slots5reel_xl_reel4.slt
[%PROFILE_TEMP%]\temp.fr????\Golden Palace Casino\ngtemp\data\shared\3d\videoslots_9line1.slt
[%PROFILE_TEMP%]\wz48e3\data\cashier\rtf\deposit_900pay.rtf
[%PROFILE_TEMP%]\wz48e3\data\cashier\rtf\deposit_bank.rtf
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\system12.fon
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\tahoma10.fon
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\tahoma10b.fon
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\tahoma8.fon
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\tahoma8b.fon
[%PROFILE_TEMP%]\wz48e3\data\common\fonts\ui8.fon

Removing SearchEnhancement:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Ads1.Advance.net Tracking Cookie Removal instruction
Remove Daemon Trojan
Removing NetVisor Spyware
AUJ Trojan Removal

TrafficAdvance Adware

Removing TrafficAdvance
Categories: Adware
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits

TrafficAdvance Also known as:

[Other]Trojan.Win32.Dialer.bn
[Kaspersky]~~Dialer-267
[McAfee]~~Dialer.Trafficadvance

Visible Symptoms:
Files in system folders:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Internet.lnk
[%FAVORITES%]\Internet.lnk
[%DESKTOP%]\adulti.lnk
[%DESKTOP%]\diari di viaggio.lnk
[%DESKTOP%]\meteo.lnk
[%DESKTOP%]\passe-partout.lnk
[%DESKTOP%]\patente.lnk
[%DESKTOP%]\trucchi e videogiochi.lnk
[%FAVORITES%]\adulti.lnk
[%PROFILE%]\start menu\adulti.lnk
[%PROGRAMS%]\FASTTRACK\Internet Disinstalla.lnk
[%PROGRAMS%]\FASTTRACK\Internet.lnk
[%STARTMENU%]\Internet.lnk
[%WINDOWS%]\adulti.exe
[%WINDOWS%]\diari di viaggio.exe
[%WINDOWS%]\meteo.exe
[%WINDOWS%]\passe-partout.exe
[%WINDOWS%]\Passepartout Light.exe
[%WINDOWS%]\Passepartout.exe
[%WINDOWS%]\patente.exe
[%WINDOWS%]\trucchi e videogiochi.exe
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Internet.lnk
[%FAVORITES%]\Internet.lnk
[%DESKTOP%]\adulti.lnk
[%DESKTOP%]\diari di viaggio.lnk
[%DESKTOP%]\meteo.lnk
[%DESKTOP%]\passe-partout.lnk
[%DESKTOP%]\patente.lnk
[%DESKTOP%]\trucchi e videogiochi.lnk
[%FAVORITES%]\adulti.lnk
[%PROFILE%]\start menu\adulti.lnk
[%PROGRAMS%]\FASTTRACK\Internet Disinstalla.lnk
[%PROGRAMS%]\FASTTRACK\Internet.lnk
[%STARTMENU%]\Internet.lnk
[%WINDOWS%]\adulti.exe
[%WINDOWS%]\diari di viaggio.exe
[%WINDOWS%]\meteo.exe
[%WINDOWS%]\passe-partout.exe
[%WINDOWS%]\Passepartout Light.exe
[%WINDOWS%]\Passepartout.exe
[%WINDOWS%]\patente.exe
[%WINDOWS%]\trucchi e videogiochi.exe

How to detect TrafficAdvance:

Files:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Internet.lnk
[%FAVORITES%]\Internet.lnk
[%DESKTOP%]\adulti.lnk
[%DESKTOP%]\diari di viaggio.lnk
[%DESKTOP%]\meteo.lnk
[%DESKTOP%]\passe-partout.lnk
[%DESKTOP%]\patente.lnk
[%DESKTOP%]\trucchi e videogiochi.lnk
[%FAVORITES%]\adulti.lnk
[%PROFILE%]\start menu\adulti.lnk
[%PROGRAMS%]\FASTTRACK\Internet Disinstalla.lnk
[%PROGRAMS%]\FASTTRACK\Internet.lnk
[%STARTMENU%]\Internet.lnk
[%WINDOWS%]\adulti.exe
[%WINDOWS%]\diari di viaggio.exe
[%WINDOWS%]\meteo.exe
[%WINDOWS%]\passe-partout.exe
[%WINDOWS%]\Passepartout Light.exe
[%WINDOWS%]\Passepartout.exe
[%WINDOWS%]\patente.exe
[%WINDOWS%]\trucchi e videogiochi.exe
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Internet.lnk
[%FAVORITES%]\Internet.lnk
[%DESKTOP%]\adulti.lnk
[%DESKTOP%]\diari di viaggio.lnk
[%DESKTOP%]\meteo.lnk
[%DESKTOP%]\passe-partout.lnk
[%DESKTOP%]\patente.lnk
[%DESKTOP%]\trucchi e videogiochi.lnk
[%FAVORITES%]\adulti.lnk
[%PROFILE%]\start menu\adulti.lnk
[%PROGRAMS%]\FASTTRACK\Internet Disinstalla.lnk
[%PROGRAMS%]\FASTTRACK\Internet.lnk
[%STARTMENU%]\Internet.lnk
[%WINDOWS%]\adulti.exe
[%WINDOWS%]\diari di viaggio.exe
[%WINDOWS%]\meteo.exe
[%WINDOWS%]\passe-partout.exe
[%WINDOWS%]\Passepartout Light.exe
[%WINDOWS%]\Passepartout.exe
[%WINDOWS%]\patente.exe
[%WINDOWS%]\trucchi e videogiochi.exe

Registry Values:
HKEY_CURRENT_USER\software\fasttrack
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing TrafficAdvance:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Public Messenger Trojan Information
Removing Donnic Trojan
SillyDl.CYF Trojan Symptoms
Bancos.GJE Trojan Removal