Friday, October 10, 2008

DlToon Trojan

Removing DlToon
Categories: Trojan,Adware,BHO,Hijacker,Downloader
This loose category includes a variety of Trojans that damage victim machines or threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers create multi-functional Trojans rather than Trojan packs.
Adware are programs that facilitate delivery for advertising content to the user and in some cases gather information from the user's computer, including information related to Internet browser usage or other computer habits
BHO (Browser Helper Object) Trojan. The BHO waits for the user to post personal information to a monitored website. As this information is entered by the user, it is captured by the BHO and sent back to the attacker. The method of network transport used by the attacker makes this Trojan unique. Typically, keyloggers of this type will send the stolen information back to the attacker via email or HTTP POST, which can appear suspicious. Instead, this Trojan encodes the data with a simple XOR algorithm before placing it into the data section of an ICMP ping packet." explained the company.
Hijackers are software programs that modify users' default browser home page, search settings, error page settings, or desktop wallpaper without adequate notice, disclosure, or user consent.

When the default home page is hijacked, the browser opens to the web page set by the hijacker instead of the user's designated home page. In some cases, the hijacker may block users from restoring their desired home page.

A search hijacker redirects search results to other pages and may transmit search and browsing data to unknown servers. An error page hijacker directs the browser to another page, usually an advertising page, instead of the usual error page when the requested URL is not found.

A desktop hijacker replaces the desktop wallpaper with advertising for products and services on the desktop.

Hijackers take control of various parts of your web browser, including your home page, search pages, and search bar. They may also redirect you to certain sites should you mistype an address or prevent you from going to a website they would rather you not, such as sites that combat malware. Some will even redirect you to their own search engine when you attempt a search. NB: hijackers almost exclusively target Internet Explorer.
This family of Trojans downloads and installs new malware or adware on the computer. The downloader then either launches the new malware or registers it to enable autorun according to the local operating system requirements.

The names and locations of malware to be downloaded are either coded into the Trojan or downloaded from a specified website.

DlToon Also known as:

[Kaspersky]TrojanDownloader.Win32.Tooncom.j;
[Panda]Trj/Downloader.B,Spyware/Tooncom,Trojan Horse;
[Computer Associates]Win32.DlToon,Win32/DlToon!Trojan,Win32/Dltoon.B!Trojan,Win32/DLToon.36352.B!Trojan,Win32.DlToon.C,Win32/DlToon.C!Trojan,Win32.DlToon.F,Win32/DlToon.F1!Trojan,Win32.DlToon.J,Win32/DlNati.A!Trojan,Win32.DlToon.H,Win32/DlToon.H!Trojan,Win32.DlToon.L,Win32/DlToon.L!Trojan,Win32.DlToon.I,Win32/DlToon.I!Trojan

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\loader.exe
[%PROGRAM_FILES%]\windows media player\loader.exe
[%WINDOWS%]\dnserr.dll
[%WINDOWS%]\fqdin.exe
[%WINDOWS%]\iedll.exe
[%WINDOWS%]\loader.exe
[%PROGRAM_FILES%]\windows media player\loader.exe
[%WINDOWS%]\dnserr.dll
[%WINDOWS%]\fqdin.exe
[%WINDOWS%]\iedll.exe

How to detect DlToon:

Files:
[%WINDOWS%]\loader.exe
[%PROGRAM_FILES%]\windows media player\loader.exe
[%WINDOWS%]\dnserr.dll
[%WINDOWS%]\fqdin.exe
[%WINDOWS%]\iedll.exe
[%WINDOWS%]\loader.exe
[%PROGRAM_FILES%]\windows media player\loader.exe
[%WINDOWS%]\dnserr.dll
[%WINDOWS%]\fqdin.exe
[%WINDOWS%]\iedll.exe

Registry Keys:
HKEY_LOCAL_MACHINE\software\msbb

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing DlToon:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Balloon.Pop.Word.Game Trojan Cleaner
DomainHelper Adware Cleaner
InCommand Trojan Cleaner
TrojanClicker.Win32.Delf.ab Trojan Symptoms
Remove All.in.One Spyware

DomainHelper Adware

Removing DomainHelper
Categories: Adware,BHO
Adware are programs that facilitate delivery for advertising content to the user and in some cases gather information from the user's computer, including information related to Internet browser usage or other computer habits
BHO (Browser Helper Object) Trojan. The BHO waits for the user to post personal information to a monitored website. As this information is entered by the user, it is captured by the BHO and sent back to the attacker. The method of network transport used by the attacker makes this Trojan unique. Typically, keyloggers of this type will send the stolen information back to the attacker via email or HTTP POST, which can appear suspicious. Instead, this Trojan encodes the data with a simple XOR algorithm before placing it into the data section of an ICMP ping packet." explained the company.

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\DomainHelper.dll
[%SYSTEM%]\DomainHelper.dll

How to detect DomainHelper:

Files:
[%SYSTEM%]\DomainHelper.dll
[%SYSTEM%]\DomainHelper.dll

Registry Keys:
HKEY_CLASSES_ROOT\appid\domainhelper.dll
HKEY_CLASSES_ROOT\appid\{20f8483e-6ced-445f-af32-d9c646a6ede9}
HKEY_CLASSES_ROOT\CLSID\{B8A5DE1C-BC13-4DD2-BF00-7BE3C603F9F2}
HKEY_CLASSES_ROOT\domainhelper.dh
HKEY_CLASSES_ROOT\domainhelper.dh.1
HKEY_CLASSES_ROOT\interface\{954b641e-268e-4b09-9e53-f2d2a4551eab}
HKEY_CLASSES_ROOT\typelib\{5aa5392d-e5c9-4276-8998-44c3c578419d}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B8A5DE1C-BC13-4DD2-BF00-7BE3C603F9F2}
HKEY_CLASSES_ROOT\clsid\{b8a5de1c-bc13-4dd2-bf00-7be3c603f9f2}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{b8a5de1c-bc13-4dd2-bf00-7be3c603f9f2}

Removing DomainHelper:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
IBar.cn Toolbar Removal
Removing Downloader.ACV Adware
Bopninja Trojan Symptoms
Small.ct Backdoor Symptoms
Nauj Adware Symptoms

Bopninja Trojan

Removing Bopninja
Categories: Trojan,Hacker Tool
This loose category includes a variety of Trojans that damage victim machines or threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers create multi-functional Trojans rather than Trojan packs.
These utilities are designed to penetrate remote computers in order to use them as zombies (by using backdoors) or to download other malicious programs to computer.

Exploits use vulnerabilities in operating systems and applications to achieve the same result.

Bopninja Also known as:

[Kaspersky]Trojan-PWS.Win32.Lmir.auo,Trojan-PWS.Win32.Lmir.ave,Trojan-PSW.Win32.Lmir.auo,Trojan-PSW.Win32.Lmir.ayl,Trojan-PSW.Win32.WOW.dr,Trojan-PSW.Win32.WOW.em,Trojan-PSW.Win32.Lmir.ayf,Trojan-PSW.Win32.WOW.de,Trojan-PSW.win32.WOW.ef,Trojan-PSW.Win32.Lmir.aye,Trojan-PSW.Win32.WOW.dy,Trojan-PSW.Win32.WOW.fp,Trojan-PSW.Win32.WOW.bv,trojan-PSW.Win32.WOW.bv,Trojan-PSW.Win32.WOW.cff,Trojan-PSW.Win32.Lmir.azn,Trojan-PSW.Win32.WOW.gs,Trojan-PSW.Win32.Lmir.axg,Trojan-PSW.Win32.WOW.fo,Trojan-PSW.Win32.WOW.go,Trojan-PSW.Win32.WOW.dn,Trojan-PSW.Win32.WOW.fa;
[McAfee]Generic.PWS.o,PWS-WoW,PWS-Wow,Generic PWS.r,PWS-LegMir,BackDoor-CUQ;
[Other]Win32/Bopninja.V,Trojan-PSW.Win32.Lmir.axh,Infostealer.Lemir.Gen,Win32/Bopninja.T,Infostealer.Wowcraft,TSPY_WOWCRAFT.AL,Win32/Bopninja.U,Infostealer.Wowcraft.C,TSPY_LMIR.CM,Win32/Bopninja.P,Infostealer.Lemir,Win32/Bopninja.AE,Infostealer.Wowcraft.D,Win32/Bopninja.AB,Win32/Bopninja.AH,Infostealer,Win32/Bopninja.AC,Win32/Bopninja.AF,Win32/Bopninja.Y,Win32/Bopninja.X,TSPY_WOW.LO,Win32/Bopninja.AK,Backdoor.Trojan,Win32/Bopninja.AN,W32.Autex.C,Win32/Bopninja.AM,Win32/Bopninja.AO,Win32/Bopninja.AJ,Win32.Bopninja.AR,Win32/Bopninja.R,Win32/Bopninja.AX,Win32/Bopninja.AY,Win32/Bopninja.S,Win32/Bopninja.BW,Win32/Bopninja.AW,Win32/Bopninja.AZ,Win32/Bopninja.W,Win32/Bopninja.Z,Win32/Bopninja.AA

How to detect Bopninja:

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices

Removing Bopninja:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
VividKeyLogger Spyware Removal instruction
Balloon.Pop.Word.Game Trojan Removal instruction
Downloader.ACV Adware Removal
Small.B Trojan Information
Small.ct Backdoor Removal instruction

VividKeyLogger Spyware

Removing VividKeyLogger
Categories: Spyware
Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.

While the term spyware suggests software that secretly monitors the user's behavior, the functions of spyware extend well beyond simple monitoring.

Spyware programs can collect various types of personal information, such as Internet surfing habit, sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software, redirecting Web browser activity, accessing websites blindly that will cause more harmful viruses, or diverting advertising revenue to a third party.

Spyware can even change computer settings, resulting in slow connection speeds, different home pages, and loss of Internet or other programs. In an attempt to increase the understanding of spyware, a more formal classification of its included software types is captured under the term privacy-invasive software.

How to detect VividKeyLogger:

Folders:
[%PROGRAMS%]\Vivid Designs
[%PROGRAM_FILES%]\Vivid Designs

Registry Keys:
HKEY_CURRENT_USER\software\microsoft\installer\assemblies\c:|program files|vivid designs|vividkeylogger|magiclibrary.dll
HKEY_CURRENT_USER\software\microsoft\installer\assemblies\c:|program files|vivid designs|vividkeylogger|vividdesigns.buttons.dll
HKEY_CURRENT_USER\software\microsoft\installer\assemblies\c:|program files|vivid designs|vividkeylogger|vividdesigns.controls.dll
HKEY_CURRENT_USER\software\microsoft\installer\assemblies\c:|program files|vivid designs|vividkeylogger|vividkeylogger.exe
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{3c74af31-a673-4320-a5d0-7a4c7dfba174}

Removing VividKeyLogger:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Bitch.Controller Trojan Symptoms
IBar.cn Toolbar Information
Removing TrojanClicker.Win32.Delf.ab Trojan
Small.B Trojan Information
Excel.Yohimbe Trojan Information

IEBarUp Adware

Removing IEBarUp
Categories: Adware
Adware are programs that facilitate delivery for advertising content to the user and in some cases gather information from the user's computer, including information related to Internet browser usage or other computer habits

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\eeeeee.ini
[%SYSTEM%]\eeeeee1.ini
[%SYSTEM%]\IeBar1.dll
[%SYSTEM%]\prawned.exe
[%SYSTEM%]\prawnedhk.dll
[%SYSTEM%]\prawnedr.exe
[%SYSTEM%]\prawnedwb.dll
[%SYSTEM%]\eeeeee.ini
[%SYSTEM%]\eeeeee1.ini
[%SYSTEM%]\IeBar1.dll
[%SYSTEM%]\prawned.exe
[%SYSTEM%]\prawnedhk.dll
[%SYSTEM%]\prawnedr.exe
[%SYSTEM%]\prawnedwb.dll

How to detect IEBarUp:

Files:
[%SYSTEM%]\eeeeee.ini
[%SYSTEM%]\eeeeee1.ini
[%SYSTEM%]\IeBar1.dll
[%SYSTEM%]\prawned.exe
[%SYSTEM%]\prawnedhk.dll
[%SYSTEM%]\prawnedr.exe
[%SYSTEM%]\prawnedwb.dll
[%SYSTEM%]\eeeeee.ini
[%SYSTEM%]\eeeeee1.ini
[%SYSTEM%]\IeBar1.dll
[%SYSTEM%]\prawned.exe
[%SYSTEM%]\prawnedhk.dll
[%SYSTEM%]\prawnedr.exe
[%SYSTEM%]\prawnedwb.dll

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing IEBarUp:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Bitch.Controller Trojan Cleaner
Removing Badmin Trojan
Remove AntiSpyware.Soldier Adware
Remove Balloon.Pop.Word.Game Trojan
Remove TrojanClicker.Win32.Delf.ab Trojan

Downloader.ACV Adware

Removing Downloader.ACV
Categories: Adware,BHO,Downloader
Adware are programs that facilitate delivery for advertising content to the user and in some cases gather information from the user's computer, including information related to Internet browser usage or other computer habits
BHO (Browser Helper Object) Trojan. The BHO waits for the user to post personal information to a monitored website. As this information is entered by the user, it is captured by the BHO and sent back to the attacker. The method of network transport used by the attacker makes this Trojan unique. Typically, keyloggers of this type will send the stolen information back to the attacker via email or HTTP POST, which can appear suspicious. Instead, this Trojan encodes the data with a simple XOR algorithm before placing it into the data section of an ICMP ping packet." explained the company.
This family of Trojans downloads and installs new malware or adware on the computer. The downloader then either launches the new malware or registers it to enable autorun according to the local operating system requirements.

The names and locations of malware to be downloaded are either coded into the Trojan or downloaded from a specified website.

Downloader.ACV Also known as:

[Kaspersky]Trojan-Dropper.Win32.Mudrop.bq;
[McAfee]Downloader-ACV;
[Other]Win32/BokSpa.2xp,W32/Mudrop.FL,visfx

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\919_131.exe
[%WINDOWS%]\mseawql.exe
[%WINDOWS%]\mseawqlA.exe
[%WINDOWS%]\919_131.exe
[%WINDOWS%]\mseawql.exe
[%WINDOWS%]\mseawqlA.exe

How to detect Downloader.ACV:

Files:
[%WINDOWS%]\919_131.exe
[%WINDOWS%]\mseawql.exe
[%WINDOWS%]\mseawqlA.exe
[%WINDOWS%]\919_131.exe
[%WINDOWS%]\mseawql.exe
[%WINDOWS%]\mseawqlA.exe

Removing Downloader.ACV:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Small.B Trojan Information
Removing Badmin Trojan
SillyDl.DBN Trojan Cleaner
IBar.cn Toolbar Symptoms
Removing AntiSpyware.Soldier Adware

Removal.Wizard Adware

Removing Removal.Wizard
Categories: Adware
Adware are programs that facilitate delivery for advertising content to the user and in some cases gather information from the user's computer, including information related to Internet browser usage or other computer habits

Visible Symptoms:
Files in system folders:
[%DESKTOP%]\Spywware Removal Wizard.lnk
[%DESKTOP%]\Spywware Removal Wizard.lnk

How to detect Removal.Wizard:

Files:
[%DESKTOP%]\Spywware Removal Wizard.lnk
[%DESKTOP%]\Spywware Removal Wizard.lnk

Folders:
[%PROGRAM_FILES%]\Spyware Removal Wizard

Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\spyware removal wizard_is1

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Removal.Wizard:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Badmin Trojan Information
Excel.Yohimbe Trojan Symptoms
TrojanClicker.Win32.Delf.ab Trojan Removal instruction
Small.B Trojan Information
AntiSpyware.Soldier Adware Cleaner

Small.B Trojan

Removing Small.B
Categories: Trojan,Spyware
This loose category includes a variety of Trojans that damage victim machines or threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers create multi-functional Trojans rather than Trojan packs.
Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.

While the term spyware suggests software that secretly monitors the user's behavior, the functions of spyware extend well beyond simple monitoring.

Spyware programs can collect various types of personal information, such as Internet surfing habit, sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software, redirecting Web browser activity, accessing websites blindly that will cause more harmful viruses, or diverting advertising revenue to a third party.

Spyware can even change computer settings, resulting in slow connection speeds, different home pages, and loss of Internet or other programs. In an attempt to increase the understanding of spyware, a more formal classification of its included software types is captured under the term privacy-invasive software.

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\9129837.exe
[%WINDOWS%]\9129837.exe

How to detect Small.B:

Files:
[%WINDOWS%]\9129837.exe
[%WINDOWS%]\9129837.exe

Registry Values:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Removing Small.B:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
IBar.cn Toolbar Removal
Zlob.Fam.Internet Explorer Secure Plug-in Trojan Removal
Bitch.Controller Trojan Information
Remove AntiSpyware.Soldier Adware
All.in.One Spyware Cleaner

AntiSpyware.Soldier Adware

Removing AntiSpyware.Soldier
Categories: Adware
Adware are programs that facilitate delivery for advertising content to the user and in some cases gather information from the user's computer, including information related to Internet browser usage or other computer habits

Visible Symptoms:
Files in system folders:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Antispyware Soldier.lnk
[%DESKTOP%]\Antispyware Soldier.lnk
[%STARTUP%]\antispysoldier.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Antispyware Soldier.lnk
[%DESKTOP%]\Antispyware Soldier.lnk
[%STARTUP%]\antispysoldier.lnk

How to detect AntiSpyware.Soldier:

Files:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Antispyware Soldier.lnk
[%DESKTOP%]\Antispyware Soldier.lnk
[%STARTUP%]\antispysoldier.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Antispyware Soldier.lnk
[%DESKTOP%]\Antispyware Soldier.lnk
[%STARTUP%]\antispysoldier.lnk

Folders:
[%LOCAL_APPDATA%]\AntispywareSoldier
[%PROGRAM_FILES%]\Antispyware Soldier

Registry Keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Antispyware Soldier_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\antispyware soldier_is1

Removing AntiSpyware.Soldier:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Remove InCommand Trojan
Balloon.Pop.Word.Game Trojan Removal
Zlob.Fam.Internet Explorer Secure Plug-in Trojan Information
TrojanClicker.Win32.Delf.ab Trojan Information
Badmin Trojan Removal

All.in.One Spyware

Removing All.in.One
Categories: Spyware
Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.

While the term spyware suggests software that secretly monitors the user's behavior, the functions of spyware extend well beyond simple monitoring.

Spyware programs can collect various types of personal information, such as Internet surfing habit, sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software, redirecting Web browser activity, accessing websites blindly that will cause more harmful viruses, or diverting advertising revenue to a third party.

Spyware can even change computer settings, resulting in slow connection speeds, different home pages, and loss of Internet or other programs. In an attempt to increase the understanding of spyware, a more formal classification of its included software types is captured under the term privacy-invasive software.

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\MSTRC32.DLL
[%SYSTEM%]\rgcvt32.dll
[%PROGRAMS%]\relytec\all in one keylogger guide.lnk
[%PROGRAMS%]\relytec\all in one.lnk
[%PROGRAMS%]\relytec\purchase all in one keylogger.lnk
[%PROGRAMS%]\relytec\uninstall all in one keylogger.lnk
[%PROGRAMS%]\relytec\visit all in one keylogger site.lnk
[%SYSTEM%]\mssidtsra.exe
[%SYSTEM%]\MSTRC32.DLL
[%SYSTEM%]\rgcvt32.dll
[%PROGRAMS%]\relytec\all in one keylogger guide.lnk
[%PROGRAMS%]\relytec\all in one.lnk
[%PROGRAMS%]\relytec\purchase all in one keylogger.lnk
[%PROGRAMS%]\relytec\uninstall all in one keylogger.lnk
[%PROGRAMS%]\relytec\visit all in one keylogger site.lnk
[%SYSTEM%]\mssidtsra.exe

How to detect All.in.One:

Files:
[%SYSTEM%]\MSTRC32.DLL
[%SYSTEM%]\rgcvt32.dll
[%PROGRAMS%]\relytec\all in one keylogger guide.lnk
[%PROGRAMS%]\relytec\all in one.lnk
[%PROGRAMS%]\relytec\purchase all in one keylogger.lnk
[%PROGRAMS%]\relytec\uninstall all in one keylogger.lnk
[%PROGRAMS%]\relytec\visit all in one keylogger site.lnk
[%SYSTEM%]\mssidtsra.exe
[%SYSTEM%]\MSTRC32.DLL
[%SYSTEM%]\rgcvt32.dll
[%PROGRAMS%]\relytec\all in one keylogger guide.lnk
[%PROGRAMS%]\relytec\all in one.lnk
[%PROGRAMS%]\relytec\purchase all in one keylogger.lnk
[%PROGRAMS%]\relytec\uninstall all in one keylogger.lnk
[%PROGRAMS%]\relytec\visit all in one keylogger site.lnk
[%SYSTEM%]\mssidtsra.exe

Folders:
[%DESKTOP%]\relytec
[%PROGRAM_FILES%]\1ps-orp-px
[%PROGRAM_FILES%]\Eman_Tresni
[%PROGRAM_FILES%]\Rq2yz2-Lanosrep

Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\all in one keylogger 2.6_is1

Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\all in one keylogger 1.7_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\all in one keylogger 1.7_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\all in one keylogger 1.7_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\all in one keylogger 1.7_is1, inno setup: deselected tasks=desktopicon,quicklaunchicon
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\all in one keylogger 1.7_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\all in one keylogger 1.7_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\all in one keylogger 1.7_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\all in one keylogger 1.7_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\all in one keylogger 1.7_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\all in one keylogger 1.7_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\all in one keylogger 1.7_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\all in one keylogger 1.7_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\all in one keylogger 1.7_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\all in one keylogger 1.7_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\all in one keylogger 1.7_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\all in one keylogger 1.7_is1

Removing All.in.One:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Balloon.Pop.Word.Game Trojan Cleaner
Removing IBar.cn Toolbar
InCommand Trojan Removal
Remove Bitch.Controller Trojan
Remove SillyDl.DBN Trojan

IBar.cn Toolbar

Removing IBar.cn
Categories: Toolbar
Toolbar presents itself as a helpful add-on for Internet Explorer but it is a real pest. It replaces your start page, continuosly open a number of pop up windows and so on.

Visible Symptoms:
Files in system folders:
[%PROGRAM_FILES%]\iBar\10002\iBar.dll
[%PROGRAM_FILES%]\iBar\10002\iBar.ini
[%PROGRAM_FILES%]\iBar\10002\iBar.dll
[%PROGRAM_FILES%]\iBar\10002\iBar.ini

How to detect IBar.cn:

Files:
[%PROGRAM_FILES%]\iBar\10002\iBar.dll
[%PROGRAM_FILES%]\iBar\10002\iBar.ini
[%PROGRAM_FILES%]\iBar\10002\iBar.dll
[%PROGRAM_FILES%]\iBar\10002\iBar.ini

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{2e7d3330-eb94-4518-b0fe-e05379a5c1da}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{2e7d3330-eb94-4518-b0fe-e05379a5c1da}

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar

Removing IBar.cn:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
TrojanClicker.Win32.Delf.ab Trojan Removal instruction
Removing Badmin Trojan
Zlob.Fam.Internet Explorer Secure Plug-in Trojan Removal instruction
Removing Balloon.Pop.Word.Game Trojan
Remove Small.ct Backdoor

TrojanClicker.Win32.Delf.ab Trojan

Removing TrojanClicker.Win32.Delf.ab
Categories: Trojan,Adware
This loose category includes a variety of Trojans that damage victim machines or threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers create multi-functional Trojans rather than Trojan packs.
Adware are programs that facilitate delivery for advertising content to the user and in some cases gather information from the user's computer, including information related to Internet browser usage or other computer habits

TrojanClicker.Win32.Delf.ab Also known as:

[Panda]Trj/Clicker.S

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\bvm202.dll
[%WINDOWS%]\bvm202.dll

How to detect TrojanClicker.Win32.Delf.ab:

Files:
[%WINDOWS%]\bvm202.dll
[%WINDOWS%]\bvm202.dll

Removing TrojanClicker.Win32.Delf.ab:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Excel.Yohimbe Trojan Information
Balloon.Pop.Word.Game Trojan Information
Removing Badmin Trojan
Remove Zlob.Fam.Internet Explorer Secure Plug-in Trojan
Nauj Adware Removal

Zlob.Fam.Internet Explorer Secure Plug-in Trojan

Removing Zlob.Fam.Internet Explorer Secure Plug-in
Categories: Trojan,Popups
This loose category includes a variety of Trojans that damage victim machines or threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers create multi-functional Trojans rather than Trojan packs.
Adware is the class of programs that place advertisements on your screen. These may be in the form of pop-ups, pop-unders, advertisements embedded in programs, advertisements placed on top of ads in web sites, or any other way the authors can think of showing you an ad.

The pop-ups generally will not be stopped by pop-up stoppers, and often are not dependent on your having Internet Explorer open. They may show up when you are playing a game, writing a document, listening to music, or anything else. Should you be surfing, the advertisements will often be related to the web page you are viewing.

How to detect Zlob.Fam.Internet Explorer Secure Plug-in:

Registry Keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Internet Explorer Secure Plug-in

Removing Zlob.Fam.Internet Explorer Secure Plug-in:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Removing Balloon.Pop.Word.Game Trojan
Bitch.Controller Trojan Removal instruction
InCommand Trojan Information
SillyDl.DBN Trojan Symptoms
Small.ct Backdoor Removal instruction

Nauj Adware

Removing Nauj
Categories: Adware
Adware are programs that facilitate delivery for advertising content to the user and in some cases gather information from the user's computer, including information related to Internet browser usage or other computer habits

How to detect Nauj:

Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{DEBEB52F-CFA6-4647-971F-3EDB75B63AFA}
HKEY_CLASSES_ROOT\clsid\{debeb52f-cfa6-4647-971f-3edb75b63afa}

Removing Nauj:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Excel.Yohimbe Trojan Symptoms
Remove Badmin Trojan
Bitch.Controller Trojan Removal
Balloon.Pop.Word.Game Trojan Symptoms
Removing Small.ct Backdoor

InCommand Trojan

Removing InCommand
Categories: Trojan,Spyware,Backdoor,RAT,Hacker Tool
This loose category includes a variety of Trojans that damage victim machines or threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers create multi-functional Trojans rather than Trojan packs.
Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.

While the term spyware suggests software that secretly monitors the user's behavior, the functions of spyware extend well beyond simple monitoring.

Spyware programs can collect various types of personal information, such as Internet surfing habit, sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software, redirecting Web browser activity, accessing websites blindly that will cause more harmful viruses, or diverting advertising revenue to a third party.

Spyware can even change computer settings, resulting in slow connection speeds, different home pages, and loss of Internet or other programs. In an attempt to increase the understanding of spyware, a more formal classification of its included software types is captured under the term privacy-invasive software.
Backdoors are the most dangerous type of Trojans and the most popular. Backdoors open infected machines to external control via Internet. They function in the same way as legal remote administration programs used by system administrators. This makes them difficult to detect.

Backdoors are installed and launched without the consent of the user of computer. Often the backdoor will not be visible in the log of active programs.

Once a backdoor has been successfully launched, the computer is wide open. Backdoor functions can include:


  • Launching/ deleting files

  • Sending/ receiving files

  • Deleting data

  • Displaying notification

  • Rebooting the machine

  • Executing files




Backdoors are used by virus writers to detect and download confidential information, execute malicious code, destroy data, include the machine in bot networks and so forth. Backdoors combine the functionality of most other types of in one package.


Backdoors have one especially dangerous sub-class: variants that can propagate like worms.
Many trojans and backdoors now have remote administration capabilities allowing an individual to control the victim's computer. Many times a file called the server must be opened on the victim's computer before the trojan can have access to it.

These are generally sent through email, P2P file sharing software, and in internet downloads. They are usually disguised as a legitimate program or file. Many server files will display a fake error message when opened, to make it seem like it didn't open. Some will also kill antivirus and firewall software.

Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack. They usually do whimsical things like flip the screen upside-down, open the CD-ROM tray, and swap mouse buttons. However, they can be quite hard to remove.
These utilities are designed to penetrate remote computers in order to use them as zombies (by using backdoors) or to download other malicious programs to computer.

Exploits use vulnerabilities in operating systems and applications to achieve the same result.

InCommand Also known as:

[Kaspersky]Backdoor.InCommander.10,Backdoor.InCommander.10.b,Backdoor.Win32.InCommander.10,Backdoor.Win32.InCommander.10.b,Backdoor.InCommander.11,Backdoor.Win32.InCommander.11,Backdoor.InCommander.12,Backdoor.Win32.InCommander.12,Backdoor.InCommander.13,Backdoor.Win32.InCommander.13,Backdoor.InCommander.14,Backdoor.Win32.InCommander.14,Backdoor.InCommander.15,Backdoor.InCommander.15.a,Backdoor.InCommander.153,Backdoor.InCommander.16.b,Backdoor.Win32.InCommander.16.b,Backdoor.InCommander.16.e,Backdoor.InCommander.plugin.RegEdit.a,Backdoor.InCommander.plugin.RegEdit.b,Backdoor.InCommander.16.f;
[Eset]Win32/InCommander.13.Server trojan,Win32/InCommander.1_7.D trojan,Win32/InCommander.Plugin.RegistryEditor trojan;
[McAfee]BackDoor-DB,BackDoor-DB.svr.gen,Generic;
[F-Prot]security risk or a "backdoor" program,W32/Backdoor.Incommand;
[Panda]Bck/InCommander.10,Bck/Incommander.Clt,Bck/Incommander.Srv,Bck/Incommander.11.I,Bck/Incommander.11.II,Bck/Incommander.12,Bck/InCommander.1.3,Bck/Incommander.13,Bck/InCommander.1.4,Bck/Incommander.14,Bck/InCommander.1.5,Bck/Incommander.15,Backdoor Program,Bck/Incommander.153,Bck/Incommander.16b,Bck/Incommand.RegEd,Bck/Incommand.Comp;
[Computer Associates]Backdoor/BackConstructor_Server_,Win32.InCommand.10,Backdoor/InCommander.11,Backdoor/InCommander.11.a,Win32.InCommand.11,Backdoor/InCommander.12,Backdoor/Incommand.13!Server,Win32.InCommand.13,Backdoor/InCommand_Server_family,Backdoor/InCommander.14,Win32.InCommand.14,Backdoor/BladeRunner.15!Server,Backdoor/Incommander.15,Win32.InCommand.15,Backdoor/InCommand.153,Win32.InCommand.153,Backdoor/InCommand_1.6_EditServe,Win32.InCommand.16.B,Backdoor/InCommander!Plugin.RegE

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\info32.exe
[%WINDOWS%]\msie50h.exe
[%WINDOWS%]\olemon32.exe
[%WINDOWS%]\rsapi.exe
[%WINDOWS%]\info32.exe
[%WINDOWS%]\msie50h.exe
[%WINDOWS%]\olemon32.exe
[%WINDOWS%]\rsapi.exe

How to detect InCommand:

Files:
[%WINDOWS%]\info32.exe
[%WINDOWS%]\msie50h.exe
[%WINDOWS%]\olemon32.exe
[%WINDOWS%]\rsapi.exe
[%WINDOWS%]\info32.exe
[%WINDOWS%]\msie50h.exe
[%WINDOWS%]\olemon32.exe
[%WINDOWS%]\rsapi.exe

Removing InCommand:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Badmin Trojan Symptoms
Bitch.Controller Trojan Information
Excel.Yohimbe Trojan Symptoms
Balloon.Pop.Word.Game Trojan Removal instruction
Small.ct Backdoor Cleaner

Balloon.Pop.Word.Game Trojan

Removing Balloon.Pop.Word.Game
Categories: Trojan
This loose category includes a variety of Trojans that damage victim machines or threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers create multi-functional Trojans rather than Trojan packs.

Visible Symptoms:
Files in system folders:
[%PROFILE_TEMP%]\remover.exe
[%PROFILE_TEMP%]\TGSETUP0.TMP\TGSETUP.EXE
[%PROGRAM_FILES%]\Counter Strike 1.6\SETUP\SETUP.EXE
[%PROGRAM_FILES%]\Outlook Express\Plugin Manager 2.0\Setup\SETUP.PKG
[%DESKTOP%]\wordo.lnk
[%PROFILE_TEMP%]\fgedlpu.exe
[%PROFILE_TEMP%]\~df2c75.tmp
[%PROGRAMS%]\free web games\ant run pro jr..lnk
[%PROFILE_TEMP%]\remover.exe
[%PROFILE_TEMP%]\TGSETUP0.TMP\TGSETUP.EXE
[%PROGRAM_FILES%]\Counter Strike 1.6\SETUP\SETUP.EXE
[%PROGRAM_FILES%]\Outlook Express\Plugin Manager 2.0\Setup\SETUP.PKG
[%DESKTOP%]\wordo.lnk
[%PROFILE_TEMP%]\fgedlpu.exe
[%PROFILE_TEMP%]\~df2c75.tmp
[%PROGRAMS%]\free web games\ant run pro jr..lnk

How to detect Balloon.Pop.Word.Game:

Files:
[%PROFILE_TEMP%]\remover.exe
[%PROFILE_TEMP%]\TGSETUP0.TMP\TGSETUP.EXE
[%PROGRAM_FILES%]\Counter Strike 1.6\SETUP\SETUP.EXE
[%PROGRAM_FILES%]\Outlook Express\Plugin Manager 2.0\Setup\SETUP.PKG
[%DESKTOP%]\wordo.lnk
[%PROFILE_TEMP%]\fgedlpu.exe
[%PROFILE_TEMP%]\~df2c75.tmp
[%PROGRAMS%]\free web games\ant run pro jr..lnk
[%PROFILE_TEMP%]\remover.exe
[%PROFILE_TEMP%]\TGSETUP0.TMP\TGSETUP.EXE
[%PROGRAM_FILES%]\Counter Strike 1.6\SETUP\SETUP.EXE
[%PROGRAM_FILES%]\Outlook Express\Plugin Manager 2.0\Setup\SETUP.PKG
[%DESKTOP%]\wordo.lnk
[%PROFILE_TEMP%]\fgedlpu.exe
[%PROFILE_TEMP%]\~df2c75.tmp
[%PROGRAMS%]\free web games\ant run pro jr..lnk

Folders:
[%PROGRAMS%]\free web games 1.3
[%PROGRAM_FILES%]\free web games

Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\free web games 1.3

Registry Values:
HKEY_LOCAL_MACHINE\software\tg byte software\setup\currentversion\uninstall specialist

Removing Balloon.Pop.Word.Game:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Removing Badmin Trojan
Small.ct Backdoor Symptoms
Excel.Yohimbe Trojan Removal
SillyDl.DBN Trojan Information
Bitch.Controller Trojan Removal instruction

Small.ct Backdoor

Removing Small.ct
Categories: Backdoor
Backdoors are the most dangerous type of Trojans and the most popular. Backdoors open infected machines to external control via Internet. They function in the same way as legal remote administration programs used by system administrators. This makes them difficult to detect.

Backdoors are installed and launched without the consent of the user of computer. Often the backdoor will not be visible in the log of active programs.

Once a backdoor has been successfully launched, the computer is wide open. Backdoor functions can include:


  • Launching/ deleting files

  • Sending/ receiving files

  • Deleting data

  • Displaying notification

  • Rebooting the machine

  • Executing files




Backdoors are used by virus writers to detect and download confidential information, execute malicious code, destroy data, include the machine in bot networks and so forth. Backdoors combine the functionality of most other types of in one package.


Backdoors have one especially dangerous sub-class: variants that can propagate like worms.

Small.ct Also known as:

[Other]Win32/Outsbot.A,Troj/Santabot-A

How to detect Small.ct:

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Small.ct:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Removing Bitch.Controller Trojan
Excel.Yohimbe Trojan Information
Removing Badmin Trojan
Remove SillyDl.DBN Trojan

SillyDl.DBN Trojan

Removing SillyDl.DBN
Categories: Trojan
This loose category includes a variety of Trojans that damage victim machines or threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers create multi-functional Trojans rather than Trojan packs.

Visible Symptoms:
Files in system folders:
[%APPDATA%]\Microsoft\Windows\chsyb.exe
[%APPDATA%]\Microsoft\Windows\qdrbbh.exe
[%APPDATA%]\Microsoft\Windows\vhxksjy.exe
[%APPDATA%]\Microsoft\Windows\wthgr.exe
[%APPDATA%]\Microsoft\Windows\chsyb.exe
[%APPDATA%]\Microsoft\Windows\qdrbbh.exe
[%APPDATA%]\Microsoft\Windows\vhxksjy.exe
[%APPDATA%]\Microsoft\Windows\wthgr.exe

How to detect SillyDl.DBN:

Files:
[%APPDATA%]\Microsoft\Windows\chsyb.exe
[%APPDATA%]\Microsoft\Windows\qdrbbh.exe
[%APPDATA%]\Microsoft\Windows\vhxksjy.exe
[%APPDATA%]\Microsoft\Windows\wthgr.exe
[%APPDATA%]\Microsoft\Windows\chsyb.exe
[%APPDATA%]\Microsoft\Windows\qdrbbh.exe
[%APPDATA%]\Microsoft\Windows\vhxksjy.exe
[%APPDATA%]\Microsoft\Windows\wthgr.exe

Removing SillyDl.DBN:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Badmin Trojan Removal instruction
Bitch.Controller Trojan Symptoms
Excel.Yohimbe Trojan Symptoms

Badmin Trojan

Removing Badmin
Categories: Trojan,RAT
This loose category includes a variety of Trojans that damage victim machines or threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers create multi-functional Trojans rather than Trojan packs.
Many trojans and backdoors now have remote administration capabilities allowing an individual to control the victim's computer. Many times a file called the server must be opened on the victim's computer before the trojan can have access to it.

These are generally sent through email, P2P file sharing software, and in internet downloads. They are usually disguised as a legitimate program or file. Many server files will display a fake error message when opened, to make it seem like it didn't open. Some will also kill antivirus and firewall software.

Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack. They usually do whimsical things like flip the screen upside-down, open the CD-ROM tray, and swap mouse buttons. However, they can be quite hard to remove.

Badmin Also known as:

[Kaspersky]Backdoor.Win32.RA-based.ag;
[Other]Win32/Badmin.N,Win32/Badmin.M,Win32/Badmin.R

Visible Symptoms:
Files in system folders:
[%SYSTEM%]\ctmon.exe
[%SYSTEM%]\wincapdll.dll
[%SYSTEM%]\winsys\winx.log
[%SYSTEM%]\ctmon.exe
[%SYSTEM%]\wincapdll.dll
[%SYSTEM%]\winsys\winx.log

How to detect Badmin:

Files:
[%SYSTEM%]\ctmon.exe
[%SYSTEM%]\wincapdll.dll
[%SYSTEM%]\winsys\winx.log
[%SYSTEM%]\ctmon.exe
[%SYSTEM%]\wincapdll.dll
[%SYSTEM%]\winsys\winx.log

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run

Removing Badmin:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Remove Bitch.Controller Trojan
Removing Excel.Yohimbe Trojan

Excel.Yohimbe Trojan

Removing Excel.Yohimbe
Categories: Trojan
This loose category includes a variety of Trojans that damage victim machines or threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers create multi-functional Trojans rather than Trojan packs.

Visible Symptoms:
Files in system folders:
[%DESKTOP%]\USB Drive\Tetrinet\TETRINET.TXT
[%DESKTOP%]\USB Drive\Tetrinet\TETRINET.TXT

How to detect Excel.Yohimbe:

Files:
[%DESKTOP%]\USB Drive\Tetrinet\TETRINET.TXT
[%DESKTOP%]\USB Drive\Tetrinet\TETRINET.TXT

Removing Excel.Yohimbe:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

Also Be Aware of the Following Threats:
Bitch.Controller Trojan Information

Bitch.Controller Trojan

Removing Bitch.Controller
Categories: Trojan,Backdoor,RAT
This loose category includes a variety of Trojans that damage victim machines or threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers create multi-functional Trojans rather than Trojan packs.
Backdoors are the most dangerous type of Trojans and the most popular. Backdoors open infected machines to external control via Internet. They function in the same way as legal remote administration programs used by system administrators. This makes them difficult to detect.

Backdoors are installed and launched without the consent of the user of computer. Often the backdoor will not be visible in the log of active programs.

Once a backdoor has been successfully launched, the computer is wide open. Backdoor functions can include:


  • Launching/ deleting files

  • Sending/ receiving files

  • Deleting data

  • Displaying notification

  • Rebooting the machine

  • Executing files




Backdoors are used by virus writers to detect and download confidential information, execute malicious code, destroy data, include the machine in bot networks and so forth. Backdoors combine the functionality of most other types of in one package.


Backdoors have one especially dangerous sub-class: variants that can propagate like worms.
Many trojans and backdoors now have remote administration capabilities allowing an individual to control the victim's computer. Many times a file called the server must be opened on the victim's computer before the trojan can have access to it.

These are generally sent through email, P2P file sharing software, and in internet downloads. They are usually disguised as a legitimate program or file. Many server files will display a fake error message when opened, to make it seem like it didn't open. Some will also kill antivirus and firewall software.

Some RAT trojans are pranks that are most likely being controlled by a friend or enemy on April Fool's day or a holiday. Prank RATS are generally not harmful, and won't log keystrokes or hack. They usually do whimsical things like flip the screen upside-down, open the CD-ROM tray, and swap mouse buttons. However, they can be quite hard to remove.

Bitch.Controller Also known as:

[Kaspersky]Backdoor.Bitcon.205;
[Eset]Win32/Bitcon.205 trojan;
[McAfee]BackDoor-TT,SennaSpy2001;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Bitcon.205;
[Computer Associates]Backdoor/Bitco.2_05.Server

Visible Symptoms:
Files in system folders:
[%WINDOWS%]\system\the bitch controller.exe
[%WINDOWS%]\system\the bitch controller.exe

How to detect Bitch.Controller:

Files:
[%WINDOWS%]\system\the bitch controller.exe
[%WINDOWS%]\system\the bitch controller.exe

Removing Bitch.Controller:

You can download trial version of "Exterminate-It" antivirus software here, to check your computer instantly.

Or buy it to remove ALL viruses from your computer.

First Post

This is my first post to blogger.
Thanks all.
Good luck