Enter your Keyword, Search here,

Manual Removal of W32/Ilomo.B Trojan

Manual Removal of W32/Ilomo.B Trojan
W32/Ilomo.B is a trojan. The trojan will infect Windows systems.
This trojan first appeared on March 6, 2009.
Other names of W32/Ilomo.B Trojan:
This trojan is also known as TROJ_ILOMO.B

Damage Level : Medium/High
Distribution Level:
Medium
No Removal Tool for W32/Ilomo.B Trojan
W32/Ilomo.B Trojan Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.
The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • [ Kill the Process, Use Killbox if your Access Denied ]
Download W32/Ilomo.B Trojan Known File Removal Tool
[In Windows Vista Run As Administrator, After Execution System Will Restart]

  • %Documents and Settings\Default User\Application Data\dumpreport.exe
  • %Documents and Settings\Default User\Application Data\event.exe
  • %Documents and Settings\Default User\Application Data\helper.exe 
  • %Documents and Settings\Default User\Application Data\iexeca.exe
  • %Documents and Settings\Default User\Application Data\logon.exe
  • %Documents and Settings\Default User\Application Data\lsas.exe
  • %Documents and Settings\Default User\Application Data\rundll.exe
  • %Documents and Settings\Default User\Application Data\service.exe
  • %Documents and Settings\Default User\Application Data\sound.exe
  • %Documents and Settings\Default User\Application Data\svchosts.exe
    If you have any of these files in running process from task manger, end the process before removal.
    Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
    [ Right Click - Save Target As/Linked Content As ]
    Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/Ilomo.B Trojan Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ]
    and then continue with the removal. Save it to your Windows desktop. Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
The W32/Ilomo.B Trojan modifies registry at the following locations to ensure its automatic execution at every system startup:

Delete The Entries
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Delete file entry from right side
Search Registry For W32/Ilomo.B Trojan File Names listed above to remove completely,
Edit Menu - Find
, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Killbox (Freeware)

Manual Removal of W32/Popwin.CJM Trojan

Manual Removal of W32/Popwin.CJM Trojan
W32/Popwin.CJM is a trojan. The trojan will infect Windows systems.
This trojan first appeared on March 5, 2009.
Other names of W32/Popwin.CJM Trojan:
This trojan is also known as TROJ_ILOMO.B

Damage Level : Medium/High
Distribution Level:
Medium
No Removal Tool for W32/Popwin.CJM Trojan
W32/Popwin.CJM Trojan Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.
The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • [ Kill the Process, Use Killbox if your Access Denied ]
[In Windows Vista Run As Administrator, After Execution System Will Restart]

  • %Windows\System\6022.exe
  • %Windows\System\kbd101c.dll
  • %Windows\System\kbd103.dll
  • %Windows\System\kbd106.dll 
  • %Windows\System\kbdjpn.dll
  • %Windows\System\kbdkor.dll
  • %Windows\System\CB68.exe
  • %Windows\System\kbd101b.dll
  • %Windows\System\ppo.exe
  • %Windows\System\0010D.exe
  • %Documents and Settings\Default User\Local Settings\Temporary Internet Files\sh11enji[1].exe
    If you have any of these files in running process from task manger, end the process before removal.
    Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
    [ Right Click - Save Target As/Linked Content As ]
    Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/Popwin.CJM Trojan Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ]
    and then continue with the removal. Save it to your Windows desktop. Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
The W32/Popwin.CJM Trojan modifies registry at the following locations to ensure its automatic execution at every system startup:

Delete The Entries
HKEY_USERS\S-1-5-21-XXXXXXXXXX-XXXXXXXXXX-XXXXXXXXX-XXXX\Software\Microsoft\Windows\CurrentVersion\Run
Delete file entry from right side
Search Registry For W32/Popwin.CJM Trojan File Names listed above to remove completely,
Edit Menu - Find
, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Killbox (Freeware)

Manual Removal of W32/Koobface.AZ Worm

Manual Removal of W32/Koobface.AZ Worm
W32/Koobface.AZ is a worm. The worm will infect Windows systems.
This worm first appeared on March 4, 2009.
Other names of W32/Koobface.AZ Worm:
This worm is also known as WORM_KOOBFACE.AZ

W32/Koobface.AZ Worm can create, delete or modify files on the disk.
Damage Level :
Medium/High
Distribution Level:
Medium
No Removal Tool for W32/Koobface.AZ Worm
W32/Koobface.AZ Worm Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.
The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • [ Kill the Process, Use Killbox if your Access Denied ]
Add Comment if you Want the File Remover
Download W32/Koobface.AZ Worm Known Files Removal Tool
[In Windows Vista Run As Administrator, After Execution System Will Restart]
  • %Windows\freddy35.exe [ MAY be Hidden (+H) Attribute ]
  • %Windows\f23567.dat [ MAY be Hidden (+H) Attribute ]
  • Other Known Files
  • %Windows\bolivar22.exe
  • %Windows\bolivar24.exe
  • %Windows\bolivar25.exe
  • %Windows\bolivar26.exe
  • %Windows\bolivar27.exe
  • %Windows\bolivar28.exe
  • %Windows\bolivar29.exe
  • %Windows\bolivar30.exe 
  • %Windows\fbtre8.exe
  • %Windows\ugo01.exe
    If you have any of these files in running process from task manger, end the process before removal.
    Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
    [ Right Click - Save Target As/Linked Content As ]
    Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/Koobface.AZ Worm Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ]
    and then continue with the removal. Save it to your Windows desktop. Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
The W32/Koobface.AZ Worm modifies registry at the following locations to ensure its automatic execution at every system startup:
Delete the freddy35.exe Entry by the Worm:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Search Registry W32/Koobface.AZ Worm for keys, check if are related to the Worm, if yes you can delete them. File Names listed above can search to remove completely,
Edit Menu - Find
, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Killbox [Freeware]

Manual Removal of W32/VirusDoctor.A Trojan

Manual Removal of W32/VirusDoctor.A Trojan
W32/VirusDoctor.A is a trojan. The trojan will infect Windows systems.
This trojan first appeared on March 3, 2009.
Other names of W32/Murlo.ABJ Trojan:
This trojan is also known as FraudTool.Win32.VirusDoctor.a, Trojan.Dropper.Fraud.VirusDoctor.A

Damage Level : Medium/High
Distribution Level:
Medium
No Removal Tool for W32/VirusDoctor.A Trojan
W32/VirusDoctor.A Trojan Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.
The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • [ Kill the Process, Use Killbox if your Access Denied ]
Add Comment if you Want the File Remover

Download W32/VirusDoctor.A Trojan Known File Removal Tool
[In Windows Vista Run As Administrator, After Execution System Will Restart]

  • %Documents and Settings\All Users\Application Data\unins000.exe
  • %Documents and Settings\All Users\Application Data\VDocd389.exe
    If you have any of these files in running process from task manger, end the process before removal.
    Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
    [ Right Click - Save Target As/Linked Content As ]
    Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/VirusDoctor.A Trojan Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ]
    and then continue with the removal. Save it to your Windows desktop. Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
The W32/VirusDoctor.A Trojan modifies registry at the following locations to ensure its automatic execution at every system startup:

Delete The Entries
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
Delete Vdoctor entry from right side
Search Registry For W32/VirusDoctor.A Trojan File Names listed above to remove completely,
Edit Menu - Find
, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Killbox (Freeware)

Manual Removal of W32/AutoTDSS.XP Worm

Manual Removal of W32/AutoTDSS.XP Worm
W32/AutoTDSS.XP is a worm. The worm will infect Windows systems.
This worm first appeared on February 27, 2009.
Other names of W32/AutoTDSS.XP Worm:
This trojan is also known as AutoTDSS.XP, Worm.Win32.AutoTDSS.xp, Trojan.Dropper.AutoTDSS.XP

Damage Level : Medium/High
Distribution Level:
Medium
No Removal Tool for W32/AutoTDSS.XP Worm
W32/AutoTDSS.XP Worm Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.
The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
  • [ Kill the Process, Use Killbox if your Access Denied ]
Add Comment if you Want the File Remover

Download W32/AutoTDSS.XP Worm Known Files Removal Tool
[In Windows Vista Run As Administrator, After Execution System Will Restart]

  • %SystemInstalledDrive\autorun.inf [ Hidden (+H) Attribute ]
  • %SystemInstalledDrive\resycled [ Hidden (+H) Attribute ]
  • %SystemInstalledDrive\resycled\boot.com [ Hidden (+H) Attribute ] 
  • %SystemInstalledDrive\Program Files\totalvid
  • %SystemInstalledDrive\Program Files\totalvid\Uninstall.exe
  • %SystemInstalledDrive\Documents and Settings\jimmy\Start Menu\Programs\totalvid\Uninstall.lnk
  • %SystemInstalledDrive\WINDOWS\system32\msqpdxdqwbdinl.dll [ MAY be Hidden (+H) Attribute ]
  • %SystemInstalledDrive\WINDOWS\system32\drivers\msqpdxserv.sys [ MAY be Hidden (+H) Attribute ]
  • %SystemInstalledDrive\WINDOWS\system32\drivers\msqpdxageextkp.sys [ MAY be Hidden (+H) Attribute ]
    If you have any of these files in running process from task manger, end the process before removal.
    Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg
    [ Right Click - Save Target As/Linked Content As ]
    Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/AutoTDSS.XP Worm Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.
Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
  • Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ]
    and then continue with the removal. Save it to your Windows desktop. Do not run it at this time, download it only.
  • After booting into the Safe Mode or VGA Mode
  • Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
The W32/AutoTDSS.XP Worm modifies registry at the following locations to ensure its automatic execution at every system startup:

Delete the DNS changed by the Worm:
HKLM\System\CS1\Services\Tcpip\Parameters:
NameServer = 85.255.114.46;85.255.112.210
HKLM\System\CCS\Services\Tcpip\Parameters:
NameServer = 85.255.114.46;85.255.112.210

Search Registry W32/AutoTDSS.XP Worm for keys that start with “msqpdx” or “msqp” and check if are related to the Worm, if yes you can delete them. File Names listed above can search to remove completely,
Edit Menu - Find
, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Killbox (Freeware)

Vista Tips - Disabling Aero Glass for Faster Performance

Now you want to make Windows Explorer even faster. Disabling the Aero Glass composition engine will allow you to have a much faster user interface experience on slower hardware. However, you will lose most of the cool visual effects, such as the windows transitions and the cool new Flip 3D window switcher
Disabling Aero Glass will turn off the Desktop Window Manager and Windows will use a visual style engine similar to what was in Windows XP. The older visual style engine works great on slower hardware that ran XP well. However, the look of the user interface is a little different.
If you are willing to compromise the Glass look for a big increase in performance, follow these steps to disable Aero Glass:
  1. Right-click the Desktop and select Personalize from the menu.
  2. Select Windows Color and Appearance from the top of the list in the Personalization window.
  3. On the bottom of the window, click Open classic appearance properties for more color options.
  4. When Appearance Settings loads, select Windows Aero Basic from the color scheme list.
  5. Press Apply, OK and you are finished.

More Posts that you may be interested...