Enter your Keyword, Search here,

Windows Tips - Enable or Disable Defrag of Boot Files at Windows Vista Startup

How to Enable Defrag of Boot Files at Windows Startup

Open the Start Menu
Open Run or in the white line (Start Search) area, type regedit and press Enter
In regedit, go to:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOptimizeFunction

To Disable Defrag of Boot Files at Startup
In the right pane, right click on "Enable" and click Modify



[ In the image, Red marked is the Path to Enable/Disable Boot time Defrag ]

Type N and click OK
Done

How to Disable Defrag of Boot Files at Windows Startup

Open the Start Menu
Open Run or in the white line (Start Search) area, type regedit and press Enter
In regedit, go to:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOptimizeFunction

To Disable Defrag of Boot Files at Startup
In the right pane, right click on "Enable" and click Modify

Type Y and click OK
Done

Download AutoEnabler/Disabler

Manual Removal of W32/Magania.BMOJ Trojan » uret463.exe

W32/Magania.BMOJ Trojan Known Files » uret463.exe, lhgjyit0.dll, cdaudio.sys, s6.bat
W32/AutoRun.BFS is a worm. The worm will infect Windows systems.


This Worm Copies its files to Windows\System32\dllcache, Root of Windows Installed drive, Documents and Settings\Default User\Local Settings\Temp folder as hidden files or active non-hidden files.

This trojan information updated on September 1, 2009.
Other names of W32/Magania.BMOJ Trojan:
This trojan is also known as Trojan-GameThief.Win32.Magania.bmoj, TROJ_GAMETHI.GRZ.

[ Download Registry, Taskmanager and Folder Options Repair Tool ]

W32/Magania.BMOJ Trojan Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:

Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.

The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
[ Kill the Process, Use Killbox if your Access Denied ]

Download W32/Magania.BMOJ Trojan Known File Removal Tool

[ In Windows Vista Run As Administrator, After Execution System Will Restart ]
%Documents and Settings\Default User\Local Settings\Temp\uret463.exe
%Windows\System32\dllcache\cdaudio.sys
%Documents and Settings\Default User\Local Settings\Temp\lhgjyit0.dll
%Root of Windows Installed drive\s6.bat
%Root of Windows Installed drive\autorun.inf

[ No Exact Information about Files, search above related files in Program files Folder ]
If you have any of these files in running process from task manger, end the process before removal.
Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg[ Right Click - Save Target As/Linked Content As ]
Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/Magania.BMOJ Trojan Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.

Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ]
Save it to your Windows desktop.
Do not run it at this time, download it only.
After booting into the Safe Mode or VGA Mode
Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
Or Download Regfile to enable Registry editor
Download Registry Enabler [ Right click - Save Target As ]
Open it with Registry editor

W32/Magania.BMOJ Trojan modifies registry at the following locations to ensure its automatic execution at every system Startup:
Delete The Entries
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_USERS\S-1-5-21-XXXXXXXXXX-XXXXXXXXXX-XXXXXXXXX-XXXX\Software\Microsoft\Windows\CurrentVersion\RunHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AVPsys
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AVPsys\Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AVPsys\Enum
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AVPsys
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AVPsys\Security
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AVPsys\Enum


Delete file entries from right side
Search Registry For W32/Magania.BMOJ Trojan File Names listed above to remove completely,
Edit Menu - Find, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Kaspersky Antivirus or Internet Security [Shareware]
Spyware Doctor [Shareware]
AVG Antivirus [Freeware]
Killbox [Freeware]

Manual Removal of W32/AutoRun.BFS Worm » amvo.exe

W32/AutoRun.BFS Worm Known Files » amvo.exe, amvo0.dll, usdeiect.com, autorun.inf, a.dll
W32/AutoRun.BFS is a worm. The worm will infect Windows systems.

This Worm Copies its files to Windows\System32, Root of Windows Installed drive, Temp folder as hidden files or active non-hidden files.

This worm information updated on August 31, 2009.
Other names of W32/AutoRun.BFS Worm:
This worm is also known as Worm/AutoRun.Y, Trojan.PWS.OnlineGames.QZD, W32.Gammima, PWS:Win32/Lineage.WG.
Download Registry, Taskmanager and Folder Options Repair Tool

W32/AutoRun.BFS Worm Manual Removal Instructions
Recommend Removal from Safe Mode:

How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.

The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
[ Kill the Process, Use Killbox if your Access Denied ]

Download W32/AutoRun.BFS Worm Known File Removal Tool

[In Windows Vista Run As Administrator, After Execution System Will Restart]
%Windows\System32\amvo.exe
%Windows\System32\amvo0.dll
%Root of Windows Installed drive\usdeiect.com
%Root of Windows Installed drive\autorun.inf
%Documents and Settings\Default User\Local Settings\Temp\a.dll
[ No Exact Information about Files, search above related files in Program files Folder ]
If you have any of these files in running process from task manger, end the process before removal.
Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg[ Right Click - Save Target As/Linked Content As ]
Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/AutoRun.BFS Worm Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.

Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ]
Save it to your Windows desktop.
Do not run it at this time, download it only.
After booting into the Safe Mode or VGA Mode
Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
Or Download Regfile to enable Registry editor
Download Registry Enabler [ Right click - Save Target As ]
Open it with Registry editor

W32/AutoRun.BFS Worm modifies registry at the following locations to ensure its automatic execution at every system Startup:
Delete The Entries
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_USERS\S-1-5-21-XXXXXXXXXX-XXXXXXXXXX-XXXXXXXXX-XXXX\Software\Microsoft\Windows\CurrentVersion\Run

Delete file entries from right side

Search Registry For W32/AutoRun.BFS Worm File Names listed above to remove completely,
Edit Menu - Find, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Kaspersky Antivirus or Internet Security [Shareware]
Spyware Doctor [Shareware]
AVG Antivirus [Freeware]
Killbox [Freeware]

Manual Removal of W32/Agent.CIVM Trojan » pp10.exe

Manual Removal of W32/Agent.CIVM Trojan » pp10.exe
W32/Agent.CIVM is a trojan. The trojan will infect Windows systems.

This Trojan Copies its files to Windows folder as hidden files or active non-hidden files.
This trojan information updated on August 30, 2009.
Other names of W32/Agent.CIVM Trojan:
This trojan is also known as Trojan-Downloader.Win32.Agent.civm,WORM_KOOBFACE.KN.

Damage Level : Medium/High
Distribution Level: Low/Medium
Download Registry, Taskmanager and Folder Options Repair Tool

W32/Agent.CIVM Trojan Manual Removal Instructions
Recommend Removal from Safe Mode:
How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.

The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
[ Kill the Process, Use Killbox if your Access Denied ]

Download W32/Agent.CIVM Trojan Known File Removal Tool

[In Windows Vista Run As Administrator, After Execution System Will Restart]
%Windows\pp10.exe
[ No Exact Information about Files, search above related files in Program files Folder ]
If you have any of these files in running process from task manger, end the process before removal.
Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg [ Right Click - Save Target As/Linked Content As ]
Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/Agent.CIVM Trojan Entries Manual Removal From Registry

Click Start, Run,Type regedit,Click OK.

Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ]
Save it to your Windows desktop.
Do not run it at this time, download it only.
After booting into the Safe Mode or VGA Mode
Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
Or Download Regfile to enable Registry editor
Download Registry Enabler [ Right click - Save Target As ]

Open it with Registry editor

W32/Agent.CIVM Trojan modifies registry at the following locations to ensure its automatic execution at every system Startup:
Delete The Entries
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Delete file entries from right side
Search Registry For W32/Agent.CIVM Trojan File Names listed above to remove completely,
Edit Menu - Find, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Kaspersky Antivirus or Internet Security (Shareware)
Spyware Doctor (Shareware)
AVG Antivirus (Freeware)
Killbox (Freeware)

Manual Removal of W32/Magania.ASNX Trojan » olhrwef.exe

Manual Removal of W32/Magania.ASNX Trojan » olhrwef.exe, iq.bat, f2.bat
W32/Magania.ASNX is a trojan. The trojan will infect Windows systems.

This Trojan Copies its files to Windows\System32, root of Windows installed drive folder as hidden files or active non-hidden files.
This trojan information updated on August 29, 2009.
Other names ofW32/Magania.ASNX Trojan:
This trojan is also known as Trojan-GameThief.Win32.Magania.asnx, TROJ_GAMETHI.DUZ.

Damage Level : Medium/High
Distribution Level: Low/Medium
Download Registry, Taskmanager and Folder Options Repair Tool

W32/Magania.ASNX Trojan Manual Removal Instructions
Recommend Removal from Safe Mode:
How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.

The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
[ Kill the Process, Use Killbox if your Access Denied ]

Download W32/Magania.ASNX Trojan Known File Removal Tool

[In Windows Vista Run As Administrator, After Execution System Will Restart]

%Windows\System32\olhrwef.exe
%Root of Windows Drive\iq.bat
%Root of Windows Drive\f2.bat
[ No Exact Information about Files, search above related files in Program files Folder ]
If you have any of these files in running process from task manger, end the process before removal.
Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg [ Right Click - Save Target As/Linked Content As ]
Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/Magania.ASNX Trojan Entries Manual Removal From Registry
Click Start, Run,Type regedit,Click OK.

Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ]
Save it to your Windows desktop.
Do not run it at this time, download it only.
After booting into the Safe Mode or VGA Mode
Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
Or Download Regfile to enable Registry editor
Download Registry Enabler [ Right click - Save Target As ]

Open it with Registry editor

W32/Magania.ASNX Trojan modifies registry at the following locations to ensure its automatic execution at every system Startup:
Delete The Entries
HKEY_USERS\S-1-5-21-XXXXXXXXXX-XXXXXXXXXX-XXXXXXXXX-XXXX\Software\Microsoft\Windows\CurrentVersion\Run
Delete file entries from right side
Search Registry For W32/Magania.ASNX Trojan File Names listed above to remove completely,
Edit Menu - Find, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Kaspersky Antivirus or Internet Security (Shareware)
Spyware Doctor (Shareware)
AVG Antivirus (Freeware)
Killbox (Freeware)

Manual Removal of W32/AutoIt.BL Worm » Charm.exe

Manual Removal of W32/AutoIt.BL Worm » charm.exe
W32/AutoIt.BL is a worm. The worm will infect Windows systems.
This Worm Copies its files to Windows\System32 folder as hidden files or active non-hidden files.
This worm information updated on August 28, 2009.
Other names of W32/AutoIt.BL Worm:
This worm is also known as Worm/AutoIt.ABFF, Worm.Win32.AutoIt.bl, W32/Autorun.worm.h, W32.SillyDC.
Damage Level : Medium/High
Distribution Level: Low/Medium
Download Registry, Taskmanager and Folder Options Repair Tool

W32/AutoIt.BL Worm Manual Removal Instructions
Recommend Removal from Safe Mode:
How to Start in Safe mode:
Restart your Computer, Press F8 Repeatedly, when your Screen turns on, Select Safe mode, press enter.

The Infected Files Can be Seen in these folders and names also Running in Tasks
End the Following Active Process Before Removal
[ Kill the Process, Use Killbox if your Access Denied ]

Download W32/AutoIt.BL Worm Known File Removal Tool

[In Windows Vista Run As Administrator, After Execution System Will Restart]
%Windows\System32\charm.exe
[ No Exact Information about Files, search above related files in Program files Folder ]
If you have any of these files in running process from task manger, end the process before removal.
Note: if task manager is disabled, Download the following file, Click to Download - Enable Registry.reg [ Right Click - Save Target As/Linked Content As ]
Open it with Regedit.exe [%system32\regedit.exe], then it Confirms Add to registry Yes or No, Confirm Yes, then click Ok.

W32/AutoIt.BL Worm Entries Manual Removal From Registry

Click Start, Run,Type regedit,Click OK.

Note: If the registry editor fails to open the threat may have modified the registry to prevent access to the registry editor.
Download this UnHookExec.inf, [ Right Click - Save Target As/Linked Content As ]
Save it to your Windows desktop.
Do not run it at this time, download it only.
After booting into the Safe Mode or VGA Mode
Right-click the UnHookExec.inf file and click Install. [This is a small file. It does not display any notice or boxes when you run it.]
Or Download Regfile to enable Registry editor
Download Registry Enabler [ Right click - Save Target As ]

Open it with Registry editor

W32/AutoIt.BL Worm modifies registry at the following locations to ensure its automatic execution at every system Startup:
Delete The Entries
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Delete file entries from right side
Search Registry For W32/AutoIt.BL Worm File Names listed above to remove completely,
Edit Menu - Find, enter Keyword and remove all value that find in search.

Exit the Registry Editor,
Restart your Computer.

Recommended Removal Tools:
Kaspersky Antivirus or Internet Security (Shareware)
Spyware Doctor (Shareware)
AVG Antivirus (Freeware)
Killbox (Freeware)

More Posts that you may be interested...