Sunday, February 28, 2010

Get rid of Dr.Guard and its Dreadful Alerts

Dr.Guard removal is a matter of your own convenience, first of all, your peace of mind. As is, Dr.Guard cannot affect infected system too much, but shows quite annoying and for those who trust it rather dreadful alerts, in which it notifies users of threats which do not actually exist. In addition, like a true tool for virus removal, it shows a scan window; it is understood there are no real infections in that window as Dr.Guard does not scan computer system.
Click here to initiate free computer scan in order to detect and remove Dr.Guard adware, related trojans, if any, as well as other rogue computer residents.

Dr.Guard screenshot:



Dr.Guard removal tool:


Dr.Guard manual removal guide:
Delete Dr.Guard files:
About.lnk
Activate.lnk
Buy.lnk
Dr. Guard Support.lnk
Dr. Guard.lnk
Scan.lnk
Settings.lnk
Update.lnk
about.ico
activate.ico
buy.ico
drg.db
drgext.dll
drghook.dll
drguard.exe
help.ico
scan.ico
settings.ico
splash.mp3
uninstall.exe
update.ico
virus.mp3
asr64_ldm.exe

Delete Dr.Guard registry entries:
HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\SimpleShlExt
HKEY_CLASSES_ROOT\CLSID\{5E2121EE-0300-11D4-8D3B-444553540000}
HKEY_CLASSES_ROOT\Folder\shellex\ContextMenuHandlers\SimpleShlExt
HKEY_LOCAL_MACHINE\SOFTWARE\Dr. Guard
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Dr. Guard
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “Dr. Guard”
HKEY_CLASSES_ROOT\CLSID\{5E2121EE-0300-11D4-8D3B-444553540000}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved “{5E2121EE-0300-11D4-8D3B-444553540000}”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System “DisableTaskMgr” = “1″

Thursday, February 25, 2010

Hogging the Snort Host Attribute Table

Hogger is a new Snort supportive tool written in Perl, by Parker Crook, that allows you to create a Host Attribute Table from an nmap scan. But first, a little primer; A feature within Snort that has received some traction lately is that of the --enable-targetbased configuration option. This allows you to specify a Host Attribute Table that contains critical information about what your network host topology is (i.e. OS, services etc..). Using this information, snort can then properly reassemble fragments, track streams and a number of other things. All of these items are covered in Joel Esler's recent CSO article that can be found at This URL. This is an excellent article that covers what Host Attribute Tables are and how to use them, so please read the article for a better understanding!

Now that you know all about the Host Attribute Table, let's jump into the purpose and use of hogger. As mentioned previously, hogger was written by Parker Crook to create a Host Attribute Table using the resulting output of an nmap scan. Without further adieu, let's walk through the usage of hogger!

Requirements:
Steps:
  1. Install XML::Writer
  2. Get hogger
  3. Install Nmap
  4. Run Nmap with correct options
  5. Run hogger against Nmap output file
  6. Start your snorting!
1: Installing XML::Writer
$perl -MCPAN -e shell
cpan[1]> install XML::Writer
2: Get Hogger
$wget http://hogger.googlecode.com/files/hogger.tar.gz
$tar xvfz hogger.tar.gz
3: Install Nmap
Use whatever tool that your distribution / OS uses to install Nmap, or get the source from nmap.org and build it yourself!
4: Run Nmap
$mkdir ~/hogger/nmap
$cd ~/hogger/nmap
$nmap -sV -T4 -oN scan.nmap 192.168.1.0/24
Starting Nmap 5.21 ( http://nmap.org ) at 2010-02-25 18:46 UTC
..output suppressed...
5: Run hogger (against scan.nmap)
$cd ~/hogger
$./hogger.pl -c nmap/hostmap.csv -n nmap/scan.nmap -x nmap/host_attrib_table.xml
6: Start your snorting - At this point you can take the newly created host_attrib_table.xml file and place the path to it in your snort.conf, assuming your built snort with the correct option:
attribute_table filename /path/to/host_attrib_table.xml
Now that we have all of this running, let's examine some of the options that are currently available in hogger and dissect our hogger run: "./hogger.pl -c nmap/hostmap.csv -n nmap/scan.nmap -x nmap/host_attrib_table.xml".

Hogger help output:
Usage: ./hogger.pl [-r? -help] -n -c -x

Options:
-c Where the human-readable/modifiable csv file containing host information lives.
-n Where the nmap file containing host information lives.
-r Process the csv file and output to xml for snort, but do not read an nmap file.
-x Where you want to create the host_attribute table.xml (Overwrites existing files)
-help/? Print this information

Starting with the -c flag, this is a file that will be created by hogger if it does not exist, and is simply a csv file that you can modify (for those hosts that nmap either misses or is not as accurate as you would like). A few sample entries in the file (hostmap.csv) that we created in the above test run:
192.168.1.1, Linux, 23|tcp|telnet 53|tcp|domain 443|tcp|ssl/http
192.168.1.2, Linux, 23|tcp|telnet 53|tcp|domain 443|tcp|ssl/http
192.168.1.7, FreeBSD, 22|tcp|ssh 53|tcp|domain 80|tcp|http 3000|tcp|http 3128|tcp|http-proxy 3306|tcp|mysql 5000|tcp|http-proxy 8443|tcp|http
Next we see the -n flag, this is the flag that specifies where the nmap output file (that we previously created using the nmap -oN scan.nmap option). This is the file that hogger reads to create entries in the -c .

The -r flag is fairly straightforward and specifies that you ONLY want to read the csv file specified with the -c flag value.

The final flag that we will discuss is the -x flag, this is a required flag and tells hogger where you want the resulting output (the Host Attribute Table) to be placed. Examples from the output, matching those noted in the -c flag information above:
<SNORT_ATTRIBUTES>
<ATTRIBUTE_TABLE>
<HOST IP="192.168.1.1">
<OPERATING_SYSTEM>
<NAME ATTRIBUTE_VALUE="Linux" CONFIDENCE="90"></NAME>
<FRAG_POLICY>Linux</FRAG_POLICY>
<STREAM_POLICY>linux</STREAM_POLICY>
</OPERATING_SYSTEM>
<SERVICES>
<SERVICE>
<PORT ATTRIBUTE_VALUE=" 23" CONFIDENCE="100"></PORT>
<IPPROTO ATTRIBUTE_VALUE="tcp" CONFIDENCE="100"></IPPROTO>
<PROTOCOL ATTRIBUTE_VALUE="telnet 53" CONFIDENCE="95"></PROTOCOL>
</SERVICE>
</SERVICES>
</HOST>
<HOST IP="192.168.1.2">
<OPERATING_SYSTEM>
<NAME ATTRIBUTE_VALUE="Linux" CONFIDENCE="90"></NAME>
<FRAG_POLICY>Linux</FRAG_POLICY>
<STREAM_POLICY>linux</STREAM_POLICY>
</OPERATING_SYSTEM>
<SERVICES>
<SERVICE>
<PORT ATTRIBUTE_VALUE=" 23" CONFIDENCE="100"></PORT>
<IPPROTO ATTRIBUTE_VALUE="tcp" CONFIDENCE="100"></IPPROTO>
<PROTOCOL ATTRIBUTE_VALUE="telnet 53" CONFIDENCE="95"></PROTOCOL>
</SERVICE>
</SERVICES>
</HOST>
<HOST IP="192.168.1.7">
<OPERATING_SYSTEM>
<NAME ATTRIBUTE_VALUE="FreeBSD" CONFIDENCE="90"></NAME>
<FRAG_POLICY>BSD</FRAG_POLICY>
<STREAM_POLICY>bsd</STREAM_POLICY>
</OPERATING_SYSTEM>
<SERVICES>
<SERVICE>
<PORT ATTRIBUTE_VALUE=" 22" CONFIDENCE="100"></PORT>
<IPPROTO ATTRIBUTE_VALUE="tcp" CONFIDENCE="100"></IPPROTO>
<PROTOCOL ATTRIBUTE_VALUE="ssh 53" CONFIDENCE="95"></PROTOCOL>
</SERVICE>
</SERVICES>
</HOST>
Having said all of this, I am not going to go into detail about the flags used during the Nmap scan, suffice it to say that those are the suggested flags and that the -oN is required to produce the output file for hogger to read.

Overall I think that the concept behind hogger is excellent and that it should provide useful aide to all you snort heads out there! This tool gets a thumbs up from me and should be one that you put into your snort bag of tricks and is also one that I am planning on contributing to.

Cheers,
JJC




Vista Antivirus 2010 the Screaming Thief

Vista Antivirus 2010 (VistaAntivirus 2010) is never idle, though it has been known from experience of its victims and from experts’ observations on the scamware to turn itself into hush mode. That is a tactic of alternating silence and loud periods applied in many other fake system security tools. Perhaps, it works better than non-stop alerting. However, showing no alerts is not to be idle as Vista Antivirus 2010 creates big system and software disordering while its alerts and fake scan show are temporary removed. Once its alerts are shown again they inform users that the system has been badly affected while Vista Antivirus 2010 has remained idle. Remove Vista Antivirus 2010, because Vista Antivirus 2010 is the very thief that blames everyone and everything but itself. Yet, your system does become vulnerable due to the Vista Antivirus 2010 influence and you may need to get rid of Vista Antivirus 2010 plus extra infections, mostly dropped into your PC thanking to Vista Antivirus 2010.
Click here for free scan of your PC and to perform Vista Antivirus 2010 removal, as well as to deliver your computer system from other evil programs.

Vista Antivirus 2010 screenshot:


Vista Antivirus 2010 removal tool:


Vista Antivirus 2010 manual removal guide
Delete Vista Antivirus 2010 files:
Vista Antivirus 2010.exe
Uninstall.exe
Delete Vista Antivirus 2010 registry entries:
HKEY_CURRENT_USER\Software\Vista Antivirus 2010
HKEY_LOCAL_MACHINE\Software\Vista Antivirus 2010
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Vista Antivirus 2010
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Vista Antivirus 2010
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Vista Antivirus 2010

Wednesday, February 24, 2010

PC Defender Removal to ensure System Recovery

The only method to get your computer system completely recovered after PC Defender (PCDefender) infection is to get rid of PC Defender at whole. PC Defender is a system of objects, which, though interrelated, constitute several subsystems, which act without assistance of each other. That is, if you remove PC Defender scanner – in fact, misleading animation, - yet you have several alert producers and malicious executables hijacking web-browser and interfering with legit software. If you choose to remove PC Defender manually, complete all PC Defender removal steps and use timely updated tool to get rid of PC Defender automatically, if your choice is to remove PC Defender by the malware remover. Click here to start free scan in order to make sure there are no threats to remove but PC Defender and then perform PC Defender removal, as well as to remove other infections, if any.

PC Defender screenshot:


PC Defender removal tool:


PC Defender manual removal guide:
Delete PC Defender files:
PC Defender.lnk
Antispyware.exe
hook.dll
proccheck.exe
Delete PC Defender registry entries:
HKEY_USERS\.DEFAULT\Software\Def Group\Antispyware
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon “Userinit” => “C:\WINDOWS\system32\userinit.exe,”C:\Program Files\Def Group\PC Defender\Antispyware.exe”

Tuesday, February 23, 2010

Writing Snort Rules Correctly (via Joel Esler)

Joel Esler recently published an article entitled "Writing Snort Rules Correctly". I certainly suggest having a read through of this ,as it discusses a number of the finer points (including PCRE) when writing a snort rule using a previously published example rule. Joel dissects the rule, pointing out the good and bad while making note of better methods.

Just a short post, but I thought it worth posting to bring more attention to the aforementioned article by Joel Esler.

JJC

Sunday, February 21, 2010

Unsafe Windesktopsecurity.com

Windesktopsecurity.com is not a safe place for you to visit for the following reasons: firstly, it may contain malicious scripts (though as for the date of this Windesktopsecurity.com report preparation it was found safe in that way). Secondly, it markets dangerous adware, which, if downloaded, may be self-installed and then can be hardly removed. You need to remove Windesktopsecurity.com’s adware in the relevant case. Failure to get rid of Windesktopsecurity.com related adware is a big risk, not to mention the annoyance it makes.
There is also a hijacker supporting Windesktopsecurity.com or, to be precise, the fake system utility marketed through Windesktopsecurity.com that enslaves your web-browser to make it open Windesktopsecurity.com without its user command.
Click here to start free scan and to perform removal of Windesktopsecurity.com scam.

Windesktopsecurity.com screenshot:

Windesktopsecurity.com removal tool:

Remove Soldierantivirus.com browser hijacker

Fake and quite unsafe for your computer system security tool (Security Tool) is what Soldierantivirus.com suggests you to buy instantly or to try. You need to remove Soldierantivirus.com related BHO (browser helper object, a browser infection that makes your browser open Soldierantivirus.com and restricts your access to other websites) in case of repeating redirections to Soldierantivirus.com; however, even a single redirection may require you to remove Soldierantivirus.com hijacker in case you have been redirected to Soldierantivirus.com without surfing suspicious or not properly maintained websites.
Click here to start free scan to be confident there are no infections to remove or to perform the removal of Security Tool hijacker and adware, as appropriate.

Soldierantivirus.com screenshot:


Soldierantivirus.com removal tool:

Saturday, February 20, 2010

Why remove Live-windowsantivirus.com BHO

If you have no clear understanding of the way you have been transported to Live-windowsantivirus.com, it is a clue that your web-browser is hijacked by BHO. If you have been redirected several times, treat it as a sure sign of BHO infection. In order to remove Live-windowsantivirus.com related BHO you need to disintegrate it from your web-browser. Why get rid of Live-windowsantivirus.com BHO? Because the BHO constantly interrupts your web-browsing and may finally destroys it and disorders Internet connection settings.
You also need to get rid of MalwareCatcher.com’s adware (software promoted at the website, in case you have downloaded it as the ads suggested). Click here to start the removal of Live-windowsantivirus.com scams or just to start free scan in order to get confident there are no Live-windowsantivirus.com scams to remove.

Live-windowsantivirus.com screenshot:


Live-windowsantivirus.com removal tool:

Uninstall Antivirus Soft rogue anti-spyware. Removal info

Antivirus Soft (AntivirusSoft) gets on users’ nerves with its alerts and scares the most credulous of them to buy it. It is not that easy not to get scared into paying for Antivirus Soft fake services because of smart tactics applied by hackers. The most working dodge seems to be a timely alerting. That works as follows: at first, Antivirus Soft executable terminates specific applications, e.g. MS Word, then another executable shows alert explaining that the specific application, e.g. MS Word, fails to run because of so-and-so problem.
Remove Antivirus Soft and do not ignore it even though you find it rather moderate adware that does not bother you much. Sooner or later you will grow tired of its ads and its application termination trickery may result in current data loss. Click here to start free Spyware Doctor scan and perform Antivirus Soft removal, as well as to get rid of Antivirus Soft related trojans, if they are responsible for its backdoor downloading and installation.

Antivirus Soft screenshots:


Antivirus Soft removal tool:


Antivirus Soft manual removal guide:
Delete Antivirus Soft files:

sysguard.exe
sftav.exe
Delete Antivirus Soft registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ""
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ""
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments "SaveZoneInformation" = "1"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "ProxyServer" = "http=127.0.0.1:5555"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Associations "LowRiskFileTypes" = ".exe"
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download "RunInvalidSignatures" = "1"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings "ProxyOverride" = ""
HKEY_CURRENT_USER\Software\avsoft

Friday, February 19, 2010

Softcoregroup.com Parasites to remove

Unfortunately, we cannot remove Softcoregroup.com, though the website is associated with two computer parasites. One of them is scammed through Antivirus Soft – it is a fake system security suite that you are not recommended to download at Softcoregroup.com. Be aware the fake system security tool is extremely dangerous and you need to get rid of Softcoregroup.com related fake tool asap to avoid creation of rootkits and changing of your system settings.
There is another infection related to Malwarecather.com. It is a browser hijacker integrated directly into web-browser to set it open Softcoregroup.com at a repeating basis. Remove Softcoregroup.com hijacker to terminate the trickery.
Click here to perform the removal of Softcoregroup.com threats, as applicable, according to the free scan results.

Softcoregroup.com screenshot:

Softcoregroup.com hijacker remover:

Wednesday, February 17, 2010

W32/Blaster.worm popup removal

W32/Blaster.worm is a name that Central Security refers to. If annoying malware like Central Security suggests to remove W32/Blaster.worm you do not actually need to get rid of W32/Blaster.worm; however, W32/Blaster.worm is a worm that has actually been self-propagated and true antispyware may also refer to it.
Irrespective of whether you have true or false popup alert suggesting to remove W32/Blaster.worm, there is a reliable tool to detect true infections of any kind: click here to start free Spyware Doctor scan and to perform removal of W32/Blaster.worm popup or to remove W32/Blaster.worm.


W32/Blaster.worm removal tool:

Tuesday, February 16, 2010

Remove Mega-scan-pc-new13.org.com hijacker

Annoyware is scammed through Mega-scan-pc-new13.org.com, and your browser may be captured by malicious BHO to continuously redirect your web-surfing to Mega-scan-pc-new13.org.com. The BHO may also be used to show fake alerts, clicking on which activates the link leading to Malwarecatycher.com; what makes thing even worse is that your access to many websites may be denied in order to prevent the removal of MalwreCatcher.com promoted annoyware, which hackers expect you to get and then to buy; remove Mega-scan-pc-new13.org.com’s hijacker or make sure you have visited MalwareCather.com by chance clicking here to start free scan and get rid of Mega-scan-pc-new13.org.com related threats found.

Mega-scan-pc-new13.org.com screenshot:

Mega-scan-pc-new13.org.com removal tool:

Monday, February 15, 2010

Security Essentials 2010 Removal Prevention Techniques

Security Essentials 2010 is quite a high-tech product of hackers, known as a fake system security tool; it certainly does not add any useful value for people having its installed at their computers, for all the high-tech in Security Essentials 2010 is focused on making the malware more effective in scamming users for their money.
Security Essentials 2010 may create rootkits, if the security settings of infected system so permit. Hence legit antispyware may be unable to remove Security Essentials 2010.
Security Essentials 2010 removal is therefore to be performed at the earliest opportunity to avoid creation of such rootkits, as well as a complex antispyware shall be applied to detect and remove Security Essentials 2010 related infections.
Creation of the rootkits is not something outstanding and is not a reason to estimate Security Essentials 2010 that high. But, apart from that, Security Essentials 2010 analyzes users’ responses on its alerts and scan to adjust its behavior accordingly; e.g., it may decrease the pace of its alerts displaying in case the user’s attempts detected to get rid of Security Essentials 2010.
Click here to follow safe link in order to download and install Security Essentials 2010 removal tool.

Security Essentials 2010 screenshot:


Security Essentials 2010 removal tool:

Security Essentials 2010 Removal Instructions
Delete Security Essentials 2010 files:

SE2010.exe
Security essentials 2010.lnk
41.exe
helpers32.dll
smss32.exe
warnings.html
winlogon32.exe
Delete Security Essentials 2010 registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\buy-security-essentials.com
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\download-soft-package.com
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\download-software-package.com
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\get-key-se10.com
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\is-software-download.com
HKEY_CURRENT_USER\Software\SE2010
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\buy-security-essentials.com
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\get-key-se10.com
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop "NoChangingWallpaper" = "1"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer "NoActiveDesktopChanges" = "1"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer "NoSetActiveDesktop" = "1"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableTaskMgr" = "1"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "Security essentials 2010"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "smss32.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\ActiveDesktop "NoChangingWallpaper" = "1"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer "NoActiveDesktopChanges" = "1"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer "NoSetActiveDesktop" = "1"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "smss32.exe"

Saturday, February 13, 2010

Security-tool2010.com to link Users and Annoyware

Security-tool2010.com is designed by hackers to push fake utility through it. It is a link in fake system security suite marketing chain, between BHO or third part ad and annoying agent representing the fake utility scammed at Security-tool2010.com. Remove Security-tool2010.com’s BHO or get rid of Security-tool2010.com’s adware, for they are both unhealthy for your PC and annoying for its users.
Threats from Security-tool2010.com removal shall be started with free scan: click here to start it up.

Security-tool2010.com screenshot:

Security-tool2010.com removal tool:

Thursday, February 11, 2010

Vista Guardian 2010 Removal Difficulties

Vista Guardian 2010 (VistaGuardian 2010) is annoying advertising agent dropped by backdoor loaders or downloaded and installed by users after their viewing Vista Guardian 2010 ads and laudatory descriptions. To remove Vista Guardian 2010 adware is much more complicated than to get infected; there are plenty of online traps redirecting users to Vista Guardian 2010 pages providing its downloading links where you can easily download the shareware. That shareware is either not listed in the Add/ Remove list or its uninstalling is not effective as it does not work for its alerts and scans. A special technique needs to be followed or professional software applied to get rid of Vista Guardian 2010 adware. Click here to start free computer inspection and perform Vista Guardian 2010 removal.

Vista Guardian 2010 screenshot:

Vista Guardian 2010 removal tool:

Vista Guardian 2010 manual removal guide:
Delete Vista Guardian 2010 files:
av.exe
Delete Vista Guardian 2010 registry entries:
HKEY_CURRENT_USER\Software\AV2010
HKEY_CLASSES_ROOT\AppID\{3C40236D-990B-443C-90E8-B1C07BCD4A68}
HKEY_CLASSES_ROOT\AppID\IEDefender.DLL
HKEY_CLASSES_ROOT\CLSID\{FC8A493F-D236-4653-9A03-2BF4FD94F643}
HKEY_CLASSES_ROOT\IEDefender.IEDefenderBHO
HKEY_CLASSES_ROOT\IEDefender.IEDefenderBHO.1
HKEY_CLASSES_ROOT\Interface\{7BC7565C-5062-43CE-8797-DC2C271140A9}
HKEY_CLASSES_ROOT\TypeLib\{705FD64B-2B7B-4856-9337-44CA1DA86849}
HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FC8A493F-D236-4653-9A03-2BF4FD94F643}
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0012
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0013
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\0014
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ‘Windows Gamma Display

Wednesday, February 10, 2010

Total-scan.net lies

Total-scan.net (Total-scan.net/scanning) pretends to provide a reliable system security suite. That seemingly reliable security suite is a computer virus; according to another definition of terms, Total-scan.net’s software is malware, not a virus. Anyway, you are strongly recommended to get rid of Total-scan.net adware (malware, virus) in case you have been inclined with Total-scan.net ads to download and install the counterfeit. In addition, you are likely to be infected with, and need to remove, Total-scan.net hijacker. The hijacker is a trojan according to the way in which it is propagated, which is inserted directly into web-browser to arrange routine redirections of user’s web-surfing to Total-scan.net. Click here to start free computer scan and perform safe and complete removal of Total-scan.net scam.

Total-scan.net screenshot:


Total-scan.net removal tool:

Tuesday, February 9, 2010

Remove SecurePcAv rogue anti-spyware

There is nothing remarkable in SecurePcAv adware; it is a typical adware distributed mainly with virus and trojan downloaders. There are also not yet confirmed reports that trojan notifiers are used to mislead users into downloading SecurePcAv adware. A trojan or virus downloader is a malicious program used to inject counterfeit or another rogue programs into the computer system concerned. A trojan notifier or informer shows a misleading or scaring notification suggesting to get rogue program in the guise of system utility or another useful stuff. Remove SecurePcAv’s trojans and viruses facilitating and directly arranging its intervention into your computer system so that you will not need to get rid of SecurePcAv adware. Click here to start free scan as a beginning of the removal of SecurePcAv scam; removal of SecurePcAv scam is considered as removal of both its related trojans and main adware impersonating antivirus tool.

SecurePcAv screenshot:


SecurePcAv removal tool:


SecurePcAv manual removal guide:
Delete SecurePcAv files:

SecurePcAv.lnk
1 SecurePcAv.lnk
2 Homepage.lnk
3 Uninstall.lnk
SecurePcAv.exe
uninstall.exe
10133zo9m49d5.cpl
10190wormz5e.dll
5725viruz9.dll
57634hzcktool3d59.bin
57939tzoj5fc.bin
Delete SecurePcAv registry entries:
HKEY_CURRENT_USER\Software\SecurePcAv
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SecurePcAv
HKEY_LOCAL_MACHINE\SOFTWARE\SecurePcAv
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ".exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "SecurePcAv"

Monday, February 8, 2010

Remove Your PC Protector (Your PCProtector) fake security suite

Your PC Protector (Your PCProtector) is a rogue and fake remover of computer infections distributed according to well-known and applied in distribution of hundreds preceding counterfeits algorithms. Both methods of infecting computers connected to the Internet using carriers specific to Your PC Protector and multi-purpose carriers, and techniques based on suggesting user to download Your PC Protector are in use. Remove Your PC Protector , no matter whether it has been inserted by trojan or virus or else a user of your PC has been suggested to download the adware and could not stand the lure. A dubious benefit of Your PC Protector activities is that it will state that you are infected – and you are indeed, for you need to get rid of Your PC Protector as of an infection. There are plenty of detriments about having Your PC Protector though, of which bombarding you with alerts and showing scan progress window of not a single true infection detected are the lightest. Your PC Protector restricts functionality of popular software and does not let you open many computer security websites. Click here to use secure link for downloading tested Your PC Protector removal tool (Spyware Doctor).

Your PC Protector screenshot:

Your PC Protector removal tool:


Your PC Protector manual removal guide:

Delete Your PC Protector files:

adc32.dll
alggui.exe
nuar.old
skynet.dat
svchost.exe
wp3.dat
wp4.dat
schtml
dbsinit.exe
wispex.html
images
i1.gif
i2.gif
i3.gif
j1.gif
j2.gif
j3.gif
jj1.gif
jj2.gif
jj3.gif
l1.gif
l2.gif
l3.gif
pix.gif
t1.gif
t2.gif
Thumbs.db
up1.gif
up2.gif
w1.gif
w11.gif
w2.gif
w3.gif
w3.jpg
word.doc
wt1.gif
wt2.gif
wt3.gif
Your PC Protector.exe
Your PC Protector.lnk
Delete Your PC Protector registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\TaskManager
HKEY_CURRENT_USER\Software\Your PC Protector
HKEY_CLASSES_ROOT\CLSID\{77DC0Baa-3235-4ba9-8BE8-aa9EB678FA02}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{77DC0Baa-3235-4ba9-8BE8-aa9EB678FA02}
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_ADBUPD
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\AdbUpd
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ADBUPD
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AdbUpd

Sunday, February 7, 2010

No True Consent to Control Center Download

Control Center (ControlCenter) spreads its advertising copies in order that user buy it. It is a common practice when those ad copies are downloaded without user’s informed consent. Furthermore, there are practically no cases of informed consent for Control Center downloading and a number of Control Center removal requests. Even if user is choosing to get a copy of Control Center, he/she, as a rule, is unaware that Control Center is typically spread by special carriers and does not actually scan computer for viruses, but it finds set-up files, neither dangerous nor having any value for user, which are a part of its installation, adding several dozens of names of viruses which do not reside, or reside due to incredible coincidence, in the memory of your PC. As you can see manual downloading of Control Center is not an informed consent downloading.
Trojans and viruses are widely applied to perform backdoor downloading and installation of Control Center; you need to get rid of Control Center related trojans or viruses after they completed their downloading mission, because they assist Control Center in its advertising and destructive activities. To get rid of Control Center and to execute the removal of Control Center related infections, click here.

Control Center screenshot:


Control Center removal tool:

Control Center manual removal guide:
Delete Control Center files:
agent.exe
cc.exe
settings.ini
uninstall.exe
guide.html
05.png
06.png
07.png
08.png
09.png
10.png
Control center.lnk
Delete Control Center registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Control center
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “agent.exe”
HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon “Shell” = “%UserProfile%\Application Data\CC\cc.exe”

Scanner.just-protect-pc.info (Just-protect-pc.info) Hijacker Removal

Scanner.just-protect-pc.info (Just-protect-pc.info) is a bogus web-site designed to push malware (rogue anti-spyware). Scanner.just-protect-pc.info use trojan horse to infect your browser and show fake "spyware scan results". Scanner.just-protect-pc.info may block other web-sites and slow ypur computer. We recommend to remove Scanner.just-protect-pc.info using automatical removal tool (free scan).

Scanner.just-protect-pc.info screenshots:




Scanner.just-protect-pc.info (Just-protect-pc.info) remover:

Saturday, February 6, 2010

Remove Mega-scan-pc-new.com hijacker

Mega-scan-pc-new.com is one of those websites which visiting is dangerous due to their content. There are yet uncertain information of its direct dangerous impact, but no malicious scripts have been observed to date. As concerns its content, Mega-scan-pc-new.com is a platform for marketing fake antispyware; you need to remove Malwareactcher.com adware, if advertisement at this website made you trust in its fair intention to protect your PC so you downloaded the malware. You also may need to get rid of Mega-scan-pc-new.com related trojan that hijacked your web-browser and exploit it for routine redirection of your web-surfing to Mega-scan-pc-new.com.
Click here to detect unsafe and unwanted programs and to perform the removal of Mega-scan-pc-new.com scam, as appropriate, as well as to root out other infections.

Mega-scan-pc-new.com screenshot:

Mega-scan-pc-new.com removal tool:

Thursday, February 4, 2010

Sysmessage.org/warning removal info

A single visiting of Sysmessage.org/warning may result in embedding special code into your web-browser; the most vulnerable to such intrusion is Internet Explorer, but other browsers may also be infected.
Internet Security adware that impersonates antispyware is available for downloading and for online purchase at Sysmessage.org/warning/. Remove buy-internet-security associated infections as both fake antispyware and hijacker respectively promoted at the website and promoting the website are annoying and oppress computer system concerned. Click here to get rid of Sysmessage.org/warning/ scam.

Sysmessage.org/warning/ screenshot:

Sysmessage.org/warning/ removal tool:

W32.Gosys removal

Antivir and other malware pretending to be antivirus often refer to W32.Gosys. In particular, W32.Gosys removal is advised in Antivir Resident Shield alert that states W32.Gosys is a worm disclosing your activities to remote attacker and allowing him to partly control your system; remove W32.Gosys related adware, Antivir or another, for W32.Gosys is just a scary name used to frighten users into buying ransomware. Click here to start free scan in order to detect true malware, worms, viruses etc. and to get rid of W32.Gosys related counterfeit and other rogues found.

W32.Gosys screenshot:


W32.Gosys removal tool:

Mutating Antimalware Defender

Antimalware Defender (AntimalwareDefender) has several modifications, visually indistinguishable. The difference between the said modifications is established by experts comparing Antimalware Defender components. There are several variants of Antimalware Defender executables denominations; that is obviously a dodge to avoid Antimalware Defender removal.
According to the descriptions at its website and in its nag screens, Antimalware Defender is antispyware that has been awarded by nice-dressed PC magazines etc. and can protect you from infections of any kind. In fact, you need to get rid of Antimalware Defender, for it is Antimalware Defender that facilitates invasion of additional infections, which will harm your PC indeed while Antimalware Defender is producing timely chromes, alerts and scan tables finally offering you to buy Antimalware Defender.
Click here and get a working remedy to detect true infections and remove Antimalware Defender (any variant), as well as other rogue residents of your PC.

Antimalware Defender screenshot:


Antimalware Defender removal tool:


Antimalware Defender manual removal guide:
Delete Antimalware Defender files:
ca84c702-c758-4421-974e-b02662e76d7c_6.avi
ca84c702-c758-4421-974e-b02662e76d7c_6.ico
ca84c702-c758-4421-974e-b02662e76d7c_6.mkv
Antimalware Defender.lnk
ca84c702-c758-4421-974e-b02662e76d7c_6.lnk
Antimalware Defender.dll
ca84c702-c758-4421-974e-b02662e76d7c_6.avi
ca84c702-c758-4421-974e-b02662e76d7c_6.ico
ca84c702-c758-4421-974e-b02662e76d7c_6.avi
ca84c702-c758-4421-974e-b02662e76d7c_6.ico
ca84c702-c758-4421-974e-b02662e76d7c_6.mkv
Antimalware Defender.lnk
Antimalware Defender.lnk
ca84c702-c758-4421-974e-b02662e76d7c_6.avi
ca84c702-c758-4421-974e-b02662e76d7c_6.ico
ca84c702-c758-4421-974e-b02662e76d7c_6.mkv
Antimalware Defender.lnk
ca84c702-c758-4421-974e-b02662e76d7c_6.lnk
Delete Antimalware Defender registry entries:
HKEY_CLASSES_ROOT\CLSID\{ca84c702-c758-4421-974e-b02662e76d7c}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ca84c702-c758-4421-974e-b02662e76d7c}
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “ca84c702-c758-4421-974e-b02662e76d7c_6″

Tuesday, February 2, 2010

Remove GuardWWW malware

GuardWWW is assembled of rather independently acting subprograms. GuardWWW removal is prevented by putting its subprograms into different locations and due to that you cannot remove GuardWWW adware according to the technique of uninstalling provided for Windows.
The assemblage of GuardWWW subprograms is responsible, each for one or few tasks, for the following activities, in general: producing main window and showing a free scan show of imaginary names as a part of it; showing alerts pretending to be issued by host system; showing alerts fairly saying they are GuardWWW alerts; interfering with web-browser and other software; changing system settings to facilitate GuardWWW activities. The aim of the program dropping is too make user buy it.
Click here to start free scan, even if it has been you who downloaded and installed the adware after viewing its intrusive and misleading online advertisement, and get rid of GuardWWW and other infections according to the scan results.

GuardWWW screenshot:


GuardWWW removal tool:


GuardWWW manual removal guide:
Delete GuardWWW files:

GuardWWW.exe
Uninstall.exe
Delete GuardWWW registry entries:
HKEY_CURRENT_USER\Software\GuardWWW
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GuardWWW
HKEY_LOCAL_MACHINE\SOFTWARE\GuardWWW
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run “GuardWWW”