Tuesday, June 21, 2011

Remove The Win32.Renosa-B Trojan [Utility Provided]

The Win32.Renosa-B Trojan seems to be running rampant, and is probably also on your computer as well.  A lot of people just want to get it gone and don't want to deal with a lot of hassle.  Where here it is for you.  We have a small utility which will remove this virus for you. 


Click Here To Download Utility To Remove Win32.Renosa-B Trojan Automatically


Manually Remove the Win32.Renosa-B Trojan

  1. Remove the registry key HKEY_CURRENT_USER\SOFTWARE\COGNAC\ and all keys and values inside of it.
  2. Remove the registry key HKEY_CURRENT_USER\SOFTWARE\XML\ and all keys and values inside of it.
  3. Locate the registry key HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\COGNAC and make note of the file location.  
    • (I.E.  %TEMP%\f5ff4f49791a3db670456a5706703a1d955716ab.exe)
  4. Locate the file from Step 3 and delete that file.
  5. Remove the registry key HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\COGNAC.
  6. Restart your computer.

Here Are Some Other Free Spyware Removal Programs That We Lik




Linkback:  http://stoptheseviruses.blogspot.com/2011/06/win32-renosa-win32-renosa-removal.html

Wednesday, June 15, 2011

Internet Explorer Default Search Provider Corrupted Fix

If you have been getting a pop-up when you open Internet Explorer that says, "A program on your computer has corrupted your default search provider setting for Internet Explorer. Internet Explorer has reset this setting to your original search provider, [insert provider here].  Internet Explorer will open Search Settings, where you can change this setting or install more search providers."

We have dealt with this on multiple computers and have decided to try and help everyone that has come across this issue.  We offer both a way to fix the program manually or through a utility provided by Cloud Tek Software.



Manual Steps For Correcting Error

Step 1:
Close out of all programs, especially Internet Explorer

Step 2: 
Go to Run and type in regedit

Step 3: 
Local and remove the registry key HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes

Step 4: 
Locate and remove the registry key HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\User Preferences

Step 5:
Locate and remove the registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes

Step 6:
Locate and delete the folder RootDrive:\Users\[Your User]\AppData\Roaming\Microsoft\Protect

Step 7:
Exit out of regedit, and restart your computer.



Or, if you do not feel comfortable doing this yourself, you can use the utility provided by Cloud Tek Software.  They provide it free of charge, and all they ask is that if helps you that you donate any amount you feel like it was worth.  Just download and run the utility and it will make all the necessary changes for you.  Be sure to run the utility as an administrator.

Friday, June 10, 2011

Win32 Renosa (win32 renosa) Removal

It appears that the Win32 Renosa (win32 renosa) virus has become fairly rampart as of late.  If you have encountered this virus, there are several ways to remove this virus, and they are all free.

Download these files from the following links, these links are the actual links in case your computer is infected and possibly redirecting you.

Malware Bytes:  http://www.malwarebytes.org/products/malwarebytes_free
Super Anti Spyware:  http://www.superantispyware.com/download.html
Spybot S & D:  http://www.safer-networking.org/en/download/

Instructions For Removal of the Win 32 Renosa Virus:
  • Install Malware Bytes, Super Anti Spyware, and Spybot S & D
  • Update Malware Bytes
  • Run Full Scan with Malware Bytes
    • Follow the Instructions by Malware Bytes
  • Update Super Anti Spyware
  • Run Full Scan with Super Anti Spyware
    • Follow the Instructions by Super Anti Spyware
  • Update Spybot S & D
  • Run Immunization
  • Run Full Scan with Spybot S & D
    • Follow the Instructions by Spybot S & D

This should completely remove the Win 32 Renosa virus that has been causing you trouble.  There are several programs out there which can help actively stop virus from infecting your system.  Listed below are several options for active protection.

Wednesday, June 8, 2011

Trojan:win32/vundo.gen!au [Generic]

According to McAfee.com, this is a Trojan detection. Unlike viruses, Trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include e-mail, malicious or hacked Web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.

Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.

Also Known As
Generic.bfr!ce
w32/crypt.avjj
trojan:win32/vundo.gen!au [generic]


Stopping the Trojan:win32/vundo.gen!au [Generic] (Trojan horse) Virus

Stopping the Trojan:win32/vundo.gen!au [Generic] (Trojan horse) virus from starting up is the best method from being infected.  Process Lock is a program that stops programs from running if they have not been authorized by the management client.  Process Lock monitors all active processes and reports what is running.  What's so easy about it, is that they offer a feature called "Kill All Not Acknowledged".  This allows you to set what you want to be able to run, and what you do not.  Therefore, a process that the virus tries to start will be denied before it has a chance to infect your system.

Process Lock is not just a process blocker, but it is also a computer monitoring solution.  Process Lock has the ability to record computer sessions, block specific programs, watch children and spouse activity and so much more.  Check out their site at http://www.cloudteksoftware.com/software.html


Removing the Trojan:win32/vundo.gen!au [Generic] (Trojan horse) Virus

In order to completely remove the threat from a computer, it is best to download and run Malwarebytes Anti-Malware. Sometimes, Trojans will block the downloading and installation of MBAM. If this happens, download it from a clean computer and rename the executable file before executing on the infected computer.

To thoroughly clean a computer, it is best to do a separate scan of another security program so that other infected files not detected by anti-virus application can be remove as well. Download and run SuperAntiSpyware Portable Scanner.

A free removal tool from Norton Antivirus was developed to remove unfamiliar threats without using the traditional AV signatures. Download the tool and start scanning with Norton Power Eraser

Wednesday, May 18, 2011

Generic19.BQGM (Trojan horse) Newly Discovered on 5/18/2011

According to McAfee.com, this is a Trojan detection. Unlike viruses, Trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include e-mail, malicious or hacked Web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.

Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.


Also Known As

PWS-Mmorpg!tz
Win32:BHO-ACI [Trj]
Generic19.BQGM (Trojan horse)
TR/BHO.Gen
HEUR:Trojan.Win32.Generic
Generic.Onlinegames.17.2D78E58F
Trojan.DownLoader.origin
W32/FakeGame.A.gen!Eldorado
W32/BHO.NZI!tr
Trojan:Win32/BHO.CV
Trojan.Gen
Win32/BHO.NZI trojan (variant)
New unknown virus W32/Obfuscated.DR!genr
Trj/Lineage.LOE
Trojan.Win32.Generic.124EA8B7
Troj/Darbyen-A
TROJ_BHO.SMA
Trojan.Onlinegames!YAPUTiAk1+c (trojan)


Stopping the Generic19.BQGM (Trojan horse) Virus

Stopping the Generic19.BQGM (Trojan horse) virus from starting up is the best method from being infected.  Process Lock is a program that stops programs from running if they have not been authorized by the management client.  Process Lock monitors all active processes and reports what is running.  What's so easy about it, is that they offer a feature called "Kill All Not Acknowledged".  This allows you to set what you want to be able to run, and what you do not.  Therefore, a process that the virus tries to start will be denied before it has a chance to infect your system.

Process Lock is not just a process blocker, but it is also a computer monitoring solution.  Process Lock has the ability to record computer sessions, block specific programs, watch children and spouse activity and so much more.  Check out their site at http://www.cloudteksoftware.com/software.html


Removing the Generic19.BQGM (Trojan horse) Virus

In order to completely remove the threat from a computer, it is best to download and run Malwarebytes Anti-Malware. Sometimes, Trojans will block the downloading and installation of MBAM. If this happens, download it from a clean computer and rename the executable file before executing on the infected computer.

To thoroughly clean a computer, it is best to do a separate scan of another security program so that other infected files not detected by anti-virus application can be remove as well. Download and run SuperAntiSpyware Portable Scanner.

A free removal tool from Norton Antivirus was developed to remove unfamiliar threats without using the traditional AV signatures. Download the tool and start scanning with Norton Power Eraser

Thursday, May 12, 2011

Win32/Kryptik.NBQ trojan (variant)

This is a Trojan detection. Unlike viruses, Trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include e-mail, malicious or hacked Web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.

Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.


Also Known As

Win32:Renosa-D
TR/Kazy.20990.8
Trojan.Win32.FakeAv.cufv
Gen:Variant.Kazy.20990
Trojan.Fakealert.20509
W32/FakeAV.BTQ!tr
rogue:win32/fakerean
Trojan.Fakeav
Win32/Kryptik.NBQ trojan (variant)
Mal/FakeAV-JR


Stopping the Win32/Kryptik.NBQ trojan (variant) Virus

Stopping the Win32/Kryptik.NBQ trojan (variant) virus from starting up is the best method from being infected.  Process Lock is a program that stops programs from running if they have not been authorized by the management client.  Process Lock monitors all active processes and reports what is running.  What's so easy about it, is that they offer a feature called "Kill All Not Acknowledged".  This allows you to set what you want to be able to run, and what you do not.  Therefore, a process that the virus tries to start will be denied before it has a chance to infect your system.

Process Lock is not just a process blocker, but it is also a computer monitoring solution.  Process Lock has the ability to record computer sessions, block specific programs, watch children and spouse activity and so much more.  Check out their site at http://www.cloudteksoftware.com/software.html


Removing the Win32/Kryptik.NBQ trojan (variant) Virus

In order to completely remove the threat from a computer, it is best to download and run Malwarebytes Anti-Malware. Sometimes, Trojans will block the downloading and installation of MBAM. If this happens, download it from a clean computer and rename the executable file before executing on the infected computer.

To thoroughly clean a computer, it is best to do a separate scan of another security program so that other infected files not detected by anti-virus application can be remove as well. Download and run SuperAntiSpyware Portable Scanner.

A free removal tool from Norton Antivirus was developed to remove unfamiliar threats without using the traditional AV signatures. Download the tool and start scanning with Norton Power Eraser.

Wednesday, May 11, 2011

BackDoor-CEP.gen.cq Virus Removal / Precautions

According to McAfee.com, this is a Trojan detection. Unlike viruses, Trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include e-mail, malicious or hacked Web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.

Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.


Also Known As

Rootkit-Pakes.BF (Trojan horse)
TR/Koutodoor.psa
HEUR:Trojan.Win32.Generic
Gen:Variant.Koutodoor.15
Trojan.Dropper-27717
Trojan.MulDrop.origin
W32/Koutodoor.N.gen!Eldorado
W32/Koutodoor.KWD!tr.bdr
Trojan:Win32/Koutodoor.E
Trojan.Koutodoor
Win32/Koutodoor.HM trojan (variant)
W32/Koutodoor.CUS.dropper
Trj/CI.A
Trojan.Win32.Generic.127F033C
Troj/Kouto-D
TROJ_DLOADR.SMOM
Backdoor.Koutodoor.odu


What It Attempts To Do
  1. Attempts to connect to a high risk domain that could pose a security risk.
  2. Attempts to write to a memory location of a Windows system process.
  3. Enumerates many system files and directories.
  4. Adds or modifies Internet Explorer cookies

Stopping the BackDoor-CEP.gen.cq Virus

Stopping the BackDoor-CEP.gen.cq virus from starting up is the best method from being infected.  Process Lock is a program that stops programs from running if they have not been authorized by the management client.  Process Lock monitors all active processes and reports what is running.  What's so easy about it, is that they offer a feature called "Kill All Not Acknowledged".  This allows you to set what you want to be able to run, and what you do not.  Therefore, a process that the virus tries to start will be denied before it has a chance to infect your system.

Process Lock is not just a process blocker, but it is also a computer monitoring solution.  Process Lock has the ability to record computer sessions, block specific programs, watch children and spouse activity and so much more.  Check out their site at http://www.cloudteksoftware.com/software.html


Removing the BackDoor-CEP.gen.cq Virus

In order to completely remove the threat from a computer, it is best to download and run Malwarebytes Anti-Malware. Sometimes, Trojans will block the downloading and installation of MBAM. If this happens, download it from a clean computer and rename the executable file before executing on the infected computer.

To thoroughly clean a computer, it is best to do a separate scan of another security program so that other infected files not detected by anti-virus application can be remove as well. Download and run SuperAntiSpyware Portable Scanner.

A free removal tool from Norton Antivirus was developed to remove unfamiliar threats without using the traditional AV signatures. Download the tool and start scanning with Norton Power Eraser.