Remove Smart HDD (Smart HDD Uninstall Guide)

Another branch of the FakeHDD family of rogues has appeared, and its name is Smart HDD. There is no dispute over the name of the rogue – it is Smart, indeed, but it is not an optimization and analysis tool. Smart HDD, just like all other members of this corrupt family, is a fake program, which has been created by cyber criminals who want to gain profit by selling the fake licensed versions of such malware pieces.

Figure 1. Smart HDD Virus screenshot

Smart HDD manages to sneak inside vulnerable computers with the help of Trojans, which come as part of hacked websites. When you click through the website, the Trojans exploit any possible security loop-hole in your security in order to break inside. A great part of security vulnerabilities is caused by outdated software. Therefor, security experts recommend keeping all your programs up-to-date. Once Trojans sneak into the system, they download Smart HDD and assist it in its installation process.

Upon its installation, Smart HDD configures itself to start automatically every time you turn on your computer. It also immediately begins to produce counterfeit security alerts. They appear to be coming from your Task Bar, and this is why a lot of people tend to believe they are real. In fact, these warnings are all made-up just to scare you into believing there is a number of errors in your PC and them prompt you to buy Smart HDD.

The S.M.A.R.T. Check is just another trick, used by Smart HDD. It uses this trick to convince you that you need to spend your money on its licensed version. The S.M.A.R.T. Check pretends to be looking for hard drive errors, but it is not. However, at the end of the scan, it shows a whole list of them. The diagnostic report displayed is a big con. If you decide to repair these errors with Smart HDD’s help, it would ask you to activate its full version. Keep in mind that the presumable full version is fake, and you will only send your money away to hackers if you obtain it.

Hiding random files in your PC is also part of Smart HDD’s scam-game, but it includes deleting shortcuts, as well. The backups of the deleted shortcuts are stored in your %Temp%\smtmp folder. Therefore, in case of a Smart HDD infection, you should be very careful not to delete any files from this folder. As for the missing files from your computer – do not panic, they are only hidden, and everything will fall back to place when you get rid of the malware.

Smart HDD may also block some of your other programs. The alerts you see below are used by the malware to make you think that you cannot start the applications due to hard drive errors.

Windows detected a hard drive problem.
A hard drive error occurred while starting the application.

Windows cannot find notepad. Make sure you typed the name correctly, and then try again. To search for a file, click the Start button, and then click Search.

To sum up, Smart HDD should not be let to operate undisturbed on your PC, because it can only harm your computer system and open various cracks in your computer security so that other viruses can sneak inside. Use a real AV tool and remove Smart HDD now.

UPDATE (April 05 2012)

Security specialists again report about a new release of the malicious attacker Smart HDD. This creation of hackers is known to have appeared again in March 2012, and since then it has been targeting computers. There are some changes in the way this deceitful application works in comparison to its earlier version. Smart HDD pretends to make a S.M.A.R.T. Check of the user’s hard drive and then wants to mislead the victim into thinking this tool can repair hard drive problems. Smart HDD also relies on its trustworthy layout to mislead unaware users into thinking they can entrust the safety of their machines to the full version of this bogus software.

Although Smart HDD pretends to be a hard drive optimization tool, all of the information displayed by this program is fake. Smart HDD mimics reliable scan results and system warnings. However, all of the hard drive errors do not exist and, in fact, legitimate scanners would not report about them in the same way as Smart HDD.

Smart HDD reports about the following hard drive errors and problems:

Hard drive boot sector reading error
During I/O system initialization, the boot device driver might have failed to initialize the boot device. File System initialization might have failed because it did not recognize the data on the boot device.

Your computer is in a critical state. Hard disk error detected.
As a result, it can lead to hard disk failure and potential loss of data. It is highly recommended to repair all found errors to prevent loss of files, applications and documents stored on your computer.

Error 0x00000024 – NTFS_FILE_SYSTEM

If you are scared by all of these frightening messages about serious hard drive errors, do not be. In fact, if a hard drive boot sector error is displayed, you will not be able to start your PC at all. What is more, if there are problems with your hard drive, they will not be reported by some unknown application. A blue screen will be displayed, and a warning about the hard drive error that has occurred will be shown. As you can see, there is no need to worry about the errors reported by Smart HDD, as they do not exist.

Another trick used by Smart HDD is that the deceitful intruder hides some of your icons in the Start Menu, as well as other files. This is done to mislead you into thinking some of your documents and programs have been deleted. There is no need to panic, because your information is not lost. You can use a reliable tool to get all your files back in place.

In order to stop the fake messages and temporary disable Smart HDD, use a registration key found by our resaerchers. To register this key you can use a fake email address. Do not submit your personal email. This is the registry code you can use for the new version of Smart HDD:

15801587234612645205224631045976

Know that even if you register Smart HDD, the attacker is still present on your computer and it has to be removed. Although you do not see the annoying messages and scan reports, Smart HDD still hides in the computer system and poses a great risk at your PC and information. To protect your personal and financial details, as well as all the information stored on your computer, use a trustworthy AV program. Also, to stop other malicious creations of hackers from entering your computer, you have to get rid of Smart HDD as soon as possible.

To remove Smart HDD and fix your system, use a reliable and effective security program to scan your PC.

Smart HDD Manual Removal Instructions:

Stop These Smart HDD Processes:
(Learn how to do this)
(random letters).exe like 2362636.exe and pigrfbngn.exe
Find and Delete These Smart HDD Files:
(Learn how to do this)
%Temp%\(random letters)
%Temp%\(random letters).exe
%Temp%\(random letters).dll
%Temp%\dfrg
%Temp%\dfrgr
%Documents and Settings%\[User_Name]\Desktop\Smart HDD.lnk
%Documents and Settings%\[User_Name]\Start Menu\Programs\Smart HDD
%Documents and Settings%\[User_Name]\Start Menu\Programs\Smart HDD\Smart HDD.lnk
%Documents and Settings%\[User_Name]\Start Menu\Programs\Smart HDD\Uninstall Smart HDD.lnk
Remove These Smart HDD Registry Values:
(Learn how to do this)
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “(random letters)”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “(random letters).exe”

Free Antispyware Scan

Fedex Tracking Number Email Virus Removal Instructions (UPDATE)

“Fedex Tracking Number” Email Descriptions:

“Fedex Tracking Number” Email Virus or “Fedex Tracking Number” is another fraudulent email that circulates the web lately. The creator of this virus is getting more creative each time. “Fedex tracking number” email just pretends that it’s from fedex.com. No! It’s not! “Fedex Tracking Number” Email is malicious and dangerous. Do NOT open the attachments. This e-mail attachment contains a virus.

If you open the attachment, your computer will be infected. Simply delete it if you happen to see this email in your mailbox. What if you opened it already? Don’t panic. We have put together a simple removal instruction to take care of this. Be sure to stay away from this or remove it immediately if your computer is infected. Good luck!

Update: Here is the most recent version of the spam email message:

Please DO NOT open any attached files to that email! If you already clicked on the attachment we advise you to run a full scan with SpyHunter Malware Suite and detect if your PC is infected with FedEx tracking number email virus.

[Read more…]

Windows Safe Mode Does Not Start! What to Do?

When you want to run administrative, as well as diagnostic tasks on your installation, Windows Safe Mode is the perfect way to do that. Safe Mode starts up Windows Operating System (OS). As you boot into Safe Mode, the OS loads only the minimum software which is needed to make OS work. Why is Safe Mode so important? Using Safe Mode, you are allowed to troubleshoot and run diagnostics on your PC.

How to start your computer in Safe Mode? Different OS have slightly different ways to do that:

  • F8 – when Windows starts, press the F8 key and you will be taken to Safe Mode. It is usually after you hear your PC beep when you reboot it. If you are unlucky to get to Safe Mode on the first time, try to reboot PC and repeat this action once again. (This method is valid to Win98/ME, XP, Vista, Windows 7, Windows 95, as well as Windows 2000).

  • System Configuration Utility – you can use System Configuration Utility in Windows 98/ME, XP, Vista and Windows 7 to force Windows boot into Safe Mode as you reboot your PC next time (valid for Win98/ME, XP, Vista and Windows 7 only).

In case your computer is infected with a parasite, and your PC is configured to start this virus every single time Windows boots up, a perfect way to solve this issue is to start your PC before the malware is started. In most cases, the processes of these malicious programs are unable to run in Windows Safe Mode. Therefore, Safe Mode is a suitable tool to fight it.

windows safe mode

However, there are cases when you are unable to start your computer in Safe Mode. What would you do then? How would you solve this issue?

First of all, try to boot into Safe Mode, using command prompt (by pressing F8 before Windows OS starts). Then run a malware security tool from the command prompt. As you run the scanner in Safe Mode, repeat the scan in normal mode in order to see whether the threat was removed from the system.

How to Delete Registry Key (regkey) in Windows 7?

———————————————————————————————————————————————————————————–
You are looking for a way to delete the registry key in Windows XP or Vista, click here to find that out (How to Delete Registry Key (regkey) in Windows XP or Vista?)

——————————————————————————————————————————————

You are not trying to entirely delete the registry key, you just want to modify it, find out how to do that on Windows 7 (How to Edit Registry Key (regkey) in Windows 7?)

——————————————————————————————————————————————

Before deleting the registry keys in the Windows Registry, keep in mind that  making any changes to the registry keys can be very complicated and highly risky.

Warning: Please do NOT try this unless you are absolutely positive that you might mess up the system, and, as always, it’s highly recommended that you do a backup of the registry (or whole system) before making any modifications.

Here are the most common steps you might ever need to know for basic troubleshooting:

DELETING THE REGISTRY KEY IN WINDOWS 7:

Step 1. Click Start.

Step 2. Type “regedit” in Search Programs and Files section.

regedit windows 7

Step 3. Click “Enter.”

Step 4. When you see the message “Do you want to allow the following program to make changes on this computer?“, click “Yes.”

Step 5. You are redirected to the Windows Registry.

regedit 2 windows 7

You can easily navigate through the subkeys if you know what you are looking for.

In case, you want to find the particular key, press “Ctrl + F” to locate the subkey that contains the value you want to edit. (Click F3 to find next)

Step 6. To delete a registry key, right-click your mouse, and select “Delete.”

Example: I will provide you an example how to delete the registry key I have created. It is called “example.”

Take the following steps:

Step 1. Click Start.

Step 2. Type “regedit” in Search Programs and Files section.

regedit windows 7

Step 3. Click “Enter.”

Step 4. When you see the message “Do you want to allow the following program to make changes on this computer?“, click “Yes.”

Step 5. You are redirected to the Windows Registry.

regedit 2 windows 7

Step 6. Now search for a particular place in the Windows Registry:

HKEY_CURRENT_USER -> Control Panel -> Desktop -> Windows Metrics

Step 7. Find the key “example.”

regeditwin7

Step 8. Right-click the mouse and select “Delete” option.

Keep in mind that deleting registry keys in the Windows Registry can be extremely dangerous.

——————————————————————————————————————————————

You are looking for a way to delete the registry key in Windows XP or Vista, click here to find that out (How to Delete Registry Key (regkey) in Windows XP or Vista?)

——————————————————————————————————————————————

You are not trying to entirely delete the registry key, you just want to modify it, find out how to do that on Windows 7 (How to Edit Registry Key (regkey) in Windows 7?)

——————————————————————————————————————————————

How to Delete Registry Key (regkey) in Windows XP and Windows Vista?

——————————————————————————————————————————————————————————-
Don’t want to delete the registry key on Windows XP or Windows Vista? You are looking for the way to modify it? Click here and find out how to edit it (How to Edit Registry Key in Windows XP and Windows Vista?)
——————————————————————————————————————————————————————————–
You aren’t sure how to find and edit the registry key in Windows 7? Click the link and learn how to do that (How to Edit Registry Key in Windows 7?).

——————————————————————————————————————————————–

Keep in mind that deleting registry keys in the Registry Editor can be highly risky!

Warning: Please do NOT try this unless you are absolutely positive that you might mess up the system, and, as always, it’s highly recommended that you do a backup of the registry (or whole system) before making any modifications.

Here are the most common steps you might ever need to know for basic troubleshooting:

DELETING REGISTRY KEY IN WINDOWS XP:

Step 1. Go to Start.

Step 2. Click Run.

Step 3. Type “regedit” and click on OK.

regedit2a

Step 4. Now it opens the Registry Editor.

regedit

Step 5. In order to delete the registry key, you need to find the exact registry key. In case you know what exact subkey you are looking for, you can easily navigate through the subkey.

Or, you can press Ctrl + F (or go to Edit  -> Find) to locate the subkey that contains the value you want to get rid of.

Click F3 to Find Next.

Example: I will provide you the example of deleting  the reg key named “example.”

Step 1. Go to Start.

Step 2. Click Run.

regedit1

Step 3. Type “regedit” and click on OK.

Step 4. Now it opens the Registry Editor.

regedit3

Step 5. Find the following key:

Go to HKEY_LOCAL_MACHINE -> Software-> Clients ->Example

delete regkey

Step 6. Right-click your mouse and Delete.

DELETING REGISTRY KEY IN WINDOWS VISTA:

Step 1. Go to Start.

Step 2. Type “regedit” in Search files and folders section.

registry1

Step 3. Click Enter.

Step 4. Open the Windows Registry.

Step 5. Click OK to continue the procedure.

Step 6. Now you are on the Windows Registry.

regedit4

Step 5. In order to delete the registry key, you need to find the exact registry key. You can easily navigate through the subkey.

Or, you can press Ctrl + F (or go to Edit  -> Find) to locate the key that you want to delete.

Click F3 to Find Next.

Example: I will provide you the example of how to delete the registry key on Windows Vista.

Step 1. Go to Start.

Step 2. Type “regedit” in Search files and folders section.

registry1

Step 3. Click Enter.

Step 4. Open the Windows Registry.

Step 5. Click OK to continue the procedure.

Step 6. Now you are on the Windows Registry.

registry2

Step 7. Find the following key:

HKEY_LOCAL_MACHINE -> Software -> Ali -> Example

Step 8. Right-click your mouse and Delete.

delete regentry

Keep in mind that any changes in Windows Registry should be taken with caution. Be sure you know what you are doing.

—————————————————————————————————————————————

You aren’t sure how to find and edit the registry key in Windows 7? Click the link and learn how to do that (How to Edit Registry Key in Windows 7?).

—————————————————————————————————————————————

Don’t want to delete the registry key on Windows XP or Windows Vista? You are looking for the way to modify it? Click here and find out how to edit it (How to Edit Registry Key in Windows XP and Windows Vista?)

—————————————————————————————————————————————

Where is RUN in Windows 7?

Are you using Windows Vista? And you have no clue where to find RUN?

(Where is RUN in Windows Vista?)

—————————————————————————————————

Be default, Windows 7, as Windows Vista, does not have RUN function in START menu. You can access RUN in two ways:

  • Press “Windows” and “R” keys simultaneously.

run

  • Customize the START menu taking these steps:

1. Right-click on the TASKBAR.

2. Select PROPERTIES.

properties

3. Select START MENU.

customize

4. Click CUSTOMIZE.

5. Check RUN COMMAND.

run command

6. Click OK.

7. Check the RUN command checkbox in the list:

run in taskbar

—————————————————————————————————

Are you using Windows Vista? And you have no clue where to find RUN? (Where is RUN in Windows Vista?)

—————————————————————————————————

You are looking for a way to delete a Registry Key in Windows 7 (Click here How to Delete Registry Key in Windows 7?)

—————————————————————————————————

Don’t know how to edit a Registry Key in Windows 7? (Find that out How to Edit Registry Key in Windows 7?)

—————————————————————————————————

How to Edit Registry Key (regkey) in Windows 7?

———————————————————————————————————————————————-

You have troubles in editing a registry key in Windows XP or Vista? Click the link and find that out. (How to Edit the Registry Key (regkey) in Windows XP or Vista? )

———————————————————————————————————————————————–

Before making any changes on the Windows Registry, keep in mind that editing registry keys can be very complicated and highly risky.

Warning: Please do NOT try this unless you are absolutely positive that you might mess up the system, and as always, it’s highly recommended that you do a backup of the registry (or whole system) before making any modifications.

Here are the most common steps you might ever need to know for basic troubleshooting:

EDITING REGISTRY KEY IN WINDOWS 7:

Step 1. Click Start.

Step 2. Type “regedit” in Search Programs and Files section.

regedit windows 7

Step 3. Click “Enter.”

Step 4. When you see the message “Do you want to allow the following program to make changes on this computer?“, click “Yes.”

Step 5. You are redirected to the Windows Registry.

regedit 2 windows 7

You can easily navigate through the subkeys if you know what you are looking for.

In case, you want to find the particular key, press “Ctrl + F” to locate the subkey that contains the value you want to edit. (Click F3 to find next)

———————————————————————————————————————————————-

You have troubles in editing a registry key in Windows XP or Vista? Click the link and find that out. (How to Edit the Registry Key (regkey) in Windows XP or Vista? )

———————————————————————————————————————————————–

Remove Antivirus 360/AV360.exe/Antivirus360 (Removal Info)

Antivirus 360 Descriptions:

Antivirus 360, (abrv. AV360), also referred as Antivirus360 by some people, is the latest and hottest counterfeit software that created to ruin our computers. It is undoubtedly one of the worst worms we have seen in a long while. Nevertheless, do NOT confuse Antivirus 360 with Norton Antivirus 360. Norton Antivirus 360 is a legit product, while Antivirus 360 is a rogue or fake antivirus product. If you have not already recognized this, Antivirus 360 is essentially a copy of the infamous Antivirus 2009, but rebranded itself to mislead the users. Antivirus 360 has the same type of destruction with a different mask to disguise the innocence. Antivirus 360 usually comes up after you installed a video codec that come with Trojan, malware and virus. Sometimes you can get infected by visiting some malicious websites.

Antivirus 360 normally generates fake and misleading system popup error messages so end-users will be tricked into purchase Antivirus 360. Likely fake security popup alerts include, “Attention! If your computer is struck by the spyware, you could suffer data loss, erratic PC behaviour, PC freezes and creahes. Detect and Remove virus before they damage your computer! Antivirus 360 will perform a 100% FREE and quick scan of your computer for Viruses, Spyware and Adware. Do you want to install Antivirus 360 to scan your computer for malware now? (Recommended)”

It is very critical to remove Antivirus 360 and all its components. To effectively get rid of Antivirus 360, we have created a manual removal instructions. As always, make sure that you back up all important data before you proceed. The removal process requires some patience and willingness to experiment. Don’t get frustrated. You will learn a lot along the way. Here are the things that you need to do in order to remove Antivirus 360.

Antivirus 360 Download SpyHunter* Spyware Detection Utility

[Read more…]

Zlob (Trojan.Zlob) Removal Instructions

Zlob (Trojan.Zlob) Descriptions:

Zlob, also known as Zlob.Trojan or Trojan.Zlob, is a “Backdoor Trojan” that gives the invader or attacker a bridge to remotely control your computer. By remotely controlling your computer, it allows them to install all kind of malicious softwares to your computer. It can also delete and modify files, and put your privacy in danger.

Technically, a Trojan, or Trojan horse, is a piece of software codes or scripts that seems to perform one thing but does something else. It is not a computer virus by itself. However, it can open a door for wealth of computer viruses or spywares to be installed on targeted machines.

Zlob.Trojan is known to install fake anti-spyware program such as IE Defender, AntiVirGear, VirusProtect, SpyCrush and SpyLocked. Therefore, it’s very critical to remove Zlob from from your computer if it was infected. You can try our recommended SpyHunter* Spyware Detection Utility, which is very intuitive and highly efficient. Zlob or Zlob.Trojan can be removed automatically. However, if you are familiar with registry edit and dll files in Windows, we strongly recommend you to try Zlob manual removal instructions. It might take time and patience, but it is equally effective if you get it right.

As always, we will constantly update the instructions to combat against Zlob or Zlob.Trojan / Trojan.Zlob. Please feel free to post comments if you have any questions or suggestions regarding Zlob. This is a great community and I am sure that you would find the answers. Good luck!



Manual Removal Instructions:

Stop Zlob Processes:

(Learn how to stop a process)
nvctrl.exe
msmsgs.exe

Unregister Zlob DLL Files:
(Learn how to do this)
oyopu.dll
yronl.dll
isadd.dll
pkgvyg.dll
qzviz.dll
Ygjun.dll
yuspej.dll
czxtyx.dll
bpvol.dll
splug.dll
dxovx.dll
lcsrsrv.dll
iesplg.dll (new)
iesbpl.dll (new)
vzfhprk.dll (new)
hymww.dll (new)

Remove Zlob Registry Values:
(Learn how to delete a registry value)
Software\Microsoft\Windows \CurrentVersion \Explorer\SharedTaskScheduler\{aed6f6a3-183c-488d-9f90-23db99f56e7f}
Software\Microsoft\Windows \CurrentVersion \Explorer\SharedTaskScheduler\{634be415-da12-496b-b89e-329b73c4807f}
Software\Microsoft\Windows \CurrentVersion \Explorer\SharedTaskScheduler\{8329660f-e248-4872-98cc-fb9c4fec7ba8}
SOFTWARE\MICROSOFT\Windows \CURRENTVersion \POLICIES\EXPLORER\RUN\C:\Windows \System32\issrch.exe
SOFTWARE\Microsoft\Windows \CurrentVersion \Explorer\SharedTaskScheduler\{2016a466-91a2-43c6-97d8-2fd380f065ef}

Find and Delete these Zlob Files:
(Learn how to do this)
Trojan.Zlob.D
nvctrl.exe
msmsgs.exe
Trojan.Zlob
hp[X].tmp
msvol.tlb
ncompat.tlb
RSA
Protect
vnp7s.net
zxserv0.com
dumpserv.com
oyopu.dll
yronl.dll
isadd.dll
pmsnrr.exe
pmmnt.exe
isamntr.exe
avD.exe
codecaddon1169[1].exe
pkgvyg.dll
qzviz.dll
Ygjun.dll
yuspej.dll
czxtyx.dll
bpvol.dll
splug.dll
dxovx.dll
lcsrsrv.dll
iesplg.dll (new)
iesbpl.dll (new)
vzfhprk.dll (new)
hymww.dll (new)

Trojan.Win32 Removal Instructions (updated)

Though the Internet is a great necessity nowadays, it has gradually become the main playground for mischief. Cyber criminals have placed their wicked creations everywhere, lying in hide for the most convenient moment to attack a vulnerable computer. There are countless security threats and working online seems to be a hazardous task, but some of the viruses can be avoided or even eradicated relatively easy from a computer in case they manage to enter it. One of these viruses is the Trojan.Win32 or also known as Trojan.Win32.agent.

Trojan.Win32 targets Windows users only. It mainly aims at stealing personal information, and on the way of obtaining it, it sometimes even manages to crash the corrupted system completely. Unfortunately, this malware is capable of hiding itself extremely well, and this is its trump-card since a lot of time may pass before the victim notices the infection.

Trojan win32 uses a variety of strategies in order to creep into a PC. The main two, however, are fishy websites and strange pop-ups. Sometimes it might be difficult to differentiate between a legitimate website and a corrupted one, because hackers become more and more crafty every day and they do not invent a single website to hide a particular virus. Trojan.Win32 is laid in a number of seemingly unsuspicious websites, therefor, you should be extremely cautious when following links, especially if they come attached in an e-mail (even one from a friend) and as part of pop-ups. Exactly strange pop-ups are the second, and most common, method for transmitting the Trojan.Win32 infection. These pop-ups appear suddenly, while you are browsing the Internet, and their text may be of any nature as long as they seem luring enough to make users click on them. However, even if they are warning about a potential threat to your computer safety, you should not click on them, because this is the way to trigger the Trojan.Win32 virus.

The Trojan.Win32 installs itself without the victim’s permission or knowledge and once inside, it immediately starts threatening the attacked computer system’s security by downloading or uploading files, logging keystrokes, watching the user’s screen. In some cases, it can also totally crash the system before the user is even aware that there is an intruder in their PC.

Though removing Trojan.Win32 is not that complicated and almost all legitimate anti-virus programs can remove it, it is discovering you have been infected that is tough. The main symptoms of a Trojan win32 infection are:

  • constant pop-ups;
  • changed default homepage;
  • excessively slow Internet connection;
  • disabled firewall (provided that it has been turned on prior the infection);
  • crashes of the system.

In case you notice some of these signs as part of your PC’s behaviour, immediately run a full scan of your system with a genuine anti-virus application or a registry cleaner. What should be noted here is that it is very important to act right on time in order to prevent Trojan.Win32 from stealing your private data.

Manual Trojan.Win32 Removal Instructions:

Unregister Trojan.Win32 DLL Files:
(Learn how to do this)
windivx.dll
stream32a.dll
vipextqtr.dll
ecxwp.dll

Find and Delete these Trojan.Win32 Files:
(Learn how to do this)
windivx.dll
stream32a.dll
vipextqtr.dll
ecxwp.dll

Remove Trojan.Win32 Registry Values:
(Learn how to do this)
7a329404de21925daacbbbee093ff6dc
bb5be1c92c299a1c6bcfe67655b0a0c7
9a9f57899a28547b04fc2da3700c95cf
7d4b39e4cab018496e2fe9bf9c3234b2

 

Variant: Trojan.Win32, Trojan.Win32.agent.akk and Trojan.Win32.Obfuscated.gx