Instant Access Dialer.F
Instant Access Dialer.F Instant Access Dialer.F is an adult dialer. Variant of Instant Access Dialer. Instant Access Dialer.F is sometimes silently installed by the MagicControl trojan horse from Electronic-Group.   It also known as Instant Access Dialer  ...

GMSoft Dialer
GMSoft Dialer GMSoft Dialer is a pornography related dialer. Sexy_sg.exe, ORGYCAM.EXE, Hot_jp.exe, VIDEOGIRLS_NL.EXE, Hot_gb.exe, hotvideo_es.exe, hotvideo_no.exe, Hot_nl.exe, hotvideo_es.exe, Uninstall procedure
Uninstall GMSoft Dialer from "Add/Remove Programs" in the Windows’ Control Panel. If you run into ...

SysUpd.exe
SysUpd.exe SysUpd.exe is part of TSCash is a German dialer program that surfaced around April 2001. The original website tscash.de appears to be dormant, although the files from this dialer, especially sysupd.exe

C2.lop browser hijacker
C2.lop browser hijacker If security settings of IE are low, the TeenSex dialer is installed without asking the user. If not, the every few clicks a message box will pop up asking to install the ...

Telephony API (TAPI)
Telephony API (TAPI) An application programming interface (API) used by communications programs to work with telephony and network services. Communications programs like HyperTerminal and Phone Dialer use TAPI to dial, answer, and route telephone calls ...

optimize.exe
optimize.exe Process File: optimize or optimize.exe
Process Name: Optimize
Description: Adult content dialer that dials numbers specific to porn related sites.

Home
What's New? | Recent User Feedback & Comments! Looking for something inside MAC-NET.com??? Use the "Search" box on the top to help you hunt down documents scattered within this site. Here is our short tutorial ...

Deloder Computer Virus
W32/Deloder.worm (raddrv.dll) Deloder (w32.deloder.a) does not spread using e-mail; rather, it scans the Internet looking for open 445 TCP/IP ports.  Deloder carries an infected version of a commonly available network remote administration tool, and an Internet ...

Re: HijackThisLog Analysis - ycspring
Re: HijackThisLog Analysis - ycspring Date: Wed 2004-10-20 8:18 PM Remember DO NOT run hijackthis.exe inside the zip file.  Unzip (extract) it to your desktop then double click on "HijackThis.exe" icon in this way a backup for the ...

Re: HijackThisLog Analysis - Supergluey
Re: HijackThisLog Analysis - Supergluey Date: Tuesday, 22 June, 2004 2:09 PM Remove the following key E0E899AB-F487-11D5-8D29-0050BA6940E3 belongs to FlashGet Bar (fgiebar.dll).  If you do not know what this is, then have it removed.  It can be ...

Re: HijackThisLog Analysis - L33t
Re: HijackThisLog Analysis - L33t Date: Monday, 27 September, 2004 9:08 AM Remember DO NOT run hijackthis.exe inside the zip file.  Unzip (extract) it to your desktop then double click on "HijackThis.exe" icon in this way a backup ...

Re: HijackThisLog Analysis - Sally
Re: HijackThisLog Analysis - Sally Date: Friday, 09 July, 2004 5:50 PM
Here is what you should do. End the below suspicious process : C:\Program Files\Common files\WinTools\WToolsS.exe
C:\Program Files\Common files\WinTools\WToolsA.exe
C:\Program Files\Common Files\WinTools\WSup.exe
C:\WINDOWS\System32\sadds32m.exe Remove these search keys: R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar ...