Thursday, April 14, 2011

Mediaplex and 207.net tracking cookie Removal Guide - manual removal instructions

Mediaplex and 207.net tracking cookie Removal Guide - manual removal instructions

Mediaplex Description
Mediaplex is a tracking cookie that monitors your Internet activity and gathers your personal information as you surf the web. This information may be retrieved by the parent company, without your consent.
How can I Detect Mediaplex?
Cookies may contain information about you, such as a password, usernames, how many times you visit a website, how you shop on a website and other surfing habits. Generally there might not be any reason to worry about certain cookies in your computer. Yet the fact remains that a cookie's main purpose is to reveal what websites you've visited and it's up to you whether you want that information to be in the hands of a third-party.

To get rid of Mediaplex cookie and other cookies follow the manual cookie removal instructions provided below.
Mediaplex Manual Removal Instructions
Below is a list of Mediaplex manual removal instructions and Mediaplex components listed to help you remove SpyCrush from your PC. Backup Reminder: Always be sure to back up your PC before making any changes.
Note: This manual removal process are to be used at your own risk. We recommend that you use SpyHunter's detection tool to check for cookies.

Step 1 : Search and Remove Mediaplex Cookie
To remove Mediaplex cookie with Internet Explorer 6, 5, 5.01, and 5.5 for Windows 95, Windows 98, Windows NT 4.0 and Windows 2000, follow the manual removal steps below:
Start Internet Explorer.
Go to Tools > Internet Options > General tab.
In the Temporary Internet Files, select Settings > View Files.
On the View, select Details.
Click the Internet Address column header, and search for the Internet addresses of the cookie file(s) below:
Mediaplex
Mediaplex
Mediaplex Mediaplex
Right-click on the Mediaplex cookie file, and then press Delete. If you are prompted to confirm that you wish to delete the Mediaplex cookie file, click Yes. You can repeat this step for each cookie file you want to remove.

Step 2 : Detect and Remove Other Cookies
You might want to keep some cookies on your computer. Registration cookies, for example, are useful to keep on your computer because you'll need them for websites you visit frequently. NKeep in mind that some cookies you may want to keep to log on into certain services so you might not want to delete all the cookies.
To delete all cookies in Internet Explorer 6, 5, 5.01, and 5.5 for Windows 95, Windows 98, Windows NT 4.0 and Windows 2000, follow the manual removal steps below:

Open Internet Explorer.
Go to Tools > Internet Options > General Tab.
In the Temporary Internet Files, select Delete Cookies > OK, and then click OK again.



To learn more on Mediaplex cookie, see our Mediaplex cookie resource section below.
More Mediaplex Resources
What is Tracking Cookie?
Mediaplex is a type of Tracking Cookie.
Tracking cookies, like regular cookies, are small files that get deposited onto your computer's hard drive as you browse the Internet. Unlike harmless cookies that normally let you use certain websites more easily, tracking cookies usually collect and report information about what websites you visit and what you do at those websites. If you fill out forms online with your real name and contact information, click on banners and then purchase an item, or fill out sweepstakes or contests forms, then it's possible that major online advertisers know your name and have associated it with your IP address and other information.
Think you have Mediaplex? Run SpyHunter's Mediaplex scan and automatically detect Mediaplex on your PC.
Cookie Prevention Steps
Do you want to be able to block and allow cookies from certain websites or domains? You can block cookies from certain websites or from all of them by going to the Settings cookies on your browser.
To Block Certain Cookies:
To prevent certain websites from setting cookies on your PC, follow the steps below.
Start Internet Explorer (IE).
Go to Tools > Internet Options > Privacy tab > Advanced.
Check "Override automatic cookie handling".
Set "First Party Cookies" to Block, and then set "Third Party Cookies" to Block.
Click the "OK" button.

To Allow Certain Cookies:
To allow certain cookies, follow the steps below.
Go to Tools > Internet Options > Privacy tab > Sites.
Then type the URL(s) of website(s) that you trust and that use cookies to remember your logging info.
Some websites are required to have tracking cookies. It is advised that you add websites such as '*.microsoft.com' (no quotes) to the "Always Allow" list in order to get Windows Update or other Microsoft websites which require cookies to be accepted.
To Block All Cookies:

You can also prevent all cookies from being used on your computer. To set your browser to block all cookies, follow the steps below.

For Internet Explorer (IE):

Go to Tools > Internet Options > Security > Set security level to "High", or Custom level > Cookies > Disable.

For Mozilla Firefox:
Go to Tools > Options > Privacy > Cookies > Uncheck "Allow sites to set cookies".

User Comments
Username: Suzanne Date Posted: 2007-11-05 13:42:54
Comment:
Could you please post "Mediaplex Manual Removal Instructions for Mozilla Firefox? Also whatever other materials are posted about this for Mozilla. Thank you

Username: ghostrider01 Date Posted: 2007-11-09 10:05:51
Comment:
Suzanne,
Mediaplex Manual Removal Instructions for Mozilla Firefox:
Step 1 : Search and Remove Mediaplex Cookie

1. Start Mozilla Firefox.
2. Go to Tools > Options > Privacy and select Show Cookies...
3. Type in MediaPlex in the Search line and press Clear.

Step 2 : Detect and Remove Other Cookies
1. Start Mozilla Firefox.
2. Go to Tools > Options > Privacy and select Show Cookies...
3. Click on Remove All Cookies.
Don't worry so much about the cookies, because they are not so dangerous. It's enough to clean them weekly from your computer.

Username: Sharon Date Posted: 2008-02-24 10:23:30
Comment:
MEDIAPLEX is coming from eBay. Best thing to do is everyone protest this. eBay was using Doubleclick and now they are using Mediaplex to bug the hell out of everyone. Maybe time to go back to shopping locally and [REMOVED WORD] thinking globally?

Username: Tibor Toth Torma Date Posted: 2008-03-06 16:09:27
Comment:
Thank you for helping to remove zedo, tacoda, yieldmanger and 207.net cookies. Great site!

How to remove NewFolder.exe Virus.

How to remove NewFolder.exe Virus.

Problem:
One of our readers reported about a virus in his pen drive,his drive is infected with Newfolder.exe virus. He has some very crucial data on the drive, so he cannot format the drive.

What is NewFolder.exe virus?
New Folder.exe virus disables task manager, disables registry editor, disables folder options, and disables run option from start menu. Virus creates exe files like the icon of folders with the same name as the name of the folder, it also consumes more than 50 % of your processor usage so slows down your computer.

Let’s see how we can remove this virus without formatting the drive.
Fix:
In order to remove the newfolder.exe virus you can use two types of tools, again there is a manual procedure also but the tools mentioned below are much better:

Tools to remove Newfolder.exe virus

Manual Method:
You need delete a file named svichossst.exe where ever you find this file on your system



Remove the following keys from registry

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
“@”=[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
“Yahoo Messengger”=

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
“Shell”=”Explorer.exe “

We hope at least one of the above method given above will help you fix the trouble.
Newfolder Virus removal tool by Albin
Download Andymanchesta`s Newfolder.exe virus removal tool (FREE)

What is Amburadul virus and how to remove amburadul

What is Amburadul virus and how to remove amburadul

how to remove amburadul virus for all varian no need for antivirus program. you can simply clean it using manual technique.
The simple way to know if your computer infected by this virus is you will see JPEG files with aplication extension. Now let’s start to remove it!

1. Unplug your infected computer from your network to stop this virus spreading.
2. Disable “System Restore” when in cleaning process.
3. Kill the virus process using power tools “currprocess” kill all process with icon JPG.



4. Repair your registry that already changed by the virus using this code:

[Version]
Signature=”$Chicago$”
Provider=Nobody

[DefaultInstall]
AddReg=UnhookRegKey
DelReg=del

[UnhookRegKey]
HKLM, Software\CLASSES\batfile\shell\open\command,,,”"”%1” %*”
HKLM, Software\CLASSES\comfile\shell\open\command,,,”"”%1” %*”
HKLM, Software\CLASSES\exefile\shell\open\command,,,”"”%1” %*”
HKLM, Software\CLASSES\piffile\shell\open\command,,,”"”%1” %*”
HKLM, Software\CLASSES\regfile\shell\open\command,,,”regedit.exe “%1”
HKLM, Software\CLASSES\scrfile\shell\open\command,,,”"”%1” %*”
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon, Shell,0, “Explorer.exe”
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\
Folder\HideFileExt, UncheckedValue,0×00010001,0

HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\
Folder\HideFileExt,CheckedValue,0×00010001,1

HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\
Folder\HideFileExt,DefaultValue,0×00010001,1

HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\
Folder\SuperHidden, UncheckedValue,0×00010001,1

HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\
Folder\SuperHidden, CheckedValue,0×00010001,0

HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\
Folder\SuperHidden, DefaultValue,0×00010001,0

HKCU, Software\Microsoft\Internet Explorer\Main, Start Page,0, “about:blank”
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\HideFileExt, type,0, “checkbox”

HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\SuperHidden, type,0, “checkbox”

HKCU, Control Panel\International, s1159,0, “AM”
HKCU, Control Panel\International, s2359,0, “PM”
HKLM, SYSTEM\ControlSet001\Control\SafeBoot, AlternateShell,0, “cmd.exe”
HKLM, SYSTEM\CurrentControlSet\Control\SafeBoot, AlternateShell,0, “cmd.exe”
HKCU, Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced, ShowSuperHidden,0×00010001,1
HKCU, Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced, SuperHidden,0×00010001,1
HKCU, Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced, HideFileExt,0×00010001,0

[del]
HKCU, Software\Microsoft\Internet Explorer\Main, Window Title,
HKLM, SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore, DisableConfig
HKLM, SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore, DisableSR
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SMP.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Britney Spears-CLN.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Britney Spears-RTP.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Britney Spears
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Britney Spears
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansav.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe,debugger
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Instal.exe, debugger
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Install.exe,debugger
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msiexec.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansavgd.exe
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegistryTools
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, NoFind
HKLM, SOFTWARE\Policies\Microsoft\Windows\Installer, DisableMSI
HKLM, SOFTWARE\Policies\Microsoft\Windows\Installer, LimitSystemRestoreCheckpointing
HKCR, exefile, NeverShowExt
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Run, PaRaY_VM
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Run, ConfigVir
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Run, NviDiaGT
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Run, NarmonVirusAnti
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Run, AVManager
HKLM, SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System, EnableLUA

5. Delete the master virus in %systemroot%\system32\~A~m~B~u~R~a~D~u~L~ before you do this you have to make hiden files become visible.
Then deleted this file list:

csrcc.exe
smss.exe
lsass.exe
services.exe
winlogon.exe
Paraysutki_VM_Community.sys
msvbvm60.dll
Drive:\Autorun.inf
Drive:\FoToKu xx-x-*.exe, where x show the date when virus active
Drive:\Friendster Community.exe
Drive:\J3MbataN K4HaYan.exe
Drive:\MyImages.exe
Drive:\PaLMa.exe
Drive:\Images

How to remove trojans that uses autorun.inf file

How to remove trojans that uses autorun.inf file

These trojans uses autorun.inf file for infects systems. Once infected with autorun.inf trojan your computer will display many popups, Internet Explorer start page can to be change, TaskManager and Registry editor can be disabled. Also autorun.inf trojan configures itself to run automatically every time, when you start your computer. In addition the autorun.inf trojan creates a files with strange names, some examples:

ampfrb.cmd, hbs.exe, yfog8p.exe, as.bat, phwe.com, o0s.cmd, xa2c.exe, AutoStart.exe, ncyrf.bat, rcukd.cmd, 2u.com, q.com, RavMon.exe, x6.bat, rqq2v.bat, t.com, xp19.com, x0.cmd, yg.cmd, ntde1ect.com, tio8×6.cmd, d6fagcs8.cmd, gbiehbsb.dll, tio8×6.cmd, fooool.exe, 8ng8w.com, x.com, xn1i9x.com, invwft2h.com, selamat_berposa_dari_umt.js, ktnquo.exe, NewVirusRemoval.vbs, kinza.exe, rs.cmd, yssjnngm.cmd, h3.bat, 6fnlpetp.exe, boot.exe, winde32.exe, 6j2j.com, kjibu.com, fun.xls.exe, iqe68o.bat, boot.exe, killVBS.vbs, autorun.pif, lin32.exe, USB.exe, RisinG.exe. f.bat, uxdeiect.com, awda2.exe, clshsy.cmd, kongxsg.exe, autorunme.exe, x2tpc.cmd, winconfig.dll.vbs, w1hva13.exe, jun.exe, xpbkh.com

The trojans may drastically slow the performance of your computer.
Step1: Remove autorun.inf files from all your drives, include any usb/flash drives.
1. Manually:

Reboot your PC in Safe mode.

1. Restart your computer
2. After hearing your computer beep once during startup, but before the Windows icon appears, press F8.
3. Instead of Windows loading as normal, a menu should appear
4. Select the first option, to run Windows in Safe Mode.

Click Start -> Run.
In the type box enter cmd and press Enter.
In the command console type del /a:h /f c:\autorun.*
Repeat previous step to all drives, make replacing “c” with the appropriate drive letter.
2. Automatically.

Download Flash_Disinfector by sUBs and save it to your desktop.
Double-click Flash_Disinfector.exe to run it and follow any prompts that may appear.
The utility may ask you to insert your flash drive and/or other removable drives including your mobile phone.
Please do so and allow the utility to clean up those drives as well.
Wait until it has finished scanning and then exit the program.
Reboot your computer when done.
Step 2: Remove autorun.inf trojan from the windows registry.
 

Download and install HijackThis.

Run HijackThis and scan, put a checkmark next to the following items (if exists):

F2 - REG:system.ini: Shell=Explorer.exe csrcs.exe
O4 - HKLM\..\Run: [SystemDrive] c:\windows\system32\SVCH0ST.EXE
O4 - HKCU\..\Run: [avp] C:\WINDOWS\system32\avp.exe
O4 - HKCU\..\Run: [amva] C:\WINDOWS\system32\amvo.exe
O4 - HKCU\..\Run: [kxva] C:\WINDOWS\system32\kxvo.exe
O4 - HKCU\..\Run: [kava] C:\WINDOWS\system32\kavo.exe
O4 - HKCU\..\Run: [tava] C:\WINDOWS\system32\tavo.exe
O4 - HKCU\..\Run: [TaskMonitor] C:\WINDOWS\system32\TaskMonitor.exe
O4 - HKCU\..\Run: [Realshade] C:\WINDOWS\system32\realshade.exe
O4 - HKCU\..\Run: [cftmonn] C:\WINDOWS\system32\cftmonn.exe
O4 - HKCU\..\Run: [kamsoft] C:\WINDOWS\system32\kamsoft.exe
O4 - HKCU\..\Run: [vamsoft] C:\WINDOWS\system32\vamsoft.exe
O4 - HKCU\..\Run: [kmmsoft] C:\WINDOWS\system32\revo.exe
O4 - HKCU\..\Run: [cdoosoft] C:\WINDOWS\system32\olhrwef.exe
O4 - HKCU\..\Run: [cbvcs] C:\WINDOWS\system32\urretnd.exe
O4 - HKCU\..\Run: [jvsoft] C:\WINDOWS\system32\j3ewro.exe
O4 - HKCU\..\Run: [ckvo] c:\windows\system32\ckvo.exe
O4 - HKLM\..\Run: [winconfig] C:\WINDOWS\winconfig.dll.vbs
O4 - HKLM\..\Policies\Explorer\Run: [csrcs] C:\WINDOWS\system32\csrcs.exe
O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
O7 - HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegedit=1

Now close all browser and other windows except for HijackThis, and click “Fix Checked” to have HijackThis fix the entries you checked.

Step 3: Remove autorun.inf trojans files.
Download Avenger from here and unzip to your desktop.
Run Avenger, copy,then paste the following text in Input script Box:



Files to delete:

c:\0jbnlnu8.exe
c:\1q8p0y.com
c:\2g.com
c:\39ysi89.com
c:\3jkka91.com
c:\6fnlpetp.exe
C:\6fnlpetp.exe
C:\6j2j.com
C:\8.bat
c:\80avp08.com
C:\8ng8w.com
c:\92j11sm.com
c:\a.exe
C:\a2h2.com
c:\ampfrb.cmd
c:\as.bat
c:\AutoRun\autorun.pif
c:\AutoRun\AutoStart.exe
c:\AutoRun\AutoStart.exe
c:\awda2.exe
c:\boot.exe
c:\cjrp8.com
c:\clshsy.cmd
C:\d6fagcs8.cmd
c:\dp.exe
C:\e.cmd
C:\fooool.exe
c:\fun.xls.exe
C:\gbiehbsb.dll
C:\gfqgq.cmd
c:\gumkrhf.bat
C:\gy.exe
c:\h3.bat
c:\hbs.exe
C:\ij.bat
C:\imo.exe
c:\invwft2h.com
c:\iqe68o.bat
c:\jg6w3yx.com
c:\killVBS.vbs
c:\kinza.exe
C:\kjibu.com
c:\ktnquo.exe
c:\MicrosoftPowerPoint.exe
c:\NewVirusRemoval.vbs
C:\ntde1ect.com
c:\ntnq.exe
c:\nw0t1l0d.exe
c:\o0s.cmd
c:\phwe.com
C:\pook.com
c:\q0rppr.exe
C:\rcukd.cmd
c:\resycled\boot.com
c:\RECYCLED\appmgmt.exe
C:\rqq2v.bat
c:\rs.cmd
C:\sq.com
c:\System\DriveGuard\DriveProtect.exe
C:\t.com
C:\tio8x6.cmd
c:\tj8odymw.exe
c:\uh31.exe
c:\usbcash.exe
C:\uvsqfgwd.cmd
c:\uxdeiect.com
c:\vnkucvv.com
c:\VirusCleaner.vbe
c:\VirusRemoval.vbs
c:\w1hva13.exe
C:\x0.cmd
c:\x2tpc.cmd
c:\xa2c.exe
C:\x.com
C:\x.cmd
C:\x2csvg.exe
C:\xih9.cmd
C:\xn1i9x.com
C:\xp19.com
c:\xpq63xl.exe
c:\xwpehlv.com
c:\yfog8p.exe
C:\yg.cmd
c:\yssjnngm.cmd
C:\w98.com
%Temp%\dwg3gngs.exe
%Temp%\kxvo.exe
%Temp%\new folder\ufjtre.exe
%Temp%\o2g.exe
%Temp%\ufjtre.exe
%Windir%\expiorer.exe
%windir%\system32\afmain0.dll
%Windir%\system32\amvo.exe
%Windir%\system32\avp.exe
%windir%\system32\avpo.exe
%Windir%\system32\Bitkv0.dll
%Windir%\system32\Bitkv1.dll
%Windir%\system32\cftmonn.exe
%Windir%\system32\ckvo0.dll
%Windir%\system32\ckvo.exe
%windir%\system32\expiorer.exe
%Windir%\system32\gasretyw0.dll
%Windir%\system32\gasretyw1.dll
%windir%\system32\haozs0.dll
%Windir%\system32\j3ewro.exe
%Windir%\system32\jwedsfdo0.dll
%Windir%\system32\kamsoft.exe
%Windir%\system32\kavo0.dll
%Windir%\system32\kavo1.dll
%Windir%\system32\kavo.exe
%Windir%\system32\kxvo.exe
%windir%\system32\locale.exe
%windir%\system32\nmdfgds1.dll
%windir%\system32\nmdfgds0.dll
%windir%\system32\olhrwef.exe
%Windir%\system32\RavMon.exe
%Windir%\system32\realshade.exe
%Windir%\system32\revo.exe
%Windir%\system32\SCVVHSOT.exe
%Windir%\system32\TaskMonitor.exe
%Windir%\system32\tavo0.dll
%Windir%\system32\tavo1.dll
%Windir%\system32\tavo.exe
%Windir%\system32\urretnd.exe
%Windir%\system32\vamsoft.exe
%Windir%\system32\vbsdfe0.dll
%Windir%\system32\vbsdfe1.dll
%Windir%\system32\wincab.sys
%Windir%\winconfig.dll.vbs

Then click on ‘Execute’.
Your computer will be reloaded.

Note: Flash_Disinfector will remove any autorun.inf files, create a hidden folder named autorun.inf in each partition and every USB drive plugged in when you ran it. Don’t delete this folder. It will help protect your drives from future infection.