TrafficSector BHO

TrafficSector virus description
Technical details:
Categories: BHO,Adware

TrafficSector Files:
[%PROFILE_TEMP%]\aupd.exe
[%SYSTEM%]\cpmrotate.dll
[%PROFILE_TEMP%]\aupd.exe
[%SYSTEM%]\cpmrotate.dll

TrafficSector Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{BDD8121B-D4AE-4AC9-AD54-C8DC3F1155E6}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{BDD8121B-D4AE-4AC9-AD54-C8DC3F1155E6}


TrafficSector indications of infection

This symptoms of TrafficSector detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.ABG Trojan
Removing Tetrinet.txt DoS
Wolfcheat Trojan Symptoms
Nok.Nok Spyware Cleaner

Spy.System Trojan

Spy.System virus description
Technical details:
Categories: Trojan,Backdoor
Spy.System Aliases:
[Kaspersky]Backdoor.SpySystem.23,Win32.Lom;
[Panda]Backdoor Program,W32/Lom.A;
[Computer Associates]Win32.Lom,Win32/Wininit.C!Trojan

Spy.System indications of infection

This symptoms of Spy.System detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Cuebot Trojan Information
Masteseq.gen Backdoor Cleaner
Removing SillyDl.DFG Trojan
Remove Intended.Holzner Trojan

Mysden Trojan

Mysden virus description
Technical details:
Categories: Trojan

Mysden indications of infection

This symptoms of Mysden detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CGI.Bin Tracking Cookie Symptoms
Pigeon.AZM Trojan Information
Dol Trojan Removal instruction
Pigeon.AQT Trojan Removal instruction

Vxidl.ALK Trojan

Vxidl.ALK virus description
Technical details:
Categories: Trojan

Vxidl.ALK indications of infection

This symptoms of Vxidl.ALK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Colorer Trojan Removal instruction

SillyDl.CFN Trojan

SillyDl.CFN virus description
Technical details:
Categories: Trojan

SillyDl.CFN indications of infection

This symptoms of SillyDl.CFN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EDX Trojan Symptoms
Win32.LMR Trojan Information

avangard.dsl.ru Tracking Cookie

avangard.dsl.ru virus description
Technical details:
Categories: Tracking Cookie

avangard.dsl.ru indications of infection

This symptoms of avangard.dsl.ru detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ICQ.ToolzY2K DoS Information
AOL.Oscar Trojan Symptoms
Zimenok.Zender Trojan Cleaner
Remove MASM32 Trojan
Pigeon.AOG Trojan Removal

EliteMedia Adware

EliteMedia virus description
Technical details:
Categories: Adware

EliteMedia Files:
[%PROFILE_TEMP%]\ICD2.tmp\amm06.inf
[%PROFILE_TEMP%]\ICD2.tmp\amm06.ocx
[%PROFILE_TEMP%]\ICD3.tmp\amm06.inf
[%PROFILE_TEMP%]\ICD3.tmp\amm06.ocx
[%PROFILE_TEMP%]\ICD8.tmp\amm06.inf
[%PROFILE_TEMP%]\stdrun2.exe
[%PROGRAM_FILES_COMMON%]\elitemediagroupoinuninstaller.exe
[%PROGRAM_FILES_COMMON%]\EliteMediaGroupOinUninstaller.exe
[%SYSTEM%]\ObjSafe.tlb
[%SYSTEM%]\WinATS.dll
[%SYSTEM%]\Winwcd.dll
[%WINDOWS%]\109uninst.exe
[%WINDOWS%]\amm06.ocx
[%WINDOWS%]\elitemediagroup.ini
[%WINDOWS%]\elitepop06.exe
[%WINDOWS%]\eliteunstall.exe
[%WINDOWS%]\elpp100drop.exe
[%WINDOWS%]\em06z.ini
[%WINDOWS%]\hancerdoem.exe
[%WINDOWS%]\Help\nocontnt.GID
[%WINDOWS%]\Setup90.exe
[%WINDOWS%]\temp\backups\backup-20060602-131509-273.inf
[%WINDOWS%]\TIELT001.exe
[%WINDOWS%]\uni_7eh.exe
[%WINDOWS%]\yoinsi.exe
[%PROGRAM_FILES%]\common files\elitemediagroupoinuninstaller.exe
[%PROGRAM_FILES%]\elticons\chadppicon100.exe
[%SYSTEM%]\hpsw.exe
[%SYSTEM%]\nsf66.dll
[%SYSTEM%]\ts_www.exe
[%SYSTEM%]\ttve2eee.dll
[%SYSTEM%]\ttve2eee.sys
[%SYSTEM%]\w50779cf.dll
[%SYSTEM%]\wgse.exe
[%WINDOWS%]\1011_justin.exe
[%WINDOWS%]\elitemediapop.exe
[%WINDOWS%]\elite_media.exe
[%WINDOWS%]\justin2.exe
[%WINDOWS%]\Sos28.exe
[%WINDOWS%]\thiselt.exe
[%WINDOWS%]\titsvotf.exe
[%PROFILE_TEMP%]\ICD2.tmp\amm06.inf
[%PROFILE_TEMP%]\ICD2.tmp\amm06.ocx
[%PROFILE_TEMP%]\ICD3.tmp\amm06.inf
[%PROFILE_TEMP%]\ICD3.tmp\amm06.ocx
[%PROFILE_TEMP%]\ICD8.tmp\amm06.inf
[%PROFILE_TEMP%]\stdrun2.exe
[%PROGRAM_FILES_COMMON%]\elitemediagroupoinuninstaller.exe
[%PROGRAM_FILES_COMMON%]\EliteMediaGroupOinUninstaller.exe
[%SYSTEM%]\ObjSafe.tlb
[%SYSTEM%]\WinATS.dll
[%SYSTEM%]\Winwcd.dll
[%WINDOWS%]\109uninst.exe
[%WINDOWS%]\amm06.ocx
[%WINDOWS%]\elitemediagroup.ini
[%WINDOWS%]\elitepop06.exe
[%WINDOWS%]\eliteunstall.exe
[%WINDOWS%]\elpp100drop.exe
[%WINDOWS%]\em06z.ini
[%WINDOWS%]\hancerdoem.exe
[%WINDOWS%]\Help\nocontnt.GID
[%WINDOWS%]\Setup90.exe
[%WINDOWS%]\temp\backups\backup-20060602-131509-273.inf
[%WINDOWS%]\TIELT001.exe
[%WINDOWS%]\uni_7eh.exe
[%WINDOWS%]\yoinsi.exe
[%PROGRAM_FILES%]\common files\elitemediagroupoinuninstaller.exe
[%PROGRAM_FILES%]\elticons\chadppicon100.exe
[%SYSTEM%]\hpsw.exe
[%SYSTEM%]\nsf66.dll
[%SYSTEM%]\ts_www.exe
[%SYSTEM%]\ttve2eee.dll
[%SYSTEM%]\ttve2eee.sys
[%SYSTEM%]\w50779cf.dll
[%SYSTEM%]\wgse.exe
[%WINDOWS%]\1011_justin.exe
[%WINDOWS%]\elitemediapop.exe
[%WINDOWS%]\elite_media.exe
[%WINDOWS%]\justin2.exe
[%WINDOWS%]\Sos28.exe
[%WINDOWS%]\thiselt.exe
[%WINDOWS%]\titsvotf.exe

EliteMedia Registry Keys:
HKEY_CLASSES_ROOT\clsid\{5526b4c6-63d6-41a1-9783-0fabf529859a}
HKEY_CLASSES_ROOT\clsid\{e4c29fdc-f547-4219-acfd-571f2a7a564a}
HKEY_CLASSES_ROOT\interface\{49217364-e570-4f9d-9cd2-62eb4780b2ee}
HKEY_CLASSES_ROOT\interface\{597aa130-f00b-40b8-adaf-529d4da9be52}
HKEY_CLASSES_ROOT\interface\{7682c1a6-c500-4c78-93b9-5a76a91520f8}
HKEY_CLASSES_ROOT\interface\{ce76ac70-161f-4b37-ac96-53e314c7ff95}
HKEY_CLASSES_ROOT\interface\{fc4be248-2d1d-4271-8054-0385774b078c}
HKEY_CLASSES_ROOT\mm06ocx.mm06ocxf
HKEY_CLASSES_ROOT\typelib\{42298ff7-5dcd-4dff-825a-225eee6ff0c7}
HKEY_CLASSES_ROOT\typelib\{7ac21a02-5b24-47ae-9b0e-b05ae3a50fc4}
HKEY_CLASSES_ROOT\typelib\{d13decbb-52f8-4bf4-ba6c-b0cc603963c9}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{5526B4C6-63D6-41A1-9783-0FABF529859A}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{e4c29fdc-f547-4219-acfd-571f2a7a564a}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\c:\windows\system32\objsafe.tlb
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\c:\windows\system32\winwcd.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\elitemediagroupoin
HKEY_LOCAL_MACHINE\software\mm
HKEY_CLASSES_ROOT\clsid\{9ac54695-69a4-46f1-be10-10c74f9520d5}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{5526b4c6-63d6-41a1-9783-0fabf529859a}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{eec590d8-0a3c-4464-bb20-25a4747992f9}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%SYSTEM%]\objsafe.tlb
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%SYSTEM%]\winwcd.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]\downloaded program files\motorsix.ocx
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\elitemediagroup.net

EliteMedia Registry Values:
HKEY_LOCAL_MACHINE\software\em
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\elitemediagroup
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\elitemediagroup
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\internet settings\zonemap\domains\elitemediagroup.net
HKEY_LOCAL_MACHINE\software\em
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%SYSTEM%]/safe.tlb
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\elitemediagroup
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\elitemediagroup


EliteMedia indications of infection

This symptoms of EliteMedia detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Galorion Trojan
DuvxUpd Trojan Removal
For.Guest Trojan Removal instruction
MIRC.MircGirl Trojan Information
Tatss Adware Cleaner

Hupigeon Trojan

Hupigeon virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Hupigeon Aliases:
[Eset]Win32/Hupigon.A trojan;
[Computer Associates]Backdoor/Hupigeon.A!Server

Hupigeon indications of infection

This symptoms of Hupigeon detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
WDonn Trojan Removal instruction
GLB Trojan Removal

Bancos.HIH Trojan

Bancos.HIH virus description
Technical details:
Categories: Trojan

Bancos.HIH indications of infection

This symptoms of Bancos.HIH detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Alexmo Trojan
Phishbank.AML Trojan Symptoms
istats.pl Tracking Cookie Removal instruction
Pigeon.AUS Trojan Cleaner

April.1st Trojan

April.1st virus description
Technical details:
Categories: Trojan

April.1st indications of infection

This symptoms of April.1st detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SD.Bot Backdoor Removal
Download.Plugin Trojan Information
Remove Win32.VB.cr Trojan
LRS Trojan Removal instruction
PInsight Adware Symptoms

Agobot.hn Backdoor

Agobot.hn virus description
Technical details:
Categories: Backdoor

Agobot.hn indications of infection

This symptoms of Agobot.hn detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.DJM Trojan Cleaner
Tiner Trojan Removal

Pigeon.AVUZ Trojan

Pigeon.AVUZ virus description
Technical details:
Categories: Trojan

Pigeon.AVUZ indications of infection

This symptoms of Pigeon.AVUZ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vecny Trojan Cleaner

Felher Trojan

Felher virus description
Technical details:
Categories: Trojan
Felher Aliases:
[Other]Trojan.Win32/Felher.A

Felher indications of infection

This symptoms of Felher detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove TSUpdate Downloader
StartPage.ip Hijacker Information
IERedirector Ransomware Information
Wintrim.cj Downloader Removal instruction

Bowl Trojan

Bowl virus description
Technical details:
Categories: Trojan,Backdoor,RAT,Downloader
Bowl Aliases:
[Kaspersky]Backdoor.Bowl;
[Eset]Win32/Bowl trojan;
[McAfee]BackDoor-AJ;
[F-Prot]security risk or a "backdoor" program,W32/Bowl;
[Panda]Trj/W32.ShockRave;
[Computer Associates]Backdoor/Bowl,Backdoor/Bowl.B,Win32.Bowl.10

Bowl Files:
[%WINDOWS%]\netpopup.exe
[%WINDOWS%]\netpopup.exe


Bowl indications of infection

This symptoms of Bowl detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
JS.SelfExecHtml Spyware Cleaner
Pigeon.EVN Trojan Removal instruction
Agobot.ac Trojan Information

Let.Me.Rule!.beta Trojan

Let.Me.Rule!.beta virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Let.Me.Rule!.beta Aliases:
[Kaspersky]Backdoor.Lemerul.20.d,Backdoor.Lemerul.20.h,Backdoor.Lemerul.20.f,Backdoor.Lemerul.20.g;
[Eset]Win32/Lemerul.20.F trojan,Win32/Lemerul.20.D trojan;
[Panda]Backdoor Program.LC,Bck/LMR,Backdoor Program;
[Computer Associates]Win32/Lemerul.20.D!Trojan,Backdoor/Lemerul.20.g

Let.Me.Rule!.beta indications of infection

This symptoms of Let.Me.Rule!.beta detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CEP Trojan Removal

Win32.TrojanDownloader.IstBar.NAG Downloader

Win32.TrojanDownloader.IstBar.NAG virus description
Technical details:
Categories: Downloader
Win32.TrojanDownloader.IstBar.NAG Aliases:
[Kaspersky]TrojanDownloader.Win32.IstBar.gen

Win32.TrojanDownloader.IstBar.NAG Files:
[%PROFILE_TEMP%]\feghyef.exe
[%PROFILE_TEMP%]\furyags.exe
[%PROFILE_TEMP%]\feghyef.exe
[%PROFILE_TEMP%]\furyags.exe


Win32.TrojanDownloader.IstBar.NAG indications of infection

This symptoms of Win32.TrojanDownloader.IstBar.NAG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
W95.Rekoj Trojan Removal instruction
Remove Sepro Trojan
Remove Grinder Trojan

Pigeon.ACE Trojan

Pigeon.ACE virus description
Technical details:
Categories: Trojan

Pigeon.ACE indications of infection

This symptoms of Pigeon.ACE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Starimp Trojan Removal
mallcom.com Tracking Cookie Removal instruction
Remove SystemControl RAT
Removing SillyDl.CUB Trojan
Bancos.FTF Trojan Cleaner

Bancos.IAA Trojan

Bancos.IAA virus description
Technical details:
Categories: Trojan
Bancos.IAA Aliases:
[Other]Win32/Bancos.IAA,Mal/Behav-103

Bancos.IAA Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Bancos.IAA indications of infection

This symptoms of Bancos.IAA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
fusestats.com Tracking Cookie Removal
Bancos.HOS Trojan Information

Small.AMA Trojan

Small.AMA virus description
Technical details:
Categories: Trojan,Downloader

Small.AMA indications of infection

This symptoms of Small.AMA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.ABE Trojan Removal instruction
Remove Win9x.Reboot Trojan
Pigeon.AWJC Trojan Information
Fictional.Daemon RAT Removal instruction

MPC Trojan

MPC virus description
Technical details:
Categories: Trojan
MPC Aliases:
[Kaspersky]PS-MPC-based;
[Eset]Psmpc.478 virus;
[McAfee]MPC;
[F-Prot]PS-MPC.478;
[Panda]Univ;
[Computer Associates]PS 478

MPC indications of infection

This symptoms of MPC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Win.Blondie.joke Trojan
SillyDL.DCS Trojan Information
PSW.Lmir.ex Trojan Information

Woldfox Trojan

Woldfox virus description
Technical details:
Categories: Trojan
Woldfox Aliases:
[Other]Win32/Woldfox.D,W32/Smalltroj.BOFG

Woldfox Registry Keys:
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\msupdate


Woldfox indications of infection

This symptoms of Woldfox detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Rbot.aeu Worm Removal
Removing Win32.TrojanDownloader.Apropo Trojan
Pigeon.AVOC Trojan Information
Win95.Punch Trojan Symptoms

Vxidl.AQV Trojan

Vxidl.AQV virus description
Technical details:
Categories: Trojan

Vxidl.AQV indications of infection

This symptoms of Vxidl.AQV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win95.Coce2225 Trojan Information
Win32.TrojanDropper.Bridge Trojan Symptoms
IC.Manage RAT Removal instruction

Masterseq.Variant Trojan

Masterseq.Variant virus description
Technical details:
Categories: Trojan
Masterseq.Variant Aliases:
[Computer Associates]Win32/Masterseq.Variant!Trojan

Masterseq.Variant indications of infection

This symptoms of Masterseq.Variant detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Getit.cfg Trojan
Pigeon.EOP Trojan Information

Harvester.Server Trojan

Harvester.Server virus description
Technical details:
Categories: Trojan,Backdoor
Harvester.Server Aliases:
[Eset]Win32/Harvester.23.A trojan;
[Computer Associates]Backdoor/Harvester.23.Server

Harvester.Server indications of infection

This symptoms of Harvester.Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Mystic Trojan Information
BrowserAid.Startium BHO Symptoms
Vxidl.ACH Trojan Removal instruction

LanFiltrator.Server.fam Trojan

LanFiltrator.Server.fam virus description
Technical details:
Categories: Trojan,Backdoor
LanFiltrator.Server.fam Aliases:
[Panda]Bck/Lanfit.A;
[Computer Associates]Backdoor/LanFiltrator_Server_fam

LanFiltrator.Server.fam indications of infection

This symptoms of LanFiltrator.Server.fam detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CTK Trojan Removal instruction
Pigeon.EFC Trojan Removal instruction

Pigeon.AVIK Trojan

Pigeon.AVIK virus description
Technical details:
Categories: Trojan

Pigeon.AVIK indications of infection

This symptoms of Pigeon.AVIK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VxsKey Trojan Removal
Orion Trojan Removal instruction

Vxidl.AQB Trojan

Vxidl.AQB virus description
Technical details:
Categories: Trojan

Vxidl.AQB indications of infection

This symptoms of Vxidl.AQB detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanSpy.Win32.Zhangyan Trojan Removal
Backdoor.BO2K.plugin.Cast Trojan Cleaner
DeluxeCommunications Adware Removal
Remove Orce Trojan
Remove SillyDl.CBK Trojan

Bancos.HOB Trojan

Bancos.HOB virus description
Technical details:
Categories: Trojan

Bancos.HOB indications of infection

This symptoms of Bancos.HOB detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Zlob.Fam.VideoKeyCodec Trojan Removal
Pigeon.APR Trojan Information
SillyDl.CKT Trojan Information

Comforest Trojan

Comforest virus description
Technical details:
Categories: Trojan,Adware,Hijacker
Comforest Aliases:
[Kaspersky]Trojan.Win32.Delf.cn;
[Other]ComforestDial,comforest dialer,W32/Delf.TWV

Comforest Folders:
[%SYSTEM%]\Winsystemp

Comforest Files:
[%DESKTOP%]\Club del Vizio - Foto Video Calendari - VM18.lnk
[%PROGRAMS%]\Club del Vizio - Foto Video Calendari - VM18.lnk
[%SYSTEM%]\Winsystemas\fotoieri.EXE
[%WINDOWS%]\$hf_mig$\KB090545\semail.exe
[%WINDOWS%]\$hf_mig$\KB090545\semail.tpl
[%WINDOWS%]\$hf_mig$\KB090545\target.dat
[%DESKTOP%]\Club del Vizio - Foto Video Calendari - VM18.lnk
[%PROGRAMS%]\Club del Vizio - Foto Video Calendari - VM18.lnk
[%SYSTEM%]\Winsystemas\fotoieri.EXE
[%WINDOWS%]\$hf_mig$\KB090545\semail.exe
[%WINDOWS%]\$hf_mig$\KB090545\semail.tpl
[%WINDOWS%]\$hf_mig$\KB090545\target.dat

Comforest Registry Keys:
HKEY_CURRENT_USER\software\freeware\{491a5872-c30f-4e54-8ff1-bf31cc73dc4b}

Comforest Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\extensions\cmdmapping
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{1de8619d-8dd8-40ba-8a42-e1d12f119524}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{1de8619d-8dd8-40ba-8a42-e1d12f119524}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{1de8619d-8dd8-40ba-8a42-e1d12f119524}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{1de8619d-8dd8-40ba-8a42-e1d12f119524}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{1de8619d-8dd8-40ba-8a42-e1d12f119524}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{1de8619d-8dd8-40ba-8a42-e1d12f119524}


Comforest indications of infection

This symptoms of Comforest detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
WM.Checkf Trojan Information
MailSpam.HateYou Hacker Tool Removal
Win32.Spybotr Trojan Information
Win32.DKS Trojan Removal instruction
Remove Zasil Trojan

Nuke.Crow Trojan

Nuke.Crow virus description
Technical details:
Categories: Trojan,Hacker Tool
Nuke.Crow Aliases:
[Kaspersky]Nuker.Crow,Nuker.Win32.Miar.102;
[McAfee]Nuke-Crow,Nuke-Miar;
[F-Prot]destructive program,security risk or a "backdoor" program;
[Panda]Nuker/Miar.102,Trj/Crow;
[Computer Associates]Win/MircNuker!Trojan,Win32.Nuker.Crow,Win32/Nuker.Crow!PWS!Trojan

Nuke.Crow indications of infection

This symptoms of Nuke.Crow detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Track4.com Tracking Cookie
WinSoftWare Adware Symptoms
Vxidl.AUF Trojan Removal instruction
Bat.Guru Trojan Cleaner
Ehg.mccormick.hitbox Tracking Cookie Symptoms

Nuke.it Trojan

Nuke.it virus description
Technical details:
Categories: Trojan,Hacker Tool,DoS
Nuke.it Aliases:
[Kaspersky]Flooder.Win32.Daniel,Nuker.Nukit;
[McAfee]Nuke-Nukeit.gen;
[F-Prot]destructive program;
[Panda]Flooder Program,Trj/NukeIt;
[Computer Associates]Win32/NukeIt!Trojan

Nuke.it indications of infection

This symptoms of Nuke.it detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
LoudMarketing Adware Symptoms

naturaloceanart.com Tracking Cookie

naturaloceanart.com virus description
Technical details:
Categories: Tracking Cookie

naturaloceanart.com indications of infection

This symptoms of naturaloceanart.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pounder DoS Removal
Removing Win.Wormtroj Trojan
Vxidl.ASB Trojan Removal

ZeroDl Trojan

ZeroDl virus description
Technical details:
Categories: Trojan

ZeroDl indications of infection

This symptoms of ZeroDl detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Glu Trojan Symptoms
Remote.Denial.of.Service.for.CProxy.v3.Service.Pack DoS Removal instruction
ClearSearch.csie Hijacker Removal
Removing Pigeon.ESZ Trojan
Remove Transcout Backdoor

CTXPopup Adware

CTXPopup virus description
Technical details:
Categories: Adware

CTXPopup Files:
[%SYSTEM%]\ctxpopup.dll
[%SYSTEM%]\ctxpopup.dll

CTXPopup Registry Keys:
HKEY_CLASSES_ROOT\appid\ctxpopup.dll
HKEY_CLASSES_ROOT\appid\{3857b9cb-de72-4c97-9125-2dd460fb572a}
HKEY_CLASSES_ROOT\interface\{f461798e-c228-41d4-b6e4-01c3b158584b}
HKEY_CLASSES_ROOT\typelib\{3857b9cb-de72-4c97-9125-2dd460fb572a}
HKEY_CLASSES_ROOT\clsid\{5d647e9c-6b37-4636-9a78-dadb1eb93bdf}
HKEY_CLASSES_ROOT\ctxpopup.ieobject
HKEY_CLASSES_ROOT\ctxpopup.ieobject.1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{5d647e9c-6b37-4636-9a78-dadb1eb93bdf}


CTXPopup indications of infection

This symptoms of CTXPopup detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Friday.the.13th Trojan
Removing Darklord Trojan
Kitten.Free.Sex Adware Cleaner

Reporter Backdoor

Reporter virus description
Technical details:
Categories: Backdoor,RAT

Reporter indications of infection

This symptoms of Reporter detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Formicbot Trojan
CWS.Vrape Hijacker Information
Removing Win32.Messah Trojan

Sysad Backdoor

Sysad virus description
Technical details:
Categories: Backdoor

Sysad indications of infection

This symptoms of Sysad detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Agent.jt Downloader
Crystalys.Media Toolbar Removal
Removing SATAN Trojan
SillyDl.AWW Downloader Symptoms

PSW.Capwin Trojan

PSW.Capwin virus description
Technical details:
Categories: Trojan

PSW.Capwin indications of infection

This symptoms of PSW.Capwin detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Win32.PWS.Radar Trojan
Remove Stream2 DoS
Removing IRC.Nuking.in.Win95.Without.Trumpet.Winsock Hacker Tool

Moonpie.30b RAT

Moonpie.30b virus description
Technical details:
Categories: RAT

Moonpie.30b indications of infection

This symptoms of Moonpie.30b detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove VBS.Solow.C Worm
IRC.Kelebek Trojan Removal
AI Trojan Symptoms
Removing AVJM Trojan
Cvex3 Trojan Symptoms

SULFNBK Hoax

SULFNBK virus description
Technical details:
Categories: Hoax

SULFNBK indications of infection

This symptoms of SULFNBK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVSB Trojan Symptoms
Win32.WebDav Trojan Removal instruction
SillyDl.CVW Trojan Removal instruction
Remove AOL.Password.Stealing Trojan
Remove VB.mo Trojan

Skrat Trojan

Skrat virus description
Technical details:
Categories: Trojan

Skrat indications of infection

This symptoms of Skrat detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CUJ Trojan Removal instruction
Pigeon.EDV Trojan Removal instruction

Evil.AIM.SN.Maker Trojan

Evil.AIM.SN.Maker virus description
Technical details:
Categories: Trojan

Evil.AIM.SN.Maker indications of infection

This symptoms of Evil.AIM.SN.Maker detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SillyDl.DNU Trojan
Rotate Trojan Cleaner
Evil.Goar RAT Removal

RemoteExplorer2000 Trojan

RemoteExplorer2000 virus description
Technical details:
Categories: Trojan,Backdoor

RemoteExplorer2000 indications of infection

This symptoms of RemoteExplorer2000 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Delf.al Trojan Symptoms
Bancos.IHE Trojan Removal instruction
Bancos.GTA Trojan Symptoms
Pigeon.AMB Trojan Removal
BankAds.com Tracking Cookie Removal instruction

NetOp.Remote.Control RAT

NetOp.Remote.Control virus description
Technical details:
Categories: RAT

NetOp.Remote.Control indications of infection

This symptoms of NetOp.Remote.Control detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Dr.Modem Spyware Information
Remove QuestionMarket.com Tracking Cookie
Remove gold.stealer Trojan
Small.bug Downloader Information

OverSpy Spyware

OverSpy virus description
Technical details:
Categories: Spyware

OverSpy Folders:
[%COMMON_PROGRAMS%]\OverSpy
[%PROGRAMS%]\overspy
[%PROGRAM_FILES%]\overspy

OverSpy Files:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\OverSpy.lnk
[%DESKTOP%]\OverSpy.lnk
[%SYSTEM%]\sysprocs\overspy help.url
[%SYSTEM%]\sysprocs\overspy.exe
[%SYSTEM%]\sysprocs\overspy.url
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\OverSpy.lnk
[%DESKTOP%]\OverSpy.lnk
[%SYSTEM%]\sysprocs\overspy help.url
[%SYSTEM%]\sysprocs\overspy.exe
[%SYSTEM%]\sysprocs\overspy.url

OverSpy Registry Keys:
HKEY_CLASSES_ROOT\clsid\{0e9d1f65-6417-48e3-ac6f-81dc5f99be4e}
HKEY_CLASSES_ROOT\clsid\{a9d098f3-3fd5-3675-a210-58704085a191}
HKEY_CLASSES_ROOT\doublehook.tshellexecutehook
HKEY_CURRENT_USER\software\virtuoza\overspy
HKEY_LOCAL_MACHINE\software\microsoft\esent\process\overspy
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{ae40eba0-2d49-48c9-ba8d-e9f046240f5f}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{ae40eba0-2d49-48c9-ba8d-e9f046240f5f}}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\overspy_is1

OverSpy Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks


OverSpy indications of infection

This symptoms of OverSpy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SCN Toolbar
SoftWAR.ShadowThieft RAT Cleaner
April30 Trojan Symptoms

LowZones.cza Trojan

LowZones.cza virus description
Technical details:
Categories: Trojan

LowZones.cza Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\globo
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\globo
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


LowZones.cza indications of infection

This symptoms of LowZones.cza detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CurePCSolution Adware Cleaner
Easy.Keylogger Spyware Removal
Pigeon.AVHC Trojan Removal instruction
Delfil Trojan Cleaner
Remove Bayrob Trojan

MSN.Toolz Trojan

MSN.Toolz virus description
Technical details:
Categories: Trojan,DoS
MSN.Toolz Aliases:
[Kaspersky]Flooder.MSN.VB.o;
[Panda]Trojan Horse

MSN.Toolz indications of infection

This symptoms of MSN.Toolz detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.INL Trojan Information
Flgobar BHO Cleaner
Removing Zhong Adware

Blueang Trojan

Blueang virus description
Technical details:
Categories: Trojan

Blueang indications of infection

This symptoms of Blueang detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Aladino Trojan Removal instruction
Delf.jq Trojan Removal
Remove Trinoo Trojan

Pigeon.AVVR Trojan

Pigeon.AVVR virus description
Technical details:
Categories: Trojan

Pigeon.AVVR indications of infection

This symptoms of Pigeon.AVVR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Slavery Trojan
Remove EffectiveBar Adware
Remove LinkSponsor.com Tracking Cookie
PWS.Kcom Trojan Symptoms

tso.co.uk Tracking Cookie

tso.co.uk virus description
Technical details:
Categories: Tracking Cookie

tso.co.uk indications of infection

This symptoms of tso.co.uk detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Kampana Trojan Removal
UltraKeyboard Spyware Information
Vxidl.AZJ Trojan Information
WebSideStory.com Tracking Cookie Symptoms

Zenmaster Backdoor

Zenmaster virus description
Technical details:
Categories: Backdoor,RAT
Zenmaster Aliases:
[Kaspersky]Backdoor.Zenmaster.102;
[McAfee]BackDoor-ATZ;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Zenmaster.102;
[Computer Associates]Win32/NTHack!Trojan

Zenmaster indications of infection

This symptoms of Zenmaster detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.DBF Trojan Cleaner
Removing Downloader.AXI Downloader

GoHip Trojan

GoHip virus description
Technical details:
Categories: Trojan,Adware,Hijacker,Toolbar

GoHip Folders:
[%FAVORITES%]\apparel\baby clothes.url
[%PROGRAM_FILES%]\browserenh

GoHip Files:
[%COMMON_FAVORITES%]\links\movies.url
[%FAVORITES%]\autos\used cars.url
[%FAVORITES%]\computers\dell.url
[%FAVORITES%]\entertainment\music.url
[%FAVORITES%]\finance\insurance.url
[%FAVORITES%]\games\card games.url
[%FAVORITES%]\games\playstation.url
[%FAVORITES%]\games\video games.url
[%FAVORITES%]\links\chat.url
[%FAVORITES%]\links\games.url
[%FAVORITES%]\links\movies.url
[%FAVORITES%]\links\music.url
[%FAVORITES%]\links\shopping.url
[%FAVORITES%]\links\weight loss.url
[%FAVORITES%]\sports\basketball.url
[%FAVORITES%]\sports\fishing.url
[%FAVORITES%]\sports\football.url
[%FAVORITES%]\sports\hunting.url
[%FAVORITES%]\sports\nba.url
[%FAVORITES%]\sports\nfl.url
[%FAVORITES%]\sports\outdoor sports.url
[%FAVORITES%]\sports\water sports.url
[%FAVORITES%]\sports\winter sports.url
[%FAVORITES%]\travel\cruises.url
[%FAVORITES%]\apparel\footwear.url
[%FAVORITES%]\apparel\formal wear.url
[%FAVORITES%]\apparel\kids clothing.url
[%FAVORITES%]\apparel\lingerie.url
[%FAVORITES%]\apparel\mens apparel.url
[%FAVORITES%]\apparel\shoes.url
[%FAVORITES%]\apparel\sportswear.url
[%FAVORITES%]\apparel\swimsuits.url
[%FAVORITES%]\apparel\womens apparel.url
[%FAVORITES%]\autos\auto finance.url
[%FAVORITES%]\autos\buy a car.url
[%FAVORITES%]\autos\car accessories.url
[%FAVORITES%]\autos\car finance.url
[%FAVORITES%]\autos\car prices.url
[%FAVORITES%]\autos\car.url
[%FAVORITES%]\autos\luxury cars.url
[%FAVORITES%]\autos\new cars.url
[%FAVORITES%]\autos\trucks.url
[%FAVORITES%]\business\accounting.url
[%FAVORITES%]\business\business services.url
[%FAVORITES%]\business\business taxes.url
[%FAVORITES%]\business\ecommerce.url
[%FAVORITES%]\business\franchising.url
[%FAVORITES%]\business\home businesses.url
[%FAVORITES%]\business\merchant account.url
[%FAVORITES%]\business\office supplies.url
[%FAVORITES%]\business\small business.url
[%FAVORITES%]\business\storage.url
[%FAVORITES%]\casino\21.url
[%FAVORITES%]\casino\betting.url
[%FAVORITES%]\casino\blackjack.url
[%FAVORITES%]\casino\gambling.url
[%FAVORITES%]\casino\gaming.url
[%FAVORITES%]\casino\internet casino.url
[%FAVORITES%]\casino\online casino.url
[%FAVORITES%]\casino\paigow.url
[%FAVORITES%]\casino\sports betting.url
[%FAVORITES%]\casino\video poker.url
[%FAVORITES%]\communications\bandwidth.url
[%FAVORITES%]\communications\cable modems.url
[%FAVORITES%]\communications\cables.url
[%FAVORITES%]\communications\dsl.url
[%FAVORITES%]\communications\ethernet.url
[%FAVORITES%]\communications\intranet.url
[%FAVORITES%]\communications\isdn.url
[%FAVORITES%]\communications\mobile phones.url
[%FAVORITES%]\communications\modems.url
[%FAVORITES%]\communications\wireless.url
[%FAVORITES%]\computers\computer games.url
[%FAVORITES%]\computers\computer networking.url
[%FAVORITES%]\computers\cpu.url
[%FAVORITES%]\computers\gateway.url
[%FAVORITES%]\computers\hardware.url
[%FAVORITES%]\computers\programming.url
[%FAVORITES%]\computers\ram.url
[%FAVORITES%]\computers\software.url
[%FAVORITES%]\computers\web connection.url
[%FAVORITES%]\cool links\aerobics.url
[%FAVORITES%]\cool links\craps.url
[%FAVORITES%]\cool links\home businesses.url
[%FAVORITES%]\cool links\internet casino.url
[%FAVORITES%]\cool links\jewelry.url
[%FAVORITES%]\cool links\lingerie.url
[%FAVORITES%]\cool links\prozac.url
[%FAVORITES%]\cool links\ram.url
[%FAVORITES%]\cool links\top 20.url
[%FAVORITES%]\cool links\web design.url
[%FAVORITES%]\electronics\cellular.url
[%FAVORITES%]\electronics\cordless phones.url
[%FAVORITES%]\electronics\discount electronics.url
[%FAVORITES%]\electronics\dish networks.url
[%FAVORITES%]\electronics\pagers.url
[%FAVORITES%]\electronics\pcs.url
[%FAVORITES%]\electronics\phone cards.url
[%FAVORITES%]\electronics\printers.url
[%FAVORITES%]\electronics\projectors.url
[%FAVORITES%]\electronics\satellite tv.url
[%FAVORITES%]\entertainment\backstreet boys.url
[%FAVORITES%]\entertainment\cable tv.url
[%FAVORITES%]\entertainment\comic books.url
[%FAVORITES%]\entertainment\gambling.url
[%FAVORITES%]\entertainment\hobbies.url
[%FAVORITES%]\entertainment\mp3.url
[%FAVORITES%]\entertainment\radio.url
[%FAVORITES%]\entertainment\satellite tv.url
[%FAVORITES%]\entertainment\streaming.url
[%FAVORITES%]\finance\auto leasing.url
[%FAVORITES%]\finance\debt.url
[%FAVORITES%]\finance\fha.url
[%FAVORITES%]\finance\incorporation.url
[%FAVORITES%]\finance\insurance rates.url
[%FAVORITES%]\finance\loans.url
[%FAVORITES%]\finance\mortgages.url
[%FAVORITES%]\finance\small business.url
[%FAVORITES%]\finance\venture capital.url
[%FAVORITES%]\fitness\aerobics.url
[%FAVORITES%]\fitness\diet.url
[%FAVORITES%]\fitness\mens health.url
[%FAVORITES%]\fitness\nutrition.url
[%FAVORITES%]\fitness\stress.url
[%FAVORITES%]\fitness\vitamins.url
[%FAVORITES%]\fitness\weight loss.url
[%FAVORITES%]\fitness\weight training.url
[%FAVORITES%]\fitness\weightlifting.url
[%FAVORITES%]\fitness\womens health.url
[%FAVORITES%]\games\bingo.url
[%FAVORITES%]\games\board games.url
[%FAVORITES%]\games\casino.url
[%FAVORITES%]\games\chess.url
[%FAVORITES%]\games\dice.url
[%FAVORITES%]\games\online gambling.url
[%FAVORITES%]\games\trivia.url
[%FAVORITES%]\home\family.url
[%FAVORITES%]\home\gardening.url
[%FAVORITES%]\home\home buying.url
[%FAVORITES%]\home\home entertainment.url
[%FAVORITES%]\home\home improvement.url
[%FAVORITES%]\home\moving.url
[%FAVORITES%]\home\pets.url
[%FAVORITES%]\home\real estate agents.url
[%FAVORITES%]\home\renting.url
[%FAVORITES%]\home\storage.url
[%FAVORITES%]\insurance\auto insurance.url
[%FAVORITES%]\insurance\boat insurance.url
[%FAVORITES%]\insurance\business insurance.url
[%FAVORITES%]\insurance\car insurance.url
[%FAVORITES%]\insurance\health insurance.url
[%FAVORITES%]\insurance\home insurance.url
[%FAVORITES%]\insurance\insurance companies.url
[%FAVORITES%]\insurance\insurance rates.url
[%FAVORITES%]\insurance\life insurance.url
[%FAVORITES%]\insurance\term life insurance.url
[%FAVORITES%]\investing\bonds.url
[%FAVORITES%]\investing\commodities.url
[%FAVORITES%]\investing\day trading.url
[%FAVORITES%]\investing\exchange rates.url
[%FAVORITES%]\investing\financial services.url
[%FAVORITES%]\investing\nasdaq.url
[%FAVORITES%]\investing\online brokers.url
[%FAVORITES%]\investing\stock markets.url
[%FAVORITES%]\investing\stocks.url
[%FAVORITES%]\investing\trading.url
[%FAVORITES%]\links\gambling.url
[%FAVORITES%]\links\mp3.url
[%FAVORITES%]\links\mylinks\customize links.url
[%FAVORITES%]\links\mylinks\free hotmail.url
[%FAVORITES%]\links\mylinks\windows media.url
[%FAVORITES%]\links\mylinks\windows.url
[%FAVORITES%]\links\pets.url
[%FAVORITES%]\music\blues.url
[%FAVORITES%]\music\classical music.url
[%FAVORITES%]\music\disco.url
[%FAVORITES%]\music\gospel.url
[%FAVORITES%]\music\hard rock.url
[%FAVORITES%]\music\jazz.url
[%FAVORITES%]\music\latin music.url
[%FAVORITES%]\music\opera.url
[%FAVORITES%]\music\reggae.url
[%FAVORITES%]\personals\dating services.url
[%FAVORITES%]\personals\dating.url
[%FAVORITES%]\personals\divorce.url
[%FAVORITES%]\personals\flowers.url
[%FAVORITES%]\personals\online dating.url
[%FAVORITES%]\personals\personals.url
[%FAVORITES%]\personals\relationships.url
[%FAVORITES%]\personals\romance.url
[%FAVORITES%]\personals\singles.url
[%FAVORITES%]\personals\soulmate.url
[%FAVORITES%]\sports\hockey.url
[%FAVORITES%]\travel\bed and breakfast.url
[%FAVORITES%]\travel\family travel.url
[%FAVORITES%]\travel\trip planning.url
[%FAVORITES%]\travel\trips.url
[%FAVORITES%]\travel\us travel.url
[%FAVORITES%]\travel\world travel.url
[%STARTUP%]\windows startup.lnk
[%WINDOWS%]\start menu\programs\startup\windows startup.lnk
[%COMMON_FAVORITES%]\links\movies.url
[%FAVORITES%]\autos\used cars.url
[%FAVORITES%]\computers\dell.url
[%FAVORITES%]\entertainment\music.url
[%FAVORITES%]\finance\insurance.url
[%FAVORITES%]\games\card games.url
[%FAVORITES%]\games\playstation.url
[%FAVORITES%]\games\video games.url
[%FAVORITES%]\links\chat.url
[%FAVORITES%]\links\games.url
[%FAVORITES%]\links\movies.url
[%FAVORITES%]\links\music.url
[%FAVORITES%]\links\shopping.url
[%FAVORITES%]\links\weight loss.url
[%FAVORITES%]\sports\basketball.url
[%FAVORITES%]\sports\fishing.url
[%FAVORITES%]\sports\football.url
[%FAVORITES%]\sports\hunting.url
[%FAVORITES%]\sports\nba.url
[%FAVORITES%]\sports\nfl.url
[%FAVORITES%]\sports\outdoor sports.url
[%FAVORITES%]\sports\water sports.url
[%FAVORITES%]\sports\winter sports.url
[%FAVORITES%]\travel\cruises.url
[%FAVORITES%]\apparel\footwear.url
[%FAVORITES%]\apparel\formal wear.url
[%FAVORITES%]\apparel\kids clothing.url
[%FAVORITES%]\apparel\lingerie.url
[%FAVORITES%]\apparel\mens apparel.url
[%FAVORITES%]\apparel\shoes.url
[%FAVORITES%]\apparel\sportswear.url
[%FAVORITES%]\apparel\swimsuits.url
[%FAVORITES%]\apparel\womens apparel.url
[%FAVORITES%]\autos\auto finance.url
[%FAVORITES%]\autos\buy a car.url
[%FAVORITES%]\autos\car accessories.url
[%FAVORITES%]\autos\car finance.url
[%FAVORITES%]\autos\car prices.url
[%FAVORITES%]\autos\car.url
[%FAVORITES%]\autos\luxury cars.url
[%FAVORITES%]\autos\new cars.url
[%FAVORITES%]\autos\trucks.url
[%FAVORITES%]\business\accounting.url
[%FAVORITES%]\business\business services.url
[%FAVORITES%]\business\business taxes.url
[%FAVORITES%]\business\ecommerce.url
[%FAVORITES%]\business\franchising.url
[%FAVORITES%]\business\home businesses.url
[%FAVORITES%]\business\merchant account.url
[%FAVORITES%]\business\office supplies.url
[%FAVORITES%]\business\small business.url
[%FAVORITES%]\business\storage.url
[%FAVORITES%]\casino\21.url
[%FAVORITES%]\casino\betting.url
[%FAVORITES%]\casino\blackjack.url
[%FAVORITES%]\casino\gambling.url
[%FAVORITES%]\casino\gaming.url
[%FAVORITES%]\casino\internet casino.url
[%FAVORITES%]\casino\online casino.url
[%FAVORITES%]\casino\paigow.url
[%FAVORITES%]\casino\sports betting.url
[%FAVORITES%]\casino\video poker.url
[%FAVORITES%]\communications\bandwidth.url
[%FAVORITES%]\communications\cable modems.url
[%FAVORITES%]\communications\cables.url
[%FAVORITES%]\communications\dsl.url
[%FAVORITES%]\communications\ethernet.url
[%FAVORITES%]\communications\intranet.url
[%FAVORITES%]\communications\isdn.url
[%FAVORITES%]\communications\mobile phones.url
[%FAVORITES%]\communications\modems.url
[%FAVORITES%]\communications\wireless.url
[%FAVORITES%]\computers\computer games.url
[%FAVORITES%]\computers\computer networking.url
[%FAVORITES%]\computers\cpu.url
[%FAVORITES%]\computers\gateway.url
[%FAVORITES%]\computers\hardware.url
[%FAVORITES%]\computers\programming.url
[%FAVORITES%]\computers\ram.url
[%FAVORITES%]\computers\software.url
[%FAVORITES%]\computers\web connection.url
[%FAVORITES%]\cool links\aerobics.url
[%FAVORITES%]\cool links\craps.url
[%FAVORITES%]\cool links\home businesses.url
[%FAVORITES%]\cool links\internet casino.url
[%FAVORITES%]\cool links\jewelry.url
[%FAVORITES%]\cool links\lingerie.url
[%FAVORITES%]\cool links\prozac.url
[%FAVORITES%]\cool links\ram.url
[%FAVORITES%]\cool links\top 20.url
[%FAVORITES%]\cool links\web design.url
[%FAVORITES%]\electronics\cellular.url
[%FAVORITES%]\electronics\cordless phones.url
[%FAVORITES%]\electronics\discount electronics.url
[%FAVORITES%]\electronics\dish networks.url
[%FAVORITES%]\electronics\pagers.url
[%FAVORITES%]\electronics\pcs.url
[%FAVORITES%]\electronics\phone cards.url
[%FAVORITES%]\electronics\printers.url
[%FAVORITES%]\electronics\projectors.url
[%FAVORITES%]\electronics\satellite tv.url
[%FAVORITES%]\entertainment\backstreet boys.url
[%FAVORITES%]\entertainment\cable tv.url
[%FAVORITES%]\entertainment\comic books.url
[%FAVORITES%]\entertainment\gambling.url
[%FAVORITES%]\entertainment\hobbies.url
[%FAVORITES%]\entertainment\mp3.url
[%FAVORITES%]\entertainment\radio.url
[%FAVORITES%]\entertainment\satellite tv.url
[%FAVORITES%]\entertainment\streaming.url
[%FAVORITES%]\finance\auto leasing.url
[%FAVORITES%]\finance\debt.url
[%FAVORITES%]\finance\fha.url
[%FAVORITES%]\finance\incorporation.url
[%FAVORITES%]\finance\insurance rates.url
[%FAVORITES%]\finance\loans.url
[%FAVORITES%]\finance\mortgages.url
[%FAVORITES%]\finance\small business.url
[%FAVORITES%]\finance\venture capital.url
[%FAVORITES%]\fitness\aerobics.url
[%FAVORITES%]\fitness\diet.url
[%FAVORITES%]\fitness\mens health.url
[%FAVORITES%]\fitness\nutrition.url
[%FAVORITES%]\fitness\stress.url
[%FAVORITES%]\fitness\vitamins.url
[%FAVORITES%]\fitness\weight loss.url
[%FAVORITES%]\fitness\weight training.url
[%FAVORITES%]\fitness\weightlifting.url
[%FAVORITES%]\fitness\womens health.url
[%FAVORITES%]\games\bingo.url
[%FAVORITES%]\games\board games.url
[%FAVORITES%]\games\casino.url
[%FAVORITES%]\games\chess.url
[%FAVORITES%]\games\dice.url
[%FAVORITES%]\games\online gambling.url
[%FAVORITES%]\games\trivia.url
[%FAVORITES%]\home\family.url
[%FAVORITES%]\home\gardening.url
[%FAVORITES%]\home\home buying.url
[%FAVORITES%]\home\home entertainment.url
[%FAVORITES%]\home\home improvement.url
[%FAVORITES%]\home\moving.url
[%FAVORITES%]\home\pets.url
[%FAVORITES%]\home\real estate agents.url
[%FAVORITES%]\home\renting.url
[%FAVORITES%]\home\storage.url
[%FAVORITES%]\insurance\auto insurance.url
[%FAVORITES%]\insurance\boat insurance.url
[%FAVORITES%]\insurance\business insurance.url
[%FAVORITES%]\insurance\car insurance.url
[%FAVORITES%]\insurance\health insurance.url
[%FAVORITES%]\insurance\home insurance.url
[%FAVORITES%]\insurance\insurance companies.url
[%FAVORITES%]\insurance\insurance rates.url
[%FAVORITES%]\insurance\life insurance.url
[%FAVORITES%]\insurance\term life insurance.url
[%FAVORITES%]\investing\bonds.url
[%FAVORITES%]\investing\commodities.url
[%FAVORITES%]\investing\day trading.url
[%FAVORITES%]\investing\exchange rates.url
[%FAVORITES%]\investing\financial services.url
[%FAVORITES%]\investing\nasdaq.url
[%FAVORITES%]\investing\online brokers.url
[%FAVORITES%]\investing\stock markets.url
[%FAVORITES%]\investing\stocks.url
[%FAVORITES%]\investing\trading.url
[%FAVORITES%]\links\gambling.url
[%FAVORITES%]\links\mp3.url
[%FAVORITES%]\links\mylinks\customize links.url
[%FAVORITES%]\links\mylinks\free hotmail.url
[%FAVORITES%]\links\mylinks\windows media.url
[%FAVORITES%]\links\mylinks\windows.url
[%FAVORITES%]\links\pets.url
[%FAVORITES%]\music\blues.url
[%FAVORITES%]\music\classical music.url
[%FAVORITES%]\music\disco.url
[%FAVORITES%]\music\gospel.url
[%FAVORITES%]\music\hard rock.url
[%FAVORITES%]\music\jazz.url
[%FAVORITES%]\music\latin music.url
[%FAVORITES%]\music\opera.url
[%FAVORITES%]\music\reggae.url
[%FAVORITES%]\personals\dating services.url
[%FAVORITES%]\personals\dating.url
[%FAVORITES%]\personals\divorce.url
[%FAVORITES%]\personals\flowers.url
[%FAVORITES%]\personals\online dating.url
[%FAVORITES%]\personals\personals.url
[%FAVORITES%]\personals\relationships.url
[%FAVORITES%]\personals\romance.url
[%FAVORITES%]\personals\singles.url
[%FAVORITES%]\personals\soulmate.url
[%FAVORITES%]\sports\hockey.url
[%FAVORITES%]\travel\bed and breakfast.url
[%FAVORITES%]\travel\family travel.url
[%FAVORITES%]\travel\trip planning.url
[%FAVORITES%]\travel\trips.url
[%FAVORITES%]\travel\us travel.url
[%FAVORITES%]\travel\world travel.url
[%STARTUP%]\windows startup.lnk
[%WINDOWS%]\start menu\programs\startup\windows startup.lnk

GoHip Registry Keys:
HKEY_CLASSES_ROOT\clsid\{f17edbc0-3eb2-11d3-ab74-00a0c9a522f2}
HKEY_CURRENT_USER\software\browserenh
HKEY_CURRENT_USER\software\gohip
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{f17edbc0-3eb2-11d3-ab74-00a0c9a522f2}


GoHip indications of infection

This symptoms of GoHip detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AHJ Trojan Information
xiti.com Tracking Cookie Information
Remove Topwink Trojan
ezPorn Trojan Cleaner

Poor.Man Trojan

Poor.Man virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Poor.Man Aliases:
[Kaspersky]PoorMan.1168;
[Panda]Poor man

Poor.Man indications of infection

This symptoms of Poor.Man detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
DirectAds.McAfee Tracking Cookie Removal instruction
Removing Rightu Trojan
Pigeon.EZC Trojan Cleaner
Removing Donn Trojan