DTr Trojan

DTr virus description
Technical details:
Categories: Trojan,Backdoor,RAT
DTr Aliases:
[Kaspersky]Backdoor.DTR.13.a,Backdoor.DTR.10.a,Backdoor.DTR.14.d,Backdoor.DTR.142.a,Backdoor.DTR.142.c,Backdoor.DTR.10.b,Backdoor.DTR.144.a,Backdoor.DTR.144.c,Backdoor.DTR.144.h,Backdoor.DTR.144.i,Backdoor.DTR.143,Backdoor.DTR.15.b,Backdoor.DTR.15.d,Backdoor.DTR.15.e,Backdoor.DTR.15.f,Backdoor.DTR.15.a,Backdoor.DTR.15.g,Backdoor.DTR.16.a;
[Eset]Win32/DTR.10 trojan,Win32/DTR.16 trojan,Win32/DTR.14.C trojan,Win32/DTR.144.I trojan;
[McAfee]BackDoor-WF,BackDoor-WF.svr;
[F-Prot]security risk or a "backdoor" program,destructive program,security risk named W32/DTR144.C,security risk named W32/DTR15.D,security risk named W32/DTR15.B,security risk named W32/DTR15.C,security risk named W32/DTR15.A;
[Panda]Backdoor Program,Backdoor Program.LC,Bck/Dtr,Bck/DTR.144.h,Trojan Horse,Bck/DTR.15,Bck/DTR.15.f;
[Computer Associates]Backdoor/Dtr.13,Backdoor/DTR.13.a,Win32.DTR.13,Backdoor/DTR.10,Win32.DTR.10,Backdoor/DTR.141!DLL,Backdoor/DTR.142.A,Win32.DTR.141,Win32.DTR.142,Win32/Dtr.142!Trojan,Backdoor/DTR.10.b!Server,Backdoor/DTR.144.a,Backdoor/DTR,Backdoor/DTR.1_4_4,Backdoor/DTR.1_44_I,Backdoor/Dtr.144,Backdoor/DTR.144.B!Server,Win32.DTR.144,Win32.DTR.144.B,Backdoor/DTR.143.DTrivDLL,Win32.DTR.143,Backdoor/DTR.1_5,Backdoor/DTR.15.b!Server,Backdoor/DTR.15.d!Server,Backdoor/DTR.15.e!Server,Backdoor/DTR.15!Server,Backdoor/DTR.15.A!Server,Backdoor/DTR.15F!Server,Backdoor/DTR.16!Server,Backdoor/DTR.141.B,Win32.DTR.141.B,Backdoor/DTR.144.i

DTr Files:
[%WINDOWS%]\system\dtriv.dat
[%WINDOWS%]\system\dtrivk.dll
[%WINDOWS%]\system\dtrv.dat
[%WINDOWS%]\system\dtrvk.dll
[%WINDOWS%]\system\nb003.exe
[%WINDOWS%]\system\nbsystem.exe
[%WINDOWS%]\system\dtriv.dat
[%WINDOWS%]\system\dtrivk.dll
[%WINDOWS%]\system\dtrv.dat
[%WINDOWS%]\system\dtrvk.dll
[%WINDOWS%]\system\nb003.exe
[%WINDOWS%]\system\nbsystem.exe

DTr Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shellserviceobjectdelayload


DTr indications of infection

This symptoms of DTr detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.ETO Trojan Information
PrankMaster Trojan Symptoms
Jodeitor RAT Removal instruction
PC.Eyes Spyware Information
Win32.Memleak Trojan Removal instruction

Rephyes Trojan

Rephyes virus description
Technical details:
Categories: Trojan

Rephyes indications of infection

This symptoms of Rephyes detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Doped Backdoor Removal instruction
CWS.IEFeads Hijacker Removal instruction
Removing Bancos.HAP Trojan
Backdoor.Konik Trojan Cleaner
XunLeiBHO Adware Removal instruction

Pigeon.APV Trojan

Pigeon.APV virus description
Technical details:
Categories: Trojan

Pigeon.APV indications of infection

This symptoms of Pigeon.APV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Hooker Trojan Cleaner
SillyDl.DPA Trojan Removal
Removing Win32.PWS.Radar Trojan
VB5.Jerkins Trojan Cleaner
Riphosk Trojan Information

APS Trojan

APS virus description
Technical details:
Categories: Trojan
APS Aliases:
[Panda]Trj/AOL.PS.IT,Trj/AOLPS.JQ;
[Computer Associates]APS.IT!Trojan,Win.APStrojan,APS.JQ!Trojan

APS indications of infection

This symptoms of APS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Eljefe Trojan Symptoms
FTPAttack Trojan Cleaner
ICQ.Locked Trojan Symptoms
PtakkS.resurrecion RAT Symptoms
Red.Hacker Trojan Cleaner

WordMacro.Barbaro Trojan

WordMacro.Barbaro virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
WordMacro.Barbaro Aliases:
[Panda]WM/Barbaro.A:It;
[Computer Associates]WordMacro/Barbaro.A

WordMacro.Barbaro indications of infection

This symptoms of WordMacro.Barbaro detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CGI Trojan Removal instruction
Zonar Trojan Symptoms
XunLeiBHO Adware Removal instruction
Win95.Tuil Trojan Symptoms
Remove XXX.ToolBar Trojan

Tiso Trojan

Tiso virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS

Tiso indications of infection

This symptoms of Tiso detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Microsoft.Media.Server.Denial.of.Service.Attack DoS Removal
Registry Backdoor Symptoms
ICQ.Techniques.and.Methods Trojan Removal instruction
Removing Pigeon.BBV Trojan
BAT.Ser Trojan Information

Findthewebsiteyouneed Tracking Cookie

Findthewebsiteyouneed virus description
Technical details:
Categories: Tracking Cookie

Findthewebsiteyouneed indications of infection

This symptoms of Findthewebsiteyouneed detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
XunLeiBHO Adware Removal instruction
CompuDaze DoS Symptoms
Remove Lemir.ci Trojan
PegaJoiner Trojan Information
Remove Banhosts Hijacker

CompuDaze DoS

CompuDaze virus description
Technical details:
Categories: DoS

CompuDaze indications of infection

This symptoms of CompuDaze detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VB5.Jerkins Trojan Information
Remove Stealth.Keyboard.Interceptor.Auto.Sender Spyware
Win32.NetDown Trojan Removal instruction
Remove Cuki Trojan
Remove Backfind Trojan

QRabid.BTW Trojan

QRabid.BTW virus description
Technical details:
Categories: Trojan
QRabid.BTW Aliases:
[McAfee]QRabid BTW;
[F-Prot]destructive program;
[Panda]Trj/Rabid.5610;
[Computer Associates]BTW_Rabid,Rabid.5610

QRabid.BTW indications of infection

This symptoms of QRabid.BTW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Awoi Trojan Removal instruction
Adware.Virtumundo Adware Information
Removing Pigeon.AVPK Trojan
V4.login Trojan Removal instruction
Stealth.Eye.New.Cam.Viewer RAT Cleaner

Family.Key.Logger Spyware

Family.Key.Logger virus description
Technical details:
Categories: Spyware,Backdoor
Family.Key.Logger Aliases:
[Kaspersky]Keylogger.Win32.HomeKeyLogger.170;
[Other]milyKeylogger

Family.Key.Logger Folders:
[%PROGRAMS%]\family keylogger
[%PROGRAM_FILES%]\familykeylogger
[%SYSTEM%]\ctf
[%PROGRAMS%]\family key logger

Family.Key.Logger Files:
[%PROFILE_TEMP%]\Temporary Directory 3 for familykeylogger.zip\FamilyKeyLogger-setup.exe
[%DESKTOP%]\family key logger.lnk
[%PROFILE_TEMP%]\Temporary Directory 3 for familykeylogger.zip\FamilyKeyLogger-setup.exe
[%DESKTOP%]\family key logger.lnk

Family.Key.Logger Registry Keys:
HKEY_LOCAL_MACHINE\software\kmint21\familykeylogger
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\familykeylogger
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\menuorder\start menu\programs\family keylogger

Family.Key.Logger Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Family.Key.Logger indications of infection

This symptoms of Family.Key.Logger detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Otto Trojan Removal
Removing KWM Trojan
Kiss Trojan Removal instruction
Hooker Trojan Symptoms
Remove AudioDoor Trojan

SillyDl.BCM Trojan

SillyDl.BCM virus description
Technical details:
Categories: Trojan

SillyDl.BCM indications of infection

This symptoms of SillyDl.BCM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Eljefe Trojan Cleaner
SurfAccuracy Adware Cleaner
ScreenGrab RAT Removal instruction
Hemlock Trojan Information
Registry Backdoor Removal instruction

SillyDl.DFR Trojan

SillyDl.DFR virus description
Technical details:
Categories: Trojan

SillyDl.DFR indications of infection

This symptoms of SillyDl.DFR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVKZ Trojan Information
Lowtoow Downloader Removal
Remove XCP.Sony.Rootkit.Patch Trojan
PegaJoiner Trojan Removal instruction
DSKlite Trojan Removal

DAS.Boot Trojan

DAS.Boot virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
DAS.Boot Aliases:
[Kaspersky]DasBoot.c,DasBoot.a,DasBoot.b;
[Eset]probably unknown TSR.COM.EXE.BOOT virus;
[Panda]DasBoot.A;
[Computer Associates]DAS_Boot,Das_Dropper!Dropper

DAS.Boot indications of infection

This symptoms of DAS.Boot detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
XXX.ToolBar Trojan Removal instruction
Remove Mich Trojan
Remove Small.aph Downloader
Lazy Trojan Removal instruction
Virus.Killer Trojan Cleaner

Bancos.GOR Trojan

Bancos.GOR virus description
Technical details:
Categories: Trojan

Bancos.GOR indications of infection

This symptoms of Bancos.GOR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Vxidl.BGN Trojan
Lowtoow Downloader Removal instruction
Lop.com.Active Spyware Cleaner
Removing AsbMay Backdoor
Removing BAT.Ser Trojan

Wnsock Trojan

This summary is not available. Please click here to view the post.

Twinouch Downloader

Twinouch virus description
Technical details:
Categories: Downloader
Twinouch Aliases:
[Kaspersky]Trojan-Downloader.Win32.Agent.buo;
[Other]TROJ_AGENT.MNJ

Twinouch Files:
[%APPDATA%]\WinTouch\WinTouch.exe
[%APPDATA%]\WinTouch\WTUninstaller.exe
[%INTERNET_CACHE%]\content.ie5\O6YE9ZAS\wtuninstaller.prod.v10007.12jul2007.exe[1].7debedc8315e1da50a742a6a0a5c161f
[%PROFILE_TEMP%]\uninstall.exe
[%APPDATA%]\WinTouch\WinTouch.exe
[%APPDATA%]\WinTouch\WTUninstaller.exe
[%INTERNET_CACHE%]\content.ie5\O6YE9ZAS\wtuninstaller.prod.v10007.12jul2007.exe[1].7debedc8315e1da50a742a6a0a5c161f
[%PROFILE_TEMP%]\uninstall.exe

Twinouch Registry Keys:
HKEY_CURRENT_USER\software\wintouch


Twinouch indications of infection

This symptoms of Twinouch detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Cottered Trojan Cleaner
InCommand.67b Backdoor Symptoms
NetKillx Backdoor Information
KWM Trojan Information
Webroot Trojan Cleaner

MH Trojan

MH virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
MH Aliases:
[Kaspersky]MH.757;
[Panda]Univ;
[Computer Associates]MH.757

MH indications of infection

This symptoms of MH detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.ARI Trojan Removal
EZCyberSearch Adware Symptoms
Cabronator.Kill.beta3 Backdoor Removal
Vxd.beep!Trojan Trojan Removal instruction
Hooker Trojan Removal instruction

Win32.LMR Trojan

Win32.LMR virus description
Technical details:
Categories: Trojan
Win32.LMR Aliases:
[Kaspersky]Backdoor.Lemerul.20;
[McAfee]BackDoor-AUP;
[F-Prot]security risk or a "backdoor" program

Win32.LMR indications of infection

This symptoms of Win32.LMR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
BackWindows RAT Information
Win32.Sincom Trojan Cleaner
Removing Pigeon.ACL Trojan
Removing Vxidl.AFO Trojan
Removing KBL.Webdownloader Downloader

VBS.Lospad Trojan

VBS.Lospad virus description
Technical details:
Categories: Trojan

VBS.Lospad indications of infection

This symptoms of VBS.Lospad detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Win32.CybWar DoS
Removing Bancos.GDB Trojan
The.History.of.Divine.Intervention Hacker Tool Information
FortuneCity.com Tracking Cookie Information
Remove Cabronator.Kill.beta3 Backdoor

MalwarePro Ransomware

MalwarePro virus description
Technical details:
Categories: Ransomware

MalwarePro Folders:
[%PROGRAMS%]\MalwarePro
[%PROGRAM_FILES%]\MalwarePro

MalwarePro Files:
[%DESKTOP%]\MalwarePro.lnk
[%WINDOWS%]\MalwarePro Setup Log.txt
[%WINDOWS%]\MalwarePro\uninstall.exe
[%DESKTOP%]\MalwarePro.lnk
[%WINDOWS%]\MalwarePro Setup Log.txt
[%WINDOWS%]\MalwarePro\uninstall.exe

MalwarePro Registry Keys:
HKEY_CURRENT_USER\software\mpmfc1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\malwarepro5.2

MalwarePro Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run


MalwarePro indications of infection

This symptoms of MalwarePro detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Hemlock Trojan
ICQ.Techniques.and.Methods Trojan Removal
Remove Bancos.GBI Trojan
Focalink.com Tracking Cookie Removal
Kiss Trojan Removal

FavoriteMan BHO

FavoriteMan virus description
Technical details:
Categories: BHO,Downloader
FavoriteMan Aliases:
[Kaspersky]TrojanDownloader.Win32.BHO;
[Panda]Adware/NetPals

FavoriteMan Files:
[%SYSTEM%]\ATPartners.dll
[%SYSTEM%]\favboot.dll
[%SYSTEM%]\favorite.dll
[%SYSTEM%]\mbr32.dll
[%SYSTEM%]\mpz300.dll
[%SYSTEM%]\emesx.dll
[%SYSTEM%]\f1.dll
[%SYSTEM%]\favman.dll
[%SYSTEM%]\gr02.dll
[%SYSTEM%]\lwz.dll
[%SYSTEM%]\n3tpa1p.dll
[%SYSTEM%]\ofrg.dll
[%SYSTEM%]\otw0i.dll
[%SYSTEM%]\sysldr.dll
[%WINDOWS%]\system\emesx.dll
[%WINDOWS%]\system\f1.dll
[%WINDOWS%]\system\favboot.dll
[%WINDOWS%]\system\favman.dll
[%WINDOWS%]\system\favorite.dll
[%WINDOWS%]\system\lwz.dll
[%WINDOWS%]\system\n3tpa1p.dll
[%WINDOWS%]\system\ofrg.dll
[%WINDOWS%]\system\sysldr.dll
[%SYSTEM%]\ATPartners.dll
[%SYSTEM%]\favboot.dll
[%SYSTEM%]\favorite.dll
[%SYSTEM%]\mbr32.dll
[%SYSTEM%]\mpz300.dll
[%SYSTEM%]\emesx.dll
[%SYSTEM%]\f1.dll
[%SYSTEM%]\favman.dll
[%SYSTEM%]\gr02.dll
[%SYSTEM%]\lwz.dll
[%SYSTEM%]\n3tpa1p.dll
[%SYSTEM%]\ofrg.dll
[%SYSTEM%]\otw0i.dll
[%SYSTEM%]\sysldr.dll
[%WINDOWS%]\system\emesx.dll
[%WINDOWS%]\system\f1.dll
[%WINDOWS%]\system\favboot.dll
[%WINDOWS%]\system\favman.dll
[%WINDOWS%]\system\favorite.dll
[%WINDOWS%]\system\lwz.dll
[%WINDOWS%]\system\n3tpa1p.dll
[%WINDOWS%]\system\ofrg.dll
[%WINDOWS%]\system\sysldr.dll

FavoriteMan Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{00000EF1-34E3-4633-87C6-1AA7A44296DA}
HKEY_CLASSES_ROOT\typelib\{ef100607-f409-426a-9e7c-cb211f2a9030}
HKEY_LOCAL_MACHINE\software\classes\clsid\{00000ef1-34e3-4633-87c6-1aa7a44296da}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00000EF1-34E3-4633-87C6-1AA7A44296DA}
HKEY_CLASSES_ROOT\clsid\{00000ef1-34e3-4633-87c6-1aa7a44296da}
HKEY_CLASSES_ROOT\clsid\{139d88e5-c372-469d-b4c5-1fe00852ab9b}
HKEY_CLASSES_ROOT\fone.organizer
HKEY_CLASSES_ROOT\fone.organizer.1
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{000000da-0786-4633-87c6-1aa7a4429ef1}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{00000ef1-0786-4633-87c6-1aa7a44296da}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{00000ef1-34e3-4633-87c6-1aa7a44296da}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{139d88e5-c372-469d-b4c5-1fe00852ab9b}
HKEY_CLASSES_ROOT\typelib\{00000ef1-34e3-4633-87c6-1aa7a44296da}
HKEY_CLASSES_ROOT\typelib\{ef100007-f409-426a-9e7c-cb211f2a9030}
HKEY_LOCAL_MACHINE\software\classes\clsid\{000000da-0786-4633-87c6-1aa7a4429ef1}
HKEY_LOCAL_MACHINE\software\classes\clsid\{139d88e5-c372-469d-b4c5-1fe00852ab9b}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{00000ef1-34e3-4633-87c6-1aa7a44296da}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{139d88e5-c372-469d-b4c5-1fe00852ab9b}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{b549456d-f5d0-4641-bced-8648a0c13d83}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\f1

FavoriteMan Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows
HKEY_CURRENT_USER\software\microsoft\windows
HKEY_CURRENT_USER\software\microsoft\windows
HKEY_CURRENT_USER\software\microsoft\windows
HKEY_CURRENT_USER\object
HKEY_CURRENT_USER\software\microsoft\windows
HKEY_CURRENT_USER\software\microsoft\windows


FavoriteMan indications of infection

This symptoms of FavoriteMan detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Adrem.Free.Remote.Console RAT Information
Bancos.ZZX Trojan Cleaner
Bancos.FTP Trojan Information
VB.eo Backdoor Removal instruction
ZKeylog Spyware Removal instruction

Astef (ReSpan) Worm

Astef (ReSpan) virus description
Technical details:
Categories: Worm

Astef (ReSpan) indications of infection

This symptoms of Astef (ReSpan) detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Bina Trojan
ScreenGrab RAT Removal instruction
SillyDl.CIX Trojan Symptoms
Maddle Trojan Cleaner
CDNHelper Adware Cleaner

Bancos.HCT Trojan

Bancos.HCT virus description
Technical details:
Categories: Trojan

Bancos.HCT indications of infection

This symptoms of Bancos.HCT detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CFY Trojan Cleaner
SillyDl.DMW Trojan Information
Removing Win95.Tuil Trojan
BookedSpace.Remanent BHO Symptoms
Jeemp Backdoor Cleaner

Zonar Trojan

Zonar virus description
Technical details:
Categories: Trojan

Zonar indications of infection

This symptoms of Zonar detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EKS Trojan Symptoms
Removing ClientMan.bho2 BHO
popular.ru Tracking Cookie Cleaner
Removing FTPAttack Trojan
Antica Adware Symptoms

Pigeon.AVTF Trojan

Pigeon.AVTF virus description
Technical details:
Categories: Trojan

Pigeon.AVTF indications of infection

This symptoms of Pigeon.AVTF detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.ETO Trojan Removal
Removing Securing.Low.End.Cisco.Routers DoS
Vxidl.AMJ Trojan Information
XunLeiBHO Adware Information
Antica Adware Cleaner

PtakkS.resurrecion RAT

PtakkS.resurrecion virus description
Technical details:
Categories: RAT

PtakkS.resurrecion indications of infection

This symptoms of PtakkS.resurrecion detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Banhosts Hijacker Symptoms
Bancos.HHH Trojan Cleaner
Fintlers Trojan Cleaner
Pigeon.EIV Trojan Removal instruction
Win32.PWS.Bamer Trojan Symptoms

Microsoft.Media.Server.Denial.of.Service.Attack DoS

Microsoft.Media.Server.Denial.of.Service.Attack virus description
Technical details:
Categories: DoS

Microsoft.Media.Server.Denial.of.Service.Attack indications of infection

This symptoms of Microsoft.Media.Server.Denial.of.Service.Attack detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AEH Trojan Removal
JS.Relink Trojan Information
Pigeon.AVPK Trojan Cleaner
Khooby Trojan Removal
Agent.dt Spyware Information

Virus.Killer Trojan

Virus.Killer virus description
Technical details:
Categories: Trojan
Virus.Killer Aliases:
[Kaspersky]Trojan-Downloader.Win32.Agent.bch;
[Other]Trojan-Downloader.Win32.Agent.bch,Adware.Webdesky

Virus.Killer indications of infection

This symptoms of Virus.Killer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Keyboard.Spectator.Lite Spyware Cleaner
Tfn2Kpass DoS Information
Khooby Trojan Removal instruction
Remove SubSeven.1C.Server Backdoor
Win32.Flooder.MailSpam.KagraTool DoS Removal

Remote.MSN Backdoor

Remote.MSN virus description
Technical details:
Categories: Backdoor,RAT
Remote.MSN Aliases:
[Kaspersky]Backdoor.VB.em;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program;
[Computer Associates]Backdoor/VB.em

Remote.MSN indications of infection

This symptoms of Remote.MSN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ICQSpam Trojan Information
Win32.Killav.bn Trojan Removal
Lowtoow Downloader Removal instruction
Awoi Trojan Removal instruction
ExPup Trojan Information

Lomdoor Backdoor

Lomdoor virus description
Technical details:
Categories: Backdoor

Lomdoor indications of infection

This symptoms of Lomdoor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing NetKillx Backdoor
Focalink.com Tracking Cookie Removal
Removing Pigeon.AXH Trojan
Removing Backdoor.Konik Trojan
Vxidl.AFO Trojan Removal

CDOpen Trojan

CDOpen virus description
Technical details:
Categories: Trojan
CDOpen Aliases:
[Eset]Win32/CD_open.C trojan;
[Panda]Trojan Horse.LC,Trojan Horse,Trj/W32.CD_open;
[Computer Associates]Win32/CDOpen!Trojan,Win32.CDOpen.B,Win32/WinCD!Trojan,Win32.CDOpen,Win32/CD-Open!Trojan

CDOpen indications of infection

This symptoms of CDOpen detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
EZCyberSearch Adware Removal
Remove Bancos.HAP Trojan
BAT.MicroMac Trojan Removal
Backdoor.Zombam Trojan Removal instruction
Removing FTPAttack Trojan

DialXS Adware

DialXS virus description
Technical details:
Categories: Adware

DialXS Registry Keys:
HKEY_CLASSES_ROOT\clsid\{841a9192-5690-11d4-a258-0040954a01be}
HKEY_CLASSES_ROOT\clsid\{9b4aa442-9ebf-11d5-8c11-0050da4957f5}


DialXS indications of infection

This symptoms of DialXS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Backdoor.Konik Trojan Information
Buddah.Cloner DoS Removal instruction
SillyDl.DPA Trojan Information
Bancos.ZZX Trojan Removal
Stardler Trojan Information

Registry Backdoor

Registry virus description
Technical details:
Categories: Backdoor,RAT

Registry indications of infection

This symptoms of Registry detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.VB.bs Trojan Removal
W16.WinVir.dr Trojan Information
CWS.IEFeads Hijacker Removal instruction
Remove Win32.Prosiak Trojan
SillyDl.DHF Trojan Removal instruction

Otto Trojan

Otto virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Otto Aliases:
[Panda]Otto6;
[Computer Associates]Otto 6

Otto indications of infection

This symptoms of Otto detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Vxidl.AEH Trojan
Director Adware Removal instruction
unicast.com Tracking Cookie Information
Basic.ICQ.Pager Trojan Symptoms
TFD DoS Removal

Vxidl.BGN Trojan

Vxidl.BGN virus description
Technical details:
Categories: Trojan

Vxidl.BGN indications of infection

This symptoms of Vxidl.BGN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Windows.Activity.Logging.Interface Spyware Removal
ValueAd Tracking Cookie Removal instruction
Remove Cuki Trojan
Lowtoow Downloader Removal
Removing Win32.Mediar Trojan