DoDoor Adware

DoDoor virus description
Technical details:
Categories: Adware
DoDoor Aliases:
[Kaspersky]AdWare.Win32.AdMedia.g;
[Panda]Adware/Dodoor;
[Other]Adware.IEhlpr

DoDoor Folders:
[%PROGRAM_FILES%]\DoDoorRSSFinder

DoDoor Files:
[%COMMON_APPDATA%]\Microsoft\Crypto\bfnmgf.exe
[%PROGRAM_FILES%]\NetMeeting\conf.dll
[%PROGRAM_FILES%]\NetMeeting\netinit.dll
[%COMMON_APPDATA%]\Microsoft\Crypto\bfnmgf.exe
[%PROGRAM_FILES%]\NetMeeting\conf.dll
[%PROGRAM_FILES%]\NetMeeting\netinit.dll

DoDoor Registry Keys:
HKEY_CLASSES_ROOT\clsid\{8de0b272-74fa-1fd1-b7da-0ca0c9b348d6}
HKEY_CLASSES_ROOT\CLSID\{999ADFA2-8AD1-47FF-97FC-69FB847458F4}
HKEY_CLASSES_ROOT\clsid\{cc0d9597-a6c0-48e5-84fa-f59d2d23cf6d}
HKEY_CLASSES_ROOT\CLSID\{D424FE4E-CAF9-4FDD-BC5F-E6E6B91D53BF}
HKEY_CLASSES_ROOT\clsid\{e7009873-0d40-45b1-8d59-5b9ae98c7d38}
HKEY_CLASSES_ROOT\htmlparser.htmlanalyzer
HKEY_CLASSES_ROOT\htmlparser.htmlanalyzer.1
HKEY_CLASSES_ROOT\iefilter.fltsetup
HKEY_CLASSES_ROOT\iefilter.fltsetup.1
HKEY_CLASSES_ROOT\iefilter.htmlfilter
HKEY_CLASSES_ROOT\iefilter.htmlfilter.1
HKEY_CLASSES_ROOT\interface\{999adfa2-8ad1-47ff-97fc-69fb847458f4}
HKEY_CLASSES_ROOT\typelib\{71c66461-9b21-47e0-8b45-c3c649cd67f8}
HKEY_CLASSES_ROOT\typelib\{998cae99-eb35-4c8e-a30a-bc061ad826f5}
HKEY_CLASSES_ROOT\typelib\{d8783a61-0431-4f03-a143-0dd5d8db1703}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1D49D58D-5C84-4B50-8359-D9809BEB2B32}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{999ADFA2-8AD1-47FF-97FC-69FB847458F4}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D424FE4E-CAF9-4FDD-BC5F-E6E6B91D53BF}
HKEY_CLASSES_ROOT\activebandobject.activebho
HKEY_CLASSES_ROOT\activebandobject.activebho.1
HKEY_CLASSES_ROOT\clsid\{63c55a7f-6e29-8d4f-5c76-4f850f28d13a}
HKEY_CLASSES_ROOT\clsid\{999adfa2-8ad1-47ff-97fc-69fb847458f4}
HKEY_CLASSES_ROOT\clsid\{d424fe4e-caf9-4fdd-bc5f-e6e6b91d53bf}
HKEY_CLASSES_ROOT\clsid\{f5b3eced-9bf3-4f7e-882b-a6e75343c499}
HKEY_CLASSES_ROOT\interface\{ab6ec1fc-83b0-4ef2-a128-785bafc2a2b5}
HKEY_CLASSES_ROOT\interface\{d922591d-7893-412b-b801-c3b2f31be4c9}
HKEY_CLASSES_ROOT\typelib\{2f80a49b-9fa3-4fa0-a964-4689b0c1b30b}
HKEY_CLASSES_ROOT\typelib\{964ddeff-b16c-4113-8ff7-8e83b53c8ed8}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{1d49d58d-5c84-4b50-8359-d9809beb2b32}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{63c55a7f-6e29-8d4f-5c76-4f850f28d13a}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{721e6521-4cad-4a8d-a7f1-4e230b31ef19}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{999adfa2-8ad1-47ff-97fc-69fb847458f4}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{d424fe4e-caf9-4fdd-bc5f-e6e6b91d53bf}

DoDoor Registry Values:
HKEY_CLASSES_ROOT\clsid\{1d49d58d-5c84-4b50-8359-d9809beb2b32}\inprocserver32
HKEY_CLASSES_ROOT\clsid\{1d49d58d-5c84-4b50-8359-d9809beb2b32}\inprocserver32
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shell extensions\approved


DoDoor indications of infection

This symptoms of DoDoor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Random.Text DoS
TrojanDownloader.Win32.Tooncom Trojan Information
Removing Veritas Downloader
SillyDl.CUM Trojan Information
WebLookUp Adware Removal

Perfect.Keylogger.Lite Spyware

Perfect.Keylogger.Lite virus description
Technical details:
Categories: Spyware

Perfect.Keylogger.Lite Folders:
[%PROGRAM_FILES%]\perfect keylogger lite

Perfect.Keylogger.Lite Files:
[%WINDOWS%]\WinXp\bpk.chm
[%WINDOWS%]\WinXp\bpk.chm

Perfect.Keylogger.Lite Registry Values:
HKEY_CURRENT_USER\software\blazing tools\perfect keylogger\1.0
HKEY_LOCAL_MACHINE\software\blazing tools\perfect keylogger\1.0
HKEY_LOCAL_MACHINE\software\blazing tools\perfect keylogger\1.0
HKEY_LOCAL_MACHINE\software\blazing tools\perfect keylogger\1.0
HKEY_LOCAL_MACHINE\software\blazing tools\perfect keylogger\1.0
HKEY_CURRENT_USER\software\blazing tools\perfect keylogger\1.0
HKEY_CURRENT_USER\software\blazing tools\perfect keylogger\1.0
HKEY_LOCAL_MACHINE\software\blazing tools\perfect keylogger\1.0


Perfect.Keylogger.Lite indications of infection

This symptoms of Perfect.Keylogger.Lite detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Vxidl.BBE Trojan
Pigeon.AVFU Trojan Removal
Deception Trojan Symptoms
Removing Kalah Trojan
Remove unicast.com Tracking Cookie

Win32.VB.du Trojan

Win32.VB.du virus description
Technical details:
Categories: Trojan
Win32.VB.du Aliases:
[Panda]Trojan Horse.LC

Win32.VB.du indications of infection

This symptoms of Win32.VB.du detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AFO Trojan Symptoms
IRC.Logger Spyware Removal
VB.aoh Trojan Symptoms
Remote.MSN Backdoor Symptoms
Win32.Mimail Trojan Symptoms

WinPopup DoS

WinPopup virus description
Technical details:
Categories: DoS
WinPopup Aliases:
[Kaspersky]Flooder.Win32.Sevenc.b;
[Panda]Flooder Program

WinPopup indications of infection

This symptoms of WinPopup detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
popular.ru Tracking Cookie Symptoms
Delf.aeo Downloader Information
Removing HeyItsMe Trojan
WordMacro.Barbaro Trojan Symptoms
Removing Vxidl.AMJ Trojan

Small.akr Downloader

Small.akr virus description
Technical details:
Categories: Downloader

Small.akr indications of infection

This symptoms of Small.akr detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Cellfree Trojan Information
Win32.Small.me Trojan Removal instruction
Brocat Trojan Information
Pigeon.ARI Trojan Information
Tm.Logger Spyware Symptoms

Tm.Logger Spyware

Tm.Logger virus description
Technical details:
Categories: Spyware

Tm.Logger indications of infection

This symptoms of Tm.Logger detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AXX Trojan Removal instruction
Deception Trojan Symptoms
valueclick.net Tracking Cookie Information
V4.login Trojan Symptoms
Remove Skiks Trojan

Swizzor.bf Downloader

Swizzor.bf virus description
Technical details:
Categories: Downloader

Swizzor.bf indications of infection

This symptoms of Swizzor.bf detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.DAK Trojan Cleaner
Family.Key.Logger Spyware Information
Removing Delf.DZX Trojan
Duwende Trojan Symptoms
Neoturk Backdoor Cleaner

Duwende Trojan

Duwende virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Duwende Aliases:
[Kaspersky]Duwende.392,Duwende.431,MtE-based,SMEG.Duwende.2513,SMEG.Duwende.2514.b,SMEG.Duwende.2519,SMEG.Duwende.2533.a,SMEG.Duwende.2534.b,SMEG.Duwende.2539,TPE.Duwende.1848,TPE.Duwende.1849,TPE.Duwende.1852,TPE.Duwende.1871,TPE.Duwende.1872,TPE.Duwende.1904,TPE.Duwende.2130,TPE-based,Duwende.409.c,Duwende.409.d,Duwende.734.b;
[Panda]Duwende.1848,Duwende.1871,Duwende.1904,Duwende.2130,Duwende.393.B,Duwende.431,Duwende.431.A,Univ.A,Univ.AP.B,Duwende.392,Duwende.409,Duwende.410;
[Computer Associates]Duwende.409.A,SMEG.Duwende.2513

Duwende indications of infection

This symptoms of Duwende detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Clix0r.exe Trojan Removal instruction
Awoi Trojan Symptoms
JurikSoft.Remote.Control.Tools RAT Removal instruction
TAMAutoRun Trojan Information
Remove Augudor.Server Trojan

Bat.tg Trojan

Bat.tg virus description
Technical details:
Categories: Trojan
Bat.tg Aliases:
[McAfee]Bat/tg;
[F-Prot]destructive program;
[Panda]Trojan Horse.LC;
[Computer Associates]BAT.Nonstop.B,Bat/Lameness!Trojan

Bat.tg indications of infection

This symptoms of Bat.tg detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Way.Deat.Queen.Island RAT
Small.aph Downloader Removal instruction
Skiks Trojan Information
Backdoor.Konik Trojan Removal instruction
Remove W16.WinVir.dr Trojan

Benuti.D!downloader Trojan

Benuti.D!downloader virus description
Technical details:
Categories: Trojan

Benuti.D!downloader indications of infection

This symptoms of Benuti.D!downloader detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Slashes Trojan Removal
Coced Trojan Removal instruction
Averub Trojan Cleaner
SillyDl.CGI Trojan Symptoms
Downloader.AUE.dll Trojan Information

Tofger.HookDLL Trojan

Tofger.HookDLL virus description
Technical details:
Categories: Trojan,Backdoor
Tofger.HookDLL Aliases:
[Eset]Win32/Tonerok.B trojan;
[Computer Associates]Win32/Tofger.O.HookDLL.Trojan,Win32/Tofger.O.Trojan

Tofger.HookDLL indications of infection

This symptoms of Tofger.HookDLL detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Spy.KeyLogger Trojan Information
Phatbot Backdoor Removal
Sandradoor.Server Trojan Cleaner
Pigeon.EKS Trojan Symptoms
Win32.Septic Trojan Removal

WebDownloader.by Downloader

WebDownloader.by virus description
Technical details:
Categories: Downloader

WebDownloader.by indications of infection

This symptoms of WebDownloader.by detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HHH Trojan Removal instruction
WebLookUp Adware Cleaner
AsbMay Backdoor Removal instruction
Removing Bancos.ZZX Trojan
Pld Backdoor Cleaner

Golon Trojan

Golon virus description
Technical details:
Categories: Trojan

Golon indications of infection

This symptoms of Golon detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Securing.Low.End.Cisco.Routers DoS
Removing Wingate.Spoofing.On.IRC DoS
Remove RemoteSaucer Backdoor
Khooby Trojan Information
ClientMan.bho2 BHO Symptoms

Small.ia Downloader

Small.ia virus description
Technical details:
Categories: Downloader

Small.ia Files:
[%WINDOWS%]\system\ctadl2.dll
[%WINDOWS%]\system\ctadl2.dll


Small.ia indications of infection

This symptoms of Small.ia detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bancos.ZZR Trojan
CPUTief Trojan Removal
Scynaud Trojan Cleaner
Removing FakeAlert.TrojanFactory Trojan
Adware.WinAd Adware Removal

Xupiter.com Tracking Cookie

Xupiter.com virus description
Technical details:
Categories: Tracking Cookie

Xupiter.com indications of infection

This symptoms of Xupiter.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
XP.Antivirus Ransomware Symptoms
ICQ.Techniques.and.Methods Trojan Symptoms
Remove Web.Specials Adware
Sin.Static.Ip RAT Removal
Boys Trojan Cleaner

Bancos.IEW Trojan

Bancos.IEW virus description
Technical details:
Categories: Trojan

Bancos.IEW indications of infection

This symptoms of Bancos.IEW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
DTr Trojan Removal instruction
Backdoor.Phase Trojan Removal
valueclick.net Tracking Cookie Removal
SillyDl.CJR Trojan Cleaner
Delf.eg Trojan Removal

Randon Trojan

Randon virus description
Technical details:
Categories: Trojan

Randon indications of infection

This symptoms of Randon detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Win32.Spy.KeyLogger Trojan
Fatso.A Worm Cleaner
Remove ICQ.Techniques.and.Methods Trojan
Daemon Trojan Information
Vxidl.BEK Trojan Information

CmosKiller Trojan

CmosKiller virus description
Technical details:
Categories: Trojan
CmosKiller Aliases:
[Kaspersky]Trojan.DOS.Cmos24;
[McAfee]CMOS Reset;
[Panda]Trj/CmosKiller.d,Trojan Horse;
[Computer Associates]CmosKiller.D,Killcm.D!Trojan,CmosKiller!Trojan;
[Other]DOS/CmosKiller.E,CmosKill Trojan (1),Trojan:Win32/Cmos24

CmosKiller indications of infection

This symptoms of CmosKiller detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Nfstrace Trojan Removal instruction
Bancos.GGV Trojan Symptoms
QRabid.BTW Trojan Removal instruction
Bancos.HPQ Trojan Information
VB.eo Backdoor Information

Gotcha Trojan

Gotcha virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Gotcha Aliases:
[Kaspersky]Gotcha.627,Gotcha.628,Gotcha.605,Gotcha.607,Gotcha.906;
[Eset]Gotcha.881 virus,Gotcha.879 virus;
[McAfee]Gotcha;
[F-Prot]Gotcha.627.A;
[Panda]Gotcha B,Gotcha.627,Gotcha A2,Gotcha E.607,Gotcha.605,Gotcha.607,Gotcha Family,Gotcha.906;
[Computer Associates]Gotcha,Gotcha-D,MtE Pogue,Gotcha E,Gotcha C,Gotcha F

Gotcha indications of infection

This symptoms of Gotcha detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
FakeSub7!Spy!Trojan Trojan Removal instruction
XP.Antivirus Ransomware Information
Win32.Memleak Trojan Cleaner
TrojanDropper.Win32.Joiner Trojan Symptoms
SillyDl.DPA Trojan Removal

Grog.Noncemale Trojan

Grog.Noncemale virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Grog.Noncemale Aliases:
[Kaspersky]Grog.796;
[Panda]Grog.796

Grog.Noncemale indications of infection

This symptoms of Grog.Noncemale detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SilentSudokuInstaller Trojan Information
Bancos.HGE Trojan Removal
Removing VXPkg Trojan
Win32.DTR.Plugin Trojan Information
KillFiles.bx Trojan Symptoms

TSQL.Viroom Trojan

TSQL.Viroom virus description
Technical details:
Categories: Trojan
TSQL.Viroom Aliases:
[Panda]Univ.IS;
[Computer Associates]TSQL/Viroom.a

TSQL.Viroom indications of infection

This symptoms of TSQL.Viroom detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Sincom Trojan Removal instruction
Del Trojan Removal instruction
Pigeon.AVFK Trojan Cleaner
Remove SillyNuts Trojan
QRabid.BTW Trojan Symptoms

Funcade Adware

Funcade virus description
Technical details:
Categories: Adware
Funcade Aliases:
[Other]eXact.Funcade

Funcade Folders:
[%PROGRAM_FILES%]\Funcade

Funcade Files:
[%PROGRAMS%]\Funcade\Funcade.lnk
[%PROGRAMS%]\Funcade\Uninstall.lnk
[%PROGRAMS%]\Funcade\Funcade.lnk
[%PROGRAMS%]\Funcade\Uninstall.lnk

Funcade Registry Keys:
HKEY_LOCAL_MACHINE\software\exactadvertisingfuncade
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\exactadvertisingfuncade


Funcade indications of infection

This symptoms of Funcade detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HNE Trojan Removal
Efewe Trojan Symptoms
Bancos.GGV Trojan Removal
Delf.dy Backdoor Symptoms
Remove Bancos.GDB Trojan

Vxidl.AWX Trojan

Vxidl.AWX virus description
Technical details:
Categories: Trojan

Vxidl.AWX indications of infection

This symptoms of Vxidl.AWX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SillyNuts Trojan
Remove BO.BO Trojan
Adware.WinAd Adware Removal instruction
Spam.AnonMail Trojan Cleaner
Odysseus.Macro.Virus.Construction.Kit Trojan Removal