Progenic.Fake.Surfer RAT

Progenic.Fake.Surfer virus description
Technical details:
Categories: RAT

Progenic.Fake.Surfer indications of infection

This symptoms of Progenic.Fake.Surfer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Canasson Trojan Removal
Remove Doped Backdoor
Remove Bancos.HPZ Trojan
Removing topping.com.ua Tracking Cookie
Mxsender Trojan Symptoms

Zlob.ve Downloader

Zlob.ve virus description
Technical details:
Categories: Downloader

Zlob.ve indications of infection

This symptoms of Zlob.ve detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Bancos.GCI Trojan
Xupiter.com Tracking Cookie Information
IGMP.Tejanos DoS Removal instruction
Backwork Trojan Symptoms
Vxidl.AIZ Trojan Removal instruction

Stoolbar BHO

Stoolbar virus description
Technical details:
Categories: BHO

Stoolbar Registry Keys:
HKEY_CLASSES_ROOT\typelib\{0a5cf411-f0bf-4af8-a2a4-8233f3109bed}
HKEY_CLASSES_ROOT\typelib\{6a85d97d-665d-4825-8341-9501ad9f56a3}


Stoolbar indications of infection

This symptoms of Stoolbar detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Metal.Pro Backdoor
Popuppers Tracking Cookie Removal
Remove Pigeon.EQJ Trojan
Remove FakeAlert.TrojanFactory Trojan
unicast.com Tracking Cookie Removal instruction

Skull.Burrow.Connection.Bouncer Backdoor

Skull.Burrow.Connection.Bouncer virus description
Technical details:
Categories: Backdoor,Hacker Tool
Skull.Burrow.Connection.Bouncer Aliases:
[Kaspersky]Backdoor.Skubur.b,Backdoor.Skubur.f;
[McAfee]BackDoor-ARU.gen;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program;
[Computer Associates]Backdoor/Skubur.b!Server,Backdoor/Skubur.F!Server

Skull.Burrow.Connection.Bouncer indications of infection

This symptoms of Skull.Burrow.Connection.Bouncer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AHQ Trojan Symptoms
Remove Bancos.IFE Trojan
MediaLoads.Enhanced BHO Removal instruction
Removing VB5.Jerkins Trojan
Remove Lop.com.Active Spyware

statswhere.com Tracking Cookie

statswhere.com virus description
Technical details:
Categories: Tracking Cookie

statswhere.com indications of infection

This symptoms of statswhere.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AJU Trojan Removal
PSW.QQpass.aj Trojan Information
Removing Trident Trojan
Psycho.Derek Spyware Cleaner
Pigeon.EYX Trojan Information

Drunk.Mouse Trojan

Drunk.Mouse virus description
Technical details:
Categories: Trojan
Drunk.Mouse Aliases:
[Kaspersky]not-virus:Joke.Win32.MovingMouse

Drunk.Mouse Files:
[%PROGRAM_FILES%]\Adobe\Photoshop CS\Plug-Ins\DSB Flex\flux_license.txt
[%PROGRAM_FILES%]\eDonkey2000\incoming\Complete.NOKIA.Ringtone.and.logo.pack.madda.(osloskop.net).com\Complete NOKIA Ringtone and logo pack\21286 ringtones\RINGTONES\POLYPHONIC RINGTONES 1300+\EGYPTIAN.MID
[%PROGRAM_FILES%]\Macromedia\Dreamweaver 4\pc.mus
[%PROGRAM_FILES%]\Macromedia\Dreamweaver 4\PCNFO.EXE
[%PROGRAM_FILES%]\Adobe\Photoshop CS\Plug-Ins\DSB Flex\flux_license.txt
[%PROGRAM_FILES%]\eDonkey2000\incoming\Complete.NOKIA.Ringtone.and.logo.pack.madda.(osloskop.net).com\Complete NOKIA Ringtone and logo pack\21286 ringtones\RINGTONES\POLYPHONIC RINGTONES 1300+\EGYPTIAN.MID
[%PROGRAM_FILES%]\Macromedia\Dreamweaver 4\pc.mus
[%PROGRAM_FILES%]\Macromedia\Dreamweaver 4\PCNFO.EXE


Drunk.Mouse indications of infection

This symptoms of Drunk.Mouse detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Scpact Trojan Cleaner
Removing SpywareSheriff.com::SpywareSheriff Adware
Small.tf Trojan Symptoms
PSW.Belial Trojan Removal instruction
SillyDl.DOQ Downloader Symptoms

MediaLoads.Enhanced BHO

MediaLoads.Enhanced virus description
Technical details:
Categories: BHO

MediaLoads.Enhanced Folders:
[%PROGRAM_FILES%]\medialoads enhanced

MediaLoads.Enhanced Files:
[%PROGRAM_FILES%]\support software\ss2.dll
[%PROGRAM_FILES%]\support software\ss1.dll
[%PROGRAM_FILES%]\support software\ss2.dll
[%PROGRAM_FILES%]\support software\ss1.dll

MediaLoads.Enhanced Registry Keys:
HKEY_CLASSES_ROOT\clsid\{85a702ba-ea8f-4b83-aa07-07a5186acd7e}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{85a702ba-ea8f-4b83-aa07-07a5186acd7e}
HKEY_LOCAL_MACHINE\software\classes\clsid\{85a702ba-ea8f-4b83-aa07-07a5186acd7e}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{85a702ba-ea8f-4b83-aa07-07a5186acd7e}

MediaLoads.Enhanced Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\recommended hotfix - 421701d
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\recommended hotfix - 421701d
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]/downloaded program files/conflict.1/activeinstall2.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]/downloaded program files/conflict.1/activeinstall2.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]/downloaded program files/conflict.2/activeinstall2.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]/downloaded program files/conflict.2/activeinstall2.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\recommended hotfix - 421701d
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\recommended hotfix - 421701d


MediaLoads.Enhanced indications of infection

This symptoms of MediaLoads.Enhanced detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win.DelSys Trojan Symptoms
Removing Seek.Rep Trojan
Removing Antica Adware
Lookup.Chgrgs BHO Symptoms
ShenHua Trojan Symptoms

SubSeven.Java.Client RAT

SubSeven.Java.Client virus description
Technical details:
Categories: RAT

SubSeven.Java.Client indications of infection

This symptoms of SubSeven.Java.Client detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ZKeylog Spyware Cleaner
Win32.PWS.Bamer Trojan Removal instruction
Remove SillyDl.BBJ Trojan
Squatter Trojan Symptoms
Remove Pigeon.AVKZ Trojan

untd.com Tracking Cookie

untd.com virus description
Technical details:
Categories: Tracking Cookie

untd.com indications of infection

This symptoms of untd.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Gentee Adware Removal
Zlob.Fam.IntelVideoCodec Trojan Symptoms
ClientMan.bho2 BHO Removal
stockgroup.com Tracking Cookie Removal
Grog.Noncemale Trojan Cleaner

Small.jf Trojan

Small.jf virus description
Technical details:
Categories: Trojan,Downloader

Small.jf Files:
[%WINDOWS%]\dh.ini
[%WINDOWS%]\DHU.exe
[%WINDOWS%]\dh.dll
[%WINDOWS%]\dh.ini
[%WINDOWS%]\DHU.exe
[%WINDOWS%]\dh.dll

Small.jf Registry Keys:
HKEY_CLASSES_ROOT\clsid\{6001cdf7-6f45-471b-a203-0225615e35a7}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{6001cdf7-6f45-471b-a203-0225615e35a7}


Small.jf indications of infection

This symptoms of Small.jf detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SillyDl.DJL Trojan
Remove Delf.fl Trojan
Remove MailSpam.EmailBomb Hacker Tool
Small.tf Trojan Cleaner
ProfitZone Adware Cleaner

DIR.III Trojan

DIR.III virus description
Technical details:
Categories: Trojan
DIR.III Aliases:
[Kaspersky]Trojan.DirTree;
[Panda]Isra.58;
[Computer Associates]DIR_III_Trojan!Trojan

DIR.III indications of infection

This symptoms of DIR.III detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Efewe Trojan Removal
Win32.Indel DoS Information
SillyDl.DAV Trojan Symptoms
Bancos.FXV Trojan Symptoms
Remove Jodeitor RAT

Irapture Backdoor

Irapture virus description
Technical details:
Categories: Backdoor
Irapture Aliases:
[Computer Associates]Backdoor/Irapture.100.e

Irapture indications of infection

This symptoms of Irapture detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CDNHelper Adware Removal
Onap Trojan Information
Remove Qupdate Adware
Nip Trojan Removal
Pigeon.ELC Trojan Removal instruction

px24.com Tracking Cookie

This summary is not available. Please click here to view the post.

Klez Trojan

Klez virus description
Technical details:
Categories: Trojan,Worm

Klez indications of infection

This symptoms of Klez detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Systhread Trojan Cleaner
Jeemp Backdoor Removal instruction
Remove Bancos.GCI Trojan
Vxidl.AEH Trojan Information
Portfu Trojan Removal instruction

Tiul Backdoor

Tiul virus description
Technical details:
Categories: Backdoor

Tiul indications of infection

This symptoms of Tiul detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PSW.Jammer Trojan Cleaner
Removing JFHWLSQ Trojan
Removing NeverEnd Trojan
Kiss Trojan Information
Removing Vxidl.AMR Trojan

SillyDl.CHB Trojan

SillyDl.CHB virus description
Technical details:
Categories: Trojan

SillyDl.CHB indications of infection

This symptoms of SillyDl.CHB detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AYX Trojan Removal
NIGGER Trojan Removal instruction
CPUTief Trojan Information
Registry Backdoor Removal
Onap Trojan Symptoms

PtakksResur.Server Backdoor

PtakksResur.Server virus description
Technical details:
Categories: Backdoor,RAT
PtakksResur.Server Aliases:
[Computer Associates]Backdoor/PtakksResur.Server

PtakksResur.Server indications of infection

This symptoms of PtakksResur.Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ProfitZone Adware Information
SillyDl.BBZ Downloader Cleaner
Pigeon.BBD Trojan Removal
Bancos.GZO Trojan Information
Poltergeist.A!Backdoor Trojan Removal instruction

Win32.Piaoyes DoS

Win32.Piaoyes virus description
Technical details:
Categories: DoS
Win32.Piaoyes Aliases:
[Panda]Flooder/Piaoyes

Win32.Piaoyes indications of infection

This symptoms of Win32.Piaoyes detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HPZ Trojan Information
Removing Bancos.FVJ Trojan
Dosingle Trojan Cleaner
Remove Backdoor.Zombam Trojan
DSKlite Trojan Symptoms

Pigeon.AGU Trojan

Pigeon.AGU virus description
Technical details:
Categories: Trojan

Pigeon.AGU indications of infection

This symptoms of Pigeon.AGU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Nookl Trojan Removal instruction
Remove ICQ.Techniques.and.Methods Trojan
Astef (ReSpan) Worm Symptoms
Bridge Trojan Removal instruction
Xposure Backdoor Removal instruction

IGMP.Tejanos DoS

IGMP.Tejanos virus description
Technical details:
Categories: DoS
IGMP.Tejanos Aliases:
[Panda]DoS Program

IGMP.Tejanos indications of infection

This symptoms of IGMP.Tejanos detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CDNHelper Adware Information
Win32.Indel DoS Removal instruction
Swizzor.bf Downloader Cleaner
Popuppers Tracking Cookie Removal
Winsock DoS Symptoms

AZVPWS Trojan

AZVPWS virus description
Technical details:
Categories: Trojan
AZVPWS Aliases:
[Kaspersky]Trojan.Win32.VB.bju

AZVPWS indications of infection

This symptoms of AZVPWS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Small.akr Downloader Information
ValueAd Tracking Cookie Symptoms
Sweet.Heart Backdoor Information
Remove Bancos.GIW Trojan
Otto Trojan Symptoms