Clear.Search Hijacker

Clear.Search virus description
Technical details:
Categories: Hijacker

Clear.Search Folders:
[%PROGRAM_FILES%]\csbb

Clear.Search Registry Keys:
HKEY_LOCAL_MACHINE\software\ppcleanbait


Clear.Search indications of infection

This symptoms of Clear.Search detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HMX Trojan Cleaner
Riphosk Trojan Symptoms
FirstLook Spyware Cleaner
Remove Poltergeist.A!Backdoor Trojan
EZCyberSearch Adware Symptoms

Bancos.GQU Trojan

Bancos.GQU virus description
Technical details:
Categories: Trojan

Bancos.GQU indications of infection

This symptoms of Bancos.GQU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bancos.GKP Trojan
Perfect.Keylogger.Lite Spyware Removal
Small.DWC Downloader Symptoms
Remove Registry Backdoor
Parity Trojan Removal

Banbra.bi Trojan

Banbra.bi virus description
Technical details:
Categories: Trojan

Banbra.bi indications of infection

This symptoms of Banbra.bi detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
W16.WinVir.dr Trojan Removal
SillyDl.CHB Trojan Removal instruction
Portfu Trojan Removal
Carioca Trojan Cleaner
Removing Pigeon.AGU Trojan

SillyDl.CED Trojan

SillyDl.CED virus description
Technical details:
Categories: Trojan

SillyDl.CED indications of infection

This symptoms of SillyDl.CED detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HWA Trojan Removal instruction
Scpact Trojan Cleaner
FortuneCity.com Tracking Cookie Information
Remove Otto Trojan
Hackarmy.Server Trojan Information

Pigeon.AXV Trojan

Pigeon.AXV virus description
Technical details:
Categories: Trojan

Pigeon.AXV indications of infection

This symptoms of Pigeon.AXV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
DialXS Adware Removal instruction
Cuki Trojan Cleaner
valueclick.net Tracking Cookie Removal
Sality Trojan Symptoms
VB.eo Backdoor Symptoms

Win32.Spy.Das Trojan

Win32.Spy.Das virus description
Technical details:
Categories: Trojan,Spyware
Win32.Spy.Das Aliases:
[Eset]Win32/Spy.Das.A trojan

Win32.Spy.Das indications of infection

This symptoms of Win32.Spy.Das detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Spam.AnonMail Trojan
Bancos.HTU Trojan Removal instruction
BO.BO Trojan Symptoms
carrielynnesworld.com Tracking Cookie Removal instruction
MySocket Backdoor Removal instruction

Unknown.Toolbar5 BHO

Unknown.Toolbar5 virus description
Technical details:
Categories: BHO,Toolbar

Unknown.Toolbar5 Folders:
[%PROGRAM_FILES%]\browsechicregs
[%PROGRAM_FILES%]\onemap~1

Unknown.Toolbar5 Files:
[%PROGRAM_FILES%]\creati~1\close draw.exe
[%PROGRAM_FILES%]\creati~1\peak.exe
[%PROGRAM_FILES%]\meetdo~1\locksdog.exe
[%PROGRAM_FILES%]\userbi~1\link flaw.dll
[%PROGRAM_FILES%]\userbi~1\memo inter.bin
[%PROGRAM_FILES%]\creati~1\close draw.exe
[%PROGRAM_FILES%]\creati~1\peak.exe
[%PROGRAM_FILES%]\meetdo~1\locksdog.exe
[%PROGRAM_FILES%]\userbi~1\link flaw.dll
[%PROGRAM_FILES%]\userbi~1\memo inter.bin

Unknown.Toolbar5 Registry Keys:
HKEY_CLASSES_ROOT\clsid\{23abafbb-cea5-a0f1-7ba5-a710b7914263}
HKEY_CLASSES_ROOT\clsid\{38fb3e8c-0c50-0f82-c500-ed3f2d23adbb}
HKEY_CLASSES_ROOT\clsid\{982459f6-39b2-7390-05cd-6a68dc64916c}
HKEY_CLASSES_ROOT\clsid\{c08a5748-c2db-e419-425c-1d9726f6bac2}
HKEY_CLASSES_ROOT\clsid\{f8b7b4aa-2a4f-0064-3e7f-3e29df8c8937}
HKEY_LOCAL_MACHINE\software\classes\clsid\{23abafbb-cea5-a0f1-7ba5-a710b7914263}
HKEY_LOCAL_MACHINE\software\classes\clsid\{38fb3e8c-0c50-0f82-c500-ed3f2d23adbb}
HKEY_LOCAL_MACHINE\software\classes\clsid\{982459f6-39b2-7390-05cd-6a68dc64916c}
HKEY_LOCAL_MACHINE\software\classes\clsid\{c08a5748-c2db-e419-425c-1d9726f6bac2}
HKEY_LOCAL_MACHINE\software\classes\clsid\{f8b7b4aa-2a4f-0064-3e7f-3e29df8c8937}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{38fb3e8c-0c50-0f82-c500-ed3f2d23adbb}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{982459f6-39b2-7390-05cd-6a68dc64916c}

Unknown.Toolbar5 Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Unknown.Toolbar5 indications of infection

This symptoms of Unknown.Toolbar5 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Zonar Trojan Symptoms
CDNHelper Adware Removal
BootDr3 Trojan Removal
SillyDl.CGI Trojan Removal
Bancos.GOR Trojan Information

Bancos.HWA Trojan

Bancos.HWA virus description
Technical details:
Categories: Trojan

Bancos.HWA indications of infection

This symptoms of Bancos.HWA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AUU Trojan Symptoms
PC.Eyes Spyware Cleaner
SillyDl.CHB Trojan Removal instruction
Orpdea Trojan Information
Ducalbill Trojan Symptoms

Voronezh Trojan

Voronezh virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Voronezh Aliases:
[Kaspersky]Voronezh.600;
[Eset]Voronez.1600.A virus;
[Panda]Voronezh.1600.A.Dpr,USSR.600;
[Computer Associates]Voronezh,Voronezh 600

Voronezh indications of infection

This symptoms of Voronezh detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.ADE Trojan Information
SillyDl.DDX Trojan Cleaner
Bancos.FTY Trojan Cleaner
Win95.Tuil Trojan Information
Removing SillyDl.BBJ Trojan

KillProc Trojan

KillProc virus description
Technical details:
Categories: Trojan,Hacker Tool

KillProc indications of infection

This symptoms of KillProc detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
HHNicrop Trojan Removal instruction
Removing FakeSub7!Spy!Trojan Trojan
Cls Trojan Information
DIInfinity Trojan Cleaner
Removing Stealth.Eye.New.Cam.Viewer RAT

TrojanRunner.RSP.b!Trojan Trojan

TrojanRunner.RSP.b!Trojan virus description
Technical details:
Categories: Trojan,Backdoor

TrojanRunner.RSP.b!Trojan indications of infection

This symptoms of TrojanRunner.RSP.b!Trojan detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Director Adware
ANTIMAC Trojan Cleaner
Pigeon.AVMC Trojan Information
Daemon Trojan Information
Remove Xposure Backdoor

WordMacro.NJ.WMDLK1 Trojan

WordMacro.NJ.WMDLK1 virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
WordMacro.NJ.WMDLK1 Aliases:
[Panda]WM/MikEvelyn;
[Computer Associates]WordMacro/NJ-WMDLK1.O

WordMacro.NJ.WMDLK1 indications of infection

This symptoms of WordMacro.NJ.WMDLK1 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CGZ Trojan Cleaner
Removing Adware.WinAd Adware
Nip Trojan Removal instruction
Tofger.HookDLL Trojan Removal instruction
Maddle Trojan Symptoms

RC5 Trojan

RC5 virus description
Technical details:
Categories: Trojan

RC5 indications of infection

This symptoms of RC5 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GDB Trojan Cleaner
Vxidl.BEK Trojan Cleaner
Family.Key.Logger Spyware Cleaner
Judgement Trojan Cleaner
YBomber DoS Cleaner

WWW.HighTrafficAds.com Tracking Cookie

WWW.HighTrafficAds.com virus description
Technical details:
Categories: Tracking Cookie

WWW.HighTrafficAds.com indications of infection

This symptoms of WWW.HighTrafficAds.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Korsmox Trojan Information
Remove Win32.Small.me Trojan
NetNucleus BHO Symptoms
Remove Benuti.D!downloader Trojan
Removing Pigeon.AGU Trojan

Bancos.GCJ Trojan

Bancos.GCJ virus description
Technical details:
Categories: Trojan

Bancos.GCJ indications of infection

This symptoms of Bancos.GCJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.DieWar Trojan Symptoms
Removing Bancos.HIB Trojan
Vxidl.AWX Trojan Symptoms
PHP.Liquid Trojan Removal instruction
MalwarePro Ransomware Cleaner

PSW.WAOL Trojan

PSW.WAOL virus description
Technical details:
Categories: Trojan,Hacker Tool
PSW.WAOL Aliases:
[Eset]_MX trojan;
[Computer Associates]Win32.PSW.WAOL

PSW.WAOL indications of infection

This symptoms of PSW.WAOL detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Random.Text DoS
whitepages.com Tracking Cookie Symptoms
RHS RAT Removal
Removing Vxidl.BEK Trojan
Nomad Trojan Cleaner

Bancos.CBZ Trojan

Bancos.CBZ virus description
Technical details:
Categories: Trojan

Bancos.CBZ indications of infection

This symptoms of Bancos.CBZ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Awoi Trojan Removal instruction
Removing Safety Bar Trojan
Boys Trojan Removal
Judgement Trojan Removal instruction
Removing Bancos.DVN Trojan

BAT.Passion Trojan

BAT.Passion virus description
Technical details:
Categories: Trojan
BAT.Passion Aliases:
[Kaspersky]BAT.Passion.1354;
[Eset]BAT/WaveFunc.Passion.A virus;
[Panda]BAT/Passion.1345;
[Computer Associates]Passion

BAT.Passion indications of infection

This symptoms of BAT.Passion detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
AIM.Robber Trojan Cleaner
Removing Brocat Trojan
Agent.bq Trojan Symptoms
Removing CDNHelper Adware
Removing Del Trojan

Safety Bar Trojan

Safety Bar virus description
Technical details:
Categories: Trojan,Popups

Safety Bar Registry Keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\Safety Bar
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\SafetyBar
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\Safety Bar
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SafetyBar


Safety Bar indications of infection

This symptoms of Safety Bar detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MH Trojan Cleaner
Orconilo Downloader Information
Stardler Trojan Removal
Flobo.Server Trojan Cleaner
findthewebsiteyouneed.com Hijacker Symptoms

RCCL.BridgeTrack Tracking Cookie

RCCL.BridgeTrack virus description
Technical details:
Categories: Tracking Cookie

RCCL.BridgeTrack indications of infection

This symptoms of RCCL.BridgeTrack detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PHP.Pirus Trojan Symptoms
SillyDl.DAV Trojan Removal instruction
Remove Pigeon.EIV Trojan
VB.Troyen RAT Information
Bancos.FXV Trojan Symptoms

ringsworld.com Tracking Cookie

ringsworld.com virus description
Technical details:
Categories: Tracking Cookie

ringsworld.com indications of infection

This symptoms of ringsworld.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
scripps.com Tracking Cookie Cleaner
BQ Trojan Removal
PokaPoka Trojan Symptoms
Remove ShenHua Trojan
Removing PWS.Banker.gen.bu Trojan

Wesbnif Trojan

Wesbnif virus description
Technical details:
Categories: Trojan

Wesbnif indications of infection

This symptoms of Wesbnif detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bancos.GJW Trojan
Win32.Small.me Trojan Cleaner
streamen.com Tracking Cookie Removal instruction
GWGhost Trojan Removal instruction
ClientMan.2in1 BHO Removal instruction