ChildWebGuardian Spyware

ChildWebGuardian virus description
Technical details:
Categories: Spyware

ChildWebGuardian Folders:
[%PROGRAM_FILES%]\ChildWebGuardian

ChildWebGuardian Files:
[%DESKTOP%]\ChildWebGuardian.lnk
[%DESKTOP%]\ChildWebGuardian.lnk

ChildWebGuardian Registry Keys:
HKEY_CLASSES_ROOT\clsid\{4a77b761-f91c-4a91-94a1-b638b146b6f9}
HKEY_CURRENT_USER\software\microsoft\internet explorer\extensions\cmdmapping\{2358e75b-a1f3-4d15-989d-b63a8d55dbfb}
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\ext\stats\{2358e75b-a1f3-4d15-989d-b63a8d55dbfb}
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\ext\stats\{4a77b761-f91c-4a91-94a1-b638b146b6f9}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\extensions\{2358e75b-a1f3-4d15-989d-b63a8d55dbfb}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{4a77b761-f91c-4a91-94a1-b638b146b6f9}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\childwebguardian_is1
HKEY_LOCAL_MACHINE\software\zecos software\childwebguardian

ChildWebGuardian Registry Values:
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list


ChildWebGuardian indications of infection

This symptoms of ChildWebGuardian detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Alpha RAT
PWS.Banker.gen.bu Trojan Symptoms
Sweet.Heart Backdoor Symptoms
Pigeon.APV Trojan Removal instruction
Removing Moonpie.10b Backdoor

LastDoor Backdoor

LastDoor virus description
Technical details:
Categories: Backdoor,RAT

LastDoor indications of infection

This symptoms of LastDoor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Backdoor.Zombam Trojan Information
ShenHua Trojan Removal instruction
Removing Lomdoor Backdoor
WAN.Remote Trojan Information
Bancos.HWA Trojan Symptoms

TrojanDropper.Win32.Delf.bn Trojan

TrojanDropper.Win32.Delf.bn virus description
Technical details:
Categories: Trojan
TrojanDropper.Win32.Delf.bn Aliases:
[Kaspersky]Trojan-Dropper.Win32.Delf.bn;
[Computer Associates]Win32.Ulysses.X,Win32/Ulysses.202.A!Backdoor

TrojanDropper.Win32.Delf.bn indications of infection

This symptoms of TrojanDropper.Win32.Delf.bn detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Judgement Trojan Removal
webpower.com Tracking Cookie Removal instruction
ClientMan.2in1 BHO Information
Poltergeist.A!Backdoor Trojan Removal
Removing Boys Trojan

Perfips!generic Trojan

Perfips!generic virus description
Technical details:
Categories: Trojan

Perfips!generic indications of infection

This symptoms of Perfips!generic detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Small.akr Downloader Removal
Scpact Trojan Information
Removing Poltergeist.A!Backdoor Trojan
One.beta RAT Symptoms
Remove Bancos.GCJ Trojan

Bluedit Trojan

Bluedit virus description
Technical details:
Categories: Trojan,Spyware
Bluedit Aliases:
[Kaspersky]Trojan-Downloader.Win32.VB.awk;
[McAfee]PWS-Bluedit;
[Other]Win32/Bluedit.C

Bluedit Files:
[%SYSTEM%]\IExplorer.dll .dbt
[%WINDOWS%]\NOTEDAD.EXE
[%SYSTEM%]\IExplorer.dll .dbt
[%WINDOWS%]\NOTEDAD.EXE

Bluedit Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\runservices
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices


Bluedit indications of infection

This symptoms of Bluedit detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
statswhere.com Tracking Cookie Cleaner
RemoteIsProgramRunning RAT Removal
Backdoor.Zombam Trojan Symptoms
Removing Win32.Mimail Trojan
Removing Zhongsou Adware

SillyDl.DAJ Trojan

SillyDl.DAJ virus description
Technical details:
Categories: Trojan

SillyDl.DAJ indications of infection

This symptoms of SillyDl.DAJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Win32.DieWar Trojan
SillyDl.DJP Trojan Cleaner
Dead.Locked DoS Removal
Small.aph Downloader Symptoms
EUX Backdoor Removal instruction

Timemark Trojan

Timemark virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Timemark Aliases:
[Kaspersky]Time.1046,Time.1067,Morse.1060;
[Panda]Univ,Morse.1060;
[Computer Associates]Timemark 1,Timemark 1076

Timemark indications of infection

This symptoms of Timemark detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
bulletads.com Tracking Cookie Cleaner
Bancos.FTP Trojan Information
Remove Small.dv Trojan
Kidda Adware Removal instruction
Mxsender Trojan Removal

IMI Trojan

IMI virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,Hacker Tool,DoS
IMI Aliases:
[Kaspersky]packed: PackLite,Win32.Mauz.a,Trojan.Win16.TaskKiller,Imi.1656,MadSatan.2304,Imi.1536.a,Imi.1536.c;
[Eset]Imi.1538 virus,Imi.1656 virus,Satanvir.3_06 virus;
[McAfee]IMI.1536,New Poly Win32,Univ/j;
[F-Prot]destructive program,IMI.1656,IMI.2304,IMI.1536.A,IMI.1536.C,IMI.1536.D,IMI.1536.E;
[Panda]Constructor/Word6Embedd.A,Trj/TaskKiller,Imi.1536.E,IMI.1656,IMI.2304,IMI.1536.a,IMI.1536.C,IMI.1536.D;
[Computer Associates]Imi-1536,IMI.1536.J,Imi-1538,PS-MPC,VB.TaskKiller!Trojan,IMI.1536.D,IMI.1656,IMI.2304

IMI indications of infection

This symptoms of IMI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Director Adware Removal
Vxidl.AUK Trojan Cleaner
Removing Not.casc Trojan
Bagle Trojan Cleaner
Telnet.Pro Backdoor Removal

TVGuide.com Tracking Cookie

TVGuide.com virus description
Technical details:
Categories: Tracking Cookie

TVGuide.com indications of infection

This symptoms of TVGuide.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PSW.Belial Trojan Information
strefa.pl Tracking Cookie Removal
Removing Bancos.IHA Trojan
Seek.Rep Trojan Cleaner
SillyDl.DAK Trojan Removal

Travelling.salesman Adware

Travelling.salesman virus description
Technical details:
Categories: Adware

Travelling.salesman indications of infection

This symptoms of Travelling.salesman detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VB.eo Backdoor Symptoms
Removing Shipper Backdoor
QB2C.Fly Trojan Removal instruction
Pigeon.FAR Trojan Removal instruction
SubSeven.Java.Client RAT Cleaner

Backdoor.Transistor Trojan

Backdoor.Transistor virus description
Technical details:
Categories: Trojan,Backdoor
Backdoor.Transistor Aliases:
[Kaspersky]Backdoor.Transistor.12.a;
[Eset]Win32/Transistor.12.A trojan

Backdoor.Transistor indications of infection

This symptoms of Backdoor.Transistor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
KBL.Webdownloader Downloader Cleaner
XY7.Project Trojan Information
Bancos.HOW Trojan Cleaner
SillyDl.CBK Trojan Information
PokaPoka Trojan Removal

CoreServer Backdoor

CoreServer virus description
Technical details:
Categories: Backdoor,RAT
CoreServer Aliases:
[Kaspersky]Backdoor.Coredoor;
[McAfee]BackDoor-AIW;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program

CoreServer indications of infection

This symptoms of CoreServer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Canasson Trojan Removal
Removing SilentSudokuInstaller Trojan
Remove EvilSocks Backdoor
Efewe Trojan Removal
Removing Small.dv Trojan

Spastic Trojan

Spastic virus description
Technical details:
Categories: Trojan,DoS
Spastic Aliases:
[Panda]DoS/Nenet.A,Trojan Horse;
[Computer Associates]Win32/Spastic!Flooder!Trojan

Spastic indications of infection

This symptoms of Spastic detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
JFHWLSQ Trojan Cleaner
IstBar.az Downloader Information
Remove Poltergeist.A!Backdoor Trojan
Removing Pigeon.AGU Trojan
Bancos.IBJ Trojan Removal instruction

Pigeon.AVGU Trojan

Pigeon.AVGU virus description
Technical details:
Categories: Trojan

Pigeon.AVGU indications of infection

This symptoms of Pigeon.AVGU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.FTP Trojan Symptoms
Removing Hooker Trojan
Bancos.GYN Trojan Removal instruction
Winsock DoS Removal instruction
Bancos.GGV Trojan Removal instruction

SillyDl.CQP Trojan

SillyDl.CQP virus description
Technical details:
Categories: Trojan

SillyDl.CQP indications of infection

This symptoms of SillyDl.CQP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Sandradoor.Server Trojan Symptoms
Removing KWM Trojan
Safety Bar Trojan Removal instruction
Win32.Uhil Trojan Symptoms
Tm.Logger Spyware Information

BrowserAid Adware

BrowserAid virus description
Technical details:
Categories: Adware,BHO,Hijacker,Toolbar,Malware

BrowserAid Folders:
[%APPDATA%]\browser pal
[%PROGRAM_FILES%]\browser pal
[%PROGRAM_FILES%]\letssearch

BrowserAid Files:
[%SYSTEM%]\e6f1873b.dll
[%SYSTEM%]\stlb2.xml
[%SYSTEM%]\broweraidtoolbar.dll
[%SYSTEM%]\highlighthelper.dll
[%SYSTEM%]\quicklaunchie.dll
[%SYSTEM%]\rsstoolbar.dll
[%WINDOWS%]\downloaded program files\bbarwnd.dll
[%WINDOWS%]\downloaded program files\conflict.1\letssearch.exe
[%WINDOWS%]\downloaded program files\letssearch.exe
[%WINDOWS%]\downloaded program files\letssearchie.dll
[%WINDOWS%]\downloaded program files\lstoolbarconfig.inf
[%WINDOWS%]\system\broweraidtoolbar.dll
[%WINDOWS%]\system\highlighthelper.dll
[%WINDOWS%]\system\rsstoolbar.dll
[%SYSTEM%]\e6f1873b.dll
[%SYSTEM%]\stlb2.xml
[%SYSTEM%]\broweraidtoolbar.dll
[%SYSTEM%]\highlighthelper.dll
[%SYSTEM%]\quicklaunchie.dll
[%SYSTEM%]\rsstoolbar.dll
[%WINDOWS%]\downloaded program files\bbarwnd.dll
[%WINDOWS%]\downloaded program files\conflict.1\letssearch.exe
[%WINDOWS%]\downloaded program files\letssearch.exe
[%WINDOWS%]\downloaded program files\letssearchie.dll
[%WINDOWS%]\downloaded program files\lstoolbarconfig.inf
[%WINDOWS%]\system\broweraidtoolbar.dll
[%WINDOWS%]\system\highlighthelper.dll
[%WINDOWS%]\system\rsstoolbar.dll

BrowserAid Registry Keys:
HKEY_CLASSES_ROOT\AppID\My404.DLL
HKEY_CLASSES_ROOT\AppID\{418B46A9-5343-4E1A-A654-42B04E3F869E}
HKEY_CLASSES_ROOT\AppID\{87690003-2714-45E7-8A1B-DC0658DE778C}
HKEY_CLASSES_ROOT\bho.FResultsRequest
HKEY_CLASSES_ROOT\bho.FResultsRequest.1
HKEY_CLASSES_ROOT\bho.FResultsRequestDispatcher
HKEY_CLASSES_ROOT\bho.FResultsRequestDispatcher.1
HKEY_CLASSES_ROOT\CLSID\{12EE7A5E-0674-42f9-A76B-000000004D00}
HKEY_CLASSES_ROOT\CLSID\{606220AE-90E0-41CA-BF6D-C89272ED680C}
HKEY_CLASSES_ROOT\CLSID\{DBD7AAA2-1725-4663-8C8B-52A840693469}
HKEY_CLASSES_ROOT\CLSID\{E004800A-73C6-4587-B855-98D0CE0C16B1}
HKEY_CLASSES_ROOT\Interface\{4B0FCEB7-8163-46EE-9EAF-85BD933D0A46}
HKEY_CLASSES_ROOT\Interface\{670801FD-C247-4E44-9424-69E5D77C6725}
HKEY_CLASSES_ROOT\Interface\{E58F4168-608C-45C2-9BFF-061229730B2E}
HKEY_CLASSES_ROOT\Interface\{EE06D877-386F-4A44-A9ED-75EB6C3E7E80}
HKEY_CLASSES_ROOT\Interface\{EE06D877-386F-4A44-A9ED-75EB6C3E7E81}
HKEY_CLASSES_ROOT\Interface\{F8D96098-E9F7-42E1-88F3-A3719D70EA8D}
HKEY_CLASSES_ROOT\My404.Bho404
HKEY_CLASSES_ROOT\My404.Bho404.1
HKEY_CLASSES_ROOT\TypeLib\{12EE7A5E-0674-42F9-A76C-000000004D00}
HKEY_CURRENT_USER\Software\A70F6A1D-0195-42a2-934C-D8AC0F7C08EB
HKEY_CURRENT_USER\software\{2cf0b992-5eeb-4143-99c0-5297ef71f444}
HKEY_CURRENT_USER\software\{2cf0b992-5eeb-4143-99c2-5297ef71f44b}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{12EE7A5E-0674-42f9-A76B-000000004D00}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\explorer bars\{2cf0b992-5eeb-4143-99c2-5297ef71f44b}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runwindowsupdate
HKEY_LOCAL_MACHINE\software\{2cf0b992-5eeb-4143-99c0-5297ef71f444}
HKEY_CLASSES_ROOT\AppID\bho.DLL
HKEY_CLASSES_ROOT\CLSID\{80672997-D58C-4190-9843-C6C61AF8FE97}
HKEY_CLASSES_ROOT\TypeLib\{85C2C2A1-3F20-4EAD-ADC3-BD3217391543}
HKEY_CURRENT_USER\Software\{12EE7A5E-0674-42f9-A76B-000000004D00}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{80672997-D58C-4190-9843-C6C61AF8FE97}
HKEY_CLASSES_ROOT\appid\my404.dll
HKEY_CLASSES_ROOT\appid\{418b46a9-5343-4e1a-a654-42b04e3f869e}
HKEY_CLASSES_ROOT\appid\{87690003-2714-45e7-8a1b-dc0658de778c}
HKEY_CLASSES_ROOT\bho.featuredresultsbho
HKEY_CLASSES_ROOT\bho.featuredresultsbho.1
HKEY_CLASSES_ROOT\bho.fresultsrequest
HKEY_CLASSES_ROOT\bho.fresultsrequest.1
HKEY_CLASSES_ROOT\bho.fresultsrequestdispatcher
HKEY_CLASSES_ROOT\bho.fresultsrequestdispatcher.1
HKEY_CLASSES_ROOT\bho.iadvertisementbho
HKEY_CLASSES_ROOT\bho.iadvertisementbho.1
HKEY_CLASSES_ROOT\browseraidtoolbar.helper
HKEY_CLASSES_ROOT\browseraidtoolbar.helper.1
HKEY_CLASSES_ROOT\browseraidtoolbar.ieshower
HKEY_CLASSES_ROOT\browseraidtoolbar.ieshower.1
HKEY_CLASSES_ROOT\browseraidtoolbar.ietoolbar
HKEY_CLASSES_ROOT\browseraidtoolbar.ietoolbar.1
HKEY_CLASSES_ROOT\browserpaltoolbar.helper
HKEY_CLASSES_ROOT\browserpaltoolbar.helper.1
HKEY_CLASSES_ROOT\browserpaltoolbar.ieshower
HKEY_CLASSES_ROOT\browserpaltoolbar.ieshower.1
HKEY_CLASSES_ROOT\browserpaltoolbar.ietoolbar
HKEY_CLASSES_ROOT\browserpaltoolbar.ietoolbar.1
HKEY_CLASSES_ROOT\clsid\{087173ef-9829-4f49-8340-a524177d3f60}
HKEY_CLASSES_ROOT\clsid\{0ddbb570-0396-44c9-986a-8f6f61a51c2f}
HKEY_CLASSES_ROOT\clsid\{12ee7a5e-0674-42f9-a76a-000000004d00}
HKEY_CLASSES_ROOT\clsid\{12ee7a5e-0674-42f9-a76b-000000004d00}
HKEY_CLASSES_ROOT\clsid\{2a167e61-d100-450d-a1b0-6eaf394bcb87}
HKEY_CLASSES_ROOT\clsid\{2cf0b992-5eeb-4143-99c0-5297ef71f443}
HKEY_CLASSES_ROOT\clsid\{2cf0b992-5eeb-4143-99c0-5297ef71f444}
HKEY_CLASSES_ROOT\clsid\{2cf0b992-5eeb-4143-99c2-5297ef71f44a}
HKEY_CLASSES_ROOT\clsid\{2cf0b992-5eeb-4143-99c2-5297ef71f44b}
HKEY_CLASSES_ROOT\clsid\{337d0c1d-4053-4fab-af2b-45c2f7b0faa6}
HKEY_CLASSES_ROOT\clsid\{337d0c1d-4053-4fab-af2b-45c2f7b0faa7}
HKEY_CLASSES_ROOT\clsid\{4a2563c7-fc68-4ee8-a11c-2022ebcc1b0f}
HKEY_CLASSES_ROOT\clsid\{5f5564ac-de7a-4dcd-9296-32e71a35dcb6}
HKEY_CLASSES_ROOT\clsid\{606220ae-90e0-41ca-bf6d-c89272ed680c}
HKEY_CLASSES_ROOT\clsid\{6d55490c-1bd4-4790-ba31-84d261316e28}
HKEY_CLASSES_ROOT\clsid\{7313bfd0-62c4-40f4-8041-3fbdbc80ac07}
HKEY_CLASSES_ROOT\clsid\{80672997-d58c-4190-9843-c6c61af8fe97}
HKEY_CLASSES_ROOT\clsid\{8a7d38be-849d-478f-a7cf-55ec95722358}
HKEY_CLASSES_ROOT\clsid\{d7258abe-571f-4dc2-abd1-8393b13b1269}
HKEY_CLASSES_ROOT\clsid\{dbd7aaa2-1725-4663-8c8b-52a840693469}
HKEY_CLASSES_ROOT\clsid\{e004800a-73c6-4587-b855-98d0ce0c16b1}
HKEY_CLASSES_ROOT\clsid\{f20ae630-6de2-43ca-a988-7cd40c36ef0b}
HKEY_CLASSES_ROOT\interface\{2a167e61-d100-450d-a1b0-6eaf394bcb87}
HKEY_CLASSES_ROOT\interface\{2a167e61-d100-450d-a1b0-6eaf394bcb89}
HKEY_CLASSES_ROOT\interface\{4a2563c7-fc68-4ee8-a11c-2022ebcc1b0f}
HKEY_CLASSES_ROOT\interface\{4a2563c7-fc68-4ee8-a11c-2022ebcc1b10}
HKEY_CLASSES_ROOT\interface\{4b0fceb7-8163-46ee-9eaf-85bd933d0a46}
HKEY_CLASSES_ROOT\interface\{670801fd-c247-4e44-9424-69e5d77c6725}
HKEY_CLASSES_ROOT\interface\{8a7d38be-849d-478f-a7cf-55ec95722358}
HKEY_CLASSES_ROOT\interface\{8a7d38be-849d-478f-a7cf-55ec95722359}
HKEY_CLASSES_ROOT\interface\{e58f4168-608c-45c2-9bff-061229730b2e}
HKEY_CLASSES_ROOT\interface\{ee06d877-386f-4a44-a9ed-75eb6c3e7e80}
HKEY_CLASSES_ROOT\interface\{ee06d877-386f-4a44-a9ed-75eb6c3e7e81}
HKEY_CLASSES_ROOT\interface\{f8d96098-e9f7-42e1-88f3-a3719d70ea8d}
HKEY_CLASSES_ROOT\my404.bho404
HKEY_CLASSES_ROOT\my404.bho404.1
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{6d55490c-1bd4-4790-ba31-84d261316e28}
HKEY_CLASSES_ROOT\typelib\{12ee7a5e-0674-42f9-a76c-000000004d00}
HKEY_CLASSES_ROOT\typelib\{7313bfd0-62c4-40f4-8041-3fbdbc80ac07}
HKEY_CLASSES_ROOT\typelib\{7313bfd0-62c4-40f4-8041-3fbdbc80ac08}
HKEY_CLASSES_ROOT\typelib\{7eb64065-dfd1-41b0-99d7-6ba3e0a15916}
HKEY_CLASSES_ROOT\typelib\{85c2c2a1-3f20-4ead-adc3-bd3217391543}
HKEY_CLASSES_ROOT\typelib\{ba87b15b-7de7-4da4-8bf7-5c616d6c99da}
HKEY_CLASSES_ROOT\_atl_generated.searchtoolbarbho
HKEY_CLASSES_ROOT\_atl_generated.searchtoolbarbho.1
HKEY_CLASSES_ROOT\_atl_generated.searchtoolbarname
HKEY_CLASSES_ROOT\_atl_generated.searchtoolbarname.1
HKEY_CURRENT_USER\software\a70f6a1d-0195-42a2-934c-d8ac0f7c08eb
HKEY_CURRENT_USER\software\popup stopper
HKEY_LOCAL_MACHINE\software\classes\clsid\{337d0c1d-4053-4fab-af2b-45c2f7b0faa7}
HKEY_LOCAL_MACHINE\software\classes\clsid\{6d55490c-1bd4-4790-ba31-84d261316e28}
HKEY_LOCAL_MACHINE\software\classes\clsid\{d7258abe-571f-4dc2-abd1-8393b13b1269}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{f20ae630-6de2-43ca-a988-7cd40c36ef0b}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\explorer bars\{12ee7a5e-0674-42f9-a76b-000000004d00}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\explorer bars\{2cf0b992-5eeb-4143-99c0-5297ef71f444}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\extensions\{07b7f771-1b8e-4b7b-823e-ffac1732aa9e}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{12ee7a5e-0674-42f9-a76a-000000004d00}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{2cf0b992-5eeb-4143-99c0-5297ef71f443}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{2cf0b992-5eeb-4143-99c2-5297ef71f44a}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{6d55490c-1bd4-4790-ba31-84d261316e28}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{80672997-d58c-4190-9843-c6c61af8fe97}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\letssearch
HKEY_LOCAL_MACHINE\software\{2cf0b992-5eeb-4143-99c2-5297ef71f44b}

BrowserAid Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


BrowserAid indications of infection

This symptoms of BrowserAid detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVFN Trojan Removal instruction
Canasson Trojan Cleaner
SurfAccuracy Adware Information
Remove Flobo.Server Trojan
Pigeon.FCA Trojan Removal instruction

webpower.com Tracking Cookie

webpower.com virus description
Technical details:
Categories: Tracking Cookie

webpower.com indications of infection

This symptoms of webpower.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanDownloader.Win32.Tooncom Trojan Removal
Removing Bancos.HWN Trojan
Sinred.Keylogger Spyware Information
Removing Findthewebsiteyouneed Tracking Cookie
scripps.com Tracking Cookie Symptoms

Bancos.IBJ Trojan

Bancos.IBJ virus description
Technical details:
Categories: Trojan

Bancos.IBJ indications of infection

This symptoms of Bancos.IBJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bugger Trojan Information
Pigeon.FAR Trojan Information
Bancos.IEZ Trojan Information
Removing Moonpie.10b Backdoor
KWM Trojan Cleaner

Bancos.GJI Trojan

Bancos.GJI virus description
Technical details:
Categories: Trojan

Bancos.GJI indications of infection

This symptoms of Bancos.GJI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.StartPage.bj Trojan Information
Removing MediaLoads.Enhanced BHO
Remove BO.BO Trojan
Pigeon.EVM Trojan Removal
NeverEnd Trojan Removal instruction

SillyDl.CXA Trojan

SillyDl.CXA virus description
Technical details:
Categories: Trojan

SillyDl.CXA indications of infection

This symptoms of SillyDl.CXA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Onap Trojan Information
Pigeon.AVFN Trojan Removal instruction
Removing Zhongsou Adware
Remove Win32.Spyman Trojan
Master Backdoor Removal instruction

bulletads.com Tracking Cookie

bulletads.com virus description
Technical details:
Categories: Tracking Cookie

bulletads.com indications of infection

This symptoms of bulletads.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EVC Trojan Cleaner
Bancos.GBI Trojan Symptoms
Girc Trojan Removal instruction
Remove Brave Sentry Ransomware
PtakksResur.Server Backdoor Information

Bancos.IDU Trojan

Bancos.IDU virus description
Technical details:
Categories: Trojan

Bancos.IDU indications of infection

This symptoms of Bancos.IDU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
V4.login Trojan Information
SillyDl.CHB Trojan Cleaner
Enculator Backdoor Information
Queen.Hitman.Virus Hostile Code Cleaner
Bancos.HSG Trojan Cleaner