BAT.Fret Trojan

BAT.Fret virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
BAT.Fret Aliases:
[Kaspersky]BAT.Fret.1023;
[Eset]Bat.Fret102 virus;
[Panda]BAT/Fret.1023;
[Computer Associates]Bat/Fret,BAT.Fret.1023

BAT.Fret indications of infection

This symptoms of BAT.Fret detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MailSpam.Squad Hacker Tool Information
AXPlayer.Spy Trojan Removal
Mirtang Trojan Symptoms
Puzzle.Desktop.Sudoku Adware Information
Removing Downloader.AWE Downloader

Pigeon.AEG Trojan

Pigeon.AEG virus description
Technical details:
Categories: Trojan

Pigeon.AEG indications of infection

This symptoms of Pigeon.AEG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Voonda Toolbar
Urname Hostile Code Removal instruction
Removing Win32.LMR Trojan

TCP DoS

TCP virus description
Technical details:
Categories: DoS

TCP indications of infection

This symptoms of TCP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HAK Trojan Removal instruction

VB.vs Downloader

VB.vs virus description
Technical details:
Categories: Downloader

VB.vs indications of infection

This symptoms of VB.vs detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Bionet.19b Trojan
SillyDl.ASN Trojan Removal
PCProwler Spyware Cleaner
Beastdoor.8qb Trojan Symptoms

Port.Monitor DoS

Port.Monitor virus description
Technical details:
Categories: DoS

Port.Monitor indications of infection

This symptoms of Port.Monitor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Unknown.Toolbar5 BHO
Digi.Watcher Spyware Information
CiGiCiGi.ViP Trojan Symptoms
Inwin Trojan Symptoms
Removing Bancos.GNZ Trojan

Smad DoS

Smad virus description
Technical details:
Categories: DoS

Smad indications of infection

This symptoms of Smad detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing VBS.Vicety Trojan
Bluefire Trojan Symptoms

Reverse Trojan

Reverse virus description
Technical details:
Categories: Trojan,Backdoor,RAT,Downloader,DoS
Reverse Aliases:
[Kaspersky]Backdoor.ReverseTrojan.20,Backdoor.ReverseTrojan.212,Reverse.948;
[Eset]Win32/ReverseTrojan.212 trojan;
[McAfee]BackDoor-AIU;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program,Bck/ReverseTrojan,Reverse.948.D;
[Computer Associates]Backdoor/Reverse.20!Server,Win32.Reverse.20.b2,Backdoor/Reverse!Server,Backdoor/Reverse.Sin,Win32.Reverse.212,Reverse.948

Reverse indications of infection

This symptoms of Reverse detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Lineage.AAP Trojan
Removing Internet Explorer Security Plugin Trojan
Removing Punisher Trojan
KeyLog.Tap Trojan Removal

Pigeon.AVBX Trojan

Pigeon.AVBX virus description
Technical details:
Categories: Trojan

Pigeon.AVBX indications of infection

This symptoms of Pigeon.AVBX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Altnet Trojan Information
Remove TypeAgent Spyware
Onap Trojan Removal
Removing SillyDl.DMT Trojan
Removing Tieing.up.the.schools.phones DoS

PSW.QQlog.ah Trojan

PSW.QQlog.ah virus description
Technical details:
Categories: Trojan,Hijacker,Hacker Tool
PSW.QQlog.ah Aliases:
[Kaspersky]Trojan.PSW.QQpass.ah;
[Panda]Trojan Horse;
[Computer Associates]Win32.Startpage.T,Win32/QQPass.HH!Trojan

PSW.QQlog.ah indications of infection

This symptoms of PSW.QQlog.ah detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SpyBlocs Trojan Cleaner

TrojanDownloader.Win32.Agent.az Downloader

TrojanDownloader.Win32.Agent.az virus description
Technical details:
Categories: Downloader
TrojanDownloader.Win32.Agent.az Aliases:
[Panda]Adware/SearchAid

TrojanDownloader.Win32.Agent.az indications of infection

This symptoms of TrojanDownloader.Win32.Agent.az detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Phishbank.AWZ Trojan
Removing Bbmao Toolbar
Pigeon.AVLS Trojan Cleaner

Bancos.HZZ Trojan

Bancos.HZZ virus description
Technical details:
Categories: Trojan

Bancos.HZZ indications of infection

This symptoms of Bancos.HZZ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
DLSearchBar Hijacker Cleaner
Perfect.Cleaner Ransomware Cleaner
TrojanDownloader.Win32.GoldenPalace Trojan Removal

Pigeon.AMS Trojan

Pigeon.AMS virus description
Technical details:
Categories: Trojan

Pigeon.AMS indications of infection

This symptoms of Pigeon.AMS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Algo Trojan Symptoms
Removing Bancos.IDQ Trojan
Biene Trojan Removal
Removing EasyServ Trojan

SubSeven.ICQ.Patch Backdoor

SubSeven.ICQ.Patch virus description
Technical details:
Categories: Backdoor,RAT
SubSeven.ICQ.Patch Aliases:
[Kaspersky]Backdoor.SubSeven.patcher;
[McAfee]Sub7-patch;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program;
[Computer Associates]Backdoor/SubSeven.Patcher.A!Serv

SubSeven.ICQ.Patch indications of infection

This symptoms of SubSeven.ICQ.Patch detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
NCast Adware Removal instruction

New.Downloader Trojan

New.Downloader virus description
Technical details:
Categories: Trojan,Downloader
New.Downloader Aliases:
[McAfee]New Downloader-b;
[Other]Win32/SillyDl.CLQ,TrojanDownloader:Win32/Small.gen!B

New.Downloader indications of infection

This symptoms of New.Downloader detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.DDC Trojan Cleaner
Wicral Downloader Removal instruction
Small.bz Downloader Cleaner
PWS.Logg Trojan Removal instruction

VX2 Adware

VX2 virus description
Technical details:
Categories: Adware,BHO,Hijacker,Downloader
VX2 Aliases:
[Kaspersky]Backdoor.Bionet.405,Backdoor.IRC.Zapchast,Backdoor.IRC.Zcrew,DoS.Win32.Nenet,Flooder.Win32.WarPing,TrojanDownloader.Win32.Femad.b;
[Eset]Win32/Femad.B trojan;
[McAfee]RemoteProcessLaunch;
[Panda]Adware/MSView,Application/HideWindow.A,Application/Psexec.A,Application/ToolWget.A,Backdoor Program,Bck/IRC.Mirc.Based,Bck/Multi.I,Bck/Zcrew.B,Bck/Zcrew.G,Flooder/Nenet. A,Spyware/BetterInet,Trj/Femad.A,Trj/Flood.BI,Trj/Passer.C,Trojan Horse;
[Computer Associates]Backdoor/Bionet.405!Server,Backdoor/IRC.Zcrew,Backdoor/ZCrew.B,Backdoor/ZCrew.B.IRC,Backdoor/Zcrew.G,BAT.IRCFlood,BAT.Noshare.B,Bat/Flood.C!Trojan,IRC.Flood,mIRC/Flood.I!Trojan,mIRC/Flood.RmtCfg!Trojan,Win32.BettInet.C,Win32.Bionet.405,Win32.Femad.A,Win32.IRCFlood,Win32.Startpage.KF!downloader,Win32/Rslocal.B!Downloader,Win32/SillyDL.70656!Trojan,Win32/Spybot.FR!Worm,Win32/Startpage.KF!Downloader;
[Other]Trojan

VX2 Folders:
[%PROGRAM_FILES%]\clean get-away
[%PROGRAM_FILES%]\my panicbutton

VX2 Files:
[%PROFILE_TEMP%]\tm1180.exe
[%SYSTEM%]\TPS108.dll
[%WINDOWS%]\Help\nocontnt.GID
[%WINDOWS%]\TEMP\upd209.exe
[%PROFILE%]\desktop\clean get-away.lnk
[%PROFILE%]\desktop\my panicbutton.lnk
[%SYSTEM%]\3lviewer.dll
[%SYSTEM%]\3vviewer.dll
[%SYSTEM%]\3zviewer.dll
[%SYSTEM%]\6eo4svc.dll
[%SYSTEM%]\6fo4svc.dll
[%SYSTEM%]\6uo4svc.dll
[%SYSTEM%]\host.dll
[%SYSTEM%]\lyiclp.dll
[%SYSTEM%]\msview.dll
[%SYSTEM%]\sitehlpr.dll
[%SYSTEM%]\tps108.dll
[%SYSTEM%]\vx2.dll
[%WINDOWS%]\system\ehelper.dll
[%WINDOWS%]\system\host.dll
[%WINDOWS%]\system\kernellos.dll
[%WINDOWS%]\system\msview.dll
[%WINDOWS%]\system\sitehlpr.dll
[%WINDOWS%]\system\tps108.dll
[%WINDOWS%]\system\vx2.dll
[%PROFILE_TEMP%]\tm1180.exe
[%SYSTEM%]\TPS108.dll
[%WINDOWS%]\Help\nocontnt.GID
[%WINDOWS%]\TEMP\upd209.exe
[%PROFILE%]\desktop\clean get-away.lnk
[%PROFILE%]\desktop\my panicbutton.lnk
[%SYSTEM%]\3lviewer.dll
[%SYSTEM%]\3vviewer.dll
[%SYSTEM%]\3zviewer.dll
[%SYSTEM%]\6eo4svc.dll
[%SYSTEM%]\6fo4svc.dll
[%SYSTEM%]\6uo4svc.dll
[%SYSTEM%]\host.dll
[%SYSTEM%]\lyiclp.dll
[%SYSTEM%]\msview.dll
[%SYSTEM%]\sitehlpr.dll
[%SYSTEM%]\tps108.dll
[%SYSTEM%]\vx2.dll
[%WINDOWS%]\system\ehelper.dll
[%WINDOWS%]\system\host.dll
[%WINDOWS%]\system\kernellos.dll
[%WINDOWS%]\system\msview.dll
[%WINDOWS%]\system\sitehlpr.dll
[%WINDOWS%]\system\tps108.dll
[%WINDOWS%]\system\vx2.dll

VX2 Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{0000026A-8230-4DD4-BE4F-6889D1E74167}
HKEY_CLASSES_ROOT\clsid\{00000580-c637-11d5-831c-00105ad6acf0}
HKEY_CLASSES_ROOT\clsid\{3bfadce2-1141-4b81-8878-49af625f0fdc}
HKEY_CLASSES_ROOT\clsid\{4208fb4d-4e53-4f5a-bf7a-3e047ddb5281}
HKEY_CLASSES_ROOT\folder\shellex\columnhandlers\{6ec11407-5b2e-4e25-8bdf-77445b52ab37}
HKEY_CLASSES_ROOT\interface\{50f646b1-1c3e-4b01-b818-437e1276e5be}
HKEY_CLASSES_ROOT\typelib\{690bccb4-6b83-4203-ae77-038c116594ec}
HKEY_CLASSES_ROOT\typelib\{7efe1256-ab56-44b3-a63a-eb1a2208a490}
HKEY_CLASSES_ROOT\vx2.vx2obj
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{11111111-1111-1111-1111-111111111111}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0000026A-8230-4DD4-BE4F-6889D1E74167}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ffd2825e-0785-40c5-9a41-518f53a8261f}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\adbehavior
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\system monitor for windows 98\nt\xp\2000\2003_is1
HKEY_LOCAL_MACHINE\SOFTWARE\RespondMiter
HKEY_LOCAL_MACHINE\SOFTWARE\Transponder
HKEY_LOCAL_MACHINE\system\currentcontrolset\control\print\monitors\zepmon
HKEY_CLASSES_ROOT\*\shellex\contextmenuhandlers\ffqnkgtx
HKEY_CLASSES_ROOT\clsid\{00000000-5eb9-11d5-9d45-009027c14662}
HKEY_CLASSES_ROOT\clsid\{0000026a-8230-4dd4-be4f-6889d1e74167}
HKEY_CLASSES_ROOT\clsid\{00000273-8230-4dd4-be4f-6889d1e74167}
HKEY_CLASSES_ROOT\clsid\{002eb272-2590-4693-b166-fbd5d9b6fea6}
HKEY_CLASSES_ROOT\clsid\{0ef3e768-48d4-40d2-91a6-7d2b816a6e55}
HKEY_CLASSES_ROOT\clsid\{1000026a-8230-4dd4-be4f-6889d1e74167}
HKEY_CLASSES_ROOT\clsid\{11111111-1111-1111-1111-111111111111}
HKEY_CLASSES_ROOT\clsid\{6ec11407-5b2e-4e25-8bdf-77445b52ab37}
HKEY_CLASSES_ROOT\clsid\{daeacd99-d7c4-4b98-9fd1-8077f69310ea}
HKEY_CLASSES_ROOT\clsid\{eee2ecb9-eac0-4d02-8360-4c0de4d23abc}
HKEY_CLASSES_ROOT\clsid\{ef100607-f409-426a-9e7c-cb211f2a9030}
HKEY_CLASSES_ROOT\clsid\{ffd2825e-0785-40c5-9a41-518f53a8261f}
HKEY_CLASSES_ROOT\dlexpertclick
HKEY_CLASSES_ROOT\multimppdll.multimppdllobj
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{00000000-5eb9-11d5-9d45-009027c14662}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{0000026a-8230-4dd4-be4f-6889d1e74167}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{00000273-8230-4dd4-be4f-6889d1e74167}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{00000580-c637-11d5-831c-00105ad6acf0}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{ffd2825e-0785-40c5-9a41-518f53a8261f}
HKEY_CLASSES_ROOT\typelib\{11cc62b2-65f2-4a82-b332-5de4e8384422}
HKEY_CLASSES_ROOT\\multimppdll.multimppdllobj.1
HKEY_CURRENT_USER\software\multimpp
HKEY_LOCAL_MACHINE\software\classes\clsid\{00000000-5eb9-11d5-9d45-009027c14662}
HKEY_LOCAL_MACHINE\software\classes\clsid\{ffd2825e-0785-40c5-9a41-518f53a8261f}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\f1e45b94-76ba-4e62-9fe8-a72a04ec35a9
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{11111111-1111-1111-1111-111111111111}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{20000273-8230-4dd4-be4f-6889d1e74167}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{00000000-5eb9-11d5-9d45-009027c14662}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{0000026a-8230-4dd4-be4f-6889d1e74167}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{00000273-8230-4dd4-be4f-6889d1e74167}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{00000580-c637-11d5-831c-00105ad6acf0}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{002eb272-2590-4693-b166-fbd5d9b6fea6}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{ffd2825e-0785-40c5-9a41-518f53a8261f}
HKEY_LOCAL_MACHINE\software\respondmiter
HKEY_LOCAL_MACHINE\software\transponder

VX2 Registry Values:
HKEY_CURRENT_USER\software\bundles
HKEY_CLASSES_ROOT\activexctrl\clsid
HKEY_CURRENT_USER\software\bundles
HKEY_CURRENT_USER\software\microsoft\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\topconverting


VX2 indications of infection

This symptoms of VX2 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Dynamic.Desktop.Media Trojan Symptoms
Lunii Downloader Cleaner

Win32.WS.FTP Trojan

Win32.WS.FTP virus description
Technical details:
Categories: Trojan,Hacker Tool
Win32.WS.FTP Aliases:
[Panda]Trojan Horse.LC

Win32.WS.FTP indications of infection

This symptoms of Win32.WS.FTP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bancos.CYZ Trojan
Synflooder DoS Removal
Banload.np Trojan Cleaner

June Trojan

June virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
June Aliases:
[Kaspersky]June16.a;
[Panda]Pretoria;
[Computer Associates]June 16

June indications of infection

This symptoms of June detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Spy.Agent Trojan Information
Townews Adware Information

MSNFlood Trojan

MSNFlood virus description
Technical details:
Categories: Trojan
MSNFlood Aliases:
[Kaspersky]Flooder.MSN.VB.ac;
[Eset]Win32/Flooder.MSN.VB.AC trojan;
[Panda]Flooder/MassMsg.A;
[Computer Associates]Win32/MSNFlood!Trojan,Win32.MSNFlood

MSNFlood Folders:
[%APPDATA%]\sysdata


MSNFlood indications of infection

This symptoms of MSNFlood detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Bagle Worm Symptoms
Malware.Alarm Trojan Removal instruction

FlashTrack Adware

FlashTrack virus description
Technical details:
Categories: Adware,BHO
FlashTrack Aliases:
[Panda]Adware/FlashTrack;
[Other]Adware.Flashtrack

FlashTrack Folders:
[%PROGRAM_FILES%]\flt
[%PROGRAM_FILES%]\ftk
[%PROGRAM_FILES%]\reg2
[%PROGRAM_FILES%]\xml
[%PROGRAM_FILES%]\xmod
[%PROGRAM_FILES%]\fla
[%PROGRAM_FILES%]\ftapp

FlashTrack Files:
[%WINDOWS%]\temp\r.exe
[%PROFILE_TEMP%]\8.exe\8.exe
[%SYSTEM%]\flcp.dll
[%SYSTEM%]\flt.dll
[%SYSTEM%]\ftapp.dll
[%WINDOWS%]\system\flcp.dll
[%WINDOWS%]\system\flt.dll
[%WINDOWS%]\system\ftapp.dll
[%WINDOWS%]\temp\r.exe
[%PROFILE_TEMP%]\8.exe\8.exe
[%SYSTEM%]\flcp.dll
[%SYSTEM%]\flt.dll
[%SYSTEM%]\ftapp.dll
[%WINDOWS%]\system\flcp.dll
[%WINDOWS%]\system\flt.dll
[%WINDOWS%]\system\ftapp.dll

FlashTrack Registry Keys:
HKEY_CLASSES_ROOT\interface\{6e83ae1c-f69c-4aed-af98-d23c24c6fa4b}
HKEY_CLASSES_ROOT\typelib\{7955ea20-e0d6-4a77-88b6-120674d979ea}
HKEY_LOCAL_MACHINE\software\classes\interface\{6e83ae1c-f69c-4aed-af98-d23c24c6fa4b}
HKEY_LOCAL_MACHINE\software\classes\typelib\{7955ea20-e0d6-4a77-88b6-120674d979ea}
HKEY_LOCAL_MACHINE\software\flt
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{665ACD90-4541-4836-9FE4-062386BB8F05}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\ftapp
HKEY_CLASSES_ROOT\bredobj.bredobj
HKEY_CLASSES_ROOT\bredobj.bredobj.1
HKEY_CLASSES_ROOT\clsid\{63cf97e8-4133-438a-a831-cc9c6d47d673}
HKEY_CLASSES_ROOT\clsid\{665acd90-4541-4836-9fe4-062386bb8f05}
HKEY_CLASSES_ROOT\clsid\{7371f073-ac0f-4b80-bb2f-96a488cefb32}
HKEY_CLASSES_ROOT\clsid\{7955ea20-e0d6-4a77-88b6-120674d979ea}
HKEY_CLASSES_ROOT\interface\{06542764-7bb2-412b-80d6-d103d1474c93}
HKEY_CLASSES_ROOT\interface\{baef4039-3c02-4c9e-a2f4-87b513ab0e87}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{63cf97e8-4133-438a-a831-cc9c6d47d673}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{665acd90-4541-4836-9fe4-062386bb8f05}
HKEY_CLASSES_ROOT\typelib\{db9f4c00-65e8-4fa1-917b-e4844ddf5909}
HKEY_CLASSES_ROOT\typelib\{e6c71e83-e02b-4bc4-958d-a9194916ec19}
HKEY_LOCAL_MACHINE\software\classes\clsid\{63cf97e8-4133-438a-a831-cc9c6d47d673}
HKEY_LOCAL_MACHINE\software\classes\clsid\{665acd90-4541-4836-9fe4-062386bb8f05}
HKEY_LOCAL_MACHINE\software\classes\clsid\{7371f073-ac0f-4b80-bb2f-96a488cefb32}
HKEY_LOCAL_MACHINE\software\classes\interface\{06542764-7bb2-412b-80d6-d103d1474c93}
HKEY_LOCAL_MACHINE\software\classes\interface\{baef4039-3c02-4c9e-a2f4-87b513ab0e87}
HKEY_LOCAL_MACHINE\software\classes\typelib\{db9f4c00-65e8-4fa1-917b-e4844ddf5909}
HKEY_LOCAL_MACHINE\software\classes\typelib\{e6c71e83-e02b-4bc4-958d-a9194916ec19}
HKEY_LOCAL_MACHINE\software\ftapp
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{63cf97e8-4133-438a-a831-cc9c6d47d673}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{665acd90-4541-4836-9fe4-062386bb8f05}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{7371f073-ac0f-4b80-bb2f-96a488cefb32}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{d7e588ab-a5d9-4422-b313-22a3470f9700}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\flt
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\rvp
HKEY_LOCAL_MACHINE\software\persistent bytes
HKEY_LOCAL_MACHINE\software\rvp

FlashTrack Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonce
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\reg2
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\reg2
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\xmod
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\xmod
HKEY_LOCAL_MACHINE\software\netfilter
HKEY_LOCAL_MACHINE\software\netfilter
HKEY_LOCAL_MACHINE\software\netfilter
HKEY_LOCAL_MACHINE\software\netfilter
HKEY_LOCAL_MACHINE\software\netfilter
HKEY_LOCAL_MACHINE\software\netfilter
HKEY_LOCAL_MACHINE\software\netfilter
HKEY_LOCAL_MACHINE\software\netfilter
HKEY_LOCAL_MACHINE\software\xml
HKEY_LOCAL_MACHINE\software\xml
HKEY_LOCAL_MACHINE\software\xml
HKEY_LOCAL_MACHINE\software\xml
HKEY_LOCAL_MACHINE\software\xml


FlashTrack indications of infection

This symptoms of FlashTrack detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing RegFish Trojan
EZToolbar Adware Removal

PostData.Spy DoS

PostData.Spy virus description
Technical details:
Categories: DoS

PostData.Spy indications of infection

This symptoms of PostData.Spy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CS.for.HBT RAT Removal
Pigeon.ARL Trojan Removal
Removing SillyDl.BCS Trojan

Pigeon.AVPC Trojan

Pigeon.AVPC virus description
Technical details:
Categories: Trojan

Pigeon.AVPC indications of infection

This symptoms of Pigeon.AVPC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ABetterInternet.DrPMon Adware Cleaner
Pigeon.AOG Trojan Information
Removing Banker.CLI Trojan

Silentframe Hostile Code

Silentframe virus description
Technical details:
Categories: Hostile Code

Silentframe indications of infection

This symptoms of Silentframe detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Propo Trojan Information
JanNet Spyware Symptoms

HLLP.Eter Trojan

HLLP.Eter virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
HLLP.Eter Aliases:
[Kaspersky]Win32.HLLP.Eter.a,Win32.HLLP.Eter.b;
[Eset]Win32/Eternity.7168.A virus;
[McAfee]W32/HLLP.Eter;
[F-Prot]W32/HLLP.Eter.A,W32/HLLP.7168;
[Panda]W32/HLLP.Eter.A,W32/HLLP.Eter.B,W32/HLLP.Eter.C;
[Computer Associates]Win32.HLLP.Eter.8704,Win32.HLLP.Eter.7168,Win32.HLLP.Eter.7168.B

HLLP.Eter indications of infection

This symptoms of HLLP.Eter detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Watching Trojan Removal
Bailey Trojan Removal
SpywareStormer Trojan Symptoms
Lop.com Spyware Cleaner

WordMacro.Karatka Trojan

WordMacro.Karatka virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
WordMacro.Karatka Aliases:
[Computer Associates]WordMacro/Karatka.A

WordMacro.Karatka indications of infection

This symptoms of WordMacro.Karatka detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove IamBigBrother Spyware
Vxidl.AAA Trojan Removal
BOBMA Trojan Removal instruction

SRIB.com Tracking Cookie

SRIB.com virus description
Technical details:
Categories: Tracking Cookie

SRIB.com indications of infection

This symptoms of SRIB.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Adware.Regifast Adware Symptoms
Bagle Trojan Removal instruction
Remove WhenU.WeatherCast Adware
Bancos.GOR Trojan Symptoms

Duwpare Trojan

Duwpare virus description
Technical details:
Categories: Trojan

Duwpare indications of infection

This symptoms of Duwpare detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
FavoriteMan.SpyAssault BHO Removal instruction
Removing Winsdoor Trojan
Small.ab Trojan Cleaner

TrojanSpy.Win32.Banpaes Spyware

TrojanSpy.Win32.Banpaes virus description
Technical details:
Categories: Spyware
TrojanSpy.Win32.Banpaes Aliases:
[Panda]Application/Keyhook

TrojanSpy.Win32.Banpaes indications of infection

This symptoms of TrojanSpy.Win32.Banpaes detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CiD.Help Adware Removal
Remove Chopenoz Trojan
Dialer Trojan Cleaner

Win.APSTrojan.gen Trojan

Win.APSTrojan.gen virus description
Technical details:
Categories: Trojan
Win.APSTrojan.gen Aliases:
[Panda]Trojan Horse.LC;
[Computer Associates]Win.APSTrojan.gen

Win.APSTrojan.gen indications of infection

This symptoms of Win.APSTrojan.gen detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Z1.Adserver.com Tracking Cookie
Manibag Trojan Removal instruction
Remove CyberPaky Trojan
Pigeon.DSI Trojan Cleaner

Remote.Explorer RAT

This summary is not available. Please click here to view the post.

Peeper Trojan

Peeper virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Peeper Aliases:
[Kaspersky]Backdoor.Peeper.12,Backdoor.Peeper.10,Backdoor.Peeper.15,Backdoor.Peeperst;
[Eset]Win32/Peeper.12.Client trojan,Win32/Peeper.12.Server trojan;
[McAfee]BackDoor-ACP,BackDoor-AMW;
[F-Prot]security risk or a "backdoor" program,destructive program;
[Panda]Backdoor Program,Backdoor Program.LC,Bck/Peeper.B,Bck/Peeper,Bck/Pperst;
[Computer Associates]Backdoor/Peeper.1.0!Server,Backdoor/Peeper.1.5,Backdoor/Peeper.15,Backdoor/Peeperst!Server

Peeper indications of infection

This symptoms of Peeper detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.BEK Trojan Information
BlackShade RAT Removal
Sogup Downloader Information