CheckURL BHO

CheckURL virus description
Technical details:
Categories: BHO,Toolbar

CheckURL Files:
[%SYSTEM%]\checkurl.dll
[%WINDOWS%]\system\checkurl.dll
[%SYSTEM%]\checkurl.dll
[%WINDOWS%]\system\checkurl.dll

CheckURL Registry Keys:
HKEY_CLASSES_ROOT\clsid\{a9eef0d7-5695-45ba-8943-ed3b95a50bd2}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{a9eef0d7-5695-45ba-8943-ed3b95a50bd2}
HKEY_LOCAL_MACHINE\software\classes\clsid\{a9eef0d7-5695-45ba-8943-ed3b95a50bd2}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{a9eef0d7-5695-45ba-8943-ed3b95a50bd2}


CheckURL indications of infection

This symptoms of CheckURL detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
HookApi Trojan Removal instruction
Removing Bat.Epy Trojan
Pigeon.EYX Trojan Cleaner

PSW.Hiddukel.VI.Beta Trojan

PSW.Hiddukel.VI.Beta virus description
Technical details:
Categories: Trojan,Hacker Tool
PSW.Hiddukel.VI.Beta Aliases:
[Kaspersky]Trojan.PSW.Hukle.60.a;
[F-Prot]security risk or a "backdoor" program;
[Panda]Trojan Horse;
[Computer Associates]Win32/PSW.Hukle.60!Trojan

PSW.Hiddukel.VI.Beta indications of infection

This symptoms of PSW.Hiddukel.VI.Beta detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Partnership Trojan Cleaner
Remove Pigeon.ADY Trojan
Removing Win32.Darliz.generic Trojan
Bancos.GCQ Trojan Removal
Removing MalwareWipe Adware

Slavik2 Trojan

Slavik2 virus description
Technical details:
Categories: Trojan
Slavik2 Aliases:
[Panda]Trj/Slavik.B;
[Computer Associates]Slavik2!Trojan

Slavik2 indications of infection

This symptoms of Slavik2 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.ELC Trojan Information

Pigeon.EAC Trojan

Pigeon.EAC virus description
Technical details:
Categories: Trojan

Pigeon.EAC indications of infection

This symptoms of Pigeon.EAC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Zlob.Fam.VideoAccessCodec Trojan
Removing Fresh.Devices Adware
Remove H04x3r.Telnet.Server Trojan

XXXContent Adware

XXXContent virus description
Technical details:
Categories: Adware
XXXContent Aliases:
[Kaspersky]Trojan.Win32.Dialer.hh;
[McAfee]Dilaer-188;
[Other]Win32/Secdrop.LT,Dialer.Sfonditailia

XXXContent indications of infection

This symptoms of XXXContent detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Win32.Agent.db Trojan
MS06 Trojan Information
Zlob.Fam.Image ActiveX Access Trojan Removal instruction
Fath Trojan Symptoms
Bancos.IBC Trojan Removal

Bancos.GEQ Trojan

Bancos.GEQ virus description
Technical details:
Categories: Trojan

Bancos.GEQ indications of infection

This symptoms of Bancos.GEQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Espionage Spyware
Remove Keylog.KaiserLog Trojan
Pigeon.EUK Trojan Symptoms
Zlob.Fam.Video Add-on Setup Trojan Cleaner

Messenger.Warrior DoS

Messenger.Warrior virus description
Technical details:
Categories: DoS

Messenger.Warrior indications of infection

This symptoms of Messenger.Warrior detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Need2Find Adware
Macro Trojan Cleaner
Key.Spy.Software Spyware Cleaner
Bancos.GDN Trojan Information
SD.Bot Backdoor Symptoms

Ping.Server RAT

Ping.Server virus description
Technical details:
Categories: RAT

Ping.Server indications of infection

This symptoms of Ping.Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SystemDefender Ransomware Symptoms
HomepageProtector BHO Removal

Chiton Trojan

Chiton virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Chiton Aliases:
[Kaspersky]Win32.Chiton.c,Win32.Chiton.d,Win32.Chiton.a,Win32.Chiton.e;
[McAfee]W32/Chiton,W32/Chiton.b,W32/Chiton.d;
[F-Prot]W32/Chiton.1609,W32/Chiton.1349,New or modified variant of Chiton,virus dropper;
[Panda]W32/Chiton.C,Univ.B;
[Computer Associates]Win32.Vibyor.gen,Win32/Ou812,Win32/Shrug

Chiton indications of infection

This symptoms of Chiton detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MadFinder Hijacker Cleaner
Removing Ursnif Trojan
SillyDl.DHA Trojan Cleaner

Pigeon.AAS Trojan

Pigeon.AAS virus description
Technical details:
Categories: Trojan

Pigeon.AAS indications of infection

This symptoms of Pigeon.AAS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove FHZ Backdoor
adtools Adware Cleaner
Loli Trojan Removal

Atmaca Downloader

Atmaca virus description
Technical details:
Categories: Downloader

Atmaca Files:
[%WINDOWS%]\system\sysreq.exe
[%WINDOWS%]\system\sysreq.exe

Atmaca Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Atmaca indications of infection

This symptoms of Atmaca detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Small.sy Downloader Removal instruction
Huplu Trojan Symptoms
SearchPack Adware Cleaner

Sscan Trojan

Sscan virus description
Technical details:
Categories: Trojan

Sscan indications of infection

This symptoms of Sscan detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Macedonia Trojan Information
Sneak RAT Cleaner

Susan Trojan

Susan virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Susan Aliases:
[Kaspersky]Susan.571;
[Panda]Susan;
[Computer Associates]Susan

Susan indications of infection

This symptoms of Susan detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Screen.Spy Spyware Removal

LogMeIn RAT

LogMeIn virus description
Technical details:
Categories: RAT

LogMeIn indications of infection

This symptoms of LogMeIn detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Justas Trojan

Sexprovider.com Toolbar

Sexprovider.com virus description
Technical details:
Categories: Toolbar

Sexprovider.com indications of infection

This symptoms of Sexprovider.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Sysinst Trojan

Frethog.ADW Trojan

Frethog.ADW virus description
Technical details:
Categories: Trojan

Frethog.ADW indications of infection

This symptoms of Frethog.ADW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.DOT Trojan Cleaner
Alien Trojan Symptoms
VB.aoh Trojan Removal
EffectiveBar Adware Removal
Backdoor.SubSeven2.Server Trojan Removal instruction

Pigeon.APK Trojan

Pigeon.APK virus description
Technical details:
Categories: Trojan

Pigeon.APK indications of infection

This symptoms of Pigeon.APK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Mini.Spy RAT Symptoms

TinyP Trojan

TinyP virus description
Technical details:
Categories: Trojan
TinyP Aliases:
[Kaspersky]BadJoke.Win32.Delf.m;
[McAfee]Joke-TinyP

TinyP indications of infection

This symptoms of TinyP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MSView Adware Removal
Removing maxlab.ru Tracking Cookie
Trust BHO Information
QQPlus Spyware Symptoms
Win32.Secdrop Trojan Symptoms

Rbot.DSB Trojan

Rbot.DSB virus description
Technical details:
Categories: Trojan

Rbot.DSB Files:
[%SYSTEM%]\ntsystem.exe
[%SYSTEM%]\ntsystem.exe

Rbot.DSB Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run


Rbot.DSB indications of infection

This symptoms of Rbot.DSB detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Wushopen Trojan Information
Removing BackDoor.CCT Backdoor
Remove Klez Trojan

TYPSoft.FTP.Server.remote.Problem Hacker Tool

TYPSoft.FTP.Server.remote.Problem virus description
Technical details:
Categories: Hacker Tool,DoS

TYPSoft.FTP.Server.remote.Problem indications of infection

This symptoms of TYPSoft.FTP.Server.remote.Problem detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrafficHog Adware Symptoms
RCCL.BridgeTrack Tracking Cookie Removal instruction
Removing CWS.AlFaSearch Hijacker
Removing ATDMT.com Tracking Cookie
Silencer Trojan Cleaner

Remote.Hack.Remote.Administration.Tool Backdoor

Remote.Hack.Remote.Administration.Tool virus description
Technical details:
Categories: Backdoor,RAT
Remote.Hack.Remote.Administration.Tool Aliases:
[Kaspersky]Backdoor.RemoteHack.05,Backdoor.RemoteHack.11,Backdoor.RemoteHack.12,Backdoor.RemoteHack.14,Backdoor.RemoteHack.15.a,Backdoor.RemoteHack.15.b;
[McAfee]BackDoor-HX,Generic;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/RemoteHack.1.0,Bck/RemoteHack.1.1,Bck/RemoteHack.12,Bck/RemoteHack.14,Backdoor Program,Backdoor Program.LC;
[Computer Associates]Backdoor/RemoteHack,Win32.RemoteHack.10,Backdoor/RemoveHack.11,Win32.RemoteHack.11,Backdoor/RemoteHack.1_2,Backdoor/RemoteHack.14,Win32.RemoteHack.14,Backdoor/RemoteHack.15,Backdoor/RemoteHack.15.D,Win32.RemoteHack.15,Win32.RemoteHack.15.D

Remote.Hack.Remote.Administration.Tool indications of infection

This symptoms of Remote.Hack.Remote.Administration.Tool detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing LiveProtection Ransomware

Kazaa.cjt1.net Tracking Cookie

Kazaa.cjt1.net virus description
Technical details:
Categories: Tracking Cookie

Kazaa.cjt1.net indications of infection

This symptoms of Kazaa.cjt1.net detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Tibs.br Trojan Removal instruction
Autorun Malware Malware Removal
iChoose BHO Removal

Vxidl.ASG Trojan

Vxidl.ASG virus description
Technical details:
Categories: Trojan

Vxidl.ASG indications of infection

This symptoms of Vxidl.ASG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
DeskAdTop Adware Removal instruction
Removing AutoSearch BHO
Remove Agobot.be Backdoor
Removing Pigeon.ABG Trojan

Frethog.ADX Trojan

Frethog.ADX virus description
Technical details:
Categories: Trojan

Frethog.ADX indications of infection

This symptoms of Frethog.ADX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
eShopee Trojan Information
Matiteman.Mail.Pass.Stealer Trojan Removal
SD.Bot Backdoor Removal
Miewer Trojan Removal instruction
Remove Sinteri Trojan

Findit.Quick.BrowserAid Adware

Findit.Quick.BrowserAid virus description
Technical details:
Categories: Adware,Toolbar

Findit.Quick.BrowserAid Folders:
[%PROGRAM_FILES%]\m i x l i s t e r

Findit.Quick.BrowserAid Files:
[%WINDOWS%]\curdxufku.exe
[%PROGRAM_FILES%]\toolbarsetup.exe\toolbarsetup.exe
[%SYSTEM%]\browseraidtoolbar.dll
[%WINDOWS%]\system\browseraidtoolbar.dll
[%WINDOWS%]\curdxufku.exe
[%PROGRAM_FILES%]\toolbarsetup.exe\toolbarsetup.exe
[%SYSTEM%]\browseraidtoolbar.dll
[%WINDOWS%]\system\browseraidtoolbar.dll

Findit.Quick.BrowserAid Registry Keys:
HKEY_LOCAL_MACHINE\software\classes\clsid\{337d0c1d-4053-4fab-af2b-45c2f7b0faa6}
HKEY_LOCAL_MACHINE\software\mixlister

Findit.Quick.BrowserAid Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar


Findit.Quick.BrowserAid indications of infection

This symptoms of Findit.Quick.BrowserAid detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Best.search Adware Symptoms
CrocoPop Adware Removal instruction
Win32.Cres Adware Symptoms
Remove TrojanClicker.Win32.Delf.ab Trojan
Remove Win95.CIH.remnants Trojan

Pigeon.AZP Trojan

Pigeon.AZP virus description
Technical details:
Categories: Trojan

Pigeon.AZP indications of infection

This symptoms of Pigeon.AZP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.VB.bb Trojan Removal instruction
Removing SPS Trojan
Remove OptixKill Trojan
SillyDl.AIA Trojan Information
WurldMedia.bpboh BHO Removal instruction