PSW.QQMusic Trojan

PSW.QQMusic virus description
Technical details:
Categories: Trojan,Hacker Tool
PSW.QQMusic Aliases:
[Panda]Trojan Horse.LC;
[Computer Associates]Win32/PSW.QQMusic.a!Trojan

PSW.QQMusic indications of infection

This symptoms of PSW.QQMusic detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SecretExplorer DoS Removal
Oboistinn Downloader Removal
NetPal BHO Removal instruction

Zindeart Trojan

Zindeart virus description
Technical details:
Categories: Trojan

Zindeart Files:
[%SYSTEM%]\drivers\Kanguru_SAP\RunSrv.Exe
[%SYSTEM%]\MsMsSrv.DLL
[%SYSTEM%]\drivers\Kanguru_SAP\RunSrv.Exe
[%SYSTEM%]\MsMsSrv.DLL

Zindeart Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\msmssrv


Zindeart indications of infection

This symptoms of Zindeart detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
AppsTraka Spyware Information
Stealthspy.Beta Trojan Information
Removing Lecna Trojan

Bancos.AEA Trojan

Bancos.AEA virus description
Technical details:
Categories: Trojan

Bancos.AEA indications of infection

This symptoms of Bancos.AEA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove carrielynnesworld.com Tracking Cookie

zedo.com Tracking Cookie

zedo.com virus description
Technical details:
Categories: Tracking Cookie

zedo.com indications of infection

This symptoms of zedo.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SpyArsenal.ICQ.Logger Spyware Removal
enBrowser Trojan Cleaner

Backdoor/Worm/Sdbot Worm

Backdoor/Worm/Sdbot virus description
Technical details:
Categories: Worm

Backdoor/Worm/Sdbot Files:
[%SYSTEM%]\scvhost32.exe
[%SYSTEM%]\scvhost32.exe

Backdoor/Worm/Sdbot Registry Values:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices


Backdoor/Worm/Sdbot indications of infection

This symptoms of Backdoor/Worm/Sdbot detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Porno.Top Adware
The.Shield Adware Removal instruction
Stactisu Trojan Removal instruction
Banker.cn Spyware Information
Ricta Trojan Symptoms

Ypsi Trojan

Ypsi virus description
Technical details:
Categories: Trojan

Ypsi indications of infection

This symptoms of Ypsi detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Webext Adware Cleaner
Removing TheRat Trojan
IPConfig Trojan Information
Supervisor.Plus RAT Removal

Sect.Server RAT

Sect.Server virus description
Technical details:
Categories: RAT

Sect.Server indications of infection

This symptoms of Sect.Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
QSD13 Trojan Cleaner
Winpage.Blocker BHO Removal instruction
Removing Adware.WinAd Adware

SubSARI Trojan

SubSARI virus description
Technical details:
Categories: Trojan,Backdoor,RAT
SubSARI Aliases:
[Kaspersky]Backdoor.Subsari.13.a,Backdoor.Subsari.10,Backdoor.Subsari.12,Backdoor.Subsari.14.a,Backdoor.Subsari.145,Backdoor.Subsari.13.b,Backdoor.Subsari.14.b,Backdoor.SuperMM.10.a,Backdoor.SuperMM.10.b;
[Eset]Win32/SubSari.1_3 trojan,Win32/SubSari.1_0 trojan,Win32/SubSari.1_2 trojan;
[McAfee]BackDoor-MV;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/SubSari.13,Bck/SubSari.10b,Bck/SubSari.12,Bck/SubSari.14,Backdoor Program,Bck/Subsari,Bck/Ziti;
[Computer Associates]Backdoor/Subsari.13!Server,Backdoor/Subsari.10,Backdoor/Subsari.12!Server,Backdoor/Subsari.14,Win32.Subsari.14,Backdoor/Subsari.145,Backdoor/Subsari.145!Client,Backdoor/Subsari.145!Server,Backdoor/Subsari.13.b!Server,Backdoor/Subsari.14.b!Server,Backdoor/SuperMM.10.a,Backdoor/SuperMM.10.b

SubSARI indications of infection

This symptoms of SubSARI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Evil.Bot.Server Backdoor
Zlob.Fam.Key Generator Trojan Removal instruction
Aimbot.aj Worm Information

SillyDl.BBT Trojan

SillyDl.BBT virus description
Technical details:
Categories: Trojan

SillyDl.BBT indications of infection

This symptoms of SillyDl.BBT detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove CrocoPop Adware
Removing Chiclen Trojan
Removing DTr.beta Backdoor

UnSpyPC Trojan

UnSpyPC virus description
Technical details:
Categories: Trojan,Ransomware
UnSpyPC Aliases:
[McAfee]UnSpyPC;
[Other]KillAndClean,SafeandClean

UnSpyPC Folders:
[%PROGRAM_FILES%]\KillAndClean
[%PROGRAM_FILES%]\UnSpyPC
[%PROGRAMS%]\KillAndClean

UnSpyPC Files:
[%DESKTOP%]\UnSpyPC Scanner & Monitor.lnk
[%SYSTEM%]\filesafer23.exe
[%SYSTEM%]\kilacln.exe
[%SYSTEM%]\{4E6CBA2C-D692-4DCD-AE1D-B96B0D705428}.exe
[%SYSTEM%]\{761A3A12-B18D-450C-A9A2-AE11214F075E}.exe
[%SYSTEM%]\{9B26E2B7-5703-4F8C-A280-0CD5E708BC13}.exe
[%SYSTEM%]\{BEF65F9A-121B-41E4-95F6-2DDDDFEA6DB5}.exe
[%PROGRAM_FILES%]\UnSpyPC\warez.dat
[%PROGRAM_FILES%]\UnSpyPC\wover.dat
[%DESKTOP%]\Kill & Clean Scanner and Monitor.lnk
[%DESKTOP%]\UnSpyPC Scanner & Monitor.lnk
[%PROGRAMS%]\UnSpyPC\Uninstall.lnk
[%PROGRAMS%]\UnSpyPC\UnSpyPC.lnk
[%DESKTOP%]\UnSpyPC Scanner & Monitor.lnk
[%SYSTEM%]\filesafer23.exe
[%SYSTEM%]\kilacln.exe
[%SYSTEM%]\{4E6CBA2C-D692-4DCD-AE1D-B96B0D705428}.exe
[%SYSTEM%]\{761A3A12-B18D-450C-A9A2-AE11214F075E}.exe
[%SYSTEM%]\{9B26E2B7-5703-4F8C-A280-0CD5E708BC13}.exe
[%SYSTEM%]\{BEF65F9A-121B-41E4-95F6-2DDDDFEA6DB5}.exe
[%PROGRAM_FILES%]\UnSpyPC\warez.dat
[%PROGRAM_FILES%]\UnSpyPC\wover.dat
[%DESKTOP%]\Kill & Clean Scanner and Monitor.lnk
[%DESKTOP%]\UnSpyPC Scanner & Monitor.lnk
[%PROGRAMS%]\UnSpyPC\Uninstall.lnk
[%PROGRAMS%]\UnSpyPC\UnSpyPC.lnk

UnSpyPC Registry Keys:
HKEY_CURRENT_USER\software\killandclean
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Extensions\{BF69DF00-2734-477F-8257-27CD04F88779}
HKEY_CURRENT_USER\Software\UnSpyPC
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\unspypc
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Extensions\{BF69DF00-4734-477F-8257-27CD04F88779}
HKEY_LOCAL_MACHINE\SOFTWARE\UnSpyPC
HKEY_CLASSES_ROOT\clsid\{b38e64af-3400-22ac-c701-cbf9a237575e}
HKEY_CURRENT_USER\software\microsoft\internet explorer\extensions\{bf69df00-2734-477f-8257-27cd04f88779}
HKEY_CURRENT_USER\software\unspypc
HKEY_LOCAL_MACHINE\software\killandclean
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\killandclean

UnSpyPC Registry Values:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\internet explorer\urlsearchhooks
HKEY_CURRENT_USER\software\microsoft\internet explorer\urlsearchhooks
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\unspypc


UnSpyPC indications of infection

This symptoms of UnSpyPC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Boolospy Spyware Information
Loli Trojan Information
Removing Free.Keylogger Spyware

SillyOR Trojan

SillyOR virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
SillyOR Aliases:
[Kaspersky]Vofca.174;
[Panda]Warp;
[Computer Associates]Warp.174

SillyOR indications of infection

This symptoms of SillyOR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanDownloader.Win32.Agent.aw Downloader Cleaner
TrojanDropper.Win32.Small.gt Trojan Information
Remove PC.Weasel Spyware

Tularemia Trojan

Tularemia virus description
Technical details:
Categories: Trojan

Tularemia indications of infection

This symptoms of Tularemia detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GEQ Trojan Removal
Chakameg Trojan Cleaner

RemoteAnything RAT

RemoteAnything virus description
Technical details:
Categories: RAT
RemoteAnything Aliases:
[McAfee]RemoteAnything;
[Panda]Application/RemoteAnything

RemoteAnything indications of infection

This symptoms of RemoteAnything detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MailSpam.Aenima DoS Symptoms
Downconf Trojan Cleaner
Remove Frethog.ACG Trojan
Delf.cc Trojan Removal

Lockjaw Trojan

Lockjaw virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Lockjaw Aliases:
[Kaspersky]Lokjaw.499,Lokjaw.520,Lokjaw.Kenson.573,Flagyll.316,Flagyll.318,Flagyll.369.a,Flagyll.371,Lokjaw.808,Lokjaw.890,Lokjaw.893,Lokjaw.894,Lokjaw.898,Lokjaw.1048,Lokjaw.1052,Lokjaw.1053;
[Eset]Lockjaw.520 virus;
[Panda]Lockjaw.520.A,Lockjaw.894,Lockjaw.898,Lokjaw.Zwei,Lokjaw.1048,Proto_T.1052,Proto_T.1053;
[Computer Associates]Lockjaw,Little Bro 349,Lockjaw.894,Proto-T.1053

Lockjaw indications of infection

This symptoms of Lockjaw detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bitch.Controller Trojan Information
Myss.Variant Adware Cleaner
Phishbank.AUT Trojan Cleaner
roiservice.com Tracking Cookie Symptoms
Crystalys.Media Toolbar Symptoms

Snipernet Trojan

Snipernet virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Snipernet Aliases:
[Kaspersky]Backdoor.SniperNet.21,Backdoor.SniperNet.22,Backdoor.VB.ik;
[Eset]Win32/SniperNet.21 trojan,Win32/Snipernet.22 trojan,Win32/VB.IK trojan;
[McAfee]BackDoor-HY;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Sniper.2.1,Bck/SniperNet.2.2,Bck/SniperNet.21;
[Computer Associates]Backdoor/SniperNet.21!Server,Backdoor/SniperNet.21,Backdoor/Snipernet.22

Snipernet indications of infection

This symptoms of Snipernet detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VBS.Asproot Trojan Symptoms
Fictional.Daemon RAT Removal

NCase.msbb Hijacker

NCase.msbb virus description
Technical details:
Categories: Hijacker

NCase.msbb indications of infection

This symptoms of NCase.msbb detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing ItEye RAT
Removing Poncs Trojan
Remove DeluxeCommunications Adware
Fakealert.DriveCleaner2006 Trojan Cleaner
Pigeon.EBQ Trojan Symptoms

Pigeon.AZC Trojan

Pigeon.AZC virus description
Technical details:
Categories: Trojan

Pigeon.AZC indications of infection

This symptoms of Pigeon.AZC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.ASH Trojan Removal instruction
Backdoor.Pigeon Trojan Information
Wussoe Trojan Removal instruction

Danish.Tiny Trojan

Danish.Tiny virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Danish.Tiny Aliases:
[Kaspersky]Dutch_Tiny.163.a,Dutch_Tiny.191,Dutch_Tiny.310.a,Dutch_Tiny.333.b,Dutch_Tiny.Stigmata,Dutch_Tiny.282,Made.334.a,Dutch_Tiny.251,Dutch_Tiny.308.c,Dutch_Tiny.311.a,Small.124,Tiny.126,Dutch_Tiny.218;
[McAfee]Danish Tiny;
[F-Prot]Danish_tiny.163.A - Dropper,corrupted or intended virus,Made.334 - Dropper;
[Panda]Dutch_Tiny.163.d,Univ,Danish Tiny.310,Kennedy,Stigmata,Dutch_Tiny.282,334,Made.334,Danish Tiny.251,D-Tiny (124.126),Danish Tiny.232;
[Computer Associates]Danish Tiny 191,Danish Tiny 310,Kennedy,Stigmata,Made,Danish Tiny 180,Danish Tiny 126

Danish.Tiny indications of infection

This symptoms of Danish.Tiny detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Keypress Trojan Information
Oemji.Bar BHO Symptoms
Flipped Trojan Symptoms

Small.Dam Downloader

Small.Dam virus description
Technical details:
Categories: Downloader

Small.Dam indications of infection

This symptoms of Small.Dam detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ZSpy.II.99b Trojan Information

Vxidl.ASN Trojan

Vxidl.ASN virus description
Technical details:
Categories: Trojan

Vxidl.ASN indications of infection

This symptoms of Vxidl.ASN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.BUM Trojan Cleaner
Removing Bancos.GNS Trojan
TopFiveSearch Adware Symptoms
Emptybase Trojan Symptoms

Gag Trojan

Gag virus description
Technical details:
Categories: Trojan

Gag indications of infection

This symptoms of Gag detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
BAT.SS Trojan Information
Lineage.ACC Trojan Removal

TrashDir Trojan

TrashDir virus description
Technical details:
Categories: Trojan,Hacker Tool
TrashDir Aliases:
[Panda]Trj/W32.TrashDir;
[Computer Associates]Win32/TrashDir.A!Trojan

TrashDir indications of infection

This symptoms of TrashDir detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SiteHistory BHO Cleaner
Desktop.Advisor Spyware Removal
PassW Trojan Removal
Remove Msudpb.dll BHO
Banner.Date.com Tracking Cookie Symptoms

SentryPC Spyware

SentryPC virus description
Technical details:
Categories: Spyware

SentryPC Folders:
[%APPDATA%]\sacache
[%PROGRAMS%]\sentrypc
[%PROGRAM_FILES%]\sentrypc

SentryPC Files:
[%WINDOWS%]\sbrowse.exe
[%APPDATA%]\tester-acu.dat
[%SYSTEM%]\acopts.dat
[%SYSTEM%]\ntinvisible.dll
[%SYSTEM%]\tester-acopts.dat
[%WINDOWS%]\acsplash.dat
[%WINDOWS%]\acsystem.dll
[%WINDOWS%]\yahoodll.dll
[%WINDOWS%]\sbrowse.exe
[%APPDATA%]\tester-acu.dat
[%SYSTEM%]\acopts.dat
[%SYSTEM%]\ntinvisible.dll
[%SYSTEM%]\tester-acopts.dat
[%WINDOWS%]\acsplash.dat
[%WINDOWS%]\acsystem.dll
[%WINDOWS%]\yahoodll.dll

SentryPC Registry Keys:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\menuorder\start menu\programs\sentrypc

SentryPC Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\sentrypc


SentryPC indications of infection

This symptoms of SentryPC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Power.Linking.Profits.com BHO Symptoms

CSearch BHO

CSearch virus description
Technical details:
Categories: BHO,Toolbar

CSearch Files:
[%SYSTEM%]\csearch.dll
[%WINDOWS%]\system\csearch.dll
[%SYSTEM%]\csearch.dll
[%WINDOWS%]\system\csearch.dll

CSearch Registry Keys:
HKEY_CLASSES_ROOT\clsid\{064cb07a-9ecd-46fd-8e10-1d3c5ff218ca}
HKEY_CLASSES_ROOT\clsid\{d8fa0364-7866-40a7-b340-a6069265ad9f}
HKEY_CLASSES_ROOT\csearch.band
HKEY_CLASSES_ROOT\csearch.band.1
HKEY_CLASSES_ROOT\csearch.redirect
HKEY_CLASSES_ROOT\csearch.redirect.1
HKEY_CLASSES_ROOT\interface\{09c33c5e-2b76-47fe-b97b-9788235a3876}
HKEY_CLASSES_ROOT\interface\{f250a919-fb4b-4120-9f2e-e5fe03fb8202}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{d8fa0364-7866-40a7-b340-a6069265ad9f}
HKEY_CLASSES_ROOT\typelib\{deb0bc8b-7405-4b97-9489-89d72c27678a}
HKEY_LOCAL_MACHINE\software\classes\clsid\{d8fa0364-7866-40a7-b340-a6069265ad9f}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{d8fa0364-7866-40a7-b340-a6069265ad9f}

CSearch Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\search assistant
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\main
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\search
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar


CSearch indications of infection

This symptoms of CSearch detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVKY Trojan Cleaner

Arctic RAT

Arctic virus description
Technical details:
Categories: RAT

Arctic indications of infection

This symptoms of Arctic detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Keenval Downloader
Removing YesLoader Trojan

TrustIn.Bar Trojan

TrustIn.Bar virus description
Technical details:
Categories: Trojan,Adware
TrustIn.Bar Aliases:
[Kaspersky]Adware.Win32.Azesearch.h;
[Other]TrustIn,trustin bar,Adware.TrustInBar,Trustincash

TrustIn.Bar Folders:
[%PROGRAM_FILES%]\TrustIn Contextual
[%PROGRAM_FILES%]\TrustIn Bar
[%PROGRAM_FILES%]\TrustIn Popups
[%PROGRAM_FILES%]\TrustIn Search

TrustIn.Bar Files:
[%WINDOWS%]\adult.ico
[%WINDOWS%]\casino.ico
[%WINDOWS%]\shopping.ico
[%WINDOWS%]\spywareremoval.ico
[%DESKTOP%]\Online Shopping.url
[%DESKTOP%]\Remove Adware.url
[%DESKTOP%]\Sex Personals.url
[%DESKTOP%]\Video Slots.url
[%SYSTEM%]\lcch.dat
[%SYSTEM%]\lut.dat
[%SYSTEM%]\tconini.dat
[%SYSTEM%]\ticads.exe
[%SYSTEM%]\ticont.dll
[%SYSTEM%]\tipp.dat
[%SYSTEM%]\tippcls.dat
[%SYSTEM%]\tips.exe
[%SYSTEM%]\tisa.cnf
[%SYSTEM%]\tisa.dll
[%WINDOWS%]\videoslots.ico
[%WINDOWS%]\adult.ico
[%WINDOWS%]\casino.ico
[%WINDOWS%]\shopping.ico
[%WINDOWS%]\spywareremoval.ico
[%DESKTOP%]\Online Shopping.url
[%DESKTOP%]\Remove Adware.url
[%DESKTOP%]\Sex Personals.url
[%DESKTOP%]\Video Slots.url
[%SYSTEM%]\lcch.dat
[%SYSTEM%]\lut.dat
[%SYSTEM%]\tconini.dat
[%SYSTEM%]\ticads.exe
[%SYSTEM%]\ticont.dll
[%SYSTEM%]\tipp.dat
[%SYSTEM%]\tippcls.dat
[%SYSTEM%]\tips.exe
[%SYSTEM%]\tisa.cnf
[%SYSTEM%]\tisa.dll
[%WINDOWS%]\videoslots.ico

TrustIn.Bar Registry Keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}
HKEY_CLASSES_ROOT\clsid\{2520ba45-3d97-4864-82ff-f47f951727ba}
HKEY_CLASSES_ROOT\clsid\{9b053e00-78d3-47ae-b763-60ff36ff2886}
HKEY_CLASSES_ROOT\interface\{3f38ff1d-e8d7-41f5-8efc-e20d38526cd5}
HKEY_CLASSES_ROOT\interface\{76eb2786-fbc3-45ba-8f5e-5dbb822d499a}
HKEY_CLASSES_ROOT\ticont.mybho
HKEY_CLASSES_ROOT\tisa.mybho
HKEY_CLASSES_ROOT\trustin.activator
HKEY_CLASSES_ROOT\trustin.activator.1
HKEY_CLASSES_ROOT\trustin.stockbar
HKEY_CLASSES_ROOT\trustin.stockbar.1
HKEY_CLASSES_ROOT\typelib\{03959d01-b260-4552-9c05-1c0072e0dd3e}
HKEY_CLASSES_ROOT\typelib\{999887f8-c452-41e5-aca1-a2acd64c5efe}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{2520ba45-3d97-4864-82ff-f47f951727ba}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{9b053e00-78d3-47ae-b763-60ff36ff2886}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\ticont
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\tipu
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\tisa
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\trustin bar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\trustin popups
HKEY_LOCAL_MACHINE\software\trustin bar
HKEY_LOCAL_MACHINE\software\trustin popups

TrustIn.Bar Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\internet settings\user agent\post platform
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run


TrustIn.Bar indications of infection

This symptoms of TrustIn.Bar detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PSW.QQpass.aj Trojan Removal instruction
Removing Iceland Trojan