Vxidl.AVX Trojan

Vxidl.AVX virus description
Technical details:
Categories: Trojan

Vxidl.AVX indications of infection

This symptoms of Vxidl.AVX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PassAlert Trojan Symptoms

CokeCrack Trojan

CokeCrack virus description
Technical details:
Categories: Trojan

CokeCrack indications of infection

This symptoms of CokeCrack detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Second.Sight Spyware Removal instruction

Pigeon.AWJZ Trojan

Pigeon.AWJZ virus description
Technical details:
Categories: Trojan

Pigeon.AWJZ indications of infection

This symptoms of Pigeon.AWJZ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Venuv Trojan Removal instruction
Bancos.GTC Trojan Removal instruction
Remove ExtraToolbar Toolbar
Removing Bomka Trojan
Remove WebSearch BHO

Pigeon.APJ Trojan

Pigeon.APJ virus description
Technical details:
Categories: Trojan

Pigeon.APJ indications of infection

This symptoms of Pigeon.APJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GXV Trojan Removal instruction
Remove Sex.Niche.Guide Toolbar

TrojanDropper.Win32.Delf.bw Trojan

TrojanDropper.Win32.Delf.bw virus description
Technical details:
Categories: Trojan
TrojanDropper.Win32.Delf.bw Aliases:
[Panda]Trojan Horse

TrojanDropper.Win32.Delf.bw indications of infection

This symptoms of TrojanDropper.Win32.Delf.bw detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ABCKeylogger Spyware Information

WebSearch BHO

WebSearch virus description
Technical details:
Categories: BHO,Hijacker,Toolbar
WebSearch Aliases:
[Panda]Trojan Horse

WebSearch Folders:
[%COMMON_PROGRAMS%]\Web Search Tools
[%PROGRAM_FILES_COMMON%]\wintools
[%PROGRAM_FILES%]\toolbar
[%PROFILE%]\start menu\web search tools
[%PROGRAMS%]\web search tools
[%PROGRAM_FILES%]\common files\wintools
[%PROGRAM_FILES%]\websearch toolbar

WebSearch Files:
[%PROFILE_TEMP%]\iexploreskins.exe
[%PROFILE_TEMP%]\CAB41633\zwipvbh.wzg
[%PROFILE_TEMP%]\CAB70283\zwipvbh.wzg
[%PROFILE_TEMP%]\CAB94510\zwipvbh.wzg
[%PROFILE_TEMP%]\hotfix.exe
[%PROFILE_TEMP%]\IExploreSkins.exe
[%PROFILE_TEMP%]\msiein\CAB38140.6678994792\IExploreSkins.exe
[%PROFILE_TEMP%]\tbps.exe
[%PROFILE_TEMP%]\temp.fr????
[%PROFILE_TEMP%]\temp.fr????\WToolsC.cfg
[%PROFILE_TEMP%]\temp.fr????\WToolsT.dll
[%PROFILE_TEMP%]\toolbar.dll
[%PROFILE_TEMP%]\WToolsB.dll
[%PROGRAM_FILES%]\Crawler\Toolbar\CTConf.dat
[%PROGRAM_FILES%]\MySearch\bar\1.bin\S4BAR.DLL
[%PROGRAM_FILES%]\MySearch\bar\2.bin\S4BAR.DLL
[%PROGRAM_FILES_COMMON%]\WinTools\WSup.exe
[%PROGRAM_FILES_COMMON%]\WinTools\WToolsA.exe
[%PROGRAM_FILES_COMMON%]\WinTools\WToolsC.cfg
[%PROGRAM_FILES_COMMON%]\WinTools\WToolsD.cfg
[%SYSTEM%]\1lfc8c5t.dat
[%SYSTEM%]\5kc716be.dat
[%SYSTEM%]\5s72altp.dat
[%SYSTEM%]\6v77fbg9.dat
[%SYSTEM%]\ap2nqrd4.dat
[%SYSTEM%]\Cache\EDow_AS2_r.exe
[%SYSTEM%]\gl9kghup.dat
[%SYSTEM%]\gpg4dpeh.dat
[%SYSTEM%]\kqbu0obd.dat
[%SYSTEM%]\m3205dvn.dat
[%SYSTEM%]\na66t24r.dat
[%SYSTEM%]\nl5b8i3l.dat
[%SYSTEM%]\pplogo48x48.ico
[%SYSTEM%]\q10pvbrv.dat
[%SYSTEM%]\rp7oakvm.dat
[%SYSTEM%]\tbps.ini
[%SYSTEM%]\tm97pj39.dat
[%SYSTEM%]\v2kgiq720.dat
[%SYSTEM%]\vnocnh0c.dat
[%SYSTEM%]\WinTools.exe
[%WINDOWS%]\eMusicSetup.exe
[%WINDOWS%]\partypocker.ico
[%WINDOWS%]\partypocker4.ico
[%WINDOWS%]\partypocker6.ico
[%WINDOWS%]\Temp\baAjAGE8.exe
[%WINDOWS%]\Temp\eyDsN5tC.exe
[%WINDOWS%]\Temp\gz0OcFAV.exe
[%WINDOWS%]\Temp\MRobeF0H.exe
[%WINDOWS%]\Temp\muwLPrdj.exe
[%WINDOWS%]\Temp\wTDBBlxh.exe
[%WINDOWS%]\Temp\X2CrBD4t.exe
[%WINDOWS%]\Temp\zemTaXIx.exe
[%PROFILE%]\locals~1\temp\iexploreskins.exe
[%PROFILE_TEMP%]\mso9cbcb.ppt
[%PROFILE_TEMP%]\wintools.exe
[%SYSTEM%]\aaaamon0.exe
[%SYSTEM%]\appmgr00.exe
[%SYSTEM%]\browseui.exe
[%SYSTEM%]\certcli8.exe
[%SYSTEM%]\comcat94.exe
[%SYSTEM%]\msnycl.exe
[%SYSTEM%]\msrolfn.exe
[%SYSTEM%]\spotonbh.dll
[%WINDOWS%]\fash.exe
[%WINDOWS%]\system\spotonbh.dll
[%WINDOWS%]\winmem32.exe
[%PROFILE_TEMP%]\iexploreskins.exe
[%PROFILE_TEMP%]\CAB41633\zwipvbh.wzg
[%PROFILE_TEMP%]\CAB70283\zwipvbh.wzg
[%PROFILE_TEMP%]\CAB94510\zwipvbh.wzg
[%PROFILE_TEMP%]\hotfix.exe
[%PROFILE_TEMP%]\IExploreSkins.exe
[%PROFILE_TEMP%]\msiein\CAB38140.6678994792\IExploreSkins.exe
[%PROFILE_TEMP%]\tbps.exe
[%PROFILE_TEMP%]\temp.fr????
[%PROFILE_TEMP%]\temp.fr????\WToolsC.cfg
[%PROFILE_TEMP%]\temp.fr????\WToolsT.dll
[%PROFILE_TEMP%]\toolbar.dll
[%PROFILE_TEMP%]\WToolsB.dll
[%PROGRAM_FILES%]\Crawler\Toolbar\CTConf.dat
[%PROGRAM_FILES%]\MySearch\bar\1.bin\S4BAR.DLL
[%PROGRAM_FILES%]\MySearch\bar\2.bin\S4BAR.DLL
[%PROGRAM_FILES_COMMON%]\WinTools\WSup.exe
[%PROGRAM_FILES_COMMON%]\WinTools\WToolsA.exe
[%PROGRAM_FILES_COMMON%]\WinTools\WToolsC.cfg
[%PROGRAM_FILES_COMMON%]\WinTools\WToolsD.cfg
[%SYSTEM%]\1lfc8c5t.dat
[%SYSTEM%]\5kc716be.dat
[%SYSTEM%]\5s72altp.dat
[%SYSTEM%]\6v77fbg9.dat
[%SYSTEM%]\ap2nqrd4.dat
[%SYSTEM%]\Cache\EDow_AS2_r.exe
[%SYSTEM%]\gl9kghup.dat
[%SYSTEM%]\gpg4dpeh.dat
[%SYSTEM%]\kqbu0obd.dat
[%SYSTEM%]\m3205dvn.dat
[%SYSTEM%]\na66t24r.dat
[%SYSTEM%]\nl5b8i3l.dat
[%SYSTEM%]\pplogo48x48.ico
[%SYSTEM%]\q10pvbrv.dat
[%SYSTEM%]\rp7oakvm.dat
[%SYSTEM%]\tbps.ini
[%SYSTEM%]\tm97pj39.dat
[%SYSTEM%]\v2kgiq720.dat
[%SYSTEM%]\vnocnh0c.dat
[%SYSTEM%]\WinTools.exe
[%WINDOWS%]\eMusicSetup.exe
[%WINDOWS%]\partypocker.ico
[%WINDOWS%]\partypocker4.ico
[%WINDOWS%]\partypocker6.ico
[%WINDOWS%]\Temp\baAjAGE8.exe
[%WINDOWS%]\Temp\eyDsN5tC.exe
[%WINDOWS%]\Temp\gz0OcFAV.exe
[%WINDOWS%]\Temp\MRobeF0H.exe
[%WINDOWS%]\Temp\muwLPrdj.exe
[%WINDOWS%]\Temp\wTDBBlxh.exe
[%WINDOWS%]\Temp\X2CrBD4t.exe
[%WINDOWS%]\Temp\zemTaXIx.exe
[%PROFILE%]\locals~1\temp\iexploreskins.exe
[%PROFILE_TEMP%]\mso9cbcb.ppt
[%PROFILE_TEMP%]\wintools.exe
[%SYSTEM%]\aaaamon0.exe
[%SYSTEM%]\appmgr00.exe
[%SYSTEM%]\browseui.exe
[%SYSTEM%]\certcli8.exe
[%SYSTEM%]\comcat94.exe
[%SYSTEM%]\msnycl.exe
[%SYSTEM%]\msrolfn.exe
[%SYSTEM%]\spotonbh.dll
[%WINDOWS%]\fash.exe
[%WINDOWS%]\system\spotonbh.dll
[%WINDOWS%]\winmem32.exe

WebSearch Registry Keys:
HKEY_CLASSES_ROOT\btlink.relatedlinksprotocol
HKEY_CLASSES_ROOT\btlink.resprotocol
HKEY_CLASSES_ROOT\clsid\{15ad6789-cdb4-47e1-a9da-992ee8e6bad6}
HKEY_CLASSES_ROOT\clsid\{2c4e6d22-b71f-491f-aad3-b6972a650d50}
HKEY_CLASSES_ROOT\clsid\{310cc549-4541-46a9-940f-52b342a6e682}
HKEY_CLASSES_ROOT\CLSID\{339BB23F-A864-48C0-A59F-29EA915965EC}
HKEY_CLASSES_ROOT\clsid\{3c53010d-97ba-4650-84c5-1a6faa31055e}
HKEY_CLASSES_ROOT\clsid\{69357d4e-bf4d-4651-91e9-52ecd45a0128}
HKEY_CLASSES_ROOT\clsid\{6e21f428-5617-47f7-aed8-b2e1d8fba711}
HKEY_CLASSES_ROOT\clsid\{708be496-e202-497b-bc31-9cf47e3bf8d6}
HKEY_CLASSES_ROOT\CLSID\{8952A998-1E7E-4716-B23D-3DBE03910972}
HKEY_CLASSES_ROOT\clsid\{8b0fa130-0c3d-4cb1-aeb7-2c29da5509a3}
HKEY_CLASSES_ROOT\CLSID\{8DA5457F-A8AA-4CCF-A842-70E6FD274094}
HKEY_CLASSES_ROOT\clsid\{af8b3c81-cd19-45fb-b6be-160d27711de8}
HKEY_CLASSES_ROOT\clsid\{bbf122a7-8a4d-45b5-9e00-0f68bc87c904}
HKEY_CLASSES_ROOT\clsid\{cae0999f-78c5-49dc-9f30-13142aaaaba4}
HKEY_CLASSES_ROOT\clsid\{cd8d1caa-fe4a-45df-a06c-028aaf1821de}
HKEY_CLASSES_ROOT\CLSID\{D6DFF6D8-B94B-4720-B730-1C38C7065C3B}
HKEY_CLASSES_ROOT\CLSID\{FF76A5DA-6158-4439-99FF-EDC1B3FE100C}
HKEY_CLASSES_ROOT\common.buttons
HKEY_CLASSES_ROOT\interface\{234f09fb-fe89-4c6d-9203-31832fc051c3}
HKEY_CLASSES_ROOT\interface\{365b9a54-e613-46e5-9db1-4f91a9de80bd}
HKEY_CLASSES_ROOT\interface\{618be527-b7f5-417c-bc51-98fdc2d6de61}
HKEY_CLASSES_ROOT\interface\{66c22569-f05c-4a70-a142-763b337e1002}
HKEY_CLASSES_ROOT\interface\{6f59d850-a155-4930-98ae-689a2bc7b8e8}
HKEY_CLASSES_ROOT\interface\{7b8bd940-b1ef-460c-85a2-9acaaf7f9303}
HKEY_CLASSES_ROOT\interface\{99aa88d1-d9d3-410a-be9e-044f94c183da}
HKEY_CLASSES_ROOT\interface\{c380566d-f343-42ab-987b-6b38a1a35747}
HKEY_CLASSES_ROOT\interface\{d1951679-1d52-43fc-9585-0737143585f5}
HKEY_CLASSES_ROOT\interface\{f273d4ea-2025-4410-8408-251a0cd46be7}
HKEY_CLASSES_ROOT\PROTOCOLS\Handler\tpro
HKEY_CLASSES_ROOT\protocols\name-space handler\res
HKEY_CLASSES_ROOT\radio.radioplayer
HKEY_CLASSES_ROOT\tbps.plugincfgobj
HKEY_CLASSES_ROOT\tbps.pluginconfig
HKEY_CLASSES_ROOT\tbps.plugindown
HKEY_CLASSES_ROOT\tbps.plugindownadd
HKEY_CLASSES_ROOT\tbps.pluginevents
HKEY_CLASSES_ROOT\tbps.plugininst
HKEY_CLASSES_ROOT\tbps.pluginserver
HKEY_CLASSES_ROOT\tbps.toolbarscript
HKEY_CLASSES_ROOT\toolbar.itoolbarscriptclass
HKEY_CLASSES_ROOT\toolbar.resprotocol
HKEY_CLASSES_ROOT\typelib\{37ac49e3-e906-4bd8-ae83-d0f7fb48fd17}
HKEY_CLASSES_ROOT\typelib\{b23b3add-84b1-414a-92b9-0cabe5a781f4}
HKEY_CURRENT_USER\software\btiein
HKEY_CURRENT_USER\software\btlink
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\toolbar
HKEY_LOCAL_MACHINE\software\btiein
HKEY_LOCAL_MACHINE\software\btlink
HKEY_LOCAL_MACHINE\software\classes\clsid\{1d4db7d2-6ec9-47a3-bd87-1e41684e07bb}
HKEY_LOCAL_MACHINE\software\classes\interface\{1d4db7d1-6ec9-47a3-bd87-1e41684e07bb}
HKEY_LOCAL_MACHINE\software\classes\interface\{1d4db7d3-6ec9-47a3-bd87-1e41684e07bb}
HKEY_LOCAL_MACHINE\software\classes\interface\{bd6f129a-08db-4cc5-a75a-f2ab79e55b6e}
HKEY_LOCAL_MACHINE\software\classes\toolbar.itoolbarscriptclass
HKEY_LOCAL_MACHINE\software\classes\typelib\{1d4db7d0-6ec9-47a3-bd87-1e41684e07bb}
HKEY_LOCAL_MACHINE\software\classes\typelib\{8992b6ca-b8c9-4aed-bf89-0a17f6296a06}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{26E8361F-BCE7-4F75-A347-98C88B418322}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{87067F04-DE4C-4688-BC3C-4FCF39D609E7}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{87766247-311C-43B4-8499-3D5FEC94A183}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8952A998-1E7E-4716-B23D-3DBE03910972}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8DA5457F-A8AA-4CCF-A842-70E6FD274094}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D6DFF6D8-B94B-4720-B730-1C38C7065C3B}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata\sto
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\c:\windows\downloaded program files\qdow_as2.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\hauto_uninstall
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\ttool_uninstall
HKEY_LOCAL_MACHINE\software\toolbar
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\tbpssvc
HKEY_USERS\.default\software\toolbar
HKEY_CLASSES_ROOT\btieinscriptconfigproj.btieinscriptc
HKEY_CLASSES_ROOT\btieinscriptconfigproj.btieinscriptconfig
HKEY_CLASSES_ROOT\clsid\{001dae60-95c0-11d3-924e-009027950886}
HKEY_CLASSES_ROOT\clsid\{26e8361f-bce7-4f75-a347-98c88b418322}
HKEY_CLASSES_ROOT\clsid\{339bb23f-a864-48c0-a59f-29ea915965ec}
HKEY_CLASSES_ROOT\clsid\{356639aa-e878-40ff-b2f8-e22fa87df389}
HKEY_CLASSES_ROOT\clsid\{63b78bc1-a711-4d46-ad2f-c581ac420d41}
HKEY_CLASSES_ROOT\clsid\{8952a998-1e7e-4716-b23d-3dbe03910972}
HKEY_CLASSES_ROOT\clsid\{8da5457f-a8aa-4ccf-a842-70e6fd274094}
HKEY_CLASSES_ROOT\clsid\{cabcf5e7-0c79-4f1c-909d-b9cf68fed746}
HKEY_CLASSES_ROOT\clsid\{d6dff6d8-b94b-4720-b730-1c38c7065c3b}
HKEY_CLASSES_ROOT\clsid\{f1616b86-9288-489d-b71a-0ccf2f1a89da}
HKEY_CLASSES_ROOT\clsid\{fb45c451-b0e9-4407-bb6a-9361013f3e9a}
HKEY_CLASSES_ROOT\clsid\{ff76a5da-6158-4439-99ff-edc1b3fe100c}
HKEY_CLASSES_ROOT\interface\{26e8361f-bce7-4f75-a347-98c88b418321}
HKEY_CLASSES_ROOT\protocols\handler\relatedlinks
HKEY_CLASSES_ROOT\protocols\handler\tpro
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{001dae60-95c0-11d3-924e-009027950886}
HKEY_CLASSES_ROOT\ssaver.saverobj
HKEY_CLASSES_ROOT\typelib\{5cf68a06-673d-4619-a805-c8fc9ac611dd}
HKEY_CLASSES_ROOT\typelib\{db9a4e78-35df-4a54-b6c5-c5190ceaf949}
HKEY_LOCAL_MACHINE\software\classes\clsid\{001dae60-95c0-11d3-924e-009027950886}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{26e8361f-bce7-4f75-a347-98c88b418322}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{87067f04-de4c-4688-bc3c-4fcf39d609e7}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{001dae60-95c0-11d3-924e-009027950886}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{63b78bc1-a711-4d46-ad2f-c581ac420d41}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{87766247-311c-43b4-8499-3d5fec94a183}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{8952a998-1e7e-4716-b23d-3dbe03910972}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{8da5457f-a8aa-4ccf-a842-70e6fd274094}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{d6dff6d8-b94b-4720-b730-1c38c7065c3b}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]\downloaded program files\qdow_as2.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\btlink_dll

WebSearch Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\urlsearchhooks
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_USERS\.default\software\microsoft\internet explorer\urlsearchhooks
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\urlsearchhooks
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\main
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\main
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\main
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\main
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\main
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\search
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\search
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\search
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\search
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\urlsearchhooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonce
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonceex\0001
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list


WebSearch indications of infection

This symptoms of WebSearch detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Delf.rc Trojan Removal instruction
Wincontrol Trojan Cleaner

SillyDl.CTM Trojan

SillyDl.CTM virus description
Technical details:
Categories: Trojan

SillyDl.CTM indications of infection

This symptoms of SillyDl.CTM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.ATE Downloader Removal instruction
PWS.Super.Bowl.XLI Trojan Cleaner

Sincom Trojan

Sincom virus description
Technical details:
Categories: Trojan,Spyware,Hacker Tool
Sincom Aliases:
[Kaspersky]TrojanSpy.Win32.Sincom.a;
[Panda]Trojan Horse.LC,Trj/PSW.Sincom,Trj/Sincom.C,Trojan Horse;
[Computer Associates]Win32/Sincom.A!Spy!Trojan,Win32.Sincom,Win32/Sincom!PWS!DLL!Trojan,Win32/Sincom!PWS!Trojan,Win32/Sincom.O!Spy!Trojan,Win32.Sincom.C,Win32/PSW.Tiant!DLL!Trojan,Win32.Sincom.B,Win32/Kvfw!Trojan,Win32/Sincom.Y!Spy!Trojan

Sincom indications of infection

This symptoms of Sincom detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
OEMFinder Trojan Information
Hail Trojan Removal
Win.Spy Spyware Removal instruction
Removing SillyDl.DAV Trojan
Pigeon.ATC Trojan Information

Delf.er Backdoor

Delf.er virus description
Technical details:
Categories: Backdoor

Delf.er indications of infection

This symptoms of Delf.er detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Kedad Trojan Information
Downloader.BBS Downloader Symptoms
TrojanDropper.Win32.VB.bj Trojan Removal instruction

Qoogler Hijacker

Qoogler virus description
Technical details:
Categories: Hijacker

Qoogler Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\internet settings\zonemap\domains\qoogler.com\www


Qoogler indications of infection

This symptoms of Qoogler detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Nanpy.A Worm
SearchNugget Adware Symptoms
Removing Redvoz Trojan

SillyDl.DDD Trojan

SillyDl.DDD virus description
Technical details:
Categories: Trojan

SillyDl.DDD indications of infection

This symptoms of SillyDl.DDD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MDSA.Sentinel Spyware Information
Spot.Bot Trojan Information

Bancos.FWY Trojan

Bancos.FWY virus description
Technical details:
Categories: Trojan

Bancos.FWY indications of infection

This symptoms of Bancos.FWY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PigSearch Trojan Cleaner
SupaSeek Toolbar Information
DeskAlerts Adware Information

Timetrav.joke Trojan

Timetrav.joke virus description
Technical details:
Categories: Trojan
Timetrav.joke Aliases:
[McAfee]Timetrav joke

Timetrav.joke indications of infection

This symptoms of Timetrav.joke detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Vxidl.ACK Trojan
Removing Win.Steal Trojan
QinqDL Trojan Information

web.stat.com Tracking Cookie

web.stat.com virus description
Technical details:
Categories: Tracking Cookie

web.stat.com indications of infection

This symptoms of web.stat.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
BackDoor.CFE Trojan Cleaner
Removing SearchV Hijacker
Remove Phobi Trojan
Remove BHOMoneyGainer Adware
Pigeon.AUK Trojan Removal instruction

SillyDl.DDH Downloader

SillyDl.DDH virus description
Technical details:
Categories: Downloader
SillyDl.DDH Aliases:
[Other]Win32/SillyDl.DDH

SillyDl.DDH indications of infection

This symptoms of SillyDl.DDH detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VBVirul Trojan Removal instruction

System61 BHO

System61 virus description
Technical details:
Categories: BHO,Hijacker,Toolbar

System61 Files:
[%SYSTEM%]\system61.dll
[%WINDOWS%]\system\system61.dll
[%SYSTEM%]\system61.dll
[%WINDOWS%]\system\system61.dll

System61 Registry Keys:
HKEY_CLASSES_ROOT\clsid\{c7967580-5f17-11d4-aac2-0000b4936e0c}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{c7967580-5f17-11d4-aac2-0000b4936e0c}
HKEY_LOCAL_MACHINE\software\classes\clsid\{c7967580-5f17-11d4-aac2-0000b4936e0c}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{c7967580-5f17-11d4-aac2-0000b4936e0c}


System61 indications of infection

This symptoms of System61 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SpyDefender.Pro Ransomware Information

CaiShow Adware

CaiShow virus description
Technical details:
Categories: Adware
CaiShow Aliases:
[Kaspersky]AdWare.Win32.Dm.e;
[Other]Adware.Caishow

CaiShow Folders:
[%PROGRAM_FILES%]\CaiShow Tech

CaiShow Files:
[%PROFILE_TEMP%]\caishow.exe
[%PROGRAM_FILES%]\Internet Explorer\PLUGINS\caishow.exe
[%SYSTEM%]\caishow.exe
[%PROFILE_TEMP%]\caishow.exe
[%PROGRAM_FILES%]\Internet Explorer\PLUGINS\caishow.exe
[%SYSTEM%]\caishow.exe

CaiShow Registry Keys:
HKEY_CLASSES_ROOT\appid\browerhelpermfc.dll
HKEY_CLASSES_ROOT\appid\my.dll
HKEY_CLASSES_ROOT\appid\ssoaddionalindical.dll
HKEY_CLASSES_ROOT\appid\{18e8c855-ff2e-4beb-b9d2-e7b25af92a48}
HKEY_CLASSES_ROOT\appid\{37bc804e-e26b-4d09-836f-ac15fc0c253e}
HKEY_CLASSES_ROOT\appid\{fbb4d7ba-ccd3-457d-beff-f3b1757bd6b1}
HKEY_CLASSES_ROOT\browerhelpermfc.caishowbh
HKEY_CLASSES_ROOT\browerhelpermfc.caishowbh.1
HKEY_CLASSES_ROOT\clsid\{dd6c4862-4bf9-48ce-bd27-9838e30d3dd5}
HKEY_CLASSES_ROOT\interface\{315420b2-e5c8-4e7b-b812-6676ba4f30ce}
HKEY_CLASSES_ROOT\interface\{6ca6de10-8705-4e1b-9117-bcfa5bece14b}
HKEY_CLASSES_ROOT\interface\{ce98ad53-16f1-48d3-9208-1203aa19f77e}
HKEY_CLASSES_ROOT\interface\{d32d8a55-a21a-4237-b8bb-5a5ebee6746d}
HKEY_CLASSES_ROOT\interface\{dbd14208-5f2f-40b8-8d97-6de44c1d2e3d}
HKEY_CLASSES_ROOT\interface\{dc616c5a-3bd6-4774-9823-f20802655811}
HKEY_CLASSES_ROOT\interface\{f6ce85c8-99e7-49f5-a1a2-03ffc4ff09a5}
HKEY_CLASSES_ROOT\my.netaccelerate
HKEY_CLASSES_ROOT\my.netaccelerate.1
HKEY_CLASSES_ROOT\ssoaddionalindical.identify
HKEY_CLASSES_ROOT\ssoaddionalindical.identify.1
HKEY_CLASSES_ROOT\typelib\{1f805a43-0e95-4245-8eaf-9271d520722a}
HKEY_CLASSES_ROOT\typelib\{73d53d7b-66df-419b-9b44-cf3f42adf5c9}
HKEY_CLASSES_ROOT\typelib\{864f198d-6568-4686-b4f5-4a970b85e58b}
HKEY_CLASSES_ROOT\typelib\{89a99589-82b0-4983-a882-e8d8db3da5c7}
HKEY_CLASSES_ROOT\typelib\{cebe027d-5423-41b8-af51-9f1c22557cc6}
HKEY_CLASSES_ROOT\typelib\{d0581d47-e3cb-402d-b8a6-5f8561b2a36c}
HKEY_CURRENT_USER\software\classes\download.download
HKEY_CURRENT_USER\software\classes\download.download.1
HKEY_CURRENT_USER\software\microsoft\installer\upgradecodes\51d767ec8af379d43b3e631a28e7def7
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\ext\stats\{3af40cb8-b3ba-4e2d-8968-4bf8db172997}
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\ext\stats\{5673a7c0-95cc-4646-bb07-3bd71234cef9}
HKEY_LOCAL_MACHINE\software\caishow
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\upgradecodes\51d767ec8af379d43b3e631a28e7def7
HKEY_CLASSES_ROOT\clsid\{3af40cb8-b3ba-4e2d-8968-4bf8db172997}
HKEY_CLASSES_ROOT\clsid\{5673a7c0-95cc-4646-bb07-3bd71234cef9}
HKEY_CURRENT_USER\software\classes\appid\download.dll
HKEY_CURRENT_USER\software\classes\appid\mmsfactory.dll
HKEY_CURRENT_USER\software\classes\appid\mmssend.dll
HKEY_CURRENT_USER\software\classes\appid\{22a36e6e-07cb-4851-aa84-5fc1ca73a1de}
HKEY_CURRENT_USER\software\classes\appid\{88abd365-12ae-44e7-8450-da5c3653325b}
HKEY_CURRENT_USER\software\classes\appid\{f375f726-23d3-4179-9ca2-54fe6e490879}
HKEY_CURRENT_USER\software\classes\clsid\{0e6e0b51-0300-4ae2-b6c4-f4efe33a33b2}
HKEY_CURRENT_USER\software\classes\clsid\{32f64094-a155-4554-8753-e5e267a8c002}
HKEY_CURRENT_USER\software\classes\clsid\{6abb6c58-feb7-43ae-946a-af05d074f493}
HKEY_CURRENT_USER\software\classes\interface\{315420b2-e5c8-4e7b-b812-6676ba4f30ce}
HKEY_CURRENT_USER\software\classes\interface\{dbd14208-5f2f-40b8-8d97-6de44c1d2e3d}
HKEY_CURRENT_USER\software\classes\interface\{dc616c5a-3bd6-4774-9823-f20802655811}
HKEY_CURRENT_USER\software\classes\interface\{f6ce85c8-99e7-49f5-a1a2-03ffc4ff09a5}
HKEY_CURRENT_USER\software\classes\mmsfactory.send
HKEY_CURRENT_USER\software\classes\mmsfactory.send.1
HKEY_CURRENT_USER\software\classes\mmssend.send
HKEY_CURRENT_USER\software\classes\mmssend.send.1
HKEY_CURRENT_USER\software\microsoft\installer\features\8d15efaff3f76694e8331e3d97fe51d7
HKEY_CURRENT_USER\software\microsoft\installer\products\8d15efaff3f76694e8331e3d97fe51d7
HKEY_CURRENT_USER\software\microsoft\internet explorer\menuext\[chinese characters]
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{3af40cb8-b3ba-4e2d-8968-4bf8db172997}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{5673a7c0-95cc-4646-bb07-3bd71234cef9}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata\s-1-5-18\components\14aa5729dada23d2f57c1c2297718ac2
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\userdata\[user sid]\products\8d15efaff3f76694e8331e3d97fe51d7

CaiShow Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\folders
HKEY_CLASSES_ROOT\appid\download.dll
HKEY_CLASSES_ROOT\appid\mmsfactory.dll
HKEY_CLASSES_ROOT\appid\mmssend.dll
HKEY_CURRENT_USER\appid\download.dll
HKEY_CURRENT_USER\appid\mmsfactory.dll
HKEY_CURRENT_USER\appid\mmssend.dll
HKEY_CURRENT_USER\clsid\{0e6e0b51-0300-4ae2-b6c4-f4efe33a33b2}\inprocserver32
HKEY_CURRENT_USER\clsid\{32f64094-a155-4554-8753-e5e267a8c002}\inprocserver32
HKEY_CURRENT_USER\clsid\{6abb6c58-feb7-43ae-946a-af05d074f493}\inprocserver32
HKEY_CURRENT_USER\interface\{315420b2-e5c8-4e7b-b812-6676ba4f30ce}\typelib
HKEY_CURRENT_USER\interface\{dbd14208-5f2f-40b8-8d97-6de44c1d2e3d}\typelib
HKEY_CURRENT_USER\interface\{dc616c5a-3bd6-4774-9823-f20802655811}\typelib
HKEY_CURRENT_USER\interface\{f6ce85c8-99e7-49f5-a1a2-03ffc4ff09a5}\typelib
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run


CaiShow indications of infection

This symptoms of CaiShow detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Middle Trojan
Agent.BSO Trojan Removal

Sphere Backdoor

Sphere virus description
Technical details:
Categories: Backdoor,RAT
Sphere Aliases:
[Kaspersky]Backdoor.SevenSphere.20;
[Panda]Backdoor Program,Bck/SevenSphere;
[Computer Associates]Backdoor/SevenSphere.20,Backdoor/Sphere.20,Win32.Sphere.20

Sphere indications of infection

This symptoms of Sphere detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
YellowPages Adware Information
SpyAgent Spyware Information
Pigeon.ANK Trojan Cleaner

Theef.Beta.Public RAT

Theef.Beta.Public virus description
Technical details:
Categories: RAT

Theef.Beta.Public indications of infection

This symptoms of Theef.Beta.Public detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.EVA Trojan
SHHS Trojan Information
Connob Trojan Cleaner
Remove Oplads Trojan
Roogoo Trojan Symptoms

Vxidl.BAZ Trojan

Vxidl.BAZ virus description
Technical details:
Categories: Trojan

Vxidl.BAZ indications of infection

This symptoms of Vxidl.BAZ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Corrupted.Lite Spyware Symptoms

Bancos.HND Trojan

Bancos.HND virus description
Technical details:
Categories: Trojan

Bancos.HND indications of infection

This symptoms of Bancos.HND detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Exploit.SMBDie Trojan
Screen.Screw Trojan Removal instruction

IGMP.Lanxue DoS

IGMP.Lanxue virus description
Technical details:
Categories: DoS
IGMP.Lanxue Aliases:
[Panda]DoS Program,DoS/IGMP.Laxue;
[Computer Associates]Win32/IGMP.Lanxue.C!Trojan

IGMP.Lanxue indications of infection

This symptoms of IGMP.Lanxue detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Win32.Calmiss Adware
Remove Essm Adware
PSW.Lmir.fo Trojan Cleaner
Removing Win32.Terminate Trojan
Remove Dan Trojan

Slimline Trojan

Slimline virus description
Technical details:
Categories: Trojan
Slimline Aliases:
[Kaspersky]SlimLine.230;
[McAfee]Univ/b;
[F-Prot]Slimline.230;
[Panda]Slimline;
[Computer Associates]Slimline.230

Slimline indications of infection

This symptoms of Slimline detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ErrClean Ransomware Symptoms
MyCpMads.Browser.Optimiser BHO Cleaner
BlazeFind.variant BHO Cleaner

Arab RAT

Arab virus description
Technical details:
Categories: RAT
Arab Aliases:
[Eset]Arab virus;
[Panda]Arab;
[Computer Associates]Arab

Arab indications of infection

This symptoms of Arab detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HCI Trojan Cleaner
Removing Netmail Trojan
Win32.Hotmail.C!Flooder!Trojan DoS Cleaner

Bancos.AZV Trojan

Bancos.AZV virus description
Technical details:
Categories: Trojan

Bancos.AZV indications of infection

This symptoms of Bancos.AZV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Antigen Trojan Information
SeeqBar Adware Information
Golden.Keylogger Spyware Symptoms

NakedBind Trojan

NakedBind virus description
Technical details:
Categories: Trojan

NakedBind indications of infection

This symptoms of NakedBind detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ditul Trojan Symptoms
Remove Pigeon.AWIE Trojan

QDel143 Trojan

QDel143 virus description
Technical details:
Categories: Trojan,Hacker Tool
QDel143 Aliases:
[Kaspersky]Trojan.BAT.Deltree.b,Trojan.BAT.Deltree.f,Trojan.Deltree.e,Trojan.Deltree.f,Trojan.Win32.Deltree.a;
[McAfee]QDel143,QDel89,QDel91;
[F-Prot]destructive program;
[Panda]BAT/DelTree.A,Trj/Deltree.E,Trj/Deltree.F,Trj/W32.Deltree.a;
[Computer Associates]Bat/IVAN!Trojan,Deltree.5685!Trojan,Deltree.L!Trojan,Win32/Deltree.E!Trojan

QDel143 indications of infection

This symptoms of QDel143 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
KeyLog.KLogger Trojan Cleaner
Skiks Trojan Removal instruction
AUpdate Adware Removal instruction
Piolet Worm Removal instruction

probably Trojan

probably virus description
Technical details:
Categories: Trojan,Worm,Backdoor,Downloader,Hacker Tool,DoS
probably Aliases:
[Kaspersky]Rajaat.245,Trivial.121.a,Riot.Evil.769,Riot.Evil.811,StealthBoot.a,StealthBoot.b,Technogad.2448,Trivial.Bre.223,Tmtm.441,Virogen.1673,Trivial.42.d,Trivial.57.e,Riot.600,Virogen.Simplex.504;
[Eset]probably unknown TSR.EXE virus,probably unknown TSR.COM virus,probably unknown COM virus,probably unknown STEALTH.CRYPT.TSR.COM.EXE virus,Riot.Evil.811 virus,probably unknown TSR.COM.BOOT virus,probably unknown STEALTH.POLY.CRYPT.TUNNEL.TSR.COM virus,probably unknown STEALTH.POLY.CRYPT.TSR.COM virus,probably unknown CRYPT.COM virus,probably unknown CRYPT.TSR.COM.EXE virus,probably modified virus Trivial.42.C,probably modified virus Mutagen.2193 (CRYPT.COM.EXE),probably unknown TSR.COM.EXE virus;
[Panda]AntiWin.933,DSA2.245,Univ,Benoit,Evil.811,Boot.Stealth.A,Tmtm.441,Virogen.1675,Eternity.600.A;
[Computer Associates]StayCool.573,Two Minutes,Trivial.42.i

probably indications of infection

This symptoms of probably detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ad.Armor Trojan Removal instruction
WAN.Remote Trojan Symptoms
Remove VB.fn Backdoor
Remove PeoplePC Adware
Grokster Adware Cleaner

Pigeon.AXN Trojan

Pigeon.AXN virus description
Technical details:
Categories: Trojan

Pigeon.AXN indications of infection

This symptoms of Pigeon.AXN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TopSearch BHO Information
Remove Lefielt Trojan
Specrem Trojan Cleaner
Win32.Songon Trojan Symptoms
Matcash.dr Downloader Information

ETC Trojan

ETC virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
ETC Aliases:
[Panda]Etc 3.00;
[Computer Associates]ETC

ETC indications of infection

This symptoms of ETC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Backdoor.EggDrop Backdoor Cleaner
Remove Degist Trojan
Removing CrocoPop Adware
SpyPartner Spyware Information
YourEnhancement Downloader Symptoms

Backdoor.DOOR.E!Server Trojan

Backdoor.DOOR.E!Server virus description
Technical details:
Categories: Trojan,Backdoor
Backdoor.DOOR.E!Server Aliases:
[Kaspersky]TrojanDropper.Win32.Exebinder.a;
[Panda]Trj/W32.Exebinder,Trojan Horse

Backdoor.DOOR.E!Server Files:
[%WINDOWS%]\downloaded program files\btiein.dll
[%WINDOWS%]\downloaded program files\btiein.dll


Backdoor.DOOR.E!Server indications of infection

This symptoms of Backdoor.DOOR.E!Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Cheqtwo Ransomware
Danton Trojan Removal
SystemSleuth Spyware Information

MediaUpdate.SafeSurfing BHO

MediaUpdate.SafeSurfing virus description
Technical details:
Categories: BHO,Hijacker

MediaUpdate.SafeSurfing Files:
[%SYSTEM%]\ssurf022.dll
[%WINDOWS%]\system\ssurf022.dll
[%SYSTEM%]\ssurf022.dll
[%WINDOWS%]\system\ssurf022.dll

MediaUpdate.SafeSurfing Registry Keys:
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{d8e25c53-9508-4f5c-9249-d98d438891d5}
HKEY_LOCAL_MACHINE\software\classes\clsid\{d8e25c53-9508-4f5c-9249-d98d438891d5}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{d8e25c53-9508-4f5c-9249-d98d438891d5}


MediaUpdate.SafeSurfing indications of infection

This symptoms of MediaUpdate.SafeSurfing detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing WinVNC RAT
QaBar.Adult.Links.Toolband BHO Symptoms
Libie Trojan Symptoms