V5.Encryption Trojan

V5.Encryption virus description
Technical details:
Categories: Trojan

V5.Encryption indications of infection

This symptoms of V5.Encryption detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
FakeAlert.TrojanFactory Trojan Symptoms
WhistleSoftware Adware Symptoms
Bambo Trojan Removal instruction
CashSaver Adware Symptoms
CWS.SmartSearch Hijacker Symptoms

SillyDl.BCX Trojan

SillyDl.BCX virus description
Technical details:
Categories: Trojan

SillyDl.BCX indications of infection

This symptoms of SillyDl.BCX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Sathidl Downloader

GetScreen Trojan

GetScreen virus description
Technical details:
Categories: Trojan

GetScreen indications of infection

This symptoms of GetScreen detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
WhenU.UControl Adware Symptoms
Startpage.Z!downloader Trojan Cleaner
Minsk Trojan Removal

CWS.IEFeats3 Hijacker

CWS.IEFeats3 virus description
Technical details:
Categories: Hijacker
CWS.IEFeats3 Aliases:
[Panda]Adware/Winshow

CWS.IEFeats3 indications of infection

This symptoms of CWS.IEFeats3 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Fuzfle Trojan
SillyDl.AZG Trojan Symptoms

Intended.COM Trojan

Intended.COM virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Intended.COM Aliases:
[Kaspersky]1_COM;
[Computer Associates]RC.456

Intended.COM indications of infection

This symptoms of Intended.COM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Leoboard Trojan Cleaner

Bancos.IFS Trojan

Bancos.IFS virus description
Technical details:
Categories: Trojan

Bancos.IFS indications of infection

This symptoms of Bancos.IFS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HGI Trojan Removal instruction
SpyLab.WebSpy Spyware Information
Plateau Trojan Symptoms
SillyDl.DCZ Trojan Symptoms

Startpage.GZ1 Trojan

Startpage.GZ1 virus description
Technical details:
Categories: Trojan
Startpage.GZ1 Aliases:
[Kaspersky]Trojan.Win32.Krepper.q;
[Eset]Win32/Krepper.Q trojan;
[Panda]Trj/Krepper.F;
[Computer Associates]Win32/Startpage.GZ1!Trojan,Win32.Startpage.GZ

Startpage.GZ1 indications of infection

This symptoms of Startpage.GZ1 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Simplex Trojan Removal
Key.Thief.Key.Serv Spyware Removal
MySpaceBar Toolbar Information

W95.Zerg Trojan

W95.Zerg virus description
Technical details:
Categories: Trojan
W95.Zerg Aliases:
[Kaspersky]Win95.Zerg.3849;
[McAfee]W95/Zerg;
[Panda]W95/Zerg.3469;
[Computer Associates]Win95.Zerg,Win95/Zerg_0.1

W95.Zerg indications of infection

This symptoms of W95.Zerg detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Adware.Accoona Adware
Edipole Adware Removal instruction

Small.amg Downloader

Small.amg virus description
Technical details:
Categories: Downloader

Small.amg indications of infection

This symptoms of Small.amg detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove AntiSpyGuard2007 Ransomware
SillyDl.CDI Trojan Cleaner
Remove AOHade Trojan
EZCyberSearch Adware Removal instruction
Remove Welcome Trojan

Infostealer Trojan

Infostealer virus description
Technical details:
Categories: Trojan

Infostealer Registry Keys:
HKEY_CLASSES_ROOT\clsid\{f369da09-fade-44cb-987f-e2e0def51bca}
HKEY_CLASSES_ROOT\interface\{49a188c9-bdd7-430a-8f01-c9eaaa65f359}
HKEY_CLASSES_ROOT\popupbho.cbho
HKEY_CLASSES_ROOT\popupbho.cbho.1\clsid
HKEY_CLASSES_ROOT\typelib\{6c01440a-7479-40e3-ac7e-b6f452c2bf17}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{f369da09-fade-44cb-987f-e2e0def51bca}


Infostealer indications of infection

This symptoms of Infostealer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.IBH Trojan Information

PestCapture Ransomware

PestCapture virus description
Technical details:
Categories: Ransomware

PestCapture Folders:
[%PROGRAMS%]\Pest-Capture
[%PROGRAMS%]\PestCapture
[%PROGRAM_FILES%]\PestCapture

PestCapture Files:
[%DESKTOP%]\PestCapture.lnk
[%PROFILE%]\start
[%PROGRAM_FILES%]\PestCapture\PestCapture.exe
[%DESKTOP%]\PestCapture.lnk
[%PROFILE%]\start
[%PROGRAM_FILES%]\PestCapture\PestCapture.exe

PestCapture Registry Keys:
HKEY_CURRENT_USER\SOFTWARE\Pest-Capture
HKEY_CURRENT_USER\Software\PestCapture
HKEY_CURRENT_USER\SOFTWARE\PestCaptureSetup
HKEY_CURRENT_USER\Software\PestCapture\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Pest-Capture
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PestCapture

PestCapture Registry Values:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run


PestCapture indications of infection

This symptoms of PestCapture detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
One.beta RAT Information
Removing Danton Trojan

Pigeon.EPG Trojan

Pigeon.EPG virus description
Technical details:
Categories: Trojan

Pigeon.EPG indications of infection

This symptoms of Pigeon.EPG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Flasher Trojan Removal instruction
SupremeSpy Spyware Information

Wiretap.Professional Spyware

Wiretap.Professional virus description
Technical details:
Categories: Spyware

Wiretap.Professional Folders:
[%SYSTEM%]\recoveryinfo
[%COMMON_PROGRAMS%]\Wiretap Professional
[%PROGRAMS%]\wiretap professional
[%PROGRAM_FILES%]\wiretap professional

Wiretap.Professional Registry Keys:
HKEY_CLASSES_ROOT\applications\scvhost.exe
HKEY_CLASSES_ROOT\clsid\{935fa400-243d-11d3-b06e-857b2ae2be64}
HKEY_CLASSES_ROOT\clsid\{e8b31a72-aace-412d-aa2c-d03fa6fccdef}
HKEY_CLASSES_ROOT\shellexecutehook.tshellexecutehook
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{e8b31a72-aace-412d-aa2c-d03fa6fccdef}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks\{935fa400-243d-11d3-b06e-857b2ae2be64}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\wtp_is1

Wiretap.Professional Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\5291-mdiv


Wiretap.Professional indications of infection

This symptoms of Wiretap.Professional detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ProRat Trojan Removal

Win32.StartPage.DLL Trojan

Win32.StartPage.DLL virus description
Technical details:
Categories: Trojan,Hijacker
Win32.StartPage.DLL Aliases:
[Kaspersky]Trojan.Win32.StartPage.bs;
[Eset]Win32/StartPage.BS trojan;
[Panda]Trj/Bookmark.D;
[Computer Associates]Win32.Startpage.AT,Win32/StartPage.11264!DLL!Trojan

Win32.StartPage.DLL indications of infection

This symptoms of Win32.StartPage.DLL detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Snipernet Trojan Removal instruction

Win32.VB.bu Trojan

Win32.VB.bu virus description
Technical details:
Categories: Trojan
Win32.VB.bu Aliases:
[Panda]Trojan Horse

Win32.VB.bu indications of infection

This symptoms of Win32.VB.bu detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing AIM.Rip Trojan
Chist Trojan Information
PurityScan Trojan Cleaner

WebHancer Spyware

WebHancer virus description
Technical details:
Categories: Spyware,BHO,Adware
WebHancer Aliases:
[F-Prot]->license.txt;
[Panda]Adware/Xupiter

WebHancer Folders:
[%PROGRAM_FILES%]\em
[%PROGRAM_FILES%]\webhancer
[%PROGRAM_FILES%]\whinstall
[%PROFILE_TEMP%]\wzs11.tmp

WebHancer Files:
[%PROFILE_TEMP%]\2.txt
[%PROFILE_TEMP%]\b129.exe
[%PROFILE_TEMP%]\RarSFX0\license.txt
[%PROFILE_TEMP%]\RarSFX0\whAgent.ini
[%PROFILE_TEMP%]\temp.fr????
[%PROFILE_TEMP%]\temp.fr????\Programs\webhdll.dll
[%PROFILE_TEMP%]\wh.exe
[%PROFILE_TEMP%]\WZS18.tmp\readme.txt
[%PROFILE_TEMP%]\WZS18.tmp\whInstaller.exe
[%PROFILE_TEMP%]\WZS23.tmp\readme.txt
[%PROFILE_TEMP%]\WZS4.tmp\license.txt
[%PROFILE_TEMP%]\WZS4.tmp\readme.txt
[%PROFILE_TEMP%]\WZS4.tmp\Webhdll.dll
[%PROFILE_TEMP%]\WZS4.tmp\WhAgent.exe
[%PROFILE_TEMP%]\WZS4.tmp\whiehlpr.dll
[%PROFILE_TEMP%]\WZS4.tmp\whInstaller.exe
[%PROFILE_TEMP%]\WZS4.tmp\whInstaller.ini
[%PROFILE_TEMP%]\WZS4.tmp\WhSurvey.exe
[%PROGRAM_FILES%]\em\dohancer\webinstaller.exe
[%PROGRAM_FILES%]\webHancer\Programs\whSurvey.exe
[%PROGRAM_FILES%]\whInstall\license.txt
[%PROGRAM_FILES%]\whInstall\readme.txt
[%PROGRAM_FILES%]\whInstall\whAgent.inf
[%PROGRAM_FILES%]\whInstall\whAgent.ini
[%PROGRAM_FILES%]\whInstall\whInstaller.ini
[%SYSTEM%]\auto_update_uninstall.log
[%WINDOWS%]\b129.exe
[%WINDOWS%]\hancerdoem.exe
[%WINDOWS%]\ntsautodial.ini
[%WINDOWS%]\webhdll(2)(2)(2)(2)(2)(2)(2).dll
[%WINDOWS%]\webhdll(2)(2)(2)(2)(2)(2).dll
[%WINDOWS%]\webhdll(2)(2)(2)(2).dll
[%WINDOWS%]\webhdll(2)(2)(3).dll
[%WINDOWS%]\webhdll.dll
[%WINDOWS%]\webhdll.dll_tobedeleted
[%WINDOWS%]\wh.exe
[%WINDOWS%]\whagent.inf
[%WINDOWS%]\whCC-GIANT.exe
[%WINDOWS%]\whCC-MOTOR.exe
[%WINDOWS%]\whInstaller.exe
[%WINDOWS%]\whInstaller.ini
[%PROGRAM_FILES%]\webHancer\programs\whiehlpr.dll
[%PROFILE%]\administrator\start menu\programs\earn\about earn.lnk
[%PROFILE_TEMP%]\whcc-grokster.exe
[%PROFILE_TEMP%]\wzs105.tmp\wbhshare.dll
[%PROFILE_TEMP%]\wzs105.tmp\webhdll.dll
[%PROFILE_TEMP%]\wzs105.tmp\whagent.exe
[%PROFILE_TEMP%]\wzs105.tmp\whagent.inf
[%PROFILE_TEMP%]\wzs105.tmp\whiehlpr.dll
[%PROFILE_TEMP%]\wzs105.tmp\whieshm.dll
[%PROFILE_TEMP%]\wzs105.tmp\whinstaller.exe
[%PROFILE_TEMP%]\wzs105.tmp\whinstaller.ini
[%PROFILE_TEMP%]\wzs46.tmp\wbhshare.dll
[%PROFILE_TEMP%]\wzs46.tmp\webhdll.dll
[%PROFILE_TEMP%]\wzs46.tmp\whagent.exe
[%PROFILE_TEMP%]\wzs46.tmp\whagent.inf
[%PROFILE_TEMP%]\wzs46.tmp\whiehlpr.dll
[%PROFILE_TEMP%]\wzs46.tmp\whieshm.dll
[%PROFILE_TEMP%]\wzs46.tmp\whinstaller.exe
[%PROFILE_TEMP%]\wzs46.tmp\whinstaller.ini
[%PROFILE_TEMP%]\wzsb2.tmp\wbhshare.dll
[%PROFILE_TEMP%]\wzsb2.tmp\webhdll.dll
[%PROFILE_TEMP%]\wzsb2.tmp\whagent.exe
[%PROFILE_TEMP%]\wzsb2.tmp\whagent.inf
[%PROFILE_TEMP%]\wzsb2.tmp\whiehlpr.dll
[%PROFILE_TEMP%]\wzsb2.tmp\whieshm.dll
[%PROFILE_TEMP%]\wzsb2.tmp\whinstaller.exe
[%PROFILE_TEMP%]\wzsb2.tmp\whinstaller.ini
[%PROFILE_TEMP%]\wzsee.tmp\wbhshare.dll
[%PROFILE_TEMP%]\wzsee.tmp\webhdll.dll
[%PROFILE_TEMP%]\wzsee.tmp\whagent.exe
[%PROFILE_TEMP%]\wzsee.tmp\whagent.inf
[%PROFILE_TEMP%]\wzsee.tmp\whiehlpr.dll
[%PROFILE_TEMP%]\wzsee.tmp\whieshm.dll
[%PROFILE_TEMP%]\wzsee.tmp\whinstaller.exe
[%PROFILE_TEMP%]\wzsee.tmp\whinstaller.ini
[%PROGRAMS%]\grokster\grokster.lnk
[%SYSTEM%]\whiehlpr.dll
[%WINDOWS%]\digital signature 20030814.htm
[%WINDOWS%]\downloaded program files\mqgold1.dll
[%WINDOWS%]\lastgood\whagent.inf
[%WINDOWS%]\lastgood\whinstaller.exe
[%WINDOWS%]\system\whiehlpr.dll
[%WINDOWS%]\temp\whagent.inf
[%WINDOWS%]\temp\whcc-grokster.exe
[%WINDOWS%]\temp\whiehlpr.ini
[%WINDOWS%]\temp\whinstaller.exe
[%WINDOWS%]\temp\whinstaller.ini
[%WINDOWS%]\whinstaller.exe
[%WINDOWS%]\whinstaller.ini
[%PROFILE_TEMP%]\2.txt
[%PROFILE_TEMP%]\b129.exe
[%PROFILE_TEMP%]\RarSFX0\license.txt
[%PROFILE_TEMP%]\RarSFX0\whAgent.ini
[%PROFILE_TEMP%]\temp.fr????
[%PROFILE_TEMP%]\temp.fr????\Programs\webhdll.dll
[%PROFILE_TEMP%]\wh.exe
[%PROFILE_TEMP%]\WZS18.tmp\readme.txt
[%PROFILE_TEMP%]\WZS18.tmp\whInstaller.exe
[%PROFILE_TEMP%]\WZS23.tmp\readme.txt
[%PROFILE_TEMP%]\WZS4.tmp\license.txt
[%PROFILE_TEMP%]\WZS4.tmp\readme.txt
[%PROFILE_TEMP%]\WZS4.tmp\Webhdll.dll
[%PROFILE_TEMP%]\WZS4.tmp\WhAgent.exe
[%PROFILE_TEMP%]\WZS4.tmp\whiehlpr.dll
[%PROFILE_TEMP%]\WZS4.tmp\whInstaller.exe
[%PROFILE_TEMP%]\WZS4.tmp\whInstaller.ini
[%PROFILE_TEMP%]\WZS4.tmp\WhSurvey.exe
[%PROGRAM_FILES%]\em\dohancer\webinstaller.exe
[%PROGRAM_FILES%]\webHancer\Programs\whSurvey.exe
[%PROGRAM_FILES%]\whInstall\license.txt
[%PROGRAM_FILES%]\whInstall\readme.txt
[%PROGRAM_FILES%]\whInstall\whAgent.inf
[%PROGRAM_FILES%]\whInstall\whAgent.ini
[%PROGRAM_FILES%]\whInstall\whInstaller.ini
[%SYSTEM%]\auto_update_uninstall.log
[%WINDOWS%]\b129.exe
[%WINDOWS%]\hancerdoem.exe
[%WINDOWS%]\ntsautodial.ini
[%WINDOWS%]\webhdll(2)(2)(2)(2)(2)(2)(2).dll
[%WINDOWS%]\webhdll(2)(2)(2)(2)(2)(2).dll
[%WINDOWS%]\webhdll(2)(2)(2)(2).dll
[%WINDOWS%]\webhdll(2)(2)(3).dll
[%WINDOWS%]\webhdll.dll
[%WINDOWS%]\webhdll.dll_tobedeleted
[%WINDOWS%]\wh.exe
[%WINDOWS%]\whagent.inf
[%WINDOWS%]\whCC-GIANT.exe
[%WINDOWS%]\whCC-MOTOR.exe
[%WINDOWS%]\whInstaller.exe
[%WINDOWS%]\whInstaller.ini
[%PROGRAM_FILES%]\webHancer\programs\whiehlpr.dll
[%PROFILE%]\administrator\start menu\programs\earn\about earn.lnk
[%PROFILE_TEMP%]\whcc-grokster.exe
[%PROFILE_TEMP%]\wzs105.tmp\wbhshare.dll
[%PROFILE_TEMP%]\wzs105.tmp\webhdll.dll
[%PROFILE_TEMP%]\wzs105.tmp\whagent.exe
[%PROFILE_TEMP%]\wzs105.tmp\whagent.inf
[%PROFILE_TEMP%]\wzs105.tmp\whiehlpr.dll
[%PROFILE_TEMP%]\wzs105.tmp\whieshm.dll
[%PROFILE_TEMP%]\wzs105.tmp\whinstaller.exe
[%PROFILE_TEMP%]\wzs105.tmp\whinstaller.ini
[%PROFILE_TEMP%]\wzs46.tmp\wbhshare.dll
[%PROFILE_TEMP%]\wzs46.tmp\webhdll.dll
[%PROFILE_TEMP%]\wzs46.tmp\whagent.exe
[%PROFILE_TEMP%]\wzs46.tmp\whagent.inf
[%PROFILE_TEMP%]\wzs46.tmp\whiehlpr.dll
[%PROFILE_TEMP%]\wzs46.tmp\whieshm.dll
[%PROFILE_TEMP%]\wzs46.tmp\whinstaller.exe
[%PROFILE_TEMP%]\wzs46.tmp\whinstaller.ini
[%PROFILE_TEMP%]\wzsb2.tmp\wbhshare.dll
[%PROFILE_TEMP%]\wzsb2.tmp\webhdll.dll
[%PROFILE_TEMP%]\wzsb2.tmp\whagent.exe
[%PROFILE_TEMP%]\wzsb2.tmp\whagent.inf
[%PROFILE_TEMP%]\wzsb2.tmp\whiehlpr.dll
[%PROFILE_TEMP%]\wzsb2.tmp\whieshm.dll
[%PROFILE_TEMP%]\wzsb2.tmp\whinstaller.exe
[%PROFILE_TEMP%]\wzsb2.tmp\whinstaller.ini
[%PROFILE_TEMP%]\wzsee.tmp\wbhshare.dll
[%PROFILE_TEMP%]\wzsee.tmp\webhdll.dll
[%PROFILE_TEMP%]\wzsee.tmp\whagent.exe
[%PROFILE_TEMP%]\wzsee.tmp\whagent.inf
[%PROFILE_TEMP%]\wzsee.tmp\whiehlpr.dll
[%PROFILE_TEMP%]\wzsee.tmp\whieshm.dll
[%PROFILE_TEMP%]\wzsee.tmp\whinstaller.exe
[%PROFILE_TEMP%]\wzsee.tmp\whinstaller.ini
[%PROGRAMS%]\grokster\grokster.lnk
[%SYSTEM%]\whiehlpr.dll
[%WINDOWS%]\digital signature 20030814.htm
[%WINDOWS%]\downloaded program files\mqgold1.dll
[%WINDOWS%]\lastgood\whagent.inf
[%WINDOWS%]\lastgood\whinstaller.exe
[%WINDOWS%]\system\whiehlpr.dll
[%WINDOWS%]\temp\whagent.inf
[%WINDOWS%]\temp\whcc-grokster.exe
[%WINDOWS%]\temp\whiehlpr.ini
[%WINDOWS%]\temp\whinstaller.exe
[%WINDOWS%]\temp\whinstaller.ini
[%WINDOWS%]\whinstaller.exe
[%WINDOWS%]\whinstaller.ini

WebHancer Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{C900B400-CDFE-11D3-976A-00E02913A9E0}
HKEY_CLASSES_ROOT\interface\{c89435b0-cdfe-11d3-976a-00e02913a9e0}
HKEY_CLASSES_ROOT\typelib\{c8cb3870-cdfe-11d3-976a-00e02913a9e0}
HKEY_CLASSES_ROOT\whiehelperobj.whiehelperobj
HKEY_CLASSES_ROOT\whiehelperobj.whiehelperobj.1
HKEY_LOCAL_MACHINE\software\classes\interface\{c89435b0-cdfe-11d3-976a-00e02913a9e0}
HKEY_LOCAL_MACHINE\software\classes\typelib\{c8cb3870-cdfe-11d3-976a-00e02913a9e0}
HKEY_LOCAL_MACHINE\software\classes\whiehelperobj.whiehelperobj
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app management\arpcache\whsurvey
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C900B400-CDFE-11D3-976A-00E02913A9E0}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\webhancer agent
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\whsurvey
HKEY_LOCAL_MACHINE\software\webhancer
HKEY_CLASSES_ROOT\clsid\{c89435b0-cdfe-11d3-976a-00e02913a9e0}
HKEY_CLASSES_ROOT\clsid\{c8cb3870-cdfe-11d3-976a-00e02913a9e0}
HKEY_CLASSES_ROOT\clsid\{c900b400-cdfe-11d3-976a-00e02913a9e0}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{c900b400-cdfe-11d3-976a-00e02913a9e0}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{c900b400-cdfe-11d3-976a-00e02913a9e0}

WebHancer Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\easy mp3 alarm clock_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\easy mp3 alarm clock_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\easy mp3 alarm clock_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\easy mp3 alarm clock_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\easy mp3 alarm clock_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\easy mp3 alarm clock_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\easy mp3 alarm clock_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\easy mp3 alarm clock_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\easy mp3 alarm clock_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\easy mp3 alarm clock_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\easy mp3 alarm clock_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\easy mp3 alarm clock_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\easy mp3 alarm clock_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\easy mp3 alarm clock_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\easy mp3 alarm clock_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\easy mp3 alarm clock_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\easy mp3 alarm clock_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\easy mp3 alarm clock_is1


WebHancer indications of infection

This symptoms of WebHancer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Chisyne Trojan Symptoms
DeskAlerts Adware Removal
WinHound Ransomware Removal instruction
Cupomaple Trojan Removal instruction
Remove Caswinder Trojan

Pigeon.AVQG Trojan

Pigeon.AVQG virus description
Technical details:
Categories: Trojan

Pigeon.AVQG indications of infection

This symptoms of Pigeon.AVQG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Casino Trojan Removal instruction
Remove 1stAntiVirus Trojan
Removing Internet.Speed.Monitor Adware
Removing Pigeon.EOM Trojan

Zenotecnico.com Tracking Cookie

Zenotecnico.com virus description
Technical details:
Categories: Tracking Cookie

Zenotecnico.com indications of infection

This symptoms of Zenotecnico.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SpiceGirls Trojan

QuickButton Trojan

QuickButton virus description
Technical details:
Categories: Trojan,Adware
QuickButton Aliases:
[Kaspersky]Adware.Win32.AdHelper.ay,AdWare.Win32.AdHelper.gen,Trojan-Dwonloader.Win32.QQHelper.gb,Trojan-Downloader.Win32.QQHelper.gen,AdWare.Win32.AdHelper.cz;
[McAfee]Generic Downloader.h,Backdoor-CVM;
[F-Prot]W32/Downloader.AAWI;
[Other]Infostealer,Backdoor.CVM,Trojan-Downloader.win32.QQHelper.ce,Win32/QQHelp.N,Adware.Adhelper,Win32/Sillydl.AHL,Win32/SillyDl.AHL,Win32/QQHelp.J,Win32/QQHelpBP,Downloader

QuickButton Folders:
[%PROGRAM_FILES%]\coolsign
[%PROGRAM_FILES_COMMON%]\UPDAT

QuickButton Files:
[%PROGRAM_FILES_COMMON%]\System\Updaterun.exe
[%SYSTEM%]\advport.dll
[%SYSTEM%]\nt.sys
[%SYSTEM%]\Score.txt
[%SYSTEM%]\wbem\ocmor.dat
[%SYSTEM%]\wbem\ocmor.dll
[%PROGRAM_FILES%]\CoolWebsite\QuickLink.dll
[%PROGRAM_FILES%]\CoolWebsite\uninst.exe
[%SYSTEM%]\bind_40255.exe
[%SYSTEM%]\spted.dll
[%SYSTEM%]\wbem\IRJIT.dll
[%PROGRAM_FILES_COMMON%]\System\Updaterun.exe
[%SYSTEM%]\advport.dll
[%SYSTEM%]\nt.sys
[%SYSTEM%]\Score.txt
[%SYSTEM%]\wbem\ocmor.dat
[%SYSTEM%]\wbem\ocmor.dll
[%PROGRAM_FILES%]\CoolWebsite\QuickLink.dll
[%PROGRAM_FILES%]\CoolWebsite\uninst.exe
[%SYSTEM%]\bind_40255.exe
[%SYSTEM%]\spted.dll
[%SYSTEM%]\wbem\IRJIT.dll

QuickButton Registry Keys:
HKEY_CLASSES_ROOT\clsid\{d1bb7cf4-4463-4e91-88d7-ecc3ce0a13b7}
HKEY_CLASSES_ROOT\quickbutton.quickbtn
HKEY_CLASSES_ROOT\sss1.sss2.1
HKEY_CLASSES_ROOT\{d1bb7cf4-4463-4e91-88d7-ecc3ce0a13b7}
HKEY_LOCAL_MACHINE\software\divnet
HKEY_LOCAL_MACHINE\software\lamp
HKEY_LOCAL_MACHINE\software\microsoft\directoutput
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\extensions\{1d901067-2529-4a9b-9b6b-7a1db3a44cb5}
HKEY_LOCAL_MACHINE\software\microsoft\studio
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\coolsign
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_barcase
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\barcase
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\eventlog\application\barcase
HKEY_CLASSES_ROOT\interface\{0083de51-eb2e-4521-a95c-735d8e563373}
HKEY_CLASSES_ROOT\ssss1.ssss2.1
HKEY_CLASSES_ROOT\typelib\{933db9d6-9447-4efe-aba2-eaf3b309b44c}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{d1bb7cf4-4463-4e91-88d7-ecc3ce0a13b7}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\quicklink
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_atwork
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_dateing
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_ipdodrg
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_iunag
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_soscar
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\atwork
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\dateing
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\eventlog\application\dateing
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\eventlog\application\soscar
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\ipdodrg
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\iunag
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\soscar

QuickButton Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\extensions\cmdmapping
HKEY_CURRENT_USER\software\microsoft\internet explorer\extensions\cmdmapping
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\internet explorer\extensions\cmdmapping
HKEY_CURRENT_USER\software\microsoft\internet explorer\typedurls
HKEY_CURRENT_USER\software\microsoft\internet explorer\typedurls
HKEY_CURRENT_USER\software\microsoft\internet explorer\typedurls
HKEY_CURRENT_USER\software\microsoft\internet explorer\typedurls
HKEY_CURRENT_USER\software\microsoft\internet explorer\typedurls
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\license\parameters
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\templates\parameters


QuickButton indications of infection

This symptoms of QuickButton detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Wind.Prank Trojan Information

Sohoanywhere RAT

Sohoanywhere virus description
Technical details:
Categories: RAT

Sohoanywhere indications of infection

This symptoms of Sohoanywhere detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GJO Trojan Removal instruction
Gorman Trojan Symptoms

Pigeon.AWIP Trojan

Pigeon.AWIP virus description
Technical details:
Categories: Trojan

Pigeon.AWIP indications of infection

This symptoms of Pigeon.AWIP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Da.Boys Trojan Information

SMSFlood DoS

SMSFlood virus description
Technical details:
Categories: DoS
SMSFlood Aliases:
[Panda]Flooder Program;
[Computer Associates]Win32.SMSFlood.B,Win32/SMS.Bomber!Trojan

SMSFlood indications of infection

This symptoms of SMSFlood detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Fuzfle Trojan Information
Reign Trojan Removal instruction
Remove Data.Coremetrics.com Tracking Cookie
StartPage.yp Hijacker Cleaner
Removing Win32.Boid Trojan

BackDoor.GQ.svr Trojan

BackDoor.GQ.svr virus description
Technical details:
Categories: Trojan,Backdoor
BackDoor.GQ.svr Aliases:
[Eset]Win32/Y3KRat.15.A.Server trojan,Win32/Y3KRat.10 trojan;
[McAfee]BackDoor-GQ.svr;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Y3K.1.5,Backdoor Program;
[Computer Associates]Backdoor/Y3KRat_Server_family,Win32.Y3KRat.15,Win32.Y3KRat.10

BackDoor.GQ.svr indications of infection

This symptoms of BackDoor.GQ.svr detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Rephyes Trojan Symptoms
StartPage.ig Hijacker Information
RSC RAT Information
DivoPlayer Adware Removal instruction
Spy.Goldun Trojan Removal

Bancos.GZE Trojan

Bancos.GZE virus description
Technical details:
Categories: Trojan

Bancos.GZE indications of infection

This symptoms of Bancos.GZE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AWJF Trojan Information

The.Revenge.Pack Backdoor

The.Revenge.Pack virus description
Technical details:
Categories: Backdoor
The.Revenge.Pack Aliases:
[Kaspersky]Backdoor.Revenge.521;
[McAfee]RevengePack,RevengePack trojan;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program.LC;
[Computer Associates]Backdoor/Revenge.5.2.1

The.Revenge.Pack indications of infection

This symptoms of The.Revenge.Pack detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ScreenGrab RAT Information
Xupiter.com Tracking Cookie Cleaner

iMonitorPCPro Spyware

iMonitorPCPro virus description
Technical details:
Categories: Spyware

iMonitorPCPro indications of infection

This symptoms of iMonitorPCPro detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanDownloader.Win32.IstBar.eo Downloader Symptoms
Outwar Trojan Removal

TrojanDropper.Win32.MultiJoiner Trojan

TrojanDropper.Win32.MultiJoiner virus description
Technical details:
Categories: Trojan,Hacker Tool
TrojanDropper.Win32.MultiJoiner Aliases:
[Panda]Hacktool Program

TrojanDropper.Win32.MultiJoiner indications of infection

This symptoms of TrojanDropper.Win32.MultiJoiner detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Cadux Trojan
Bancos.GUQ Trojan Removal