MetaPorn Downloader

MetaPorn virus description
Technical details:
Categories: Downloader

MetaPorn indications of infection

This symptoms of MetaPorn detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Backdoor.Kronical.Server Trojan Information

TrojanSpy.Win32.NetCaptor Trojan

TrojanSpy.Win32.NetCaptor virus description
Technical details:
Categories: Trojan,Spyware
TrojanSpy.Win32.NetCaptor Aliases:
[Panda]Trojan Horse

TrojanSpy.Win32.NetCaptor indications of infection

This symptoms of TrojanSpy.Win32.NetCaptor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.VB.ayt Trojan Removal
IMNames Adware Removal instruction

Setup740 Spyware

Setup740 virus description
Technical details:
Categories: Spyware

Setup740 indications of infection

This symptoms of Setup740 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bat.Futility Trojan Information
Toxicity.Remote.KeyLog Trojan Removal instruction
Frog Trojan Removal
Teen.Searchbar Toolbar Removal instruction
PornDialer Trojan Symptoms

Tatol Trojan

Tatol virus description
Technical details:
Categories: Trojan

Tatol indications of infection

This symptoms of Tatol detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVBE Trojan Removal

VB.dh Downloader

VB.dh virus description
Technical details:
Categories: Downloader

VB.dh indications of infection

This symptoms of VB.dh detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing AntiOL Trojan
float Trojan Removal
LRS Trojan Cleaner

Prosti Backdoor

Prosti virus description
Technical details:
Categories: Backdoor
Prosti Aliases:
[Kaspersky]Backdoor.Win32.Prosti.q;
[McAfee]BackDoor-CXI

Prosti indications of infection

This symptoms of Prosti detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Diablo.Server Trojan Removal instruction
Dkbits Trojan Removal

CandyMan Trojan

CandyMan virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,Hacker Tool,DoS
CandyMan Aliases:
[Kaspersky]Constructor.DOS.DVG,Candy.999,Virus.DOS.Candy.999;
[McAfee]DVG.kit,Univ/f;
[F-Prot]virus construction tool,CandyMan.999;
[Panda]Virus Constructor,CandyMan.999;
[Computer Associates]CandyMan!Trojan,CandyMan.999

CandyMan indications of infection

This symptoms of CandyMan detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PWS.EyeOnIE Trojan Information
W95.Kenston Trojan Symptoms

Mof Trojan

Mof virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Mof Aliases:
[Kaspersky]PolyEngineSGen.MOF.1;
[Panda]Univ.A

Mof indications of infection

This symptoms of Mof detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SillyDl.COX Trojan
Xupiter.Xupiter Hijacker Removal
Removing Bancos.GRN Trojan
Remove realbeer.com Tracking Cookie
Gift724 Trojan Symptoms

Yprel Trojan

Yprel virus description
Technical details:
Categories: Trojan
Yprel Aliases:
[Kaspersky]Trojan-Spy.Win32.Sters,Trojan-Spy.win32.Sters.x,Backdoor.Win32.Vb.apc,Trojan-Spy.Win32.Sters.x,Backdoor.Win32.VB.aug,Trojan-Spy.Win32.Sters.y,Trojan-Proxy.Win32.VB.v;
[McAfee]Backdoor-CWW,BackDoor-CWW;
[Other]Win32/Yprel,Win32/Yprel.G,Win32/Yprel.A,Win32/Yprel.H,Infostealer,Win32/Yprel.E,Win32/Yprel.F,Win32/Yprel.M

Yprel Files:
[%WINDOWS%]\cxplib.dll
[%WINDOWS%]\cxplib.dll


Yprel indications of infection

This symptoms of Yprel detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Zlob.mo Downloader Cleaner

JS.URLSpoof!exploit Trojan

JS.URLSpoof!exploit virus description
Technical details:
Categories: Trojan

JS.URLSpoof!exploit indications of infection

This symptoms of JS.URLSpoof!exploit detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AZC Trojan Removal
AntiSpyCheck Ransomware Removal
Talpalk Trojan Cleaner

H99Clean Trojan

H99Clean virus description
Technical details:
Categories: Trojan

H99Clean indications of infection

This symptoms of H99Clean detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Agent.IWD Trojan Removal instruction
Remove PeopleOnPage.AproposMedia BHO
Removing TopSurfer Toolbar
Sploiter Trojan Information
Remove CoolWeb Adware

XLok Adware

XLok virus description
Technical details:
Categories: Adware

XLok indications of infection

This symptoms of XLok detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SystemVXD Adware Symptoms
Remove Bancos.HXX Trojan

WavenDl Trojan

WavenDl virus description
Technical details:
Categories: Trojan

WavenDl indications of infection

This symptoms of WavenDl detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Vxidl.AXS Trojan
Win32.Akosch.Client Trojan Symptoms
Pentium RAT Information
Alvgus Trojan Symptoms
Bancos.GUQ Trojan Removal instruction

Bomenjec Trojan

Bomenjec virus description
Technical details:
Categories: Trojan,Downloader
Bomenjec Aliases:
[Kaspersky]Trojan-Dwonlaoder.Win32.Small.dqz,Trojan-Downlaoder.Win32.Small.dqz,Trojan-Downloader.Win32.Small.dqz,Trojan-Downlaoder.Win32.Small.dqn,Trojan-Downloader.Win32.Small.dqn,Trojan-Downloader.Win32.Small.dwh,Trojan-Downloader.Win32.Small.dwm,Trojan-Downloader.Win32.Banload.ffn,Trojan-Downloader.Win32.Banload.ffo,Trojan-Downloader.Win32.Banload.ffp;
[McAfee]Downloader-ZL,Downladoer-ZL,Downlaoder-ZL,PWS-Banker.bn;
[Other]Win32/Bomenjec,Downloader,Downlaoder,Trojan.Gobrena,Trojan.Gobrena.B,TrojanDownloader:Win32/Agent.WX

Bomenjec Registry Keys:
HKEY_CLASSES_ROOT\clsid\{77770022-0d68-4d14-bf25-6747acfa95de}\inprocserver32


Bomenjec indications of infection

This symptoms of Bomenjec detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EDE Trojan Information

Dowque.AFA Trojan

Dowque.AFA virus description
Technical details:
Categories: Trojan

Dowque.AFA indications of infection

This symptoms of Dowque.AFA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Multiplex Trojan Information
Virus.Kill Adware Removal

Outer Trojan

Outer virus description
Technical details:
Categories: Trojan
Outer Aliases:
[Kaspersky]Trojan.OuterLimit;
[McAfee]Univ.ow/a;
[F-Prot]Outer.1317;
[Panda]Trj/OuterLimit;
[Computer Associates]Outer.1317

Outer indications of infection

This symptoms of Outer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ClientMan.2in1 BHO Removal
GWGhost Trojan Information
Bancos.HYA Trojan Removal

Banbot Trojan

Banbot virus description
Technical details:
Categories: Trojan
Banbot Aliases:
[Kaspersky]Backdoor.Win32.Bandok.h,Backdoor.Win32.Bandok.ad,Trojan-Downlaoder.Win32.BHO.I,Trojan.Win32.BHO.cs,Trojan.Win32.Kolweb.v;
[McAfee]Spy-Agent.cf;
[Other]Win32/Banbot.B,Win32/Banbot,Win32/Banbot.C,Win32/Banbot.J,Win32/Banbot.K,Win32/Banbot.N,Win32/Banbot.O

Banbot Files:
[%SYSTEM%]\scvhost.exe
[%PROFILE%]\microsoft.dll
[%PROFILE%]\microsoft.exe
[%SYSTEM%]\alrri.exe
[%WINDOWS%]\bndkhook.dll
[%SYSTEM_DRIVE%]\windows_xp.exe
[%SYSTEM%]\scvhost.exe
[%PROFILE%]\microsoft.dll
[%PROFILE%]\microsoft.exe
[%SYSTEM%]\alrri.exe
[%WINDOWS%]\bndkhook.dll
[%SYSTEM_DRIVE%]\windows_xp.exe

Banbot Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{FCADDC14-BD46-408A-9842-CDBE1C6D37EB}
HKEY_CLASSES_ROOT\clsid\{20f49338-a318-478f-8f91-2c7c440e4c0e}
HKEY_CLASSES_ROOT\clsid\{3080b29a-04b0-4095-beb7-b797b7d7f690}
HKEY_CLASSES_ROOT\clsid\{48aafe68-bfe3-4e05-9451-6cf4db7dafb7}
HKEY_CLASSES_ROOT\clsid\{5af61f75-e322-4f98-af9f-03886cb025f6}
HKEY_CLASSES_ROOT\clsid\{fcaddc14-bd46-408a-9842-cdbe1c6d37eb}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{b6a807n6-42df-4w02-93e5-b156b3fa8al1}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{20f49338-a318-478f-8f91-2c7c440e4c0e}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{5af61f75-e322-4f98-af9f-03886cb025f6}

Banbot Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion
HKEY_CURRENT_USER\software\microsoft\windows\currentversion
HKEY_CURRENT_USER\software\microsoft\windows\currentversion
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\runonce
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonce
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonce


Banbot indications of infection

This symptoms of Banbot detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Nuke.Nukeit Trojan Information

Vienna.Violator Trojan

Vienna.Violator virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Vienna.Violator Aliases:
[Kaspersky]Vienna.1000,Vienna.Violator.5286,Vienna.Violator.779.a,Vienna.1055;
[Eset]Vienna.Violator.1000.A virus,Vienna.Violator.1000.B virus,Vienna.Violator.1000.E virus;
[Panda]Univ,Violator.1055;
[Computer Associates]Vienna.Violator.1000.F,Violator,Xmas Violator,Violator.779

Vienna.Violator indications of infection

This symptoms of Vienna.Violator detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Shinwow Trojan Symptoms
IECodec Ransomware Cleaner
AdStation Adware Removal
Removing Unknown.Pest Trojan

Ulogin Trojan

Ulogin virus description
Technical details:
Categories: Trojan

Ulogin indications of infection

This symptoms of Ulogin detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing IBar.cn Toolbar
Constructor.VBS.HPWG Trojan Information

Delf.ru Downloader

Delf.ru virus description
Technical details:
Categories: Downloader

Delf.ru indications of infection

This symptoms of Delf.ru detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AHE Trojan Removal
Remove Mardi.Bros Trojan

Univ.gr5 Trojan

Univ.gr5 virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Univ.gr5 Aliases:
[Kaspersky]KidPoly.298;
[Panda]Kidpoly.298.Drp

Univ.gr5 indications of infection

This symptoms of Univ.gr5 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove CursorCentral Trojan
Removing Targa Hacker Tool
Lop.bd Adware Cleaner

Iopus.Starr.Pro.Key.Logger Spyware

Iopus.Starr.Pro.Key.Logger virus description
Technical details:
Categories: Spyware

Iopus.Starr.Pro.Key.Logger indications of infection

This symptoms of Iopus.Starr.Pro.Key.Logger detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Mayaten Trojan Cleaner
Remove TheSource DoS
Awax Trojan Removal
Remove SillyDl.CZG Trojan
WinSpyControl Ransomware Cleaner

Generic.Downloader Trojan

Generic.Downloader virus description
Technical details:
Categories: Trojan,Adware,Downloader
Generic.Downloader Aliases:
[Kaspersky]Trojan-Downloader.Win32.Agent.tn,Trojan-Downloader.Win32.Agent.atb,Trojan-Downloader.Win32.Tiny.bn,Trojan-Proxy.Win32.Agent.ji;
[McAfee]Generic.Downloader.h,Generic.Downloader.k,Generic Downloader.q,Generic Downloader.s,Generic Downloader.r,Generic Downloader.k,Generic Downloader.y;
[F-Prot]W32/Downloader.HNK;
[Other]W32/Dloader.CNT,TROJ_H.A,Win32/Discoslent.A,Win32/SillyDL4128!Trojan,Troj/Dloader-TP,Download.Trojan,Troj/Delf-SF,W32/DLoader.DTL,W32/DLoader.ABDY,TROJ_VB.ACJ,Troj/VB-AZA,Win32.Cadux.AV,Trojan-Downloader.Win32.VB.ajp,Win32/SillyDl.AVD,trojan downloader apher,Scam.Iwin,Win32/Shadown!generic,Downloader,enbrowser,Troj/Voter-A,Trojan.Vxgame.z,Win32/Matcash.BF,TROJ_DLOADER.QNF,BrowserModifier:Win32/Matcash

Generic.Downloader Files:
[%PROFILE_TEMP%]\qv3xt3.game
[%PROFILE_TEMP%]\qvxt42.game
[%PROFILE_TEMP%]\Setup100.exe
[%SYSTEM%]\agibukww.exe
[%SYSTEM%]\dowhrqyg.exe
[%SYSTEM%]\jkzfsjru.exe
[%SYSTEM%]\meoybrof.exe
[%SYSTEM%]\nejfxbgx.exe
[%SYSTEM%]\uygemmke.exe
[%SYSTEM%]\vdamcczs.exe
[%SYSTEM%]\xzclrczo.exe
[%WINDOWS%]\retadpu922.exe
[%PROFILE_TEMP%]\dnlsvc.exe
[%PROFILE_TEMP%]\dnsec.exe
[%PROFILE_TEMP%]\ms-38.exe
[%SYSTEM%]\msdirect.sys
[%WINDOWS%]\ifqtmpy.exe
[%WINDOWS%]\ifqtmpyA.exe
[%WINDOWS%]\Temp\ms-39.exe
[%WINDOWS%]\zmovpbf.exe
[%WINDOWS%]\zmovpbfA.exe
[%PROFILE_TEMP%]\qv3xt3.game
[%PROFILE_TEMP%]\qvxt42.game
[%PROFILE_TEMP%]\Setup100.exe
[%SYSTEM%]\agibukww.exe
[%SYSTEM%]\dowhrqyg.exe
[%SYSTEM%]\jkzfsjru.exe
[%SYSTEM%]\meoybrof.exe
[%SYSTEM%]\nejfxbgx.exe
[%SYSTEM%]\uygemmke.exe
[%SYSTEM%]\vdamcczs.exe
[%SYSTEM%]\xzclrczo.exe
[%WINDOWS%]\retadpu922.exe
[%PROFILE_TEMP%]\dnlsvc.exe
[%PROFILE_TEMP%]\dnsec.exe
[%PROFILE_TEMP%]\ms-38.exe
[%SYSTEM%]\msdirect.sys
[%WINDOWS%]\ifqtmpy.exe
[%WINDOWS%]\ifqtmpyA.exe
[%WINDOWS%]\Temp\ms-39.exe
[%WINDOWS%]\zmovpbf.exe
[%WINDOWS%]\zmovpbfA.exe

Generic.Downloader Registry Keys:
HKEY_CLASSES_ROOT\clsid\{6f26ed6f-82c2-4b64-b1a7-40e644225e97}
HKEY_CLASSES_ROOT\clsid\{a405d44c-4b7b-43ea-a3ea-7e0e3065220e}
HKEY_CLASSES_ROOT\skymmstp.cfiledownload
HKEY_CLASSES_ROOT\skymmstp.cvirus
HKEY_CLASSES_ROOT\typelib\{a67726d9-4100-4582-8620-5a7e27d3ec3b}
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\dnlsvc
HKEY_CLASSES_ROOT\clsid\{721e6521-4cad-4a8d-a7f1-4e230b31ef19}
HKEY_CLASSES_ROOT\interface\{2be09adf-e81b-4b3a-bc93-267af94a7994}
HKEY_CLASSES_ROOT\interface\{4cff74bb-586f-4140-857c-05c96682ce7b}
HKEY_CLASSES_ROOT\interface\{d5722cec-adc9-4dfc-a25c-649dd0808161}
HKEY_CLASSES_ROOT\mshlp.mshlper
HKEY_CLASSES_ROOT\mshlp.mshlper.1
HKEY_CLASSES_ROOT\prjdownsecuxxx.cfiledownload
HKEY_CLASSES_ROOT\prjdownsecuxxx.cvirus
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\msdirect

Generic.Downloader Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Generic.Downloader indications of infection

This symptoms of Generic.Downloader detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Subabac Trojan Information

WebMoney.WMPatch Trojan

WebMoney.WMPatch virus description
Technical details:
Categories: Trojan
WebMoney.WMPatch Aliases:
[Panda]Trojan Horse;
[Computer Associates]Win32/WebMoney.WMPatch.h!PWS!Tro

WebMoney.WMPatch indications of infection

This symptoms of WebMoney.WMPatch detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SillyDl.BZA Trojan
MailSpam.Noname Hacker Tool Removal instruction
Pigeon.EJH Trojan Removal instruction
Remove ICMP.Xenof DoS
Vxidl.BEN Trojan Removal instruction

Vxidl.ANK Trojan

Vxidl.ANK virus description
Technical details:
Categories: Trojan

Vxidl.ANK indications of infection

This symptoms of Vxidl.ANK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.FVH Trojan Removal instruction
Infinaeon Backdoor Information
Remove archive.org Tracking Cookie

Bancos.GDY Trojan

Bancos.GDY virus description
Technical details:
Categories: Trojan
Bancos.GDY Aliases:
[Kaspersky]Trojan-Spy.Win32.Banker.qr;
[Other]Win32/Bancos.GDY,Infostealer.Bancos

Bancos.GDY indications of infection

This symptoms of Bancos.GDY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CWS Homepage Hijacker Hijacker Cleaner
CWS.MTwirl32 Hijacker Symptoms
SillyDl.CHQ Trojan Removal instruction

HLLO.GreenDay Trojan

HLLO.GreenDay virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
HLLO.GreenDay Aliases:
[Kaspersky]Win32.HLLO.GreenDay;
[Panda]W32/Greenday;
[Computer Associates]Win32.HLLO.GreenDay

HLLO.GreenDay indications of infection

This symptoms of HLLO.GreenDay detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MSN.BigBot Trojan Removal instruction
Choprox Backdoor Information

Bdurl Backdoor

Bdurl virus description
Technical details:
Categories: Backdoor

Bdurl indications of infection

This symptoms of Bdurl detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ImIServer.IEPlugin Adware Removal instruction
Vxidl.BAF Trojan Cleaner
Timbuktu.Pro RAT Removal instruction

CyberSpy Trojan

CyberSpy virus description
Technical details:
Categories: Trojan,Backdoor,RAT
CyberSpy Aliases:
[Kaspersky]Backdoor.CyberSpy.13.a,Backdoor.CyberSpy.13.b,Backdoor.CyberSpy.85,packed: UPX;
[Eset]Win32/CyberSpy.1_3 trojan,Win32/CyberSpy.1_3.B trojan,Win32/CyberSpy trojan;
[McAfee]BackDoor-NT;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/CyberSpy.13,Bck/CyberSpy.13.B,Backdoor Program,Bck/CyberSpy;
[Computer Associates]Backdoor/CyberSpy_1.3_Server,Win32.Cyberspy.13,Win32/CyberSpy.13!Trojan,Backdoor/CyberSpy.8.5,Backdoor/CyberSpy.D,Backdoor/CyberSpy

CyberSpy Files:
[%WINDOWS%]\system\msgsvr16.exe.exe
[%WINDOWS%]\system\mswincfg32.exe
[%WINDOWS%]\system\~cab001.exe
[%WINDOWS%]\system\msgsvr16.exe.exe
[%WINDOWS%]\system\mswincfg32.exe
[%WINDOWS%]\system\~cab001.exe

CyberSpy Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices


CyberSpy indications of infection

This symptoms of CyberSpy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Agent.cl Trojan Symptoms
Net.Spider RAT Cleaner
Pigeon.AQZ Trojan Removal instruction
Remove netminers.dk Tracking Cookie

Compo.cav.dr Trojan

Compo.cav.dr virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Compo.cav.dr Aliases:
[Kaspersky]Win16.Header.Compo.145;
[McAfee]W32/Compo.cav.145.dr;
[F-Prot]ExeHeader.145;
[Panda]Wi.Header.Compo.145;
[Computer Associates]Win.Header.Compo.145

Compo.cav.dr indications of infection

This symptoms of Compo.cav.dr detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.EVC Trojan
Livup Backdoor Cleaner
Vxidl.AXS Trojan Information
Vxidl.ATA Trojan Cleaner

Swapuid Trojan

Swapuid virus description
Technical details:
Categories: Trojan

Swapuid indications of infection

This symptoms of Swapuid detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PSW.Bancos Trojan Removal
fccbrawley.com Tracking Cookie Symptoms
Removing Zlob.Fam.VideoCompressionCodec Trojan

MessageLabs Tracking Cookie

MessageLabs virus description
Technical details:
Categories: Tracking Cookie

MessageLabs indications of infection

This symptoms of MessageLabs detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Crulket Trojan Cleaner
Hogle Trojan Removal instruction
Removing Agent.gp Trojan
Remove JS.Mijail Trojan
Remove Win32.Kaiten Trojan

PSW.Lmir.bj Trojan

PSW.Lmir.bj virus description
Technical details:
Categories: Trojan,Hacker Tool
PSW.Lmir.bj Aliases:
[Panda]Trojan Horse.LC

PSW.Lmir.bj indications of infection

This symptoms of PSW.Lmir.bj detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PWS.Fib Trojan Removal
Smo Trojan Information
Remove Delfile Trojan

Japanese.Christmas Trojan

Japanese.Christmas virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Japanese.Christmas Aliases:
[Kaspersky]Christmas.600,Cookie.653;
[Eset]Jap_Xmas.600.B virus;
[Panda]Japanese Cookie;
[Computer Associates]Jap Xmas.Merry,Jap Xmas.Cookie

Japanese.Christmas indications of infection

This symptoms of Japanese.Christmas detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Aunps Adware Symptoms
TeleAxxor.Server Backdoor Information

Holica Downloader

Holica virus description
Technical details:
Categories: Downloader
Holica Aliases:
[Kaspersky]Trojan-Downloader.Win32.Holica,Trojan-Downloader.Win32.Holica.c,Trojan-Downloader.Win32.Dyfuca.aw;
[McAfee]Adware-Holistyc;
[Other]Win32/Holica,Win32/Holica.D,Win32/Holica.B

Holica Files:
[%SYSTEM%]\preload2.ocx
[%SYSTEM%]\preload2.ocx


Holica indications of infection

This symptoms of Holica detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
IRC.Djaa Backdoor Removal instruction
Agent.AFE Trojan Removal
HLLT.8288a Trojan Removal
Removing Pigeon.AVO Trojan
Remove ClickSpring (PurityScan) Adware

Win32.Small.fr Trojan

Win32.Small.fr virus description
Technical details:
Categories: Trojan,Hacker Tool
Win32.Small.fr Aliases:
[Panda]Virus Constructor

Win32.Small.fr indications of infection

This symptoms of Win32.Small.fr detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Nineth Trojan Removal
Fearless.Lite Trojan Removal

SillyDl.COM Trojan

SillyDl.COM virus description
Technical details:
Categories: Trojan

SillyDl.COM indications of infection

This symptoms of SillyDl.COM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.VB.cr Trojan Information
Remove AP.gh Trojan