Keylogger.Common.Components Spyware

Keylogger.Common.Components virus description
Technical details:
Categories: Spyware

Keylogger.Common.Components Folders:
[%APPDATA%]\ksp


Keylogger.Common.Components indications of infection

This symptoms of Keylogger.Common.Components detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HZB Trojan Cleaner
Sadist Trojan Information
Back.Construction Trojan Information
Removing VideoPorno Adware

Pigeon.EUM Trojan

Pigeon.EUM virus description
Technical details:
Categories: Trojan

Pigeon.EUM indications of infection

This symptoms of Pigeon.EUM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PWS.Pexp Trojan Removal instruction
Removing SrvCmd Trojan
Win32.NetDown Trojan Removal

Win32Info BHO

Win32Info virus description
Technical details:
Categories: BHO,Downloader

Win32Info Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Win32Info indications of infection

This symptoms of Win32Info detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
sitesuite.org Tracking Cookie Information
Bancos.DHX Trojan Removal instruction
ICanNews Adware Cleaner
XXXToolBar BHO Symptoms

Red.ZONE RAT

Red.ZONE virus description
Technical details:
Categories: RAT

Red.ZONE indications of infection

This symptoms of Red.ZONE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
stealth.nl Tracking Cookie Information
PS.MPC Trojan Information

SillyDl.CHT Trojan

SillyDl.CHT virus description
Technical details:
Categories: Trojan

SillyDl.CHT indications of infection

This symptoms of SillyDl.CHT detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CyberSpy Trojan Symptoms
Removing TinyBar Adware
Australian.Little Trojan Symptoms
Removing Pigeon.AGC Trojan

QFZ RAT

QFZ virus description
Technical details:
Categories: RAT

QFZ indications of infection

This symptoms of QFZ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VB.np Backdoor Removal
Remove adocean.pl Tracking Cookie

Ranky.du Trojan

Ranky.du virus description
Technical details:
Categories: Trojan,Hacker Tool

Ranky.du Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Ranky.du indications of infection

This symptoms of Ranky.du detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Datar Trojan
Removing FormatFDD Trojan
Remove Small.hx Trojan

Swizzor.ba Downloader

Swizzor.ba virus description
Technical details:
Categories: Downloader

Swizzor.ba indications of infection

This symptoms of Swizzor.ba detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Freeprod Downloader
Agent.nn Downloader Cleaner

Delalot Trojan

Delalot virus description
Technical details:
Categories: Trojan
Delalot Aliases:
[Panda]Trojan Horse.LC,Trojan Horse;
[Computer Associates]Win32.Delalot,Win32/Delalot!Trojan,Win32/Delalot.C!Trojan

Delalot indications of infection

This symptoms of Delalot detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Hoolaxy Trojan Symptoms
Remove Fonesex Trojan
Remove Sbsoft Trojan

Peacekeeper Trojan

Peacekeeper virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Peacekeeper Aliases:
[Kaspersky]PeaceKeeper.a

Peacekeeper indications of infection

This symptoms of Peacekeeper detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AZF Trojan Symptoms
Backdoor.SDBot.Server.Variant Trojan Removal
Yewbdown Trojan Information
CorporateLife Trojan Cleaner

r57shell Backdoor

r57shell virus description
Technical details:
Categories: Backdoor

r57shell indications of infection

This symptoms of r57shell detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Zagaban Trojan Cleaner

Boomer Trojan

Boomer virus description
Technical details:
Categories: Trojan
Boomer Aliases:
[Kaspersky]Trojan.Win32.Boomer;
[Eset]Win32/Boomer trojan;
[McAfee]Boomer;
[F-Prot]destructive program;
[Panda]Trj/W32.Boomer;
[Computer Associates]Win32/Boomer!Trojan

Boomer indications of infection

This symptoms of Boomer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Backdoor.Zombam.Server Trojan
Bancos.HXV Trojan Removal instruction
Removing Cyberloard Trojan
The.Spy.Beta Trojan Removal instruction
Removing Pigeon.AET Trojan

HaczYK Adware

HaczYK virus description
Technical details:
Categories: Adware

HaczYK Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


HaczYK indications of infection

This symptoms of HaczYK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing PSW.QQpass Trojan
Monkey Trojan Symptoms
Frethog.ADP Trojan Symptoms
Surila Trojan Information

FixThemNow Ransomware

FixThemNow virus description
Technical details:
Categories: Ransomware

FixThemNow Folders:
[%APPDATA%]\fixthemnow\Data
[%COMMON_PROGRAMS%]\FixThemNow
[%PROGRAM_FILES%]\FixThemNow
[%PROGRAM_FILES_COMMON%]\FixThemNow

FixThemNow Files:
[%DESKTOP%]\FixThemNow.lnk
[%PROFILE_TEMP%]\NI.UGES_0001_N122M2111\settings.ini
[%PROFILE_TEMP%]\NI.UGES_0001_N122M2111\setup.exe
[%PROFILE_TEMP%]\NI.UGES_0001_N122M2111\setup.len
[%DESKTOP%]\FixThemNow.lnk
[%PROFILE_TEMP%]\NI.UGES_0001_N122M2111\settings.ini
[%PROFILE_TEMP%]\NI.UGES_0001_N122M2111\setup.exe
[%PROFILE_TEMP%]\NI.UGES_0001_N122M2111\setup.len

FixThemNow Registry Keys:
HKEY_CURRENT_USER\software\fixthemnow

FixThemNow Registry Values:
HKEY_LOCAL_MACHINE\software\fixthemnow
HKEY_LOCAL_MACHINE\software\fixthemnow
HKEY_LOCAL_MACHINE\software\fixthemnow
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


FixThemNow indications of infection

This symptoms of FixThemNow detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EXR Trojan Cleaner

promokant.com Tracking Cookie

promokant.com virus description
Technical details:
Categories: Tracking Cookie

promokant.com indications of infection

This symptoms of promokant.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
QQThief Trojan Removal
CoolWebSearch Hijacker Information
myCleanerPC Adware Symptoms
Guangwaigirl.53b Backdoor Information
Kimand Trojan Cleaner

BackOrifice2000.client Trojan

BackOrifice2000.client virus description
Technical details:
Categories: Trojan

BackOrifice2000.client indications of infection

This symptoms of BackOrifice2000.client detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Nunci Hijacker

Bat.BWG.Kit Trojan

Bat.BWG.Kit virus description
Technical details:
Categories: Trojan,Worm,Hacker Tool
Bat.BWG.Kit Aliases:
[Kaspersky]Constructor.BAT.BWG,Constructor.BAT.BWG.001,Constructor.BAT.BWG.003,Constructor.BAT.BWG.004,Constructor.BAT.BWG.005,Constructor.BAT.BWG.101,Constructor.BAT.BWG.102,Constructor.BAT.BWG.103,Constructor.BAT.BWG.104,Constructor.BAT.BWG.105,Constructor.BAT.BWG.107,Constructor.BAT.BWG.108,Constructor.BAT.BWG.109,Constructor.BAT.BWG.110,Constructor.BAT.BWG.200,Constructor.BAT.BWG.201,Constructor.BAT.BWG.203,Constructor.BAT.BWG.204,Constructor.BAT.BWG.205,Constructor.BAT.BWG.206,Constructor.BAT.BWG.207,Constructor.BAT.BWG.208,Constructor.BAT.BWG.209,Constructor.BAT.BWG.301,Constructor.BAT.BWG.302,Constructor.BAT.BWG.400,Constructor.BAT.BWG.401,Constructor.BAT.BWG.403,Constructor.BAT.BWG.405,Constructor.BAT.BWG.406,Constructor.BAT.BWG.407,Constructor.BAT.BWG.408,Constructor.BAT.BWG.411,I-Worm.BWG.a,I-Worm.BWG.b,I-Worm.BWG.d,Constructor.BAT.BWG.501.a,I-Worm.BWG.f;
[Eset]BAT/BWG worm,BAT/BWG.001 Constructor,BAT/BWG.002 Constructor,BAT/BWG.003 Constructor,BAT/BWG.004 Constructor,BAT/BWG.005 Constructor,BAT/BWG.101 Constructor,BAT/BWG.102 Constructor,BAT/BWG.103 Constructor,BAT/BWG.104 Constructor,BAT/BWG.105 Constructor,BAT/BWG.106 Constructor,BAT/BWG.107 Constructor,BAT/BWG.108 Constructor,BAT/BWG.109 Constructor,BAT/BWG.110 Constructor,BAT/BWG.111 Constructor,BAT/BWG.200 Constructor,BAT/BWG.201 Constructor,BAT/BWG.203 Constructor,BAT/BWG.204 Constructor,BAT/BWG.205 Constructor,BAT/BWG.206 Constructor,BAT/BWG.207 Constructor,BAT/BWG.208 Constructor,BAT/BWG.209 Constructor,BAT/BWG.301 Constructor,BAT/BWG.302 Constructor,BAT/BWG.400 Constructor,BAT/BWG.401 Constructor,BAT/BWG.402 Constructor,BAT/BWG.403 Constructor,BAT/BWG.405 Constructor,BAT/BWG.406 Constructor,BAT/BWG.407 Constructor,BAT/BWG.408 Constructor,BAT/BWG.409 Constructor,BAT/BWG.410 Constructor,probably unknown SCRIPT virus,BAT/BWG.500 Constructor,BAT/BWG.501 Constructor;
[McAfee]Bat/BWG.Kit,Bat/BWG.Kit trojan,Unsafe Program,Bat/Bwg.Kit;
[F-Prot]destructive program,virus construction tool;
[Panda]Worm Generic;
[Computer Associates]BAT.Bwg,BAT.BWG generated,Bat/Aut0.Worm,Bat/BWG2.3999

Bat.BWG.Kit indications of infection

This symptoms of Bat.BWG.Kit detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Delf.di Backdoor Cleaner
Formula95Macro.Craze.A:intended Trojan Removal
Checkout Trojan Information
Removing Pigeon.EPK Trojan
SillyDl.DBW Trojan Removal instruction

Osctr Trojan

Osctr virus description
Technical details:
Categories: Trojan
Osctr Aliases:
[Kaspersky]Backdoor.Win32.Agent.aiu;
[Other]Win32/Osctr,Win32/Osctr!generic

Osctr Files:
[%SYSTEM%]\drivers\vissv.sys
[%SYSTEM%]\sescmgr.exe
[%SYSTEM%]\drivers\vissv.sys
[%SYSTEM%]\sescmgr.exe

Osctr Registry Keys:
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_vissv
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\vissv

Osctr Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Osctr indications of infection

This symptoms of Osctr detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GTD Trojan Information
Softomate Adware Information
Backdoor.TheThing.Server.family Trojan Information
Remove Bancos.IHH Trojan
MetaDirect Adware Cleaner

FBI Trojan

FBI virus description
Technical details:
Categories: Trojan
FBI Aliases:
[Kaspersky]Trojan.FBI;
[McAfee]FBI;
[F-Prot]destructive program;
[Panda]Trj/FBI;
[Computer Associates]FBI!Trojan

FBI indications of infection

This symptoms of FBI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Restrict Trojan Removal
Vxidl.APV Trojan Cleaner
FavoriteMan.SpyAssault BHO Cleaner

Pointex.Server Backdoor

Pointex.Server virus description
Technical details:
Categories: Backdoor
Pointex.Server Aliases:
[Computer Associates]Backdoor/Pointex.c.Server

Pointex.Server indications of infection

This symptoms of Pointex.Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Ehg.superwarehouse.hitbox Tracking Cookie
IRC.Logger Spyware Symptoms
Bubonic.lame.against.Windows.machines DoS Information
Remove GetScreen Trojan

VirusBurst Ransomware

VirusBurst virus description
Technical details:
Categories: Ransomware

VirusBurst Folders:
[%PROGRAMS%]\Virus-Bursters
[%PROGRAMS%]\VirusBurster
[%PROGRAM_FILES%]\vb
[%PROGRAM_FILES%]\vb
[%PROGRAM_FILES%]\Virus-Burst
[%PROGRAM_FILES%]\Virus-Bursters
[%PROGRAM_FILES%]\VirusBurst
[%PROGRAM_FILES%]\VirusBurst
[%PROGRAM_FILES%]\VirusBurster
[%PROGRAM_FILES%]\VirusBursters

VirusBurst Files:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\vb 6.1.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\vb 6.1.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Virus-Burst 6.1.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Virus-Bursters 6.3.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusBurster 6.2.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusBurster 6.3.lnk
[%DESKTOP%]\Virus-Burst.lnk
[%DESKTOP%]\VirusBurst.lnk
[%DESKTOP%]\VirusBurst.lnk
[%DESKTOP%]\VirusBurster.lnk
[%PROFILE%]\cmd.exe
[%PROFILE%]\cmd.exe
[%PROFILE%]\start
[%PROFILE%]\start
[%PROGRAMS%]\VirusBurst\Uninstall VirusBurst 6.1.lnk
[%PROGRAMS%]\VirusBurst\Uninstall VirusBurst 6.1.lnk
[%PROGRAMS%]\VirusBurst\VirusBurst 6.1 Website.lnk
[%PROGRAMS%]\VirusBurst\VirusBurst 6.1 Website.lnk
[%PROGRAMS%]\VirusBurst\VirusBurst 6.1.lnk
[%PROGRAMS%]\VirusBurst\VirusBurst 6.1.lnk
[%PROGRAM_FILES%]\vb\ignored.lst
[%PROGRAM_FILES%]\vb\vb.exe
[%PROGRAM_FILES%]\vb\virbur.ini
[%PROGRAM_FILES%]\Virus-Burst\virbur.ini
[%PROGRAM_FILES%]\Virus-Burst\Virus-Burst.exe
[%PROGRAM_FILES%]\VirusBurst\blacklist.txt
[%PROGRAM_FILES%]\VirusBurst\blacklist.txt
[%PROGRAM_FILES%]\VirusBurst\ignored.lst
[%PROGRAM_FILES%]\VirusBurst\ignored.lst
[%PROGRAM_FILES%]\VirusBurst\Lang\English.ini
[%PROGRAM_FILES%]\VirusBurst\msvcp71.dll
[%PROGRAM_FILES%]\VirusBurst\msvcp71.dll
[%PROGRAM_FILES%]\VirusBurst\msvcr71.dll
[%PROGRAM_FILES%]\VirusBurst\msvcr71.dll
[%PROGRAM_FILES%]\VirusBurst\ref.dat
[%PROGRAM_FILES%]\VirusBurst\ref.dat
[%PROGRAM_FILES%]\VirusBurst\uninst.exe
[%PROGRAM_FILES%]\VirusBurst\uninst.exe
[%PROGRAM_FILES%]\VirusBurst\vb.ini
[%PROGRAM_FILES%]\VirusBurst\vb.ini
[%PROGRAM_FILES%]\VirusBurst\VirusBurst.exe
[%PROGRAM_FILES%]\VirusBurst\VirusBurst.exe
[%PROGRAM_FILES%]\VirusBurst\VirusBurst.url
[%PROGRAM_FILES%]\VirusBurst\VirusBurst.url
[%STARTMENU%]\Virus-Burst 6.1.lnk
[%STARTMENU%]\VirusBurst 6.1.lnk
[%SYSTEM%]\eowygj.dll
[%SYSTEM%]\popspig
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\vb 6.1.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\vb 6.1.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Virus-Burst 6.1.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\Virus-Bursters 6.3.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusBurster 6.2.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusBurster 6.3.lnk
[%DESKTOP%]\Virus-Burst.lnk
[%DESKTOP%]\VirusBurst.lnk
[%DESKTOP%]\VirusBurst.lnk
[%DESKTOP%]\VirusBurster.lnk
[%PROFILE%]\cmd.exe
[%PROFILE%]\cmd.exe
[%PROFILE%]\start
[%PROFILE%]\start
[%PROGRAMS%]\VirusBurst\Uninstall VirusBurst 6.1.lnk
[%PROGRAMS%]\VirusBurst\Uninstall VirusBurst 6.1.lnk
[%PROGRAMS%]\VirusBurst\VirusBurst 6.1 Website.lnk
[%PROGRAMS%]\VirusBurst\VirusBurst 6.1 Website.lnk
[%PROGRAMS%]\VirusBurst\VirusBurst 6.1.lnk
[%PROGRAMS%]\VirusBurst\VirusBurst 6.1.lnk
[%PROGRAM_FILES%]\vb\ignored.lst
[%PROGRAM_FILES%]\vb\vb.exe
[%PROGRAM_FILES%]\vb\virbur.ini
[%PROGRAM_FILES%]\Virus-Burst\virbur.ini
[%PROGRAM_FILES%]\Virus-Burst\Virus-Burst.exe
[%PROGRAM_FILES%]\VirusBurst\blacklist.txt
[%PROGRAM_FILES%]\VirusBurst\blacklist.txt
[%PROGRAM_FILES%]\VirusBurst\ignored.lst
[%PROGRAM_FILES%]\VirusBurst\ignored.lst
[%PROGRAM_FILES%]\VirusBurst\Lang\English.ini
[%PROGRAM_FILES%]\VirusBurst\msvcp71.dll
[%PROGRAM_FILES%]\VirusBurst\msvcp71.dll
[%PROGRAM_FILES%]\VirusBurst\msvcr71.dll
[%PROGRAM_FILES%]\VirusBurst\msvcr71.dll
[%PROGRAM_FILES%]\VirusBurst\ref.dat
[%PROGRAM_FILES%]\VirusBurst\ref.dat
[%PROGRAM_FILES%]\VirusBurst\uninst.exe
[%PROGRAM_FILES%]\VirusBurst\uninst.exe
[%PROGRAM_FILES%]\VirusBurst\vb.ini
[%PROGRAM_FILES%]\VirusBurst\vb.ini
[%PROGRAM_FILES%]\VirusBurst\VirusBurst.exe
[%PROGRAM_FILES%]\VirusBurst\VirusBurst.exe
[%PROGRAM_FILES%]\VirusBurst\VirusBurst.url
[%PROGRAM_FILES%]\VirusBurst\VirusBurst.url
[%STARTMENU%]\Virus-Burst 6.1.lnk
[%STARTMENU%]\VirusBurst 6.1.lnk
[%SYSTEM%]\eowygj.dll
[%SYSTEM%]\popspig

VirusBurst Registry Keys:
HKEY_CLASSES_ROOT\AVZipEnchancer.Chl
HKEY_CLASSES_ROOT\CLSID\{6076d2b1-634c-4685-843b-f826045ea5dc}
HKEY_CLASSES_ROOT\CLSID\{6570b782-1a41-4053-b2c9-12c7fcf0d84d}
HKEY_CLASSES_ROOT\CLSID\{CCFB2B33-F4DB-B63D-ABDC-C7384ED93B34}
HKEY_CLASSES_ROOT\CLSID\{CCFB2B33-F4DB-B63D-ABDC-C7384ED93B34}
HKEY_CLASSES_ROOT\CLSID\{e944d14a-03aa-43e3-9d0e-4f50c4d1b005}
HKEY_CLASSES_ROOT\Interface\{016859C2-97B6-45FC-816B-A3B91BA10A0F}
HKEY_CLASSES_ROOT\Interface\{03713ADE-819C-43D9-B138-67828D4C0405}
HKEY_CLASSES_ROOT\Interface\{05DDEB15-33E0-4DE3-B7CD-84E2E011D889}
HKEY_CLASSES_ROOT\Interface\{05DDEB15-33E0-4DE3-B7CD-84E2E011D889}
HKEY_CLASSES_ROOT\Interface\{0B386DB3-239C-41D6-85CB-CA728F31F3FC}
HKEY_CLASSES_ROOT\Interface\{0B386DB3-239C-41D6-85CB-CA728F31F3FC}
HKEY_CLASSES_ROOT\Interface\{0BDF8F38-347C-4810-BDA6-2F85C1050B26}
HKEY_CLASSES_ROOT\Interface\{0D5364E2-8FD5-4AEE-8353-79ABE11BC89B}
HKEY_CLASSES_ROOT\Interface\{111792AF-85B4-4768-AB91-682174B14B90}
HKEY_CLASSES_ROOT\Interface\{18A1A6BB-8AE3-47E3-B9D4-75ABFE0CAC03}
HKEY_CLASSES_ROOT\Interface\{1F2FC7B3-F2A0-4717-96B4-01D787DA9949}
HKEY_CLASSES_ROOT\Interface\{230E8C2A-1317-49FD-A022-4E68AED75668}
HKEY_CLASSES_ROOT\Interface\{2D1254A1-4A1A-4339-9DE5-D05CADD5C44C}
HKEY_CLASSES_ROOT\Interface\{2E64DCDD-94BB-4CAB-A93A-4416A3585DA0}
HKEY_CLASSES_ROOT\Interface\{2E94C834-9EFA-4C46-B032-A185C69EBC53}
HKEY_CLASSES_ROOT\Interface\{2E94C834-9EFA-4C46-B032-A185C69EBC53}
HKEY_CLASSES_ROOT\Interface\{2F34C08C-E0AF-4EB2-AFCF-3A13DC489FA6}
HKEY_CLASSES_ROOT\Interface\{34D2738B-701F-454A-9198-25924CF75E92}
HKEY_CLASSES_ROOT\Interface\{34D2738B-701F-454A-9198-25924CF75E92}
HKEY_CLASSES_ROOT\Interface\{3863C215-13E6-4E29-9921-78CE0A6F272A}
HKEY_CLASSES_ROOT\Interface\{3863C215-13E6-4E29-9921-78CE0A6F272A}
HKEY_CLASSES_ROOT\Interface\{3E8641B2-0EA7-43B4-B8B5-895F155D9A9D}
HKEY_CLASSES_ROOT\Interface\{420EE180-CE72-40AC-83CB-B55DCB68CCF1}
HKEY_CLASSES_ROOT\Interface\{420EE180-CE72-40AC-83CB-B55DCB68CCF1}
HKEY_CLASSES_ROOT\Interface\{423FA7B8-5671-41DD-9C4D-B36607F31BCE}
HKEY_CLASSES_ROOT\Interface\{4259549C-361C-471D-BBCD-90671B818338}
HKEY_CLASSES_ROOT\Interface\{49D486E8-1932-492D-B1BD-B4D638BEBD84}
HKEY_CLASSES_ROOT\Interface\{49E2EB9D-A5E6-450E-9708-251876BF3E7F}
HKEY_CLASSES_ROOT\Interface\{57859C9A-F115-4074-B7BC-AD69711EF51A}
HKEY_CLASSES_ROOT\Interface\{638C512D-C04A-4E06-A9A3-8127C4E5B4E7}
HKEY_CLASSES_ROOT\Interface\{638C512D-C04A-4E06-A9A3-8127C4E5B4E7}
HKEY_CLASSES_ROOT\Interface\{63CA0A34-071D-4780-A5BD-28F0CFC3E512}
HKEY_CLASSES_ROOT\Interface\{63CA0A34-071D-4780-A5BD-28F0CFC3E512}
HKEY_CLASSES_ROOT\Interface\{68C625EA-B8E3-4FC1-9F6E-8A1B50AA9C8C}
HKEY_CLASSES_ROOT\Interface\{6F821290-E277-4F87-B4BD-AE48564EF21D}
HKEY_CLASSES_ROOT\Interface\{707B2F9D-B855-4730-BB5D-44669B4F11E4}
HKEY_CLASSES_ROOT\Interface\{73467269-7B9F-4F66-B381-D914A7ACECEB}
HKEY_CLASSES_ROOT\Interface\{73467269-7B9F-4F66-B381-D914A7ACECEB}
HKEY_CLASSES_ROOT\Interface\{7DF33004-9121-4FD5-93B6-6376060D2D3A}
HKEY_CLASSES_ROOT\Interface\{7DF33004-9121-4FD5-93B6-6376060D2D3A}
HKEY_CLASSES_ROOT\Interface\{87172D4B-FA72-406F-996E-2C6817B8E1FF}
HKEY_CLASSES_ROOT\Interface\{9BA6B541-EB04-44C9-9156-9573DB5345A5}
HKEY_CLASSES_ROOT\Interface\{9EC1C26F-0480-4BBC-BC69-7AC270388D0B}
HKEY_CLASSES_ROOT\Interface\{A7308DE2-D644-488D-80D5-071710F5B840}
HKEY_CLASSES_ROOT\Interface\{A7308DE2-D644-488D-80D5-071710F5B840}
HKEY_CLASSES_ROOT\Interface\{A8718256-70C8-4914-8F64-B8B9C1A64AAA}
HKEY_CLASSES_ROOT\Interface\{ABA193DF-6C52-4D02-975A-94A85B32DC3C}
HKEY_CLASSES_ROOT\Interface\{ABA193DF-6C52-4D02-975A-94A85B32DC3C}
HKEY_CLASSES_ROOT\Interface\{AFB40450-78FE-4F01-BE69-A76A8C396304}
HKEY_CLASSES_ROOT\Interface\{AFB40450-78FE-4F01-BE69-A76A8C396304}
HKEY_CLASSES_ROOT\Interface\{C3A42538-303B-4541-915D-C79AD9C75EB8}
HKEY_CLASSES_ROOT\Interface\{C48AE974-0D27-47D6-A3E9-881CF3301F72}
HKEY_CLASSES_ROOT\Interface\{C61736BF-F408-4475-B41D-8DDD96F86342}
HKEY_CLASSES_ROOT\Interface\{C793C7C5-E89F-48EC-83C9-06AC097E8CB9}
HKEY_CLASSES_ROOT\Interface\{C793C7C5-E89F-48EC-83C9-06AC097E8CB9}
HKEY_CLASSES_ROOT\Interface\{CAD91BD2-75E7-4E5F-A939-4ECC2D512918}
HKEY_CLASSES_ROOT\Interface\{CAD91BD2-75E7-4E5F-A939-4ECC2D512918}
HKEY_CLASSES_ROOT\Interface\{D9037DA6-C9DF-4FCB-9C2E-2A1F10786FEA}
HKEY_CLASSES_ROOT\Interface\{DA02B168-8841-4248-BF22-67E2EC5958C3}
HKEY_CLASSES_ROOT\Interface\{DA457340-9643-476D-A41A-09496677B2A3}
HKEY_CLASSES_ROOT\Interface\{E120C137-922C-434C-8A02-2A8D27B3E2D2}
HKEY_CLASSES_ROOT\Interface\{E120C137-922C-434C-8A02-2A8D27B3E2D2}
HKEY_CLASSES_ROOT\Interface\{E505FB9B-6CB3-44C5-9F0E-B01121076CC9}
HKEY_CLASSES_ROOT\Interface\{EB94E265-AC37-40C1-A656-044F38ED31D6}
HKEY_CLASSES_ROOT\TypeLib\{00B3D2B1-1EAD-4611-A348-9ECBC4C565A7}
HKEY_CLASSES_ROOT\TypeLib\{728E63B0-5165-4E98-9C83-EF987EEB66C9}
HKEY_CLASSES_ROOT\TypeLib\{728E63B0-5165-4E98-9C83-EF987EEB66C9}
HKEY_CLASSES_ROOT\TypeLib\{C17EB50A-667E-43B4-A53E-5B73F46AA009}
HKEY_CLASSES_ROOT\VSEnchancer.Chl
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Virus-Burst.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\VirusBurst.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\VirusBurst.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\VirusBurst
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\VirusBurst
HKEY_LOCAL_MACHINE\SOFTWARE\Virus-Burst
HKEY_LOCAL_MACHINE\SOFTWARE\VirusBurst
HKEY_LOCAL_MACHINE\SOFTWARE\VirusBurst

VirusBurst Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Virus-Burst.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\VirusBurst.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad


VirusBurst indications of infection

This symptoms of VirusBurst detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CWS.TheRealSearch Hijacker Information
Scpact Trojan Cleaner

Fropio Trojan

Fropio virus description
Technical details:
Categories: Trojan

Fropio indications of infection

This symptoms of Fropio detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HMG Trojan Information
Punisher Trojan Cleaner

SAdoor Backdoor

SAdoor virus description
Technical details:
Categories: Backdoor,Hacker Tool
SAdoor Aliases:
[Kaspersky]Backdoor.Sadoor,Backdoor.School.155;
[Panda]Backdoor Program,Bck/School;
[Computer Associates]Backdoor/School.155!Server,Win32/Sadoor!Trojan

SAdoor indications of infection

This symptoms of SAdoor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove TDPop Adware
Charaho Trojan Removal
Removing Bluedit Trojan
Win32.Killqq Trojan Information

Hallo Backdoor

Hallo virus description
Technical details:
Categories: Backdoor,RAT
Hallo Aliases:
[Kaspersky]Backdoor.Hallodoor;
[Panda]Backdoor Program;
[Computer Associates]Win32/Spaeher.B

Hallo indications of infection

This symptoms of Hallo detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
UltraVNC RAT Cleaner
Remove TrojanDropper.Win32.Delf.bw Trojan

Close.UpDownloader RAT

Close.UpDownloader virus description
Technical details:
Categories: RAT

Close.UpDownloader indications of infection

This symptoms of Close.UpDownloader detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
iconinstaller Trojan Cleaner
SCRK.com Tracking Cookie Removal instruction

Sigatus Spyware

Sigatus virus description
Technical details:
Categories: Spyware,Backdoor
Sigatus Aliases:
[Kaspersky]TrojanSpy.Win32.Sigatar.504;
[Panda]Univ.PS;
[Computer Associates]Backdoor/Sigatus.A

Sigatus indications of infection

This symptoms of Sigatus detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HNC Trojan Removal
Ofrel Adware Removal instruction
Donald.Dick Trojan Information
Dluca.gen Downloader Removal instruction

Backdoor.Matrix.Server.family Backdoor

Backdoor.Matrix.Server.family virus description
Technical details:
Categories: Backdoor
Backdoor.Matrix.Server.family Aliases:
[Kaspersky]Backdoor.Matrix.17;
[McAfee]BackDoor-FT;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Matrix.17;
[Computer Associates]Win32.MavMat.17

Backdoor.Matrix.Server.family indications of infection

This symptoms of Backdoor.Matrix.Server.family detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Winhwak Trojan Information
SillyDl.CNU Trojan Cleaner
Doomob Trojan Information
SmallFun Trojan Removal instruction

Shorni Trojan

Shorni virus description
Technical details:
Categories: Trojan
Shorni Aliases:
[Kaspersky]Trojan-Proxy.Win32.Agent.iq;
[McAfee]PWS-LDPinch;
[F-Prot]W32/Proxy.KI;
[Other]Win32/Shorni.B,Trojan Horse,W32/Agent.LHJ,Troj/LdPinch-DH,Trojan-Proxy.Win32.Agent.iq

Shorni indications of infection

This symptoms of Shorni detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Backdoor.SchoolBus.d!Server Backdoor

Pigeon.EKN Trojan

Pigeon.EKN virus description
Technical details:
Categories: Trojan

Pigeon.EKN indications of infection

This symptoms of Pigeon.EKN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Gaobot.XW Worm Symptoms
Removing Zlob.Fam.SuperCodec Trojan
Remove Vxidl.AXG Trojan
Creazione Adware Information