Y!F**ker DoS

Y!F**ker virus description
Technical details:
Categories: DoS

Y!F**ker indications of infection

This symptoms of Y!F**ker detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bancos.HQC Trojan
Pages Trojan Removal

Bancos.IAD Trojan

Bancos.IAD virus description
Technical details:
Categories: Trojan

Bancos.IAD indications of infection

This symptoms of Bancos.IAD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing FreeScratchCards Hijacker
Removing Bat.Abm Trojan
Yahoo.Freeze DoS Cleaner

TrojanDownloader.906e Downloader

TrojanDownloader.906e virus description
Technical details:
Categories: Downloader

TrojanDownloader.906e indications of infection

This symptoms of TrojanDownloader.906e detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Spamhaus Trojan
EZCyberSearch Adware Removal
Remove BAT.Eman Trojan
Schoolbus Backdoor Removal

Perl.Anarchy Trojan

Perl.Anarchy virus description
Technical details:
Categories: Trojan,Backdoor
Perl.Anarchy Aliases:
[Eset]Perl/Anarchy trojan;
[Computer Associates]Backdoor/Perl.Anarchy

Perl.Anarchy indications of infection

This symptoms of Perl.Anarchy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bat.Chezy Trojan Cleaner
Capiruf Trojan Information
Softi Trojan Symptoms
eb Trojan Cleaner
JS.MFSA2005 Trojan Information

Sinf Backdoor

Sinf virus description
Technical details:
Categories: Backdoor

Sinf indications of infection

This symptoms of Sinf detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Chopham Trojan Removal
Removing SecondPower.Multimedia.Speedbar BHO
Vxidl.AWT Trojan Removal instruction

MailSpam.Delf Hacker Tool

MailSpam.Delf virus description
Technical details:
Categories: Hacker Tool,DoS
MailSpam.Delf Aliases:
[Panda]Flooder/Imafraid.A,Flooder Program,Spammer/Ebomb.A

MailSpam.Delf indications of infection

This symptoms of MailSpam.Delf detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Skun.1b1 RAT

Athsap Trojan

Athsap virus description
Technical details:
Categories: Trojan
Athsap Aliases:
[Kaspersky]Trojan-CLicker.Win32.Agent.jh,Trojan-Clicker.Win32.Agent.jh;
[Other]Win32/Athsap.A,Trojan.Zonebac,Win32/Athsap.C,Trojan.Advatrix

Athsap Folders:
[%PROGRAM_FILES%]\WinBudget


Athsap indications of infection

This symptoms of Athsap detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Voronezh Trojan Cleaner

The.Ripperz.IP.Mail RAT

The.Ripperz.IP.Mail virus description
Technical details:
Categories: RAT

The.Ripperz.IP.Mail indications of infection

This symptoms of The.Ripperz.IP.Mail detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Tfd.cFlooder DoS Information
Remove Deftcode Backdoor
Delf.ald Backdoor Removal instruction

Bancos.FUB Trojan

Bancos.FUB virus description
Technical details:
Categories: Trojan

Bancos.FUB indications of infection

This symptoms of Bancos.FUB detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AGI Trojan Symptoms
Win32.CyberJack Trojan Cleaner
SillyDl.CLH Trojan Removal

Win32.Dialdoor Trojan

Win32.Dialdoor virus description
Technical details:
Categories: Trojan,Backdoor
Win32.Dialdoor Aliases:
[Eset]Win32/Dialdoor trojan

Win32.Dialdoor indications of infection

This symptoms of Win32.Dialdoor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CJG Trojan Removal
VBS.Webdownloader Downloader Information

SpyBuddy Spyware

SpyBuddy virus description
Technical details:
Categories: Spyware

SpyBuddy Folders:
[%PROGRAM_FILES%]\exploreanywhere
[%APPDATA%]\winsyscfg
[%DESKTOP%]\spybuddy
[%PROGRAMS%]\spybuddy

SpyBuddy Files:
[%WINDOWS%]\sbconfig.dat
[%WINDOWS%]\sbconfig.dat

SpyBuddy Registry Keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{15AD4789-CDB4-47E1-A9DA-992EE8E6BAD6}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{15ad4789-cdb4-47e1-a9da-992ee8e6bad6}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\spybuddy


SpyBuddy indications of infection

This symptoms of SpyBuddy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Belnow Trojan
Bancos.FVT Trojan Cleaner
strefa.pl Tracking Cookie Information
Remove HRC Trojan
Removing MIRC.nHTMLn DoS

Greepa Trojan

Greepa virus description
Technical details:
Categories: Trojan,Hacker Tool

Greepa indications of infection

This symptoms of Greepa detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Comforest Trojan Symptoms

Vxidl.AXR Trojan

Vxidl.AXR virus description
Technical details:
Categories: Trojan

Vxidl.AXR indications of infection

This symptoms of Vxidl.AXR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing BAT.Stella Trojan
Aboutblank Trojan Information
Fatlis Trojan Removal

Pigeon.ETE Trojan

Pigeon.ETE virus description
Technical details:
Categories: Trojan

Pigeon.ETE indications of infection

This symptoms of Pigeon.ETE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanDownloader.Win32.Small.qt Downloader Cleaner
Removing Media.AdVantage Adware
Remove TrojanDownloader.Win32.Agent.aw Downloader

Reven Trojan

Reven virus description
Technical details:
Categories: Trojan
Reven Aliases:
[Panda]Trojan Horse

Reven indications of infection

This symptoms of Reven detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HUM Trojan Cleaner
Pigeon.FAR Trojan Cleaner
SillyDl.CHY Trojan Cleaner
Breath2001 Trojan Information

Negasmsa Trojan

Negasmsa virus description
Technical details:
Categories: Trojan
Negasmsa Aliases:
[Panda]Trj/W32.Negasm,Trj/W32.DelAll.D;
[Computer Associates]Win32/Negasmsa.A!Trojan,Win32/Negasmsa.B!Trojan

Negasmsa indications of infection

This symptoms of Negasmsa detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Lemir.ek Trojan Symptoms
SillyDl.CRE Trojan Cleaner

Virri Trojan

Virri virus description
Technical details:
Categories: Trojan
Virri Aliases:
[Panda]Trj/Virri9.B,Trj/Virri10.B,Trj/Virri1;
[Computer Associates]Virri!Trojan,Virri.10.B.U!Trojan

Virri indications of infection

This symptoms of Virri detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Yobe.worm Trojan Symptoms

DeUpgrade Trojan

DeUpgrade virus description
Technical details:
Categories: Trojan

DeUpgrade indications of infection

This symptoms of DeUpgrade detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
BAT.Delfiles Trojan Information
Remove Yankee Trojan
Pigeon.AHC Trojan Symptoms
Ardamax.Keylogger Spyware Information

Backdoor.Progent.11!DLL Trojan

Backdoor.Progent.11!DLL virus description
Technical details:
Categories: Trojan,Backdoor
Backdoor.Progent.11!DLL Aliases:
[Kaspersky]TrojanSpy.Win32.ProAgent.11;
[Eset]Win32/Spy.ProAgent.11 trojan;
[Panda]Trojan Horse

Backdoor.Progent.11!DLL Files:
[%PROGRAM_FILES%]\VPN Clients\tightvnc-1.2.9-setup.exe
[%PROGRAM_FILES%]\VPN Clients\tightvnc-1.2.9-setup.exe

Backdoor.Progent.11!DLL Registry Keys:
HKEY_CURRENT_USER\software\orl\vnchooks\application_prefs\winvnc.exe
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\tightvnc_is1


Backdoor.Progent.11!DLL indications of infection

This symptoms of Backdoor.Progent.11!DLL detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AQT Trojan Cleaner

Pigeon.AWX Trojan

Pigeon.AWX virus description
Technical details:
Categories: Trojan

Pigeon.AWX indications of infection

This symptoms of Pigeon.AWX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PWS.Banker.gen.bu Trojan Cleaner
Removing Bupt Trojan
Wild.Thing Backdoor Symptoms

entertainment.com Tracking Cookie

entertainment.com virus description
Technical details:
Categories: Tracking Cookie

entertainment.com indications of infection

This symptoms of entertainment.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing WhenUSave Adware
Remove ClientMan.2in1 BHO
Remove OnlineHelpmate Ransomware
Stealth.Keyboard.Interceptor Spyware Removal instruction
Removing Tiso Trojan

Hackerz Trojan

Hackerz virus description
Technical details:
Categories: Trojan,Backdoor,RAT,DoS
Hackerz Aliases:
[Kaspersky]Backdoor.VB.oy;
[McAfee]SennaSpy2001

Hackerz Registry Keys:
HKEY_CLASSES_ROOT\appid\hp.exe
HKEY_CURRENT_USER\software\updater

Hackerz Registry Values:
HKEY_LOCAL_MACHINE\software\classes\appid\hp.exe


Hackerz indications of infection

This symptoms of Hackerz detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ProRat.complete RAT Cleaner
Romelp Trojan Removal
Deletall Trojan Information
Stealther Trojan Removal instruction

Pigeon.AWIK Trojan

Pigeon.AWIK virus description
Technical details:
Categories: Trojan

Pigeon.AWIK indications of infection

This symptoms of Pigeon.AWIK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing InfecDoor Backdoor

IStartHere Trojan

IStartHere virus description
Technical details:
Categories: Trojan
IStartHere Aliases:
[Kaspersky]Trojan.VBS.Own.b,Trojan.VBS.Seeker.a;
[Panda]Trj/VBS.Generic,Trj/VBS.Seeker;
[Computer Associates]VBS.IEStart.B,VBS/IEStart.B!Trojan,VBS/Seeker.398!Worm

IStartHere indications of infection

This symptoms of IStartHere detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.AZV Trojan Removal instruction
Remove AR Trojan
Removing Pigeon.EYT Trojan
Remove OrbitExplorer.com Tracking Cookie

NGVCK.dr.gen Trojan

NGVCK.dr.gen virus description
Technical details:
Categories: Trojan

NGVCK.dr.gen indications of infection

This symptoms of NGVCK.dr.gen detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bedrill Trojan Cleaner
Win32.Spacoom Hacker Tool Removal
File.Hider Trojan Information
DVI Backdoor Cleaner
Remove Grobodor Backdoor

TrojanDownloader.Win32.Agent Trojan

TrojanDownloader.Win32.Agent virus description
Technical details:
Categories: Trojan,Downloader,Hacker Tool
TrojanDownloader.Win32.Agent Aliases:
[Kaspersky]TrojanProxy.Win32.Agent.q;
[Eset]Win32/TrojanProxy.Agent.Q trojan;
[Panda]Adware/Fuel,Adware/Nsupdate,Trj/Agent.E,Adware/SearchAid,Trj/Agent.O,Trj/Downloader.HO,Spyware/Virtumonde;
[Computer Associates]Win32.SuxxProxy.A,Win32/Mitglieder!Proxy!Trojan

TrojanDownloader.Win32.Agent Files:
[%WINDOWS%]\mfcau.exe
[%WINDOWS%]\sdkxs32.exe
[%SYSTEM%]\winhost32.exe
[%WINDOWS%]\apirb32.exe
[%WINDOWS%]\javaos.exe
[%WINDOWS%]\msuj32.exe
[%WINDOWS%]\system\ipuw.exe
[%WINDOWS%]\mfcau.exe
[%WINDOWS%]\sdkxs32.exe
[%SYSTEM%]\winhost32.exe
[%WINDOWS%]\apirb32.exe
[%WINDOWS%]\javaos.exe
[%WINDOWS%]\msuj32.exe
[%WINDOWS%]\system\ipuw.exe

TrojanDownloader.Win32.Agent Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices


TrojanDownloader.Win32.Agent indications of infection

This symptoms of TrojanDownloader.Win32.Agent detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove XunLeiBHO Adware
SH.Mare Trojan Information
Remove Pigeon.AVTO Trojan

SiteHistory BHO

SiteHistory virus description
Technical details:
Categories: BHO,Hijacker

SiteHistory Files:
[%SYSTEM%]\changeurl_30.dll
[%WINDOWS%]\system\changeurl_30.dll
[%SYSTEM%]\changeurl_30.dll
[%WINDOWS%]\system\changeurl_30.dll

SiteHistory Registry Keys:
HKEY_CLASSES_ROOT\clsid\{0345b059-8731-42bc-b7b7-5121014b02c6}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{0345b059-8731-42bc-b7b7-5121014b02c6}
HKEY_LOCAL_MACHINE\software\classes\clsid\{0345b059-8731-42bc-b7b7-5121014b02c6}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{0345b059-8731-42bc-b7b7-5121014b02c6}


SiteHistory indications of infection

This symptoms of SiteHistory detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HAO Trojan Removal
Zaratustra.MiniTrojan Backdoor Removal instruction
Remove Bum Trojan