WinFetcher Adware

WinFetcher virus description
Technical details:
Categories: Adware

WinFetcher Folders:
[%PROFILE_TEMP%]\winwildapp.exe

WinFetcher Files:
[%PROFILE_TEMP%]\WM_FUINS.bat
[%PROFILE_TEMP%]\update_1.exe
[%WINDOWS%]\temp\nr1beo9r.dll
[%WINDOWS%]\temp\nr1beo9r.exe
[%WINDOWS%]\temp\winwildapp.exe
[%WINDOWS%]\temp\_istmp4.dir\_istmp0.dir\29389bdd.dll
[%PROFILE_TEMP%]\WM_FUINS.bat
[%PROFILE_TEMP%]\update_1.exe
[%WINDOWS%]\temp\nr1beo9r.dll
[%WINDOWS%]\temp\nr1beo9r.exe
[%WINDOWS%]\temp\winwildapp.exe
[%WINDOWS%]\temp\_istmp4.dir\_istmp0.dir\29389bdd.dll

WinFetcher Registry Keys:
HKEY_LOCAL_MACHINE\software\wildmedia

WinFetcher Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


WinFetcher indications of infection

This symptoms of WinFetcher detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVJG Trojan Removal
Pigeon.EPN Trojan Symptoms

PSW.QQpass.ad Trojan

PSW.QQpass.ad virus description
Technical details:
Categories: Trojan,Hacker Tool
PSW.QQpass.ad Aliases:
[Panda]Trojan Horse.LC

PSW.QQpass.ad indications of infection

This symptoms of PSW.QQpass.ad detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Archive Trojan Cleaner
Remove Buso Trojan
Vxidl.ADX Trojan Symptoms

CWS.IEFeats Trojan

CWS.IEFeats virus description
Technical details:
Categories: Trojan,Hijacker,Downloader
CWS.IEFeats Aliases:
[Kaspersky]Trojan.Win32.StartPage.by,Trojan.Win32.StartPage.ci,Trojan.Win32.StartPage.fx;
[Panda]Adware/Popmon,Adware/SearchAid,Trojan Horse;
[Computer Associates]Win32.Winshow.D,Win32/Winshow.51712!DLL!Trojan

CWS.IEFeats Folders:
[%APPDATA%]\iefeatsl
[%APPDATA%]\winzf
[%APPDATA%]\sysxd

CWS.IEFeats Files:
[%APPDATA%]\winshow\dict.dat
[%WINDOWS%]\application data\iefeatsl\msiesh.dll
[%WINDOWS%]\bipw.exe
[%APPDATA%]\winshow\dict.dat
[%WINDOWS%]\application data\iefeatsl\msiesh.dll
[%WINDOWS%]\bipw.exe

CWS.IEFeats Registry Keys:
HKEY_CLASSES_ROOT\clsid\{7a7ffd7b-4e13-d1d1-fa76-0910b513e4de}
HKEY_CLASSES_ROOT\clsid\{a5b6ede1-cc5a-b569-ab04-69ac5c0b7b59}
HKEY_CLASSES_ROOT\clsid\{e7efbca0-eab9-e4c5-50c3-79622a93478a}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\urlsearchhooks\{e7efbca0-eab9-e4c5-50c3-79622a93478a}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{e7efbca0-eab9-e4c5-50c3-79622a93478a}

CWS.IEFeats Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\runonce
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


CWS.IEFeats indications of infection

This symptoms of CWS.IEFeats detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ServU Trojan Cleaner
SearchGauge Tracking Cookie Cleaner
Removing Bancos.HTK Trojan

SaTaN.Lite RAT

SaTaN.Lite virus description
Technical details:
Categories: RAT

SaTaN.Lite indications of infection

This symptoms of SaTaN.Lite detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SFX RAT Information
June Trojan Removal instruction
Consumed Trojan Symptoms
Pigeon.BBW Trojan Removal

findtheperfectpuppy.com Tracking Cookie

findtheperfectpuppy.com virus description
Technical details:
Categories: Tracking Cookie

findtheperfectpuppy.com indications of infection

This symptoms of findtheperfectpuppy.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
sitesuite.org Tracking Cookie Removal instruction
Apophis.Spy Spyware Removal instruction
Ehg.Oreilly.hitbox Tracking Cookie Removal instruction
Remove Adload Trojan
Remove Essgol Trojan

IVP.Scroll Trojan

IVP.Scroll virus description
Technical details:
Categories: Trojan,Backdoor,RAT,Downloader,Hacker Tool,DoS
IVP.Scroll Aliases:
[Kaspersky]VirTool.Sicem,IVP-based,VCL.375,Quest.388,Moffatts.557;
[McAfee]VTool/sic;
[Panda]Univ,Virus Constructor,Iron;
[Computer Associates]IVP.Scroll,Ivp-317,Rachel.842

IVP.Scroll indications of infection

This symptoms of IVP.Scroll detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
AntiVermins Adware Information
Estalive Adware Information

SaferScan Adware

SaferScan virus description
Technical details:
Categories: Adware

SaferScan Folders:
[%PROGRAM_FILES%]\SaferScan

SaferScan Files:
[%PROGRAM_FILES%]\SaferScan\uninstall.exe
[%PROGRAM_FILES%]\SaferScan\uninstall.exe

SaferScan Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\saferscan
HKEY_LOCAL_MACHINE\software\saferscan

SaferScan Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


SaferScan indications of infection

This symptoms of SaferScan detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
cl Trojan Cleaner
Removing SillyDl.CBQ Trojan
Removing Bancos.GTQ Trojan

Frethog.ACK Trojan

Frethog.ACK virus description
Technical details:
Categories: Trojan

Frethog.ACK indications of infection

This symptoms of Frethog.ACK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
BrowserAd Toolbar Removal instruction
Ultor Trojan Removal
Removing SuxxProxy Trojan

NJStar.Asian.Explorer BHO

NJStar.Asian.Explorer virus description
Technical details:
Categories: BHO

NJStar.Asian.Explorer Files:
[%SYSTEM%]\etop100.dll
[%WINDOWS%]\system\etop100.dll
[%SYSTEM%]\etop100.dll
[%WINDOWS%]\system\etop100.dll

NJStar.Asian.Explorer Registry Keys:
HKEY_CLASSES_ROOT\clsid\{1e1b2879-30c7-11d4-8ddf-525400e483e3}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{1e1b2879-30c7-11d4-8ddf-525400e483e3}
HKEY_LOCAL_MACHINE\software\classes\clsid\{1e1b2879-30c7-11d4-8ddf-525400e483e3}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{1e1b2879-30c7-11d4-8ddf-525400e483e3}


NJStar.Asian.Explorer indications of infection

This symptoms of NJStar.Asian.Explorer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Stylersom Trojan Symptoms
Sysbot BHO Symptoms
Removing Vxidl.APG Trojan
Rbot.ZZ Worm Cleaner
exit.ad.de Tracking Cookie Removal instruction

Frethog.ACM Trojan

Frethog.ACM virus description
Technical details:
Categories: Trojan

Frethog.ACM indications of infection

This symptoms of Frethog.ACM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.AQZ Trojan Information
Institution.Open Trojan Removal

Bancos.HXS Trojan

Bancos.HXS virus description
Technical details:
Categories: Trojan

Bancos.HXS indications of infection

This symptoms of Bancos.HXS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Barbarie Trojan Symptoms
Remove XmsVirus Trojan
Ehg.sonyesolutions.hitbox Tracking Cookie Removal instruction
SillyDl.CLB Trojan Information
Remove VBS.Solow.C Worm

Agent.FBB Trojan

Agent.FBB virus description
Technical details:
Categories: Trojan,Backdoor

Agent.FBB indications of infection

This symptoms of Agent.FBB detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Bancos.FYS Trojan
Pigeon.AUN Trojan Symptoms

Downloader.BDG Trojan

Downloader.BDG virus description
Technical details:
Categories: Trojan
Downloader.BDG Aliases:
[McAfee]Downloader-BDG;
[Other]Win32/Storark.Z,Mal/Gampass-A

Downloader.BDG indications of infection

This symptoms of Downloader.BDG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Zlob.Fam.SoftCodec Trojan Cleaner
OneStat Tracking Cookie Removal

Patched Trojan

Patched virus description
Technical details:
Categories: Trojan
Patched Aliases:
[Kaspersky]Trojan.Win32.Patched.ac;
[Other]Troj/Sniffer-P,W32/Malware.YBF

Patched indications of infection

This symptoms of Patched detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Corzor Downloader Information

Phelper.dll BHO

Phelper.dll virus description
Technical details:
Categories: BHO

Phelper.dll indications of infection

This symptoms of Phelper.dll detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.AQZ Trojan
DOS7 Trojan Cleaner
Removing SavingsHound Adware

XNET RAT

XNET virus description
Technical details:
Categories: RAT

XNET indications of infection

This symptoms of XNET detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
WurldMedia.bpboh BHO Information
Wopla.ac Trojan Cleaner
Desktop.Doodle Adware Symptoms
howstuffworks.com Tracking Cookie Removal instruction

Moiling Trojan

Moiling virus description
Technical details:
Categories: Trojan,Adware
Moiling Aliases:
[Kaspersky]Trojan-Downloader.Win32.Zlob.zj,Trojan-Downloader.Win32.Zlob.zv,Trojan-Downlaoder.Win32.Zlob.to,Trojan-Downlaoder.Win32.Zlob.zy,Trojan-Downloader.Win32.Zlob.zp,Trojan-Downloader.Win32.Zlob.to,Troajn-Downlaoder.Win32.Zlob.wb,Trojan-Downloader.win32.Zlob.aam,Hoax.Win32.Renos.ed,Troajn-Downlaoder.Win32.Zlob.abg,Trojan-Downlaoder.Win32.Zlob.adh,Trojan-Downloader.Win32.Zlob.yt,Trojan-Downloader.Win32.Zlob.aeb,Trojan-Downloader.Win32.Zlob.adl,Trojan-Downloader.Win32.Zlob.afi,Trojan-Downloader.Win32.Zlob.nu,Trojan-Downloader.Win32.Zlob.aap,Trojan-Downloader.Win32.Zlob.xn,Trojan-Downloader.Win32.Zlob.amm,Trojan-Downloader.Win32.Zlob.aew,Trojan-Downloader.Win32.Zlob.ano,Hoax.Win32.Renos.fh,Hoax.Win32.Renos.fn,Troaj-Downloader.Win32.Zlob.aoy,Trojan-Downloader.Win32.Zlob.aqh,Hoax.Win32.Renos.fo,Trojan-downloader.Win32.Zlob.aqh,Trojan-downloader.Win32.Zlob.atg,Trojan-Downloader.Win32.Zlob.auc,Trojan-Downloader.Win32.Zlob.avc,Trojan-Downloader.Win32.Zlob.bh,Trojan-Downloader.Win32.Zlob.mh,Trojan-Downloader.Win32.Zlob.ap,Trojan-Downloader.Win32.Zlob.axt,Trojan-Downloader.Win32.Zlob.ou,Trojan-Downloader.Win32.Zlob.bai,Trojan-Downloader.Win32.Zlob.bni,Trojan-Downlaoder.Win32.Zlob.boi,Trojan-Downloader.Win32.Zlob.bvp,Trojan-Downloader.Win32.Zlob.bnw,Trojan-Downloader.Win32.Zlob.fy;
[McAfee]Puper,Generic Downloader.y,Puper.gen;
[F-Prot]W32/Downloader.JWQ;
[Other]Win32.Moiling.CD,Win32/Moiling.CE,Trojan.Zlob,Win32/Moiling,Win32/Moiling.CO,Win32/Moiling.CJ,Win32/Moiling.CL,Trojan.Vundo,TROJ_ZLOB.AJG,Win32/Moiling.CN,Win32/Moiling.CG,Win32.Moiling.CT,Hoax.Win32.Renos.dy,Win32/Moiling.CU,Win32/Moiling.CX,Trojan-Downloader.Win32.Zlob.yt,Win32/Moiling.DA,Win32/Moiling.DC,Win32/Moiling.DE,Win32/Moiling.DH,Win32/Moiling.DG,Trojan.Secup,Win32/Moiling.DL,Win32/Moiling.DI,Win32/Moiling.DJ,Win32/Moiling.DT,Win32/Moiling.CF,Win32/Moiling.EL,Win32/Moiling.DX,Win32/Moiling.DZ,Win32/Moiling.EA,Win32/Moiling.EC,Win32/Moiling.EE,Win32/Moiling.EF,Win32/Moiling.EG,Win32/Moiling.EH,Win32/Moiling.EJ,spywareQuake,Win32/Moiling.EK,SpywareQuake,Win32/Moiling.EO,Trojan.Emcodec,Win32/Moiling.EP,TROJ_ZLOBMI.W,Trojan-Downloader.Zlob.MediaCodec,Win32/Moiling.EM,Win32/Moiling.EN,Win32/Moiling.EQ,Win32/Moiling EA,DesktopScam,Win32/Moiling!generic,W32/Zlob.ZF,Troj/Zlob-BO,security2k hijacker,Win32/Moiling.AW,Win32/Moiling.DQ,Win32/Moiling.DR,Troj/Zlob-BC,W32/Startpage.CPU,Win32/Moiling.ER,Win32/Moiling.FF,Win32/Moiling.ES,Win32/Moiling.EW,Win32/Moiling.FH,Trojan.Adclicker,Win32/Moiling.FI,Win32/Moiling.FJ,Win32/Moiling.FQ,TrojanDownloader:Win32/Zlob.gen,Win32/Moiling.FX,SpyLocked,Win32/Moiling.FY,TrojanDownloader.Win32/Zlob.gen!D,TrojanDownloader:Win32/Zlob,Win32/Moiling.GD

Moiling Files:
[%PROFILE_TEMP%]\temp.fr????
[%PROFILE_TEMP%]\temp.fr????\pmmnt.exe
[%PROFILE_TEMP%]\temp.fr????\pmmon.exe
[%PROFILE_TEMP%]\temp.fr????\pmsnrr.exe
[%PROGRAM_FILES%]\iVideoCodec\pmmon.exe
[%PROGRAM_FILES%]\iVideoCodec\pmsngr.exe
[%PROGRAM_FILES%]\MMediaCodec\pmmon.exe
[%PROGRAM_FILES%]\Video Access ActiveX Object\pmmnt.exe
[%PROGRAM_FILES%]\Video Access ActiveX Object\pmsnrr.exe
[%PROGRAM_FILES%]\Video ActiveX Object\pmmnt.exe
[%PROGRAM_FILES%]\Video ActiveX Object\pmsnrr.exe
[%PROGRAM_FILES%]\Video AX Object\smmain.exe
[%PROGRAM_FILES%]\Video AX Object\smmon.exe
[%PROGRAM_FILES%]\VideoKeyCodec\pmmon.exe
[%SYSTEM%]\ATMCLK.0XE
[%DESKTOP%]\921185\pmmnt.exe
[%DESKTOP%]\921185\pmsnrr.exe
[%PROFILE_TEMP%]\temp.fr????
[%PROFILE_TEMP%]\temp.fr????\pmmnt.exe
[%PROFILE_TEMP%]\temp.fr????\pmmon.exe
[%PROFILE_TEMP%]\temp.fr????\pmsnrr.exe
[%PROGRAM_FILES%]\iVideoCodec\pmmon.exe
[%PROGRAM_FILES%]\iVideoCodec\pmsngr.exe
[%PROGRAM_FILES%]\MMediaCodec\pmmon.exe
[%PROGRAM_FILES%]\Video Access ActiveX Object\pmmnt.exe
[%PROGRAM_FILES%]\Video Access ActiveX Object\pmsnrr.exe
[%PROGRAM_FILES%]\Video ActiveX Object\pmmnt.exe
[%PROGRAM_FILES%]\Video ActiveX Object\pmsnrr.exe
[%PROGRAM_FILES%]\Video AX Object\smmain.exe
[%PROGRAM_FILES%]\Video AX Object\smmon.exe
[%PROGRAM_FILES%]\VideoKeyCodec\pmmon.exe
[%SYSTEM%]\ATMCLK.0XE
[%DESKTOP%]\921185\pmmnt.exe
[%DESKTOP%]\921185\pmsnrr.exe

Moiling Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run


Moiling indications of infection

This symptoms of Moiling detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Vxidl.API Trojan
Remove Riviera.Gold.Casino Adware
Bancos.GNU Trojan Removal

Astra Trojan

Astra virus description
Technical details:
Categories: Trojan,Backdoor,RAT,Downloader,DoS
Astra Aliases:
[Kaspersky]Astra.498.a;
[Eset]Astra.1010 virus,Astra.498 virus;
[Panda]Astra.1010,Astra;
[Computer Associates]Astra 1010,Astra.1010,Astra

Astra indications of infection

This symptoms of Astra detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Adware.NDotNet Adware Information
DAE BHO Symptoms
H3ll.Messenger DoS Cleaner
Remove SecondPower.SpeedBar Hijacker
IWantSearch Adware Removal instruction

StartPa.FQ Trojan

StartPa.FQ virus description
Technical details:
Categories: Trojan,BHO

StartPa.FQ indications of infection

This symptoms of StartPa.FQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Spydown Downloader Removal

Vxidl.AWK Trojan

Vxidl.AWK virus description
Technical details:
Categories: Trojan

Vxidl.AWK indications of infection

This symptoms of Vxidl.AWK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
BAT.MouseDisable Trojan Cleaner
SillyDl.DJM Trojan Removal
Bancos.DHX Trojan Information

Poptiobot Trojan

Poptiobot virus description
Technical details:
Categories: Trojan

Poptiobot indications of infection

This symptoms of Poptiobot detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanDownloader.Win32.Small.hq Trojan Removal
MSWord.Natas Trojan Cleaner
Pigeon.AVJW Trojan Cleaner
Johar Trojan Information
Removing VirtualVegas.com Tracking Cookie

Ball Trojan

Ball virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Ball Aliases:
[Kaspersky]8ball.a;
[Eset]8_Ball virus;
[Panda]EightBall.A

Ball indications of infection

This symptoms of Ball detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Aconti Adware Symptoms
NeededWare Adware Cleaner
Removing Backdoor.Avocado.ServerDLL Backdoor

Small.axn Downloader

Small.axn virus description
Technical details:
Categories: Downloader

Small.axn indications of infection

This symptoms of Small.axn detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SearchGauge Tracking Cookie Removal instruction
FFToolbar Toolbar Information
Remove Ceekat Trojan
customerreach.com Tracking Cookie Information

Bancos.GBW Trojan

Bancos.GBW virus description
Technical details:
Categories: Trojan

Bancos.GBW indications of infection

This symptoms of Bancos.GBW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Smo Trojan Removal instruction
Iceland Trojan Information
Removing Belio Trojan
HL52286 Trojan Information

Win32.TrojanDownloader.Rameh Trojan

Win32.TrojanDownloader.Rameh virus description
Technical details:
Categories: Trojan,Downloader
Win32.TrojanDownloader.Rameh Aliases:
[Kaspersky]TrojanDownloader.Win32.Rameh.c;
[Eset]Win32/TrojanDownloader.Rameh.C trojan;
[Panda]Adware/NetPals

Win32.TrojanDownloader.Rameh Files:
[%PROFILE_TEMP%]\ICD2.tmp\ATPartners.inf
[%PROFILE_TEMP%]\ICD3.tmp\ATPartners.inf
[%PROFILE_TEMP%]\ICD4.tmp\ATPartners.inf
[%SYSTEM%]\ATPartners.dll
[%SYSTEM%]\atpart~1.dll
[%WINDOWS%]\Downloaded Program Files\ATPartners.inf
[%WINDOWS%]\system\atpart~1.dll
[%PROFILE_TEMP%]\ICD2.tmp\ATPartners.inf
[%PROFILE_TEMP%]\ICD3.tmp\ATPartners.inf
[%PROFILE_TEMP%]\ICD4.tmp\ATPartners.inf
[%SYSTEM%]\ATPartners.dll
[%SYSTEM%]\atpart~1.dll
[%WINDOWS%]\Downloaded Program Files\ATPartners.inf
[%WINDOWS%]\system\atpart~1.dll


Win32.TrojanDownloader.Rameh indications of infection

This symptoms of Win32.TrojanDownloader.Rameh detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Dialer Trojan Removal
Removing Pigeon.EHY Trojan
Ramkeni Downloader Information
AdClicker.AU.dll Trojan Removal

Kads Trojan

Kads virus description
Technical details:
Categories: Trojan

Kads indications of infection

This symptoms of Kads detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing AntiMIT Trojan
Backdoor.AFN Trojan Information
BannerBank.net Tracking Cookie Symptoms