TrafficSector BHO

TrafficSector virus description
Technical details:
Categories: BHO,Adware

TrafficSector Files:
[%PROFILE_TEMP%]\aupd.exe
[%SYSTEM%]\cpmrotate.dll
[%PROFILE_TEMP%]\aupd.exe
[%SYSTEM%]\cpmrotate.dll

TrafficSector Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{BDD8121B-D4AE-4AC9-AD54-C8DC3F1155E6}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{BDD8121B-D4AE-4AC9-AD54-C8DC3F1155E6}


TrafficSector indications of infection

This symptoms of TrafficSector detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.ABG Trojan
Removing Tetrinet.txt DoS
Wolfcheat Trojan Symptoms
Nok.Nok Spyware Cleaner

Spy.System Trojan

Spy.System virus description
Technical details:
Categories: Trojan,Backdoor
Spy.System Aliases:
[Kaspersky]Backdoor.SpySystem.23,Win32.Lom;
[Panda]Backdoor Program,W32/Lom.A;
[Computer Associates]Win32.Lom,Win32/Wininit.C!Trojan

Spy.System indications of infection

This symptoms of Spy.System detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Cuebot Trojan Information
Masteseq.gen Backdoor Cleaner
Removing SillyDl.DFG Trojan
Remove Intended.Holzner Trojan

Mysden Trojan

Mysden virus description
Technical details:
Categories: Trojan

Mysden indications of infection

This symptoms of Mysden detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CGI.Bin Tracking Cookie Symptoms
Pigeon.AZM Trojan Information
Dol Trojan Removal instruction
Pigeon.AQT Trojan Removal instruction

Vxidl.ALK Trojan

Vxidl.ALK virus description
Technical details:
Categories: Trojan

Vxidl.ALK indications of infection

This symptoms of Vxidl.ALK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Colorer Trojan Removal instruction

SillyDl.CFN Trojan

SillyDl.CFN virus description
Technical details:
Categories: Trojan

SillyDl.CFN indications of infection

This symptoms of SillyDl.CFN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EDX Trojan Symptoms
Win32.LMR Trojan Information

avangard.dsl.ru Tracking Cookie

avangard.dsl.ru virus description
Technical details:
Categories: Tracking Cookie

avangard.dsl.ru indications of infection

This symptoms of avangard.dsl.ru detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ICQ.ToolzY2K DoS Information
AOL.Oscar Trojan Symptoms
Zimenok.Zender Trojan Cleaner
Remove MASM32 Trojan
Pigeon.AOG Trojan Removal

EliteMedia Adware

EliteMedia virus description
Technical details:
Categories: Adware

EliteMedia Files:
[%PROFILE_TEMP%]\ICD2.tmp\amm06.inf
[%PROFILE_TEMP%]\ICD2.tmp\amm06.ocx
[%PROFILE_TEMP%]\ICD3.tmp\amm06.inf
[%PROFILE_TEMP%]\ICD3.tmp\amm06.ocx
[%PROFILE_TEMP%]\ICD8.tmp\amm06.inf
[%PROFILE_TEMP%]\stdrun2.exe
[%PROGRAM_FILES_COMMON%]\elitemediagroupoinuninstaller.exe
[%PROGRAM_FILES_COMMON%]\EliteMediaGroupOinUninstaller.exe
[%SYSTEM%]\ObjSafe.tlb
[%SYSTEM%]\WinATS.dll
[%SYSTEM%]\Winwcd.dll
[%WINDOWS%]\109uninst.exe
[%WINDOWS%]\amm06.ocx
[%WINDOWS%]\elitemediagroup.ini
[%WINDOWS%]\elitepop06.exe
[%WINDOWS%]\eliteunstall.exe
[%WINDOWS%]\elpp100drop.exe
[%WINDOWS%]\em06z.ini
[%WINDOWS%]\hancerdoem.exe
[%WINDOWS%]\Help\nocontnt.GID
[%WINDOWS%]\Setup90.exe
[%WINDOWS%]\temp\backups\backup-20060602-131509-273.inf
[%WINDOWS%]\TIELT001.exe
[%WINDOWS%]\uni_7eh.exe
[%WINDOWS%]\yoinsi.exe
[%PROGRAM_FILES%]\common files\elitemediagroupoinuninstaller.exe
[%PROGRAM_FILES%]\elticons\chadppicon100.exe
[%SYSTEM%]\hpsw.exe
[%SYSTEM%]\nsf66.dll
[%SYSTEM%]\ts_www.exe
[%SYSTEM%]\ttve2eee.dll
[%SYSTEM%]\ttve2eee.sys
[%SYSTEM%]\w50779cf.dll
[%SYSTEM%]\wgse.exe
[%WINDOWS%]\1011_justin.exe
[%WINDOWS%]\elitemediapop.exe
[%WINDOWS%]\elite_media.exe
[%WINDOWS%]\justin2.exe
[%WINDOWS%]\Sos28.exe
[%WINDOWS%]\thiselt.exe
[%WINDOWS%]\titsvotf.exe
[%PROFILE_TEMP%]\ICD2.tmp\amm06.inf
[%PROFILE_TEMP%]\ICD2.tmp\amm06.ocx
[%PROFILE_TEMP%]\ICD3.tmp\amm06.inf
[%PROFILE_TEMP%]\ICD3.tmp\amm06.ocx
[%PROFILE_TEMP%]\ICD8.tmp\amm06.inf
[%PROFILE_TEMP%]\stdrun2.exe
[%PROGRAM_FILES_COMMON%]\elitemediagroupoinuninstaller.exe
[%PROGRAM_FILES_COMMON%]\EliteMediaGroupOinUninstaller.exe
[%SYSTEM%]\ObjSafe.tlb
[%SYSTEM%]\WinATS.dll
[%SYSTEM%]\Winwcd.dll
[%WINDOWS%]\109uninst.exe
[%WINDOWS%]\amm06.ocx
[%WINDOWS%]\elitemediagroup.ini
[%WINDOWS%]\elitepop06.exe
[%WINDOWS%]\eliteunstall.exe
[%WINDOWS%]\elpp100drop.exe
[%WINDOWS%]\em06z.ini
[%WINDOWS%]\hancerdoem.exe
[%WINDOWS%]\Help\nocontnt.GID
[%WINDOWS%]\Setup90.exe
[%WINDOWS%]\temp\backups\backup-20060602-131509-273.inf
[%WINDOWS%]\TIELT001.exe
[%WINDOWS%]\uni_7eh.exe
[%WINDOWS%]\yoinsi.exe
[%PROGRAM_FILES%]\common files\elitemediagroupoinuninstaller.exe
[%PROGRAM_FILES%]\elticons\chadppicon100.exe
[%SYSTEM%]\hpsw.exe
[%SYSTEM%]\nsf66.dll
[%SYSTEM%]\ts_www.exe
[%SYSTEM%]\ttve2eee.dll
[%SYSTEM%]\ttve2eee.sys
[%SYSTEM%]\w50779cf.dll
[%SYSTEM%]\wgse.exe
[%WINDOWS%]\1011_justin.exe
[%WINDOWS%]\elitemediapop.exe
[%WINDOWS%]\elite_media.exe
[%WINDOWS%]\justin2.exe
[%WINDOWS%]\Sos28.exe
[%WINDOWS%]\thiselt.exe
[%WINDOWS%]\titsvotf.exe

EliteMedia Registry Keys:
HKEY_CLASSES_ROOT\clsid\{5526b4c6-63d6-41a1-9783-0fabf529859a}
HKEY_CLASSES_ROOT\clsid\{e4c29fdc-f547-4219-acfd-571f2a7a564a}
HKEY_CLASSES_ROOT\interface\{49217364-e570-4f9d-9cd2-62eb4780b2ee}
HKEY_CLASSES_ROOT\interface\{597aa130-f00b-40b8-adaf-529d4da9be52}
HKEY_CLASSES_ROOT\interface\{7682c1a6-c500-4c78-93b9-5a76a91520f8}
HKEY_CLASSES_ROOT\interface\{ce76ac70-161f-4b37-ac96-53e314c7ff95}
HKEY_CLASSES_ROOT\interface\{fc4be248-2d1d-4271-8054-0385774b078c}
HKEY_CLASSES_ROOT\mm06ocx.mm06ocxf
HKEY_CLASSES_ROOT\typelib\{42298ff7-5dcd-4dff-825a-225eee6ff0c7}
HKEY_CLASSES_ROOT\typelib\{7ac21a02-5b24-47ae-9b0e-b05ae3a50fc4}
HKEY_CLASSES_ROOT\typelib\{d13decbb-52f8-4bf4-ba6c-b0cc603963c9}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{5526B4C6-63D6-41A1-9783-0FABF529859A}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{e4c29fdc-f547-4219-acfd-571f2a7a564a}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\c:\windows\system32\objsafe.tlb
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\c:\windows\system32\winwcd.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\elitemediagroupoin
HKEY_LOCAL_MACHINE\software\mm
HKEY_CLASSES_ROOT\clsid\{9ac54695-69a4-46f1-be10-10c74f9520d5}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{5526b4c6-63d6-41a1-9783-0fabf529859a}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{eec590d8-0a3c-4464-bb20-25a4747992f9}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%SYSTEM%]\objsafe.tlb
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%SYSTEM%]\winwcd.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]\downloaded program files\motorsix.ocx
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\elitemediagroup.net

EliteMedia Registry Values:
HKEY_LOCAL_MACHINE\software\em
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\elitemediagroup
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\elitemediagroup
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\internet settings\zonemap\domains\elitemediagroup.net
HKEY_LOCAL_MACHINE\software\em
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%SYSTEM%]/safe.tlb
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\elitemediagroup
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\elitemediagroup


EliteMedia indications of infection

This symptoms of EliteMedia detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Galorion Trojan
DuvxUpd Trojan Removal
For.Guest Trojan Removal instruction
MIRC.MircGirl Trojan Information
Tatss Adware Cleaner

Hupigeon Trojan

Hupigeon virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Hupigeon Aliases:
[Eset]Win32/Hupigon.A trojan;
[Computer Associates]Backdoor/Hupigeon.A!Server

Hupigeon indications of infection

This symptoms of Hupigeon detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
WDonn Trojan Removal instruction
GLB Trojan Removal

Bancos.HIH Trojan

Bancos.HIH virus description
Technical details:
Categories: Trojan

Bancos.HIH indications of infection

This symptoms of Bancos.HIH detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Alexmo Trojan
Phishbank.AML Trojan Symptoms
istats.pl Tracking Cookie Removal instruction
Pigeon.AUS Trojan Cleaner

April.1st Trojan

April.1st virus description
Technical details:
Categories: Trojan

April.1st indications of infection

This symptoms of April.1st detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SD.Bot Backdoor Removal
Download.Plugin Trojan Information
Remove Win32.VB.cr Trojan
LRS Trojan Removal instruction
PInsight Adware Symptoms

Agobot.hn Backdoor

Agobot.hn virus description
Technical details:
Categories: Backdoor

Agobot.hn indications of infection

This symptoms of Agobot.hn detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.DJM Trojan Cleaner
Tiner Trojan Removal

Pigeon.AVUZ Trojan

Pigeon.AVUZ virus description
Technical details:
Categories: Trojan

Pigeon.AVUZ indications of infection

This symptoms of Pigeon.AVUZ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vecny Trojan Cleaner

Felher Trojan

Felher virus description
Technical details:
Categories: Trojan
Felher Aliases:
[Other]Trojan.Win32/Felher.A

Felher indications of infection

This symptoms of Felher detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove TSUpdate Downloader
StartPage.ip Hijacker Information
IERedirector Ransomware Information
Wintrim.cj Downloader Removal instruction

Bowl Trojan

Bowl virus description
Technical details:
Categories: Trojan,Backdoor,RAT,Downloader
Bowl Aliases:
[Kaspersky]Backdoor.Bowl;
[Eset]Win32/Bowl trojan;
[McAfee]BackDoor-AJ;
[F-Prot]security risk or a "backdoor" program,W32/Bowl;
[Panda]Trj/W32.ShockRave;
[Computer Associates]Backdoor/Bowl,Backdoor/Bowl.B,Win32.Bowl.10

Bowl Files:
[%WINDOWS%]\netpopup.exe
[%WINDOWS%]\netpopup.exe


Bowl indications of infection

This symptoms of Bowl detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
JS.SelfExecHtml Spyware Cleaner
Pigeon.EVN Trojan Removal instruction
Agobot.ac Trojan Information

Let.Me.Rule!.beta Trojan

Let.Me.Rule!.beta virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Let.Me.Rule!.beta Aliases:
[Kaspersky]Backdoor.Lemerul.20.d,Backdoor.Lemerul.20.h,Backdoor.Lemerul.20.f,Backdoor.Lemerul.20.g;
[Eset]Win32/Lemerul.20.F trojan,Win32/Lemerul.20.D trojan;
[Panda]Backdoor Program.LC,Bck/LMR,Backdoor Program;
[Computer Associates]Win32/Lemerul.20.D!Trojan,Backdoor/Lemerul.20.g

Let.Me.Rule!.beta indications of infection

This symptoms of Let.Me.Rule!.beta detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CEP Trojan Removal

Win32.TrojanDownloader.IstBar.NAG Downloader

Win32.TrojanDownloader.IstBar.NAG virus description
Technical details:
Categories: Downloader
Win32.TrojanDownloader.IstBar.NAG Aliases:
[Kaspersky]TrojanDownloader.Win32.IstBar.gen

Win32.TrojanDownloader.IstBar.NAG Files:
[%PROFILE_TEMP%]\feghyef.exe
[%PROFILE_TEMP%]\furyags.exe
[%PROFILE_TEMP%]\feghyef.exe
[%PROFILE_TEMP%]\furyags.exe


Win32.TrojanDownloader.IstBar.NAG indications of infection

This symptoms of Win32.TrojanDownloader.IstBar.NAG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
W95.Rekoj Trojan Removal instruction
Remove Sepro Trojan
Remove Grinder Trojan

Pigeon.ACE Trojan

Pigeon.ACE virus description
Technical details:
Categories: Trojan

Pigeon.ACE indications of infection

This symptoms of Pigeon.ACE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Starimp Trojan Removal
mallcom.com Tracking Cookie Removal instruction
Remove SystemControl RAT
Removing SillyDl.CUB Trojan
Bancos.FTF Trojan Cleaner

Bancos.IAA Trojan

Bancos.IAA virus description
Technical details:
Categories: Trojan
Bancos.IAA Aliases:
[Other]Win32/Bancos.IAA,Mal/Behav-103

Bancos.IAA Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Bancos.IAA indications of infection

This symptoms of Bancos.IAA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
fusestats.com Tracking Cookie Removal
Bancos.HOS Trojan Information

Small.AMA Trojan

Small.AMA virus description
Technical details:
Categories: Trojan,Downloader

Small.AMA indications of infection

This symptoms of Small.AMA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.ABE Trojan Removal instruction
Remove Win9x.Reboot Trojan
Pigeon.AWJC Trojan Information
Fictional.Daemon RAT Removal instruction

MPC Trojan

MPC virus description
Technical details:
Categories: Trojan
MPC Aliases:
[Kaspersky]PS-MPC-based;
[Eset]Psmpc.478 virus;
[McAfee]MPC;
[F-Prot]PS-MPC.478;
[Panda]Univ;
[Computer Associates]PS 478

MPC indications of infection

This symptoms of MPC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Win.Blondie.joke Trojan
SillyDL.DCS Trojan Information
PSW.Lmir.ex Trojan Information

Woldfox Trojan

Woldfox virus description
Technical details:
Categories: Trojan
Woldfox Aliases:
[Other]Win32/Woldfox.D,W32/Smalltroj.BOFG

Woldfox Registry Keys:
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\msupdate


Woldfox indications of infection

This symptoms of Woldfox detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Rbot.aeu Worm Removal
Removing Win32.TrojanDownloader.Apropo Trojan
Pigeon.AVOC Trojan Information
Win95.Punch Trojan Symptoms

Vxidl.AQV Trojan

Vxidl.AQV virus description
Technical details:
Categories: Trojan

Vxidl.AQV indications of infection

This symptoms of Vxidl.AQV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win95.Coce2225 Trojan Information
Win32.TrojanDropper.Bridge Trojan Symptoms
IC.Manage RAT Removal instruction

Masterseq.Variant Trojan

Masterseq.Variant virus description
Technical details:
Categories: Trojan
Masterseq.Variant Aliases:
[Computer Associates]Win32/Masterseq.Variant!Trojan

Masterseq.Variant indications of infection

This symptoms of Masterseq.Variant detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Getit.cfg Trojan
Pigeon.EOP Trojan Information

Harvester.Server Trojan

Harvester.Server virus description
Technical details:
Categories: Trojan,Backdoor
Harvester.Server Aliases:
[Eset]Win32/Harvester.23.A trojan;
[Computer Associates]Backdoor/Harvester.23.Server

Harvester.Server indications of infection

This symptoms of Harvester.Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Mystic Trojan Information
BrowserAid.Startium BHO Symptoms
Vxidl.ACH Trojan Removal instruction

LanFiltrator.Server.fam Trojan

LanFiltrator.Server.fam virus description
Technical details:
Categories: Trojan,Backdoor
LanFiltrator.Server.fam Aliases:
[Panda]Bck/Lanfit.A;
[Computer Associates]Backdoor/LanFiltrator_Server_fam

LanFiltrator.Server.fam indications of infection

This symptoms of LanFiltrator.Server.fam detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CTK Trojan Removal instruction
Pigeon.EFC Trojan Removal instruction

Pigeon.AVIK Trojan

Pigeon.AVIK virus description
Technical details:
Categories: Trojan

Pigeon.AVIK indications of infection

This symptoms of Pigeon.AVIK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VxsKey Trojan Removal
Orion Trojan Removal instruction

Vxidl.AQB Trojan

Vxidl.AQB virus description
Technical details:
Categories: Trojan

Vxidl.AQB indications of infection

This symptoms of Vxidl.AQB detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanSpy.Win32.Zhangyan Trojan Removal
Backdoor.BO2K.plugin.Cast Trojan Cleaner
DeluxeCommunications Adware Removal
Remove Orce Trojan
Remove SillyDl.CBK Trojan

Bancos.HOB Trojan

Bancos.HOB virus description
Technical details:
Categories: Trojan

Bancos.HOB indications of infection

This symptoms of Bancos.HOB detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Zlob.Fam.VideoKeyCodec Trojan Removal
Pigeon.APR Trojan Information
SillyDl.CKT Trojan Information

Comforest Trojan

Comforest virus description
Technical details:
Categories: Trojan,Adware,Hijacker
Comforest Aliases:
[Kaspersky]Trojan.Win32.Delf.cn;
[Other]ComforestDial,comforest dialer,W32/Delf.TWV

Comforest Folders:
[%SYSTEM%]\Winsystemp

Comforest Files:
[%DESKTOP%]\Club del Vizio - Foto Video Calendari - VM18.lnk
[%PROGRAMS%]\Club del Vizio - Foto Video Calendari - VM18.lnk
[%SYSTEM%]\Winsystemas\fotoieri.EXE
[%WINDOWS%]\$hf_mig$\KB090545\semail.exe
[%WINDOWS%]\$hf_mig$\KB090545\semail.tpl
[%WINDOWS%]\$hf_mig$\KB090545\target.dat
[%DESKTOP%]\Club del Vizio - Foto Video Calendari - VM18.lnk
[%PROGRAMS%]\Club del Vizio - Foto Video Calendari - VM18.lnk
[%SYSTEM%]\Winsystemas\fotoieri.EXE
[%WINDOWS%]\$hf_mig$\KB090545\semail.exe
[%WINDOWS%]\$hf_mig$\KB090545\semail.tpl
[%WINDOWS%]\$hf_mig$\KB090545\target.dat

Comforest Registry Keys:
HKEY_CURRENT_USER\software\freeware\{491a5872-c30f-4e54-8ff1-bf31cc73dc4b}

Comforest Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\extensions\cmdmapping
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{1de8619d-8dd8-40ba-8a42-e1d12f119524}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{1de8619d-8dd8-40ba-8a42-e1d12f119524}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{1de8619d-8dd8-40ba-8a42-e1d12f119524}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{1de8619d-8dd8-40ba-8a42-e1d12f119524}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{1de8619d-8dd8-40ba-8a42-e1d12f119524}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{1de8619d-8dd8-40ba-8a42-e1d12f119524}


Comforest indications of infection

This symptoms of Comforest detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
WM.Checkf Trojan Information
MailSpam.HateYou Hacker Tool Removal
Win32.Spybotr Trojan Information
Win32.DKS Trojan Removal instruction
Remove Zasil Trojan