Wadspeld Trojan

Wadspeld virus description
Technical details:
Categories: Trojan,Adware
Wadspeld Aliases:
[Kaspersky]Trojan.Win32.Small.jt,Trojan.Win32.Small.jm,Trojan.win32.Agent.xj,Trojan.Win32.Dialer.rm,Trojan-Downloader.Win32.Agent.alp,Trojan.Win32.Dialer.ru;
[McAfee]Qdial-45;
[Other]Win32/Wadspeld,Win32/Wadspeld.C,trojan.Linkoptimizer,Win32/Wadspeld.Q,Trojan.Linkoptimzer,Win32/Wadspeld.R,Trojan.Linkoptimizer,Win32/Wadspeld.T,Win32/Wadspeld.U,Win32/Wadspeld.W,Win32/Wadspeld!generic,Troj/Agent-CCT,Infostealer,Dial/Addial-Gen,Win32/Wadspeld.AH,Win32/Wadspeld.AG,Trojan.Win32.Agent.csw,Trojan.Linkoptimizer.B

Wadspeld indications of infection

This symptoms of Wadspeld detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.IAE Trojan Symptoms
Small.an Trojan Information
PSW.VB.cc Trojan Cleaner

Win32.Augudor Trojan

Win32.Augudor virus description
Technical details:
Categories: Trojan,Backdoor
Win32.Augudor Aliases:
[Kaspersky]Backdoor.Augudor.b;
[Panda]Backdoor Program

Win32.Augudor indications of infection

This symptoms of Win32.Augudor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Fonesex Trojan Cleaner
Pigeon.EXF Trojan Symptoms
Removing BlackIce RAT
XQ Backdoor Information
Winshare Trojan Information

LAN.Bypasser Backdoor

LAN.Bypasser virus description
Technical details:
Categories: Backdoor

LAN.Bypasser indications of infection

This symptoms of LAN.Bypasser detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Neverone Trojan Symptoms
Backdoor.Way Trojan Cleaner
Voltam Trojan Symptoms

Sambus RAT

Sambus virus description
Technical details:
Categories: RAT

Sambus indications of infection

This symptoms of Sambus detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Soho.Anywhere Trojan Cleaner

MediaPipe Adware

MediaPipe virus description
Technical details:
Categories: Adware,Worm
MediaPipe Aliases:
[Other]Mediapipe

MediaPipe Folders:
[%PROGRAM_FILES%]\247Cams
[%PROGRAM_FILES%]\itbill
[%PROGRAM_FILES%]\License_Manager
[%PROGRAM_FILES%]\mediapipe
[%PROGRAM_FILES%]\p2pnetworks

MediaPipe Files:
[%SYSTEM%]\Access.0ll
[%SYSTEM%]\Access.dll
[%DESKTOP%]\ Terms.lnk
[%DESKTOP%]\.url
[%DESKTOP%]\movieland terms.lnk
[%DESKTOP%]\movieland.url
[%DESKTOP%]\movieland_access_g.exe
[%PROGRAMS%]\247Cams.lnk
[%PROGRAMS%]\downloadmanager.lnk
[%PROGRAM_FILES%]\ Terms.html
[%PROGRAM_FILES%]\downloadmanager\agent.dll
[%PROGRAM_FILES%]\downloadmanager\api.exe
[%PROGRAM_FILES%]\downloadmanager\dm.exe
[%PROGRAM_FILES%]\downloadmanager\downloadmanager.exe
[%PROGRAM_FILES%]\downloadmanager\downloadmanager.ini
[%PROGRAM_FILES%]\downloadmanager\insdl.dll
[%PROGRAM_FILES%]\downloadmanager\install.log
[%PROGRAM_FILES%]\downloadmanager\mptray.exe
[%PROGRAM_FILES%]\downloadmanager\mpupdate.exe
[%PROGRAM_FILES%]\downloadmanager\p2pinst.exe
[%PROGRAM_FILES%]\downloadmanager\p2pl.exe
[%PROGRAM_FILES%]\downloadmanager\uninst.exe
[%PROGRAM_FILES%]\movieland terms.html
[%SYSTEM%]\mplic.dll
[%SYSTEM%]\Access.0ll
[%SYSTEM%]\Access.dll
[%DESKTOP%]\ Terms.lnk
[%DESKTOP%]\.url
[%DESKTOP%]\movieland terms.lnk
[%DESKTOP%]\movieland.url
[%DESKTOP%]\movieland_access_g.exe
[%PROGRAMS%]\247Cams.lnk
[%PROGRAMS%]\downloadmanager.lnk
[%PROGRAM_FILES%]\ Terms.html
[%PROGRAM_FILES%]\downloadmanager\agent.dll
[%PROGRAM_FILES%]\downloadmanager\api.exe
[%PROGRAM_FILES%]\downloadmanager\dm.exe
[%PROGRAM_FILES%]\downloadmanager\downloadmanager.exe
[%PROGRAM_FILES%]\downloadmanager\downloadmanager.ini
[%PROGRAM_FILES%]\downloadmanager\insdl.dll
[%PROGRAM_FILES%]\downloadmanager\install.log
[%PROGRAM_FILES%]\downloadmanager\mptray.exe
[%PROGRAM_FILES%]\downloadmanager\mpupdate.exe
[%PROGRAM_FILES%]\downloadmanager\p2pinst.exe
[%PROGRAM_FILES%]\downloadmanager\p2pl.exe
[%PROGRAM_FILES%]\downloadmanager\uninst.exe
[%PROGRAM_FILES%]\movieland terms.html
[%SYSTEM%]\mplic.dll

MediaPipe Registry Keys:
HKEY_CLASSES_ROOT\amnotifier.hubawindow
HKEY_CLASSES_ROOT\amnotifier.hubawindow.1
HKEY_CLASSES_ROOT\appid\amnotifier.exe
HKEY_CLASSES_ROOT\appid\mpagent.dll
HKEY_CLASSES_ROOT\appid\{4c0b0548-ae0b-4008-999d-db33b8b2eb90}
HKEY_CLASSES_ROOT\appid\{626873ac-27f3-4d48-be81-535cf2360071}
HKEY_CLASSES_ROOT\appid\{7911272a-a32a-404e-8a51-ee18b99b18c4}
HKEY_CLASSES_ROOT\appid\{9236268d-8b29-49e5-96d9-daf5fe76941c}
HKEY_CLASSES_ROOT\appid\{99c4f93d-42a7-478d-8746-4afb6c10bc26}
HKEY_CLASSES_ROOT\appid\{ccebbeb5-d011-41b5-9f92-01f88a38dc0d}
HKEY_CLASSES_ROOT\clsid\{1e9adaf2-4eda-4074-96ce-c9972e675c88}
HKEY_CLASSES_ROOT\clsid\{48bb16aa-3f6c-4b28-9884-1fcec1c5da65}
HKEY_CLASSES_ROOT\clsid\{7bf58804-e672-4b96-8eec-bfcce6492c9a}
HKEY_CLASSES_ROOT\clsid\{b3e19860-0cd5-4991-a066-4fca2704de59}
HKEY_CLASSES_ROOT\clsid\{dfe95408-fd86-4818-a30a-bc859d9658e1}
HKEY_CLASSES_ROOT\downloadmanager.manager
HKEY_CLASSES_ROOT\downloadmanager.manager.1
HKEY_CLASSES_ROOT\interface\{1a7bcc8e-b65d-409a-bb67-57e8226d1780}
HKEY_CLASSES_ROOT\interface\{873209c1-1118-4246-be69-1b903862e061}
HKEY_CLASSES_ROOT\interface\{8e33f539-11bc-44e5-80bf-057fa1e511a6}
HKEY_CLASSES_ROOT\interface\{9a395c6c-e42e-4777-b8ef-fddeb705f3fb}
HKEY_CLASSES_ROOT\interface\{afe46cdd-00ce-45ee-bb73-8349d624f7af}
HKEY_CLASSES_ROOT\interface\{cf1e4638-637f-499d-8309-fd71b9750abc}
HKEY_CLASSES_ROOT\interface\{de2bf8da-a159-4758-8199-0b2435268212}
HKEY_CLASSES_ROOT\mediapipe.gui
HKEY_CLASSES_ROOT\mediapipe.gui.1
HKEY_CLASSES_ROOT\mpagent.agent
HKEY_CLASSES_ROOT\mpagent.agent.1
HKEY_CLASSES_ROOT\sp2p.sp2p
HKEY_CLASSES_ROOT\sp2p.sp2p.1
HKEY_CLASSES_ROOT\typelib\{45c2360e-bfdf-439b-a3ea-65e8383f9353}
HKEY_CLASSES_ROOT\typelib\{555fb512-9f3b-4359-9d2a-3c10e750ce5e}
HKEY_CLASSES_ROOT\typelib\{913422c5-c92b-4e4f-85ac-241fa700a971}\1.0
HKEY_CLASSES_ROOT\typelib\{97d860c4-f072-477b-b241-409f7cffb954}
HKEY_CLASSES_ROOT\typelib\{ab3b59a5-8bb4-46ab-a878-dfdb237d5bd5}
HKEY_CLASSES_ROOT\typelib\{afdbb222-dea9-4c12-b3a3-a13c2985e3ee}
HKEY_CLASSES_ROOT\typelib\{ccebbeb5-d011-41b5-9f92-01f88a38dc0d}
HKEY_CURRENT_USER\software\247cams
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\uninstall\247cams
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\uninstall\notify
HKEY_CURRENT_USER\software\notify
HKEY_LOCAL_MACHINE\software\downloadmanager
HKEY_LOCAL_MACHINE\software\mediapipe

MediaPipe Registry Values:
HKEY_CLASSES_ROOT\appid\downloadmanager.exe
HKEY_CLASSES_ROOT\appid\mediapipe.exe
HKEY_CLASSES_ROOT\appid\sp2p.exe
HKEY_CLASSES_ROOT\appid\trayicon.exe
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\itbill
HKEY_LOCAL_MACHINE\software\itbill
HKEY_LOCAL_MACHINE\software\itbill
HKEY_LOCAL_MACHINE\software\itbill
HKEY_LOCAL_MACHINE\software\itbill
HKEY_LOCAL_MACHINE\software\itbill
HKEY_LOCAL_MACHINE\software\itbill\config
HKEY_LOCAL_MACHINE\software\itbill\config
HKEY_LOCAL_MACHINE\software\itbill\config
HKEY_LOCAL_MACHINE\software\itbill\config
HKEY_LOCAL_MACHINE\software\itbill\config
HKEY_LOCAL_MACHINE\software\itbill\config
HKEY_LOCAL_MACHINE\software\itbill\config
HKEY_LOCAL_MACHINE\software\itbill\update
HKEY_LOCAL_MACHINE\software\itbill\update
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\itbill
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\itbill
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\mediapipe
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\mediapipe
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\p2pnetworks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\p2pnetworks
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list


MediaPipe indications of infection

This symptoms of MediaPipe detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
RemoteHAK Backdoor Symptoms
Cinera Trojan Cleaner
GateCrasher.Final Trojan Symptoms
Goti Trojan Cleaner

Bancos.GZM Trojan

Bancos.GZM virus description
Technical details:
Categories: Trojan

Bancos.GZM indications of infection

This symptoms of Bancos.GZM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Phishbank.AUB Trojan
SillyDl.DLK Trojan Symptoms
Removing CWS.OEMSysPNP Hijacker
Removing Optimize Trojan
1344ProtoBomber DoS Cleaner

Vxidl.ATM Trojan

Vxidl.ATM virus description
Technical details:
Categories: Trojan

Vxidl.ATM indications of infection

This symptoms of Vxidl.ATM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Tini.Telnet Trojan Cleaner
Extermination DoS Cleaner
StartPage.bs Hijacker Removal
Removing Moonpie.10b Backdoor

TrojanDownloader.Win32.Small.dg Trojan

TrojanDownloader.Win32.Small.dg virus description
Technical details:
Categories: Trojan,Downloader
TrojanDownloader.Win32.Small.dg Aliases:
[Panda]Trj/Downloader.DU

TrojanDownloader.Win32.Small.dg indications of infection

This symptoms of TrojanDownloader.Win32.Small.dg detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CFO Downloader Removal
xiti.com Tracking Cookie Removal instruction
Bat.Deltree.YQ1 Trojan Information
SillyDl.BCP Downloader Cleaner
VBS.Bomgen:intended Trojan Cleaner

Riot.AMF Trojan

Riot.AMF virus description
Technical details:
Categories: Trojan

Riot.AMF indications of infection

This symptoms of Riot.AMF detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SmartBrowser Adware
Remove AOL.PS.hp Trojan
ASP Trojan Information
Lospad Trojan Information
CrazyIcons.Prank Trojan Removal instruction

CyberTech Trojan

CyberTech virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
CyberTech Aliases:
[Kaspersky]CyberTech.503,TaiPan.Doom2.666,Trojan.PSW.Stealth.f2,Vienna.1000,CyberTech.664,Virus.DOS.CyberTech.664,CyberTech.1066,CyberTech.1076,CyberTech.1215,CyberTech.501.a,Homecome.1330.a;
[McAfee]PWS-Stealth,QZap146,Tardy;
[F-Prot]Cybertech.503,destructive program;
[Panda]RTL4,Tai_Pan.666,Trj/Thor,Cybertech.664,Cybertech.1066,Cybertech.1215,Ear.1330,Trident.Ice_Cream,Trident.552;
[Computer Associates]CyberTech.503,CyberTech-503,PS-MPC,Thor,Vienna.1000,CyberTech.664,Cybertech.1066,CyberTech A,CyberTech B

CyberTech indications of infection

This symptoms of CyberTech detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Winkernal Trojan
BAT.Batman Trojan Removal instruction
NiceDay Trojan Removal instruction
Bancos.FXL Trojan Information
Brocat Trojan Symptoms

HPMail Trojan

HPMail virus description
Technical details:
Categories: Trojan,Hacker Tool
HPMail Aliases:
[Kaspersky]Trojan.Win32.HPMail.002a;
[McAfee]HPMail;
[F-Prot]destructive program;
[Panda]Trj/HPMail.002a,Trj/HPTeam.02.A;
[Computer Associates]Win32/HPMail.002a!Trojan

HPMail indications of infection

This symptoms of HPMail detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.COD Trojan Information
Removing Banker.ju Spyware

SageAnalyst Tracking Cookie

SageAnalyst virus description
Technical details:
Categories: Tracking Cookie

SageAnalyst indications of infection

This symptoms of SageAnalyst detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Lineage Trojan
Upruf Trojan Removal instruction
Wren Trojan Cleaner

Win32.Apeldorn Trojan

Win32.Apeldorn virus description
Technical details:
Categories: Trojan
Win32.Apeldorn Aliases:
[Panda]Joke/Apeldorn

Win32.Apeldorn indications of infection

This symptoms of Win32.Apeldorn detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Lydra Trojan Removal
ePlugin Adware Cleaner

Pigeon.EQK Trojan

Pigeon.EQK virus description
Technical details:
Categories: Trojan

Pigeon.EQK indications of infection

This symptoms of Pigeon.EQK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
HuntBar.BTLink Hijacker Symptoms

Andum Trojan

Andum virus description
Technical details:
Categories: Trojan
Andum Aliases:
[Eset]Andum.G trojan;
[Panda]Trj/Andum.A,Trj/Andum.B,Trj/Andum.D,Trj/Andum.C,Trj/Andum.E,Trj/Andum.F,Trj/Andum.G,Trj/Andum.H,Trj/Andum.I,Trj/Andum.J,Trj/Andum.K;
[Computer Associates]Andum.A!Trojan,Andum.F,Andum.H

Andum indications of infection

This symptoms of Andum detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:

virus description
Technical details:

indications of infection

This symptoms of detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.