Coffeeshop.3792#MtE Trojan

Coffeeshop.3792#MtE virus description
Technical details:
Categories: Trojan
Coffeeshop.3792#MtE Aliases:
[Kaspersky]Bullet.1262,MtE.Coffeeshop;
[McAfee]Bullet.1262,MtE;
[F-Prot]corrupted or intended virus;
[Panda]Coffeeshop.3792;
[Computer Associates]Bullet.1774,Coffeeshop.1931,MtE Encoded

Coffeeshop.3792#MtE indications of infection

This symptoms of Coffeeshop.3792#MtE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Small.awa Downloader Symptoms

Plague.beta Trojan

Plague.beta virus description
Technical details:
Categories: Trojan

Plague.beta indications of infection

This symptoms of Plague.beta detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AGU Trojan Symptoms
Removing Pigeon.AQB Trojan
Demiz.Server Trojan Removal instruction
Novell.LANs Trojan Symptoms
Windows.Key.Analyst Trojan Information

Duiskbot Trojan

Duiskbot virus description
Technical details:
Categories: Trojan
Duiskbot Aliases:
[Kaspersky]Backdoor.Win32.IRCBot.wd;
[Other]Backdoor:Win32/Sdbot.gen!A

Duiskbot indications of infection

This symptoms of Duiskbot detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Metallica Trojan

Brainy Trojan

Brainy virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Brainy Aliases:
[Kaspersky]Leech.Warrier.768;
[Eset]Brainy.B virus

Brainy indications of infection

This symptoms of Brainy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MRA Spyware Removal instruction

GoGoTools Adware

GoGoTools virus description
Technical details:
Categories: Adware

GoGoTools Folders:
[%PROGRAM_FILES%]\gogotools

GoGoTools Registry Keys:
HKEY_CLASSES_ROOT\adware.ietrackerif
HKEY_CLASSES_ROOT\adware.ietrackerif.1
HKEY_CLASSES_ROOT\appid\adware.exe
HKEY_CLASSES_ROOT\appid\{5b134722-d775-431e-93df-cc9a74ee6bca}
HKEY_CLASSES_ROOT\clsid\{3bec9062-7625-4de8-8abe-b96ae461dc78}
HKEY_CLASSES_ROOT\htmledit.ietracker
HKEY_CLASSES_ROOT\htmledit.ietracker.1
HKEY_CLASSES_ROOT\interface\{09964f9e-e1d4-47c3-9697-28258dbcbb77}
HKEY_CLASSES_ROOT\TypeLib\{1E1B286C-88FF-11D2-8D96-D7ACAC95951F}
HKEY_CLASSES_ROOT\typelib\{8ef07273-3c9f-4ba6-a748-fad0e7faf1fd}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\gogotools_is1
HKEY_LOCAL_MACHINE\software\specificmedia\gogotools
HKEY_CLASSES_ROOT\clsid\{0bb77965-73bb-41de-9ddb-d09f0770e89e}
HKEY_CLASSES_ROOT\clsid\{8066d3a1-d93d-4a0e-978c-c192fbe7bce7}
HKEY_CLASSES_ROOT\clsid\{ad6865de-43ae-42c7-89a6-f6f834a5dce2}
HKEY_CLASSES_ROOT\interface\{0bba2043-67c6-405f-b604-3015bc5f7f49}
HKEY_CLASSES_ROOT\interface\{2d7531e4-7107-4908-b195-00d9f6407350}
HKEY_CLASSES_ROOT\interface\{911f0cbd-bf63-4c8e-a8c7-10a7ab79d5af}
HKEY_CLASSES_ROOT\interface\{a0280066-da42-4ca3-b31a-619846873bb5}
HKEY_CLASSES_ROOT\print.stockbar
HKEY_CLASSES_ROOT\print.stockbar.1
HKEY_CLASSES_ROOT\samp.initsearchgogo
HKEY_CLASSES_ROOT\samp.initsearchgogo.1
HKEY_CLASSES_ROOT\specificsearch.specificsearchbar
HKEY_CLASSES_ROOT\specificsearch.specificsearchbar.1
HKEY_CLASSES_ROOT\typelib\{0fb9fc52-ddd9-4c5f-ac57-23da79d9274c}
HKEY_CLASSES_ROOT\typelib\{1be40a9a-034e-4d22-bf7b-b9f7081ff2fb}
HKEY_CLASSES_ROOT\typelib\{1e1b286c-88ff-11d2-8d96-d7acac95951f}
HKEY_CLASSES_ROOT\typelib\{70bae76e-62cc-478f-b09b-8346ab49e951}
HKEY_CURRENT_USER\software\specificmedia
HKEY_LOCAL_MACHINE\softwaree\specificmedia\gogotools
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\extensions\{0bb77965-73bb-41de-9ddb-d09f0770e89e}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\extensions\{0bb77965-73bb-41de-9ddb-d09f0770e89f}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{8066d3a1-d93d-4a0e-978c-c192fbe7bce7}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\gogo tools_is1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\interactive explorer search services_is1

GoGoTools Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\software\microsoft\internet explorer\extensions\cmdmapping
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


GoGoTools indications of infection

This symptoms of GoGoTools detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.OpenPorts Backdoor Removal instruction
PrecisionPop Adware Removal instruction

AlexMessoMalex Trojan

AlexMessoMalex virus description
Technical details:
Categories: Trojan,Backdoor,RAT
AlexMessoMalex Aliases:
[Kaspersky]Backdoor.Messo.10,Backdoor.Messo.20,Backdoor.VB.cx,Backdoor.VB.hi;
[Eset]Win32/Messo.20 trojan,Win32/VB.CX trojan,Win32/VB.HI trojan;
[McAfee]BackDoor-ZS,SennaSpy2001,VB-BackDoor1.gen;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Messo.20,Backdoor Program.LC,Bck/VB.M,Backdoor Program;
[Computer Associates]Backdoor/Messo.20,Win32.Messo.20,Backdoor/VB.cx,Backdoor/Sandro

AlexMessoMalex indications of infection

This symptoms of AlexMessoMalex detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Delf.FN.Server Trojan Removal
Vxidl.AAT Trojan Removal instruction
Delf.dg Trojan Removal

Pigeon.ENI Trojan

Pigeon.ENI virus description
Technical details:
Categories: Trojan

Pigeon.ENI indications of infection

This symptoms of Pigeon.ENI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Netpumper Adware
Destruction DoS Removal instruction
Paska Trojan Information
Removing ExpertAntiVirus Adware
Remove Golgi Trojan

law.com Tracking Cookie

law.com virus description
Technical details:
Categories: Tracking Cookie

law.com indications of infection

This symptoms of law.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Lookup.Chgrgs BHO
Remove Pigeon.AVNE Trojan
Removing Shek Trojan
Reverse Trojan Symptoms

nandomedia.com Tracking Cookie

nandomedia.com virus description
Technical details:
Categories: Tracking Cookie

nandomedia.com indications of infection

This symptoms of nandomedia.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Itti Trojan Information
Hastings Trojan Removal
Bancos.HTG Trojan Removal instruction
Axload Downloader Removal instruction

VeryCD Toolbar

VeryCD virus description
Technical details:
Categories: Toolbar

VeryCD Folders:
[%PROGRAM_FILES%]\YOK.com

VeryCD Files:
[%DESKTOP%]\YOK³¬¼¶ËÑË÷.lnk
[%DESKTOP%]\YOK³¬¼¶ËÑË÷.lnk

VeryCD Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{75FE2B5A-D3A4-4EFA-AC11-ADC9C9459688}
HKEY_CLASSES_ROOT\clsid\{88351cef-bac0-4a9b-8380-31a173e2926f}
HKEY_CLASSES_ROOT\clsid\{a29f7f71-dcdb-412d-b19a-2002dc966e33}
HKEY_CLASSES_ROOT\CLSID\{F869BB38-FFEF-4589-B986-610B7AD0ADA2}
HKEY_CLASSES_ROOT\interface\{3020099a-d1ef-4bb5-bca5-63cd8d110233}
HKEY_CLASSES_ROOT\interface\{3a42c888-43d4-4bce-b3bc-99e5e15c631c}
HKEY_CLASSES_ROOT\interface\{5bf5a044-328c-42ca-8edb-c513a4a49c69}
HKEY_CLASSES_ROOT\interface\{8a74c2af-d08c-41e4-b6c0-11f1c7ed86a5}
HKEY_CLASSES_ROOT\typelib\{7b18218b-2551-4f18-b94d-10d7ca4c14ec}
HKEY_CLASSES_ROOT\yoktoolbar.band
HKEY_CLASSES_ROOT\yoktoolbar.band.1
HKEY_CLASSES_ROOT\yoktoolbar.contextsearch
HKEY_CLASSES_ROOT\yoktoolbar.contextsearch.1
HKEY_CLASSES_ROOT\yoktoolbar.yoktoolbarbho
HKEY_CLASSES_ROOT\yoktoolbar.yoktoolbarbho.1
HKEY_CURRENT_USER\software\yok
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{75FE2B5A-D3A4-4EFA-AC11-ADC9C9459688}
HKEY_LOCAL_MACHINE\software\yok
HKEY_LOCAL_MACHINE\system\yserialnumber
HKEY_CLASSES_ROOT\clsid\{564cb59a-2813-4cee-b387-03d85322b54d}
HKEY_CLASSES_ROOT\clsid\{75fe2b5a-d3a4-4efa-ac11-adc9c9459688}
HKEY_CLASSES_ROOT\clsid\{7d0e8987-ba21-483a-b1ac-149da2f39a5a}
HKEY_CLASSES_ROOT\clsid\{f869bb38-ffef-4589-b986-610b7ad0ada2}
HKEY_CLASSES_ROOT\interface\{7772d684-fdc9-46d1-8b1a-977eb5596a2a}
HKEY_CLASSES_ROOT\interface\{9e3cddf5-b0a7-43fb-a882-b6b177fd4f01}
HKEY_CLASSES_ROOT\interface\{bf9920a4-f4fd-4a14-92e6-3043a31c7abe}
HKEY_CLASSES_ROOT\yoktoolbar
HKEY_CLASSES_ROOT\yoktoolbar.yokcommband
HKEY_CLASSES_ROOT\yoktoolbar.yokcommband.1
HKEY_CLASSES_ROOT\yoktoolbar.yokhttpfilter
HKEY_CLASSES_ROOT\yoktoolbar.yokhttpfilter.1
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\extensions\{f869bb38-ffef-4589-b986-610b7ad0ada2}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{75fe2b5a-d3a4-4efa-ac11-adc9c9459688}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\yok.supersearch

VeryCD Registry Values:
HKEY_CLASSES_ROOT\appid\yoktoolbar.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


VeryCD indications of infection

This symptoms of VeryCD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SpyGuardPro Ransomware
Leszcz RAT Cleaner
Remove XPCSpy Spyware
RaxSearch Adware Information
Bancos.FYL Trojan Symptoms

Vxidl.AHX Trojan

Vxidl.AHX virus description
Technical details:
Categories: Trojan

Vxidl.AHX indications of infection

This symptoms of Vxidl.AHX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GKT Trojan Symptoms
MyWebSearch (MySearch) Adware Cleaner
Etap Trojan Cleaner
SillyDl.DNK Trojan Cleaner
Vxidl.BAR Trojan Information

Vxidl.AWE Trojan

Vxidl.AWE virus description
Technical details:
Categories: Trojan

Vxidl.AWE indications of infection

This symptoms of Vxidl.AWE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Principale Trojan
SillyDl.DCE Trojan Cleaner

Intended.COM Trojan

Intended.COM virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Intended.COM Aliases:
[Kaspersky]1_COM;
[Computer Associates]RC.456

Intended.COM indications of infection

This symptoms of Intended.COM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Tripod Tracking Cookie Information

Pigeon.AVCC Trojan

Pigeon.AVCC virus description
Technical details:
Categories: Trojan

Pigeon.AVCC indications of infection

This symptoms of Pigeon.AVCC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Asterix Trojan Removal
SdBot.cd Backdoor Cleaner

Vortexx.Project.Bomber DoS

Vortexx.Project.Bomber virus description
Technical details:
Categories: DoS

Vortexx.Project.Bomber indications of infection

This symptoms of Vortexx.Project.Bomber detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Rape Trojan Removal instruction
Pigeon.EMD Trojan Symptoms

Lorer Trojan

Lorer virus description
Technical details:
Categories: Trojan
Lorer Aliases:
[Panda]Trj/W32.Lorer;
[Computer Associates]Win32.Lorer,Win32/FKCQ!Trojan

Lorer indications of infection

This symptoms of Lorer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
DelfBanload.Variant!Trojan Trojan Symptoms
Downhill.Demo RAT Information
Protect Trojan Cleaner

Labrus Backdoor

Labrus virus description
Technical details:
Categories: Backdoor

Labrus indications of infection

This symptoms of Labrus detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.EPJ Trojan
TrojanDropper.Win32.Small.be Trojan Information
Global.Patrol RAT Cleaner
Feuerleiter Backdoor Information

Pigeon.DZL Trojan

Pigeon.DZL virus description
Technical details:
Categories: Trojan

Pigeon.DZL indications of infection

This symptoms of Pigeon.DZL detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.AVKC Trojan
Key.Emulator Trojan Information
Remove IRC.Bot.Creator Backdoor

RemoteNC RAT

RemoteNC virus description
Technical details:
Categories: RAT

RemoteNC indications of infection

This symptoms of RemoteNC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove PegaSalas Trojan
servexploit143 RAT Symptoms
SillyDl.DLF Trojan Removal
Hell.Devil DoS Removal
Elsa.fa6 Trojan Information

QZap309 Trojan

QZap309 virus description
Technical details:
Categories: Trojan
QZap309 Aliases:
[Kaspersky]Trojan.AOLam;
[Eset]AOLam.A trojan;
[McAfee]QZap309;
[F-Prot]destructive program;
[Panda]Trj/AOLam;
[Computer Associates]AOLam!Trojan

QZap309 indications of infection

This symptoms of QZap309 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove AdPartner Adware
Removing Small.aui Downloader
Backdoor.Intruse.34!Server Backdoor Removal instruction
Removing WINS.Kill DoS
PremiumSearch Adware Cleaner

Loki Trojan

Loki virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Loki Aliases:
[Panda]Loki.1234.1st;
[Computer Associates]Loki

Loki Folders:
[%PROGRAM_FILES_COMMON%]\totem shared
[%PROGRAM_FILES%]\search bar

Loki Files:
[%PROFILE_TEMP%]\EaslME.exe
[%PROFILE_TEMP%]\EFJa7E.exe
[%PROFILE_TEMP%]\OaKDu7.exe
[%PROGRAM_FILES%]\default.skn
[%PROGRAM_FILES%]\skins\default.skn
[%SYSTEM%]\acsproxy.lib
[%SYSTEM%]\bw6mds51.ocx
[%SYSTEM%]\chat.dat
[%SYSTEM%]\ezines.dat
[%SYSTEM%]\home.dat
[%SYSTEM%]\imgconv.dll
[%SYSTEM%]\longtimer.ocx
[%SYSTEM%]\mciwndx.ocx
[%SYSTEM%]\olelib.tlb
[%SYSTEM%]\paysites.dat
[%SYSTEM%]\pics.dat
[%SYSTEM%]\unregister.exe
[%SYSTEM%]\VIC32.DLL
[%SYSTEM%]\videos.dat
[%WINDOWS%]\alchem.ini
[%WINDOWS%]\msbb.exe
[%PROFILE_TEMP%]\EaslME.exe
[%PROFILE_TEMP%]\EFJa7E.exe
[%PROFILE_TEMP%]\OaKDu7.exe
[%PROGRAM_FILES%]\default.skn
[%PROGRAM_FILES%]\skins\default.skn
[%SYSTEM%]\acsproxy.lib
[%SYSTEM%]\bw6mds51.ocx
[%SYSTEM%]\chat.dat
[%SYSTEM%]\ezines.dat
[%SYSTEM%]\home.dat
[%SYSTEM%]\imgconv.dll
[%SYSTEM%]\longtimer.ocx
[%SYSTEM%]\mciwndx.ocx
[%SYSTEM%]\olelib.tlb
[%SYSTEM%]\paysites.dat
[%SYSTEM%]\pics.dat
[%SYSTEM%]\unregister.exe
[%SYSTEM%]\VIC32.DLL
[%SYSTEM%]\videos.dat
[%WINDOWS%]\alchem.ini
[%WINDOWS%]\msbb.exe

Loki Registry Keys:
HKEY_CLASSES_ROOT\clsid\{771a1334-6b08-4a6b-aedc-cf994ba2cebe}
HKEY_CLASSES_ROOT\clsid\{dc341f1b-ec77-47be-8f58-96e83861cc5a}
HKEY_CLASSES_ROOT\interface\{90ce74cc-788a-4a00-b38d-cbca08cc9e8f}
HKEY_CLASSES_ROOT\interface\{bf06da8e-2beb-4816-9bbd-f7625246e245}
HKEY_CLASSES_ROOT\istx.installer.2
HKEY_CLASSES_ROOT\typelib\{cc257918-f435-4a33-8231-2b8195990cca}
HKEY_CLASSES_ROOT\typelib\{db447818-96b4-40df-8a55-720da496f514}
HKEY_CURRENT_USER\software\ist
HKEY_LOCAL_MACHINE\software\classes\appid\{11baf79b-530c-4200-a33d-48be83fc75be}
HKEY_LOCAL_MACHINE\software\classes\appid\{5fb747f9-320c-47b4-9ce8-545fb4f3ba81}
HKEY_LOCAL_MACHINE\software\classes\atltoolbar.tbar
HKEY_LOCAL_MACHINE\software\classes\atltoolbar.tbar.1
HKEY_LOCAL_MACHINE\software\classes\bho.bhoobject
HKEY_LOCAL_MACHINE\software\classes\bho.bhoobject.1
HKEY_LOCAL_MACHINE\software\classes\clsid\{68706808-7097-4818-9aec-cb1a0e7aca51}
HKEY_LOCAL_MACHINE\software\classes\clsid\{98a8315e-667a-11d5-87a3-bb213c32b44b}
HKEY_LOCAL_MACHINE\software\classes\clsid\{aa8c93e1-7e5f-497e-b67c-cc8fe2a40d3b}
HKEY_LOCAL_MACHINE\software\classes\clsid\{f3e7ff6d-dca1-11d4-95df-00c0dfe9982c}
HKEY_LOCAL_MACHINE\software\classes\imgconv.clsimgconv
HKEY_LOCAL_MACHINE\software\classes\interface\{2ddd90d6-f153-4ea7-a324-4b2d83d1027e}
HKEY_LOCAL_MACHINE\software\classes\interface\{788bd7b7-fa4f-4fd3-b63e-e3fbc0aa7d0a}
HKEY_LOCAL_MACHINE\software\classes\interface\{79bf9dcd-c52d-4da8-b15e-ac2a88e96b0a}
HKEY_LOCAL_MACHINE\software\classes\interface\{7ed9e9b8-e1d4-4576-aec2-2a70bb3caa1c}
HKEY_LOCAL_MACHINE\software\classes\interface\{98a8315d-667a-11d5-87a3-bb213c32b44b}
HKEY_LOCAL_MACHINE\software\classes\interface\{98a8315f-667a-11d5-87a3-bb213c32b44b}
HKEY_LOCAL_MACHINE\software\classes\interface\{996b33c1-8e19-4f4f-ab6c-52a2c523b7d3}
HKEY_LOCAL_MACHINE\software\classes\interface\{9ce15eb5-6b39-4656-9e1f-2d219ee42e0e}
HKEY_LOCAL_MACHINE\software\classes\typelib\{17ed04b9-6c71-11d4-87a3-daa6b6b40e8f}
HKEY_LOCAL_MACHINE\software\classes\typelib\{7c9e9a74-1922-409e-ab46-e48784336c3a}
HKEY_LOCAL_MACHINE\software\classes\typelib\{b1c5c992-23df-4704-9f7a-155b575ed19a}
HKEY_LOCAL_MACHINE\software\classes\typelib\{d956a47d-73cd-4ee9-bbf7-b06c14100c41}
HKEY_LOCAL_MACHINE\software\classes\typelib\{f3e7ff6b-dca1-11d4-95df-00c0dfe9982c}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{7C559105-9ECF-42B8-B3F7-832E75EDD959}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\internet settings\zonemap\domains\contentmatch.net
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\c:\windows\downloaded program files\istactivex.dll

Loki Registry Values:
HKEY_LOCAL_MACHINE\software\classes\appid\atltoolbar.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer


Loki indications of infection

This symptoms of Loki detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Elite.Keylogger Spyware
Removing Unmanarc.Remote.Control.Server Backdoor
MSN.SmartTags BHO Information
QZap1 Trojan Removal

Small.cy Trojan

Small.cy virus description
Technical details:
Categories: Trojan

Small.cy indications of infection

This symptoms of Small.cy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Chopenoz.BM4 Trojan
IDuCu Trojan Cleaner
INF.Pigeon Trojan Removal
Red.ZONE.server RAT Information

Bancos.ABA Trojan

Bancos.ABA virus description
Technical details:
Categories: Trojan
Bancos.ABA Aliases:
[Kaspersky]Trojan-Spy.Win32.Banker.anv

Bancos.ABA indications of infection

This symptoms of Bancos.ABA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
AdMaximize.com Tracking Cookie Removal instruction
Removing KillFiles.bx Trojan
Temnag Trojan Removal instruction