Anti.Leech.com Tracking Cookie

Anti.Leech.com virus description
Technical details:
Categories: Tracking Cookie

Anti.Leech.com indications of infection

This symptoms of Anti.Leech.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Vxidl.BAC Trojan
Helios!DLL Backdoor Information

Reni Trojan

Reni virus description
Technical details:
Categories: Trojan,Backdoor
Reni Aliases:
[Kaspersky]Backdoor.Reni.b;
[Panda]Backdoor Program;
[Computer Associates]Backdoor/Reni.b!Server,JS.CodeBase!exploit,JScript/CodeBase!Exploit

Reni indications of infection

This symptoms of Reni detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove HoundDog Trojan
Bancos.ZZD Trojan Cleaner
Pigeon.EJY Trojan Information
NetEyes Spyware Symptoms

Pigeon.AVAY Trojan

Pigeon.AVAY virus description
Technical details:
Categories: Trojan

Pigeon.AVAY indications of infection

This symptoms of Pigeon.AVAY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVMS Trojan Information
Permjin Trojan Removal
SillyDl.CLL Trojan Removal instruction
Spy.Software.Common.Components Spyware Removal

BackDoor.AB Trojan

BackDoor.AB virus description
Technical details:
Categories: Trojan,Backdoor
BackDoor.AB Aliases:
[Eset]Win32/TheThing.16.C trojan;
[McAfee]BackDoor-AB.cli;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/XZip.6;
[Computer Associates]Backdoor/TheThing_Server_family

BackDoor.AB indications of infection

This symptoms of BackDoor.AB detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
WhatUSeek.com Tracking Cookie Cleaner

Win32.MS03 Trojan

Win32.MS03 virus description
Technical details:
Categories: Trojan,Hacker Tool
Win32.MS03 Aliases:
[Panda]Trojan Horse.LC

Win32.MS03 indications of infection

This symptoms of Win32.MS03 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Huplu Trojan Removal
TrojanSpy.Win32.Iparmor Trojan Information

HgWeb Downloader

HgWeb virus description
Technical details:
Categories: Downloader

HgWeb indications of infection

This symptoms of HgWeb detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanDownloader.Win32.Small Trojan Symptoms
CWS.Feads Trojan Removal instruction
Vxidl.AGQ Trojan Removal instruction
Eret Trojan Cleaner
SillyDI.AQR Trojan Cleaner

TrojanDownloader.Win32.Dluca Trojan

TrojanDownloader.Win32.Dluca virus description
Technical details:
Categories: Trojan,Downloader
TrojanDownloader.Win32.Dluca Aliases:
[Panda]Spyware/Dluca,Trojan Horse,Trj/Downloader.IE

TrojanDownloader.Win32.Dluca Files:
[%SYSTEM%]\mnpol.exe
[%SYSTEM%]\mscnt.exe
[%SYSTEM%]\mnpol.exe
[%SYSTEM%]\mscnt.exe


TrojanDownloader.Win32.Dluca indications of infection

This symptoms of TrojanDownloader.Win32.Dluca detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Revenger Backdoor Removal
Remove Win32.Killlav.an Trojan
Sumbot Trojan Cleaner
Ned.Hard Trojan Removal
Pigeon.AMI Trojan Removal

eBoom.Search.Bar.InetSpeak BHO

eBoom.Search.Bar.InetSpeak virus description
Technical details:
Categories: BHO

eBoom.Search.Bar.InetSpeak indications of infection

This symptoms of eBoom.Search.Bar.InetSpeak detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Vxidl.AYV Trojan
Remove Menuey Trojan
Pigeon.AFL Trojan Cleaner
Cucum Trojan Removal instruction
Vxidl.AXE Trojan Symptoms

Vxidl.AYS Trojan

Vxidl.AYS virus description
Technical details:
Categories: Trojan

Vxidl.AYS indications of infection

This symptoms of Vxidl.AYS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.FZJ Trojan Information
Vxidl.AIH Trojan Cleaner
Bancos.GFK Trojan Symptoms
Internet.Speed.Monitor Adware Removal
Remove Pigeon.AWO Trojan

StatWin Spyware

StatWin virus description
Technical details:
Categories: Spyware

StatWin Folders:
[%PROGRAMS%]\StatWin Pro
[%PROGRAM_FILES%]\SXR Software\StatWin Pro

StatWin Files:
[%DESKTOP%]\StatWin.SeeStat - Statistics viewer.lnk
[%DESKTOP%]\StatWin.SeeStat - Statistics viewer.lnk

StatWin Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\statwin pro_is1
HKEY_LOCAL_MACHINE\software\sxr software
HKEY_LOCAL_MACHINE\system\controlset001\enum\root\legacy_sw_administration_service
HKEY_LOCAL_MACHINE\system\controlset001\services\sw administration service
HKEY_LOCAL_MACHINE\system\controlset003\enum\root\legacy_sw_administration_service
HKEY_LOCAL_MACHINE\system\controlset003\services\sw administration service
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_sw_administration_service
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sw administration service


StatWin indications of infection

This symptoms of StatWin detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Revealer.Free.Edition Spyware Symptoms
chatstat.com Tracking Cookie Symptoms
IRC.Mimic Trojan Cleaner
Anubis Trojan Cleaner

Skowor.O Worm

Skowor.O virus description
Technical details:
Categories: Worm

Skowor.O Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run


Skowor.O indications of infection

This symptoms of Skowor.O detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
IoFtpd Trojan Cleaner

Win32.StartPage Trojan

Win32.StartPage virus description
Technical details:
Categories: Trojan,Hijacker,Toolbar
Win32.StartPage Aliases:
[Kaspersky]Trojan.Win32.StartPage.kf,Trojan.Win32.StartPage.fw,Trojan.Win32.StartPage.ix,Trojan.Win32.Krepper.q,Trojan.Win32.StartPage.hx,Trojan.Win32.StartPage.nk,Trojan.Win32.Krepper.f,Trojan.Win32.StartPage.bs,TrojanDownloader.Win32.Nex.b,Trojan.Win32.Krepper.i,Trojan.Win32.StartPage.bx,Trojan.Win32.StartPage.ae,Trojan.Win32.StartPage.bb,TrojanClicker.Win32.Nex,Trojan.Win32.Gugu,Trojan.Win32.StartPage.aw,Trojan.PSW.Shajiang;
[Eset]Win32/StartPage.KF trojan,Win32/StartPage.IX trojan,Win32/StartPage.IX1 trojan,Win32/Krepper.Q trojan,Win32/StartPage.NK trojan,Win32/StartPage.BS trojan;
[Panda]Trojan Horse,Trj/SubSearch.C,Adware/SearchX,Trj/StartPage.gen,Trj/Startpage.KS,Trj/Conspy.E,Trj/Bookmark.C,Trj/StartPage.AB,Trj/Bookmark.D,Trj/Downloader.AJ,Adware/DNSErr,Spyware/Adclicker,Trj/StartPage.BD,Trj/Krepper.A,Trj/StartPage.T,Trj/StartPage.L;
[Computer Associates]Win32.Startpage.IU,Win32/Startpage.HT!Trojan,Win32.Startpage.LN,Win32.Startpage.IN,Win32/Conspy!Trojan,Win32.Startpage.AL!downloader,Win32/StartPage.WebCool!Trojan,Win32.Startpage.AO,Win32/StartPage.SearchWS!Trojan,Win32.Startpage.AV,Win32/StartPage.11264!DLL!Trojan,Win32.Startpage.AT,Win32/ClearHosts!Downloader,Win32.Startpage.BJ!downloader,Win32/ClearHosts.73728!Trojan,Win32.Startpage.BJ,Win32/StartPage.AE!Trojan,Win32.Startpage.BP,Win32/SearchPage.U!Trojan,Win32.Startpage.U,Win32/Startpage.AN!Trojan,Win32.Startpage.AN!downloader,Win32/Startpage.AW!Trojan,Win32.Startpage.AW,Win32/Startpage.Z!Trojan,Win32.Startpage.Z,Win32/Shajiang!PWS!Trojan,Win32.Systrim.B

Win32.StartPage Files:
[%SYSTEM%]\b384cx3z4m.dll
[%SYSTEM%]\pghi.dll
[%WINDOWS%]\system\anilgba.dll
[%SYSTEM%]\b384cx3z4m.dll
[%SYSTEM%]\pghi.dll
[%WINDOWS%]\system\anilgba.dll


Win32.StartPage indications of infection

This symptoms of Win32.StartPage detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove QQPass Trojan
Remove Pigeon.AWD Trojan

Win32.Harvester.Spy.Tro Trojan

Win32.Harvester.Spy.Tro virus description
Technical details:
Categories: Trojan,Spyware
Win32.Harvester.Spy.Tro Aliases:
[Kaspersky]TrojanSpy.Win32.Harvester.08;
[Eset]Win32/Spy.Harvester.08 trojan;
[Panda]Trojan Horse;
[Computer Associates]Win32.Seedyhar.B,Win32/Harvester!Spy.08.79360!Tro

Win32.Harvester.Spy.Tro indications of infection

This symptoms of Win32.Harvester.Spy.Tro detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GRH Trojan Removal instruction
Evil.AIM.SN.Maker Trojan Removal instruction
Pigeon.AVMK Trojan Removal instruction

Win32.Coiboa Trojan

Win32.Coiboa virus description
Technical details:
Categories: Trojan
Win32.Coiboa Aliases:
[Kaspersky]Backdoor.IrcContact.30;
[Panda]Bck/Irccontact.A;
[Computer Associates]Backdoor/IRC.Contact.30!Server,Win32.Contact.30

Win32.Coiboa indications of infection

This symptoms of Win32.Coiboa detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Oddysee Trojan Cleaner
Removing PECarlin Adware
Removing Sun2.Rootkit Trojan
SillyDl.CRP Trojan Cleaner

Shuckush Trojan

Shuckush virus description
Technical details:
Categories: Trojan

Shuckush indications of infection

This symptoms of Shuckush detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Keylogger.Common.Components Spyware Removal
Mumb Trojan Information
startpage.ajj Adware Symptoms

Julia Trojan

Julia virus description
Technical details:
Categories: Trojan,Hacker Tool
Julia Aliases:
[Panda]Trojan Horse;
[Computer Associates]Win32/Julia.3.2!PWS!DLL!Trojan

Julia indications of infection

This symptoms of Julia detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Zlob.Fam.Video Add-on Trojan Symptoms
Agobot.ai Trojan Information

SillyDl.BZU Trojan

SillyDl.BZU virus description
Technical details:
Categories: Trojan

SillyDl.BZU indications of infection

This symptoms of SillyDl.BZU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AXE Trojan Cleaner
Bancos.CYB Trojan Information

Bruja Trojan

Bruja virus description
Technical details:
Categories: Trojan,Hacker Tool
Bruja Aliases:
[Kaspersky]Trojan.Win32.Cahyna;
[Eset]Win32/Cahyna.A trojan;
[F-Prot]destructive program;
[Panda]Trj/Bruja;
[Computer Associates]Win32.Cahyna,Win32/Cahyna!Trojan

Bruja indications of infection

This symptoms of Bruja detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CWS.IEFeats3 Hijacker Removal instruction
Remove Windows95.Anonymous Hacker Tool
BAT.DelSys Trojan Removal

prosearching.com Hijacker

prosearching.com virus description
Technical details:
Categories: Hijacker

prosearching.com Registry Values:
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main


prosearching.com indications of infection

This symptoms of prosearching.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Bancos.HFZ Trojan
nrgyPlus Adware Information
countomat.com Tracking Cookie Cleaner