Bancos.GAQ Trojan

Bancos.GAQ virus description
Technical details:
Categories: Trojan

Bancos.GAQ indications of infection

This symptoms of Bancos.GAQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
W95.CIH Trojan Removal instruction
Vxidl.ARG Trojan Cleaner

Pigeon.5XE Trojan

Pigeon.5XE virus description
Technical details:
Categories: Trojan
Pigeon.5XE Aliases:
[Kaspersky]Backdoor.Win32.Hupigon.cgv;
[Other]W32/Hupigon.RDN,Win32/Pigeon.5xe!Trojan

Pigeon.5XE indications of infection

This symptoms of Pigeon.5XE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Surfer Trojan

page.only Adware

page.only virus description
Technical details:
Categories: Adware

page.only indications of infection

This symptoms of page.only detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Nuker Hacker Tool Removal
Floces Trojan Information
Pigeon.AVUB Trojan Removal
TrojanNotifier.Win32.IllNotifier Trojan Symptoms
Bancos.IGC Trojan Removal instruction

Vxidl.AWZ Trojan

Vxidl.AWZ virus description
Technical details:
Categories: Trojan

Vxidl.AWZ indications of infection

This symptoms of Vxidl.AWZ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing statistiche.it Tracking Cookie
Search200 Adware Information
FWC1 Adware Cleaner
Tobort Trojan Removal instruction

MS03.Exploit!Trojan Trojan

MS03.Exploit!Trojan virus description
Technical details:
Categories: Trojan

MS03.Exploit!Trojan indications of infection

This symptoms of MS03.Exploit!Trojan detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Registry.Run.Guard Trojan
Dark Backdoor Cleaner
StartPage.da Hijacker Symptoms
Removing Hamer Trojan

Pigeon.AYJ Trojan

Pigeon.AYJ virus description
Technical details:
Categories: Trojan

Pigeon.AYJ indications of infection

This symptoms of Pigeon.AYJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing LSL Trojan
Lycos.Boot.Helper Trojan Information
Win32.Cursor.joke Trojan Symptoms

AutoSearch BHO

AutoSearch virus description
Technical details:
Categories: BHO,Hijacker,Toolbar
AutoSearch Aliases:
[McAfee]FakeAlert-R.dll

AutoSearch Files:
[%COMMON_APPDATA%]\AutoSearch.dll
[%PROFILE_TEMP%]\stdrun3.exe
[%WINDOWS%]\aff_0006.exe
[%APPDATA%]\AutoSearch.dll
[%SYSTEM%]\safesearch.dll
[%WINDOWS%]\AutoSearch.dll
[%WINDOWS%]\AutoSearchHelper.dll
[%WINDOWS%]\sibrwin07.exe
[%WINDOWS%]\system\safesearch.dll
[%COMMON_APPDATA%]\AutoSearch.dll
[%PROFILE_TEMP%]\stdrun3.exe
[%WINDOWS%]\aff_0006.exe
[%APPDATA%]\AutoSearch.dll
[%SYSTEM%]\safesearch.dll
[%WINDOWS%]\AutoSearch.dll
[%WINDOWS%]\AutoSearchHelper.dll
[%WINDOWS%]\sibrwin07.exe
[%WINDOWS%]\system\safesearch.dll

AutoSearch Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{00000000-0000-0000-0000-000000000001}
HKEY_CURRENT_USER\software\classes\autosearch.autosearchobj
HKEY_CURRENT_USER\software\classes\autosearch.autosearchobj.1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00000000-0000-0000-0000-000000000001}
HKEY_CLASSES_ROOT\.wink
HKEY_CLASSES_ROOT\bhonew.bhoapp
HKEY_CLASSES_ROOT\bhonew.bhoapp.1
HKEY_CLASSES_ROOT\clsid\{00000000-0000-0000-0000-000000000001}
HKEY_CLASSES_ROOT\clsid\{1d3aea68-1602-4674-9552-f8f9309ee6e0}
HKEY_CLASSES_ROOT\dting file
HKEY_CLASSES_ROOT\iextensions.autosearch
HKEY_CLASSES_ROOT\iextensions.autosearch.1
HKEY_CLASSES_ROOT\interface\{3d11cbe7-1eee-4c8f-ab5c-a4cf7939f1f1}
HKEY_CLASSES_ROOT\interface\{d2735263-bb7c-4786-88d0-ed04886a8708}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{00000000-0000-0000-0000-000000000001}
HKEY_CLASSES_ROOT\typelib\{b7f3b034-329e-4373-a415-20bb0b03d053}
HKEY_CLASSES_ROOT\typelib\{c1947e81-7036-4ac8-ac09-906224f6f4fc}
HKEY_CLASSES_ROOT\wink file
HKEY_CURRENT_USER\autosearch.autosearchobj
HKEY_CURRENT_USER\autosearch.autosearchobj.1
HKEY_CURRENT_USER\clsid\{a55581dc-2cdb-4089-8878-71a080b22342}
HKEY_CURRENT_USER\software\classes\clsid\{a55581dc-2cdb-4089-8878-71a080b22342}
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\clsid\{a55581dc-2cdb-4089-8878-71a080b22342}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{00000000-0000-0000-0000-000000000001}

AutoSearch Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar
HKEY_CURRENT_USER\software\microsoft\internet explorer\urlsearchhooks
HKEY_CURRENT_USER\software\microsoft\internet explorer\urlsearchhooks
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar


AutoSearch indications of infection

This symptoms of AutoSearch detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing MoneyTree.DyFuCA Trojan
Remove Hip Trojan
Remove SillyDl.BYH Trojan
Prodex Trojan Cleaner

SIllyDl.CUE Trojan

SIllyDl.CUE virus description
Technical details:
Categories: Trojan

SIllyDl.CUE indications of infection

This symptoms of SIllyDl.CUE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.TrojanDownloader.Qoologic Downloader Cleaner
TrojanDropper.Win32.SilkRope Trojan Information
Removing Pigeon.AWJO Trojan

Small.AMA Trojan

Small.AMA virus description
Technical details:
Categories: Trojan,Downloader

Small.AMA indications of infection

This symptoms of Small.AMA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
hxtrack.com Tracking Cookie Removal
Vxidl.AXB Trojan Symptoms

SillyDl.CTY Trojan

SillyDl.CTY virus description
Technical details:
Categories: Trojan

SillyDl.CTY indications of infection

This symptoms of SillyDl.CTY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Surfmonkey BHO Removal
Bancos.IHV Trojan Removal instruction

Apher Trojan

Apher virus description
Technical details:
Categories: Trojan,Downloader
Apher Aliases:
[Panda]Trojan Horse;
[Computer Associates]Win32/Apher.D!Trojan,Win32/Apher.U!Downloader

Apher indications of infection

This symptoms of Apher detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.IKH Trojan Symptoms
QDel138 Trojan Information
Likha Trojan Symptoms
Skull.Burrow Trojan Removal instruction
Shadow Trojan Removal

Stealth.Password.Sender Trojan

Stealth.Password.Sender virus description
Technical details:
Categories: Trojan,Hacker Tool
Stealth.Password.Sender Aliases:
[Panda]Trojan Horse

Stealth.Password.Sender indications of infection

This symptoms of Stealth.Password.Sender detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ZyncosMark Adware Removal instruction
Removing YahKiller DoS
Saddamme Hacker Tool Removal

Arps Trojan

Arps virus description
Technical details:
Categories: Trojan

Arps indications of infection

This symptoms of Arps detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Afcore.as Backdoor Symptoms

Sailor Trojan

Sailor virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Sailor Aliases:
[Kaspersky]Sailor.1108,Sailor.834;
[Eset]probably unknown TSR.COM.EXE virus;
[McAfee]Sailor-Mars;
[F-Prot]corrupted or intended virus;
[Panda]Univ.ES,Sailor.834;
[Computer Associates]Sailor.1108,Sailor.834

Sailor indications of infection

This symptoms of Sailor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing PC.Flu Trojan
Remove Turiv Trojan

Shadorium RAT

Shadorium virus description
Technical details:
Categories: RAT

Shadorium indications of infection

This symptoms of Shadorium detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Likedi Trojan Symptoms
Joshi Trojan Information
Vxidl.AJQ Trojan Cleaner
DJoiner Trojan Cleaner

Speakeasy RAT

Speakeasy virus description
Technical details:
Categories: RAT

Speakeasy indications of infection

This symptoms of Speakeasy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HUL Trojan Cleaner
Messenger.Blocker Ransomware Information

BlackHaraz Backdoor

BlackHaraz virus description
Technical details:
Categories: Backdoor

BlackHaraz indications of infection

This symptoms of BlackHaraz detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing CIA.boot Trojan
Quimera Backdoor Symptoms
Remote.Administrator RAT Removal
nextcard.com Tracking Cookie Information

Pentpox Adware

Pentpox virus description
Technical details:
Categories: Adware
Pentpox Aliases:
[Kaspersky]Trojan.Win32.Vb.atp;
[McAfee]AdClicker-AO;
[Other]Adware.Popuppers

Pentpox Files:
[%WINDOWS%]\next06.exe
[%WINDOWS%]\next06.exe

Pentpox Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Pentpox indications of infection

This symptoms of Pentpox detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
RemoConChubo Trojan Removal

Pigeon.ALI Trojan

Pigeon.ALI virus description
Technical details:
Categories: Trojan

Pigeon.ALI indications of infection

This symptoms of Pigeon.ALI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Satanic.Yahell DoS Removal instruction
Remove Downhill.Demo RAT
SillyDl.DOW Trojan Information

MoSucker.plugin Trojan

MoSucker.plugin virus description
Technical details:
Categories: Trojan,Backdoor
MoSucker.plugin Aliases:
[Eset]Win32/MoSucker.22.Plugin trojan;
[Computer Associates]Backdoor/MoSucker.22.plugin

MoSucker.plugin indications of infection

This symptoms of MoSucker.plugin detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Gone Backdoor Symptoms
Remove Pigeon.EVT Trojan
Removing Pigeon.AYJ Trojan
Removing UpRootKit.Server Trojan

Little.Brother Trojan

Little.Brother virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Little.Brother Aliases:
[Kaspersky]LittBrother.321,LittBrother.307,LittBrother.299,LittBrother.349,LittBrother.361,LittBrother.300.c;
[Eset]Ltlbroth.321 virus,Ltlbroth.307 virus;
[McAfee]Univ.cmp;
[F-Prot]Little_Brother.299.A;
[Panda]Little Brother.321,Little Brother.307,Little_Brothe.299.B,Little Brothers,Little Brother.299;
[Computer Associates]Little Bro 321,Little_Brother-321,Little Brother,Little Bro 349

Little.Brother indications of infection

This symptoms of Little.Brother detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Leok Trojan
Picture Trojan Symptoms
Removing Win32.HackTool.Upadmin Trojan
Removing Munga Trojan

Pigeon.ASA Trojan

Pigeon.ASA virus description
Technical details:
Categories: Trojan

Pigeon.ASA indications of infection

This symptoms of Pigeon.ASA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Suomi Trojan Cleaner

ICQ.Serial.Pager Trojan

ICQ.Serial.Pager virus description
Technical details:
Categories: Trojan,Backdoor,RAT
ICQ.Serial.Pager Aliases:
[Kaspersky]Backdoor.SerialPager.10;
[McAfee]BackDoor-APY;
[Panda]Backdoor Program.LC,Trojan Horse;
[Computer Associates]Backdoor/SerialPager.10

ICQ.Serial.Pager indications of infection

This symptoms of ICQ.Serial.Pager detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove DOSRDP RAT
XConsole.beta Trojan Information
Remove Atobar Trojan

EnergyFactor Adware

EnergyFactor virus description
Technical details:
Categories: Adware

EnergyFactor indications of infection

This symptoms of EnergyFactor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Borlan Trojan Information
FlashTrack.Ftapp Adware Symptoms
Remove Bancos.GKN Trojan
Remove Zlob.Fam.Browser Protection Volume Trojan
00[Sub]7 Trojan Information

Fupgrade Trojan

Fupgrade virus description
Technical details:
Categories: Trojan
Fupgrade Aliases:
[Panda]Trojan Horse.LC;
[Computer Associates]Win32.Fupgrade,Win32/Fupgrade.A!Trojan

Fupgrade indications of infection

This symptoms of Fupgrade detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
XA1 Trojan Information
CWS.OSLogo Hijacker Information
Bancos.AEA Trojan Symptoms

SearchNav Adware

SearchNav virus description
Technical details:
Categories: Adware

SearchNav indications of infection

This symptoms of SearchNav detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Aliseru Trojan Cleaner
Remove EeeS Trojan
Bat.Steel Trojan Symptoms

Claria.Weatherscope Adware

Claria.Weatherscope virus description
Technical details:
Categories: Adware,Spyware

Claria.Weatherscope Folders:
[%PROGRAMS%]\weatherscope
[%PROGRAM_FILES%]\weatherscope
[%PROGRAM_FILES_COMMON%]\prtdbfnn

Claria.Weatherscope Files:
[%PROFILE_TEMP%]\weatherscopesetup.exe
[%STARTUP%]\weatherscope.lnk
[%WINDOWS%]\downloaded program files\iegator4127.dll
[%PROFILE_TEMP%]\weatherscopesetup.exe
[%STARTUP%]\weatherscope.lnk
[%WINDOWS%]\downloaded program files\iegator4127.dll

Claria.Weatherscope Registry Keys:
HKEY_CLASSES_ROOT\appid\hungryhands.dll
HKEY_CLASSES_ROOT\appid\{03f8822f-8877-4002-8bcd-b532d53d8471}
HKEY_CLASSES_ROOT\clsid\{bcf96fb4-5f1b-497b-aecc-910304a55011}
HKEY_CLASSES_ROOT\hungryhands.hungrybho
HKEY_CLASSES_ROOT\hungryhands.hungrybho.1
HKEY_CLASSES_ROOT\interface\{f8fb4ea2-6c05-4de5-8cd0-625b03f48e22}
HKEY_CLASSES_ROOT\typelib\{03f8822f-8877-4002-8bcd-b532d53d8471}
HKEY_LOCAL_MACHINE\software\classes\clsid\{bcf96fb4-5f1b-497b-aecc-910304a55011}
HKEY_LOCAL_MACHINE\software\classes\interface\{f8fb4ea2-6c05-4de5-8cd0-625b03f48e22}
HKEY_LOCAL_MACHINE\software\classes\typelib\{03f8822f-8877-4002-8bcd-b532d53d8471}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]\downloaded program files\iegator4128.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\weatherscope

Claria.Weatherscope Registry Values:
HKEY_LOCAL_MACHINE\software\classes\appid\hungryhands.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app management\arpcache\weatherscope
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app management\arpcache\weatherscope


Claria.Weatherscope indications of infection

This symptoms of Claria.Weatherscope detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Zombam Backdoor Removal instruction
Keylog.Ill Trojan Symptoms
PFS Trojan Removal
Agobot.bu Trojan Symptoms
NetKillx Backdoor Removal instruction

SecretExplorer DoS

SecretExplorer virus description
Technical details:
Categories: DoS

SecretExplorer indications of infection

This symptoms of SecretExplorer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Gilza Trojan Removal instruction
Bancos.HIS Trojan Removal
Bancos.GOR Trojan Removal
Remove Win32.Litmus Trojan

MBKWBar Toolbar

MBKWBar virus description
Technical details:
Categories: Toolbar

MBKWBar Folders:
[%PROGRAM_FILES%]\mbkwbar

MBKWBar Files:
[%PROFILE_TEMP%]\mbkwnst.exe
[%PROFILE_TEMP%]\mbkwnst.inf
[%WINDOWS%]\mbkwnst.exe
[%PROFILE_TEMP%]\mbkwnst.exe
[%PROFILE_TEMP%]\mbkwnst.inf
[%WINDOWS%]\mbkwnst.exe

MBKWBar Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{EA5A82FB-D6BE-44F9-9363-B1ABABC153C1}
HKEY_CLASSES_ROOT\ietoolbar.toolbarimpl
HKEY_CLASSES_ROOT\ietoolbar.toolbarimpl.1
HKEY_CLASSES_ROOT\typelib\{4a7dba74-e729-4ec8-92e2-ffd83921449f}
HKEY_CURRENT_USER\software\mbkwbar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\mbkwbar
HKEY_CLASSES_ROOT\clsid\{ea5a82fb-d6be-44f9-9363-b1ababc153c1}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar\{ea5a82fb-d6be-44f9-9363-b1ababc153c1}


MBKWBar indications of infection

This symptoms of MBKWBar detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Vxidl.AUW Trojan
iprom.net Tracking Cookie Removal instruction
VBS.VBSWG Worm Removal instruction