VeryCD Toolbar

VeryCD virus description
Technical details:
Categories: Toolbar

VeryCD Folders:
[%PROGRAM_FILES%]\YOK.com

VeryCD Files:
[%DESKTOP%]\YOK³¬¼¶ËÑË÷.lnk
[%DESKTOP%]\YOK³¬¼¶ËÑË÷.lnk

VeryCD Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{75FE2B5A-D3A4-4EFA-AC11-ADC9C9459688}
HKEY_CLASSES_ROOT\clsid\{88351cef-bac0-4a9b-8380-31a173e2926f}
HKEY_CLASSES_ROOT\clsid\{a29f7f71-dcdb-412d-b19a-2002dc966e33}
HKEY_CLASSES_ROOT\CLSID\{F869BB38-FFEF-4589-B986-610B7AD0ADA2}
HKEY_CLASSES_ROOT\interface\{3020099a-d1ef-4bb5-bca5-63cd8d110233}
HKEY_CLASSES_ROOT\interface\{3a42c888-43d4-4bce-b3bc-99e5e15c631c}
HKEY_CLASSES_ROOT\interface\{5bf5a044-328c-42ca-8edb-c513a4a49c69}
HKEY_CLASSES_ROOT\interface\{8a74c2af-d08c-41e4-b6c0-11f1c7ed86a5}
HKEY_CLASSES_ROOT\typelib\{7b18218b-2551-4f18-b94d-10d7ca4c14ec}
HKEY_CLASSES_ROOT\yoktoolbar.band
HKEY_CLASSES_ROOT\yoktoolbar.band.1
HKEY_CLASSES_ROOT\yoktoolbar.contextsearch
HKEY_CLASSES_ROOT\yoktoolbar.contextsearch.1
HKEY_CLASSES_ROOT\yoktoolbar.yoktoolbarbho
HKEY_CLASSES_ROOT\yoktoolbar.yoktoolbarbho.1
HKEY_CURRENT_USER\software\yok
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{75FE2B5A-D3A4-4EFA-AC11-ADC9C9459688}
HKEY_LOCAL_MACHINE\software\yok
HKEY_LOCAL_MACHINE\system\yserialnumber
HKEY_CLASSES_ROOT\clsid\{564cb59a-2813-4cee-b387-03d85322b54d}
HKEY_CLASSES_ROOT\clsid\{75fe2b5a-d3a4-4efa-ac11-adc9c9459688}
HKEY_CLASSES_ROOT\clsid\{7d0e8987-ba21-483a-b1ac-149da2f39a5a}
HKEY_CLASSES_ROOT\clsid\{f869bb38-ffef-4589-b986-610b7ad0ada2}
HKEY_CLASSES_ROOT\interface\{7772d684-fdc9-46d1-8b1a-977eb5596a2a}
HKEY_CLASSES_ROOT\interface\{9e3cddf5-b0a7-43fb-a882-b6b177fd4f01}
HKEY_CLASSES_ROOT\interface\{bf9920a4-f4fd-4a14-92e6-3043a31c7abe}
HKEY_CLASSES_ROOT\yoktoolbar
HKEY_CLASSES_ROOT\yoktoolbar.yokcommband
HKEY_CLASSES_ROOT\yoktoolbar.yokcommband.1
HKEY_CLASSES_ROOT\yoktoolbar.yokhttpfilter
HKEY_CLASSES_ROOT\yoktoolbar.yokhttpfilter.1
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\extensions\{f869bb38-ffef-4589-b986-610b7ad0ada2}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{75fe2b5a-d3a4-4efa-ac11-adc9c9459688}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\yok.supersearch

VeryCD Registry Values:
HKEY_CLASSES_ROOT\appid\yoktoolbar.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


VeryCD indications of infection

This symptoms of VeryCD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SpyGuardPro Ransomware
Leszcz RAT Cleaner
Remove XPCSpy Spyware
RaxSearch Adware Information
Bancos.FYL Trojan Symptoms

Vxidl.AHX Trojan

Vxidl.AHX virus description
Technical details:
Categories: Trojan

Vxidl.AHX indications of infection

This symptoms of Vxidl.AHX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GKT Trojan Symptoms
MyWebSearch (MySearch) Adware Cleaner
Etap Trojan Cleaner
SillyDl.DNK Trojan Cleaner
Vxidl.BAR Trojan Information

Vxidl.AWE Trojan

Vxidl.AWE virus description
Technical details:
Categories: Trojan

Vxidl.AWE indications of infection

This symptoms of Vxidl.AWE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Principale Trojan
SillyDl.DCE Trojan Cleaner

Intended.COM Trojan

Intended.COM virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Intended.COM Aliases:
[Kaspersky]1_COM;
[Computer Associates]RC.456

Intended.COM indications of infection

This symptoms of Intended.COM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Tripod Tracking Cookie Information

Pigeon.AVCC Trojan

Pigeon.AVCC virus description
Technical details:
Categories: Trojan

Pigeon.AVCC indications of infection

This symptoms of Pigeon.AVCC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Asterix Trojan Removal
SdBot.cd Backdoor Cleaner

Vortexx.Project.Bomber DoS

Vortexx.Project.Bomber virus description
Technical details:
Categories: DoS

Vortexx.Project.Bomber indications of infection

This symptoms of Vortexx.Project.Bomber detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Rape Trojan Removal instruction
Pigeon.EMD Trojan Symptoms

Lorer Trojan

Lorer virus description
Technical details:
Categories: Trojan
Lorer Aliases:
[Panda]Trj/W32.Lorer;
[Computer Associates]Win32.Lorer,Win32/FKCQ!Trojan

Lorer indications of infection

This symptoms of Lorer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
DelfBanload.Variant!Trojan Trojan Symptoms
Downhill.Demo RAT Information
Protect Trojan Cleaner