safetysettings.com Hijacker

safetysettings.com virus description
Technical details:
Categories: Hijacker

safetysettings.com Registry Keys:
HKEY_CLASSES_ROOT\multimediaControls.chl
HKEY_CLASSES_ROOT\videoaxobject.chl
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VAXObject.Chl


safetysettings.com indications of infection

This symptoms of safetysettings.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove JS.WinBomb Trojan

VirusBurster Ransomware

VirusBurster virus description
Technical details:
Categories: Ransomware

VirusBurster Folders:
[%PROGRAMS%]\VirusBurster
[%PROGRAM_FILES%]\VirusBurster
[%PROGRAM_FILES%]\VirusBursters

VirusBurster Files:
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusBurster 6.2.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusBurster 6.3.lnk
[%DESKTOP%]\VirusBurster.lnk
[%PROGRAMS%]\VirusBurster\Uninstall VirusBurster 6.2.lnk
[%PROGRAMS%]\VirusBurster\Uninstall VirusBurster 6.3.lnk
[%PROGRAMS%]\VirusBurster\VirusBurster 6.2 Website.lnk
[%PROGRAMS%]\VirusBurster\VirusBurster 6.2.lnk
[%PROGRAMS%]\VirusBurster\VirusBurster 6.3 Website.lnk
[%PROGRAMS%]\VirusBurster\VirusBurster 6.3.lnk
[%PROGRAM_FILES%]\VirusBurster\blacklist.txt
[%PROGRAM_FILES%]\VirusBurster\ignored.lst
[%PROGRAM_FILES%]\VirusBurster\msvcp71.dll
[%PROGRAM_FILES%]\VirusBurster\msvcr71.dll
[%PROGRAM_FILES%]\VirusBurster\uninst.exe
[%PROGRAM_FILES%]\VirusBurster\vir.dat
[%PROGRAM_FILES%]\VirusBurster\virbase.dat
[%PROGRAM_FILES%]\VirusBurster\VirusBurster.exe
[%PROGRAM_FILES%]\VirusBurster\virusburster.ini
[%PROGRAM_FILES%]\VirusBurster\VirusBurster.url
[%STARTMENU%]\VirusBurster 6.2.lnk
[%STARTMENU%]\VirusBurster 6.3.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusBurster 6.2.lnk
[%APPDATA%]\Microsoft\Internet Explorer\Quick Launch\VirusBurster 6.3.lnk
[%DESKTOP%]\VirusBurster.lnk
[%PROGRAMS%]\VirusBurster\Uninstall VirusBurster 6.2.lnk
[%PROGRAMS%]\VirusBurster\Uninstall VirusBurster 6.3.lnk
[%PROGRAMS%]\VirusBurster\VirusBurster 6.2 Website.lnk
[%PROGRAMS%]\VirusBurster\VirusBurster 6.2.lnk
[%PROGRAMS%]\VirusBurster\VirusBurster 6.3 Website.lnk
[%PROGRAMS%]\VirusBurster\VirusBurster 6.3.lnk
[%PROGRAM_FILES%]\VirusBurster\blacklist.txt
[%PROGRAM_FILES%]\VirusBurster\ignored.lst
[%PROGRAM_FILES%]\VirusBurster\msvcp71.dll
[%PROGRAM_FILES%]\VirusBurster\msvcr71.dll
[%PROGRAM_FILES%]\VirusBurster\uninst.exe
[%PROGRAM_FILES%]\VirusBurster\vir.dat
[%PROGRAM_FILES%]\VirusBurster\virbase.dat
[%PROGRAM_FILES%]\VirusBurster\VirusBurster.exe
[%PROGRAM_FILES%]\VirusBurster\virusburster.ini
[%PROGRAM_FILES%]\VirusBurster\VirusBurster.url
[%STARTMENU%]\VirusBurster 6.2.lnk
[%STARTMENU%]\VirusBurster 6.3.lnk

VirusBurster Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{D6ECDA42-AD6F-F8C3-03EA-5834841ADEC3}
HKEY_CLASSES_ROOT\codecssoftwarepackage.chl
HKEY_CLASSES_ROOT\Interface\{0065CDBC-2439-4365-A7E7-BF5B853BF49D}
HKEY_CLASSES_ROOT\Interface\{1319282A-C5F0-492F-B181-E8FC4627BCAB}
HKEY_CLASSES_ROOT\Interface\{1498ED0E-1C95-4BDB-8A3B-4C64D9446EF0}
HKEY_CLASSES_ROOT\Interface\{19DACF08-A207-4271-AA22-C138F512E787}
HKEY_CLASSES_ROOT\Interface\{2334C20D-2391-43B9-8AC2-ED0ABFAEF4FE}
HKEY_CLASSES_ROOT\Interface\{2BD65056-D9AC-43C0-918E-3F7373B33D0D}
HKEY_CLASSES_ROOT\Interface\{3E37C978-9E24-42FA-B021-B56CAAFDB694}
HKEY_CLASSES_ROOT\Interface\{3F29D1AE-EB95-4BE6-8793-566A787EDA8F}
HKEY_CLASSES_ROOT\Interface\{4130008C-5697-4EF5-9EDE-EF8F9F10D524}
HKEY_CLASSES_ROOT\Interface\{41AB12D6-A1AE-494C-84BC-A086F3269BD0}
HKEY_CLASSES_ROOT\Interface\{46D725D3-0120-417D-99D0-DEA7556EE983}
HKEY_CLASSES_ROOT\Interface\{4F4A0564-17DE-4EB2-B29E-6D2E167A3BE0}
HKEY_CLASSES_ROOT\Interface\{4FE9A3C6-AF72-401A-A98C-1CFF0F43C4C8}
HKEY_CLASSES_ROOT\Interface\{6B067ED9-4AEC-474E-B67E-85EF417D68BA}
HKEY_CLASSES_ROOT\Interface\{9188A88D-3D41-4EB6-A7D8-0F6A5266F685}
HKEY_CLASSES_ROOT\Interface\{94D400AE-0B1E-4623-B005-AB836FFF4B12}
HKEY_CLASSES_ROOT\Interface\{A25DCD82-5FAE-497B-A841-3D4872EC40AB}
HKEY_CLASSES_ROOT\Interface\{A593854E-1FAD-4BF4-B775-A272F154BE9B}
HKEY_CLASSES_ROOT\Interface\{AA127B8B-8780-406A-B615-69E83AE251AE}
HKEY_CLASSES_ROOT\Interface\{B660CDE9-526E-41FE-AB41-773D78BEE31E}
HKEY_CLASSES_ROOT\Interface\{BDACD469-DE26-4DCD-810F-35E43A12F44F}
HKEY_CLASSES_ROOT\Interface\{BF8A0E53-F417-413A-B849-B5C0086EEF8A}
HKEY_CLASSES_ROOT\Interface\{C36464A1-2D2F-4804-AAF6-F5BD62536ADB}
HKEY_CLASSES_ROOT\Interface\{C46A22FC-2620-4083-A722-51A67A248D57}
HKEY_CLASSES_ROOT\Interface\{C924472A-6FBF-469F-849C-A6424120CBB7}
HKEY_CLASSES_ROOT\Interface\{CA74BAFC-1F0C-49B1-8A76-5D55085E71FB}
HKEY_CLASSES_ROOT\Interface\{D0722752-35B5-44E1-A14A-E2A44C41F509}
HKEY_CLASSES_ROOT\Interface\{D648067C-E5D2-4BB8-AD86-A993B8793A52}
HKEY_CLASSES_ROOT\Interface\{E97012F0-12C3-4C89-A75F-B0327CD358F8}
HKEY_CLASSES_ROOT\Interface\{EE2EAC90-8B01-49D4-B46C-8E02BDA1F3B4}
HKEY_CLASSES_ROOT\Interface\{F7F932D6-A6BE-4273-9950-ECBD72170DBF}
HKEY_CLASSES_ROOT\Interface\{FD34EB96-89FA-43CC-9C37-D1D5B099D28F}
HKEY_CLASSES_ROOT\TypeLib\{6470B552-2B54-4AAB-BFA2-9376A5328AEC}
HKEY_CLASSES_ROOT\TypeLib\{A569F6C9-29F0-43BC-80CF-6BA138C66108}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D6ECDA42-AD6F-F8C3-03EA-5834841ADEC3}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{0065CDBC-2439-4365-A7E7-BF5B853BF49D}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{19DACF08-A207-4271-AA22-C138F512E787}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{3E37C978-9E24-42FA-B021-B56CAAFDB694}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{4130008C-5697-4EF5-9EDE-EF8F9F10D524}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{4F4A0564-17DE-4EB2-B29E-6D2E167A3BE0}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6B067ED9-4AEC-474E-B67E-85EF417D68BA}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{9188A88D-3D41-4EB6-A7D8-0F6A5266F685}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{B660CDE9-526E-41FE-AB41-773D78BEE31E}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{BF8A0E53-F417-413A-B849-B5C0086EEF8A}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{C36464A1-2D2F-4804-AAF6-F5BD62536ADB}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{CA74BAFC-1F0C-49B1-8A76-5D55085E71FB}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{D0722752-35B5-44E1-A14A-E2A44C41F509}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{D648067C-E5D2-4BB8-AD86-A993B8793A52}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{EE2EAC90-8B01-49D4-B46C-8E02BDA1F3B4}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{F7F932D6-A6BE-4273-9950-ECBD72170DBF}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{FD34EB96-89FA-43CC-9C37-D1D5B099D28F}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{A569F6C9-29F0-43BC-80CF-6BA138C66108}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\virusburster.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\VirusBurster
HKEY_LOCAL_MACHINE\SOFTWARE\VirusBurster

VirusBurster Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run


VirusBurster indications of infection

This symptoms of VirusBurster detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Hunab.Ku RAT Information
Barrotes Trojan Removal

FlashEnhancer Adware

FlashEnhancer virus description
Technical details:
Categories: Adware

FlashEnhancer Registry Keys:
HKEY_CLASSES_ROOT\clsid\{7cd20e91-1f31-41da-8379-479ea31df969}
HKEY_CLASSES_ROOT\clsid\{d7e588ab-a5d9-4422-b313-22a3470f9700}
HKEY_CLASSES_ROOT\unawareobj.unawareobj
HKEY_CLASSES_ROOT\unawareobj.unawareobj.1

FlashEnhancer Registry Values:
HKEY_CLASSES_ROOT\interface\{28168cce-5310-4f12-ab58-9da99a55aaeb}\typelib
HKEY_CLASSES_ROOT\interface\{890089b7-b385-442f-97b6-99060e8bd08f}\typelib
HKEY_LOCAL_MACHINE\software\ftk
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonce
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonce


FlashEnhancer indications of infection

This symptoms of FlashEnhancer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
IGetNet.ClearSearch Trojan Removal instruction
ENBVNBUC Trojan Symptoms
IRC.Kelebek Trojan Removal
SJRC RAT Information

FDoS.Eniac Hacker Tool

FDoS.Eniac virus description
Technical details:
Categories: Hacker Tool,DoS
FDoS.Eniac Aliases:
[Kaspersky]Nuker.Win32.Eniac;
[McAfee]FDoS-Eniac;
[F-Prot]destructive program;
[Panda]Nuker Program

FDoS.Eniac indications of infection

This symptoms of FDoS.Eniac detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Barrotes.Tecla Trojan Information

Xterm Hacker Tool

Xterm virus description
Technical details:
Categories: Hacker Tool,DoS

Xterm indications of infection

This symptoms of Xterm detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
BBot Trojan Information
Bancos.GPM Trojan Information
PSW.Yahoo.SPS Trojan Removal
RMF Backdoor Symptoms

Pigeon.EQC Trojan

Pigeon.EQC virus description
Technical details:
Categories: Trojan

Pigeon.EQC indications of infection

This symptoms of Pigeon.EQC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
STCPIO RAT Symptoms

Milan Trojan

Milan virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Milan Aliases:
[Kaspersky]Badguy.208,Trivial.67.a,Trivial.125.a,Trivial.125.c;
[Eset]Milan.New_Bad virus;
[Panda]Bad Guy2,WWT Family,WWT-1,WWT-2,Trivial.125.C;
[Computer Associates]New Bad Guy,WWT 01,WWT 02

Milan indications of infection

This symptoms of Milan detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
180Search Assistant Spyware Information
Pigeon.AFC Trojan Information