WurldMedia.bpboh BHO

WurldMedia.bpboh virus description
Technical details:
Categories: BHO,Hijacker

WurldMedia.bpboh Files:
[%SYSTEM%]\mbho.dll
[%SYSTEM%]\bpboh.dll
[%WINDOWS%]\system\bpboh.dll
[%SYSTEM%]\mbho.dll
[%SYSTEM%]\bpboh.dll
[%WINDOWS%]\system\bpboh.dll

WurldMedia.bpboh Registry Keys:
HKEY_CLASSES_ROOT\clsid\{40ac4d2d-491d-11d4-aaf2-0008c75dcd2b}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{40ac4d2d-491d-11d4-aaf2-0008c75dcd2b}
HKEY_LOCAL_MACHINE\software\classes\clsid\{40ac4d2d-491d-11d4-aaf2-0008c75dcd2b}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{40ac4d2d-491d-11d4-aaf2-0008c75dcd2b}


WurldMedia.bpboh indications of infection

This symptoms of WurldMedia.bpboh detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanSpy.Win32.Conspy Trojan Symptoms

SlackBot Backdoor

SlackBot virus description
Technical details:
Categories: Backdoor,RAT,DoS
SlackBot Aliases:
[Panda]Backdoor Program;
[Computer Associates]Backdoor/Slackbot

SlackBot indications of infection

This symptoms of SlackBot detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Stealth.Keyboard.Interceptor.Professional Spyware Symptoms
JunkSurf Trojan Cleaner

MegaToolbar BHO

MegaToolbar virus description
Technical details:
Categories: BHO

MegaToolbar Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\megatlbr


MegaToolbar indications of infection

This symptoms of MegaToolbar detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Snag Trojan Removal
Bancos.GOH Trojan Symptoms

VB.ik Trojan

VB.ik virus description
Technical details:
Categories: Trojan

VB.ik indications of infection

This symptoms of VB.ik detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Myss Trojan
Hackworld Backdoor Removal
MC.Desktop Trojan Cleaner
Removing Yahoo.Freeze DoS

Win32.AcidBattery Trojan

Win32.AcidBattery virus description
Technical details:
Categories: Trojan,Backdoor
Win32.AcidBattery Aliases:
[Eset]Win32/AcidBattery trojan;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Acid.1_0

Win32.AcidBattery indications of infection

This symptoms of Win32.AcidBattery detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
RegFreeze.net::RegFreeze Adware Removal instruction
Bancos.FVK Trojan Removal instruction
Pigeon.EES Trojan Symptoms

SillyDl.CMB Trojan

SillyDl.CMB virus description
Technical details:
Categories: Trojan

SillyDl.CMB indications of infection

This symptoms of SillyDl.CMB detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing PWS.QQThief Trojan

Pigeon.ETW Trojan

Pigeon.ETW virus description
Technical details:
Categories: Trojan

Pigeon.ETW indications of infection

This symptoms of Pigeon.ETW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.PSW.Rit Trojan Cleaner

Small.xp Downloader

Small.xp virus description
Technical details:
Categories: Downloader

Small.xp indications of infection

This symptoms of Small.xp detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Aust Trojan Removal instruction
BAT.Goon Trojan Information
Remove QQ2000 Hacker Tool
Remove Bancos.GSD Trojan

Bancos.GDL Trojan

Bancos.GDL virus description
Technical details:
Categories: Trojan

Bancos.GDL indications of infection

This symptoms of Bancos.GDL detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HXW Trojan Information
H3ll.Messenger DoS Removal

Pigeon.EKK Trojan

Pigeon.EKK virus description
Technical details:
Categories: Trojan

Pigeon.EKK indications of infection

This symptoms of Pigeon.EKK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanDownloader.Win32.Small.gt Downloader Removal
CrisysTec.Sentry Ransomware Information
Remove June Trojan

Schizo Trojan

Schizo virus description
Technical details:
Categories: Trojan
Schizo Aliases:
[Kaspersky]Trojan.Schizo.b;
[McAfee]Schizo-S,Schizo;
[F-Prot]destructive program;
[Panda]Trojan Horse,Trj/Schitzo;
[Computer Associates]Schizo.B,Wci-0034-s,Eatonway

Schizo indications of infection

This symptoms of Schizo detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
findtheperfectpuppy.com Tracking Cookie Symptoms
traffic4u.nl Tracking Cookie Information
Nexus.Portal.Install RAT Cleaner
Litmus Trojan Cleaner

SillyDl.BYX Trojan

SillyDl.BYX virus description
Technical details:
Categories: Trojan

SillyDl.BYX indications of infection

This symptoms of SillyDl.BYX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TailGunn Trojan Removal instruction
Removing Ziocom Adware
Remove Melter Trojan
Removing sredir RAT

Win32.Spool Trojan

Win32.Spool virus description
Technical details:
Categories: Trojan,Backdoor
Win32.Spool Aliases:
[Kaspersky]Backdoor.Formador.c;
[Eset]Win32/Formador.C trojan;
[Computer Associates]Win32.Formador.D

Win32.Spool indications of infection

This symptoms of Win32.Spool detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Active.Key.Logger Spyware

July13 Trojan

July13 virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
July13 Aliases:
[Kaspersky]July13.a;
[Eset]July13Th.1201 virus;
[McAfee]July13;
[F-Prot]July_13th.1201;
[Panda]July 13th.1201;
[Computer Associates]TPE encrypted,TPE like

July13 indications of infection

This symptoms of July13 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing PSW.Lmir.ea Trojan
Pentagon Trojan Information
FormatA Trojan Removal
Agent.aa Trojan Removal
CWS.EHTTP Hijacker Removal

Vargnocker Backdoor

Vargnocker virus description
Technical details:
Categories: Backdoor,RAT
Vargnocker Aliases:
[Kaspersky]Backdoor.VagrNocker.40;
[McAfee]BackDoor-ZV,New BackDoor2;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program,Bck/VagrNocker;
[Computer Associates]Backdoor/Latinus_Server_family,Backdoor/VagrNocker.4.0

Vargnocker indications of infection

This symptoms of Vargnocker detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Minsk.Ghost Trojan
Gorman Trojan Removal instruction

Pigeon.AVNO Trojan

Pigeon.AVNO virus description
Technical details:
Categories: Trojan

Pigeon.AVNO indications of infection

This symptoms of Pigeon.AVNO detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Hupigon.nh Trojan Information
Win32.MindControl Trojan Cleaner

Computer.Use.Reporter Spyware

Computer.Use.Reporter virus description
Technical details:
Categories: Spyware

Computer.Use.Reporter Files:
[%COMMON_DESKTOPDIRECTORY%]\Computer Use Reporter.lnk
[%COMMON_PROGRAMS%]\Computer Use Reporter.lnk
[%COMMON_STARTMENU%]\Computer Use Reporter.lnk
[%COMMON_STARTUP%]\cure.exe
[%PROGRAM_FILES%]\CUR\CUR.txt
[%PROGRAM_FILES%]\CUR\CURC.exe
[%PROGRAM_FILES%]\CUR\Pointer.html
[%COMMON_DESKTOPDIRECTORY%]\Computer Use Reporter.lnk
[%COMMON_PROGRAMS%]\Computer Use Reporter.lnk
[%COMMON_STARTMENU%]\Computer Use Reporter.lnk
[%COMMON_STARTUP%]\cure.exe
[%PROGRAM_FILES%]\CUR\CUR.txt
[%PROGRAM_FILES%]\CUR\CURC.exe
[%PROGRAM_FILES%]\CUR\Pointer.html


Computer.Use.Reporter indications of infection

This symptoms of Computer.Use.Reporter detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HGL Trojan Information
Greeting Trojan Removal
brightshare.com Tracking Cookie Cleaner
InCommand.7b2 Backdoor Removal

SeeqBar Adware

SeeqBar virus description
Technical details:
Categories: Adware

SeeqBar Folders:
[%PROGRAM_FILES%]\seeq toolbar

SeeqBar Registry Keys:
HKEY_CLASSES_ROOT\Interface\{FABBB49A-4D7B-415B-8250-15C3B854E9FF}
HKEY_CLASSES_ROOT\clsid\{34a44fcf-50e3-63a5-a8da-7835752b9571}
HKEY_CLASSES_ROOT\interface\{fabbb49a-4d7b-415b-8250-15c3b854e9ff}
HKEY_CLASSES_ROOT\typelib\{f5869236-978b-4034-83b5-94915156a26c}
HKEY_CLASSES_ROOT\xbtb05013.ietoolbar
HKEY_CLASSES_ROOT\xbtb05013.ietoolbar.1
HKEY_CLASSES_ROOT\xbtb05013.xbtb05013
HKEY_CLASSES_ROOT\xbtb05013.xbtb05013.1
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser\{34a44fcf-50e3-63a5-a8da-7835752b9571}
HKEY_CURRENT_USER\software\xbtb05013
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\xbtb05013.xbtb05013ietoolbar

SeeqBar Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar


SeeqBar indications of infection

This symptoms of SeeqBar detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SoftEther RAT
Golid Trojan Information
SpySnipe Ransomware Cleaner
Remove Pigeon.AOL Trojan

NetThief.TW.Server Backdoor

NetThief.TW.Server virus description
Technical details:
Categories: Backdoor
NetThief.TW.Server Aliases:
[Computer Associates]Backdoor/NetThief.TW.Server

NetThief.TW.Server indications of infection

This symptoms of NetThief.TW.Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Funcade Adware Information
Malware.Stopper Trojan Removal

Open.Close Trojan

Open.Close virus description
Technical details:
Categories: Trojan
Open.Close Aliases:
[Panda]Joke/Chospe

Open.Close indications of infection

This symptoms of Open.Close detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove WXYC Trojan
Removing SubSeven.Java.Client RAT
Pigeon.ASJ Trojan Removal
Remove Dowque.ABK Trojan
Chksyn Trojan Removal

Vxidl.AZO Trojan

Vxidl.AZO virus description
Technical details:
Categories: Trojan

Vxidl.AZO indications of infection

This symptoms of Vxidl.AZO detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
NeoSpace Adware Removal instruction
Chinese.Fish Trojan Removal
Couponica Adware Symptoms
Removing Calego Trojan
Win32.Spy.Agent Trojan Symptoms

LiveList Backdoor

LiveList virus description
Technical details:
Categories: Backdoor,Hacker Tool
LiveList Aliases:
[Kaspersky]Backdoor.LiveList.b;
[Panda]Backdoor Program,Bck/LiveList.b;
[Computer Associates]Backdoor/LiveList.b,Backdoor/LiveList.B!Server

LiveList indications of infection

This symptoms of LiveList detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Hingon Trojan Information
Remove SdBot.bn Backdoor
Delf.af Backdoor Symptoms
Price Trojan Information

Pigeon.EVI Trojan

Pigeon.EVI virus description
Technical details:
Categories: Trojan

Pigeon.EVI indications of infection

This symptoms of Pigeon.EVI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
AppsTraka Spyware Information
WinEggdrop.utility Trojan Information

Pigeon.AFS Trojan

Pigeon.AFS virus description
Technical details:
Categories: Trojan

Pigeon.AFS indications of infection

This symptoms of Pigeon.AFS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
InetSpy Backdoor Information
Remove Micro.DoT.MMer Hacker Tool

Pigeon.ACQ Trojan

Pigeon.ACQ virus description
Technical details:
Categories: Trojan

Pigeon.ACQ indications of infection

This symptoms of Pigeon.ACQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Dash.em Trojan Symptoms
Remove Win32.Mimail Trojan
Remove Kiev Trojan
Bancos.GJI Trojan Removal instruction
TelServer Backdoor Cleaner

Avkillah Trojan

Avkillah virus description
Technical details:
Categories: Trojan,Worm,Hacker Tool
Avkillah Aliases:
[Eset]Win32/Avkillah.10 trojan;
[Panda]Worm Generic,Trojan Horse;
[Computer Associates]Win32/Avkillah.20!Trojan,Win32/Avkillah.10!Trojan

Avkillah indications of infection

This symptoms of Avkillah detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Quick.Keylogger Spyware Cleaner
PKill DoS Cleaner
Removing Jinmoze Backdoor
Remove Dowque.ABR Trojan

Bancos.HBG Trojan

Bancos.HBG virus description
Technical details:
Categories: Trojan

Bancos.HBG indications of infection

This symptoms of Bancos.HBG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Winsock DoS Symptoms
HLLP.Duke Trojan Information
SillyDl.CEY Trojan Information

Tiner Trojan

Tiner virus description
Technical details:
Categories: Trojan,Downloader
Tiner Aliases:
[Panda]Trojan Horse;
[Computer Associates]Win32/Tiner.A!Trojan,Win32/Tiner.B!Trojan

Tiner indications of infection

This symptoms of Tiner detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Borlander Downloader
Removing SearchAndBrowse Adware
LdPinch Trojan Removal
Vxidl.BFF Trojan Symptoms
Dachri Trojan Cleaner

P2E.ai Trojan

P2E.ai virus description
Technical details:
Categories: Trojan

P2E.ai Registry Keys:
HKEY_CURRENT_USER\software\microsoft\systemcertificates\trustedpublisher\certificates\bd8400524261df1adbd8860f22c9ce2b97471448
HKEY_CURRENT_USER\software\microsoft\systemcertificates\trustedpublisher\certificates\1a01f84d4a5e91b9cf2e1f16dffce136a69aa04a

P2E.ai Registry Values:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run


P2E.ai indications of infection

This symptoms of P2E.ai detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PWS.Shivers Trojan Removal
DTr Trojan Information

ERRN Adware

ERRN virus description
Technical details:
Categories: Adware

ERRN Files:
[%APPDATA%]\errn.exe
[%WINDOWS%]\prefetch\errn.exe-3b359f7f.pf
[%APPDATA%]\errn.exe
[%WINDOWS%]\prefetch\errn.exe-3b359f7f.pf


ERRN indications of infection

This symptoms of ERRN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
HairyPalm Trojan Removal
NT.Shell RAT Information
Excel95Macro.Laroux Trojan Cleaner
Ac4 Downloader Cleaner