BootDr3 Trojan

BootDr3 virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
BootDr3 Aliases:
[Kaspersky]Cannabis.a,Virus.Boot.Cannabis.a,TrojanDropper.Boot.InstallDisk.a;
[Eset]InstallDisk.A trojan;
[McAfee]BootDr3,BootDr62;
[F-Prot]boot sector virus dropper;
[Panda]Cannabis.B.Drp,Horse Boot Drooper,Pilla_Mbr.2560;
[Computer Associates]Cannabis_Dropper!Dropper,Dropper.Boot.Cannabis,Dropper.Boot.a,InstallBootVirus.360K!Dropper,PS-MPC

BootDr3 indications of infection

This symptoms of BootDr3 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Light.Boot.dr!Dropper Trojan
Pigeon.BBG Trojan Symptoms
Shipper Backdoor Symptoms
Remove BQ Trojan
Bancos.FZN Trojan Information

Focalink.com Tracking Cookie

Focalink.com virus description
Technical details:
Categories: Tracking Cookie

Focalink.com indications of infection

This symptoms of Focalink.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Augudor.Server Trojan Information
Win32.KillFiles.bm Trojan Cleaner
HLLP.6248!Dropper Trojan Removal instruction
Vxidl.AJU Trojan Removal instruction
WinPup32 Trojan Information

PWS.Ghost Trojan

PWS.Ghost virus description
Technical details:
Categories: Trojan,Hacker Tool
PWS.Ghost Aliases:
[Kaspersky]Trojan.PSW.Ghostar.48;
[McAfee]PWS-Ghost;
[F-Prot]security risk or a "backdoor" program;
[Panda]Trj/PSW.Ghostar;
[Computer Associates]Win32/Ghostar.44!PWS!Trojan

PWS.Ghost indications of infection

This symptoms of PWS.Ghost detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
W16.WinVir.dr Trojan Information
Winsock DoS Removal
Stealth.Eye.New.Cam.Viewer RAT Symptoms
Remove AdultId Adware
HeyItsMe Trojan Information

Win95.Tuil Trojan

Win95.Tuil virus description
Technical details:
Categories: Trojan
Win95.Tuil Aliases:
[Kaspersky]Trojan.Win9x.Tuil;
[McAfee]Tuil.dr;
[F-Prot]destructive program;
[Panda]Trojan Horse;
[Computer Associates]Win32.Morgoth,Win32/Morgoth

Win95.Tuil indications of infection

This symptoms of Win95.Tuil detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
XP.Antivirus Ransomware Symptoms
SexoDial Adware Symptoms
Removing Lemir.ci Trojan
Remove CurePCSolution Adware
Windows.Activity.Logging.Interface Spyware Removal

Fintlers Trojan

Fintlers virus description
Technical details:
Categories: Trojan

Fintlers indications of infection

This symptoms of Fintlers detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.FBB Trojan Removal instruction
D86asm RAT Cleaner
SpywareSheriff.com::SpywareSheriff Adware Removal
Bancos.GCI Trojan Symptoms
Remove Dowque.ABW Trojan

Cabronator.Kill.beta3 Backdoor

Cabronator.Kill.beta3 virus description
Technical details:
Categories: Backdoor,RAT
Cabronator.Kill.beta3 Aliases:
[Kaspersky]Backdoor.Win32.Cabrotor.10.a,Backdoor.Win32.Cabrotor.10.c;
[Panda]Backdoor Program,Bck/MegaChuku.srv.3;
[Computer Associates]Backdoor/Cabrotor.10.c!Server,Win32.Cabronator.30.E,Win32/CaBrONaToR.3.KiLL!Trojan

Cabronator.Kill.beta3 indications of infection

This symptoms of Cabronator.Kill.beta3 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Dowque.AFC Trojan Removal
float Trojan Symptoms
TAMAutoRun Trojan Information
Master Backdoor Removal
Removing Adware.WinAd Adware

Bancos.HKR Trojan

Bancos.HKR virus description
Technical details:
Categories: Trojan

Bancos.HKR indications of infection

This symptoms of Bancos.HKR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Launch RAT
Vxidl.AJU Trojan Removal instruction
Remove Bancos.HMX Trojan
Java.ByteVerify.Tr Trojan Removal instruction
VB.eo Backdoor Removal

Red.Hacker Trojan

Red.Hacker virus description
Technical details:
Categories: Trojan,Hacker Tool,DoS
Red.Hacker Aliases:
[Kaspersky]HackTool.Win32.Redhack.25,HackTool.Win32.Redhack.10,HackTool.Win32.Redhack.30;
[McAfee]Tool-Redhack;
[F-Prot]virus construction tool;
[Panda]HackTool,Trojan Horse

Red.Hacker indications of infection

This symptoms of Red.Hacker detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
JS.Wonka Hostile Code Removal
FortuneCity.com Tracking Cookie Removal instruction
float Trojan Removal
Remove Matcash.dll Trojan
Kid.Terror Backdoor Removal

KBind Trojan

KBind virus description
Technical details:
Categories: Trojan
KBind Aliases:
[Computer Associates]Win32.KBind.11,Win32/KBind.11.A!Trojan

KBind Files:
[%DESKTOP%]\stats\registry.dll
[%PROGRAM_FILES%]\Freakz_Script\stats\registry.dll
[%DESKTOP%]\stats\registry.dll
[%PROGRAM_FILES%]\Freakz_Script\stats\registry.dll


KBind indications of infection

This symptoms of KBind detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Zlob.Fam.SoftCodec Trojan Symptoms
SubSeven.Stop RAT Cleaner
Removing D86asm RAT
Icemenell Trojan Removal
SillyDl.CZP Trojan Removal instruction

JS.Wonka Hostile Code

JS.Wonka virus description
Technical details:
Categories: Hostile Code
JS.Wonka Aliases:
[Other]JS/Wonka

JS.Wonka indications of infection

This symptoms of JS.Wonka detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
FTPAttack Trojan Removal instruction
SillyDl.BBZ Downloader Information
Remove Vxidl.AAJ Trojan
TAMAutoRun Trojan Information
Win32.NetDown Trojan Cleaner

Reportserversocket Hostile Code

Reportserversocket virus description
Technical details:
Categories: Hostile Code

Reportserversocket indications of infection

This symptoms of Reportserversocket detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.DAK Trojan Removal
FortuneCity.com Tracking Cookie Cleaner
Redisin!Trojan Trojan Removal
Remove Systhread Trojan
topping.com.ua Tracking Cookie Removal instruction

Sality Trojan

Sality virus description
Technical details:
Categories: Trojan
Sality Aliases:
[Other]Win32/Sality/E

Sality Files:
[%SYSTEM%]\wmimgr32.dll
[%SYSTEM%]\wmimgr32.dll


Sality indications of infection

This symptoms of Sality detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Antica Adware Removal instruction
Remove topping.com.ua Tracking Cookie
Bancos.HGE Trojan Symptoms
Remove Bancos.GDN Trojan
Remove Zlob.Fam.SoftCodec Trojan

The.Spy.Beta Trojan

The.Spy.Beta virus description
Technical details:
Categories: Trojan,Spyware,Backdoor
The.Spy.Beta Aliases:
[Kaspersky]Backdoor.TheSpy;
[Eset]Win32/TheSpy.Beta_1 trojan;
[McAfee]BackDoor-IA;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/TheSpy,Bck/TheSpy.Srv;
[Computer Associates]Backdoor/TheSpy,Win32.Spy

The.Spy.Beta indications of infection

This symptoms of The.Spy.Beta detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Master Backdoor
Remove Bancos.HHH Trojan
Win32.Memleak Trojan Symptoms
Removing Pigeon.EIV Trojan
Delf.dy Backdoor Information

Winsock DoS

Winsock virus description
Technical details:
Categories: DoS

Winsock indications of infection

This symptoms of Winsock detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove TrojanDownloader.Win32.Tooncom Trojan
Removing TFD DoS
Remove NetKillx Backdoor
Apdoor.cr Backdoor Removal instruction
NeverEnd Trojan Removal

Icemenell Trojan

Icemenell virus description
Technical details:
Categories: Trojan
Icemenell Aliases:
[Kaspersky]Trojan-PSW.Win32.OnLineGames.jj;
[McAfee]PWS-Gamania.dr;
[Other]Win32/Icemenell.H,Infostealer

Icemenell Files:
[%WINDOWS%]\Syswm3\svchost.exe
[%WINDOWS%]\Syswm3\svchost.exe


Icemenell indications of infection

This symptoms of Icemenell detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win.DelSys Trojan Removal
BAT.ZipBat Trojan Removal instruction
Removing VB5.Jerkins Trojan
Redisin!Trojan Trojan Symptoms
Dowque.ABW Trojan Cleaner

Eljefe Trojan

Eljefe virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Eljefe Aliases:
[Kaspersky]Backdoor.Eljefe;
[Eset]Win32/Eljefe.10 trojan;
[McAfee]BackDoor-ACU;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program;
[Computer Associates]Backdoor/Troyaf.A

Eljefe indications of infection

This symptoms of Eljefe detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EVM Trojan Removal
VirTool.Win32.ShadowAdmin Trojan Symptoms
Bancos.IKV Trojan Removal
BA Trojan Cleaner
Removing Adware.Virtumundo Adware

Bancos.GHY Trojan

Bancos.GHY virus description
Technical details:
Categories: Trojan

Bancos.GHY indications of infection

This symptoms of Bancos.GHY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Antica Adware Cleaner
Antitime RAT Symptoms
BackWindows RAT Removal
Cellfree Trojan Removal instruction
Remove Augudor.Server Trojan

SubSeven.1C.Server Backdoor

SubSeven.1C.Server virus description
Technical details:
Categories: Backdoor
SubSeven.1C.Server Aliases:
[Computer Associates]Backdoor/SubSeven 1.1C Server

SubSeven.1C.Server indications of infection

This symptoms of SubSeven.1C.Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SillyDl.CJR Trojan
Bina Trojan Cleaner
Stardler Trojan Symptoms
kSite Trojan Information
SpywareSheriff.com::SpywareSheriff Adware Information

Redisin!Trojan Trojan

Redisin!Trojan virus description
Technical details:
Categories: Trojan

Redisin!Trojan indications of infection

This symptoms of Redisin!Trojan detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing PSW.Lmir Trojan
TServe Spyware Removal
Delf.eg Trojan Cleaner
Small.tf Trojan Cleaner
Remove Bancos.FTP Trojan

Punisher Trojan

Punisher virus description
Technical details:
Categories: Trojan

Punisher Folders:
[%PROGRAMS%]\AdwarePunisher
[%PROGRAM_FILES%]\AdwarePunisher

Punisher Files:
[%DESKTOP%]\AdwarePunisher.lnk
[%DESKTOP%]\AdwarePunisher.lnk

Punisher Registry Keys:
HKEY_CURRENT_USER\software\adwarepunisher
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\adwarepunisher

Punisher Registry Values:
HKEY_CURRENT_USER\software\borland\locales
HKEY_CURRENT_USER\software\borland\locales
HKEY_CURRENT_USER\software\borland\locales
HKEY_CURRENT_USER\software\borland\locales
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run


Punisher indications of infection

This symptoms of Punisher detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Lop.com.Active Spyware
AFA Internet Enhancement Adware Removal instruction
Clix0r.exe Trojan Information
Agent.dt Spyware Information
SillyDl.DEQ Downloader Removal instruction

Employee.Watcher Spyware

Employee.Watcher virus description
Technical details:
Categories: Spyware

Employee.Watcher Folders:
c:\windowsupdate\ufp\ew7

Employee.Watcher Registry Keys:
HKEY_CLASSES_ROOT\clsid\{0468c950-83e2-11d3-be51-00c0dfc2e32c}
HKEY_CLASSES_ROOT\clsid\{22b4c8f5-a686-42cc-8224-e4817445109f}
HKEY_CLASSES_ROOT\clsid\{8b8bb3a2-8576-11d3-be51-00c0dfc2e32c}
HKEY_CLASSES_ROOT\clsid\{de5c2449-65d5-4413-bfcf-6bfcdf294665}
HKEY_CLASSES_ROOT\interface\{0468c94f-83e2-11d3-be51-00c0dfc2e32c}
HKEY_CLASSES_ROOT\interface\{0468c951-83e2-11d3-be51-00c0dfc2e32c}
HKEY_CLASSES_ROOT\interface\{3e3621c0-8635-11d3-be51-00c0dfc2e32c}
HKEY_CLASSES_ROOT\interface\{8b8bb3a1-8576-11d3-be51-00c0dfc2e32c}
HKEY_CLASSES_ROOT\interface\{8b8bb3a3-8576-11d3-be51-00c0dfc2e32c}
HKEY_CLASSES_ROOT\interface\{ab14f05e-4c1d-49dc-8bd5-9e6b510b3eba}
HKEY_CLASSES_ROOT\interface\{b78b0e98-0431-4a6b-8c3d-f240fe8725f5}
HKEY_CLASSES_ROOT\interface\{d937a3c0-8634-11d3-be51-00c0dfc2e32c}
HKEY_CLASSES_ROOT\interface\{f7c1a3fa-c511-488a-b583-4f153b9368c4}
HKEY_CLASSES_ROOT\typelib\{0468c933-83e2-11d3-be51-00c0dfc2e32c}
HKEY_CLASSES_ROOT\typelib\{0468c941-83e2-11d3-be51-00c0dfc2e32c}
HKEY_CLASSES_ROOT\typelib\{1faa49c4-16b7-4d28-8930-31be1810d943}

Employee.Watcher Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Employee.Watcher indications of infection

This symptoms of Employee.Watcher detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Fucoudbg Trojan Cleaner
SillyDl.CGI Trojan Cleaner
Removing SubSeven.Stop RAT
Pigeon.BBV Trojan Cleaner
Remove Brave Sentry Ransomware

SillyDl.CJR Trojan

SillyDl.CJR virus description
Technical details:
Categories: Trojan

SillyDl.CJR indications of infection

This symptoms of SillyDl.CJR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
User32 Trojan Removal instruction
Dowque.AFC Trojan Cleaner
BAT.ZipBat Trojan Information
FakeSub7!Spy!Trojan Trojan Symptoms
HLLP.6248!Dropper Trojan Removal instruction

Java.ByteVerify.Tr Trojan

Java.ByteVerify.Tr virus description
Technical details:
Categories: Trojan,Hacker Tool
Java.ByteVerify.Tr Aliases:
[Kaspersky]Exploit.Java.Bytverify;
[Eset]Java/Exploit.Bytverify trojan;
[Computer Associates]Java.ByteVerify.exploit

Java.ByteVerify.Tr indications of infection

This symptoms of Java.ByteVerify.Tr detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Riphosk Trojan Information
Remove Portfu Trojan
Pigeon.AVPK Trojan Removal
Pigeon.BBG Trojan Removal instruction
Removing XCP.Sony.Rootkit.Patch Trojan

ICQ.Locked Trojan

ICQ.Locked virus description
Technical details:
Categories: Trojan

ICQ.Locked indications of infection

This symptoms of ICQ.Locked detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Telnet.Pro Backdoor Removal
Cuki Trojan Symptoms
PcShare RAT Removal
Removing Win32.Flooder.MailSpam.KagraTool DoS
Stealth.Keyboard.Interceptor.Auto.Sender Spyware Removal instruction

Small.dv Trojan

Small.dv virus description
Technical details:
Categories: Trojan

Small.dv Files:
[%SYSTEM%]\124499953.exe
[%SYSTEM%]\124562718.exe
[%SYSTEM%]\124566031.exe
[%SYSTEM%]\137719843.exe
[%SYSTEM%]\40752312.exe
[%SYSTEM%]\57830625.exe
[%SYSTEM%]\57892265.exe
[%SYSTEM%]\57895500.exe
[%SYSTEM%]\124499953.exe
[%SYSTEM%]\124562718.exe
[%SYSTEM%]\124566031.exe
[%SYSTEM%]\137719843.exe
[%SYSTEM%]\40752312.exe
[%SYSTEM%]\57830625.exe
[%SYSTEM%]\57892265.exe
[%SYSTEM%]\57895500.exe


Small.dv indications of infection

This symptoms of Small.dv detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GZO Trojan Cleaner
ValueAd Tracking Cookie Removal instruction
Anomaly Trojan Removal instruction
Removing CurePCSolution Adware
Zlob.DNS Changer Hijacker Removal

SubSeven.Stop RAT

SubSeven.Stop virus description
Technical details:
Categories: RAT

SubSeven.Stop indications of infection

This symptoms of SubSeven.Stop detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Girc Trojan Removal instruction
Removing XCP.Sony.Rootkit.Patch Trojan
Small.aph Downloader Cleaner
wp.pl Tracking Cookie Removal instruction
VB5.Jerkins Trojan Cleaner

Bancos.FZN Trojan

Bancos.FZN virus description
Technical details:
Categories: Trojan

Bancos.FZN indications of infection

This symptoms of Bancos.FZN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AHB Trojan Symptoms
Pigeon.AVKY Trojan Removal instruction
Removing Chaploit Trojan
valueclick.net Tracking Cookie Removal
Pigeon.EIV Trojan Removal instruction

SpyGator.pro Spyware

SpyGator.pro virus description
Technical details:
Categories: Spyware

SpyGator.pro Folders:
[%PROGRAMS%]\Thunder Technologies Inc. Software\Spy Gator Pro
[%PROGRAM_FILES%]\SGP

SpyGator.pro Files:
[%DESKTOP%]\Spy Gator Pro.lnk
[%WINDOWS%]\AOLPicEditor.exe
[%DESKTOP%]\Spy Gator Pro.lnk
[%WINDOWS%]\AOLPicEditor.exe

SpyGator.pro Registry Keys:
HKEY_CURRENT_USER\software\microsoft\installer\features\7c741c4b12d640a43a5fceb9bbb9650e
HKEY_CURRENT_USER\software\microsoft\installer\products\7c741c4b12d640a43a5fceb9bbb9650e
HKEY_CURRENT_USER\software\microsoft\installer\upgradecodes\bfb2faa0d27b30648814077fe5d071cb
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\menuorder\start menu2\programs\thunder technologies inc. software\spy gator pro
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{1e1b2879-88fa-11d3-8d96-d7acac95951a}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{b4c147c7-6d21-4a04-a3f5-ec9bbb9b56e0}
HKEY_LOCAL_MACHINE\software\thunder technologies inc.\spy gator pro

SpyGator.pro Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\folders
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\folders
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


SpyGator.pro indications of infection

This symptoms of SpyGator.pro detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SysInf Trojan
Removing Backwork Trojan
Removing Win32.Killav.bn Trojan
AdultId Adware Symptoms
FakeSub7!Spy!Trojan Trojan Information

VBS.Daydream Trojan

VBS.Daydream virus description
Technical details:
Categories: Trojan,Hacker Tool,DoS
VBS.Daydream Aliases:
[Panda]VBS/Dream.A,VBS/Phram.C;
[Computer Associates]VBS.Daydream,VBS.Walker.I

VBS.Daydream indications of infection

This symptoms of VBS.Daydream detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win.DelSys Trojan Removal
D86asm RAT Cleaner
Removing Basic.ICQ.Pager Trojan
The.History.of.Divine.Intervention Hacker Tool Removal
Small.tf Trojan Removal instruction

Backwork Trojan

Backwork virus description
Technical details:
Categories: Trojan

Backwork indications of infection

This symptoms of Backwork detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
NetKillx Backdoor Cleaner
Remove Systhread Trojan
Delf.dy Backdoor Symptoms
topping.com.ua Tracking Cookie Removal instruction
Windows.Activity.Logging.Interface Spyware Cleaner