VB.aoh Trojan

VB.aoh virus description
Technical details:
Categories: Trojan

VB.aoh indications of infection

This symptoms of VB.aoh detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SillyDl.DEQ Downloader
Removing Pigeon.EVN Trojan
PrankMaster Trojan Information
Remove Lazy Trojan
Win32.ReverseTrojan Trojan Removal instruction

Racchel Trojan

Racchel virus description
Technical details:
Categories: Trojan

Racchel indications of infection

This symptoms of Racchel detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
InCommand.67b Backdoor Removal instruction
Wollf Trojan Symptoms
Remove TrojanSpy.Win32.Sincom.bk Trojan
Removing SillyDl.BZG Trojan
Remove Bancos.FZN Trojan

ClientMan.bho2 BHO

ClientMan.bho2 virus description
Technical details:
Categories: BHO

ClientMan.bho2 indications of infection

This symptoms of ClientMan.bho2 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PePatch.dk Spyware Removal
Banker.COJ Trojan Removal
Remove NeverEnd Trojan
AudioDoor Trojan Symptoms
Bancos.GHY Trojan Symptoms

C513 Trojan

C513 virus description
Technical details:
Categories: Trojan,Hacker Tool
C513 Aliases:
[Kaspersky]ExeBug.h,Trojan.ExeBug;
[Panda]Trj/Exebug,Trojan Horse;
[Computer Associates]C513,Exebug,Kill.HDS!Trojan

C513 indications of infection

This symptoms of C513 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
W95.Ilmx Trojan Removal
Bancos.HWN Trojan Cleaner
Ranky.aa Trojan Cleaner
PC.Eyes Spyware Cleaner
Removing Basic.ICQ.Pager Trojan

SurfAccuracy Adware

SurfAccuracy virus description
Technical details:
Categories: Adware,Downloader
SurfAccuracy Aliases:
[Kaspersky]Trojan-Downloader.Win32.IstBar.oz,AdWare.Win32.SurfAccuracy.d;
[Other]Win32/SurfAccuracy.CFX,Adware.SurfAccuracy

SurfAccuracy Folders:
[%PROGRAM_FILES%]\surfaccuracy

SurfAccuracy Files:
[%PROFILE_TEMP%]\ffcomponent.prod.v1000001.09fev2007.dll.d30d4a1b47483ec718ea41c66a8491c8
[%PROFILE_TEMP%]\SAcc.prod.v1148.01fev2006.exe.b27601ab4bce8e2f4658d8177fdb3ecf
[%PROFILE_TEMP%]\SAcc.prod.v1190.15fev2007.exe.acdec9dc7509ffcd5aeeb1e6095ec5b5
[%PROFILE_TEMP%]\uninstall.exe
[%PROFILE_TEMP%]\updater.exe
[%PROFILE_TEMP%]\updater.prod.V101168.04avr2007.exe.065faba332214522c7e10197726c0106
[%PROFILE_TEMP%]\updater.prod.V101168.18jan2007.exe.065faba332214522c7e10197726c0106
[%PROFILE_TEMP%]\updater.prod.V101168.26jan2007.exe.065faba332214522c7e10197726c0106
[%PROGRAM_FILES%]\Mozilla Firefox\components\ffcomponent.dll
[%PROGRAM_FILES%]\SurfAccuracy\SAcc.exe
[%WINDOWS%]\iwkyaenp.exe
[%PROFILE_TEMP%]\ffcomponent.prod.v1000001.09fev2007.dll.d30d4a1b47483ec718ea41c66a8491c8
[%PROFILE_TEMP%]\SAcc.prod.v1148.01fev2006.exe.b27601ab4bce8e2f4658d8177fdb3ecf
[%PROFILE_TEMP%]\SAcc.prod.v1190.15fev2007.exe.acdec9dc7509ffcd5aeeb1e6095ec5b5
[%PROFILE_TEMP%]\uninstall.exe
[%PROFILE_TEMP%]\updater.exe
[%PROFILE_TEMP%]\updater.prod.V101168.04avr2007.exe.065faba332214522c7e10197726c0106
[%PROFILE_TEMP%]\updater.prod.V101168.18jan2007.exe.065faba332214522c7e10197726c0106
[%PROFILE_TEMP%]\updater.prod.V101168.26jan2007.exe.065faba332214522c7e10197726c0106
[%PROGRAM_FILES%]\Mozilla Firefox\components\ffcomponent.dll
[%PROGRAM_FILES%]\SurfAccuracy\SAcc.exe
[%WINDOWS%]\iwkyaenp.exe

SurfAccuracy Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\sacc
HKEY_LOCAL_MACHINE\software\sacc

SurfAccuracy Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


SurfAccuracy indications of infection

This symptoms of SurfAccuracy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Coced Trojan Information
valueclick.net Tracking Cookie Removal
Delf.eg Trojan Removal
Backdoor.TheMovie Trojan Symptoms
Backdoor.Phase Trojan Symptoms

CDNHelper Adware

CDNHelper virus description
Technical details:
Categories: Adware

CDNHelper Folders:
[%PROGRAMS%]\cdnClient

CDNHelper Files:
[%PROFILE_TEMP%]\2\cnrbtn.html
[%PROFILE_TEMP%]\311\cnrbtn.html
[%PROFILE_TEMP%]\31\cnrbtn.html
[%PROFILE_TEMP%]\3B\cnrbtn.html
[%PROFILE_TEMP%]\3\cnrbtn.html
[%PROFILE_TEMP%]\C\cnrbtn.html
[%PROFILE_TEMP%]\setup\cdn.dll
[%PROFILE_TEMP%]\setup\CdnAux.dll
[%PROFILE_TEMP%]\setup\CdnIEHlp.dll
[%PROFILE_TEMP%]\setup\cdntran.dat
[%PROGRAM_FILES%]\OCINS\cnrbtn.html
[%SYSTEM%]\zunins.exe
[%DESKTOP%]\IdnMail.lnk
[%PROFILE_TEMP%]\1C\cdn.dll
[%PROFILE_TEMP%]\1C\cdnaux.dll
[%PROFILE_TEMP%]\1C\cdnforie.dll
[%PROFILE_TEMP%]\1C\cdnins.dll
[%PROFILE_TEMP%]\1C\cdnprh.dll
[%PROFILE_TEMP%]\1C\cdnprot.dat
[%PROFILE_TEMP%]\1C\cdnprot.sys
[%PROFILE_TEMP%]\1C\cdnunins.exe
[%PROFILE_TEMP%]\1C\cdnup.exe
[%PROFILE_TEMP%]\1C\cdnvers.dat
[%PROFILE_TEMP%]\1C\idnconvs.dll
[%PROFILE_TEMP%]\cdndisp.tmp
[%PROFILE_TEMP%]\setup\AHOOK9X.DAT
[%PROFILE_TEMP%]\setup\AHOOKNT.DAT
[%PROFILE_TEMP%]\setup\capp.exe
[%PROFILE_TEMP%]\setup\character.dat
[%PROFILE_TEMP%]\setup\clean.exe
[%PROFILE_TEMP%]\setup\CodeLib.dll
[%PROFILE_TEMP%]\setup\hookdll.dll
[%PROFILE_TEMP%]\setup\IdnMail.exe
[%PROFILE_TEMP%]\setup\idnoe.dll
[%PROFILE_TEMP%]\setup\idnol.dll
[%PROFILE_TEMP%]\setup\zconfig.dat
[%PROFILE_TEMP%]\setup\zunins.exe
[%PROFILE_TEMP%]\setup\zver.dat
[%SYSTEM%]\capp.exe
[%SYSTEM%]\cdn.dll
[%SYSTEM%]\CdnAux.dll
[%SYSTEM%]\CdnIEHlp.dll
[%SYSTEM%]\character.dat
[%SYSTEM%]\IdnMail.exe
[%SYSTEM%]\idnoe.dll
[%SYSTEM%]\idnol.dll
[%SYSTEM%]\ZUpdate\zver.dat
[%SYSTEM%]\ZW.exe
[%PROFILE_TEMP%]\2\cnrbtn.html
[%PROFILE_TEMP%]\311\cnrbtn.html
[%PROFILE_TEMP%]\31\cnrbtn.html
[%PROFILE_TEMP%]\3B\cnrbtn.html
[%PROFILE_TEMP%]\3\cnrbtn.html
[%PROFILE_TEMP%]\C\cnrbtn.html
[%PROFILE_TEMP%]\setup\cdn.dll
[%PROFILE_TEMP%]\setup\CdnAux.dll
[%PROFILE_TEMP%]\setup\CdnIEHlp.dll
[%PROFILE_TEMP%]\setup\cdntran.dat
[%PROGRAM_FILES%]\OCINS\cnrbtn.html
[%SYSTEM%]\zunins.exe
[%DESKTOP%]\IdnMail.lnk
[%PROFILE_TEMP%]\1C\cdn.dll
[%PROFILE_TEMP%]\1C\cdnaux.dll
[%PROFILE_TEMP%]\1C\cdnforie.dll
[%PROFILE_TEMP%]\1C\cdnins.dll
[%PROFILE_TEMP%]\1C\cdnprh.dll
[%PROFILE_TEMP%]\1C\cdnprot.dat
[%PROFILE_TEMP%]\1C\cdnprot.sys
[%PROFILE_TEMP%]\1C\cdnunins.exe
[%PROFILE_TEMP%]\1C\cdnup.exe
[%PROFILE_TEMP%]\1C\cdnvers.dat
[%PROFILE_TEMP%]\1C\idnconvs.dll
[%PROFILE_TEMP%]\cdndisp.tmp
[%PROFILE_TEMP%]\setup\AHOOK9X.DAT
[%PROFILE_TEMP%]\setup\AHOOKNT.DAT
[%PROFILE_TEMP%]\setup\capp.exe
[%PROFILE_TEMP%]\setup\character.dat
[%PROFILE_TEMP%]\setup\clean.exe
[%PROFILE_TEMP%]\setup\CodeLib.dll
[%PROFILE_TEMP%]\setup\hookdll.dll
[%PROFILE_TEMP%]\setup\IdnMail.exe
[%PROFILE_TEMP%]\setup\idnoe.dll
[%PROFILE_TEMP%]\setup\idnol.dll
[%PROFILE_TEMP%]\setup\zconfig.dat
[%PROFILE_TEMP%]\setup\zunins.exe
[%PROFILE_TEMP%]\setup\zver.dat
[%SYSTEM%]\capp.exe
[%SYSTEM%]\cdn.dll
[%SYSTEM%]\CdnAux.dll
[%SYSTEM%]\CdnIEHlp.dll
[%SYSTEM%]\character.dat
[%SYSTEM%]\IdnMail.exe
[%SYSTEM%]\idnoe.dll
[%SYSTEM%]\idnol.dll
[%SYSTEM%]\ZUpdate\zver.dat
[%SYSTEM%]\ZW.exe

CDNHelper Registry Keys:
HKEY_CLASSES_ROOT\cdnforie.iehlprobj
HKEY_CLASSES_ROOT\cdnforie.iehlprobj.1
HKEY_CLASSES_ROOT\CLSID\{5C3853CF-C7E0-4946-B3FA-1ABDB6F48108}
HKEY_CLASSES_ROOT\clsid\{8cdcbba0-4be1-4199-8389-1b19ed41d3e8}
HKEY_CLASSES_ROOT\CLSID\{F5824EFB-728A-4726-A5A5-85A68B20EDC3}
HKEY_CLASSES_ROOT\interface\{5c3853cd-c7e0-4946-b3fa-1abdb6f48108}
HKEY_CLASSES_ROOT\interface\{9c991f1e-d6fe-4b74-b6ec-763ff528fae1}
HKEY_CLASSES_ROOT\interface\{f248ebab-d894-4682-80e3-f48aabf4b12d}
HKEY_CLASSES_ROOT\typelib\{5c3853ce-c7e0-4946-b3fa-1abdb6f48108}
HKEY_CLASSES_ROOT\typelib\{df571585-070d-4eb1-8b0e-99023f934fd4}
HKEY_CLASSES_ROOT\wmhlpr.wmevtsink
HKEY_CLASSES_ROOT\wmhlpr.wmevtsink.1
HKEY_CLASSES_ROOT\wmhlpr.wmhlprobj
HKEY_CLASSES_ROOT\wmhlpr.wmhlprobj.1
HKEY_LOCAL_MACHINE\software\cnnic
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Extensions\{5C3853CF-C7E0-4946-B3FA-1ABDB6F48108}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5C3853CF-C7E0-4946-B3FA-1ABDB6F48108}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F5824EFB-728A-4726-A5A5-85A68B20EDC3}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\cdnclient
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\cdnprot
HKEY_CLASSES_ROOT\clsid\{35980f6e-a137-4e50-953d-813bb8556899}
HKEY_CLASSES_ROOT\clsid\{461a86f7-a29d-460a-80d5-52979aa6c46d}
HKEY_CLASSES_ROOT\clsid\{5c3853cf-c7e0-4946-b3fa-1abdb6f48108}
HKEY_CLASSES_ROOT\clsid\{9a578c98-3c2f-4630-890b-fc04196ef420}
HKEY_CLASSES_ROOT\clsid\{f5824efb-728a-4726-a5a5-85a68b20edc3}
HKEY_CLASSES_ROOT\cndniehelper.cndniehlprobj
HKEY_CLASSES_ROOT\interface\{475abcc3-d4cf-45d2-938a-a434fdc95b67}
HKEY_CLASSES_ROOT\interface\{951a869a-1003-4897-948f-d55e570871db}
HKEY_CLASSES_ROOT\interface\{bf0a2eb3-0704-45c6-90f4-9ebb1deb57fd}
HKEY_CLASSES_ROOT\mailparsersvr.inspectorhandler
HKEY_CLASSES_ROOT\mailparsersvr.mailparser
HKEY_CLASSES_ROOT\typelib\{01833110-7c51-4d41-a09f-69ef74606e5b}
HKEY_CLASSES_ROOT\typelib\{c24a5a5c-0874-4386-85c7-e669f90997a9}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\extensions\{5c3853cf-c7e0-4946-b3fa-1abdb6f48108}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{35980f6e-a137-4e50-953d-813bb8556899}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{5c3853cf-c7e0-4946-b3fa-1abdb6f48108}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{f5824efb-728a-4726-a5a5-85a68b20edc3}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\cdn
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\cdntran

CDNHelper Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\extensions\cmdmapping
HKEY_CURRENT_USER\software\microsoft\internet explorer\extensions\cmdmapping
HKEY_CURRENT_USER\software\microsoft\internet explorer\extensions\cmdmapping
HKEY_CURRENT_USER\software\microsoft\internet explorer\extensions\cmdmapping
HKEY_CURRENT_USER\software\microsoft\internet explorer\extensions\cmdmapping
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\internet explorer\extensions\cmdmapping
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonce


CDNHelper indications of infection

This symptoms of CDNHelper detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
InCommand.67b Backdoor Removal instruction
Light.Boot.dr!Dropper Trojan Information
Removing Focalink.com Tracking Cookie
Removing Punisher Trojan
SysInf Trojan Removal instruction

Diedix Trojan

Diedix virus description
Technical details:
Categories: Trojan,Backdoor,Hijacker
Diedix Aliases:
[Panda]Trj/Moninco.A;
[Computer Associates]Win32.Diedix,Win32.Diedix.B,Win32.Diedix.C,Win32/Diedix.A!DLL!Trojan,Win32/Diedix.A.Sys!Trojan,Win32/Diedix.B!DLL!Trojan,Win32/Diedix.C.DLL.Trojan,Win32/Diedix.C.Sys.Trojan,Win32/Diedix.D!DLL!Trojan,Win32.Diedix.A

Diedix indications of infection

This symptoms of Diedix detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.EIV Trojan
User32 Trojan Symptoms
SillyDl.CJR Trojan Information
XCP.Sony.Rootkit.Patch Trojan Cleaner
Fintlers Trojan Information

Awoi Trojan

Awoi virus description
Technical details:
Categories: Trojan,Hacker Tool
Awoi Aliases:
[Kaspersky]Trojan.Win32.Joiner;
[McAfee]Awoi;
[F-Prot]destructive program,security risk or a "backdoor" program;
[Panda]Trojan Horse.LC,Trojan Horse;
[Computer Associates]Win32.Joiner.AB,Win32/D82!Joiner

Awoi indications of infection

This symptoms of Awoi detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HHH Trojan Removal
Apdoor.cr Backdoor Symptoms
Removing SysInf Trojan
FukMSFTP DoS Symptoms
Dowque.ABW Trojan Cleaner

PC.Eyes Spyware

PC.Eyes virus description
Technical details:
Categories: Spyware

PC.Eyes indications of infection

This symptoms of PC.Eyes detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Sandradoor.Server Trojan Cleaner
FTPAttack Trojan Information
PWS.Ghost Trojan Removal
Remove VB5.Jerkins Trojan
Removing Lazy Trojan

SearchSquire Adware

SearchSquire virus description
Technical details:
Categories: Adware

SearchSquire Files:
[%PROFILE_TEMP%]\b103.exe
[%WINDOWS%]\b103.exe
[%WINDOWS%]\Temp\b103.exe
[%PROFILE_TEMP%]\b103.exe
[%WINDOWS%]\b103.exe
[%WINDOWS%]\Temp\b103.exe


SearchSquire indications of infection

This symptoms of SearchSquire detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove PSW.Lmir Trojan
Playboy Trojan Removal
Bancos.GZO Trojan Removal
Pigeon.BBV Trojan Information
Remove HeyItsMe Trojan

Pigeon.ACL Trojan

Pigeon.ACL virus description
Technical details:
Categories: Trojan

Pigeon.ACL indications of infection

This symptoms of Pigeon.ACL detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.IKV Trojan Symptoms
Dowque.AFC Trojan Cleaner
Win32.CybWar DoS Removal
Backdoor.Zombam Trojan Removal instruction
Mycooldoor Trojan Cleaner

SillyDl.DPA Trojan

SillyDl.DPA virus description
Technical details:
Categories: Trojan

SillyDl.DPA indications of infection

This symptoms of SillyDl.DPA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Backdoor.Zombam Trojan
SillyDl.CDL Trojan Removal
Pigeon.AXH Trojan Removal
Pigeon.EVM Trojan Cleaner
Zlob.Fam.SoftCodec Trojan Cleaner

Bancos.FXV Trojan

Bancos.FXV virus description
Technical details:
Categories: Trojan

Bancos.FXV indications of infection

This symptoms of Bancos.FXV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Telnet.Pro Backdoor
SillyDl.CDL Trojan Removal instruction
Removing RemoteIsProgramRunning RAT
Remove Doped Backdoor
SillyDl.BZG Trojan Symptoms

Banhosts Hijacker

Banhosts virus description
Technical details:
Categories: Hijacker

Banhosts indications of infection

This symptoms of Banhosts detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bina Trojan Information
Remove Stealth.Keyboard.Interceptor.Auto.Sender Spyware
Win32.CybWar DoS Removal instruction
Remove JS.Wonka Hostile Code
Remove Augudor.Server Trojan

SillyDl.CSI Trojan

SillyDl.CSI virus description
Technical details:
Categories: Trojan

SillyDl.CSI indications of infection

This symptoms of SillyDl.CSI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.VB.bs Trojan Symptoms
Vxidl.AAJ Trojan Removal instruction
Lemir.ci Trojan Symptoms
Vxidl.AJU Trojan Information
Remove KBind Trojan

Webroot Trojan

Webroot virus description
Technical details:
Categories: Trojan

Webroot indications of infection

This symptoms of Webroot detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Riphosk Trojan
Remove Win32.ReverseTrojan Trojan
Master Backdoor Symptoms
Pigeon.AVSM Trojan Symptoms
TServe Spyware Symptoms

Hornet Backdoor

Hornet virus description
Technical details:
Categories: Backdoor,RAT
Hornet Aliases:
[Kaspersky]Backdoor.Hornet.10;
[Panda]Backdoor Program,Bck/Hornet.10;
[Computer Associates]Backdoor/Hornet.10,Backdoor/Hornet.10!Client,Backdoor/Hornet.10!Downloader,Backdoor/Hornet.10!EditServer,Win32.Hornet.10,Win32/Hornet.10.IRC!Trojan

Hornet Files:
[%WINDOWS%]\active.exe
[%WINDOWS%]\active.exe


Hornet indications of infection

This symptoms of Hornet detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Jeemp Backdoor Removal instruction
Removing Bancos.HAP Trojan
TrojanSpy.Win32.Sincom.bk Trojan Cleaner
Vxidl.AAJ Trojan Cleaner
Bancos.GZO Trojan Symptoms

Vxd.beep!Trojan Trojan

Vxd.beep!Trojan virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Vxd.beep!Trojan Aliases:
[Kaspersky]Trojan.VXD_Beep;
[Panda]Trj/VXD_Beep

Vxd.beep!Trojan indications of infection

This symptoms of Vxd.beep!Trojan detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win.DelSys Trojan Cleaner
Win32.NetDown Trojan Cleaner
Remove Vxidl.AMJ Trojan
SillyDl.DAK Trojan Information
PWS.Banker.gen.bu Trojan Information

Sandradoor.Server Trojan

Sandradoor.Server virus description
Technical details:
Categories: Trojan,Backdoor
Sandradoor.Server Aliases:
[Eset]Win32/Delf.GV trojan;
[Computer Associates]Backdoor/Sandradoor.Server,Win32.Sandra.11.A

Sandradoor.Server indications of infection

This symptoms of Sandradoor.Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
FortuneCity.com Tracking Cookie Information
Systhread Trojan Information
Remove PrankMaster Trojan
Banker.COJ Trojan Removal
Tfn2Kpass DoS Removal

Win32.VB.cr Trojan

Win32.VB.cr virus description
Technical details:
Categories: Trojan

Win32.VB.cr indications of infection

This symptoms of Win32.VB.cr detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Clix0r.exe Trojan Cleaner
Removing Chaploit Trojan
Delf.dy Backdoor Cleaner
FukMSFTP DoS Information
Remove Stealth.Eye.New.Cam.Viewer RAT

ScreenGrab RAT

ScreenGrab virus description
Technical details:
Categories: RAT

ScreenGrab indications of infection

This symptoms of ScreenGrab detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Sheep.Goat Backdoor Removal instruction
Nobof Trojan Symptoms
Win32.Killav.bn Trojan Removal instruction
Zlob.Fam.SoftCodec Trojan Removal
SillyDl.CZP Trojan Cleaner