SillyDl.CKO Trojan

SillyDl.CKO virus description
Technical details:
Categories: Trojan

SillyDl.CKO indications of infection

This symptoms of SillyDl.CKO detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Java.ByteVerify.Tr Trojan Removal
Remove Master Backdoor
Boys Trojan Removal instruction
Removing Vxidl.AWJ Trojan
Removing EZCyberSearch Adware

KillFiles.bx Trojan

KillFiles.bx virus description
Technical details:
Categories: Trojan,Hacker Tool
KillFiles.bx Aliases:
[Panda]Trojan Horse;
[Computer Associates]Win32/KillFiles.bx!Trojan

KillFiles.bx indications of infection

This symptoms of KillFiles.bx detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Queen.Hitman.Virus Hostile Code
Remove WordMacro.Barbaro Trojan
Vxidl.AEH Trojan Information
Bancos.GOR Trojan Information
Zonar Trojan Removal instruction

Win32.AdURL Adware

Win32.AdURL virus description
Technical details:
Categories: Adware

Win32.AdURL Files:
[%WINDOWS%]\icont.exe
[%DESKTOP%]\$25 free!.url
[%DESKTOP%]\discount travel specials.url
[%DESKTOP%]\free games - cash prizes.url
[%DESKTOP%]\instant love alert.url
[%WINDOWS%]\icont.exe
[%DESKTOP%]\$25 free!.url
[%DESKTOP%]\discount travel specials.url
[%DESKTOP%]\free games - cash prizes.url
[%DESKTOP%]\instant love alert.url


Win32.AdURL indications of infection

This symptoms of Win32.AdURL detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Scarab Trojan Cleaner
Removing Vxidl.AGW Trojan
Win32.Prosiak Trojan Removal
AsbMay Backdoor Information
Removing findthewebsiteyouneed.com Hijacker

VXPkg Trojan

VXPkg virus description
Technical details:
Categories: Trojan,Downloader

VXPkg indications of infection

This symptoms of VXPkg detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove PWS.Banker.gen.bu Trojan
Bancos.IKV Trojan Information
Remove SillyDl.DHF Trojan
Small.tf Trojan Symptoms
Removing Nfstrace Trojan

Tiny.stupid.dloader Trojan

Tiny.stupid.dloader virus description
Technical details:
Categories: Trojan

Tiny.stupid.dloader indications of infection

This symptoms of Tiny.stupid.dloader detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing CDNHelper Adware
Removing SpywareSheriff.com::SpywareSheriff Adware
Wotron.worm.kit Trojan Removal instruction
Remove AsbMay Backdoor
CurePCSolution Adware Cleaner

Falling.Star Backdoor

Falling.Star virus description
Technical details:
Categories: Backdoor,RAT
Falling.Star Aliases:
[Kaspersky]Backdoor.FallingDoor.138;
[Panda]Backdoor Program;
[Computer Associates]Backdoor/FallingDoor.138!Server

Falling.Star Files:
[%WINDOWS%]\system\exp1orer.exe
[%WINDOWS%]\system\w1dap32.dll
[%WINDOWS%]\system\exp1orer.exe
[%WINDOWS%]\system\w1dap32.dll


Falling.Star indications of infection

This symptoms of Falling.Star detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
JanNet Spyware Removal instruction
Removing BAT.MicroMac Trojan
SillyDl.DFR Trojan Symptoms
Win32.Sincom Trojan Cleaner
Pigeon.AWHR Trojan Cleaner

Ducalbill Trojan

Ducalbill virus description
Technical details:
Categories: Trojan

Ducalbill indications of infection

This symptoms of Ducalbill detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Diedix Trojan Symptoms
Cuki Trojan Symptoms
One.beta RAT Removal instruction
Registry Backdoor Cleaner
Vxidl.BGN Trojan Symptoms

Spector Trojan

Spector virus description
Technical details:
Categories: Trojan,Spyware
Spector Aliases:
[F-Prot]->\_INST32I.EX_;
[Panda]Trj/Spector;
[Computer Associates]Spector,Spector!Trojan

Spector Folders:
[%SYSTEM%]\netext

Spector Files:
[%PROGRAMS%]\spector\spector.lnk
[%SYSTEM%]\netknl.dll
[%SYSTEM%]\netknlhm.dll
[%SYSTEM%]\winnetcl.cnt
[%SYSTEM%]\winnetcl.exe
[%SYSTEM%]\winnetcl.hlp
[%SYSTEM%]\wswinntfp.exe
[%PROGRAMS%]\spector\spector.lnk
[%SYSTEM%]\netknl.dll
[%SYSTEM%]\netknlhm.dll
[%SYSTEM%]\winnetcl.cnt
[%SYSTEM%]\winnetcl.exe
[%SYSTEM%]\winnetcl.hlp
[%SYSTEM%]\wswinntfp.exe

Spector Registry Keys:
HKEY_CLASSES_ROOT\clsid\{58483a6f-ad93-4d13-a1e2-bcdac4a710a1}
HKEY_CLASSES_ROOT\mapiauthentication.addin
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\menuorder\start menu2\programs\spector


Spector indications of infection

This symptoms of Spector detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HNE Trojan Cleaner
Small.aph Downloader Information
Removing Vxidl.AXX Trojan
PSW.Lmir.fo Trojan Removal
Agent.dt Spyware Removal

Bancos.FXF Trojan

Bancos.FXF virus description
Technical details:
Categories: Trojan

Bancos.FXF indications of infection

This symptoms of Bancos.FXF detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.ZZR Trojan Removal instruction
Fucoudbg Trojan Removal
Jeemp Backdoor Cleaner
Removing Scarab Trojan
Fintlers Trojan Symptoms

Windows.Key.Analyst Trojan

Windows.Key.Analyst virus description
Technical details:
Categories: Trojan,Spyware
Windows.Key.Analyst Aliases:
[Kaspersky]TrojanSpy.Win32.KeyList;
[Panda]Trj/Spy.KeyList,Trojan Horse;
[Computer Associates]Win32/KeyList!Spy!Trojan

Windows.Key.Analyst indications of infection

This symptoms of Windows.Key.Analyst detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Antitime RAT Removal
Tetrinet.txt DoS Symptoms
Win32.Spy.KeyLogger Trojan Symptoms
SurfAccuracy Adware Information
Removing Boojum Trojan

Red.Swoosh Worm

Red.Swoosh virus description
Technical details:
Categories: Worm

Red.Swoosh indications of infection

This symptoms of Red.Swoosh detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.NetDown Trojan Removal
KBind Trojan Symptoms
Skiks Trojan Removal instruction
Remove Bancos.FZN Trojan
Ranky.aa Trojan Cleaner

YBomber DoS

YBomber virus description
Technical details:
Categories: DoS

YBomber indications of infection

This symptoms of YBomber detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Playboy Trojan Removal
Removing Bancos.FXV Trojan
ICQSpam Trojan Information
ANTIMAC Trojan Information
Tiso Trojan Cleaner

Bancos.HNE Trojan

Bancos.HNE virus description
Technical details:
Categories: Trojan

Bancos.HNE indications of infection

This symptoms of Bancos.HNE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Bancos.IEZ Trojan
ExPup Trojan Removal
Removing Win32.Mooder Trojan
Wotron.worm.kit Trojan Removal
Scynaud Trojan Symptoms

IstBar.az Downloader

IstBar.az virus description
Technical details:
Categories: Downloader

IstBar.az Files:
[%PROFILE%]\applic~1\micros~1\office\excel10.dll
[%PROFILE%]\applic~1\micros~1\office\excel10.dll


IstBar.az indications of infection

This symptoms of IstBar.az detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.APQ Trojan Removal
Removing Hornet Backdoor
Vxd.beep!Trojan Trojan Removal instruction
Wingate.Spoofing.On.IRC DoS Removal
Remove Backdoor.Phase Trojan

Bancos.IFE Trojan

Bancos.IFE virus description
Technical details:
Categories: Trojan

Bancos.IFE indications of infection

This symptoms of Bancos.IFE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
stockgroup.com Tracking Cookie Removal instruction
PolygoneZeichen Trojan Information
MalwarePro Ransomware Symptoms
Pigeon.ETO Trojan Information
SH.Mare Trojan Cleaner

Neoturk Backdoor

Neoturk virus description
Technical details:
Categories: Backdoor,RAT
Neoturk Aliases:
[Kaspersky]Backdoor.Neodurk.14,Backdoor.Neodurk.15.b;
[McAfee]BackDoor-AKG;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program,Bck/Neodurk.10_(670);
[Computer Associates]Win32.Neoturk.14,Win32/Neoturk.14!Trojan

Neoturk indications of infection

This symptoms of Neoturk detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
W16.WinVir.dr Trojan Information
WinPup32 Trojan Information
Removing Bancos.GOR Trojan
Bancos.DVN Trojan Information
LipGame Adware Information

FakeAlert.TrojanFactory Trojan

FakeAlert.TrojanFactory virus description
Technical details:
Categories: Trojan,Adware,Downloader
FakeAlert.TrojanFactory Aliases:
[Kaspersky]Hoax.Win32.Renos.dm;
[Other]Directrevenue-abetterinternet

FakeAlert.TrojanFactory Files:
[%SYSTEM%]\qjrkvy.exe
[%SYSTEM%]\users32.exe
[%SYSTEM%]\winflash.dll
[%SYSTEM%]\qjrkvy.exe
[%SYSTEM%]\users32.exe
[%SYSTEM%]\winflash.dll

FakeAlert.TrojanFactory Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{60e2e76b-60e2e76b-60e2e76b-60e2e76b-60e2e76b}
HKEY_CLASSES_ROOT\clsid\{60e2e76b-60e2e76b-60e2e76b-60e2e76b-60e2e76b}


FakeAlert.TrojanFactory indications of infection

This symptoms of FakeAlert.TrojanFactory detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Downloader.AUE.dll Trojan Cleaner
topping.com.ua Tracking Cookie Cleaner
QQThief Trojan Cleaner
SillyDl.DAV Trojan Information
QB2C.Fly Trojan Removal

Kalah Trojan

Kalah virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Kalah Aliases:
[Kaspersky]Vdv.390;
[Panda]Kalah.390.A;
[Computer Associates]Kalah

Kalah indications of infection

This symptoms of Kalah detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Slashes Trojan Removal
Removing Win32.Memleak Trojan
TrojanDownloader.Win32.Tibser Adware Cleaner
Bancos.HCT Trojan Cleaner
Pigeon.ETO Trojan Removal instruction

IRC.Logger Spyware

IRC.Logger virus description
Technical details:
Categories: Spyware

IRC.Logger Folders:
[%PROGRAMS%]\spyarsenal irc logger
[%SYSTEM%]\csvdei

IRC.Logger Files:
[%DESKTOP%]\spyarsenal irc logger.lnk
[%DESKTOP%]\spyarsenal irc logger.lnk

IRC.Logger Registry Keys:
HKEY_LOCAL_MACHINE\software\kmint21\irc logger
HKEY_LOCAL_MACHINE\software\kmint21\spyarsenal-irc-logger
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\spyarsenal-irc-logger


IRC.Logger indications of infection

This symptoms of IRC.Logger detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
JanNet Spyware Information
SubSeven.1C.Server Backdoor Symptoms
Removing Bancos.GBI Trojan
Wingate.Spoofing.On.IRC DoS Removal instruction
MH Trojan Removal

PSW.Lmir.fo Trojan

PSW.Lmir.fo virus description
Technical details:
Categories: Trojan,Hacker Tool
PSW.Lmir.fo Aliases:
[Panda]Trojan Horse

PSW.Lmir.fo indications of infection

This symptoms of PSW.Lmir.fo detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PSW.Lmir Trojan Symptoms
Remove TServe Spyware
Pigeon.EYX Trojan Removal
PWS.Ghost Trojan Symptoms
Remove Win32.KillFiles.bm Trojan

Pigeon.FAR Trojan

Pigeon.FAR virus description
Technical details:
Categories: Trojan

Pigeon.FAR indications of infection

This symptoms of Pigeon.FAR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VirTool.Win32.ShadowAdmin Trojan Symptoms
VB.mx Trojan Information
One.beta RAT Removal instruction
SpyGator.pro Spyware Removal
Remove Vxidl.AYX Trojan

SillyDl.CGZ Trojan

SillyDl.CGZ virus description
Technical details:
Categories: Trojan

SillyDl.CGZ indications of infection

This symptoms of SillyDl.CGZ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.BBG Trojan Symptoms
PcShare RAT Removal instruction
Remove Family.Key.Logger Spyware
Bancos.GHY Trojan Cleaner
Remove Win16.AddUser Trojan

Pigeon.AVFU Trojan

Pigeon.AVFU virus description
Technical details:
Categories: Trojan

Pigeon.AVFU indications of infection

This symptoms of Pigeon.AVFU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pohlup Trojan Removal
Removing Girc Trojan
Removing Revealer.Free.Edition Spyware
Delf.eg Trojan Symptoms
Bancos.GZO Trojan Removal