SilentSudokuInstaller Trojan

SilentSudokuInstaller virus description
Technical details:
Categories: Trojan

SilentSudokuInstaller indications of infection

This symptoms of SilentSudokuInstaller detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.ZZX Trojan Cleaner
Sandradoor.Server Trojan Removal instruction
EZCyberSearch Adware Information
Bancos.HAP Trojan Cleaner
Zonar Trojan Information

Bancos.GMY Trojan

Bancos.GMY virus description
Technical details:
Categories: Trojan

Bancos.GMY indications of infection

This symptoms of Bancos.GMY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PWS.Ghost Trojan Cleaner
Delf.DZX Trojan Symptoms
Remove SillyDl.CIX Trojan
Removing PWS.Banker.gen.bu Trojan
Bancos.FTP Trojan Symptoms

PokaPoka Trojan

PokaPoka virus description
Technical details:
Categories: Trojan

PokaPoka indications of infection

This symptoms of PokaPoka detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Mooder Trojan Cleaner
Remove Lemir.ci Trojan
Focalink.com Tracking Cookie Information
Small.dv Trojan Symptoms
Removing Del Trojan

TrojanDropper.Win32.Joiner Trojan

TrojanDropper.Win32.Joiner virus description
Technical details:
Categories: Trojan
TrojanDropper.Win32.Joiner Aliases:
[Panda]Trojan Horse

TrojanDropper.Win32.Joiner indications of infection

This symptoms of TrojanDropper.Win32.Joiner detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
RemoteIsProgramRunning RAT Removal
SillyDl.ABK Trojan Cleaner
Remove Bancos.HPQ Trojan
Punisher Trojan Removal instruction
Removing FukMSFTP DoS

Web.Specials Adware

Web.Specials virus description
Technical details:
Categories: Adware

Web.Specials Folders:
[%PROGRAM_FILES%]\webspecials

Web.Specials Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Web.Specials indications of infection

This symptoms of Web.Specials detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.DHF Trojan Symptoms
Matcash.dll Trojan Symptoms
Remove QQThief Trojan
Removing VB.eo Backdoor
Webserver.Lite RAT Removal instruction

Hackarmy.Server Trojan

Hackarmy.Server virus description
Technical details:
Categories: Trojan,Backdoor
Hackarmy.Server Aliases:
[Eset]Win32/Hackarmy.B trojan;
[Computer Associates]Backdoor/Hackarmy.b.Server

Hackarmy.Server indications of infection

This symptoms of Hackarmy.Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
JurikSoft.Remote.Control.Tools RAT Information
Remove Downloader.AUE.dll Trojan
PolygoneZeichen Trojan Removal
Removing Pigeon.EYX Trojan
Pigeon.AVSM Trojan Symptoms

SubSeven.deutsch Backdoor

SubSeven.deutsch virus description
Technical details:
Categories: Backdoor,RAT
SubSeven.deutsch Aliases:
[Kaspersky]Backdoor.SubSeven.213;
[McAfee]BackDoor-Sub7;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program

SubSeven.deutsch indications of infection

This symptoms of SubSeven.deutsch detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.FAR Trojan Removal
VB.ny Backdoor Removal
Bancos.ZZR Trojan Removal instruction
Apdoor.cr Backdoor Symptoms
Diedix Trojan Removal instruction

Urlsnuff DoS

Urlsnuff virus description
Technical details:
Categories: DoS

Urlsnuff indications of infection

This symptoms of Urlsnuff detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AHB Trojan Removal instruction
FakeAlert.TrojanFactory Trojan Removal instruction
FavoriteMan BHO Cleaner
CDOpen Trojan Removal instruction
Removing XCP.Sony.Rootkit.Patch Trojan

Readdev DoS

Readdev virus description
Technical details:
Categories: DoS

Readdev indications of infection

This symptoms of Readdev detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanDownloader.Win32.Tooncom Trojan Removal
SurfAccuracy Adware Removal instruction
Removing DAS.Boot Trojan
SillyDl.CUM Trojan Removal instruction
Remove AdultId Adware

Banker.cn Spyware

Banker.cn virus description
Technical details:
Categories: Spyware

Banker.cn Files:
[%WINDOWS%]\mct.sys
[%WINDOWS%]\sct.sys
[%WINDOWS%]\win.txt
[%WINDOWS%]\wini.sys
[%WINDOWS%]\mct.sys
[%WINDOWS%]\sct.sys
[%WINDOWS%]\win.txt
[%WINDOWS%]\wini.sys

Banker.cn Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Banker.cn indications of infection

This symptoms of Banker.cn detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Del Trojan Removal
Removing Squatter Trojan
ICQ.Locked Trojan Removal
Remove Win32.CybWar DoS
Removing Backdoor.Konik Trojan

Golden.Keylogger Spyware

Golden.Keylogger virus description
Technical details:
Categories: Spyware

Golden.Keylogger Folders:
[%PROGRAMS%]\golden keylogger
[%SYSTEM%]\wsg32

Golden.Keylogger Files:
[%PROFILE_TEMP%]\Temporary Directory 2 for familykeylogger.zip\GoldenKeylogger-setup.exe
[%SYSTEM%]\system.dag
[%PROFILE_TEMP%]\Temporary Directory 2 for familykeylogger.zip\GoldenKeylogger-setup.exe
[%SYSTEM%]\system.dag

Golden.Keylogger Registry Keys:
HKEY_LOCAL_MACHINE\software\kmint21\goldenkeylogger
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\goldenkeylogger

Golden.Keylogger Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Golden.Keylogger indications of infection

This symptoms of Golden.Keylogger detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
NPK.A!config Trojan Information
Clix0r.exe Trojan Symptoms
Vxidl.AEH Trojan Symptoms
Remove Pigeon.AVKZ Trojan
Microsoft.Media.Server.Denial.of.Service.Attack DoS Cleaner

SpyArsenal.ICQ.Logger Spyware

SpyArsenal.ICQ.Logger virus description
Technical details:
Categories: Spyware

SpyArsenal.ICQ.Logger Folders:
[%PROGRAMS%]\spyarsenal icq logger
[%SYSTEM%]\csvdeq

SpyArsenal.ICQ.Logger Files:
[%DESKTOP%]\spyarsenal icq logger.lnk
[%SYSTEM%]\admparseq.dll
[%DESKTOP%]\spyarsenal icq logger.lnk
[%SYSTEM%]\admparseq.dll

SpyArsenal.ICQ.Logger Registry Keys:
HKEY_LOCAL_MACHINE\software\kmint21\spyarsenal-icq-logger
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\spyarsenal-icq-logger

SpyArsenal.ICQ.Logger Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


SpyArsenal.ICQ.Logger indications of infection

This symptoms of SpyArsenal.ICQ.Logger detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win.DelSys Trojan Information
Removing RemoteSOB Backdoor
Pigeon.AVKY Trojan Removal instruction
Remove SillyDl.DPA Trojan
User32 Trojan Information

JurikSoft.Remote.Control.Tools RAT

JurikSoft.Remote.Control.Tools virus description
Technical details:
Categories: RAT

JurikSoft.Remote.Control.Tools indications of infection

This symptoms of JurikSoft.Remote.Control.Tools detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
BookedSpace.Remanent BHO Information
Spam.AnonMail Trojan Symptoms
Bancos.HPZ Trojan Removal
Removing PSW.Jammer Trojan
NetNucleus BHO Symptoms

Deception Trojan

Deception virus description
Technical details:
Categories: Trojan,Backdoor,Hacker Tool
Deception Aliases:
[Kaspersky]TrojanDropper.Win32.Decept.10,TrojanDropper.Win32.Decept.20.a,TrojanDropper.Win32.Decept.20.b,TrojanDropper.Win32.Decept.30.a;
[Panda]Trojan Horse,Trojan Horse.LC,Trj/W32.Decept;
[Computer Associates]Backdoor/Deception.10,Win32.Deception.10,Backdoor/Deception.20.B,Win32.Deception.20.B,Backdoor/Deception.20,Win32.Deception.20,Win32/Decept.10!Dropper,Backdoor/Deception.30.A,Win32.Deception.30,Backdoor/Deception.21.B,Win32.Deception.21.B,Backdoor/Deception.21,Win32.Deception.21

Deception indications of infection

This symptoms of Deception detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
NetKillx Backdoor Removal instruction
Pigeon.ARI Trojan Cleaner
Bancos.GCI Trojan Removal instruction
Zhongsou Adware Removal instruction
Lemir.ci Trojan Symptoms

Delf.DZX Trojan

Delf.DZX virus description
Technical details:
Categories: Trojan

Delf.DZX indications of infection

This symptoms of Delf.DZX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.AVKY Trojan
Pigeon.EVM Trojan Removal instruction
Remove XXX.ToolBar Trojan
Findthewebsiteyouneed Tracking Cookie Removal
Remove Vxidl.AJU Trojan

MailSpam.EmailBomb Hacker Tool

MailSpam.EmailBomb virus description
Technical details:
Categories: Hacker Tool,DoS
MailSpam.EmailBomb Aliases:
[Panda]Flooder Program

MailSpam.EmailBomb indications of infection

This symptoms of MailSpam.EmailBomb detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
BAT.Ser Trojan Symptoms
Bancos.GKP Trojan Cleaner
Pigeon.ADH Trojan Cleaner
MalwarePro Ransomware Removal
Remove Boys Trojan

TAGOPT Trojan

TAGOPT virus description
Technical details:
Categories: Trojan
TAGOPT Aliases:
[Kaspersky]Trojan.GCS.Tagopt;
[McAfee]TAGOPT;
[F-Prot]destructive program;
[Panda]Trj/GCS.Tagopt;
[Computer Associates]TAGOPT,Tagopt!Trojan

TAGOPT indications of infection

This symptoms of TAGOPT detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
unicast.com Tracking Cookie Symptoms
FavoriteMan BHO Cleaner
Remove AudioDoor Trojan
Microsoft.Media.Server.Denial.of.Service.Attack DoS Cleaner
Backdoor.TheMovie Trojan Cleaner

Bancos.ZZO Trojan

Bancos.ZZO virus description
Technical details:
Categories: Trojan

Bancos.ZZO indications of infection

This symptoms of Bancos.ZZO detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Win95.Tuil Trojan
SysInf Trojan Removal instruction
Win32.AdURL Adware Cleaner
DSKlite Trojan Cleaner
SillyDl.BBZ Downloader Removal instruction

Pentium RAT

Pentium virus description
Technical details:
Categories: RAT
Pentium Aliases:
[Computer Associates]Pentium.955

Pentium indications of infection

This symptoms of Pentium detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Icemenell Trojan
MIRC.Korpie Trojan Removal instruction
Lop.com.Active Spyware Removal instruction
SillyDl.CDL Trojan Cleaner
Removing TrojanSpy.Win32.Sincom.bk Trojan

SillyDl.CNM Trojan

SillyDl.CNM virus description
Technical details:
Categories: Trojan

SillyDl.CNM indications of infection

This symptoms of SillyDl.CNM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
IRC.Logger Spyware Removal instruction
Win32.Banker.ckj Trojan Removal instruction
Removing SillyDl.CGZ Trojan
Removing SillyDl.BCM Trojan
Remove Win32.Septic Trojan

Donn.D!downloader Trojan

Donn.D!downloader virus description
Technical details:
Categories: Trojan

Donn.D!downloader indications of infection

This symptoms of Donn.D!downloader detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove ExPup Trojan
Antitime RAT Removal
Win32.KillFiles.bm Trojan Information
unicast.com Tracking Cookie Cleaner
PcShare RAT Cleaner