Nookl Trojan

Nookl virus description
Technical details:
Categories: Trojan
Nookl Aliases:
[Kaspersky]Trojan.Win32.Agent.qn;
[Other]Win32/Nookl.A

Nookl indications of infection

This symptoms of Nookl detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing PC.Eyes Spyware
Remove Boys Trojan
Removing stockgroup.com Tracking Cookie
Remove Bancos.FZN Trojan
Pigeon.AWC Trojan Removal instruction

IEAgentDown Downloader

IEAgentDown virus description
Technical details:
Categories: Downloader
IEAgentDown Aliases:
[Kaspersky]Trojan-Downloader.Win32.Small.eml;
[Other]Troj/Dloadr-AXC,Trojan.Downloader.Agent.AOG

IEAgentDown indications of infection

This symptoms of IEAgentDown detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Nobof Trojan Information
PSW.Jammer Trojan Symptoms
DialXS Adware Information
Remove Veritas Downloader
Remove IIS.Snaki Trojan

Pigeon.AHF Trojan

Pigeon.AHF virus description
Technical details:
Categories: Trojan

Pigeon.AHF indications of infection

This symptoms of Pigeon.AHF detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Kalah Trojan Removal
valueclick.net Tracking Cookie Removal
Fatso.A Worm Removal
Bancos.HGE Trojan Cleaner
Remove Metal.Pro Backdoor

shopping.search.jp Tracking Cookie

shopping.search.jp virus description
Technical details:
Categories: Tracking Cookie

shopping.search.jp indications of infection

This symptoms of shopping.search.jp detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HWN Trojan Cleaner
Swizzor.bf Downloader Removal
Remove Den.Zuk Trojan
Bancos.ZZR Trojan Removal instruction
Orpdea Trojan Removal

Pigeon.EMA Trojan

Pigeon.EMA virus description
Technical details:
Categories: Trojan

Pigeon.EMA indications of infection

This symptoms of Pigeon.EMA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Jodeitor RAT
Spector Trojan Cleaner
Removing Dosingle Trojan
PWS.Banker.gen.bu Trojan Cleaner
Remove User32 Trojan

FirstLook Spyware

FirstLook virus description
Technical details:
Categories: Spyware

FirstLook Files:
[%PROGRAM_FILES%]\firstlook\firstlook.exe
[%PROGRAM_FILES%]\firstlook\firstlook.exe


FirstLook indications of infection

This symptoms of FirstLook detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Reportserversocket Hostile Code Removal
Removing Light.Boot.dr!Dropper Trojan
Adware.WinAd Adware Removal instruction
Removing SillyDl.DPA Trojan
Tiny.stupid.dloader Trojan Removal

Remote.Revise.Beta RAT

Remote.Revise.Beta virus description
Technical details:
Categories: RAT

Remote.Revise.Beta indications of infection

This symptoms of Remote.Revise.Beta detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
WebLookUp Adware Cleaner
ICQ.Locked Trojan Cleaner
Remove Den.Zuk Trojan
Antitime RAT Removal instruction
Telnet.Pro Backdoor Symptoms

Gentee Adware

Gentee virus description
Technical details:
Categories: Adware

Gentee Files:
[%PROFILE%]\applic~1\iefeatsl\submit2.exe
[%PROFILE%]\applic~1\iefeatsl\submit2.exe


Gentee indications of infection

This symptoms of Gentee detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove BAT.Ser Trojan
Vxidl.ADE Trojan Symptoms
Remove DAS.Boot Trojan
Pigeon.AVNW Trojan Cleaner
Removing WinPup32 Trojan

HLLP.Tran Trojan

HLLP.Tran virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
HLLP.Tran Aliases:
[Kaspersky]HLLC.Trans.6000;
[Panda]HLLC.Gen

HLLP.Tran indications of infection

This symptoms of HLLP.Tran detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.ACI Trojan
Small.tf Trojan Symptoms
SillyDl.CSI Trojan Symptoms
Skiks Trojan Removal
Remove Win32.Memleak Trojan

Trakia Trojan

Trakia virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Trakia Aliases:
[Kaspersky]Trakia.1070;
[Eset]Trakia.1070 virus;
[Panda]Trakia;
[Computer Associates]Trakia.1070

Trakia indications of infection

This symptoms of Trakia detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Boojum Trojan Cleaner
Jeemp Backdoor Removal instruction
Removing PSW.Belial Trojan
Awoi Trojan Symptoms
SillyDl.CNX Trojan Removal

Poltergeist.A!Backdoor Trojan

Poltergeist.A!Backdoor virus description
Technical details:
Categories: Trojan

Poltergeist.A!Backdoor indications of infection

This symptoms of Poltergeist.A!Backdoor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Orconilo Downloader Information
Averub Trojan Information
Bancos.ZZX Trojan Symptoms
Removing Windows.Activity.Logging.Interface Spyware
QQThief Trojan Removal instruction

Nomad Trojan

Nomad virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Nomad Aliases:
[Kaspersky]Lefthome.1302,Nomad.888.a;
[Panda]Se-nomad.1045,StowAway II,Stow.888;
[Computer Associates]Nomad.1050,Nomad.888

Nomad indications of infection

This symptoms of Nomad detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing RemoteIsProgramRunning RAT
Pigeon.ESG Trojan Symptoms
Awoi Trojan Cleaner
YBomber DoS Cleaner
Tiso Trojan Cleaner

SillyDl.DLA Downloader

SillyDl.DLA virus description
Technical details:
Categories: Downloader
SillyDl.DLA Aliases:
[Kaspersky]Trojan-Downloader.Win32.Hmir.u;
[Other]Win32/SillyDl.DLA,Trojan.Farfli

SillyDl.DLA indications of infection

This symptoms of SillyDl.DLA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Small.dv Trojan Removal instruction
VB.ny Backdoor Information
Remove Perfect.Keylogger.Lite Spyware
APS Trojan Information
Punisher Trojan Removal

Bancos.IHA Trojan

Bancos.IHA virus description
Technical details:
Categories: Trojan

Bancos.IHA Folders:
[%WINDOWS%]\_tmp

Bancos.IHA Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run\sharedapps


Bancos.IHA indications of infection

This symptoms of Bancos.IHA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Boojum Trojan Removal instruction
Remove Win32.PWS.Bamer Trojan
Doped Backdoor Cleaner
Remove Odysseus.Macro.Virus.Construction.Kit Trojan
BO.BO Trojan Symptoms

BAT.SS Trojan

BAT.SS virus description
Technical details:
Categories: Trojan

BAT.SS Folders:
[%PROGRAM_FILES%]\TS Trial

BAT.SS Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run


BAT.SS indications of infection

This symptoms of BAT.SS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.FXF Trojan Removal
Hooker Trojan Symptoms
Removing ProfitZone Adware
Metal.Pro Backdoor Removal instruction
SillyDl.DAK Trojan Symptoms

ProRat Trojan

ProRat virus description
Technical details:
Categories: Trojan,Backdoor,RAT
ProRat Aliases:
[Kaspersky]Backdoor.Prorat.10.a,TrojanDropper.Win32.Agent.av,Backdoor.Prorat.10.c;
[Eset]Win32/Prorat.14 trojan,Win32/Prorat.16 trojan,Win32/Prorat.17 trojan,Win32/Prorat.11 trojan,Win32/Prorat.10.C trojan;
[Panda]Trojan Horse,Bck/Prorat.B,Backdoor Program,Bck/Prorat.D,Backdoor Program.LC,Bck/Prorat.A;
[Computer Associates]Backdoor/Prorat.14!Server,Backdoor/Prorat.14.Server,Win32.ProRat.14.A,Win32.ProRat.D,Win32/Prorat.12.2768!Trojan,Win32/Prorat.12.2768.Trojan,Backdoor/Prorat.14.B!Server,Backdoor/Prorat.14.Server.HookDL,Backdoor/Prorat.DLL,Win32.ProRat,Win32.ProRat.17.A,Win32.ProRat.E,Win32.ProRat.G,Backdoor/ProRat.11,Backdoor/Prorat.10.a,Backdoor/Prorat.323584!Server,Win32.ProRat.A,Win32/ProRat.10.A!Trojan,Backdoor/Prorat.17,Win32.Prorat.18.A;
[Other]Win32/ProRat.Z

ProRat Files:
[%SYSTEM%]\fservice.exe
[%SYSTEM%]\reginv.dll
[%SYSTEM%]\winkey.dll
[%WINDOWS%]\ktd32.atm
[%WINDOWS%]\system\sservice.exe
[%PROGRAM_FILES%]\norton systemworks\norton antivirus\quarantine\32fd2804.dll
[%PROGRAM_FILES%]\norton systemworks\norton antivirus\quarantine\331c7edf.dll
[%PROGRAM_FILES%]\norton systemworks\norton antivirus\quarantine\331f28db.dll
[%SYSTEM%]\wininv.dll
[%SYSTEM%]\fservice.exe
[%SYSTEM%]\reginv.dll
[%SYSTEM%]\winkey.dll
[%WINDOWS%]\ktd32.atm
[%WINDOWS%]\system\sservice.exe
[%PROGRAM_FILES%]\norton systemworks\norton antivirus\quarantine\32fd2804.dll
[%PROGRAM_FILES%]\norton systemworks\norton antivirus\quarantine\331c7edf.dll
[%PROGRAM_FILES%]\norton systemworks\norton antivirus\quarantine\331f28db.dll
[%SYSTEM%]\wininv.dll

ProRat Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{5y99ae78-58tt-11dw-be53-y67078979y}

ProRat Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


ProRat indications of infection

This symptoms of ProRat detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Tofger.HookDLL Trojan Cleaner
VB.ny Backdoor Symptoms
Remove TFD DoS
HeyItsMe Trojan Information
Removing SillyDl.DMW Trojan