HHNicrop Trojan

HHNicrop virus description
Technical details:
Categories: Trojan

HHNicrop indications of infection

This symptoms of HHNicrop detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing PSW.Jammer Trojan
Bancos.HWN Trojan Removal
PWS.Ghost Trojan Cleaner
SillyDl.DAK Trojan Removal
ICQ.Locked Trojan Removal instruction

Nip Trojan

Nip virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Nip Aliases:
[Kaspersky]Nipple.208;
[Panda]Nipple.208

Nip indications of infection

This symptoms of Nip detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Anomaly Trojan
Bancos.IHA Trojan Information
Benuti.D!downloader Trojan Removal instruction
Pigeon.AVGJ Trojan Removal instruction
Bancos.HAP Trojan Symptoms

Vxidl.AFD Trojan

Vxidl.AFD virus description
Technical details:
Categories: Trojan

Vxidl.AFD indications of infection

This symptoms of Vxidl.AFD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AWHR Trojan Symptoms
Nomad Trojan Removal
Riot.Doom Trojan Removal
EvilSocks Backdoor Information
VBS.Daydream Trojan Removal instruction

KaoTan.Web Downloader

KaoTan.Web virus description
Technical details:
Categories: Downloader

KaoTan.Web indications of infection

This symptoms of KaoTan.Web detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Korsmox Trojan Removal
Remove SillyNuts Trojan
Remove Ramase Trojan
Tofger Trojan Removal
TPE Trojan Cleaner

Small.DWC Downloader

Small.DWC virus description
Technical details:
Categories: Downloader
Small.DWC Aliases:
[Kaspersky]Trojan-Downloader.Win32.Small.dwc;
[F-Prot]W32/Downloader;
[Other]W32/DLoader.CIMZ

Small.DWC Files:
[%SYSTEM%]\cwxtligetea.dll
[%WINDOWS%]\inf\msmgr32.dll
[%SYSTEM%]\cwxtligetea.dll
[%WINDOWS%]\inf\msmgr32.dll

Small.DWC Registry Keys:
HKEY_CLASSES_ROOT\clsid\{9f143c3a-1457-6cca-03a7-7aa23b61e40f}

Small.DWC Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\sharedtaskscheduler
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\sharedtaskscheduler


Small.DWC indications of infection

This symptoms of Small.DWC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SearchSquire Adware Cleaner
Bancos.GKP Trojan Cleaner
TAGOPT Trojan Symptoms
Kiss Trojan Symptoms
Windows.Key.Analyst Trojan Removal

ShenHua Trojan

ShenHua virus description
Technical details:
Categories: Trojan,Downloader,Backdoor

ShenHua indications of infection

This symptoms of ShenHua detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
KBL.Webdownloader Downloader Removal instruction
Bancos.FTY Trojan Cleaner
Focalink.com Tracking Cookie Removal
HLLP.Tran Trojan Symptoms
Remove Bina Trojan

Bancos.ICS Trojan

Bancos.ICS virus description
Technical details:
Categories: Trojan
Bancos.ICS Aliases:
[Kaspersky]Trojan-Downloader.Win32.Banload.bfo;
[Other]Win32/Bancos.ICS,Mal/VBDldr-A

Bancos.ICS indications of infection

This symptoms of Bancos.ICS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove PrankMaster Trojan
Win32.VB.bs Trojan Symptoms
Bancos.HMX Trojan Symptoms
Win32.Indel DoS Removal instruction
Slashes Trojan Cleaner

VB.lg Backdoor

VB.lg virus description
Technical details:
Categories: Backdoor

VB.lg indications of infection

This symptoms of VB.lg detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SillyDl.DLA Downloader
Pld Backdoor Removal instruction
Bad.Guy Trojan Symptoms
topping.com.ua Tracking Cookie Information
SuxxProxy Trojan Symptoms

Korsmox Trojan

Korsmox virus description
Technical details:
Categories: Trojan

Korsmox indications of infection

This symptoms of Korsmox detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AUK Trojan Symptoms
Remove Kid.Terror Backdoor
SexoDial Adware Removal instruction
Tetrinet.txt DoS Cleaner
Removing Bancos.FVJ Trojan

Win.Steal Trojan

Win.Steal virus description
Technical details:
Categories: Trojan
Win.Steal Aliases:
[Panda]Trj/AOL.Steal.C;
[Computer Associates]Win/Steal.C!Trojan

Win.Steal indications of infection

This symptoms of Win.Steal detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Boys Trojan Removal
Remove Brave Sentry Ransomware
Pigeon.FBB Trojan Information
Removing SearchBoss Toolbar
Removing MalwarePro Ransomware

DarkNova Trojan

DarkNova virus description
Technical details:
Categories: Trojan,Backdoor
DarkNova Aliases:
[Kaspersky]Backdoor.DarkNova;
[McAfee]BackDoor-OU;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program;
[Computer Associates]Backdoor/Darknova

DarkNova indications of infection

This symptoms of DarkNova detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Delf.aeo Downloader Cleaner
Pigeon.ELC Trojan Cleaner
Readdev DoS Cleaner
Remove Pigeon.ETO Trojan
Removing Remote.Revise.Beta RAT

Vxidl.AYN Trojan

Vxidl.AYN virus description
Technical details:
Categories: Trojan

Vxidl.AYN indications of infection

This symptoms of Vxidl.AYN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HWN Trojan Removal
Focalink.com Tracking Cookie Removal
SillyDl.DJP Trojan Information
IRC.Logger Spyware Removal
Enculator Backdoor Removal instruction

Bat.PDrome Trojan

Bat.PDrome virus description
Technical details:
Categories: Trojan
Bat.PDrome Aliases:
[Eset]BAT/Spth.Checker.B virus,BAT/Spth.Checker.A virus;
[Computer Associates]Bat/PDrome,BAT.PDrome.A

Bat.PDrome indications of infection

This symptoms of Bat.PDrome detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CDL Trojan Cleaner
SillyDl.CGZ Trojan Removal
Bridge Trojan Removal instruction
Removing FirstLook Spyware
Removing SillyDl.CFY Trojan

Win32.GreyBird Trojan

Win32.GreyBird virus description
Technical details:
Categories: Trojan,Backdoor
Win32.GreyBird Aliases:
[Kaspersky]Backdoor.GrayBird.j;
[Eset]Win32/GreyBird.F trojan,Win32/GreyBird.S trojan

Win32.GreyBird indications of infection

This symptoms of Win32.GreyBird detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanDownloader.Win32.Tooncom Trojan Cleaner
Remove PWS.Ghost Trojan
Vxidl.BGN Trojan Removal instruction
Playboy Trojan Information
Frethog.AFC Trojan Cleaner

MadClient RAT

MadClient virus description
Technical details:
Categories: RAT

MadClient indications of infection

This symptoms of MadClient detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Windows.Activity.Logging.Interface Spyware
Small.dv Trojan Removal instruction
InCommand.67b Backdoor Removal
Win32.Small.me Trojan Removal instruction
NetKillx Backdoor Removal instruction

Clodpuntor Trojan

Clodpuntor virus description
Technical details:
Categories: Trojan
Clodpuntor Aliases:
[Kaspersky]Trojan-Proxy.Win32.Agent.ji,Email-Worm.Win32.Zhelatin.hc;
[Other]Win32/Clodpuntor.L,Win32/Clodpuntor.P,Trojan.SpamThru,Win32/Clodpuntor.Q,Win32/Clodpuntor.S

Clodpuntor Registry Values:
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list


Clodpuntor indications of infection

This symptoms of Clodpuntor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
kSite Trojan Cleaner
Pigeon.ASW Trojan Symptoms
AFA Internet Enhancement Adware Removal
Bancos.FZN Trojan Information
Randon Trojan Symptoms

Wobox Trojan

Wobox virus description
Technical details:
Categories: Trojan
Wobox Aliases:
[Kaspersky]Trojan-Downloader.Win32.Banload.bpt

Wobox indications of infection

This symptoms of Wobox detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AUT Trojan Removal
JanNet Spyware Cleaner
Vxidl.BGN Trojan Removal
Den.Zuk Trojan Symptoms
Remove Gotcha Trojan

MagicLink.NetPCSpy Backdoor

MagicLink.NetPCSpy virus description
Technical details:
Categories: Backdoor,RAT,Hacker Tool
MagicLink.NetPCSpy Aliases:
[Kaspersky]Backdoor.CmjSpy.13.b,Backdoor.CmjSpy.16;
[Panda]Backdoor Program

MagicLink.NetPCSpy indications of infection

This symptoms of MagicLink.NetPCSpy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Nfstrace Trojan Removal
Win32.Banker.ckj Trojan Cleaner
VBS.Daydream Trojan Cleaner
Win32.Killav.bn Trojan Symptoms
VB.Troyen RAT Symptoms

Ramase Trojan

Ramase virus description
Technical details:
Categories: Trojan

Ramase indications of infection

This symptoms of Ramase detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Upsilonprog Trojan
Remove Pigeon.EIV Trojan
Vxidl.ACX Trojan Removal
Remove Vxidl.AWX Trojan
Removing Vxidl.AQX Trojan

Win32.Randex Trojan

Win32.Randex virus description
Technical details:
Categories: Trojan,Worm,Backdoor,DoS
Win32.Randex Aliases:
[Kaspersky]Backdoor.IRCBot.gen;
[Eset]IRC/SdBot.JJ trojan;
[Computer Associates]Win32.SXTBot.A

Win32.Randex indications of infection

This symptoms of Win32.Randex detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SpyGator.pro Spyware Removal
Frethog.AFC Trojan Removal instruction
NetNucleus BHO Information
Remove Virus.Killer Trojan
VirTool.Win32.ShadowAdmin Trojan Removal instruction

Pigeon.AUU Trojan

Pigeon.AUU virus description
Technical details:
Categories: Trojan

Pigeon.AUU indications of infection

This symptoms of Pigeon.AUU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Elite Trojan
YouthSilence Trojan Information
JS.Relink Trojan Cleaner
SillyDI.AQR Trojan Removal instruction
Removing QB2C.Fly Trojan

SillyDl.DJP Trojan

SillyDl.DJP virus description
Technical details:
Categories: Trojan

SillyDl.DJP indications of infection

This symptoms of SillyDl.DJP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Vxidl.BEK Trojan
Removing NIGGER Trojan
Removing Metal.Pro Backdoor
Removing Efewe Trojan
Removing Popuppers Tracking Cookie

Bancos.HNO Trojan

Bancos.HNO virus description
Technical details:
Categories: Trojan
Bancos.HNO Aliases:
[Kaspersky]Trojan-Downloader.Win32.Banload.aqu;
[Other]Win32/Bancos.HNO

Bancos.HNO indications of infection

This symptoms of Bancos.HNO detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
LinkMaker Adware Removal instruction
Removing TrojanDownloader.Win32.Tooncom Trojan
Remove BO.BO Trojan
Clix0r.exe Trojan Symptoms
Removing Bat.Guru Trojan

Onap Trojan

Onap virus description
Technical details:
Categories: Trojan
Onap Aliases:
[Kaspersky]Backdoor.Win32.Vb.awo;
[Other]Win32/Onap.A

Onap indications of infection

This symptoms of Onap detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
FormatFDD Trojan Symptoms
CSApp.dll BHO Information
Perfect.Keylogger.Lite Spyware Cleaner
Vxidl.AMR Trojan Symptoms
Flipped Trojan Information