Receita Downloader

This summary is not available. Please click here to view the post.

Banker.CMF Trojan

Banker.CMF virus description
Technical details:
Categories: Trojan
Banker.CMF Aliases:
[Kaspersky]Trojan.Spy.Win32.Banker.cmf;
[McAfee]PWS-Banker.gen.i;
[Other]TrojanSpy:Win32/Banker!41ED

Banker.CMF indications of infection

This symptoms of Banker.CMF detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Manzon Trojan Symptoms
Remove SillyDl.DFR Trojan
SillyDl.CZP Trojan Information
Removing Zlob.ve Downloader
Banker.cn Spyware Symptoms

Bancos.HLN Trojan

Bancos.HLN virus description
Technical details:
Categories: Trojan

Bancos.HLN indications of infection

This symptoms of Bancos.HLN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bancos.HAP Trojan
Removing SillyDl.CKO Trojan
V4.login Trojan Removal instruction
BA Trojan Information
Tofger.HookDLL Trojan Symptoms

ServiceDown Downloader

ServiceDown virus description
Technical details:
Categories: Downloader
ServiceDown Aliases:
[Kaspersky]Trojan-Downloader.Win32.Agent.aph;
[Other]Downloader

ServiceDown indications of infection

This symptoms of ServiceDown detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SH.Mare Trojan
Flobo.Server Trojan Symptoms
Removing Pigeon.ALV Trojan
Remove Win32.Invictus Trojan
Pigeon.ADH Trojan Information

Pigeon.ESM Trojan

Pigeon.ESM virus description
Technical details:
Categories: Trojan

Pigeon.ESM indications of infection

This symptoms of Pigeon.ESM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Crypt Trojan
Bat2EXE.FormatC Trojan Symptoms
Remove Dream Trojan
kSite Trojan Removal instruction
Bancos.HAK Trojan Symptoms

Scilicet Trojan

Scilicet virus description
Technical details:
Categories: Trojan
Scilicet Aliases:
[Kaspersky]Backdoor.Win32.Agent.yr,SpamTool.Win32.Agent.i,Trojan-Dropper.Win32.Agent.azs;
[McAfee]Spam-Mailbot;
[Other]Hacktool.Spammer,Win32/Scilicet.H,Win32/Scilicet.K

Scilicet indications of infection

This symptoms of Scilicet detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Del Trojan Information
Backdoor.Kronikal Trojan Information
Remove Belcaro.GoldenRetriever Spyware
Mass.Instant.Messenger Adware Removal instruction
SillyDl.CQP Trojan Cleaner

TFN2K.An.Analysis DoS

TFN2K.An.Analysis virus description
Technical details:
Categories: DoS

TFN2K.An.Analysis indications of infection

This symptoms of TFN2K.An.Analysis detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Delf.eg Trojan Removal instruction
Lazy Trojan Information
Removing Bizrate Tracking Cookie
Bridge Trojan Removal
Remove Raw.TCP.Server.Connection RAT

Synrg.Server Trojan

Synrg.Server virus description
Technical details:
Categories: Trojan,Backdoor
Synrg.Server Aliases:
[Eset]Win32/VB.ET trojan;
[Computer Associates]Backdoor/Synrg.Server

Synrg.Server indications of infection

This symptoms of Synrg.Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove DoDoor Adware
Zonar Trojan Removal instruction
Kronical.Fire RAT Removal instruction
SillyDl.DFR Trojan Removal
SillyDl.CHB Trojan Removal

Vxidl.BES Trojan

Vxidl.BES virus description
Technical details:
Categories: Trojan

Vxidl.BES indications of infection

This symptoms of Vxidl.BES detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Downloader.AUE.dll Trojan Cleaner
Bancos.GCI Trojan Symptoms
Remove ANTIMAC Trojan
Munich Trojan Symptoms
SearchBoss Toolbar Removal

Sponce Trojan

Sponce virus description
Technical details:
Categories: Trojan
Sponce Aliases:
[Other]Win32/Sponce.A

Sponce indications of infection

This symptoms of Sponce detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Travelling.salesman Adware Cleaner
IstBar.az Downloader Removal instruction
PHP.Liquid Trojan Removal
QRabid.BTW Trojan Removal instruction
SillyDl.CBK Trojan Information

Eminem21 Trojan

Eminem21 virus description
Technical details:
Categories: Trojan
Eminem21 Aliases:
[Panda]Trj/Enimen.c;
[Computer Associates]Eminem21!Trojan,Enimen.A

Eminem21 indications of infection

This symptoms of Eminem21 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Wnsock Trojan Symptoms
Removing Pigeon.AVQP Trojan
Bancos.CYZ Trojan Removal instruction
Remove Donn.D!downloader Trojan
Nip Trojan Removal instruction

Storark Trojan

Storark virus description
Technical details:
Categories: Trojan
Storark Aliases:
[Kaspersky]Trojan-Spy.Win32.Delf.uv,Trojan-PSW.Win32.OnLineGames.aqn,Trojan-PSW.Win32.OnLineGames.dfs,Trojan-Spy.Win32.Delf.bci,Trojan-PSW.Win32.OnLineGames.dgw,Trojan-Spy.Win32.Delf.aji,Trojan-PSW.Win32.OnLineGames.dsj,Trojan-PSW.Win32.OnLineGames.deg,Trojan-PSW:Win32.OnLineGames.fwv,Trojan-PSW.Win32.OnLineGames.fqm,Trojan-PSW.Win32.OnLineGames.dzp,Trojan-PSW.Win32.OnLineGames.fyp,Trojan-PSW.Win32.OnLineGames.ggn,Trojan-PSW.Win32.OnLineGames.enm,Trojan-PSW.Win32.OnLineGames.giv,Trojan-PWS.Win32.OnLineGames.ggm,Trojan-PSW.Win32.OnLineGames.get,Trojan-PSW.Win32.OnLineGames.fpx,Trojan-PSW.Win32.OnLineGames.fqb,Trojan-PSW.Win32.OnLineGames.fef,Trojan-PSW.Win32.OnLineGames.fpw,Trojan-PSW.Win32o.OnLineGames.ebw,Trojan-Dropper.Win32.Mudrop.fg,Trojan-PSW.Win32.OnLineGames.eax,Trojan-PSW.Win32.OnLineGames.eav,Trojan-PSW.Win32.OnLineGames.dzq,Trojan-PSW.Win32.OnLineGames.hxg,Trojan-PSW.Win32.OnLineGames.hsy;
[McAfee]PWS-OnlineGames.f,PWS-OnlineGames.a.dll,PWS-OnlineGames.i,New Malware.n,New malware.n,PWS-OnlineGames.k.dll;
[Other]Win32/Storark.C,Win32/Storark.AR,Infostealer.Gampass,Win32/Storark.AS,Win32/Storark.AT,Win32/Storark.AU,Infostealer.Gamepass,Win32/Storark.AV,Infostealer.Menghuan,Win32.Storark.AW,Win32/Storark.BB,Win32/Storark,Win32/Storark.BV,Trojan:Win32/Delf.AT!dll,Win32/Storark.BW,Win32/Storark.BX,TSPY_ONLINEG.IRZ,Mal/Delagen-A,Win32/Storark.BZ,W32/Malware.AVHG,Win32/Storark.CA,Win32/Storark!generic,Trojan:Win32/SystemHijack.gen,W32/Malware,Mal/Behav-152,Win32/Storark.CC,W32/OnLineGames.PLZ,W32/OnLineGames.QCZ,TSPY_ONLINEG.LKC,Win32/Storark.CK,W32/Delf.AYBJ,Win32/Storark.CU,W32/Malare.BCGX,Win32/Storark.CW,Trojan:Win32.Delf.AT!dll,W32/Malware.BCFF,W32/Malware.BBNR,Win32/Storark.CT,W32/Malware.BCFW,Win32/Storark.CN,W32/Malware.AZKA,W32/Malware.BCMD,Win32/Storark.CD,W32/Malware.AZEH,TSPY_ONLINEG.IUX,Win32/Storark.CG,W32/Malware.AZDV,Win32/Storark.CI,W32/Malware.AYNM,OnLineGames.gen34,W32/OnLineGames.VBH

Storark Files:
[%SYSTEM%]\avzxain.dll
[%SYSTEM%]\htzmf.log
[%SYSTEM%]\kapjacs.dll
[%SYSTEM%]\kawdacs.dll
[%SYSTEM%]\kawdbzy.dll
[%SYSTEM%]\kvdxacf.dll
[%SYSTEM%]\lktgy.txt
[%SYSTEM%]\raqjani.dll
[%SYSTEM%]\rsjzafg.dll
[%SYSTEM%]\rsmyafg.dll
[%WINDOWS%]\knnte.txt
[%WINDOWS%]\nbqdq.txt
[%SYSTEM%]\avwlain.dll
[%SYSTEM%]\avwlamn.dll
[%SYSTEM%]\avwlast.exe
[%SYSTEM%]\avwldin.dll
[%SYSTEM%]\avwldmn.dll
[%SYSTEM%]\avwldst.exe
[%SYSTEM%]\avzxamn.dll
[%SYSTEM%]\avzxast.exe
[%SYSTEM%]\avzxein.dll
[%SYSTEM%]\avzxemn.dll
[%SYSTEM%]\avzxest.exe
[%SYSTEM%]\caomsnima.dll
[%SYSTEM%]\dhdini.dll
[%SYSTEM%]\dheins.exe
[%SYSTEM%]\dhepri.dll
[%SYSTEM%]\kapjaaz.exe
[%SYSTEM%]\kapjazy.dll
[%SYSTEM%]\kapjdaz.exe
[%SYSTEM%]\kapjdcs.dll
[%SYSTEM%]\kapjdzy.dll
[%SYSTEM%]\kaqhacs.dll
[%SYSTEM%]\kaqhcaz.exe
[%SYSTEM%]\kaqhczy.dll
[%SYSTEM%]\kaqhgaz.exe
[%SYSTEM%]\kaqhgcs.dll
[%SYSTEM%]\kaqhgzy.dll
[%SYSTEM%]\kawdbaz.exe
[%SYSTEM%]\kawdcaz.exe
[%SYSTEM%]\kawdccs.dll
[%SYSTEM%]\kawdczy.dll
[%SYSTEM%]\kvdxbis.exe
[%SYSTEM%]\kvdxbma.dll
[%SYSTEM%]\kvdxgcf.dll
[%SYSTEM%]\kvdxgis.exe
[%SYSTEM%]\kvdxgma.dll
[%SYSTEM%]\kvdxsacf.dll
[%SYSTEM%]\kvdxsais.exe
[%SYSTEM%]\kvdxsama.dll
[%SYSTEM%]\kvdxsfcf.dll
[%SYSTEM%]\kvdxsfis.exe
[%SYSTEM%]\kvdxsfma.dll
[%SYSTEM%]\kvmxfcf.dll
[%SYSTEM%]\kvmxfis.exe
[%SYSTEM%]\kvmxfma.dll
[%SYSTEM%]\mxbcfg.dll
[%SYSTEM%]\mxbman.dll
[%SYSTEM%]\mxbset.exe
[%SYSTEM%]\mygini.dll
[%SYSTEM%]\myhins.exe
[%SYSTEM%]\myhpri.dll
[%SYSTEM%]\qjgpri.dll
[%SYSTEM%]\raqjapi.dll
[%SYSTEM%]\raqjatl.exe
[%SYSTEM%]\rarjani.dll
[%SYSTEM%]\rarjbpi.dll
[%SYSTEM%]\rarjbtl.exe
[%SYSTEM%]\ratbani.dll
[%SYSTEM%]\ratbfpi.dll
[%SYSTEM%]\ratbftl.exe
[%SYSTEM%]\rsjzapm.dll
[%SYSTEM%]\rsjzasp.exe
[%SYSTEM%]\rsmyapm.dll
[%SYSTEM%]\rsmyasp.exe
[%SYSTEM%]\rsmyepm.dll
[%SYSTEM%]\rsmyesp.exe
[%SYSTEM%]\rsmyfpm.dll
[%SYSTEM%]\rsmyfsp.exe
[%SYSTEM%]\rsmygfg.dll
[%SYSTEM%]\rsmygpm.dll
[%SYSTEM%]\rsmygsp.exe
[%SYSTEM%]\rsztffg.dll
[%SYSTEM%]\rsztfpm.dll
[%SYSTEM%]\rsztfsp.exe
[%SYSTEM%]\sidjbaz.exe
[%SYSTEM%]\sidjbcs.dll
[%SYSTEM%]\sidjbzy.dll
[%SYSTEM%]\sqmapi32.dll
[%SYSTEM%]\wggini.dll
[%SYSTEM%]\wggins.exe
[%SYSTEM%]\wggpri.dll
[%SYSTEM%]\wlgini.dll
[%SYSTEM%]\wlhins.exe
[%SYSTEM%]\wlhpri.dll
[%SYSTEM%]\avzxain.dll
[%SYSTEM%]\htzmf.log
[%SYSTEM%]\kapjacs.dll
[%SYSTEM%]\kawdacs.dll
[%SYSTEM%]\kawdbzy.dll
[%SYSTEM%]\kvdxacf.dll
[%SYSTEM%]\lktgy.txt
[%SYSTEM%]\raqjani.dll
[%SYSTEM%]\rsjzafg.dll
[%SYSTEM%]\rsmyafg.dll
[%WINDOWS%]\knnte.txt
[%WINDOWS%]\nbqdq.txt
[%SYSTEM%]\avwlain.dll
[%SYSTEM%]\avwlamn.dll
[%SYSTEM%]\avwlast.exe
[%SYSTEM%]\avwldin.dll
[%SYSTEM%]\avwldmn.dll
[%SYSTEM%]\avwldst.exe
[%SYSTEM%]\avzxamn.dll
[%SYSTEM%]\avzxast.exe
[%SYSTEM%]\avzxein.dll
[%SYSTEM%]\avzxemn.dll
[%SYSTEM%]\avzxest.exe
[%SYSTEM%]\caomsnima.dll
[%SYSTEM%]\dhdini.dll
[%SYSTEM%]\dheins.exe
[%SYSTEM%]\dhepri.dll
[%SYSTEM%]\kapjaaz.exe
[%SYSTEM%]\kapjazy.dll
[%SYSTEM%]\kapjdaz.exe
[%SYSTEM%]\kapjdcs.dll
[%SYSTEM%]\kapjdzy.dll
[%SYSTEM%]\kaqhacs.dll
[%SYSTEM%]\kaqhcaz.exe
[%SYSTEM%]\kaqhczy.dll
[%SYSTEM%]\kaqhgaz.exe
[%SYSTEM%]\kaqhgcs.dll
[%SYSTEM%]\kaqhgzy.dll
[%SYSTEM%]\kawdbaz.exe
[%SYSTEM%]\kawdcaz.exe
[%SYSTEM%]\kawdccs.dll
[%SYSTEM%]\kawdczy.dll
[%SYSTEM%]\kvdxbis.exe
[%SYSTEM%]\kvdxbma.dll
[%SYSTEM%]\kvdxgcf.dll
[%SYSTEM%]\kvdxgis.exe
[%SYSTEM%]\kvdxgma.dll
[%SYSTEM%]\kvdxsacf.dll
[%SYSTEM%]\kvdxsais.exe
[%SYSTEM%]\kvdxsama.dll
[%SYSTEM%]\kvdxsfcf.dll
[%SYSTEM%]\kvdxsfis.exe
[%SYSTEM%]\kvdxsfma.dll
[%SYSTEM%]\kvmxfcf.dll
[%SYSTEM%]\kvmxfis.exe
[%SYSTEM%]\kvmxfma.dll
[%SYSTEM%]\mxbcfg.dll
[%SYSTEM%]\mxbman.dll
[%SYSTEM%]\mxbset.exe
[%SYSTEM%]\mygini.dll
[%SYSTEM%]\myhins.exe
[%SYSTEM%]\myhpri.dll
[%SYSTEM%]\qjgpri.dll
[%SYSTEM%]\raqjapi.dll
[%SYSTEM%]\raqjatl.exe
[%SYSTEM%]\rarjani.dll
[%SYSTEM%]\rarjbpi.dll
[%SYSTEM%]\rarjbtl.exe
[%SYSTEM%]\ratbani.dll
[%SYSTEM%]\ratbfpi.dll
[%SYSTEM%]\ratbftl.exe
[%SYSTEM%]\rsjzapm.dll
[%SYSTEM%]\rsjzasp.exe
[%SYSTEM%]\rsmyapm.dll
[%SYSTEM%]\rsmyasp.exe
[%SYSTEM%]\rsmyepm.dll
[%SYSTEM%]\rsmyesp.exe
[%SYSTEM%]\rsmyfpm.dll
[%SYSTEM%]\rsmyfsp.exe
[%SYSTEM%]\rsmygfg.dll
[%SYSTEM%]\rsmygpm.dll
[%SYSTEM%]\rsmygsp.exe
[%SYSTEM%]\rsztffg.dll
[%SYSTEM%]\rsztfpm.dll
[%SYSTEM%]\rsztfsp.exe
[%SYSTEM%]\sidjbaz.exe
[%SYSTEM%]\sidjbcs.dll
[%SYSTEM%]\sidjbzy.dll
[%SYSTEM%]\sqmapi32.dll
[%SYSTEM%]\wggini.dll
[%SYSTEM%]\wggins.exe
[%SYSTEM%]\wggpri.dll
[%SYSTEM%]\wlgini.dll
[%SYSTEM%]\wlhins.exe
[%SYSTEM%]\wlhpri.dll

Storark Registry Keys:
HKEY_CLASSES_ROOT\clsid\{28907901-1416-3389-9981-372178569982}
HKEY_CLASSES_ROOT\clsid\{e3a77057-d10b-b02a-d823-22e020c583b5}
HKEY_CLASSES_ROOT\clsid\{12faacde-34da-ccd4-ab4d-da34485a3421}
HKEY_CLASSES_ROOT\clsid\{131ab311-16f1-f13b-1e43-11a24b51afd1}
HKEY_CLASSES_ROOT\clsid\{14783410-4f90-34a0-7820-3230acd05f41}
HKEY_CLASSES_ROOT\clsid\{1859245f-345d-bc13-ac4f-145d47da34f1}
HKEY_CLASSES_ROOT\clsid\{18847374-8323-fadc-b443-4732abcd3781}
HKEY_CLASSES_ROOT\clsid\{1960356a-458e-de24-bd50-268f589a56a1}
HKEY_CLASSES_ROOT\clsid\{1a321487-4977-d98a-c8d5-6488257545a1}
HKEY_CLASSES_ROOT\clsid\{1d561258-45f3-a451-f908-a258458226d1}
HKEY_CLASSES_ROOT\clsid\{1e32fa58-3453-fa2d-bc49-f340348acce1}
HKEY_CLASSES_ROOT\clsid\{2231a43a-1642-641a-64fd-146adab223b2}
HKEY_CLASSES_ROOT\clsid\{22faacde-34da-ccd4-ab4d-da34485a3422}
HKEY_CLASSES_ROOT\clsid\{24783410-4f90-34a0-7820-3230acd05f42}
HKEY_CLASSES_ROOT\clsid\{2598ff45-da60-f48a-bc43-10ac47853d52}
HKEY_CLASSES_ROOT\clsid\{28847374-8323-fadc-b443-4732abcd3782}
HKEY_CLASSES_ROOT\clsid\{2960356a-458e-de24-bd50-268f589a56a2}
HKEY_CLASSES_ROOT\clsid\{2a321487-4977-d98a-c8d5-6488257545a2}
HKEY_CLASSES_ROOT\clsid\{2c87a354-abc3-dede-ff33-3213fd7447c2}
HKEY_CLASSES_ROOT\clsid\{37d81718-1314-5200-2597-587901018073}
HKEY_CLASSES_ROOT\clsid\{38907901-1416-3389-9981-372178569983}
HKEY_CLASSES_ROOT\clsid\{3960356a-458e-de24-bd50-268f589a56a3}
HKEY_CLASSES_ROOT\clsid\{3c87a354-abc3-dede-ff33-3213fd7447c3}
HKEY_CLASSES_ROOT\clsid\{3d561258-45f3-a451-f908-a258458226d3}
HKEY_CLASSES_ROOT\clsid\{434345f1-dacf-3452-cb7d-4620f34a1534}
HKEY_CLASSES_ROOT\clsid\{4960356a-458e-de24-bd50-268f589a56a4}
HKEY_CLASSES_ROOT\clsid\{4a321487-4977-d98a-c8d5-6488257545a4}
HKEY_CLASSES_ROOT\clsid\{5182c1eb-375c-573d-1f5e-234552345215}
HKEY_CLASSES_ROOT\clsid\{52311a42-ac1b-158f-fd32-5674345f23a5}
HKEY_CLASSES_ROOT\clsid\{5859245f-345d-bc13-ac4f-145d47da34f5}
HKEY_CLASSES_ROOT\clsid\{5bd41097-3693-4133-820e-fdac57af00e2}
HKEY_CLASSES_ROOT\clsid\{5c87a354-abc3-dede-ff33-3213fd7447c5}
HKEY_CLASSES_ROOT\clsid\{5e32fa58-3453-fa2d-bc49-f340348acce5}
HKEY_CLASSES_ROOT\clsid\{634345f1-dacf-3452-cb7d-4620f34a1536}
HKEY_CLASSES_ROOT\clsid\{66650011-3344-6688-4899-345fabcd1566}
HKEY_CLASSES_ROOT\clsid\{6d47b341-43df-4563-753f-345ffa3157d6}
HKEY_CLASSES_ROOT\clsid\{6d561258-45f3-a451-f908-a258458226d6}
HKEY_CLASSES_ROOT\clsid\{6e32fa58-3453-fa2d-bc49-f340348acce6}
HKEY_CLASSES_ROOT\clsid\{725ab2f3-234a-7469-2f43-e341713abfa7}
HKEY_CLASSES_ROOT\clsid\{74123ff1-8371-9834-9021-184518451fa7}
HKEY_CLASSES_ROOT\clsid\{77d81718-1314-5200-2597-587901018077}
HKEY_CLASSES_ROOT\clsid\{7c87a354-abc3-dede-ff33-3213fd7447c7}
HKEY_CLASSES_ROOT\clsid\{7e32fa58-3453-fa2d-bc49-f340348acce7}
HKEY_CLASSES_ROOT\clsid\{8562452f-fa36-ba4f-892a-ff5fbbac5318}

Storark Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows\appinit_dlls
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Storark indications of infection

This symptoms of Storark detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CSI Trojan Cleaner
Small.jf Trojan Removal
Griffe Trojan Cleaner
Bridge Trojan Removal instruction
Remove Pigeon.AXV Trojan

Torero Trojan

Torero virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Torero Aliases:
[Panda]Torero

Torero indications of infection

This symptoms of Torero detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CZP Trojan Cleaner
Perfect.Keylogger.Lite Spyware Information
Remove Trakia Trojan
SillyDl.ABK Trojan Cleaner
Removing Pigeon.ESG Trojan

Kupa Trojan

Kupa virus description
Technical details:
Categories: Trojan
Kupa Aliases:
[Panda]Trj/Kupa;
[Computer Associates]Kupa.4048!Trojan

Kupa indications of infection

This symptoms of Kupa detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Frethog.AFC Trojan
Backdoor.Transistor Trojan Removal instruction
Bancos.HNE Trojan Removal instruction
Win32.LMR Trojan Removal instruction
Flipped Trojan Removal instruction

Horneyvision BHO

Horneyvision virus description
Technical details:
Categories: BHO

Horneyvision indications of infection

This symptoms of Horneyvision detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ramase Trojan Symptoms
Removing QB2C.Fly Trojan
Bancos.ICL Trojan Information
SdBot.hn Trojan Information
Downloader.AUE.dll Trojan Symptoms

Lirion Trojan

Lirion virus description
Technical details:
Categories: Trojan

Lirion indications of infection

This symptoms of Lirion detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Msnfake Trojan Removal instruction
Removing Plimo Trojan
RBBS Trojan Cleaner
Pigeon.EDG Trojan Removal
Timemark Trojan Removal instruction

VB.tf Trojan

VB.tf virus description
Technical details:
Categories: Trojan

VB.tf Files:
[%WINDOWS%]\win3208160-15319522006.exe
[%WINDOWS%]\win3208160-15319522006.exe


VB.tf indications of infection

This symptoms of VB.tf detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Dowque.ABW Trojan Information
Doped Backdoor Removal
CWS.Winproc32 Hijacker Information
Win95.Tuil Trojan Symptoms
Bancos.HTU Trojan Information

Usekill Trojan

Usekill virus description
Technical details:
Categories: Trojan
Usekill Aliases:
[McAfee]Usekill;
[F-Prot]destructive program;
[Panda]Joker_II;
[Computer Associates]Joker-II,Usekill

Usekill indications of infection

This symptoms of Usekill detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AWIN Trojan Removal instruction
Remove KBL.Webdownloader Downloader
Remove Reflect DoS
Findthewebsiteyouneed Tracking Cookie Symptoms
Clodpuntor Trojan Removal

BAT.Gremlin Trojan

BAT.Gremlin virus description
Technical details:
Categories: Trojan
BAT.Gremlin Aliases:
[Kaspersky]BAT.Grunch.1189;
[Eset]BAT/WaveFunc.Grunch virus;
[Panda]BAT/Grunch;
[Computer Associates]Bat/Grunch

BAT.Gremlin indications of infection

This symptoms of BAT.Gremlin detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
HLLP.Tran Trojan Cleaner
whitepages.com Tracking Cookie Information
Small.dv Trojan Removal
Bancos.GDB Trojan Symptoms
Bancos.HWA Trojan Symptoms

FakeHotmail Trojan

FakeHotmail virus description
Technical details:
Categories: Trojan,Hacker Tool
FakeHotmail Aliases:
[Computer Associates]Win32/FakeHotmail.a!Trojan

FakeHotmail indications of infection

This symptoms of FakeHotmail detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
QB2C.Fly Trojan Information
Pigeon.AHX Trojan Removal
SillyDl.DNM Trojan Symptoms
Remove PSW.QQpass.aj Trojan
Pigeon.AVFU Trojan Cleaner

Dexec Trojan

Dexec virus description
Technical details:
Categories: Trojan

Dexec indications of infection

This symptoms of Dexec detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Popuppers Tracking Cookie Symptoms
Remove Dblheart Trojan
KBMonitor Spyware Removal instruction
SillyDl.BZU Trojan Removal
Squatter Trojan Cleaner

Door Trojan

Door virus description
Technical details:
Categories: Trojan,Backdoor,Hacker Tool
Door Aliases:
[Kaspersky]Backdoor.IcmpRep,Backdoor.InjShell.a,HackTool.Win32.SetDll,Backdoor.G_Door.d;
[Eset]Win32/G_Door.C trojan,Win32/G_Door.C.Server trojan,Win32/G_Door.D.Client trojan;
[Panda]Backdoor Program,Bck/IcmpRep.A,Bck/InjShell.A,HackTool/NetCat.A;
[Computer Associates]Backdoor/IcmpRep!Server,Backdoor/InjShell.a,Backdoor/NC99,Win32.NC99,Backdoor/G_Door

Door indications of infection

This symptoms of Door detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AXV Trojan Removal instruction
Win32.Mooder Trojan Cleaner
ZKeylog Spyware Removal instruction
ValueAd Tracking Cookie Removal
IEAgentDown Downloader Information

QDel65 Trojan

QDel65 virus description
Technical details:
Categories: Trojan
QDel65 Aliases:
[Kaspersky]Trojan.Metahog;
[McAfee]QDel65;
[F-Prot]destructive program;
[Panda]Trj/Qdel65;
[Computer Associates]Metahog!Trojan

QDel65 indications of infection

This symptoms of QDel65 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Truva.Ati Backdoor
Remove wholinked.com Tracking Cookie
Remove Donn.D!downloader Trojan
Remove Bancos.GCJ Trojan
Kidda Adware Removal instruction

PacificPoker Tracking Cookie

PacificPoker virus description
Technical details:
Categories: Tracking Cookie

PacificPoker indications of infection

This symptoms of PacificPoker detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
BlueAngel Trojan Information
TPE Trojan Cleaner
Remove Win32.NetDown Trojan
Removing Bancos.HKR Trojan
Kidda Adware Removal

Schoolbus Backdoor

Schoolbus virus description
Technical details:
Categories: Backdoor,RAT,Hacker Tool
Schoolbus Aliases:
[Kaspersky]Backdoor.SchoolBus.d,Backdoor.SchoolBus.a,Backdoor.SchoolBus.b,Backdoor.SchoolBus.c,Backdoor.SchoolBus.15;
[McAfee]BackDoor-BL;
[F-Prot]security risk or a "backdoor" program,W32/Backdoor.Schoolbus.Client;
[Panda]Bck/Schoolbus.D.I,Backdoor Program,Bck/SchoolBus.B,Backdoor Program.LC,Bck/SchoolBus.E;
[Computer Associates]Backdoor/SchoolBus.d!Client,Backdoor/SchoolBus.A,Backdoor/SchoolBus.B_Client,Backdoor/SchoolBus.15

Schoolbus indications of infection

This symptoms of Schoolbus detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AWGK Trojan Symptoms
QRabid.BTW Trojan Removal
Remove AsbMay Backdoor
Win32.Piaoyes DoS Symptoms
Bancos.HWN Trojan Removal

Revenge.Tunnel.Booter DoS

Revenge.Tunnel.Booter virus description
Technical details:
Categories: DoS

Revenge.Tunnel.Booter indications of infection

This symptoms of Revenge.Tunnel.Booter detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing DoDoor Adware
XCP.Sony.Rootkit.Patch Trojan Removal
Vxd.beep!Trojan Trojan Cleaner
Remove Delf.eg Trojan
Removing PokaPoka Trojan

Wci.z!Intended Trojan

Wci.z!Intended virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Wci.z!Intended Aliases:
[Kaspersky]Intended.gen;
[Panda]JumpOut.169;
[Computer Associates]Xany.160:intended

Wci.z!Intended indications of infection

This symptoms of Wci.z!Intended detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.BBZ Downloader Symptoms
Vxidl.AUM Trojan Cleaner
Removing Ehg.studentuniverse.hitbox Tracking Cookie
TSQL.Viroom Trojan Symptoms
Delf.aeo Downloader Symptoms

SillyDl.DCG Trojan

SillyDl.DCG virus description
Technical details:
Categories: Trojan

SillyDl.DCG indications of infection

This symptoms of SillyDl.DCG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.TrojanDropper.MultiBinder Trojan Cleaner
Red.Swoosh Worm Symptoms
XunLeiBHO Adware Removal
CWS.Winproc32 Hijacker Removal
TrojanDropper.Win32.Delf.af Trojan Information

Smondev Trojan

Smondev virus description
Technical details:
Categories: Trojan

Smondev Files:
[%WINDOWS%]\SecMon.sys
[%WINDOWS%]\SecMon.sys


Smondev indications of infection

This symptoms of Smondev detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.DEQ Downloader Cleaner
Nomad Trojan Information
Win32.Prosiak Trojan Removal
Stoolbar BHO Information
SillyDl.CDL Trojan Removal instruction

PSW.Ghostar Backdoor

PSW.Ghostar virus description
Technical details:
Categories: Backdoor,Hacker Tool
PSW.Ghostar Aliases:
[Panda]Backdoor Program

PSW.Ghostar indications of infection

This symptoms of PSW.Ghostar detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Mooder Trojan Removal
Stardler Trojan Removal
Removing Kaitex Trojan
ChildWebGuardian Spyware Removal instruction
Doped Backdoor Symptoms