Banker.CMF Trojan
Technical details:
Categories: Trojan
[Kaspersky]Trojan.Spy.Win32.Banker.cmf;
[McAfee]PWS-Banker.gen.i;
[Other]TrojanSpy:Win32/Banker!41ED
Banker.CMF indications of infection
This symptoms of Banker.CMF detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Manzon Trojan Symptoms
Remove SillyDl.DFR Trojan
SillyDl.CZP Trojan Information
Removing Zlob.ve Downloader
Banker.cn Spyware Symptoms
Bancos.HLN Trojan
Technical details:
Categories: Trojan
Bancos.HLN indications of infection
This symptoms of Bancos.HLN detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Remove Bancos.HAP Trojan
Removing SillyDl.CKO Trojan
V4.login Trojan Removal instruction
BA Trojan Information
Tofger.HookDLL Trojan Symptoms
ServiceDown Downloader
Technical details:
Categories: Downloader
[Kaspersky]Trojan-Downloader.Win32.Agent.aph;
[Other]Downloader
ServiceDown indications of infection
This symptoms of ServiceDown detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Remove SH.Mare Trojan
Flobo.Server Trojan Symptoms
Removing Pigeon.ALV Trojan
Remove Win32.Invictus Trojan
Pigeon.ADH Trojan Information
Pigeon.ESM Trojan
Technical details:
Categories: Trojan
Pigeon.ESM indications of infection
This symptoms of Pigeon.ESM detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Removing Crypt Trojan
Bat2EXE.FormatC Trojan Symptoms
Remove Dream Trojan
kSite Trojan Removal instruction
Bancos.HAK Trojan Symptoms
Scilicet Trojan
Technical details:
Categories: Trojan
[Kaspersky]Backdoor.Win32.Agent.yr,SpamTool.Win32.Agent.i,Trojan-Dropper.Win32.Agent.azs;
[McAfee]Spam-Mailbot;
[Other]Hacktool.Spammer,Win32/Scilicet.H,Win32/Scilicet.K
Scilicet indications of infection
This symptoms of Scilicet detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Del Trojan Information
Backdoor.Kronikal Trojan Information
Remove Belcaro.GoldenRetriever Spyware
Mass.Instant.Messenger Adware Removal instruction
SillyDl.CQP Trojan Cleaner
TFN2K.An.Analysis DoS
Technical details:
Categories: DoS
TFN2K.An.Analysis indications of infection
This symptoms of TFN2K.An.Analysis detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Delf.eg Trojan Removal instruction
Lazy Trojan Information
Removing Bizrate Tracking Cookie
Bridge Trojan Removal
Remove Raw.TCP.Server.Connection RAT
Synrg.Server Trojan
Technical details:
Categories: Trojan,Backdoor
[Eset]Win32/VB.ET trojan;
[Computer Associates]Backdoor/Synrg.Server
Synrg.Server indications of infection
This symptoms of Synrg.Server detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Remove DoDoor Adware
Zonar Trojan Removal instruction
Kronical.Fire RAT Removal instruction
SillyDl.DFR Trojan Removal
SillyDl.CHB Trojan Removal
Vxidl.BES Trojan
Technical details:
Categories: Trojan
Vxidl.BES indications of infection
This symptoms of Vxidl.BES detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Downloader.AUE.dll Trojan Cleaner
Bancos.GCI Trojan Symptoms
Remove ANTIMAC Trojan
Munich Trojan Symptoms
SearchBoss Toolbar Removal
Sponce Trojan
Technical details:
Categories: Trojan
[Other]Win32/Sponce.A
Sponce indications of infection
This symptoms of Sponce detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Travelling.salesman Adware Cleaner
IstBar.az Downloader Removal instruction
PHP.Liquid Trojan Removal
QRabid.BTW Trojan Removal instruction
SillyDl.CBK Trojan Information
Eminem21 Trojan
Technical details:
Categories: Trojan
[Panda]Trj/Enimen.c;
[Computer Associates]Eminem21!Trojan,Enimen.A
Eminem21 indications of infection
This symptoms of Eminem21 detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Wnsock Trojan Symptoms
Removing Pigeon.AVQP Trojan
Bancos.CYZ Trojan Removal instruction
Remove Donn.D!downloader Trojan
Nip Trojan Removal instruction
Storark Trojan
Technical details:
Categories: Trojan
[Kaspersky]Trojan-Spy.Win32.Delf.uv,Trojan-PSW.Win32.OnLineGames.aqn,Trojan-PSW.Win32.OnLineGames.dfs,Trojan-Spy.Win32.Delf.bci,Trojan-PSW.Win32.OnLineGames.dgw,Trojan-Spy.Win32.Delf.aji,Trojan-PSW.Win32.OnLineGames.dsj,Trojan-PSW.Win32.OnLineGames.deg,Trojan-PSW:Win32.OnLineGames.fwv,Trojan-PSW.Win32.OnLineGames.fqm,Trojan-PSW.Win32.OnLineGames.dzp,Trojan-PSW.Win32.OnLineGames.fyp,Trojan-PSW.Win32.OnLineGames.ggn,Trojan-PSW.Win32.OnLineGames.enm,Trojan-PSW.Win32.OnLineGames.giv,Trojan-PWS.Win32.OnLineGames.ggm,Trojan-PSW.Win32.OnLineGames.get,Trojan-PSW.Win32.OnLineGames.fpx,Trojan-PSW.Win32.OnLineGames.fqb,Trojan-PSW.Win32.OnLineGames.fef,Trojan-PSW.Win32.OnLineGames.fpw,Trojan-PSW.Win32o.OnLineGames.ebw,Trojan-Dropper.Win32.Mudrop.fg,Trojan-PSW.Win32.OnLineGames.eax,Trojan-PSW.Win32.OnLineGames.eav,Trojan-PSW.Win32.OnLineGames.dzq,Trojan-PSW.Win32.OnLineGames.hxg,Trojan-PSW.Win32.OnLineGames.hsy;
[McAfee]PWS-OnlineGames.f,PWS-OnlineGames.a.dll,PWS-OnlineGames.i,New Malware.n,New malware.n,PWS-OnlineGames.k.dll;
[Other]Win32/Storark.C,Win32/Storark.AR,Infostealer.Gampass,Win32/Storark.AS,Win32/Storark.AT,Win32/Storark.AU,Infostealer.Gamepass,Win32/Storark.AV,Infostealer.Menghuan,Win32.Storark.AW,Win32/Storark.BB,Win32/Storark,Win32/Storark.BV,Trojan:Win32/Delf.AT!dll,Win32/Storark.BW,Win32/Storark.BX,TSPY_ONLINEG.IRZ,Mal/Delagen-A,Win32/Storark.BZ,W32/Malware.AVHG,Win32/Storark.CA,Win32/Storark!generic,Trojan:Win32/SystemHijack.gen,W32/Malware,Mal/Behav-152,Win32/Storark.CC,W32/OnLineGames.PLZ,W32/OnLineGames.QCZ,TSPY_ONLINEG.LKC,Win32/Storark.CK,W32/Delf.AYBJ,Win32/Storark.CU,W32/Malare.BCGX,Win32/Storark.CW,Trojan:Win32.Delf.AT!dll,W32/Malware.BCFF,W32/Malware.BBNR,Win32/Storark.CT,W32/Malware.BCFW,Win32/Storark.CN,W32/Malware.AZKA,W32/Malware.BCMD,Win32/Storark.CD,W32/Malware.AZEH,TSPY_ONLINEG.IUX,Win32/Storark.CG,W32/Malware.AZDV,Win32/Storark.CI,W32/Malware.AYNM,OnLineGames.gen34,W32/OnLineGames.VBH
Storark Files:
[%SYSTEM%]\avzxain.dll
[%SYSTEM%]\htzmf.log
[%SYSTEM%]\kapjacs.dll
[%SYSTEM%]\kawdacs.dll
[%SYSTEM%]\kawdbzy.dll
[%SYSTEM%]\kvdxacf.dll
[%SYSTEM%]\lktgy.txt
[%SYSTEM%]\raqjani.dll
[%SYSTEM%]\rsjzafg.dll
[%SYSTEM%]\rsmyafg.dll
[%WINDOWS%]\knnte.txt
[%WINDOWS%]\nbqdq.txt
[%SYSTEM%]\avwlain.dll
[%SYSTEM%]\avwlamn.dll
[%SYSTEM%]\avwlast.exe
[%SYSTEM%]\avwldin.dll
[%SYSTEM%]\avwldmn.dll
[%SYSTEM%]\avwldst.exe
[%SYSTEM%]\avzxamn.dll
[%SYSTEM%]\avzxast.exe
[%SYSTEM%]\avzxein.dll
[%SYSTEM%]\avzxemn.dll
[%SYSTEM%]\avzxest.exe
[%SYSTEM%]\caomsnima.dll
[%SYSTEM%]\dhdini.dll
[%SYSTEM%]\dheins.exe
[%SYSTEM%]\dhepri.dll
[%SYSTEM%]\kapjaaz.exe
[%SYSTEM%]\kapjazy.dll
[%SYSTEM%]\kapjdaz.exe
[%SYSTEM%]\kapjdcs.dll
[%SYSTEM%]\kapjdzy.dll
[%SYSTEM%]\kaqhacs.dll
[%SYSTEM%]\kaqhcaz.exe
[%SYSTEM%]\kaqhczy.dll
[%SYSTEM%]\kaqhgaz.exe
[%SYSTEM%]\kaqhgcs.dll
[%SYSTEM%]\kaqhgzy.dll
[%SYSTEM%]\kawdbaz.exe
[%SYSTEM%]\kawdcaz.exe
[%SYSTEM%]\kawdccs.dll
[%SYSTEM%]\kawdczy.dll
[%SYSTEM%]\kvdxbis.exe
[%SYSTEM%]\kvdxbma.dll
[%SYSTEM%]\kvdxgcf.dll
[%SYSTEM%]\kvdxgis.exe
[%SYSTEM%]\kvdxgma.dll
[%SYSTEM%]\kvdxsacf.dll
[%SYSTEM%]\kvdxsais.exe
[%SYSTEM%]\kvdxsama.dll
[%SYSTEM%]\kvdxsfcf.dll
[%SYSTEM%]\kvdxsfis.exe
[%SYSTEM%]\kvdxsfma.dll
[%SYSTEM%]\kvmxfcf.dll
[%SYSTEM%]\kvmxfis.exe
[%SYSTEM%]\kvmxfma.dll
[%SYSTEM%]\mxbcfg.dll
[%SYSTEM%]\mxbman.dll
[%SYSTEM%]\mxbset.exe
[%SYSTEM%]\mygini.dll
[%SYSTEM%]\myhins.exe
[%SYSTEM%]\myhpri.dll
[%SYSTEM%]\qjgpri.dll
[%SYSTEM%]\raqjapi.dll
[%SYSTEM%]\raqjatl.exe
[%SYSTEM%]\rarjani.dll
[%SYSTEM%]\rarjbpi.dll
[%SYSTEM%]\rarjbtl.exe
[%SYSTEM%]\ratbani.dll
[%SYSTEM%]\ratbfpi.dll
[%SYSTEM%]\ratbftl.exe
[%SYSTEM%]\rsjzapm.dll
[%SYSTEM%]\rsjzasp.exe
[%SYSTEM%]\rsmyapm.dll
[%SYSTEM%]\rsmyasp.exe
[%SYSTEM%]\rsmyepm.dll
[%SYSTEM%]\rsmyesp.exe
[%SYSTEM%]\rsmyfpm.dll
[%SYSTEM%]\rsmyfsp.exe
[%SYSTEM%]\rsmygfg.dll
[%SYSTEM%]\rsmygpm.dll
[%SYSTEM%]\rsmygsp.exe
[%SYSTEM%]\rsztffg.dll
[%SYSTEM%]\rsztfpm.dll
[%SYSTEM%]\rsztfsp.exe
[%SYSTEM%]\sidjbaz.exe
[%SYSTEM%]\sidjbcs.dll
[%SYSTEM%]\sidjbzy.dll
[%SYSTEM%]\sqmapi32.dll
[%SYSTEM%]\wggini.dll
[%SYSTEM%]\wggins.exe
[%SYSTEM%]\wggpri.dll
[%SYSTEM%]\wlgini.dll
[%SYSTEM%]\wlhins.exe
[%SYSTEM%]\wlhpri.dll
[%SYSTEM%]\avzxain.dll
[%SYSTEM%]\htzmf.log
[%SYSTEM%]\kapjacs.dll
[%SYSTEM%]\kawdacs.dll
[%SYSTEM%]\kawdbzy.dll
[%SYSTEM%]\kvdxacf.dll
[%SYSTEM%]\lktgy.txt
[%SYSTEM%]\raqjani.dll
[%SYSTEM%]\rsjzafg.dll
[%SYSTEM%]\rsmyafg.dll
[%WINDOWS%]\knnte.txt
[%WINDOWS%]\nbqdq.txt
[%SYSTEM%]\avwlain.dll
[%SYSTEM%]\avwlamn.dll
[%SYSTEM%]\avwlast.exe
[%SYSTEM%]\avwldin.dll
[%SYSTEM%]\avwldmn.dll
[%SYSTEM%]\avwldst.exe
[%SYSTEM%]\avzxamn.dll
[%SYSTEM%]\avzxast.exe
[%SYSTEM%]\avzxein.dll
[%SYSTEM%]\avzxemn.dll
[%SYSTEM%]\avzxest.exe
[%SYSTEM%]\caomsnima.dll
[%SYSTEM%]\dhdini.dll
[%SYSTEM%]\dheins.exe
[%SYSTEM%]\dhepri.dll
[%SYSTEM%]\kapjaaz.exe
[%SYSTEM%]\kapjazy.dll
[%SYSTEM%]\kapjdaz.exe
[%SYSTEM%]\kapjdcs.dll
[%SYSTEM%]\kapjdzy.dll
[%SYSTEM%]\kaqhacs.dll
[%SYSTEM%]\kaqhcaz.exe
[%SYSTEM%]\kaqhczy.dll
[%SYSTEM%]\kaqhgaz.exe
[%SYSTEM%]\kaqhgcs.dll
[%SYSTEM%]\kaqhgzy.dll
[%SYSTEM%]\kawdbaz.exe
[%SYSTEM%]\kawdcaz.exe
[%SYSTEM%]\kawdccs.dll
[%SYSTEM%]\kawdczy.dll
[%SYSTEM%]\kvdxbis.exe
[%SYSTEM%]\kvdxbma.dll
[%SYSTEM%]\kvdxgcf.dll
[%SYSTEM%]\kvdxgis.exe
[%SYSTEM%]\kvdxgma.dll
[%SYSTEM%]\kvdxsacf.dll
[%SYSTEM%]\kvdxsais.exe
[%SYSTEM%]\kvdxsama.dll
[%SYSTEM%]\kvdxsfcf.dll
[%SYSTEM%]\kvdxsfis.exe
[%SYSTEM%]\kvdxsfma.dll
[%SYSTEM%]\kvmxfcf.dll
[%SYSTEM%]\kvmxfis.exe
[%SYSTEM%]\kvmxfma.dll
[%SYSTEM%]\mxbcfg.dll
[%SYSTEM%]\mxbman.dll
[%SYSTEM%]\mxbset.exe
[%SYSTEM%]\mygini.dll
[%SYSTEM%]\myhins.exe
[%SYSTEM%]\myhpri.dll
[%SYSTEM%]\qjgpri.dll
[%SYSTEM%]\raqjapi.dll
[%SYSTEM%]\raqjatl.exe
[%SYSTEM%]\rarjani.dll
[%SYSTEM%]\rarjbpi.dll
[%SYSTEM%]\rarjbtl.exe
[%SYSTEM%]\ratbani.dll
[%SYSTEM%]\ratbfpi.dll
[%SYSTEM%]\ratbftl.exe
[%SYSTEM%]\rsjzapm.dll
[%SYSTEM%]\rsjzasp.exe
[%SYSTEM%]\rsmyapm.dll
[%SYSTEM%]\rsmyasp.exe
[%SYSTEM%]\rsmyepm.dll
[%SYSTEM%]\rsmyesp.exe
[%SYSTEM%]\rsmyfpm.dll
[%SYSTEM%]\rsmyfsp.exe
[%SYSTEM%]\rsmygfg.dll
[%SYSTEM%]\rsmygpm.dll
[%SYSTEM%]\rsmygsp.exe
[%SYSTEM%]\rsztffg.dll
[%SYSTEM%]\rsztfpm.dll
[%SYSTEM%]\rsztfsp.exe
[%SYSTEM%]\sidjbaz.exe
[%SYSTEM%]\sidjbcs.dll
[%SYSTEM%]\sidjbzy.dll
[%SYSTEM%]\sqmapi32.dll
[%SYSTEM%]\wggini.dll
[%SYSTEM%]\wggins.exe
[%SYSTEM%]\wggpri.dll
[%SYSTEM%]\wlgini.dll
[%SYSTEM%]\wlhins.exe
[%SYSTEM%]\wlhpri.dll
Storark Registry Keys:
HKEY_CLASSES_ROOT\clsid\{28907901-1416-3389-9981-372178569982}
HKEY_CLASSES_ROOT\clsid\{e3a77057-d10b-b02a-d823-22e020c583b5}
HKEY_CLASSES_ROOT\clsid\{12faacde-34da-ccd4-ab4d-da34485a3421}
HKEY_CLASSES_ROOT\clsid\{131ab311-16f1-f13b-1e43-11a24b51afd1}
HKEY_CLASSES_ROOT\clsid\{14783410-4f90-34a0-7820-3230acd05f41}
HKEY_CLASSES_ROOT\clsid\{1859245f-345d-bc13-ac4f-145d47da34f1}
HKEY_CLASSES_ROOT\clsid\{18847374-8323-fadc-b443-4732abcd3781}
HKEY_CLASSES_ROOT\clsid\{1960356a-458e-de24-bd50-268f589a56a1}
HKEY_CLASSES_ROOT\clsid\{1a321487-4977-d98a-c8d5-6488257545a1}
HKEY_CLASSES_ROOT\clsid\{1d561258-45f3-a451-f908-a258458226d1}
HKEY_CLASSES_ROOT\clsid\{1e32fa58-3453-fa2d-bc49-f340348acce1}
HKEY_CLASSES_ROOT\clsid\{2231a43a-1642-641a-64fd-146adab223b2}
HKEY_CLASSES_ROOT\clsid\{22faacde-34da-ccd4-ab4d-da34485a3422}
HKEY_CLASSES_ROOT\clsid\{24783410-4f90-34a0-7820-3230acd05f42}
HKEY_CLASSES_ROOT\clsid\{2598ff45-da60-f48a-bc43-10ac47853d52}
HKEY_CLASSES_ROOT\clsid\{28847374-8323-fadc-b443-4732abcd3782}
HKEY_CLASSES_ROOT\clsid\{2960356a-458e-de24-bd50-268f589a56a2}
HKEY_CLASSES_ROOT\clsid\{2a321487-4977-d98a-c8d5-6488257545a2}
HKEY_CLASSES_ROOT\clsid\{2c87a354-abc3-dede-ff33-3213fd7447c2}
HKEY_CLASSES_ROOT\clsid\{37d81718-1314-5200-2597-587901018073}
HKEY_CLASSES_ROOT\clsid\{38907901-1416-3389-9981-372178569983}
HKEY_CLASSES_ROOT\clsid\{3960356a-458e-de24-bd50-268f589a56a3}
HKEY_CLASSES_ROOT\clsid\{3c87a354-abc3-dede-ff33-3213fd7447c3}
HKEY_CLASSES_ROOT\clsid\{3d561258-45f3-a451-f908-a258458226d3}
HKEY_CLASSES_ROOT\clsid\{434345f1-dacf-3452-cb7d-4620f34a1534}
HKEY_CLASSES_ROOT\clsid\{4960356a-458e-de24-bd50-268f589a56a4}
HKEY_CLASSES_ROOT\clsid\{4a321487-4977-d98a-c8d5-6488257545a4}
HKEY_CLASSES_ROOT\clsid\{5182c1eb-375c-573d-1f5e-234552345215}
HKEY_CLASSES_ROOT\clsid\{52311a42-ac1b-158f-fd32-5674345f23a5}
HKEY_CLASSES_ROOT\clsid\{5859245f-345d-bc13-ac4f-145d47da34f5}
HKEY_CLASSES_ROOT\clsid\{5bd41097-3693-4133-820e-fdac57af00e2}
HKEY_CLASSES_ROOT\clsid\{5c87a354-abc3-dede-ff33-3213fd7447c5}
HKEY_CLASSES_ROOT\clsid\{5e32fa58-3453-fa2d-bc49-f340348acce5}
HKEY_CLASSES_ROOT\clsid\{634345f1-dacf-3452-cb7d-4620f34a1536}
HKEY_CLASSES_ROOT\clsid\{66650011-3344-6688-4899-345fabcd1566}
HKEY_CLASSES_ROOT\clsid\{6d47b341-43df-4563-753f-345ffa3157d6}
HKEY_CLASSES_ROOT\clsid\{6d561258-45f3-a451-f908-a258458226d6}
HKEY_CLASSES_ROOT\clsid\{6e32fa58-3453-fa2d-bc49-f340348acce6}
HKEY_CLASSES_ROOT\clsid\{725ab2f3-234a-7469-2f43-e341713abfa7}
HKEY_CLASSES_ROOT\clsid\{74123ff1-8371-9834-9021-184518451fa7}
HKEY_CLASSES_ROOT\clsid\{77d81718-1314-5200-2597-587901018077}
HKEY_CLASSES_ROOT\clsid\{7c87a354-abc3-dede-ff33-3213fd7447c7}
HKEY_CLASSES_ROOT\clsid\{7e32fa58-3453-fa2d-bc49-f340348acce7}
HKEY_CLASSES_ROOT\clsid\{8562452f-fa36-ba4f-892a-ff5fbbac5318}
Storark Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows\appinit_dlls
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
Storark indications of infection
This symptoms of Storark detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
SillyDl.CSI Trojan Cleaner
Small.jf Trojan Removal
Griffe Trojan Cleaner
Bridge Trojan Removal instruction
Remove Pigeon.AXV Trojan
Torero Trojan
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
[Panda]Torero
Torero indications of infection
This symptoms of Torero detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
SillyDl.CZP Trojan Cleaner
Perfect.Keylogger.Lite Spyware Information
Remove Trakia Trojan
SillyDl.ABK Trojan Cleaner
Removing Pigeon.ESG Trojan
Kupa Trojan
Technical details:
Categories: Trojan
[Panda]Trj/Kupa;
[Computer Associates]Kupa.4048!Trojan
Kupa indications of infection
This symptoms of Kupa detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Remove Frethog.AFC Trojan
Backdoor.Transistor Trojan Removal instruction
Bancos.HNE Trojan Removal instruction
Win32.LMR Trojan Removal instruction
Flipped Trojan Removal instruction
Horneyvision BHO
Technical details:
Categories: BHO
Horneyvision indications of infection
This symptoms of Horneyvision detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Ramase Trojan Symptoms
Removing QB2C.Fly Trojan
Bancos.ICL Trojan Information
SdBot.hn Trojan Information
Downloader.AUE.dll Trojan Symptoms
Lirion Trojan
Technical details:
Categories: Trojan
Lirion indications of infection
This symptoms of Lirion detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Msnfake Trojan Removal instruction
Removing Plimo Trojan
RBBS Trojan Cleaner
Pigeon.EDG Trojan Removal
Timemark Trojan Removal instruction
VB.tf Trojan
Technical details:
Categories: Trojan
VB.tf Files:
[%WINDOWS%]\win3208160-15319522006.exe
[%WINDOWS%]\win3208160-15319522006.exe
VB.tf indications of infection
This symptoms of VB.tf detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Dowque.ABW Trojan Information
Doped Backdoor Removal
CWS.Winproc32 Hijacker Information
Win95.Tuil Trojan Symptoms
Bancos.HTU Trojan Information
Usekill Trojan
Technical details:
Categories: Trojan
[McAfee]Usekill;
[F-Prot]destructive program;
[Panda]Joker_II;
[Computer Associates]Joker-II,Usekill
Usekill indications of infection
This symptoms of Usekill detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Pigeon.AWIN Trojan Removal instruction
Remove KBL.Webdownloader Downloader
Remove Reflect DoS
Findthewebsiteyouneed Tracking Cookie Symptoms
Clodpuntor Trojan Removal
BAT.Gremlin Trojan
Technical details:
Categories: Trojan
[Kaspersky]BAT.Grunch.1189;
[Eset]BAT/WaveFunc.Grunch virus;
[Panda]BAT/Grunch;
[Computer Associates]Bat/Grunch
BAT.Gremlin indications of infection
This symptoms of BAT.Gremlin detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
HLLP.Tran Trojan Cleaner
whitepages.com Tracking Cookie Information
Small.dv Trojan Removal
Bancos.GDB Trojan Symptoms
Bancos.HWA Trojan Symptoms
FakeHotmail Trojan
Technical details:
Categories: Trojan,Hacker Tool
[Computer Associates]Win32/FakeHotmail.a!Trojan
FakeHotmail indications of infection
This symptoms of FakeHotmail detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
QB2C.Fly Trojan Information
Pigeon.AHX Trojan Removal
SillyDl.DNM Trojan Symptoms
Remove PSW.QQpass.aj Trojan
Pigeon.AVFU Trojan Cleaner
Dexec Trojan
Technical details:
Categories: Trojan
Dexec indications of infection
This symptoms of Dexec detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Popuppers Tracking Cookie Symptoms
Remove Dblheart Trojan
KBMonitor Spyware Removal instruction
SillyDl.BZU Trojan Removal
Squatter Trojan Cleaner
Door Trojan
Technical details:
Categories: Trojan,Backdoor,Hacker Tool
[Kaspersky]Backdoor.IcmpRep,Backdoor.InjShell.a,HackTool.Win32.SetDll,Backdoor.G_Door.d;
[Eset]Win32/G_Door.C trojan,Win32/G_Door.C.Server trojan,Win32/G_Door.D.Client trojan;
[Panda]Backdoor Program,Bck/IcmpRep.A,Bck/InjShell.A,HackTool/NetCat.A;
[Computer Associates]Backdoor/IcmpRep!Server,Backdoor/InjShell.a,Backdoor/NC99,Win32.NC99,Backdoor/G_Door
Door indications of infection
This symptoms of Door detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Pigeon.AXV Trojan Removal instruction
Win32.Mooder Trojan Cleaner
ZKeylog Spyware Removal instruction
ValueAd Tracking Cookie Removal
IEAgentDown Downloader Information
QDel65 Trojan
Technical details:
Categories: Trojan
[Kaspersky]Trojan.Metahog;
[McAfee]QDel65;
[F-Prot]destructive program;
[Panda]Trj/Qdel65;
[Computer Associates]Metahog!Trojan
QDel65 indications of infection
This symptoms of QDel65 detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Remove Truva.Ati Backdoor
Remove wholinked.com Tracking Cookie
Remove Donn.D!downloader Trojan
Remove Bancos.GCJ Trojan
Kidda Adware Removal instruction
PacificPoker Tracking Cookie
Technical details:
Categories: Tracking Cookie
PacificPoker indications of infection
This symptoms of PacificPoker detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
BlueAngel Trojan Information
TPE Trojan Cleaner
Remove Win32.NetDown Trojan
Removing Bancos.HKR Trojan
Kidda Adware Removal
Schoolbus Backdoor
Technical details:
Categories: Backdoor,RAT,Hacker Tool
[Kaspersky]Backdoor.SchoolBus.d,Backdoor.SchoolBus.a,Backdoor.SchoolBus.b,Backdoor.SchoolBus.c,Backdoor.SchoolBus.15;
[McAfee]BackDoor-BL;
[F-Prot]security risk or a "backdoor" program,W32/Backdoor.Schoolbus.Client;
[Panda]Bck/Schoolbus.D.I,Backdoor Program,Bck/SchoolBus.B,Backdoor Program.LC,Bck/SchoolBus.E;
[Computer Associates]Backdoor/SchoolBus.d!Client,Backdoor/SchoolBus.A,Backdoor/SchoolBus.B_Client,Backdoor/SchoolBus.15
Schoolbus indications of infection
This symptoms of Schoolbus detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Pigeon.AWGK Trojan Symptoms
QRabid.BTW Trojan Removal
Remove AsbMay Backdoor
Win32.Piaoyes DoS Symptoms
Bancos.HWN Trojan Removal
Revenge.Tunnel.Booter DoS
Technical details:
Categories: DoS
Revenge.Tunnel.Booter indications of infection
This symptoms of Revenge.Tunnel.Booter detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Removing DoDoor Adware
XCP.Sony.Rootkit.Patch Trojan Removal
Vxd.beep!Trojan Trojan Cleaner
Remove Delf.eg Trojan
Removing PokaPoka Trojan
Wci.z!Intended Trojan
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
[Kaspersky]Intended.gen;
[Panda]JumpOut.169;
[Computer Associates]Xany.160:intended
Wci.z!Intended indications of infection
This symptoms of Wci.z!Intended detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
SillyDl.BBZ Downloader Symptoms
Vxidl.AUM Trojan Cleaner
Removing Ehg.studentuniverse.hitbox Tracking Cookie
TSQL.Viroom Trojan Symptoms
Delf.aeo Downloader Symptoms
SillyDl.DCG Trojan
Technical details:
Categories: Trojan
SillyDl.DCG indications of infection
This symptoms of SillyDl.DCG detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Win32.TrojanDropper.MultiBinder Trojan Cleaner
Red.Swoosh Worm Symptoms
XunLeiBHO Adware Removal
CWS.Winproc32 Hijacker Removal
TrojanDropper.Win32.Delf.af Trojan Information
Smondev Trojan
Technical details:
Categories: Trojan
Smondev Files:
[%WINDOWS%]\SecMon.sys
[%WINDOWS%]\SecMon.sys
Smondev indications of infection
This symptoms of Smondev detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
SillyDl.DEQ Downloader Cleaner
Nomad Trojan Information
Win32.Prosiak Trojan Removal
Stoolbar BHO Information
SillyDl.CDL Trojan Removal instruction
PSW.Ghostar Backdoor
Technical details:
Categories: Backdoor,Hacker Tool
[Panda]Backdoor Program
PSW.Ghostar indications of infection
This symptoms of PSW.Ghostar detection are the files, registry, and network communication referenced in the technical details section.Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.
Also Be Aware of the Following Threats:
Win32.Mooder Trojan Removal
Stardler Trojan Removal
Removing Kaitex Trojan
ChildWebGuardian Spyware Removal instruction
Doped Backdoor Symptoms