Qoologic Trojan

Qoologic virus description
Technical details:
Categories: Trojan,Downloader
Qoologic Aliases:
[Kaspersky]Trojan-Downloader.Win32.Qoologic.at,Trojan-Downloader.Win32.Qoologic.k;
[Other]Win32/Qoologic.AB,adware.QoolAid,Win32/Qoologic.AC,Win32/Qoologic.AE,Adware.QoolAid

Qoologic Files:
[%SYSTEM%]\dmonwv.dll
[%SYSTEM%]\jcjjr.dat
[%WINDOWS%]\unadbeh.exe
[%WINDOWS%]\winskw\jau5055.dat
[%SYSTEM%]\clozcu.dll
[%SYSTEM%]\isawapi32.dll
[%SYSTEM%]\mcamgr.exe
[%SYSTEM%]\NFAUSS.EXE
[%SYSTEM%]\pwbypu.dat
[%WINDOWS%]\cvss.exe
[%WINDOWS%]\ulapi32.dll
[%SYSTEM%]\dmonwv.dll
[%SYSTEM%]\jcjjr.dat
[%WINDOWS%]\unadbeh.exe
[%WINDOWS%]\winskw\jau5055.dat
[%SYSTEM%]\clozcu.dll
[%SYSTEM%]\isawapi32.dll
[%SYSTEM%]\mcamgr.exe
[%SYSTEM%]\NFAUSS.EXE
[%SYSTEM%]\pwbypu.dat
[%WINDOWS%]\cvss.exe
[%WINDOWS%]\ulapi32.dll

Qoologic Registry Keys:
HKEY_LOCAL_MACHINE\software\qstat

Qoologic Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer
HKEY_CLASSES_ROOT\clsid\{bee0b472-c532-4adf-bf3f-b71f8159e0ce}\inprocserver32
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Qoologic indications of infection

This symptoms of Qoologic detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SMS.Max DoS Removal
Sinstod Trojan Cleaner
ATDMT.com Tracking Cookie Information
WinAntiSpywareDown Downloader Removal instruction

SillyDl.CEQ Trojan

SillyDl.CEQ virus description
Technical details:
Categories: Trojan

SillyDl.CEQ indications of infection

This symptoms of SillyDl.CEQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Forced.Entry.Remote.System.Administration Backdoor Symptoms
RelatedLinks Adware Removal

Pigeon.ERQ Trojan

Pigeon.ERQ virus description
Technical details:
Categories: Trojan

Pigeon.ERQ indications of infection

This symptoms of Pigeon.ERQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Atztecmarketing.syscpy Adware Symptoms
Remove FirstLook Spyware
VirusRay Ransomware Removal
Remove SurfAccuracyUpdater Downloader

Donkey.KeyLogger Trojan

Donkey.KeyLogger virus description
Technical details:
Categories: Trojan,Spyware
Donkey.KeyLogger Aliases:
[Kaspersky]TrojanSpy.Win32.Delf.av;
[Panda]Trojan Horse

Donkey.KeyLogger indications of infection

This symptoms of Donkey.KeyLogger detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
AbetterInternet.ImGiant Adware Cleaner
Split.Second Trojan Removal
SysInf Trojan Symptoms

SillyDl.DGG Trojan

SillyDl.DGG virus description
Technical details:
Categories: Trojan

SillyDl.DGG indications of infection

This symptoms of SillyDl.DGG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Keylog.Ezik Spyware Cleaner
Modtool Trojan Removal
CEP Trojan Removal

brightshare.com Tracking Cookie

brightshare.com virus description
Technical details:
Categories: Tracking Cookie

brightshare.com indications of infection

This symptoms of brightshare.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Lookup.Abeb BHO Removal instruction
BettInet Trojan Removal
Lookup.Abeb BHO Removal
Removing Attune Adware
Girc Trojan Information

Data.Coremetrics.com Tracking Cookie

Data.Coremetrics.com virus description
Technical details:
Categories: Tracking Cookie

Data.Coremetrics.com indications of infection

This symptoms of Data.Coremetrics.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Trust.Cleaner Ransomware
Offer.Companion Adware Information
RXToolbar Adware Cleaner

QDel251 Trojan

QDel251 virus description
Technical details:
Categories: Trojan,Hacker Tool
QDel251 Aliases:
[Kaspersky]Trojan.Win32.DelAll.e;
[McAfee]QDel251;
[F-Prot]destructive program;
[Panda]Trj/DelAll.E;
[Computer Associates]Win32.HBombd.10,Win32/Hbombd!Trojan

QDel251 indications of infection

This symptoms of QDel251 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CSS Trojan Symptoms
SillyDl.CJV Downloader Cleaner
Psyber.Streaming.Server RAT Information
VirusRay Ransomware Removal instruction

Backdoor.HacDef Trojan

Backdoor.HacDef virus description
Technical details:
Categories: Trojan,Backdoor
Backdoor.HacDef Aliases:
[Kaspersky]Backdoor.HacDef.073.a;
[Panda]Bck/HacDef.073;
[Computer Associates]Backdoor/Hackdef.A!Server,Win32.HacDef.A

Backdoor.HacDef indications of infection

This symptoms of Backdoor.HacDef detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Zlob.Fam.QualityCodec Trojan Cleaner
Snap Toolbar Removal

Bancos.AEY Trojan

Bancos.AEY virus description
Technical details:
Categories: Trojan

Bancos.AEY indications of infection

This symptoms of Bancos.AEY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.FWI Trojan Removal
DlRhifrem Trojan Cleaner
Remove Win32.Agent.dp Rootkit
Removing SpyAgent Spyware
Web.Specials Adware Removal instruction

DOV Backdoor

DOV virus description
Technical details:
Categories: Backdoor

DOV indications of infection

This symptoms of DOV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Slagent Trojan Symptoms

TrojanSpy.Win32.Briss Spyware

TrojanSpy.Win32.Briss virus description
Technical details:
Categories: Spyware
TrojanSpy.Win32.Briss Aliases:
[Panda]Adware/nCase

TrojanSpy.Win32.Briss indications of infection

This symptoms of TrojanSpy.Win32.Briss detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVLN Trojan Symptoms

Downloader.TV.dll Trojan

Downloader.TV.dll virus description
Technical details:
Categories: Trojan
Downloader.TV.dll Aliases:
[Kaspersky]Trojan-Dropper.Win32.Small.qi;
[McAfee]Downloader-TV.dll;
[Other]W32/Smalldrp.ESC,Troj/Small-QJ

Downloader.TV.dll indications of infection

This symptoms of Downloader.TV.dll detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Loli Trojan

UBend DoS

UBend virus description
Technical details:
Categories: DoS

UBend indications of infection

This symptoms of UBend detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
AFA Internet Enhancement Adware Symptoms

Debase Trojan

Debase virus description
Technical details:
Categories: Trojan

Debase indications of infection

This symptoms of Debase detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.IEV Trojan Information

Iinun Trojan

Iinun virus description
Technical details:
Categories: Trojan
Iinun Aliases:
[Other]Win32/Iinun

Iinun indications of infection

This symptoms of Iinun detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Dlder Trojan
ICQ.Techniques.and.Methods Trojan Removal instruction
ProtectingTool Ransomware Information
Remove IM.Surf.Sentinel Spyware

Mirror Trojan

Mirror virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Mirror Aliases:
[Kaspersky]Mirror.924,Mirror.4130;
[Eset]Mirror.924.A virus;
[McAfee]Univ/f;
[Panda]Mirror.924,Mirror.4130.B;
[Computer Associates]Mirror,PS-MPC

Mirror indications of infection

This symptoms of Mirror detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Lamers.Death Backdoor
Remove Keylogger.King.Free Spyware
Clix0r.exe Trojan Removal
Wazam Adware Removal instruction

Web1.RealTracker.com Tracking Cookie

Web1.RealTracker.com virus description
Technical details:
Categories: Tracking Cookie

Web1.RealTracker.com indications of infection

This symptoms of Web1.RealTracker.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Covesmer Trojan Symptoms
Vividence.Connector BHO Removal
ICQ.House Trojan Removal
Massaker Backdoor Information

Pigeon.AVKV Trojan

Pigeon.AVKV virus description
Technical details:
Categories: Trojan

Pigeon.AVKV indications of infection

This symptoms of Pigeon.AVKV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing LookQuick Toolbar
QaBar BHO Cleaner
SwimSuitNetwork Adware Cleaner
Remove SpySnipe Ransomware
Remove Vxidl.AEH Trojan

DlKaos Trojan

DlKaos virus description
Technical details:
Categories: Trojan

DlKaos indications of infection

This symptoms of DlKaos detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Cheqtwo Ransomware Cleaner

Pigeon.AIK Trojan

Pigeon.AIK virus description
Technical details:
Categories: Trojan

Pigeon.AIK indications of infection

This symptoms of Pigeon.AIK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.KillFiles.bm Trojan Information
Bifrose Trojan Removal instruction
Mirgun Trojan Information
Win32.Elkong Trojan Cleaner
Bowl Trojan Removal instruction

PSW.NetMail Trojan

PSW.NetMail virus description
Technical details:
Categories: Trojan,Hacker Tool
PSW.NetMail Aliases:
[Panda]Trojan Horse;
[Computer Associates]Win32/PSW.NetMail.12!Trojan

PSW.NetMail indications of infection

This symptoms of PSW.NetMail detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Readdev DoS Cleaner

AIM.Pws Backdoor

AIM.Pws virus description
Technical details:
Categories: Backdoor,Hacker Tool

AIM.Pws indications of infection

This symptoms of AIM.Pws detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Vxidl.ACL Trojan
YourSiteBar Adware Removal instruction

Farfli Downloader

Farfli virus description
Technical details:
Categories: Downloader
Farfli Aliases:
[Kaspersky]Trojan-Downloader.Win32.QQHelper.wd,Trojan-Downlaoder.Win32.QQHelper.rb;
[Other]Trojan.Farfli,Downloader

Farfli indications of infection

This symptoms of Farfli detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SWEET.BOX Adware Symptoms
DSK.Lite Spyware Removal instruction

Henuked Trojan

Henuked virus description
Technical details:
Categories: Trojan

Henuked indications of infection

This symptoms of Henuked detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Skyper DoS Cleaner
Banker.anv Spyware Cleaner
Removing PeopleOnPage.AproposMedia BHO
Avalent Trojan Symptoms
Mxkeybd Spyware Information

Errvol Trojan

Errvol virus description
Technical details:
Categories: Trojan

Errvol indications of infection

This symptoms of Errvol detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Norsd Trojan Cleaner
KillProc Trojan Cleaner
Pigeon.AZO Trojan Cleaner

WordMacro.Niki Trojan

WordMacro.Niki virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
WordMacro.Niki Aliases:
[Panda]WM/Niki.A:It;
[Computer Associates]WordMacro/Niki.A

WordMacro.Niki indications of infection

This symptoms of WordMacro.Niki detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.AXI Trojan

Ashley.101a Trojan

Ashley.101a virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Ashley.101a Aliases:
[Eset]Win32/Ashley.101.A trojan;
[Panda]mIRC/Septic.4591.A;
[Computer Associates]Backdoor/Ashley.101a,Win32.Ashley.101.A

Ashley.101a indications of infection

This symptoms of Ashley.101a detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove JoyURLs19 Adware
CWS.ServicesExe Downloader Removal instruction

Delf.ar Backdoor

Delf.ar virus description
Technical details:
Categories: Backdoor

Delf.ar indications of infection

This symptoms of Delf.ar detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Backdoor.Konik Trojan Removal
TrojanDownloader.Win32.Rameh Trojan Removal instruction
Removing Bancos.HTB Trojan
ICQ.House Trojan Removal
Removing SpywareLocker Ransomware