Bancos.HKV Trojan

Bancos.HKV virus description
Technical details:
Categories: Trojan

Bancos.HKV indications of infection

This symptoms of Bancos.HKV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Agent.IWD Trojan Cleaner
Win32.Flooder.MailSpam.VB Trojan Removal

IcQeFlooder Trojan

IcQeFlooder virus description
Technical details:
Categories: Trojan,DoS
IcQeFlooder Aliases:
[Kaspersky]Flooder.ICQ.VB.a;
[Panda]Flooder Program;
[Computer Associates]Win32/Flooder.ICQ.VB.F!Trojan

IcQeFlooder indications of infection

This symptoms of IcQeFlooder detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Antivirus.Protection Ransomware Information
Internet Explorer Settings Hijacker Hijacker Information
DaCryptic Trojan Information

RemoteNC RAT

RemoteNC virus description
Technical details:
Categories: RAT

RemoteNC indications of infection

This symptoms of RemoteNC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Zlob.Fam.HQvideo Trojan
ErrorKiller Ransomware Removal instruction
Remove Win32.FC Trojan

Calimocho Trojan

Calimocho virus description
Technical details:
Categories: Trojan,Hacker Tool
Calimocho Aliases:
[Kaspersky]Trojan-Dropper.Win32.Calimocho;
[Panda]Trj/W32.Chomolica

Calimocho indications of infection

This symptoms of Calimocho detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SearchEnhancement Hijacker Information

Pigeon.BAY Trojan

Pigeon.BAY virus description
Technical details:
Categories: Trojan

Pigeon.BAY indications of infection

This symptoms of Pigeon.BAY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Advanced.Cleaner Ransomware

vegas.com Tracking Cookie

vegas.com virus description
Technical details:
Categories: Tracking Cookie

vegas.com indications of infection

This symptoms of vegas.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Cazdoor.10b Backdoor
StatBlaster Adware Removal
Gigex.SpeedDelivery Hijacker Removal

Alcra.B Worm

Alcra.B virus description
Technical details:
Categories: Worm

Alcra.B Files:
[%PROGRAM_FILES%]\winupdates\winupdates.exe
[%PROGRAM_FILES%]\winupdates\winupdates.exe

Alcra.B Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run


Alcra.B indications of infection

This symptoms of Alcra.B detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Rbot.EGV Trojan Cleaner
Net.Raider Trojan Information
Ezula Adware Removal instruction

Pigeon.ESD Trojan

Pigeon.ESD virus description
Technical details:
Categories: Trojan

Pigeon.ESD indications of infection

This symptoms of Pigeon.ESD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
IamBigBrother Spyware Symptoms
Remove Windows.Remote RAT
Bidpher Trojan Symptoms
Adrem.Free.Remote.Console RAT Removal
Forbot.gen Backdoor Removal

NaughtyPops Adware

NaughtyPops virus description
Technical details:
Categories: Adware

NaughtyPops Files:
[%WINDOWS%]\downloaded program files\ctadl.inf
[%SYSTEM%]\ctadl3.dll
[%WINDOWS%]\downloaded program files\ctadl.inf
[%SYSTEM%]\ctadl3.dll

NaughtyPops Registry Keys:
HKEY_LOCAL_MACHINE\software\apdl
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{87D1A6EF-8CBC-458A-84B5-0333562418CD}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\c:\windows\system32\ctadl3.dll
HKEY_CLASSES_ROOT\clsid\{87d1a6ef-8cbc-458a-84b5-0333562418cd}
HKEY_CLASSES_ROOT\ctadl1.ctadl
HKEY_CLASSES_ROOT\ctadl1.ctadl.1
HKEY_CLASSES_ROOT\ctadl1.ctadlctrl
HKEY_CLASSES_ROOT\ctadl1.ctadlctrl.1
HKEY_CLASSES_ROOT\interface\{07e890e3-ef0c-4ea6-9f79-c5749aca9cc1}
HKEY_CLASSES_ROOT\interface\{96515724-397e-48c7-8974-86c203e666e1}
HKEY_CLASSES_ROOT\typelib\{458be2d9-f8db-43d1-a7ef-73e29c4ef9b6}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{87d1a6ef-8cbc-458a-84b5-0333562418cd}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%SYSTEM%]\ctadl3.dll


NaughtyPops indications of infection

This symptoms of NaughtyPops detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Copy.Cursor Trojan Removal
Kroey Trojan Cleaner
SillyDl.DJA Trojan Symptoms

Explode Trojan

Explode virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Explode Aliases:
[Kaspersky]Trivial.229;
[Panda]Univ;
[Computer Associates]Explode

Explode indications of infection

This symptoms of Explode detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Eye.Candy.Monitor Spyware
Remove VB.ca Trojan
Lifedour Downloader Removal instruction

Unreal Trojan

Unreal virus description
Technical details:
Categories: Trojan,Hacker Tool
Unreal Aliases:
[Kaspersky]Rootkit.Win32.Agent.gv;
[Other]Hacktool.Unreal.A

Unreal indications of infection

This symptoms of Unreal detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Edge.Tech Adware Removal

Pigeon.ARK Trojan

Pigeon.ARK virus description
Technical details:
Categories: Trojan

Pigeon.ARK indications of infection

This symptoms of Pigeon.ARK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Colondoff DoS Symptoms
MskSoftStudy Corp. Trojan Symptoms

Creeper Trojan

Creeper virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Creeper Aliases:
[Kaspersky]Creeper.476,Tormentor.475,ZMT.252,Riot.sUMsDos.472;
[Panda]Creeper.476,Creeper.475.A,ZMT.252,Creeper.482;
[Computer Associates]Creeper,Creeper.294,Creeper 252,Creeper.472

Creeper indications of infection

This symptoms of Creeper detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Zdesnado Downloader Information

Backdoor.VB.ch Trojan

Backdoor.VB.ch virus description
Technical details:
Categories: Trojan,Backdoor
Backdoor.VB.ch Aliases:
[Kaspersky]Backdoor.VB.ch;
[Eset]Win32/VB.CH trojan

Backdoor.VB.ch indications of infection

This symptoms of Backdoor.VB.ch detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Safety Alerter Trojan Symptoms
Lookup.Abeb BHO Removal
Remove AntispywareSuite Ransomware

wieonline.nl Tracking Cookie

wieonline.nl virus description
Technical details:
Categories: Tracking Cookie

wieonline.nl indications of infection

This symptoms of wieonline.nl detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing ExitWin Trojan
Remove Tool.AVExp Trojan
Win32.Revop Trojan Cleaner
Visio5Macro.Kolera Trojan Cleaner

MoSucker.ErEbuS RAT

MoSucker.ErEbuS virus description
Technical details:
Categories: RAT

MoSucker.ErEbuS indications of infection

This symptoms of MoSucker.ErEbuS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Coced Trojan Symptoms
XP.Keylogger Spyware Removal instruction
Clicker.Pcastor Trojan Information

Sabela.com Tracking Cookie

Sabela.com virus description
Technical details:
Categories: Tracking Cookie

Sabela.com indications of infection

This symptoms of Sabela.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ranky.du Trojan Symptoms
Removing Myclap Trojan

PSW.Ldpinch Trojan

PSW.Ldpinch virus description
Technical details:
Categories: Trojan,Hacker Tool
PSW.Ldpinch Aliases:
[Kaspersky]Trojan.PSW.LdPinch.dq;
[Panda]Trj/Ldpinch.gen,Trojan Horse.LC,Trojan Horse;
[Computer Associates]Win32.Elkong.gen,Win32/LDPinch.Variant!Trojan

PSW.Ldpinch indications of infection

This symptoms of PSW.Ldpinch detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VIP.NetLink BHO Information
Remove Fenha Trojan
Brokno Trojan Symptoms
Trojandownloader.win32.small.axo Trojan Removal
Pripi Trojan Removal

nttnavi.co.jp Tracking Cookie

nttnavi.co.jp virus description
Technical details:
Categories: Tracking Cookie

nttnavi.co.jp indications of infection

This symptoms of nttnavi.co.jp detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanDownloader.Win32.IstBar.eo Downloader Information
Bancos.IGL Trojan Removal instruction
Wolfman Trojan Information
StartPage.Sphtml.Troja Trojan Symptoms
Removing Bancos.IJR Trojan