Net.Antrax Backdoor

Net.Antrax virus description
Technical details:
Categories: Backdoor,RAT,Hacker Tool
Net.Antrax Aliases:
[Kaspersky]Backdoor.VB.cp,Backdoor.VB.dl,Backdoor.VB.qc;
[McAfee]Generic BackDoor.b;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/VB.Cp,Hacktool/Traxanet.A,Bck/Net-Xanta.Cli,Bck/Net-Xanta.Srv;
[Computer Associates]Backdoor/VB.cp,Backdoor/Torio.A

Net.Antrax Files:
[%SYSTEM%]\rundll32a.exe
[%WINDOWS%]\installsd.exe
[%SYSTEM%]\rundll32a.exe
[%WINDOWS%]\installsd.exe

Net.Antrax Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run


Net.Antrax indications of infection

This symptoms of Net.Antrax detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Macro Trojan Cleaner

VBS.Trist Trojan

VBS.Trist virus description
Technical details:
Categories: Trojan,Hacker Tool
VBS.Trist Aliases:
[Eset]probably unknown STEALTH.POLY.MACRO virus;
[Panda]Trojan Horse.LC;
[Computer Associates]VBS/Trist!Trojan,W97M/Vovan-Bug.A,Word97Macro/Npr family

VBS.Trist indications of infection

This symptoms of VBS.Trist detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GST Trojan Cleaner
Webdesk Trojan Removal
Remove Keylogger.King Spyware
MagicCenter Trojan Cleaner

realbeer.com Tracking Cookie

realbeer.com virus description
Technical details:
Categories: Tracking Cookie

realbeer.com indications of infection

This symptoms of realbeer.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
OnAlf RAT Information
The.Cow.Remover RAT Cleaner
Remove Grunt Trojan
Ad4All Adware Information

Radlight.PRO Trojan

Radlight.PRO virus description
Technical details:
Categories: Trojan

Radlight.PRO Folders:
[%PROGRAMS%]\radlight llc
[%PROGRAM_FILES%]\radlight
[%PROGRAM_FILES%]\radlight llc

Radlight.PRO Files:
[%PROGRAM_FILES%]\RadLight\Subtitle Studio\Modules\Subtitle1.dll
[%PROGRAM_FILES%]\RadLight\Subtitle Studio\Modules\Subtitle2.dll
[%WINDOWS%]\rluninstall.exe
[%DESKTOP%]\radlight 3 pro.lnk
[%DESKTOP%]\radlight.lnk
[%DESKTOP%]\radlight3se.exe
[%PROFILE%]\my documents\my deliveries\cnet\radlight35se.exe
[%PROFILE_TEMP%]\saveform.exe
[%WINDOWS%]\temp\radlight_336.exe
[%PROGRAM_FILES%]\RadLight\Subtitle Studio\Modules\Subtitle1.dll
[%PROGRAM_FILES%]\RadLight\Subtitle Studio\Modules\Subtitle2.dll
[%WINDOWS%]\rluninstall.exe
[%DESKTOP%]\radlight 3 pro.lnk
[%DESKTOP%]\radlight.lnk
[%DESKTOP%]\radlight3se.exe
[%PROFILE%]\my documents\my deliveries\cnet\radlight35se.exe
[%PROFILE_TEMP%]\saveform.exe
[%WINDOWS%]\temp\radlight_336.exe

Radlight.PRO Registry Keys:
HKEY_CLASSES_ROOT\radlightfile
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\menuorder\start menu2\programs\radlight
HKEY_LOCAL_MACHINE\software\classes\radlightfile\defaulticon
HKEY_LOCAL_MACHINE\software\classes\radlightfile\shell\play
HKEY_LOCAL_MACHINE\software\classes\rpkfile\defaulticon
HKEY_LOCAL_MACHINE\software\classes\rpkfile\shell\install
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app management\arpcache\radlight_is1
HKEY_LOCAL_MACHINE\software\radlight team
HKEY_CURRENT_USER\software\radlight 3 pro
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\radlight
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\radlight 3 pro
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\radlight_is1

Radlight.PRO Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\radlight 3.03 pro
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\radlight 3.03 pro


Radlight.PRO indications of infection

This symptoms of Radlight.PRO detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVOX Trojan Information
Sifrile Trojan Symptoms
ASpam.Drvman RAT Information
Removing Ultimate Defender Ransomware

Win32.Agent.dp Rootkit

Win32.Agent.dp virus description
Technical details:
Categories: Rootkit

Win32.Agent.dp Folders:
[%PROGRAM_FILES%]\superutilbar

Win32.Agent.dp Files:
[%PROFILE_TEMP%]\cel90xbe.sys
[%PROGRAM_FILES%]\superutilbar\superutilbar.dll
[%WINDOWS%]\Temp\cel90xbe.sys
[%PROFILE_TEMP%]\cel90xbe.sys
[%PROGRAM_FILES%]\superutilbar\superutilbar.dll
[%WINDOWS%]\Temp\cel90xbe.sys


Win32.Agent.dp indications of infection

This symptoms of Win32.Agent.dp detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.IMA Trojan Removal instruction
Pigeon.AYZ Trojan Cleaner

PSW.Atrojan Trojan

PSW.Atrojan virus description
Technical details:
Categories: Trojan,Hacker Tool

PSW.Atrojan indications of infection

This symptoms of PSW.Atrojan detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Istbar.dr Downloader Symptoms

BAT.Crodom Trojan

BAT.Crodom virus description
Technical details:
Categories: Trojan
BAT.Crodom Aliases:
[Eset]BAT/Crodom.A virus;
[Panda]BAT/HNY.3350;
[Computer Associates]BAT/Crodom,Bat/HNY

BAT.Crodom indications of infection

This symptoms of BAT.Crodom detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Input.vbs Worm Information

Dipar Trojan

Dipar virus description
Technical details:
Categories: Trojan

Dipar indications of infection

This symptoms of Dipar detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Agent.AFE Trojan Removal
Piutsk Trojan Removal instruction
VB.cr Backdoor Cleaner

Common.Dialogs Adware

Common.Dialogs virus description
Technical details:
Categories: Adware

Common.Dialogs indications of infection

This symptoms of Common.Dialogs detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Keylog.Viewer Spyware
Removing CashSaver Adware
OneClickNetSearch Trojan Information

BugsBunny Trojan

BugsBunny virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
BugsBunny Aliases:
[Kaspersky]BugsBunny.497;
[Eset]Bugs virus;
[Panda]BugsBunny.497;
[Computer Associates]BugsBunny.497

BugsBunny indications of infection

This symptoms of BugsBunny detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MySpaceBar.IE Hijacker Information
FactoryNetwork Adware Removal
Keylogger.King Spyware Removal

Zango.Astrology Adware

Zango.Astrology virus description
Technical details:
Categories: Adware

Zango.Astrology Files:
[%DESKTOP%]\zango astrology.lnk
[%WINDOWS%]\dmrobon.exe
[%DESKTOP%]\zango astrology.lnk
[%WINDOWS%]\dmrobon.exe

Zango.Astrology Registry Keys:
HKEY_CLASSES_ROOT\installer\features\fb4ffbb6ad4dc4a449d65b69bb72499a
HKEY_CLASSES_ROOT\installer\products\fb4ffbb6ad4dc4a449d65b69bb72499a
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{6bbff4bf-d4da-4a4c-946d-b596bb2794a9}

Zango.Astrology Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Zango.Astrology indications of infection

This symptoms of Zango.Astrology detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing DFG Backdoor
Internet Explorer Security Plugin Trojan Removal instruction
Removing Starware BHO
Jinmozhe Trojan Removal instruction

Renos.az Trojan

Renos.az virus description
Technical details:
Categories: Trojan

Renos.az indications of infection

This symptoms of Renos.az detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
YBomber DoS Symptoms
WinADiscount Adware Removal
Vxidl.AFF Trojan Removal
Removing Outwar Trojan

Direxe Trojan

Direxe virus description
Technical details:
Categories: Trojan,Hacker Tool
Direxe Aliases:
[Panda]Trojan Horse,Trj/Direxe.d;
[Computer Associates]Direxe.E!Trojan,Direxe.C!Trojan,Direxe.D!Trojan

Direxe indications of infection

This symptoms of Direxe detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
KillFiles.bx Trojan Removal instruction
Bancos.GKP Trojan Removal

Buschtrommel.Alpha Trojan

Buschtrommel.Alpha virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Buschtrommel.Alpha Aliases:
[Kaspersky]Backdoor.BTNGdoor.10;
[Eset]Win32/BTNGdoor.10 trojan;
[McAfee]BackDoor-PN;
[F-Prot]security risk or a "backdoor" program,virus construction tool

Buschtrommel.Alpha indications of infection

This symptoms of Buschtrommel.Alpha detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CursorCentral Trojan Symptoms
Removing TrojanDownloader.Win32.Tibser Adware
Jpeg2x.dll BHO Symptoms

Vindicator Trojan

Vindicator virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Vindicator Aliases:
[Kaspersky]Vindicator.734;
[Panda]Vindicator;
[Computer Associates]Vindicator

Vindicator indications of infection

This symptoms of Vindicator detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Lineage Trojan Symptoms
Remove HLLP.Eter Trojan
Remove ErrorGuard Ransomware
Progetto1 RAT Removal instruction
PD Adware Removal

SillyDl.CWL Trojan

SillyDl.CWL virus description
Technical details:
Categories: Trojan
SillyDl.CWL Aliases:
[Kaspersky]Trojan-Dropper.Win32.Delf.ev;
[Other]Win32/SillyDl.CWL

SillyDl.CWL indications of infection

This symptoms of SillyDl.CWL detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Zlob.Fam.ToolBar888 Trojan

Trojan.Dropper.Win32.VB.fz Trojan

Trojan.Dropper.Win32.VB.fz virus description
Technical details:
Categories: Trojan
Trojan.Dropper.Win32.VB.fz Aliases:
[Kaspersky]Trojan-Dropper.Win32.VB.fz;
[McAfee]Generic Dropper.I;
[F-Prot]W32/Dropper.NU;
[Other]Hacktool.fresilv,TroJ_VB.V

Trojan.Dropper.Win32.VB.fz indications of infection

This symptoms of Trojan.Dropper.Win32.VB.fz detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Exit.Win.Predator Trojan Information
Removing Cram Toolbar

Agent.hs Trojan

Agent.hs virus description
Technical details:
Categories: Trojan

Agent.hs indications of infection

This symptoms of Agent.hs detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Vxidl.BCD Trojan

SillyDl.DLJ Trojan

SillyDl.DLJ virus description
Technical details:
Categories: Trojan

SillyDl.DLJ indications of infection

This symptoms of SillyDl.DLJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Spyster Spyware Removal instruction
Scoob Trojan Symptoms
SillyDl.CAI Trojan Removal instruction

Remote.Attack.in.Pragma.TelnetServer DoS

Remote.Attack.in.Pragma.TelnetServer virus description
Technical details:
Categories: DoS

Remote.Attack.in.Pragma.TelnetServer indications of infection

This symptoms of Remote.Attack.in.Pragma.TelnetServer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing ProtectionBar Trojan

SillyDl.DGD Trojan

SillyDl.DGD virus description
Technical details:
Categories: Trojan

SillyDl.DGD indications of infection

This symptoms of SillyDl.DGD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Agobot.gen Trojan Removal

Zlob.LAF Trojan

Zlob.LAF virus description
Technical details:
Categories: Trojan,Popups

Zlob.LAF Files:
[%SYSTEM%]\laf14.dll
[%SYSTEM%]\laf43.dll
[%SYSTEM%]\laf83.dll
[%SYSTEM%]\laf14.dll
[%SYSTEM%]\laf43.dll
[%SYSTEM%]\laf83.dll

Zlob.LAF Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{337C54C9-80C1-4de2-93CD-AAA510834074}
HKEY_CLASSES_ROOT\CLSID\{5ADF3862-9E2E-4ad3-86F7-4510E6550CD0}
HKEY_CLASSES_ROOT\CLSID\{8F2183B9-F4DB-4913-8F82-6F9CC42E4CF8}
HKEY_CLASSES_ROOT\CLSID\{FFFGGGGG-GGGG-GGGG-GGGG-GGGGGGGGGGGG}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{337C54C9-80C1-4de2-93CD-AAA510834074}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5ADF3862-9E2E-4ad3-86F7-4510E6550CD0}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8F2183B9-F4DB-4913-8F82-6F9CC42E4CF8}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FFFGGGGG-GGGG-GGGG-GGGG-GGGGGGGGGGGG}


Zlob.LAF indications of infection

This symptoms of Zlob.LAF detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing AMS RAT
Pigeon.EWQ Trojan Removal instruction

IERedir Trojan

IERedir virus description
Technical details:
Categories: Trojan
IERedir Aliases:
[Kaspersky]Trojan.Win32.VB.aji;
[Other]Trojan.Vb.AJI

IERedir indications of infection

This symptoms of IERedir detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PestCapture Ransomware Removal
probably Trojan Removal
OptixKill Trojan Symptoms

Pallbearer.joke Trojan

Pallbearer.joke virus description
Technical details:
Categories: Trojan
Pallbearer.joke Aliases:
[Kaspersky]Trojan.Pall;
[McAfee]Pallbearer joke;
[F-Prot]destructive program;
[Panda]Trj/Pall;
[Computer Associates]Pall!Trojan

Pallbearer.joke indications of infection

This symptoms of Pallbearer.joke detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove web.stat.com Tracking Cookie

TrojanDownloader.Win32.Swizzor.av Downloader

TrojanDownloader.Win32.Swizzor.av virus description
Technical details:
Categories: Downloader
TrojanDownloader.Win32.Swizzor.av Aliases:
[Panda]Adware/Lop

TrojanDownloader.Win32.Swizzor.av indications of infection

This symptoms of TrojanDownloader.Win32.Swizzor.av detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Win32.Maloteya!Worm Trojan
Apher.gen Downloader Cleaner

CWS.XMLMimeFilter Hijacker

CWS.XMLMimeFilter virus description
Technical details:
Categories: Hijacker

CWS.XMLMimeFilter Files:
[%SYSTEM%]\msxmlpp.dll
[%SYSTEM%]\msxmlpp.dll


CWS.XMLMimeFilter indications of infection

This symptoms of CWS.XMLMimeFilter detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SdBot.ar Backdoor

BO2K.plugin.Cast Trojan

BO2K.plugin.Cast virus description
Technical details:
Categories: Trojan,Backdoor
BO2K.plugin.Cast Aliases:
[Eset]Win32/BO2K.Plugin.Cast.G trojan;
[Computer Associates]Backdoor/BO2K.plugin.Cast.g1

BO2K.plugin.Cast indications of infection

This symptoms of BO2K.plugin.Cast detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
JS.Relink Trojan Removal
Win32.Qoologic Trojan Cleaner
VX2 Adware Removal

Toneloc Adware

Toneloc virus description
Technical details:
Categories: Adware,Hacker Tool

Toneloc indications of infection

This symptoms of Toneloc detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Jpeg2x.dll BHO Removal instruction
SystemHelper Trojan Cleaner

Rewdens Trojan

Rewdens virus description
Technical details:
Categories: Trojan

Rewdens indications of infection

This symptoms of Rewdens detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Backdoor.Spigot Backdoor Removal instruction
Pigeon.Graybird Trojan Removal instruction
SpiceGirls Trojan Symptoms

SillyDl.CJY Trojan

SillyDl.CJY virus description
Technical details:
Categories: Trojan

SillyDl.CJY indications of infection

This symptoms of SillyDl.CJY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove InCommand.67b Backdoor
Pigeon.ADI Trojan Symptoms
Keylover Spyware Removal

Win32.Sergnt Trojan

Win32.Sergnt virus description
Technical details:
Categories: Trojan,Backdoor
Win32.Sergnt Aliases:
[Kaspersky]Backdoor.VB.ej;
[Eset]Win32/VB.EJ trojan

Win32.Sergnt indications of infection

This symptoms of Win32.Sergnt detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Slinger Backdoor Removal instruction
Remove Vxidl.AWE Trojan
KD Adware Removal
Removing Mvix Trojan

Flash.Gyorgy Trojan

Flash.Gyorgy virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Flash.Gyorgy Aliases:
[Panda]Gyorgyi;
[Computer Associates]Flash Gyorgy

Flash.Gyorgy indications of infection

This symptoms of Flash.Gyorgy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Webservect Trojan