Bancos.CQW Trojan

Bancos.CQW virus description
Technical details:
Categories: Trojan

Bancos.CQW indications of infection

This symptoms of Bancos.CQW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bushtrommel Trojan
Remove Small.kz Trojan
Madjid Trojan Information

MultiBot.Pro Backdoor

MultiBot.Pro virus description
Technical details:
Categories: Backdoor,Hacker Tool
MultiBot.Pro Aliases:
[Kaspersky]Backdoor.DskLite.b;
[Panda]Backdoor Program.LC,Bck/Dsklite.A;
[Computer Associates]Backdoor/DskLite.10.A!Server,Bat/Dsklite!Trojan,Win32.DSKlite.10.A

MultiBot.Pro Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{44bba855-cc51-11cf-bafa-00bb00b6017b}

MultiBot.Pro Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


MultiBot.Pro indications of infection

This symptoms of MultiBot.Pro detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Focalink.com Tracking Cookie Symptoms
Hacker.Wacker Spyware Information
Bancos.GOV Trojan Cleaner
Remove Win32.SMS.Bomber.Troja DoS
SearchBar Trojan Information

Bancos.HNP Trojan

Bancos.HNP virus description
Technical details:
Categories: Trojan

Bancos.HNP indications of infection

This symptoms of Bancos.HNP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Perlovga Trojan
Removing Banhosts Hijacker

SillyDl.CMZ Trojan

SillyDl.CMZ virus description
Technical details:
Categories: Trojan

SillyDl.CMZ indications of infection

This symptoms of SillyDl.CMZ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Lomdoor Backdoor Cleaner
Remove RC5 Trojan
BuddyPicture Spyware Removal

Pigeon.AXM Trojan

Pigeon.AXM virus description
Technical details:
Categories: Trojan

Pigeon.AXM indications of infection

This symptoms of Pigeon.AXM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing WinUpdates.MediaGateway Adware

Reztuto Trojan

Reztuto virus description
Technical details:
Categories: Trojan
Reztuto Aliases:
[Kaspersky]Trojan.Win32.Small.kt;
[Other]Win32/Reztuto.A,Trojan.Goldun

Reztuto Files:
[%SYSTEM%]\swmclip.dll
[%SYSTEM%]\swmclip.dll


Reztuto indications of infection

This symptoms of Reztuto detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Web.Rebates Adware Cleaner
MyNetProtector Trojan Removal

Mallar Trojan

Mallar virus description
Technical details:
Categories: Trojan,Backdoor
Mallar Aliases:
[Kaspersky]Backdoor.Win32.Allaple,Backdoor.Win32.Allaple.a;
[Other]Win32/Mallar,Win32/Mallar.B

Mallar indications of infection

This symptoms of Mallar detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing BL Trojan
Agent.jt Downloader Removal instruction
Perfect.Keylogger.Lite Spyware Cleaner

clickbooth.com Tracking Cookie

clickbooth.com virus description
Technical details:
Categories: Tracking Cookie

clickbooth.com indications of infection

This symptoms of clickbooth.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Tudprie Trojan
Backdoor.DOOR.E!Server Trojan Symptoms

Agent.Vp Trojan

Agent.Vp virus description
Technical details:
Categories: Trojan

Agent.Vp indications of infection

This symptoms of Agent.Vp detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Fujacks.D Worm Removal

Pigeon.AHC Trojan

Pigeon.AHC virus description
Technical details:
Categories: Trojan

Pigeon.AHC indications of infection

This symptoms of Pigeon.AHC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Bancos.IMG Trojan
Remove Implant Trojan
Mr.AntiSpy Adware Removal instruction

backdoor.sdbot.gen Trojan

backdoor.sdbot.gen virus description
Technical details:
Categories: Trojan,Backdoor
backdoor.sdbot.gen Aliases:
[Kaspersky]Backdoor.Win32.SdBot.gen;
[Eset]IRC/SdBot.CGM trojan

backdoor.sdbot.gen indications of infection

This symptoms of backdoor.sdbot.gen detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Emsa.Save.My.Work Spyware Removal instruction
Removing Sync Trojan
XtrmOffer Adware Cleaner
SatWar Trojan Cleaner

Way.10!Server Backdoor

Way.10!Server virus description
Technical details:
Categories: Backdoor

Way.10!Server indications of infection

This symptoms of Way.10!Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Adware.Pribi Adware Information
Nebuler Trojan Symptoms
Tbon Adware Removal instruction

Bancos.GOZ Trojan

Bancos.GOZ virus description
Technical details:
Categories: Trojan

Bancos.GOZ indications of infection

This symptoms of Bancos.GOZ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SpywareSolver Ransomware Symptoms
Small.jf Trojan Information

Moisho Trojan

Moisho virus description
Technical details:
Categories: Trojan
Moisho Aliases:
[Kaspersky]Trojan-Downloader.Win32.Zlob.asz,Trojan-Downloader.Win32.Zlob.jc;
[McAfee]New Malware.aj;
[F-Prot]W32/ZlobX.HMR;
[Other]Win32/Moisho,Win32/Moisho.E,Trojan.Zlob,Win32/Moisho.H,W32/Zlob.HTY,Troj/Zlobol-Gen

Moisho indications of infection

This symptoms of Moisho detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Puper.gen Trojan Information
Supcount Trojan Removal instruction
Win32.Tepille Trojan Removal instruction
PopupWithCast Adware Information
Trojanspy.Win32.Banker Spyware Cleaner

Neuropath Trojan

Neuropath virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Neuropath Aliases:
[Panda]Mnemonix.1057

Neuropath indications of infection

This symptoms of Neuropath detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Connection Trojan Cleaner
Remove Puper.gen Trojan

Bulla Adware

Bulla virus description
Technical details:
Categories: Adware,BHO,Hijacker

Bulla Registry Keys:
HKEY_LOCAL_MACHINE\software\kfh
HKEY_CLASSES_ROOT\clsid\{3e8a1971-45a5-45ee-828b-8c78431c0bd4}
HKEY_CLASSES_ROOT\ieplugin.bitbeamer
HKEY_CLASSES_ROOT\ieplugin.bitbeamerctrl
HKEY_LOCAL_MACHINE\software\ieplugin

Bulla Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\internet explorer\search


Bulla indications of infection

This symptoms of Bulla detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Psyward.Server Trojan
RASetup RAT Removal
Difisim Trojan Symptoms

Small.cl Trojan

Small.cl virus description
Technical details:
Categories: Trojan,Downloader
Small.cl Aliases:
[Panda]Trojan Horse;
[Computer Associates]Win32/Small.cl!Trojan

Small.cl indications of infection

This symptoms of Small.cl detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Offline Adware Cleaner
StartPage.cy Hijacker Removal instruction
RASetup RAT Cleaner

dynamics.de Tracking Cookie

dynamics.de virus description
Technical details:
Categories: Tracking Cookie

dynamics.de indications of infection

This symptoms of dynamics.de detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
YapBrowser Adware Removal
Remove Win32.ExpDwnldr Adware
Vxidl.BEP Trojan Removal

Bancos.GGD Trojan

Bancos.GGD virus description
Technical details:
Categories: Trojan

Bancos.GGD indications of infection

This symptoms of Bancos.GGD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CWS.Ctfmon32 Hijacker Cleaner
Bancos.GSI Trojan Removal
Remove Pigeon.EIU Trojan
Frethog.AEY Trojan Symptoms

LoudMarketing Adware

LoudMarketing virus description
Technical details:
Categories: Adware

LoudMarketing indications of infection

This symptoms of LoudMarketing detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.BDS Trojan Symptoms

Mail.Notify Trojan

Mail.Notify virus description
Technical details:
Categories: Trojan,Backdoor,Hacker Tool
Mail.Notify Aliases:
[Kaspersky]Backdoor.BadCo.10;
[Eset]Win32/BadCo.10.Server trojan;
[McAfee]BadCo;
[F-Prot]destructive program,security risk or a "backdoor" program;
[Panda]Backdoor Program,Bck/BadCo.10;
[Computer Associates]Backdoor/IPnotify!Server,Win32.BadCo.10

Mail.Notify indications of infection

This symptoms of Mail.Notify detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Zlob.Fam.TrueCodec Trojan Removal
KWM Trojan Symptoms

Pigeon.EKP Trojan

Pigeon.EKP virus description
Technical details:
Categories: Trojan

Pigeon.EKP indications of infection

This symptoms of Pigeon.EKP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
InCommand.Server.family Trojan Symptoms
BestPhrases BHO Symptoms
Remove Frethog.AER Trojan
Vxidl.BAW Trojan Symptoms
Removing Remote.Interactive.Command Backdoor

SYS Trojan

SYS virus description
Technical details:
Categories: Trojan,Downloader

SYS indications of infection

This symptoms of SYS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Puppetcorpse Trojan Removal
Serv.5b.Broken.Link.Uploader Trojan Removal instruction
Chat.Watch.LE Spyware Information
Removal.Wizard Adware Removal
Travelling.salesman Adware Removal instruction

ZebraAntivirus Ransomware

ZebraAntivirus virus description
Technical details:
Categories: Ransomware

ZebraAntivirus Folders:
[%APPDATA%]\ZebraAntiVirus
[%COMMON_PROGRAMS%]\ZebraAntiVirus
[%PROGRAM_FILES%]\ZebraAntiVirus
[%PROGRAM_FILES_COMMON%]\ZebraAntiVirus

ZebraAntivirus Files:
[%COMMON_DESKTOPDIRECTORY%]\ZebraAntiVirus.lnk
[%PROFILE_TEMP%]\NI.UGA6P_0001_N122M2210\settings.ini
[%PROFILE_TEMP%]\NI.UGA6P_0001_N122M2210\setup.exe
[%PROFILE_TEMP%]\NI.UGA6P_0001_N122M2210\setup.len
[%COMMON_DESKTOPDIRECTORY%]\ZebraAntiVirus.lnk
[%PROFILE_TEMP%]\NI.UGA6P_0001_N122M2210\settings.ini
[%PROFILE_TEMP%]\NI.UGA6P_0001_N122M2210\setup.exe
[%PROFILE_TEMP%]\NI.UGA6P_0001_N122M2210\setup.len

ZebraAntivirus Registry Keys:
HKEY_CURRENT_USER\software\zebraantivirus
HKEY_LOCAL_MACHINE\software\zebraantivirus

ZebraAntivirus Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\products
HKEY_LOCAL_MACHINE\software\products


ZebraAntivirus indications of infection

This symptoms of ZebraAntivirus detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Aurun Trojan Removal
Remove Opalcot Trojan
KaZaa.Lite Worm Removal

Aoldone Trojan

Aoldone virus description
Technical details:
Categories: Trojan
Aoldone Aliases:
[Panda]Trojan Horse.LC;
[Computer Associates]Aoldone!Trojan

Aoldone indications of infection

This symptoms of Aoldone detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Gator.GAIN.Claria Adware
FileKA Trojan Information
Removing Insi Trojan

Netster.com Tracking Cookie

Netster.com virus description
Technical details:
Categories: Tracking Cookie

Netster.com indications of infection

This symptoms of Netster.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bancos.FTY Trojan
Remove Pigeon.EPC Trojan
Back.Attack Trojan Symptoms
Sysrater Trojan Removal instruction