BackDoor.ANE Trojan

BackDoor.ANE virus description
Technical details:
Categories: Trojan
BackDoor.ANE Aliases:
[McAfee]BackDoor-ANE;
[F-Prot]security risk named W32/BackStealth11.A

BackDoor.ANE indications of infection

This symptoms of BackDoor.ANE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
idot.cz Tracking Cookie Removal instruction

CNK Trojan

CNK virus description
Technical details:
Categories: Trojan,Backdoor,RAT
CNK Aliases:
[Kaspersky]Backdoor.CNK.10;
[Eset]Win32/CNK.A trojan;
[McAfee]BackDoor-AAD;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/CNK.10,Bck/CNK;
[Computer Associates]Backdoor/CNK.A!Server

CNK indications of infection

This symptoms of CNK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PC.MightyMax Adware Information
Remove Career Trojan
Removing Agent.bg Trojan
Wuzhil Trojan Information

Egdi Downloader

Egdi virus description
Technical details:
Categories: Downloader

Egdi indications of infection

This symptoms of Egdi detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Foobot Trojan
Istzone Downloader Removal
Remove Odrtre Trojan

Juctaff Trojan

Juctaff virus description
Technical details:
Categories: Trojan
Juctaff Aliases:
[Kaspersky]Trojan-Downloader.Win32.Agent.ask

Juctaff indications of infection

This symptoms of Juctaff detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Szaprika Trojan Removal
Removing Fax.Free.Pisello Trojan
Removing NetPal.PrizePopper BHO
Remove CWS.DNSErr Hijacker
BookedSpace.Remanent BHO Symptoms

Pigeon.DZW Trojan

Pigeon.DZW virus description
Technical details:
Categories: Trojan

Pigeon.DZW indications of infection

This symptoms of Pigeon.DZW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
QDel4 Trojan Removal instruction
Win95.CIH.int Trojan Removal
Remove Randir.worm Trojan

IVP.April Trojan

IVP.April virus description
Technical details:
Categories: Trojan
IVP.April Aliases:
[Kaspersky]IVP-based;
[Eset]Ivp.April virus;
[McAfee]IVP.April.1646;
[Panda]Univ;
[Computer Associates]IVP based

IVP.April indications of infection

This symptoms of IVP.April detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove NetRadar Spyware
BAT Trojan Information

Pigeon.AVOY Trojan

Pigeon.AVOY virus description
Technical details:
Categories: Trojan

Pigeon.AVOY indications of infection

This symptoms of Pigeon.AVOY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Mytob Worm Information
Teen.Searchbar Toolbar Symptoms
Win32.Grobodor Trojan Symptoms
WWW.smartbargains.com Tracking Cookie Cleaner
Removing TrojanDownloader.Win32.Swizzor.bm Downloader

Small.axk Downloader

Small.axk virus description
Technical details:
Categories: Downloader

Small.axk indications of infection

This symptoms of Small.axk detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
WordMacro.Paper Trojan Cleaner

WishBone BHO

WishBone virus description
Technical details:
Categories: BHO,Hijacker,Toolbar

WishBone Folders:
[%SYSTEM%]\wbm

WishBone Files:
[%SYSTEM%]\minst.dll
[%SYSTEM%]\minst.inf
[%SYSTEM%]\wbm.dll
[%WINDOWS%]\system\minst.dll
[%WINDOWS%]\system\wbm.dll
[%SYSTEM%]\minst.dll
[%SYSTEM%]\minst.inf
[%SYSTEM%]\wbm.dll
[%WINDOWS%]\system\minst.dll
[%WINDOWS%]\system\wbm.dll

WishBone Registry Keys:
HKEY_CLASSES_ROOT\appid\{7f6ed58c-ac98-4233-b3b1-3e42762183c9}
HKEY_CLASSES_ROOT\appid\{b0931261-03c3-4bb3-9ce1-22bfda3af445}
HKEY_CLASSES_ROOT\clsid\{3aa90bc2-58c0-4f4d-a87c-2c6f3d3cd5fe}
HKEY_CLASSES_ROOT\clsid\{4fd85670-606a-42e9-bba5-2bc63493b677}
HKEY_CLASSES_ROOT\clsid\{54a80613-6dd4-4bd3-a804-d3aae3b950c9}
HKEY_CLASSES_ROOT\clsid\{6a1c1772-02b1-476e-a5b4-ec1f54409bd1}
HKEY_CLASSES_ROOT\clsid\{86f4ad51-ee90-409d-944b-fdb0c939b41c}
HKEY_CLASSES_ROOT\clsid\{87b1e57c-ff70-4c69-9ce8-57cb8f67aba8}
HKEY_CLASSES_ROOT\clsid\{b0931261-03c3-4bb3-9ce1-22bfda3af445}
HKEY_CLASSES_ROOT\clsid\{c331bd6e-06ab-41a0-b95f-d7ca379aceaa}
HKEY_CLASSES_ROOT\clsid\{da3db988-d1fb-4919-a684-78e6a5358340}
HKEY_CLASSES_ROOT\clsid\{db2e7bc7-104f-42b5-aae3-921e3057db06}
HKEY_CLASSES_ROOT\clsid\{eaa87376-c391-494e-9da2-2bd9c798e54f}
HKEY_CLASSES_ROOT\clsid\{f78216e3-1e33-44cf-be3e-cbeb074eac24}
HKEY_CLASSES_ROOT\gigel.scriptcallback
HKEY_CLASSES_ROOT\gigel.scriptcallback.1
HKEY_CLASSES_ROOT\interface\{08e62c6d-babd-4be9-a015-ecfe9cc76997}
HKEY_CLASSES_ROOT\interface\{0dfda3c9-01ba-407e-9640-927c9ea56e1f}
HKEY_CLASSES_ROOT\interface\{10b7932b-fced-4b35-b163-8b9685b97ae7}
HKEY_CLASSES_ROOT\interface\{358a1bcc-43f9-48c2-b0e3-0dc770fbf9bc}
HKEY_CLASSES_ROOT\interface\{40930a0f-68cc-4b81-848a-77a78f85fa7b}
HKEY_CLASSES_ROOT\interface\{535dd275-513c-424f-a0be-dea920dba29b}
HKEY_CLASSES_ROOT\interface\{54a80613-6dd4-4bd3-a804-d3aae3b950c9}
HKEY_CLASSES_ROOT\interface\{98c1c8ef-d513-45cb-8a2a-da15a79ec4ad}
HKEY_CLASSES_ROOT\interface\{aeef5ccc-71c7-4053-88a4-6cb87fd4e461}
HKEY_CLASSES_ROOT\interface\{b6ce642a-2171-4661-bb46-aed01c2ed9ec}
HKEY_CLASSES_ROOT\interface\{c90ef72e-2862-4de8-9d30-392bd3f5884b}
HKEY_CLASSES_ROOT\interface\{cc4a4cd1-e441-4a03-941c-e183bce357e7}
HKEY_CLASSES_ROOT\interface\{eec6662f-7ce0-4e53-9e08-98f358b50247}
HKEY_CLASSES_ROOT\interface\{f49eea51-e029-46f1-90ca-460198e7ebb6}
HKEY_CLASSES_ROOT\keys.keywords
HKEY_CLASSES_ROOT\keys.keywords.1
HKEY_CLASSES_ROOT\menucontainer.menuholder
HKEY_CLASSES_ROOT\menucontainer.menuholder.1
HKEY_CLASSES_ROOT\menucontainer.regacess
HKEY_CLASSES_ROOT\menucontainer.regacess.1
HKEY_CLASSES_ROOT\menucontainer.websink
HKEY_CLASSES_ROOT\menucontainer.websink.1
HKEY_CLASSES_ROOT\microinstaller.wbminstaller
HKEY_CLASSES_ROOT\microinstaller.wbminstaller.1
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{3aa90bc2-58c0-4f4d-a87c-2c6f3d3cd5fe}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{c331bd6e-06ab-41a0-b95f-d7ca379aceaa}
HKEY_CLASSES_ROOT\typelib\{10cd7efc-7d1a-4599-ab49-9249c714b87c}
HKEY_CLASSES_ROOT\typelib\{360fff56-cb6b-4a67-915c-1bd9c7712f15}
HKEY_CLASSES_ROOT\typelib\{b004262d-5762-4daa-a222-3b9a738c83ea}
HKEY_CLASSES_ROOT\typelib\{f54903a4-b2da-4c02-ae72-8fa8373c3804}
HKEY_CLASSES_ROOT\wbm.atlbrcon
HKEY_CLASSES_ROOT\wbm.atlbrcon.1
HKEY_CLASSES_ROOT\wbm.explorerbar
HKEY_CLASSES_ROOT\wbm.explorerbar.1
HKEY_CLASSES_ROOT\wbm.webmonitor
HKEY_CLASSES_ROOT\wbm.webmonitor.1
HKEY_CLASSES_ROOT\wbmbar.viewsource
HKEY_CLASSES_ROOT\wbmbar.viewsource.1
HKEY_CLASSES_ROOT\wbmbar.wbmtoolbar
HKEY_CLASSES_ROOT\wbmbar.wbmtoolbar.1
HKEY_CLASSES_ROOT\wbmxpcolors.xpcolors
HKEY_CLASSES_ROOT\wbmxpcolors.xpcolors.1
HKEY_CURRENT_USER\software\wishbone media
HKEY_LOCAL_MACHINE\software\classes\clsid\{3aa90bc2-58c0-4f4d-a87c-2c6f3d3cd5fe}
HKEY_LOCAL_MACHINE\software\classes\clsid\{87b1e57c-ff70-4c69-9ce8-57cb8f67aba8}
HKEY_LOCAL_MACHINE\software\classes\clsid\{c331bd6e-06ab-41a0-b95f-d7ca379aceaa}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{3aa90bc2-58c0-4f4d-a87c-2c6f3d3cd5fe}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{3aa90bc2-58c0-4f4d-a87c-2c6f3d3cd5fe}\contains
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{3aa90bc2-58c0-4f4d-a87c-2c6f3d3cd5fe}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{c331bd6e-06ab-41a0-b95f-d7ca379aceaa}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\setup\optionalcomponents\wbm
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\wbinstaller
HKEY_LOCAL_MACHINE\software\wbinstaller
HKEY_LOCAL_MACHINE\software\wishbone media

WishBone Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\abouturls
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar


WishBone indications of infection

This symptoms of WishBone detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Zlob.Fam.Online Add-on Trojan Removal

JU Adware

JU virus description
Technical details:
Categories: Adware,Downloader

JU indications of infection

This symptoms of JU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Donise Trojan Removal
Remove Beyond.telecom Adware
SpywareRemover Ransomware Cleaner
AntiLamer Trojan Cleaner

TopRebates Adware

TopRebates virus description
Technical details:
Categories: Adware
TopRebates Aliases:
[Kaspersky]TrojanClicker.Win32.Delf.z,TrojanDownloader.Win32.Agent.y,TrojanSpy.Win32.Spung.a;
[Panda]Adware/TopRebates,Trojan Horse

TopRebates Files:
[%PROFILE_TEMP%]\djtopr1150.exe
[%PROFILE_TEMP%]\temp.fr????\websrebates\Images\topr_c_hdr_autotrack_remove.gif
[%PROFILE_TEMP%]\temp.fr????\websrebates\Images\topr_c_hdr_settings.gif
[%PROFILE_TEMP%]\temp.fr????\websrebates\Images\topr_c_pop_circles_bg2.gif
[%PROGRAM_FILES%]\Rebate_Nation\Sy5300\Sy5300\5300_1.dat
[%SYSTEM%]\FWNToolbar.dll.manifest
[%WINDOWS%]\345a8.exe
[%WINDOWS%]\artmmp.ini
[%WINDOWS%]\neti.dll
[%SYSTEM%]\webrebates.exe
[%WINDOWS%]\cache371\b_371_0_1_501300.htm
[%WINDOWS%]\cache371\b_371_0_1_569200.htm
[%WINDOWS%]\cache371\b_371_0_1_582200.htm
[%PROFILE_TEMP%]\djtopr1150.exe
[%PROFILE_TEMP%]\temp.fr????\websrebates\Images\topr_c_hdr_autotrack_remove.gif
[%PROFILE_TEMP%]\temp.fr????\websrebates\Images\topr_c_hdr_settings.gif
[%PROFILE_TEMP%]\temp.fr????\websrebates\Images\topr_c_pop_circles_bg2.gif
[%PROGRAM_FILES%]\Rebate_Nation\Sy5300\Sy5300\5300_1.dat
[%SYSTEM%]\FWNToolbar.dll.manifest
[%WINDOWS%]\345a8.exe
[%WINDOWS%]\artmmp.ini
[%WINDOWS%]\neti.dll
[%SYSTEM%]\webrebates.exe
[%WINDOWS%]\cache371\b_371_0_1_501300.htm
[%WINDOWS%]\cache371\b_371_0_1_569200.htm
[%WINDOWS%]\cache371\b_371_0_1_582200.htm

TopRebates Registry Keys:
HKEY_CURRENT_USER\software\microsoft\internet explorer\menuext\web rebates

TopRebates Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


TopRebates indications of infection

This symptoms of TopRebates detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MailFlash Trojan Cleaner
Windows.AdStatus Adware Information
Vxidl.AGQ Trojan Removal

WinWhatWhere Spyware

WinWhatWhere virus description
Technical details:
Categories: Spyware

WinWhatWhere Folders:
[%APPDATA%]\tam

WinWhatWhere Files:
[%SYSTEM%]\ImgX4.dll
[%DESKTOP%]\investigator reports.lnk
[%DESKTOP%]\investigator setup.lnk
[%DESKTOP%]\tamsetup.exe
[%DESKTOP%]\trueactive setup.lnk
[%PROFILE%]\recent\tamsetup.lnk
[%PROGRAM_FILES%]\tam\tamrpt.exe
[%PROGRAM_FILES%]\tam\tamset.exe
[%SYSTEM%]\olbe\msdfcng.exe
[%SYSTEM%]\olbe\updsem.exe
[%SYSTEM%]\olbe\windsdoc8.sys
[%SYSTEM%]\olbe\winsdoc16.sys
[%SYSTEM%]\olbe\winsdoc32.sys
[%SYSTEM%]\olbe\winsutl.sys
[%WINDOWS%]\fonts\afbloc.dat
[%SYSTEM%]\ImgX4.dll
[%DESKTOP%]\investigator reports.lnk
[%DESKTOP%]\investigator setup.lnk
[%DESKTOP%]\tamsetup.exe
[%DESKTOP%]\trueactive setup.lnk
[%PROFILE%]\recent\tamsetup.lnk
[%PROGRAM_FILES%]\tam\tamrpt.exe
[%PROGRAM_FILES%]\tam\tamset.exe
[%SYSTEM%]\olbe\msdfcng.exe
[%SYSTEM%]\olbe\updsem.exe
[%SYSTEM%]\olbe\windsdoc8.sys
[%SYSTEM%]\olbe\winsdoc16.sys
[%SYSTEM%]\olbe\winsdoc32.sys
[%SYSTEM%]\olbe\winsutl.sys
[%WINDOWS%]\fonts\afbloc.dat

WinWhatWhere Registry Keys:
HKEY_CLASSES_ROOT\.sem
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app paths\msdfcng.exe


WinWhatWhere indications of infection

This symptoms of WinWhatWhere detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Small.cs Downloader

Exitexchange Tracking Cookie

Exitexchange virus description
Technical details:
Categories: Tracking Cookie

Exitexchange indications of infection

This symptoms of Exitexchange detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Flyswat Adware Removal
Benuti.F!downloader Trojan Removal

hxtrack.com Tracking Cookie

hxtrack.com virus description
Technical details:
Categories: Tracking Cookie

hxtrack.com indications of infection

This symptoms of hxtrack.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Net.trash RAT Information
Ezibot Trojan Removal instruction
Invisible.Activity.Spy Spyware Information
SpyShredder Ransomware Symptoms

Pigeon.AVLD Trojan

Pigeon.AVLD virus description
Technical details:
Categories: Trojan

Pigeon.AVLD indications of infection

This symptoms of Pigeon.AVLD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Szaprika Trojan
Pigeon.AFV Trojan Symptoms

CAG Backdoor

CAG virus description
Technical details:
Categories: Backdoor

CAG indications of infection

This symptoms of CAG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Push Trojan Cleaner
HuntBar.BTIn Hijacker Information
SinCity Adware Symptoms
Backdoor.TheInf Backdoor Removal
Bancos.HSF Trojan Information

Bancos.FUO Trojan

Bancos.FUO virus description
Technical details:
Categories: Trojan

Bancos.FUO indications of infection

This symptoms of Bancos.FUO detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
QRabid.Mega Trojan Removal

Bachdoor.Coldfuson Backdoor

Bachdoor.Coldfuson virus description
Technical details:
Categories: Backdoor
Bachdoor.Coldfuson Aliases:
[Panda]Backdoor Program

Bachdoor.Coldfuson indications of infection

This symptoms of Bachdoor.Coldfuson detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.TrojanDownloader.PurityScan Trojan Information
Removing Advanced.Remote.Info RAT

Pigeon.AWHV Trojan

Pigeon.AWHV virus description
Technical details:
Categories: Trojan

Pigeon.AWHV indications of infection

This symptoms of Pigeon.AWHV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.APR Trojan Information
Removing Xlocator.Winlocator Adware

martindale.spp.com Tracking Cookie

martindale.spp.com virus description
Technical details:
Categories: Tracking Cookie

martindale.spp.com indications of infection

This symptoms of martindale.spp.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove FindFM Adware
Removing Offer.Companion Adware

TinyKL Trojan

TinyKL virus description
Technical details:
Categories: Trojan

TinyKL indications of infection

This symptoms of TinyKL detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CMD Backdoor Cleaner

Pigeon.AIS Trojan

Pigeon.AIS virus description
Technical details:
Categories: Trojan

Pigeon.AIS indications of infection

This symptoms of Pigeon.AIS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.AUF Trojan
Luzak Trojan Removal
Bancos.DBQ Trojan Removal instruction

Bancos.HON Trojan

Bancos.HON virus description
Technical details:
Categories: Trojan

Bancos.HON indications of infection

This symptoms of Bancos.HON detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Globobank Trojan Information
HBJ Backdoor Information
Removing Pigeon.AVOD Trojan
Remove navrcholu.cz Tracking Cookie

Pigeon.AVPS Trojan

Pigeon.AVPS virus description
Technical details:
Categories: Trojan

Pigeon.AVPS indications of infection

This symptoms of Pigeon.AVPS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Oneraw Trojan Cleaner

Agent.kt Downloader

Agent.kt virus description
Technical details:
Categories: Downloader

Agent.kt indications of infection

This symptoms of Agent.kt detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Estalive Adware Removal instruction
Bancos.GRO Trojan Cleaner

Sendmail Trojan

Sendmail virus description
Technical details:
Categories: Trojan,Hacker Tool,DoS

Sendmail indications of infection

This symptoms of Sendmail detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Nebuler Trojan Cleaner
DaCryptic Trojan Information

VBS.Winshow Trojan

VBS.Winshow virus description
Technical details:
Categories: Trojan

VBS.Winshow indications of infection

This symptoms of VBS.Winshow detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SillyDl.DGT Trojan
Removing SillyDl.DCB Downloader
Win32.PSW.Delf Trojan Removal instruction

XXXToolBar BHO

XXXToolBar virus description
Technical details:
Categories: BHO,Toolbar,Downloader
XXXToolBar Aliases:
[Panda]Spyware/Dyfuca

XXXToolBar Files:
[%WINDOWS%]\downloaded program files\conflict.1\toolbar_nieuw13.dll
[%WINDOWS%]\downloaded program files\conflict.1\toolbar_nieuw13.dll

XXXToolBar Registry Keys:
HKEY_CLASSES_ROOT\clsid\{018b7ec3-eeca-11d3-8e71-0000e82c6c0d}

XXXToolBar Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\internet settings\zonemap\domains\xxxtoolbar.com
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion


XXXToolBar indications of infection

This symptoms of XXXToolBar detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GAU Trojan Removal instruction
Moron Trojan Cleaner
Sub7Finder Backdoor Information
Key.Captor Spyware Removal
Remove HTTP.Components Downloader

Gilza Trojan

Gilza virus description
Technical details:
Categories: Trojan

Gilza indications of infection

This symptoms of Gilza detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.IME Trojan Information

SillyDl.DFI Trojan

SillyDl.DFI virus description
Technical details:
Categories: Trojan

SillyDl.DFI indications of infection

This symptoms of SillyDl.DFI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
RemoteNC RAT Information
Vxidl.BAY Trojan Cleaner
Remove BleemFake Trojan

Bancos.CYQ Trojan

Bancos.CYQ virus description
Technical details:
Categories: Trojan

Bancos.CYQ indications of infection

This symptoms of Bancos.CYQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove StartPage.ef Trojan
Stats.webtrendslive.Tracking.Cookie Tracking Cookie Cleaner

For.Guest Trojan

For.Guest virus description
Technical details:
Categories: Trojan

For.Guest indications of infection

This symptoms of For.Guest detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing TrojanDownloader.Win32.Perfiler Adware