Matefinder Trojan

Matefinder virus description
Technical details:
Categories: Trojan

Matefinder indications of infection

This symptoms of Matefinder detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
scapur Trojan Removal instruction
AsbMay Backdoor Removal
Bifrost Trojan Removal
Remove Black.Box7 Spyware
Win32.KillFiles.cf Trojan Information

Vxidl.ASI Trojan

Vxidl.ASI virus description
Technical details:
Categories: Trojan

Vxidl.ASI indications of infection

This symptoms of Vxidl.ASI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Cram Toolbar
Bancos.GHJ Trojan Removal
Removing SideStep Adware

Freddy.ASE RAT

Freddy.ASE virus description
Technical details:
Categories: RAT

Freddy.ASE Files:
[%WINDOWS%]\wintool.exe
[%WINDOWS%]\wintool.exe

Freddy.ASE Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Freddy.ASE indications of infection

This symptoms of Freddy.ASE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Listolf Trojan

Father.Mac Trojan

Father.Mac virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Father.Mac Aliases:
[Kaspersky]LAVI.836.a,LAVI.836.b,LAVI.789,LAVI.1445,LAVI.1470,LAVI.1495,LAVI.1496,LAVI-based,LAVI.Cough.1437,LAVI.Cough.1446,LAVI.Cough.1534,LAVI.Cough.1622,LAVI.Cough.1495,LAVI.Cris.1531,LAVI.Cris.1494,LAVI.Feel.1538;
[Eset]Fath_Mac.836.A virus;
[McAfee]Univ/r;
[F-Prot]Father_Mac.836;
[Panda]Lavi_1.836,Lavi_1.789,Lavi_1.1445,Lavi_1.1470,Lavi_1.1495,Lavi_1.1496,Father_Mac.784,Lavi_1.1494;
[Computer Associates]Father_Mac.794/833/836,Father_Mac.1445,Father_Mac.1740,Father_Mac.1495.A,Father_Mac.784

Father.Mac indications of infection

This symptoms of Father.Mac detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.ACA Trojan Information
Strobxe Trojan Information
Removing BJCG Spyware

Bancos.HRZ Trojan

Bancos.HRZ virus description
Technical details:
Categories: Trojan
Bancos.HRZ Aliases:
[Kaspersky]Trojan-Spy.Win32.Banker.tw;
[McAfee]PWS-Banker.gen.h;
[Other]Win32/Bancos.HRZ,W32/Banker.BLRM,Troj/Bancban-PX

Bancos.HRZ Files:
[%WINDOWS%]\lnk_dados_1.dll
[%WINDOWS%]\Media\w7zip.exe
[%WINDOWS%]\lnk_dados_1.dll
[%WINDOWS%]\Media\w7zip.exe

Bancos.HRZ Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Bancos.HRZ indications of infection

This symptoms of Bancos.HRZ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Zhong Adware
KeenValue.Incredifind Hijacker Symptoms
Don't Trojan Removal instruction

Bancos.AGF Trojan

Bancos.AGF virus description
Technical details:
Categories: Trojan

Bancos.AGF indications of infection

This symptoms of Bancos.AGF detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EYK Trojan Information

Glimp Trojan

Glimp virus description
Technical details:
Categories: Trojan,Worm
Glimp Aliases:
[Panda]Trj/Mmxwin;
[Computer Associates]Win32.Glimp,Win32/WinMX!Trojan

Glimp indications of infection

This symptoms of Glimp detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SillyDl.CNM Trojan
Removing SubSeven.Speech Trojan
Fermif.BIA Trojan Removal

Tesllar Trojan

Tesllar virus description
Technical details:
Categories: Trojan

Tesllar indications of infection

This symptoms of Tesllar detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PWS.Barok.gen Trojan Information
Rolepi Trojan Symptoms
AA Trojan Removal

Vxidl.AJL Trojan

Vxidl.AJL virus description
Technical details:
Categories: Trojan

Vxidl.AJL indications of infection

This symptoms of Vxidl.AJL detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Webroot Trojan Cleaner
SillyDl.CLC Trojan Removal instruction
JanNet Spyware Removal instruction

SillyDl.CID Downloader

SillyDl.CID virus description
Technical details:
Categories: Downloader
SillyDl.CID Aliases:
[Kaspersky]Trojan-Downloader.Win32.Small.dge;
[McAfee]Generic Downloader.az;
[Other]Win32/SillyDl.CID

SillyDl.CID indications of infection

This symptoms of SillyDl.CID detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EWJ Trojan Removal
Director Adware Symptoms

Weird.joke Trojan

Weird.joke virus description
Technical details:
Categories: Trojan

Weird.joke indications of infection

This symptoms of Weird.joke detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Husrtdo Trojan Symptoms
Slow Trojan Removal
Remove Gogfeed Trojan

Win32.VB.bd Trojan

Win32.VB.bd virus description
Technical details:
Categories: Trojan
Win32.VB.bd Aliases:
[Panda]Trojan Horse

Win32.VB.bd indications of infection

This symptoms of Win32.VB.bd detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Agent.li Downloader

Stration!generic Trojan

Stration!generic virus description
Technical details:
Categories: Trojan

Stration!generic indications of infection

This symptoms of Stration!generic detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Balloon.Pop.Word.Game Trojan Symptoms

Pigeon.ENN Trojan

Pigeon.ENN virus description
Technical details:
Categories: Trojan

Pigeon.ENN indications of infection

This symptoms of Pigeon.ENN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
small.qn Trojan Cleaner
Removing Bbmao Toolbar

VBS.BackdoorPing Trojan

VBS.BackdoorPing virus description
Technical details:
Categories: Trojan,Backdoor,DoS
VBS.BackdoorPing Aliases:
[Kaspersky]Backdoor.FlyAgent.a,Trojan.VBS.Lava,Trojan.Win32.VB.hs,TrojanDropper.DOS.Mypic,Backdoor.Netbus.160.a,Trojan.Win32.StartPage.ix,Trojan.BAT.Nonstop.a,TrojanDownloader.Win32.Small.al,TrojanDownloader.Win32.Turown.a,TrojanDownloader.Win32.Wintrim.az,TrojanDownloader.Win32.Wintrim.bu,TrojanDownloader.Win32.Agent.ad,TrojanDownloader.Win32.Wintrim.ba,Backdoor.Xeol.a,Trojan.VBS.Lamping,Backdoor.Thunk.e,Trojan.Win32.StartPage.np,Trojan-Downloader.Win32.IstBar.gen,Trojan.Win32.Small.i,TrojanProxy.Win32.Delf.h;
[Eset]Win32/Flyagent.A trojan,Mypic trojan,Win32/TrojanDownloader.Wintrim.BU trojan,Win32/TrojanDownloader.Agent.AD trojan,Win32/TrojanDownloader.Wintrim.BA trojan,IRC/Mimic.B trojan,Win32/Thunk.E trojan,Win32/TrojanDownloader.Wintrim.AC trojan;
[McAfee]NetBusPro.dr,Netbus,Bat/tf;
[F-Prot]destructive program,W32/NetBus.backdoor.567296;
[Panda]BAT/Muma,VBS/Trojan.Lava,Trj/NotepaDLL.A,Trj/DOS.Mypic,Trj/Passer.J,Trj/Netbus.160,Trj/StartPage.FH,Trojan Horse.LC,Adware/Look2Me,Dialer.LS,Dialer.B,Trj/Legmir.gen,Trj/StartPage.EB,Spyware/Omi,W32/Randon.CL.worm;
[Computer Associates]VBS/BackdoorPing!Trojan,VBS/BackdoorPing.Trojan,VBS.DoS.Soldier,Backdoor/FlyAgent,Win32.FlyAgent.A,VBS/Dome!Worm,VBS.Dome,Win32/DllFlood!Trojan,Win32.DllFlood.A,MyPics!Dropper,MyPics.Dropper,Bat/Flood.C!Trojan,BAT.IRCFlood,Backdoor/Netbus!Server,Win32.Netbus.160,Bat/Lameness!Trojan,BAT.Nonstop.A,Win32/SearchBar.sb!Downloader,Win32.Startpage.JK!downloader,Win32/StartPage.JG!DLL!Trojan,Win32.Startpage.JG,Win32/Wintrim.BU!Trojan,Win32.Wintrim.AO,Win32/Lemir.27220!DLL!Trojan,Win32.Lemir.BD,Win32/DlMersting.CG!Trojan,Win32.Startpage.FZ

VBS.BackdoorPing Files:
[%PROFILE_TEMP%]\ICD1.tmp\SearchInstall3.exe
[%PROFILE_TEMP%]\ICD3.tmp\SearchInstall3.exe
[%SYSTEM%]\dailytoolbar.dll
[%SYSTEM%]\msedpb.exe
[%SYSTEM%]\x.bat
[%SYSTEM%]\___synmgr.exe
[%WINDOWS%]\Downloaded Program Files\OSD1C03.OSD
[%WINDOWS%]\___n.EXE
[%PROFILE_TEMP%]\ICD1.tmp\SearchInstall3.exe
[%PROFILE_TEMP%]\ICD3.tmp\SearchInstall3.exe
[%SYSTEM%]\dailytoolbar.dll
[%SYSTEM%]\msedpb.exe
[%SYSTEM%]\x.bat
[%SYSTEM%]\___synmgr.exe
[%WINDOWS%]\Downloaded Program Files\OSD1C03.OSD
[%WINDOWS%]\___n.EXE

VBS.BackdoorPing Registry Keys:
HKEY_CLASSES_ROOT\appid\{951b3138-ae8e-4676-a05a-250a5f111631}
HKEY_CLASSES_ROOT\CLSID\{58F9B276-E1CC-458e-8159-21CBC021874B}
HKEY_CLASSES_ROOT\CLSID\{8333C319-0669-4893-A418-F56D9249FCA6}
HKEY_CLASSES_ROOT\dailytoolbar.ieband
HKEY_CLASSES_ROOT\dailytoolbar.sysmgr
HKEY_CLASSES_ROOT\ietoolbar.affiliatectl
HKEY_CLASSES_ROOT\interface\{10195311-e434-47a9-adba-48839e3f7e4e}
HKEY_CLASSES_ROOT\interface\{abafa0b4-f78d-42e5-8c31-1a441d01c1df}
HKEY_CURRENT_USER\software\nix solutions\dailytoolbar
HKEY_LOCAL_MACHINE\software\classes\clsid\{8333c319-0669-4893-a418-f56d9249fca6}
HKEY_LOCAL_MACHINE\SOFTWARE\DailyToolbar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\dailytoolbar
HKEY_LOCAL_MACHINE\software\nix solutions\dailytoolbar


VBS.BackdoorPing indications of infection

This symptoms of VBS.BackdoorPing detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
HLLP.Nutmeg Trojan Cleaner

CEP Trojan

CEP virus description
Technical details:
Categories: Trojan,Backdoor
CEP Aliases:
[Eset]Win32/Bifrose.A trojan;
[Computer Associates]Backdoor/CEP

CEP Files:
[%SYSTEM%]\plugin1.dat
[%SYSTEM%]\plugin1.dat

CEP Registry Keys:
HKEY_CURRENT_USER\software\wget
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{9b71d88c-c598-4935-c5d1-43aa4db90836}
HKEY_LOCAL_MACHINE\software\wget

CEP Registry Values:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run


CEP indications of infection

This symptoms of CEP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Files.Secure Ransomware Cleaner
CWS.MSTaskm Hijacker Removal instruction
Remove Pigeon.AWGG Trojan
Remove Vxidl.BCW Trojan
Tedon Trojan Removal

PC.Activity.Monitor.Standard Spyware

PC.Activity.Monitor.Standard virus description
Technical details:
Categories: Spyware

PC.Activity.Monitor.Standard Folders:
[%PROGRAMS%]\pc activity monitor standard
[%PROGRAM_FILES%]\pc activity monitor standard

PC.Activity.Monitor.Standard Files:
[%DESKTOP%]\pc activity monitor standard.lnk
[%PROFILE%]\recent\pc activity monitor standard.lnk
[%DESKTOP%]\pc activity monitor standard.lnk
[%PROFILE%]\recent\pc activity monitor standard.lnk

PC.Activity.Monitor.Standard Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\pc activity monitor standard


PC.Activity.Monitor.Standard indications of infection

This symptoms of PC.Activity.Monitor.Standard detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Mhole520 Trojan Removal
Remove Vxidl.BAA Trojan

VBS.Solow.C Worm

VBS.Solow.C virus description
Technical details:
Categories: Worm

VBS.Solow.C indications of infection

This symptoms of VBS.Solow.C detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
dBASE Trojan Removal
Pigeon.ERS Trojan Cleaner
Pigeon.AVGT Trojan Removal instruction

Dowque.AFG Trojan

Dowque.AFG virus description
Technical details:
Categories: Trojan

Dowque.AFG indications of infection

This symptoms of Dowque.AFG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Clickzs.com Tracking Cookie Removal

InjShell RAT

InjShell virus description
Technical details:
Categories: RAT

InjShell indications of infection

This symptoms of InjShell detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
P2E.ai Trojan Symptoms
Removing Nuke.CMF Hacker Tool
RedLabel.ScreenSaver Hijacker Symptoms
SubSeven.Muie Backdoor Removal

Surfcomp Adware

Surfcomp virus description
Technical details:
Categories: Adware,BHO

Surfcomp Files:
[%SYSTEM%]\surfcomp.dll
[%SYSTEM%]\surfcomp.dll

Surfcomp Registry Keys:
HKEY_CLASSES_ROOT\clsid\{4145b998-6511-46de-a873-fd1dbd053164}
HKEY_CLASSES_ROOT\interface\{adaba402-85cd-4037-bc74-f4aaa8c7429c}
HKEY_CLASSES_ROOT\plugin.splugin
HKEY_CLASSES_ROOT\plugin.splugin.1
HKEY_CLASSES_ROOT\typelib\{c776869f-7c58-4778-9f55-8a78b6ec7d28}
HKEY_CURRENT_USER\software\surfplugin
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{4145b998-6511-46de-a873-fd1dbd053164}


Surfcomp indications of infection

This symptoms of Surfcomp detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Windows.adtools Adware Removal instruction
Zlob.Fam.MovieBox Trojan Symptoms
Remove Cara Trojan
TrojanDownloader.win32.Winshow Trojan Cleaner

Phozip Trojan

Phozip virus description
Technical details:
Categories: Trojan,Spyware

Phozip indications of infection

This symptoms of Phozip detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Reztuto Trojan Information
Win32.Bizten.gen Trojan Removal instruction
KeySnatch Spyware Information
Humble Trojan Cleaner
Bancos.IGB Trojan Removal instruction

TrojanDownloader.Swizzor.bo Downloader

TrojanDownloader.Swizzor.bo virus description
Technical details:
Categories: Downloader

TrojanDownloader.Swizzor.bo indications of infection

This symptoms of TrojanDownloader.Swizzor.bo detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove RasDialer Adware

Win32.IPCaller Trojan

Win32.IPCaller virus description
Technical details:
Categories: Trojan
Win32.IPCaller Aliases:
[Kaspersky]Trojan.Win32.MSN.IPCaller;
[Panda]Trj/W32.IPCaller;
[Computer Associates]Win32/MSN.IPCaller!Trojan

Win32.IPCaller indications of infection

This symptoms of Win32.IPCaller detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SillyDl.CLU Trojan

OneHalf Trojan

OneHalf virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
OneHalf Aliases:
[Kaspersky]OneHalf.3666;
[Panda]Univ.AP.H

OneHalf indications of infection

This symptoms of OneHalf detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Univ Trojan Cleaner