The.Horse.Construction.Kit Trojan

The.Horse.Construction.Kit virus description
Technical details:
Categories: Trojan

The.Horse.Construction.Kit indications of infection

This symptoms of The.Horse.Construction.Kit detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.COW Trojan Removal instruction
VidStream RAT Information
Win32.Tormador Trojan Symptoms

Generador.Victima.Smtp Trojan

Generador.Victima.Smtp virus description
Technical details:
Categories: Trojan,Backdoor
Generador.Victima.Smtp Aliases:
[Kaspersky]Backdoor.VB.ew;
[McAfee]BackDoor-ARB;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program

Generador.Victima.Smtp indications of infection

This symptoms of Generador.Victima.Smtp detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove IRC.Djaa Backdoor
Remove OverPro Adware
Pigeon.AWHP Trojan Removal
VB.aey Downloader Information
Nookl Trojan Removal instruction

Pigeon.EQM Trojan

Pigeon.EQM virus description
Technical details:
Categories: Trojan

Pigeon.EQM indications of infection

This symptoms of Pigeon.EQM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
DlWreck Trojan Removal instruction
JIp.KeyLogger Spyware Information
Aunps Adware Information
Win32.Startpage.BN!downloader Trojan Symptoms
campaignvision.com.au Tracking Cookie Symptoms

CKiller Trojan

CKiller virus description
Technical details:
Categories: Trojan
CKiller Aliases:
[Panda]Trj/C-Killer;
[Computer Associates]Win32/CKiller!Trojan

CKiller indications of infection

This symptoms of CKiller detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Mirror Trojan
QinqDL Trojan Cleaner
Piratos Adware Removal
Agent.td Downloader Removal instruction

Bat.HUREMOVABYL.RUMBLE Trojan

Bat.HUREMOVABYL.RUMBLE virus description
Technical details:
Categories: Trojan
Bat.HUREMOVABYL.RUMBLE Aliases:
[Kaspersky]Trojan.BAT.Rumble;
[Panda]Trj/BAT.Rumble;
[Computer Associates]Bat/HUREMOVABYL.RUMBLE

Bat.HUREMOVABYL.RUMBLE indications of infection

This symptoms of Bat.HUREMOVABYL.RUMBLE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
stealth.nl Tracking Cookie Removal

StartPage.cy Hijacker

StartPage.cy virus description
Technical details:
Categories: Hijacker

StartPage.cy indications of infection

This symptoms of StartPage.cy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Delf.vq Backdoor Cleaner
adrevolver.com Tracking Cookie Removal
Bat.Steel Trojan Symptoms
Montana Trojan Information
Sin.Cyn Backdoor Information

ErrClean Ransomware

ErrClean virus description
Technical details:
Categories: Ransomware

ErrClean Folders:
[%APPDATA%]\errclean
[%COMMON_PROGRAMS%]\ErrClean
[%PROGRAM_FILES%]\ErrClean
[%PROGRAM_FILES_COMMON%]\ErrClean

ErrClean Files:
[%DESKTOP%]\ErrClean.lnk
[%DESKTOP%]\ErrClean.lnk

ErrClean Registry Keys:
HKEY_LOCAL_MACHINE\software\purchased products\system error repair
HKEY_LOCAL_MACHINE\software\ugescw
HKEY_CURRENT_USER\software\errclean
HKEY_LOCAL_MACHINE\software\errclean
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\ges_is1

ErrClean Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


ErrClean indications of infection

This symptoms of ErrClean detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Nauj Adware

VBS.Sinus Trojan

VBS.Sinus virus description
Technical details:
Categories: Trojan,Backdoor
VBS.Sinus Aliases:
[Kaspersky]Backdoor.VBS.Sinus.a;
[Panda]Trojan Horse;
[Computer Associates]VBS.Asproot.C

VBS.Sinus indications of infection

This symptoms of VBS.Sinus detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Win32.VB.bc Trojan
Vefisi Trojan Removal
Zlob.DNS Changer Hijacker Symptoms
Iinun Trojan Cleaner

Loosky Trojan

Loosky virus description
Technical details:
Categories: Trojan

Loosky indications of infection

This symptoms of Loosky detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bropia.Variant Trojan Symptoms

Proteboy Trojan

Proteboy virus description
Technical details:
Categories: Trojan
Proteboy Aliases:
[Panda]Trojan Horse;
[Computer Associates]Win32/Proteboy.A!Trojan

Proteboy indications of infection

This symptoms of Proteboy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.AVOL Trojan
PWShip Trojan Removal

Vxidl.BGI Trojan

Vxidl.BGI virus description
Technical details:
Categories: Trojan

Vxidl.BGI indications of infection

This symptoms of Vxidl.BGI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bancos.HRD Trojan
Removing Pigeon.AVOJ Trojan

SillyDl.CJM Downloader

SillyDl.CJM virus description
Technical details:
Categories: Downloader
SillyDl.CJM Aliases:
[Kaspersky]Trojan-Downloader.Win32.CWS.s;
[Other]WIn32/SillyDl.CJM,Trojan.Bookmarker

SillyDl.CJM Folders:
[%WINDOWS%]\inet20000


SillyDl.CJM indications of infection

This symptoms of SillyDl.CJM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vanquish Trojan Cleaner
TrojanDownloader.Sinteri Trojan Information
Remove NYB Trojan
Loader Downloader Cleaner

Mista Trojan

Mista virus description
Technical details:
Categories: Trojan
Mista Aliases:
[Panda]Trojan Horse;
[Computer Associates]Win32/Mista!Trojan

Mista indications of infection

This symptoms of Mista detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove gureport.co.uk Tracking Cookie
Ofpo Trojan Cleaner
Vxidl.AKR Trojan Removal
JS.Zquest Hostile Code Information
Wirun!Spy!Trojan Trojan Cleaner

Win32.Sedcrop Trojan

Win32.Sedcrop virus description
Technical details:
Categories: Trojan
Win32.Sedcrop Aliases:
[Other]Troj_dialer.cm

Win32.Sedcrop Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\jpupd

Win32.Sedcrop Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Win32.Sedcrop indications of infection

This symptoms of Win32.Sedcrop detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing HackOlogy Trojan
Redstar Trojan Information
TrojanDownloader.Win32.Vivia Trojan Removal
Pigeon.AVFX Trojan Cleaner

Dumbtrash Trojan

Dumbtrash virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Dumbtrash Aliases:
[Kaspersky]DAN.WMA.Dumb.404;
[Panda]Dumbtrash.404.A;
[Computer Associates]Dumbtrash.404

Dumbtrash indications of infection

This symptoms of Dumbtrash detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Spanska Trojan
Pigeon.EFY Trojan Information
SillyDl.CFQ Downloader Removal

Bancos.IFA Trojan

Bancos.IFA virus description
Technical details:
Categories: Trojan

Bancos.IFA Files:
[%SYSTEM%]\AntiVirus.exe
[%SYSTEM%]\AntiVirus.exe

Bancos.IFA Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Bancos.IFA indications of infection

This symptoms of Bancos.IFA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Mosucher.Server Trojan Removal
instadia.net Tracking Cookie Symptoms

Bancos.CYG Trojan

Bancos.CYG virus description
Technical details:
Categories: Trojan

Bancos.CYG indications of infection

This symptoms of Bancos.CYG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ear.Homecoming Trojan Removal

ModalDZoneBypass Trojan

ModalDZoneBypass virus description
Technical details:
Categories: Trojan,Downloader,Hacker Tool
ModalDZoneBypass Aliases:
[Eset]JS/Psyme.NAD trojan;
[Panda]Exploit/DialogArg,Exploit/Mhtredir.C,VBS/Psyme.K;
[Computer Associates]HTML/ModalDZoneBypass!Exploit!Tr,JS.ModalDZoneBypass!exploit,JS.Petch,JScript/ModalDZoneBypass.A!Troja,JScript/Petch!Trojan

ModalDZoneBypass indications of infection

This symptoms of ModalDZoneBypass detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanRunner.Yab Trojan Removal instruction
Remove Tokonere Trojan

Girs Adware

Girs virus description
Technical details:
Categories: Adware

Girs Files:
[%SYSTEM%]\IPCUHelper2.dll
[%SYSTEM%]\IPCUHelper2.dll

Girs Registry Keys:
HKEY_CLASSES_ROOT\clsid\{a5352191-32c0-4edb-b265-382f576c32ff}


Girs indications of infection

This symptoms of Girs detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
WM.Box Trojan Cleaner
Removing mywebsearch.com Tracking Cookie
Falling.Door Backdoor Information
Rbot.ZZ Worm Cleaner
adnetinteractive.com Tracking Cookie Cleaner

Pinky Trojan

Pinky virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Pinky Aliases:
[Kaspersky]Companion.Pinky.952;
[Panda]Pinky.952

Pinky indications of infection

This symptoms of Pinky detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Zlob.Fam.Silver Codec Trojan Symptoms
Removing Grog.Aver.Torto Trojan
Remove Broomop Trojan
ICQH.ver.1e Trojan Symptoms

MMTask Adware

MMTask virus description
Technical details:
Categories: Adware

MMTask Files:
[%SYSTEM%]\mmtask1.exe
[%SYSTEM%]\mmtask2.exe
[%PROGRAM_FILES%]\ecommerce\dialer.exe
[%PROGRAM_FILES%]\ecommerce\dialer.ini
[%SYSTEM%]\mmtask0.exe
[%WINDOWS%]\system\mmtask0.exe
[%WINDOWS%]\system\mmtask1.exe
[%WINDOWS%]\system\mmtask2.exe
[%SYSTEM%]\mmtask1.exe
[%SYSTEM%]\mmtask2.exe
[%PROGRAM_FILES%]\ecommerce\dialer.exe
[%PROGRAM_FILES%]\ecommerce\dialer.ini
[%SYSTEM%]\mmtask0.exe
[%WINDOWS%]\system\mmtask0.exe
[%WINDOWS%]\system\mmtask1.exe
[%WINDOWS%]\system\mmtask2.exe

MMTask Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


MMTask indications of infection

This symptoms of MMTask detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Namaz Trojan Information
Unknown.IRC Backdoor Cleaner
Backdoor.Kronikal Trojan Information

Trumlux Trojan

Trumlux virus description
Technical details:
Categories: Trojan

Trumlux indications of infection

This symptoms of Trumlux detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CTK Trojan Cleaner
XPCSpy Spyware Symptoms

Daqa Trojan

Daqa virus description
Technical details:
Categories: Trojan
Daqa Aliases:
[Panda]Adware/PortalScan;
[Computer Associates]Win32.Daqa.C,Win32/Daqa.C!Trojan

Daqa Files:
[%WINDOWS%]\goidr.exe
[%WINDOWS%]\goidr.exe

Daqa Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Daqa indications of infection

This symptoms of Daqa detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Begemot Trojan
Temairg Trojan Removal

Pigeon.EWS Trojan

Pigeon.EWS virus description
Technical details:
Categories: Trojan

Pigeon.EWS indications of infection

This symptoms of Pigeon.EWS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Stealth.Bomber2 DoS Information
Removing Pigeon.EYW Trojan

Bayrob Trojan

Bayrob virus description
Technical details:
Categories: Trojan

Bayrob indications of infection

This symptoms of Bayrob detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Keyboard.Guardian Spyware Removal instruction
Crulket Trojan Removal instruction
not.virus:Joke.Win32.Krepper Trojan Removal
Pigeon.AWHU Trojan Removal instruction

SillyDl.CMY Trojan

SillyDl.CMY virus description
Technical details:
Categories: Trojan

SillyDl.CMY indications of infection

This symptoms of SillyDl.CMY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Small.awa Downloader
Vxidl.BBT Trojan Removal
promomart.com Tracking Cookie Cleaner

AIG Backdoor

AIG virus description
Technical details:
Categories: Backdoor

AIG Files:
[%DESKTOP%]\ban.bxz
[%DESKTOP%]\bb.bxz
[%DESKTOP%]\bmb.bxz
[%DESKTOP%]\bra.bxz
[%DESKTOP%]\gf.bxz
[%DESKTOP%]\itau.bxz
[%DESKTOP%]\itaup.bxz
[%DESKTOP%]\net.bxz
[%DESKTOP%]\real.bxz
[%DESKTOP%]\san.bxz
[%DESKTOP%]\uni.bxz
[%DESKTOP%]\w32backdoor-aiq.exe
[%DESKTOP%]\ban.bxz
[%DESKTOP%]\bb.bxz
[%DESKTOP%]\bmb.bxz
[%DESKTOP%]\bra.bxz
[%DESKTOP%]\gf.bxz
[%DESKTOP%]\itau.bxz
[%DESKTOP%]\itaup.bxz
[%DESKTOP%]\net.bxz
[%DESKTOP%]\real.bxz
[%DESKTOP%]\san.bxz
[%DESKTOP%]\uni.bxz
[%DESKTOP%]\w32backdoor-aiq.exe

AIG Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run


AIG indications of infection

This symptoms of AIG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.BEW Trojan

VBS.Bound Trojan

VBS.Bound virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
VBS.Bound Aliases:
[Kaspersky]VBS.Bound;
[Panda]Univ.A;
[Computer Associates]VBS.Bound

VBS.Bound indications of infection

This symptoms of VBS.Bound detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing INetSpeak.Iexplorr Adware

Kather Trojan

Kather virus description
Technical details:
Categories: Trojan,Downloader
Kather Aliases:
[Panda]Trojan Horse.LC;
[Computer Associates]Win32.Kather.D,Win32/Kather.c!Downloader

Kather Folders:
[%PROGRAM_FILES%]\citrix\gotomypc

Kather Files:
[%DESKTOP%]\backup from old drive\Program Files\Citrix\GoToMyPC\g2svc.exe
[%DESKTOP%]\backup from old drive\Program Files\Citrix\GoToMyPC\gopcsrv.exe
[%MYVIDEO%]\Program Files\Citrix\GoToMyPC\g2svc.exe
[%MYVIDEO%]\Program Files\Citrix\GoToMyPC\gopcsrv.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\g2comm.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\g2fileh.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\g2host.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\g2mainh.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\g2pre.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\g2printh.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\G2ProcessFactory.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\g2svc.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\g2tray.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\G2WinLogon.dll
[%PROGRAM_FILES%]\Citrix\GoToMyPC\g2winlogon_x64.dll
[%PROGRAM_FILES%]\Citrix\GoToMyPC\gopcsrv.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\gotomon.dll
[%SYSTEM%]\gotomon.dll
[%DESKTOP%]\backup from old drive\Program Files\Citrix\GoToMyPC\g2svc.exe
[%DESKTOP%]\backup from old drive\Program Files\Citrix\GoToMyPC\gopcsrv.exe
[%MYVIDEO%]\Program Files\Citrix\GoToMyPC\g2svc.exe
[%MYVIDEO%]\Program Files\Citrix\GoToMyPC\gopcsrv.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\g2comm.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\g2fileh.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\g2host.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\g2mainh.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\g2pre.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\g2printh.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\G2ProcessFactory.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\g2svc.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\g2tray.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\G2WinLogon.dll
[%PROGRAM_FILES%]\Citrix\GoToMyPC\g2winlogon_x64.dll
[%PROGRAM_FILES%]\Citrix\GoToMyPC\gopcsrv.exe
[%PROGRAM_FILES%]\Citrix\GoToMyPC\gotomon.dll
[%SYSTEM%]\gotomon.dll

Kather Registry Keys:
HKEY_CLASSES_ROOT\gotomypc.starthereloader
HKEY_CLASSES_ROOT\gotomypc.starthereloader.1
HKEY_LOCAL_MACHINE\software\citrix\gotomypc
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\gotomypc
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app paths\g2svc.exe
HKEY_LOCAL_MACHINE\system\currentcontrolset\control\print\monitors\gotomypc port
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\gotomypc

Kather Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Kather indications of infection

This symptoms of Kather detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
QDel212 Trojan Removal instruction
Removing Tbon Adware
Removing Bancos.HUE Trojan
Remove Pigeon.AVOA Trojan

SillyDl.CWO Trojan

SillyDl.CWO virus description
Technical details:
Categories: Trojan

SillyDl.CWO indications of infection

This symptoms of SillyDl.CWO detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing CasinoOnNet Adware
QDel6 Trojan Symptoms
jalan.net Tracking Cookie Information
PWS.QQGame Trojan Cleaner