Bancos.ZZM Trojan

Bancos.ZZM virus description
Technical details:
Categories: Trojan

Bancos.ZZM indications of infection

This symptoms of Bancos.ZZM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing IRC.Flood.ak Worm
ApplePie Trojan Removal
Pigeon.AVNA Trojan Information
Remove Lazy.Admin Backdoor
Plzinor Trojan Removal instruction

Win32.AVKill Trojan

Win32.AVKill virus description
Technical details:
Categories: Trojan,Hacker Tool
Win32.AVKill Aliases:
[Panda]Trj/Multidropper.BD

Win32.AVKill indications of infection

This symptoms of Win32.AVKill detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bionix Trojan Removal instruction

TrojanDownloader.Win32.Pixar Trojan

This summary is not available. Please click here to view the post.

Spying.King Trojan

Spying.King virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Spying.King Aliases:
[Kaspersky]Backdoor.SpyKing.a,Backdoor.SpyKing.b,Backdoor.S-King,Backdoor.SpyKing.d;
[Eset]Win32/S-King trojan,Win32/S-King.A trojan;
[McAfee]BackDoor-X;
[F-Prot]destructive program,security risk or a "backdoor" program;
[Panda]Bck/SpyKing.C,Bck/SpyKing_10,Bck/SpyKing_20,Bck/S-King,Bck/SpyKing;
[Computer Associates]Backdoor/SpyKing.B1,Backdoor/S-King,Spring_King!Trojan,Win32.SKing,Backdoor/SpyKing!Server,Backdoor/SpyKing.B,Backdoor/SpyKing.B_Client,Win32.SpyKing

Spying.King indications of infection

This symptoms of Spying.King detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CIN Trojan Symptoms

InternetEraser Tracking Cookie

InternetEraser virus description
Technical details:
Categories: Tracking Cookie

InternetEraser indications of infection

This symptoms of InternetEraser detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MediaCharger\MoviePlace Adware Symptoms
Neverone Trojan Symptoms
NewTrack Trojan Cleaner
Cum.Security.Toolkit Trojan Removal

QZap33 Trojan

QZap33 virus description
Technical details:
Categories: Trojan,Hacker Tool
QZap33 Aliases:
[Panda]Trj/QZap;
[Computer Associates]QZap33,Qzap33!Trojan

QZap33 indications of infection

This symptoms of QZap33 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TB.Erase Trojan Cleaner
Petala Trojan Cleaner

Bancos.IBW Trojan

Bancos.IBW virus description
Technical details:
Categories: Trojan

Bancos.IBW indications of infection

This symptoms of Bancos.IBW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Buttman Trojan Removal
Remove Bancos.GZL Trojan

Pigeon.AVKA Trojan

Pigeon.AVKA virus description
Technical details:
Categories: Trojan

Pigeon.AVKA indications of infection

This symptoms of Pigeon.AVKA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AZW Trojan Removal instruction
Sysroot Backdoor Removal

Zarruta Trojan

Zarruta virus description
Technical details:
Categories: Trojan

Zarruta indications of infection

This symptoms of Zarruta detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
King Trojan Information

QZap171 Trojan

QZap171 virus description
Technical details:
Categories: Trojan,Hacker Tool
QZap171 Aliases:
[Kaspersky]Trojan.TheLoader;
[McAfee]QZap171;
[F-Prot]destructive program;
[Panda]Pamela.136;
[Computer Associates]Immigran,THEloader!Trojan

QZap171 indications of infection

This symptoms of QZap171 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Admgates Trojan Removal instruction
Remove T1.Adserver Tracking Cookie
Remove Deaft588 Trojan
Remove Probot Spyware

Win32.VB.cb Trojan

Win32.VB.cb virus description
Technical details:
Categories: Trojan,Downloader
Win32.VB.cb Aliases:
[Kaspersky]TrojanDownloader.Win32.VB.cb;
[Eset]Win32/TrojanDownloader.VB.CB trojan;
[Panda]Trojan Horse

Win32.VB.cb indications of infection

This symptoms of Win32.VB.cb detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Torment.Remote Backdoor Symptoms
Tadaks Trojan Cleaner
Remove Matcash.dll Trojan

TCP.IP.Connector RAT

TCP.IP.Connector virus description
Technical details:
Categories: RAT

TCP.IP.Connector indications of infection

This symptoms of TCP.IP.Connector detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

VB.aca Downloader

VB.aca virus description
Technical details:
Categories: Downloader

VB.aca indications of infection

This symptoms of VB.aca detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

PWS.FIU Trojan

PWS.FIU virus description
Technical details:
Categories: Trojan,Hacker Tool
PWS.FIU Aliases:
[Kaspersky]Trojan.PSW.FIU.166.d,Trojan.PSW.FIU.gen;
[McAfee]PWS-FIU;
[F-Prot]security risk or a "backdoor" program;
[Panda]Trj/PSW.FIU,Trojan Horse;
[Computer Associates]Win32.PSW.FIU.1666.D,Win32/FIU.1666.D!PWS!Trojan

PWS.FIU indications of infection

This symptoms of PWS.FIU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Loony Trojan

Loony virus description
Technical details:
Categories: Trojan,Backdoor
Loony Aliases:
[Kaspersky]Backdoor.Loony.a;
[Eset]Win32/Loony.A1 trojan;
[Computer Associates]Backdoor/AZV,Win32.Loonybot.C

Loony indications of infection

This symptoms of Loony detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Qoologic.az Downloader

Qoologic.az virus description
Technical details:
Categories: Downloader

Qoologic.az indications of infection

This symptoms of Qoologic.az detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

DlRhifrem Trojan

DlRhifrem virus description
Technical details:
Categories: Trojan
DlRhifrem Aliases:
[McAfee]Downloader-BCG;
[Other]Win32/DlRhifrem.D

DlRhifrem Files:
[%PROFILE_TEMP%]\msie.dat
[%PROFILE_TEMP%]\msie.dat


DlRhifrem indications of infection

This symptoms of DlRhifrem detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Bancos.HSQ Trojan

Bancos.HSQ virus description
Technical details:
Categories: Trojan

Bancos.HSQ indications of infection

This symptoms of Bancos.HSQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Web3000 Spyware Removal instruction
Desktop.Personal Spyware Removal
FakeMSN Trojan Cleaner
Removing SillyDl.DND Downloader
VBS.Noob!Trojan Backdoor Symptoms

Pigeon.DZH Trojan

Pigeon.DZH virus description
Technical details:
Categories: Trojan

Pigeon.DZH indications of infection

This symptoms of Pigeon.DZH detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ICQ.TooolzY2K DoS Removal
SillyDl.CIR Trojan Cleaner
Pigeon.AUN Trojan Removal
Bluefire Trojan Removal instruction
Pigeon.ANQ Trojan Information

ZKJ Backdoor

ZKJ virus description
Technical details:
Categories: Backdoor,RAT
ZKJ Aliases:
[Kaspersky]Backdoor.Delf.cc;
[Panda]Bck/Delf;
[Computer Associates]Backdoor/Delf.CC

ZKJ indications of infection

This symptoms of ZKJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove BAT.Prob Trojan
TrojanDownloader.VBS.Bikiwi Trojan Information
Pigeon.EDX Trojan Cleaner
Removing Pigeon.EMF Trojan
Pigeon.AWO Trojan Cleaner

BackDoor.AEA Trojan

BackDoor.AEA virus description
Technical details:
Categories: Trojan,Backdoor,RAT
BackDoor.AEA Aliases:
[Eset]Win32/Terminal.10 trojan;
[McAfee]BackDoor-AEA;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program;
[Computer Associates]Backdoor/Terminal.A

BackDoor.AEA indications of infection

This symptoms of BackDoor.AEA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Vxidl.BAB Trojan
Removing EyeWeb Adware
WinEggDrop.Shell.Pro Backdoor Cleaner
Pigeon.ETD Trojan Cleaner

TrustedAntivirus Ransomware

TrustedAntivirus virus description
Technical details:
Categories: Ransomware

TrustedAntivirus Folders:
[%PROGRAM_FILES%]\TrustedAntivirus

TrustedAntivirus Files:
[%APPDATA%]\TrustedAntivirus\avtasks.dat
[%APPDATA%]\TrustedAntivirus\Logs\av.log
[%APPDATA%]\TrustedAntivirus\Logs\ga6Support.log
[%APPDATA%]\TrustedAntivirus\Logs\update.log
[%COMMON_DESKTOPDIRECTORY%]\TrustedAntivirus.lnk
[%COMMON_PROGRAMS%]\TrustedAntivirus\Contact Customer Support.lnk
[%COMMON_PROGRAMS%]\TrustedAntivirus\TrustedAntivirus.lnk
[%COMMON_PROGRAMS%]\TrustedAntivirus\Uninstall TrustedAntivirus.lnk
[%PROGRAM_FILES_COMMON%]\TrustedAntivirus\bm.exe
[%PROGRAM_FILES_COMMON%]\TrustedAntivirus\ugcw.exe
[%SYSTEM%]\drivers\FMTR.sys
[%APPDATA%]\TrustedAntivirus\avtasks.dat
[%APPDATA%]\TrustedAntivirus\Logs\av.log
[%APPDATA%]\TrustedAntivirus\Logs\ga6Support.log
[%APPDATA%]\TrustedAntivirus\Logs\update.log
[%COMMON_DESKTOPDIRECTORY%]\TrustedAntivirus.lnk
[%COMMON_PROGRAMS%]\TrustedAntivirus\Contact Customer Support.lnk
[%COMMON_PROGRAMS%]\TrustedAntivirus\TrustedAntivirus.lnk
[%COMMON_PROGRAMS%]\TrustedAntivirus\Uninstall TrustedAntivirus.lnk
[%PROGRAM_FILES_COMMON%]\TrustedAntivirus\bm.exe
[%PROGRAM_FILES_COMMON%]\TrustedAntivirus\ugcw.exe
[%SYSTEM%]\drivers\FMTR.sys

TrustedAntivirus Registry Keys:
HKEY_CURRENT_USER\software\trustedantivirus
HKEY_LOCAL_MACHINE\software\trustedantivirus

TrustedAntivirus Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shellserviceobjectdelayload
HKEY_LOCAL_MACHINE\software\products
HKEY_LOCAL_MACHINE\software\products


TrustedAntivirus indications of infection

This symptoms of TrustedAntivirus detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SpammerDLL Trojan Removal instruction
Macro Trojan Removal
YAT Trojan Removal
Kill.xfs DoS Symptoms
MakeFile Trojan Cleaner