WW Trojan

WW virus description
Technical details:
Categories: Trojan,Hacker Tool
WW Aliases:
[Kaspersky]Vienna.217;
[Eset]Ww217.A virus;
[Panda]Polish.217,Polish.227.Drp;
[Computer Associates]WW 217

WW indications of infection

This symptoms of WW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Aze.Search Hijacker Removal
Siskin Trojan Cleaner
Remove Rammstein Trojan
7Search Tracking Cookie Removal
SubSeven.Defcon.ICQPager Backdoor Removal

Chat.ker DoS

Chat.ker virus description
Technical details:
Categories: DoS

Chat.ker indications of infection

This symptoms of Chat.ker detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing AOAnarchy Trojan
Remove OC.spl Trojan
Correo Trojan Information

Sufrap Trojan

Sufrap virus description
Technical details:
Categories: Trojan

Sufrap indications of infection

This symptoms of Sufrap detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win16.WinError Trojan Symptoms
Win32.DlMersting.AX.DLL.Tr Trojan Symptoms
Small.lg Downloader Removal instruction

Win32.Snatch Trojan

Win32.Snatch virus description
Technical details:
Categories: Trojan
Win32.Snatch Aliases:
[Eset]Win32/Snatch.140 trojan;
[Panda]Trojan Horse

Win32.Snatch indications of infection

This symptoms of Win32.Snatch detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Svug.50megs Tracking Cookie
My.Yodlee.Assistant BHO Information
Remove Calknil Trojan
Removing W95.Jacky Trojan

Gin Hacker Tool

Gin virus description
Technical details:
Categories: Hacker Tool,DoS

Gin indications of infection

This symptoms of Gin detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Troyen Trojan Cleaner
Vxidl.AZZ Trojan Symptoms
IstBar.kp Downloader Symptoms
Pigeon.EBS Trojan Symptoms

SillyDl.CIQ Trojan

SillyDl.CIQ virus description
Technical details:
Categories: Trojan

SillyDl.CIQ indications of infection

This symptoms of SillyDl.CIQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Bugmaf Trojan
SillyDl.DBP Trojan Symptoms
Alpha.Strike Trojan Removal instruction
Porn Adware Symptoms
PWS.Fake Trojan Information

WMI Backdoor

WMI virus description
Technical details:
Categories: Backdoor,Hacker Tool
WMI Aliases:
[Panda]Bck/Cyn

WMI indications of infection

This symptoms of WMI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Worfo Trojan Removal instruction
Remove VBS.Aspid.B:intended Trojan

SillyDl.CWS Trojan

SillyDl.CWS virus description
Technical details:
Categories: Trojan

SillyDl.CWS indications of infection

This symptoms of SillyDl.CWS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove One.Half Trojan
Backdoor.XLog.Server Trojan Cleaner

SysProtect Adware

SysProtect virus description
Technical details:
Categories: Adware,Ransomware

SysProtect Folders:
[%PROGRAM_FILES%]\SysProtect Free
[%PROGRAM_FILES%]\SysProtect
[%PROGRAM_FILES_COMMON%]\SysProtect
[%COMMON_PROGRAMS%]\SysProtect Unregistered Version

SysProtect Files:
[%PROFILE_TEMP%]\NI.USYP\setup.exe
[%PROFILE_TEMP%]\NI.USYP_0001_N76M1005\setup.exe
[%PROFILE_TEMP%]\SysProtectScannerSetup.exe
[%PROGRAM_FILES%]\ErrorSafe Free\FlFxr15.dll
[%PROGRAM_FILES%]\ERRORS~1\FlFxr15.dll
[%SYSTEM%]\df_kme.exe
[%DESKTOP%]\Install SysProtect .lnk
[%DESKTOP%]\SysProtect.lnk
[%PROFILE_TEMP%]\NI.USYP\setup.exe
[%PROFILE_TEMP%]\NI.USYP_0001_N76M1005\setup.exe
[%PROFILE_TEMP%]\SysProtectScannerSetup.exe
[%PROGRAM_FILES%]\ErrorSafe Free\FlFxr15.dll
[%PROGRAM_FILES%]\ERRORS~1\FlFxr15.dll
[%SYSTEM%]\df_kme.exe
[%DESKTOP%]\Install SysProtect .lnk
[%DESKTOP%]\SysProtect.lnk

SysProtect Registry Keys:
HKEY_CLASSES_ROOT\AppID\{4F5E5D72-C915-4f3b-908B-527D064B0FAA}
HKEY_CLASSES_ROOT\CheckProd.CheckProduct
HKEY_CLASSES_ROOT\CLSID\{1640DE0E-75E4-4a83-B5D1-2492BC7EBA8F}
HKEY_CLASSES_ROOT\CLSID\{9E87077C-380C-407d-8DAB-EEDAD95C0A5D}
HKEY_CLASSES_ROOT\CLSID\{CCAABCDD-7C16-4215-B12E-150BFB994CF0}
HKEY_CLASSES_ROOT\CLSID\{EF130E77-0A34-4365-BFB7-218FD3DDCD5F}
HKEY_CLASSES_ROOT\clsid\{f63e3b76-f82f-46eb-851c-8c0a221686bb}
HKEY_CLASSES_ROOT\flfxr15.flfixer15
HKEY_CLASSES_ROOT\Interface\{02946FD1-2D99-46E6-A790-3A089714EDD9}
HKEY_CLASSES_ROOT\interface\{7f4e63c9-f30c-4424-9baf-b6896f5f56c4}
HKEY_CLASSES_ROOT\interface\{f5ac8b35-5b15-4e8f-8046-43858973b495}
HKEY_CLASSES_ROOT\typelib\{7eacf70b-302f-4049-ac68-2d62eb43e473}\1.0
HKEY_CLASSES_ROOT\typelib\{7fa4ec26-6a28-4474-857d-bb05b001c84a}\1.0
HKEY_CLASSES_ROOT\typelib\{96d58666-8f00-4a9d-9389-c17aaa2407c9}\1.0
HKEY_CLASSES_ROOT\typelib\{e79d5e54-81c9-41ae-9d7b-03f1e5a7733d}\1.0
HKEY_CLASSES_ROOT\typelib\{f585cb1f-f17d-4007-a573-b663197ef500}\1.0
HKEY_LOCAL_MACHINE\Software\SysProtect
HKEY_CLASSES_ROOT\AppID\CheckProduct2_1.DLL
HKEY_CLASSES_ROOT\AppID\compclr.dll
HKEY_CLASSES_ROOT\AppID\FFWrapr.DLL
HKEY_CLASSES_ROOT\CheckProd.CheckProduct.1
HKEY_CLASSES_ROOT\ComCleanCore.AppCleaner
HKEY_CLASSES_ROOT\ComCleanCore.CCQuickScan
HKEY_CLASSES_ROOT\ComCleanCore.CCQuickScan.1
HKEY_CLASSES_ROOT\ComCleanCore.FileCleaner
HKEY_CLASSES_ROOT\ComCleanCore.FileCleaner.1
HKEY_CLASSES_ROOT\ComCleanCore.InetCleaner
HKEY_CLASSES_ROOT\ComCleanCore.InetCleaner.1
HKEY_CLASSES_ROOT\ComCleanCore.RegCleaner
HKEY_CLASSES_ROOT\ComCleanCore.RegCleaner.1
HKEY_CLASSES_ROOT\ComCleanCore.SystemCleaner
HKEY_CLASSES_ROOT\ComCleanCore.SystemCleaner.1
HKEY_CLASSES_ROOT\df_fixr.Fixer.1
HKEY_CLASSES_ROOT\TypeLib\{7EACF70B-302F-4049-AC68-2D62EB43E473}
HKEY_CURRENT_USER\Software\SysProtect
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSCAN
HKEY_CLASSES_ROOT\appid\{4f5e5d72-c915-4f3b-908b-527d064b0faa}
HKEY_CLASSES_ROOT\checkprod.checkproduct
HKEY_CLASSES_ROOT\clsid\{1640de0e-75e4-4a83-b5d1-2492bc7eba8f}
HKEY_CLASSES_ROOT\clsid\{9e87077c-380c-407d-8dab-eedad95c0a5d}
HKEY_CLASSES_ROOT\clsid\{ccaabcdd-7c16-4215-b12e-150bfb994cf0}
HKEY_CLASSES_ROOT\clsid\{ef130e77-0a34-4365-bfb7-218fd3ddcd5f}
HKEY_CLASSES_ROOT\interface\{02946fd1-2d99-46e6-a790-3a089714edd9}
HKEY_CURRENT_USER\software\sysprotect free
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\usyp_is1
HKEY_LOCAL_MACHINE\software\sysprotect

SysProtect Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


SysProtect indications of infection

This symptoms of SysProtect detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AAL Trojan Cleaner
Remove New.is.for.the.Dogs Toolbar
Remove Icon.Changer Trojan
Pigeon.AAO Trojan Information
Remove Noknok.50!Setup Backdoor

AIM.Evil.Doer Trojan

AIM.Evil.Doer virus description
Technical details:
Categories: Trojan,Hacker Tool
AIM.Evil.Doer Aliases:
[Kaspersky]Trojan.PSW.AIM.EvilDoer;
[Eset]Win32/PSW.AIM.EvilDoer trojan;
[Panda]Trj/PSW.Gen,Trojan Horse;
[Computer Associates]Win32/AIM.EvilDoer!PWS!Trojan

AIM.Evil.Doer indications of infection

This symptoms of AIM.Evil.Doer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Dikstra Trojan Symptoms
Net.acct Trojan Removal
Remove Intended.Mayhem Trojan
Shuckush Trojan Cleaner

Pigeon.BAA Trojan

Pigeon.BAA virus description
Technical details:
Categories: Trojan

Pigeon.BAA indications of infection

This symptoms of Pigeon.BAA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Yahoo.Tools DoS Information
Remove ASXLoad Trojan
Lolita Trojan Cleaner
Extractor Trojan Symptoms
Removing Pigeon.FAY Trojan

IGMP.FdDos DoS

IGMP.FdDos virus description
Technical details:
Categories: DoS
IGMP.FdDos Aliases:
[Panda]Flooder/Soddf.A

IGMP.FdDos indications of infection

This symptoms of IGMP.FdDos detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.AEN Trojan
Pigeon.AVHZ Trojan Cleaner
Master Backdoor Symptoms

VirTool.Win32.BatCrypt Backdoor

VirTool.Win32.BatCrypt virus description
Technical details:
Categories: Backdoor,Hacker Tool
VirTool.Win32.BatCrypt Aliases:
[Panda]Backdoor Program,Virus Constructor

VirTool.Win32.BatCrypt indications of infection

This symptoms of VirTool.Win32.BatCrypt detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Rexec RAT
Bancos.HZI Trojan Cleaner
Adware.DirectIP Adware Removal instruction

Vxidl.ASG Trojan

Vxidl.ASG virus description
Technical details:
Categories: Trojan

Vxidl.ASG indications of infection

This symptoms of Vxidl.ASG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVPN Trojan Removal instruction
Remove Bancos.GXI Trojan
KCGame RAT Cleaner
Removing Pigeon.AKQ Trojan
Macedonia Trojan Removal instruction

UrsnifDown Downloader

UrsnifDown virus description
Technical details:
Categories: Downloader
UrsnifDown Aliases:
[Kaspersky]Trojan.Win32.Small.kn;
[McAfee]Downloader-AXM;
[Other]Win32/Ursnif!downloader

UrsnifDown indications of infection

This symptoms of UrsnifDown detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.AKN Trojan
Catcall Adware Removal instruction
Banker.CB Trojan Removal
DialSteal Trojan Information
Remove Frae Trojan

Lineag.AIP Trojan

Lineag.AIP virus description
Technical details:
Categories: Trojan

Lineag.AIP indications of infection

This symptoms of Lineag.AIP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HHB Trojan Information
Keylog.Sters Trojan Cleaner
Removing Alfons Trojan

Pigeon.AVHN Trojan

Pigeon.AVHN virus description
Technical details:
Categories: Trojan

Pigeon.AVHN indications of infection

This symptoms of Pigeon.AVHN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
HGZ.beta RAT Information
Win95.Spaces.Family RAT Symptoms
Remove Quest Trojan
Vxidl.AXG Trojan Removal instruction
Propo Trojan Removal instruction

Bancos.FYK Trojan

Bancos.FYK virus description
Technical details:
Categories: Trojan

Bancos.FYK indications of infection

This symptoms of Bancos.FYK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EZD Trojan Cleaner
Up.Yours.0b1 Hacker Tool Removal
RegFish Trojan Removal instruction
Easy.Keylogger Spyware Information
Bancos.HLH Trojan Symptoms

SillyDl.CEM Trojan

SillyDl.CEM virus description
Technical details:
Categories: Trojan

SillyDl.CEM indications of infection

This symptoms of SillyDl.CEM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SillyDl.CYR Trojan
Removing VB.BH.Server Trojan

Qoologic.at Downloader

Qoologic.at virus description
Technical details:
Categories: Downloader

Qoologic.at indications of infection

This symptoms of Qoologic.at detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.BBK Trojan
Pigeon.AVPY Trojan Information
Bisads.180solutions Tracking Cookie Removal

System32 Trojan

System32 virus description
Technical details:
Categories: Trojan
System32 Aliases:
[Panda]Trj/Wini;
[Computer Associates]System32.21446

System32 indications of infection

This symptoms of System32 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove AdDestroyer Adware
JScript.Seeker.B!Trojan Trojan Symptoms
Calculator Hostile Code Removal instruction
Remove Elkong.gen Trojan

ICQ.Mouse Trojan

ICQ.Mouse virus description
Technical details:
Categories: Trojan
ICQ.Mouse Aliases:
[Kaspersky]Trojan.Win32.ICQMouse;
[McAfee]ICQ-Mouse;
[F-Prot]Backdoor.Icq_Mouse;
[Panda]Trj/W32.ICQMouse;
[Computer Associates]Win32.ICQMouse,Win32/ICQMouse!Trojan

ICQ.Mouse indications of infection

This symptoms of ICQ.Mouse detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanClicker.Win32.VB.an Adware Cleaner
TrojanSpy.Win32.RegControl Spyware Removal
SillyDl.DAD Downloader Removal instruction

Bancos.IDD Trojan

Bancos.IDD virus description
Technical details:
Categories: Trojan

Bancos.IDD indications of infection

This symptoms of Bancos.IDD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove WelcomB Trojan
WIC Trojan Cleaner
Flower Trojan Removal instruction
Haxspy.aj Trojan Removal instruction

STOPzilla Hijacker

STOPzilla virus description
Technical details:
Categories: Hijacker

STOPzilla Files:
[%SYSTEM%]\StopzillaBH0.dll
[%SYSTEM%]\szrec.dll
[%SYSTEM%]\StopzillaBH0.dll
[%SYSTEM%]\szrec.dll

STOPzilla Registry Keys:
HKEY_CLASSES_ROOT\clsid\{ce7c3cf0-4b15-11d1-abed-709549c10000}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{ce7c3cf0-4b15-11d1-abed-709549c10000}


STOPzilla indications of infection

This symptoms of STOPzilla detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SystemDefender Ransomware Removal
Remove Pigeon.EWK Trojan
Removing WS.FTP.Server.Remote.Attack DoS

Tinurak Trojan

Tinurak virus description
Technical details:
Categories: Trojan
Tinurak Aliases:
[Panda]Trj/AOL.Tinurak;
[Computer Associates]Win32.Tinurak,Win32/AOL.Tinurak!Trojan

Tinurak indications of infection

This symptoms of Tinurak detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CIA.boot Trojan Information
Amokk.Joiner Trojan Cleaner
Log.Arp Trojan Removal instruction

Bancos.HZA Trojan

Bancos.HZA virus description
Technical details:
Categories: Trojan

Bancos.HZA indications of infection

This symptoms of Bancos.HZA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Video ActiveX Object Trojan Cleaner
motigo.com Tracking Cookie Information
Removing ProLin@MM Worm
Serv.FTP.Server Trojan Removal
BAT.Gremlin Trojan Symptoms

Pigeon.AVIF Trojan

Pigeon.AVIF virus description
Technical details:
Categories: Trojan

Pigeon.AVIF indications of infection

This symptoms of Pigeon.AVIF detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ps.574g Trojan Removal
PSW.Antigen Trojan Removal instruction
Hacktic Trojan Removal
Blinky Trojan Removal instruction
DetectSatan Ransomware Information

Vienna.Violator Trojan

Vienna.Violator virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Vienna.Violator Aliases:
[Kaspersky]Vienna.1000,Vienna.Violator.5286,Vienna.Violator.779.a,Vienna.1055;
[Eset]Vienna.Violator.1000.A virus,Vienna.Violator.1000.B virus,Vienna.Violator.1000.E virus;
[Panda]Univ,Violator.1055;
[Computer Associates]Vienna.Violator.1000.F,Violator,Xmas Violator,Violator.779

Vienna.Violator indications of infection

This symptoms of Vienna.Violator detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Specrem Trojan Symptoms
Bancos.GEW Trojan Information

Nuvens.JU+B49168 Trojan

Nuvens.JU+B49168 virus description
Technical details:
Categories: Trojan

Nuvens.JU+B49168 indications of infection

This symptoms of Nuvens.JU+B49168 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AUG Trojan Information
Sendmail Trojan Removal instruction
BrowserAid Adware Information
Remove Pathhunt Trojan
Remove Search123 Adware

Bancos.GTX Trojan

Bancos.GTX virus description
Technical details:
Categories: Trojan

Bancos.GTX indications of infection

This symptoms of Bancos.GTX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Piratos Adware
Removing Vxidl.AGH Trojan

Vxidl.API Trojan

Vxidl.API virus description
Technical details:
Categories: Trojan

Vxidl.API indications of infection

This symptoms of Vxidl.API detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VB.vh Backdoor Information
SillyDl.CFG Trojan Removal instruction
Remove JS.MHTMLRedir!exploit Trojan
Remove New.Malware Trojan
SillyDl.BZB Trojan Cleaner

Dealbar Adware

Dealbar virus description
Technical details:
Categories: Adware

Dealbar Folders:
[%PROGRAM_FILES%]\dealbar

Dealbar Files:
[%PROGRAM_FILES%]\TBONAS\BarLcher.dll
[%PROGRAM_FILES%]\TBONAS\CompBar.dll
[%PROGRAM_FILES%]\TBONAS\BarLcher.dll
[%PROGRAM_FILES%]\TBONAS\CompBar.dll

Dealbar Registry Keys:
HKEY_CLASSES_ROOT\clsid\{1adbcce8-cf84-441e-9b38-afc7a19c06a4}
HKEY_CLASSES_ROOT\clsid\{3d782bb3-f2a5-11d3-bf4c-000000000000}
HKEY_CLASSES_ROOT\clsid\{3ea5c408-2437-4c40-adac-dfda9aeeea96}
HKEY_CLASSES_ROOT\clsid\{9b666a44-986c-46d4-8702-765509b6712f}
HKEY_CLASSES_ROOT\compbar.getpricebar
HKEY_CLASSES_ROOT\compbar.getpricebar.1
HKEY_CLASSES_ROOT\interface\{3d782bb2-f2a5-11d3-bf4c-000000000000}
HKEY_CLASSES_ROOT\interface\{ca5ed456-9ecb-4734-a64c-0546147a0cc2}
HKEY_CLASSES_ROOT\interface\{db1f5554-582c-4f53-82cc-458d2c04a2f1}
HKEY_CLASSES_ROOT\mynewsbarlauncher.ie5barlauncher
HKEY_CLASSES_ROOT\mynewsbarlauncher.ie5barlauncher.1
HKEY_CURRENT_USER\software\activshopper

Dealbar Registry Values:
HKEY_LOCAL_MACHINE\software\activshopper
HKEY_LOCAL_MACHINE\software\activshopper
HKEY_LOCAL_MACHINE\software\activshopper
HKEY_LOCAL_MACHINE\software\activshopper
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\explorer bars\{3ea5c408-2437-4c40-adac-dfda9aeeea96}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\explorer bars\{3ea5c408-2437-4c40-adac-dfda9aeeea96}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\extensions\{bfa03761-5565-41b3-93d9-82b354c0a8ec}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\extensions\{bfa03761-5565-41b3-93d9-82b354c0a8ec}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\extensions\{bfa03761-5565-41b3-93d9-82b354c0a8ec}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\extensions\{bfa03761-5565-41b3-93d9-82b354c0a8ec}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\extensions\{bfa03761-5565-41b3-93d9-82b354c0a8ec}, hoticon=[%PROGRAM_FILES%]\dealbar\compbar.dll
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\extensions\{bfa03761-5565-41b3-93d9-82b354c0a8ec}, icon=[%PROGRAM_FILES%]\dealbar\compbar.dll
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\extensions\{bfa03761-5565-41b3-93d9-82b354c0a8ec}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\extensions\{bfa03761-5565-41b3-93d9-82b354c0a8ec}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\activshopper
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\activshopper
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\activshopper
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\activshopper


Dealbar indications of infection

This symptoms of Dealbar detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Why.Windows Trojan Removal
FlashGet BHO Removal instruction
Win32.PSW.Yaher Trojan Removal instruction
Phishbank.ARZ Trojan Cleaner

Skoob Trojan

Skoob virus description
Technical details:
Categories: Trojan,Downloader
Skoob Aliases:
[Panda]Adware/TalkStocks;
[Computer Associates]Win32.Skoob,Win32/Scoob!Trojan

Skoob Files:
[%WINDOWS%]\downloaded program files\bcmiivbj.dll
[%WINDOWS%]\downloaded program files\bcmiivbj.inf
[%WINDOWS%]\downloaded program files\bcmiivbj.dll
[%WINDOWS%]\downloaded program files\bcmiivbj.inf


Skoob indications of infection

This symptoms of Skoob detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EGI Trojan Removal
Removing Bancos.GWW Trojan
Foofle Trojan Information

mindfire.com Tracking Cookie

mindfire.com virus description
Technical details:
Categories: Tracking Cookie

mindfire.com indications of infection

This symptoms of mindfire.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove virusblasters Ransomware
Forspid Trojan Information
Removing Agobot.ai Trojan
Removing Bancos.HWO Trojan

Bionet.19b Trojan

Bionet.19b virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Bionet.19b Aliases:
[Kaspersky]Backdoor.Bionet.319;
[Eset]Win32/Bionet.319 trojan

Bionet.19b indications of infection

This symptoms of Bionet.19b detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDL.DCS Trojan Symptoms
Lozilka Trojan Removal instruction
SMEG.Queeg Trojan Cleaner

Warningpanel Hostile Code

Warningpanel virus description
Technical details:
Categories: Hostile Code

Warningpanel indications of infection

This symptoms of Warningpanel detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HZC Trojan Removal instruction
RewriteMBR Trojan Removal
SillyDL.CNE Trojan Symptoms
Feri Backdoor Information
Remove Vxidl.AQM Trojan

Dowque.AAK Trojan

Dowque.AAK virus description
Technical details:
Categories: Trojan

Dowque.AAK indications of infection

This symptoms of Dowque.AAK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Daesdu Trojan Removal
Remove Phunnie Trojan

Easy.exe Trojan

Easy.exe virus description
Technical details:
Categories: Trojan

Easy.exe indications of infection

This symptoms of Easy.exe detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SillyDl.CXK Trojan
Pigeon.ASC Trojan Cleaner
CommonName.Internet.Keyword BHO Cleaner
Pigeon.EDH Trojan Information
Removing SdBot.br Backdoor

Pigeon.ABF Trojan

Pigeon.ABF virus description
Technical details:
Categories: Trojan

Pigeon.ABF indications of infection

This symptoms of Pigeon.ABF detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing WordMacro.Randomic Trojan
AdonAi Hacker Tool Symptoms
NewTrack Trojan Information
Henuked Trojan Removal
Remove Win.KaBoom Trojan

R3C.W2K Trojan

R3C.W2K virus description
Technical details:
Categories: Trojan,Backdoor
R3C.W2K Aliases:
[Kaspersky]Backdoor.R3C.a;
[Eset]Win32/R3C trojan;
[McAfee]BackDoor-LG;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/R3C;
[Computer Associates]Backdoor/R3C,Backdoor/R3C!Server

R3C.W2K indications of infection

This symptoms of R3C.W2K detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Vxidl.ASS Trojan
Microphone.Recorder Backdoor Cleaner
Removing networldmedia.net Tracking Cookie
Removing Napster.Hack Trojan
PSW.Magic Trojan Symptoms

WinS Backdoor

WinS virus description
Technical details:
Categories: Backdoor

WinS indications of infection

This symptoms of WinS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HKM Trojan Symptoms
Pigeon.AVQD Trojan Removal
Remove Americlicks Hijacker

LoveLiao Toolbar

LoveLiao virus description
Technical details:
Categories: Toolbar

LoveLiao Folders:
[%PROGRAM_FILES%]\Offline Web 2.0

LoveLiao Registry Keys:
HKEY_CLASSES_ROOT\clsid\{129dd540-e5e4-4601-825a-43ed660159e0}
HKEY_CLASSES_ROOT\toolband.xbtb05774
HKEY_CLASSES_ROOT\xbtb05774
HKEY_CURRENT_USER\software\xbtb05774
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{129dd540-e5e4-4601-825a-43ed660159e0}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\xbtb05774.xbtb05774toolbar


LoveLiao indications of infection

This symptoms of LoveLiao detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PswStor Trojan Removal instruction
Small.ddp Trojan Symptoms

Vxidl.AXP Trojan

Vxidl.AXP virus description
Technical details:
Categories: Trojan

Vxidl.AXP indications of infection

This symptoms of Vxidl.AXP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Lite.SOCKS Backdoor Cleaner
Win32.MoSucker Trojan Cleaner
VBS.Harvest Trojan Information
Removing Bancos.HUB Trojan

MtE.Encoded Trojan

MtE.Encoded virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
MtE.Encoded Aliases:
[Kaspersky]MtE.Darkness,MtE.Encroacher.b,MtE.Groove.b;
[Panda]Darkness.4096#MtE,Encroacher.2860#MtE,Dedicated.3506#MTE;
[Computer Associates]MtE Encoded

MtE.Encoded indications of infection

This symptoms of MtE.Encoded detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.TrojanDownloader.Qoologic Downloader Cleaner
Microsoft.Media.Server.Denial.of.Service.Attack DoS Symptoms

Soulfly Trojan

Soulfly virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Soulfly Aliases:
[Kaspersky]Soulfly.2000;
[F-Prot]SoulFly.2000;
[Panda]SoulFly.2000

Soulfly indications of infection

This symptoms of Soulfly detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bobdoor Trojan Removal instruction
Masters.Paradise.Angel Trojan Removal instruction
Mosucker Trojan Removal instruction

GhostVoice Trojan

GhostVoice virus description
Technical details:
Categories: Trojan,Backdoor,RAT
GhostVoice Aliases:
[Kaspersky]Backdoor.GhostVoice.100,Backdoor.GhostVoice.102,Backdoor.VB.ds;
[Eset]Win32/GhostVoice.100 trojan;
[Panda]Backdoor Program,Bck/VB,Bck/GhostVoice,Bck/VB.DS;
[Computer Associates]Backdoor/GhostVoice.100!Client,Backdoor/VB.de,Win32.GhostVoice,Backdoor/GhostVoice.102,Backdoor/GhostVoice.12!Server,Win32.GhostVoice.12

GhostVoice indications of infection

This symptoms of GhostVoice detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Frethog.ADQ Trojan Removal
Remove Saturday.14th.damaged? Trojan
Remove Crackpipe Trojan

WebAsylum Trojan

WebAsylum virus description
Technical details:
Categories: Trojan

WebAsylum indications of infection

This symptoms of WebAsylum detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
r Trojan Removal
Moiling Trojan Removal

Pigeon.FBC Trojan

Pigeon.FBC virus description
Technical details:
Categories: Trojan

Pigeon.FBC indications of infection

This symptoms of Pigeon.FBC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Spytech.SpyAgent Spyware
Remove Win32.Bushtrommel Trojan
oncf Trojan Symptoms

Fake.Scanner Trojan

Fake.Scanner virus description
Technical details:
Categories: Trojan
Fake.Scanner Aliases:
[Kaspersky]Trojan.Vac;
[McAfee]Vac;
[F-Prot]destructive program;
[Panda]Trj/Vac;
[Computer Associates]Vac!Trojan

Fake.Scanner indications of infection

This symptoms of Fake.Scanner detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
JS.Snake Trojan Information
AdMonitor Tracking Cookie Symptoms
SillyDl.ARA Trojan Removal instruction
Remove Vxidl.AWO Trojan
Removing TrojanDownloader.Win32.Harnig Trojan

SillyDl.CSB Trojan

SillyDl.CSB virus description
Technical details:
Categories: Trojan

SillyDl.CSB indications of infection

This symptoms of SillyDl.CSB detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.ATR Trojan Symptoms
Removing Lucifer Trojan

Announcer Trojan

Announcer virus description
Technical details:
Categories: Trojan

Announcer indications of infection

This symptoms of Announcer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CYT Trojan Removal instruction
Remove Mirror.II Trojan
Pirch.Kat Trojan Removal instruction

Subclone Trojan

Subclone virus description
Technical details:
Categories: Trojan

Subclone indications of infection

This symptoms of Subclone detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Small.nm Trojan Removal
Meyfew Trojan Removal
IEsl.Cab Hostile Code Cleaner
Removing Farfrom Trojan
SillyDl.CFB Trojan Removal

Coma.Server Trojan

Coma.Server virus description
Technical details:
Categories: Trojan,Backdoor,RAT

Coma.Server indications of infection

This symptoms of Coma.Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Midnight.Oil Adware Removal
Pigeon.AQH Trojan Cleaner
xiti.com Tracking Cookie Information

Pigeon.AXD Trojan

Pigeon.AXD virus description
Technical details:
Categories: Trojan

Pigeon.AXD indications of infection

This symptoms of Pigeon.AXD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove BackSpace (BookedSpace) Adware
Remove Pigeon.ECH Trojan
Bat.Colaxer Trojan Removal
Removing TrojanDropper.Win32.Prodex Trojan
Intel.Express.Switch.series DoS Cleaner

Bla Trojan

Bla virus description
Technical details:
Categories: Trojan,Backdoor,RAT,Hacker Tool
Bla Aliases:
[Kaspersky]Backdoor.BLA.10,Trojan.PSW.Blaver.a,Backdoor.BLA.40,Backdoor.BLA.53,Backdoor.BLA,Backdoor.BLA.51,Backdoor.BLA.51.b;
[Eset]Win32/BLA.10 trojan,Win32/BLA.40 trojan,Win32/BLA.53 trojan,Win32/BLA.51 trojan,Win32/BLA.51.A trojan,Win32/BLA.51.B trojan;
[McAfee]BackDoor-BD;
[F-Prot]security risk or a "backdoor" program,W32/Backdoor.Blaver;
[Computer Associates]Backdoor/Blamm.Server,Win32.Bla,Backdoor/Bla.40,Backdoor/Bla.40 Client,Backdoor/Bla.40 Server,Backdoor/Bla.502,Backdoor/Bla.53,Backdoor/BLA.53.SFX,Backdoor/BLA,Backdoor/Bla.502 Client,Backdoor/Bla.502.Mod,Win32.BLA.51,Win32.BLA.51.b

Bla Files:
[%WINDOWS%]\system\mprdll.exe
[%WINDOWS%]\system\mprdll.exe


Bla indications of infection

This symptoms of Bla detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SdBot.MH Worm
Banker.el Spyware Information
Removing Downloader.DUB Trojan

MyFastAccess BHO

MyFastAccess virus description
Technical details:
Categories: BHO

MyFastAccess indications of infection

This symptoms of MyFastAccess detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
JS.ParseLocal!exploit Trojan Removal instruction
Removing Bancos.FWU Trojan
Ljjw Trojan Symptoms
Bancos.GIL Trojan Removal instruction

Bancos.GAQ Trojan

Bancos.GAQ virus description
Technical details:
Categories: Trojan

Bancos.GAQ indications of infection

This symptoms of Bancos.GAQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
W95.CIH Trojan Removal instruction
Vxidl.ARG Trojan Cleaner

Pigeon.5XE Trojan

Pigeon.5XE virus description
Technical details:
Categories: Trojan
Pigeon.5XE Aliases:
[Kaspersky]Backdoor.Win32.Hupigon.cgv;
[Other]W32/Hupigon.RDN,Win32/Pigeon.5xe!Trojan

Pigeon.5XE indications of infection

This symptoms of Pigeon.5XE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Surfer Trojan

page.only Adware

page.only virus description
Technical details:
Categories: Adware

page.only indications of infection

This symptoms of page.only detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Nuker Hacker Tool Removal
Floces Trojan Information
Pigeon.AVUB Trojan Removal
TrojanNotifier.Win32.IllNotifier Trojan Symptoms
Bancos.IGC Trojan Removal instruction

Vxidl.AWZ Trojan

Vxidl.AWZ virus description
Technical details:
Categories: Trojan

Vxidl.AWZ indications of infection

This symptoms of Vxidl.AWZ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing statistiche.it Tracking Cookie
Search200 Adware Information
FWC1 Adware Cleaner
Tobort Trojan Removal instruction

MS03.Exploit!Trojan Trojan

MS03.Exploit!Trojan virus description
Technical details:
Categories: Trojan

MS03.Exploit!Trojan indications of infection

This symptoms of MS03.Exploit!Trojan detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Registry.Run.Guard Trojan
Dark Backdoor Cleaner
StartPage.da Hijacker Symptoms
Removing Hamer Trojan

Pigeon.AYJ Trojan

Pigeon.AYJ virus description
Technical details:
Categories: Trojan

Pigeon.AYJ indications of infection

This symptoms of Pigeon.AYJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing LSL Trojan
Lycos.Boot.Helper Trojan Information
Win32.Cursor.joke Trojan Symptoms

AutoSearch BHO

AutoSearch virus description
Technical details:
Categories: BHO,Hijacker,Toolbar
AutoSearch Aliases:
[McAfee]FakeAlert-R.dll

AutoSearch Files:
[%COMMON_APPDATA%]\AutoSearch.dll
[%PROFILE_TEMP%]\stdrun3.exe
[%WINDOWS%]\aff_0006.exe
[%APPDATA%]\AutoSearch.dll
[%SYSTEM%]\safesearch.dll
[%WINDOWS%]\AutoSearch.dll
[%WINDOWS%]\AutoSearchHelper.dll
[%WINDOWS%]\sibrwin07.exe
[%WINDOWS%]\system\safesearch.dll
[%COMMON_APPDATA%]\AutoSearch.dll
[%PROFILE_TEMP%]\stdrun3.exe
[%WINDOWS%]\aff_0006.exe
[%APPDATA%]\AutoSearch.dll
[%SYSTEM%]\safesearch.dll
[%WINDOWS%]\AutoSearch.dll
[%WINDOWS%]\AutoSearchHelper.dll
[%WINDOWS%]\sibrwin07.exe
[%WINDOWS%]\system\safesearch.dll

AutoSearch Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{00000000-0000-0000-0000-000000000001}
HKEY_CURRENT_USER\software\classes\autosearch.autosearchobj
HKEY_CURRENT_USER\software\classes\autosearch.autosearchobj.1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00000000-0000-0000-0000-000000000001}
HKEY_CLASSES_ROOT\.wink
HKEY_CLASSES_ROOT\bhonew.bhoapp
HKEY_CLASSES_ROOT\bhonew.bhoapp.1
HKEY_CLASSES_ROOT\clsid\{00000000-0000-0000-0000-000000000001}
HKEY_CLASSES_ROOT\clsid\{1d3aea68-1602-4674-9552-f8f9309ee6e0}
HKEY_CLASSES_ROOT\dting file
HKEY_CLASSES_ROOT\iextensions.autosearch
HKEY_CLASSES_ROOT\iextensions.autosearch.1
HKEY_CLASSES_ROOT\interface\{3d11cbe7-1eee-4c8f-ab5c-a4cf7939f1f1}
HKEY_CLASSES_ROOT\interface\{d2735263-bb7c-4786-88d0-ed04886a8708}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{00000000-0000-0000-0000-000000000001}
HKEY_CLASSES_ROOT\typelib\{b7f3b034-329e-4373-a415-20bb0b03d053}
HKEY_CLASSES_ROOT\typelib\{c1947e81-7036-4ac8-ac09-906224f6f4fc}
HKEY_CLASSES_ROOT\wink file
HKEY_CURRENT_USER\autosearch.autosearchobj
HKEY_CURRENT_USER\autosearch.autosearchobj.1
HKEY_CURRENT_USER\clsid\{a55581dc-2cdb-4089-8878-71a080b22342}
HKEY_CURRENT_USER\software\classes\clsid\{a55581dc-2cdb-4089-8878-71a080b22342}
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\clsid\{a55581dc-2cdb-4089-8878-71a080b22342}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{00000000-0000-0000-0000-000000000001}

AutoSearch Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar
HKEY_CURRENT_USER\software\microsoft\internet explorer\urlsearchhooks
HKEY_CURRENT_USER\software\microsoft\internet explorer\urlsearchhooks
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar


AutoSearch indications of infection

This symptoms of AutoSearch detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing MoneyTree.DyFuCA Trojan
Remove Hip Trojan
Remove SillyDl.BYH Trojan
Prodex Trojan Cleaner

SIllyDl.CUE Trojan

SIllyDl.CUE virus description
Technical details:
Categories: Trojan

SIllyDl.CUE indications of infection

This symptoms of SIllyDl.CUE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.TrojanDownloader.Qoologic Downloader Cleaner
TrojanDropper.Win32.SilkRope Trojan Information
Removing Pigeon.AWJO Trojan