Sunfo Trojan

Sunfo virus description
Technical details:
Categories: Trojan,RAT,Hacker Tool
Sunfo Aliases:
[Kaspersky]Trojan.PSW.Sunfo;
[McAfee]Sunfo;
[F-Prot]security risk or a "backdoor" program;
[Panda]Trj/PSW.Suckinfo;
[Computer Associates]Win32.PSW.Sunfo,Win32/Sunfo!PWS!Trojan

Sunfo indications of infection

This symptoms of Sunfo detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Loginserversocket Hostile Code Cleaner
Removing Scpact Trojan
hc Adware Removal
Kbd1 Backdoor Removal

WebDownloader.Mini.web Downloader

WebDownloader.Mini.web virus description
Technical details:
Categories: Downloader

WebDownloader.Mini.web indications of infection

This symptoms of WebDownloader.Mini.web detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Catphish Trojan Removal
Blador Trojan Symptoms
Generator Trojan Removal instruction
VBS.PSW.Lemir Trojan Cleaner
Ceco.Net Trojan Removal

WM.Rats Trojan

WM.Rats virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
WM.Rats Aliases:
[Kaspersky]Macro.Word.Apparition;
[Eset]WM/Rats.A virus,WM/Rats.B virus,WM/Rats.C virus;
[Panda]WM/Rats.A,WM/Rats.B;
[Computer Associates]WordMacro/Rats.A,WordMacro/Rats.B,WordMacro/Rats.C

WM.Rats indications of infection

This symptoms of WM.Rats detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Zapass Trojan Removal
Pigeon.ETO Trojan Removal instruction

Remote.Audit RAT

Remote.Audit virus description
Technical details:
Categories: RAT

Remote.Audit indications of infection

This symptoms of Remote.Audit detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Stervis Trojan Cleaner
Pigeon.AVDB Trojan Cleaner

Beovens Trojan

Beovens virus description
Technical details:
Categories: Trojan
Beovens Aliases:
[Kaspersky]Trojan-Downloader.Win32.Zlob,Trojan-Downloader.Win32.Zlob.bz,Trojan-Downloader.Win32.Zlob.yu,Trojan-Downloader.Win32.Zlob.aaf,Trojan-Downlaoder.Win32.Zlob.zn,Trojan-Downlaoder.Win32.Zlob.zk,Trojan-Downloader.Win32.Zlob.xt,Trojan-Downloader.Win32.Zlob.zk,Trojan-downlaoder.Win32.Zlob.yt,Trojan-Downloader.Win32.Zlob.yt,Trojan-Downloader.Win32.Zlob.xw,Trojan-Downloader.Win32.Zlob.aal,Trojan-Downloader.Win32.Zlob.aai,Trojan-Downloader.Win32.Zlob.adg,Trojan-Dwonloader.Win32.Zlob.xh,Trojan-Downloader.Win32.Zlob.adt,Trojan-Downloader.Win32.Zlob.yj,Trojan-Downloader.Win32.Zlob.agf,Trojan-Downloader.Win32.Zlob.aez,Trojan-Downloader.Win32.Zlob.auw,Trojan-Downloader.Win32.Zlob.om,Trojan-Downloader.Win32.Zlob.lu,Trojan-Downloader.Win32.Zlob.cv,Trojan-Dropper.Win32.Small.akg,Trojan-Downloader.Win32.Zlob.xr,Trojan-Downlaoder.Win32.Zlob.aa,Trojan-Proxy.Win32.Horst.ud;
[McAfee]Puper.dll,Puper,Generic Downloader.bd,Generic.ca,Downloader-XC;
[F-Prot]W32/Downloader.LUB,W32/Dropper.BFV;
[Other]Win32/Beovens,Trojan.Zlob,Win32.Beovens,Win32/Beovens.GY,Win32/Beovens.HC,Win32/Beovens.HB,Win32/Beovens.HA,Win32/Beovens.GZ,Win32/Beovens.HH,Win32/Beovens.HI,Win32/Beovens.HK,Win32.Beovens.HM,Win32/Beovens.HP,Win32/Beovens.HO,Win32/Beovens.HR,Win32/Beovens.HQ,Win32/Beovens.HU,Trojan.Dropper,Win32/Beovens.HE,Win32/Beovens.HV,Downloader.Trojan,Win32/Beovens.HY,Win32/Beovens.IB,Win32/Beovens.FW,Win32/Beovens.FX,Win32/Beovens!generic,W32/Zlob.GH,Troj/Zlob-CW,DesktopScam,trojan-downloader-zlob,Trojan Horse,W32/Smalldrp.GMK,Troj/Small-AKG,Win32/Beovens.IG,Win32/Beovens.IF

Beovens Files:
[%SYSTEM%]\ismini.exe
[%SYSTEM%]\regperf.exe
[%SYSTEM%]\ismini.exe
[%SYSTEM%]\regperf.exe

Beovens Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run


Beovens indications of infection

This symptoms of Beovens detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing VBS.Ace Trojan

Sboy Trojan

Sboy virus description
Technical details:
Categories: Trojan
Sboy Aliases:
[Panda]Trj/Sboy;
[Computer Associates]Sboy!Trojan

Sboy indications of infection

This symptoms of Sboy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Bancos.IJG Trojan
FakeAlert.TrojanFactory Trojan Cleaner
Removing Irtth Backdoor
The.IRC.Warfare.Tutorial DoS Removal

WhenU Adware

WhenU virus description
Technical details:
Categories: Adware

WhenU Files:
[%PROGRAM_FILES%]\VVSN\VVSN.exe
[%PROGRAM_FILES%]\VVSN\VVSN.exe

WhenU Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run


WhenU indications of infection

This symptoms of WhenU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove EUniverse.MyFreeCursors Hijacker
Remove BAT.Dellwin.bg Trojan
SillyDl.CVX Trojan Information
Removing Loader Downloader
Shifter Trojan Cleaner

Ranck Trojan

Ranck virus description
Technical details:
Categories: Trojan,Spyware,Hacker Tool
Ranck Aliases:
[Kaspersky]Trojan-Proxy.Win32.Ranky.fq,Trojan-Proxy.Win32.Ranky.fp,Backdoor.Win32.Agent.abc,Trojan-Proxy.Win32.Ranky.fv,Trojan-Proxy.Win32.Ranky.gen,Trojan-Proxy.Win32.Agent.cv,Trojan-Proxy.Win32.Ranky.dk,Backdoor.Win32.IRCBot.ahm;
[McAfee]Proxy-Piky,Proxy-Pilky,Proxy-FBSR;
[F-Prot]W32/Downloader.LUM;
[Panda]Trj/Ranky.D;
[Computer Associates]Win32.Ranck.L,Win32/Ranky.L!Trojan;
[Other]Win32.Rank.KW,Win32.Ranck!generic,Win32.Ranck.LF,Backdoor.Ranky.X,Win32.Ranck.LG,Win32/Ranck.LL,Backdoor.Trojan,W32/Ranky.HP,Troj/FBSR-B,Win32/Ranck!generic,TrojanProxy:Win32/Ranky.HE

Ranck Files:
[%SYSTEM%]\msp32.exe
[%SYSTEM%]\msp32.exe

Ranck Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Ranck indications of infection

This symptoms of Ranck detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Sensive.10b Backdoor Symptoms
Bancos.FUO Trojan Removal
Y!.Crusher DoS Removal
Removing Shadow98 Trojan

SillyDL.7QD Trojan

SillyDL.7QD virus description
Technical details:
Categories: Trojan,Adware,Downloader
SillyDL.7QD Aliases:
[Other]W32/DLoader.BEIC

SillyDL.7QD Files:
[%WINDOWS%]\Temp\1.exe
[%PROFILE_TEMP%]\ieplorer.exe
[%SYSTEM%]\11683765931.exe
[%SYSTEM%]\drivers\qwwkbo52.sys
[%SYSTEM%]\qwwkbo52.dll
[%SYSTEM%]\s1168376583.web
[%WINDOWS%]\Temp\10565.exe
[%WINDOWS%]\Temp\1.exe
[%PROFILE_TEMP%]\ieplorer.exe
[%SYSTEM%]\11683765931.exe
[%SYSTEM%]\drivers\qwwkbo52.sys
[%SYSTEM%]\qwwkbo52.dll
[%SYSTEM%]\s1168376583.web
[%WINDOWS%]\Temp\10565.exe

SillyDL.7QD Registry Values:
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_qwwkbo52
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_qwwkbo52\0000
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_qwwkbo52\0000
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_qwwkbo52\0000
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_qwwkbo52\0000
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_qwwkbo52\0000
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_qwwkbo52\0000\control
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_qwwkbo52\0000\control
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\qwwkbo52
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\qwwkbo52
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\qwwkbo52
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\qwwkbo52
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\qwwkbo52
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\qwwkbo52
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\qwwkbo52\enum
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\qwwkbo52\enum
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\qwwkbo52\enum
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\qwwkbo52\security


SillyDL.7QD indications of infection

This symptoms of SillyDL.7QD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Stupen Trojan Symptoms

Bancos.HTW Trojan

Bancos.HTW virus description
Technical details:
Categories: Trojan

Bancos.HTW indications of infection

This symptoms of Bancos.HTW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Gen.Nv Trojan
BAT.Dvquest Trojan Removal

lycos.com Tracking Cookie

lycos.com virus description
Technical details:
Categories: Tracking Cookie

lycos.com indications of infection

This symptoms of lycos.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Banker.anv Spyware Symptoms
Remove DepthCharge.Server Trojan
MSN.Furax Trojan Removal

Formglieder Trojan

Formglieder virus description
Technical details:
Categories: Trojan

Formglieder indications of infection

This symptoms of Formglieder detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Venuv Trojan Removal
Osctr Trojan Information

Vxidl.APK Trojan

Vxidl.APK virus description
Technical details:
Categories: Trojan

Vxidl.APK indications of infection

This symptoms of Vxidl.APK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
bcentral.com Tracking Cookie Symptoms

Pigeon.AVSJ Trojan

Pigeon.AVSJ virus description
Technical details:
Categories: Trojan

Pigeon.AVSJ indications of infection

This symptoms of Pigeon.AVSJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
WAV.Launcher Trojan Cleaner
Vxidl.ACB Trojan Removal

TrafficSolution Adware

TrafficSolution virus description
Technical details:
Categories: Adware
TrafficSolution Aliases:
[Kaspersky]AdWare.Win32.TrafficSol.c;
[Other]trafficsolution,W32/Smalltroj.AYA

TrafficSolution Files:
[%PROFILE_TEMP%]\s118.5.exe
[%PROFILE_TEMP%]\s124.3.exe
[%PROFILE_TEMP%]\s1ms.5.exe
[%PROFILE_TEMP%]\s1uk.2.exe
[%PROFILE_TEMP%]\s20c.4.exe
[%PROFILE_TEMP%]\s2kc.4.exe
[%PROFILE_TEMP%]\s2ls.2.exe
[%PROFILE_TEMP%]\s2o0.1.exe
[%PROFILE_TEMP%]\s300.1.exe
[%PROFILE_TEMP%]\s300.1f.exe
[%PROFILE_TEMP%]\s3b8.4.exe
[%PROFILE_TEMP%]\s3m8.4.exe
[%PROFILE_TEMP%]\s3r0
[%PROFILE_TEMP%]\saek..exe
[%PROFILE_TEMP%]\si8k.4.exe
[%PROFILE_TEMP%]\src.1.exe
[%SYSTEM%]\ebo_1.0.3.9.exe
[%SYSTEM%]\traffic_solution_new.exe
[%PROFILE_TEMP%]\s118.5.exe
[%PROFILE_TEMP%]\s124.3.exe
[%PROFILE_TEMP%]\s1ms.5.exe
[%PROFILE_TEMP%]\s1uk.2.exe
[%PROFILE_TEMP%]\s20c.4.exe
[%PROFILE_TEMP%]\s2kc.4.exe
[%PROFILE_TEMP%]\s2ls.2.exe
[%PROFILE_TEMP%]\s2o0.1.exe
[%PROFILE_TEMP%]\s300.1.exe
[%PROFILE_TEMP%]\s300.1f.exe
[%PROFILE_TEMP%]\s3b8.4.exe
[%PROFILE_TEMP%]\s3m8.4.exe
[%PROFILE_TEMP%]\s3r0
[%PROFILE_TEMP%]\saek..exe
[%PROFILE_TEMP%]\si8k.4.exe
[%PROFILE_TEMP%]\src.1.exe
[%SYSTEM%]\ebo_1.0.3.9.exe
[%SYSTEM%]\traffic_solution_new.exe


TrafficSolution indications of infection

This symptoms of TrafficSolution detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Assassin.Pub RAT
Remove MSN.Win32.VB Trojan

WinSATAN Trojan

WinSATAN virus description
Technical details:
Categories: Trojan

WinSATAN indications of infection

This symptoms of WinSATAN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Default.BIOS.passwords Trojan Removal
Removing QFat24 Trojan

TrojanClicker.Win32.Agent Trojan

TrojanClicker.Win32.Agent virus description
Technical details:
Categories: Trojan,Adware
TrojanClicker.Win32.Agent Aliases:
[Panda]Trj/Agent.Q

TrojanClicker.Win32.Agent Files:
[%WINDOWS%]\inetm\1.00.03.dll
[%WINDOWS%]\inetm\1.00.03.dll


TrojanClicker.Win32.Agent indications of infection

This symptoms of TrojanClicker.Win32.Agent detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remote Backdoor Information
Small.abu Downloader Cleaner
Remove Win32.Delf.at Trojan
All.In.One.Telcom Adware Cleaner
HllP.Mf Trojan Cleaner

HighTraffic Adware

HighTraffic virus description
Technical details:
Categories: Adware,BHO

HighTraffic Files:
[%SYSTEM%]\bho2.dll
[%SYSTEM%]\msnie.dll
[%WINDOWS%]\system\bho2.dll
[%WINDOWS%]\system\msnie.dll
[%SYSTEM%]\bho2.dll
[%SYSTEM%]\msnie.dll
[%WINDOWS%]\system\bho2.dll
[%WINDOWS%]\system\msnie.dll

HighTraffic Registry Keys:
HKEY_CLASSES_ROOT\clsid\{53e10c2c-43b2-4657-ba29-aae179e7d35c}
HKEY_CLASSES_ROOT\clsid\{a8b9f08f-2fc4-4ade-9049-cfba586971ba}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{53e10c2c-43b2-4657-ba29-aae179e7d35c}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{a8b9f08f-2fc4-4ade-9049-cfba586971ba}
HKEY_LOCAL_MACHINE\software\classes\clsid\{53e10c2c-43b2-4657-ba29-aae179e7d35c}
HKEY_LOCAL_MACHINE\software\classes\clsid\{a8b9f08f-2fc4-4ade-9049-cfba586971ba}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{53e10c2c-43b2-4657-ba29-aae179e7d35c}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{a8b9f08f-2fc4-4ade-9049-cfba586971ba}


HighTraffic indications of infection

This symptoms of HighTraffic detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Oxon Backdoor
Win32.Feardoor Trojan Removal instruction
precisead.com Tracking Cookie Removal

Pugi Toolbar

Pugi virus description
Technical details:
Categories: Toolbar

Pugi indications of infection

This symptoms of Pugi detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Search.Exe Adware
Deus.Cleaner Ransomware Information
Remove Lamer Trojan

Pynix Adware

Pynix virus description
Technical details:
Categories: Adware

Pynix Files:
[%PROFILE_TEMP%]\THI3382.tmp\Pynix.inf
[%PROFILE_TEMP%]\THI7537.tmp\Pynix.inf
[%PROFILE_TEMP%]\THI3382.tmp\Pynix.inf
[%PROFILE_TEMP%]\THI7537.tmp\Pynix.inf


Pynix indications of infection

This symptoms of Pynix detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanDropper.JS.Mimail Trojan Information
Kalah Trojan Information
MBat Trojan Removal instruction
Remove BlazingTools.Perfect.Keylogger Spyware
Remove SillyDl.CGC Trojan

Bancos.GQV Trojan

Bancos.GQV virus description
Technical details:
Categories: Trojan

Bancos.GQV indications of infection

This symptoms of Bancos.GQV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bitch.Controller Trojan Removal
Vxidl.AUC Trojan Information
IDonate BHO Removal instruction
ProRat Trojan Symptoms
Bancos.GZV Trojan Cleaner

Creator Trojan

Creator virus description
Technical details:
Categories: Trojan,Worm,Backdoor,Hacker Tool
Creator Aliases:
[Kaspersky]Backdoor.Wow.23,VBS.GMWC,Constructor.DOS.Mktron;
[Eset]Win32/Wow.23 trojan;
[McAfee]BackDoor-US,KeySpy,VBS/RunScript.gen2,Junk-NavQuar;
[F-Prot]security risk or a "backdoor" program,VBS/GMW.C;
[Panda]Bck/Wow.23,VBS/GMWC,Virus Constructor;
[Computer Associates]Backdoor/Wow.2_3,Backdoor/Wow.2_3!Creator,Backdoor/Wow.2_3!Server,Backdoor/Wow.23

Creator indications of infection

This symptoms of Creator detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
WhenU.Search Toolbar Cleaner
Kimand Trojan Removal instruction
Voob Trojan Information
Remove Vxidl.AHE Trojan
Staff.Copp Spyware Symptoms

Cemgar Trojan

Cemgar virus description
Technical details:
Categories: Trojan

Cemgar Files:
[%SYSTEM%]\obdwk.sys
[%SYSTEM%]\odbcmr32.dll
[%SYSTEM%]\obdwk.sys
[%SYSTEM%]\odbcmr32.dll

Cemgar Registry Keys:
HKEY_CLASSES_ROOT\clsid\{cd03105b-2f50-4843-abc5-f245c39b3f21}
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\mcemgr

Cemgar Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shellserviceobjectdelayload


Cemgar indications of infection

This symptoms of Cemgar detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HIB Trojan Symptoms
Remove WbeCheck Backdoor
Win32.Supertoys Trojan Removal instruction
Removing Micro.Bot RAT

Pigeon.AWKN Trojan

Pigeon.AWKN virus description
Technical details:
Categories: Trojan

Pigeon.AWKN indications of infection

This symptoms of Pigeon.AWKN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Xsh0k DoS
Disk.Killer Trojan Removal instruction
W95.Hillary.gen Trojan Removal instruction
Pigeon.AVLS Trojan Symptoms
Heibai DoS Cleaner

ICMIBS Trojan

ICMIBS virus description
Technical details:
Categories: Trojan,Backdoor
ICMIBS Aliases:
[Kaspersky]Backdoor.Delf.aa;
[McAfee]BackDoor-XB;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/ICMIB;
[Computer Associates]Win32.Manage,Win32/Manage!Trojan

ICMIBS indications of infection

This symptoms of ICMIBS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ExtraToolbar Toolbar Symptoms
LMShare Trojan Information
Remove Win32.Banker.ckj Trojan
SwimSuitNetwork Adware Removal

Startpage.BJ!downloader Trojan

Startpage.BJ!downloader virus description
Technical details:
Categories: Trojan

Startpage.BJ!downloader indications of infection

This symptoms of Startpage.BJ!downloader detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ultimate.Fixer Ransomware Information
Redisin!Trojan Trojan Removal
DownHoax Trojan Removal
Fusion Backdoor Information
Alain's.pest Trojan Cleaner

Small.is Trojan

Small.is virus description
Technical details:
Categories: Trojan

Small.is indications of infection

This symptoms of Small.is detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GZL Trojan Removal
Pigeon.EFO Trojan Information
Bancos.GKF Trojan Information
CVI Backdoor Cleaner

Beta.Server Trojan

Beta.Server virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Beta.Server Aliases:
[Kaspersky]Backdoor.Incommand.10;
[Eset]Win32/InCommander.1_0 trojan;
[McAfee]BackDoor-DB;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program;
[Computer Associates]Backdoor/Incommand.10.pop,Win32.InCommand.17.A

Beta.Server indications of infection

This symptoms of Beta.Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Vxidl.AJU Trojan
Removing Orntroyo Trojan
Removing Xupiter.com Tracking Cookie
SubSeven.2b2 Trojan Removal
Remove Beta.Server Trojan