Lixy Trojan

Lixy virus description
Technical details:
Categories: Trojan,Adware,BHO,Backdoor,Hacker Tool
Lixy Aliases:
[Kaspersky]Backdoor.Lixy.a,Backdoor.Litmus.203,Backdoor.Win32.Loony.n;
[Eset]Win32/Lixy.A trojan,Win32/Litmus.203.C trojan,Win32/Loony.O trojan;
[Panda]Backdoor Program,Backdoor Program.LC,Bck/Lixy.A,Bck/Litmus.203,Trojan Horse;
[Computer Associates]Backdoor/Lixy,Backdoor/Lixy!ServerDLL,Win32.Lixy.B,Backdoor/Lixy!Server,Win32.Lixy,Backdoor/Litmus.203!Server,Backdoor/AZV.Server,Win32.Loonybot.T,Win32/Lolita.D!Trojan,Win32.Loli.E

Lixy Files:
[%SYSTEM%]\lid.dll
[%WINDOWS%]\system\lid.dll
[%SYSTEM%]\lid.dll
[%WINDOWS%]\system\lid.dll

Lixy Registry Keys:
HKEY_CLASSES_ROOT\clsid\{1e1b2879-88ff-11d2-8d96-d7acac95951a}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{1e1b2879-88ff-11d2-8d96-d7acac95951a}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{1e1b2879-88ff-11d2-8d96-d7acac95951a}


Lixy indications of infection

This symptoms of Lixy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bancos.ANZ Trojan
Kohv Trojan Removal
SillyDl.CKW Trojan Removal instruction
Nethief.XP RAT Symptoms

Win32.NetSpy Trojan

Win32.NetSpy virus description
Technical details:
Categories: Trojan,Backdoor
Win32.NetSpy Aliases:
[Kaspersky]Backdoor.Netspy.20.g

Win32.NetSpy indications of infection

This symptoms of Win32.NetSpy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Sapik.Modem DoS Information
R4mp4g3 DoS Cleaner
Removing Adload.nad Downloader
Y2KCount RAT Removal

Pigeon.AVKS Trojan

Pigeon.AVKS virus description
Technical details:
Categories: Trojan

Pigeon.AVKS indications of infection

This symptoms of Pigeon.AVKS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Keylog.God Trojan
Win32.Resod!DDos!Trojan DoS Removal

Frethog.AEP Trojan

Frethog.AEP virus description
Technical details:
Categories: Trojan

Frethog.AEP indications of infection

This symptoms of Frethog.AEP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ohanax Trojan Cleaner
Win32.SQLexp Trojan Removal
Removing Veronika Trojan

Port.Searcher RAT

Port.Searcher virus description
Technical details:
Categories: RAT

Port.Searcher indications of infection

This symptoms of Port.Searcher detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VBS.Lamat Trojan Removal
Bdoors Trojan Information
Bancos.HCX Trojan Symptoms

IELoader Adware

IELoader virus description
Technical details:
Categories: Adware

IELoader Files:
[%SYSTEM%]\mstbl.ocx
[%SYSTEM%]\iagold.exe
[%WINDOWS%]\system\aaa.exe
[%WINDOWS%]\system\py.exe
[%SYSTEM%]\mstbl.ocx
[%SYSTEM%]\iagold.exe
[%WINDOWS%]\system\aaa.exe
[%WINDOWS%]\system\py.exe

IELoader Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


IELoader indications of infection

This symptoms of IELoader detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Director Adware Removal
Removing AtomicLog Spyware

Vermillion.FTP.Daemon.for.Windows.NT.v1.Denial.of.Service Trojan

Vermillion.FTP.Daemon.for.Windows.NT.v1.Denial.of.Service virus description
Technical details:
Categories: Trojan
Vermillion.FTP.Daemon.for.Windows.NT.v1.Denial.of.Service Aliases:
[Kaspersky]DoS.Win32.Rask.vftp;
[McAfee]DoS-Rask;
[F-Prot]security risk or a "backdoor" program;
[Panda]DoS/Raskvftp;
[Computer Associates]Win32/Rask.vftp!Trojan

Vermillion.FTP.Daemon.for.Windows.NT.v1.Denial.of.Service indications of infection

This symptoms of Vermillion.FTP.Daemon.for.Windows.NT.v1.Denial.of.Service detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing REG.Startpage Trojan
Removing brightshare.com Tracking Cookie
Bancos.GFW Trojan Removal
Removing Vxidl.AIU Trojan

Bayros.Kit Trojan

Bayros.Kit virus description
Technical details:
Categories: Trojan,Hacker Tool
Bayros.Kit Aliases:
[Kaspersky]Constructor.BAT.Formater.b,Constructor.BAT.Rsbg,Constructor.DOS.IVP_17,Constructor.DOS.Vckit.a,Constructor.DOS.VirFactory,Constructor.DOS.Vkit,Constructor.VBS.Alamar.080,Constructor.VBS.Alamar.091,Constructor.VBS.Alamar.100,Constructor.VBS.Alamar.150.dr,Constructor.Vkit,packed: PkLite,VirTool.Win32.VBSEncrypt,Constructor.DOS.Vckit.b;
[McAfee]Bayros.Kit,Instant.kit,PWCrack-RA2x,Sirius.kit,Stalker.kit,VBS/VBSWG.Kit,VTool/rsi,W32/Generic.a@MM;
[F-Prot]corrupted or intended virus,virus construction tool;
[Panda]Constructor/Alamar,Constructor/Encrypt,Constructor/IVP_17,Daddy.24093,Factory.13305,Formater,Kalamar.const.1,Trojan Horse,VBS/VBSWGKit.150.Drp,VBS/VBSWGKit.200.A,Virus Constructor

Bayros.Kit indications of infection

This symptoms of Bayros.Kit detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Beta.Server Trojan
VBS.Kasnar Trojan Removal instruction
Bancos.GHS Trojan Removal
IstBar.au Downloader Cleaner
Bancos.HZV Trojan Cleaner

Dark.Avenger.Uriel Trojan

Dark.Avenger.Uriel virus description
Technical details:
Categories: Trojan
Dark.Avenger.Uriel Aliases:
[Kaspersky]Eddie.Uriel;
[Eset]Dark_Avenger.Uriel virus;
[McAfee]Univ/r;
[Panda]Eddie.Uriel

Dark.Avenger.Uriel indications of infection

This symptoms of Dark.Avenger.Uriel detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Ramirez.alfa Backdoor
Bancos.GBT Trojan Removal instruction
VB.vs Downloader Symptoms
Pigeon.AQA Trojan Removal instruction
SillyDl.CUY Trojan Symptoms

swisstools.net Tracking Cookie

swisstools.net virus description
Technical details:
Categories: Tracking Cookie

swisstools.net indications of infection

This symptoms of swisstools.net detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
r's.FTP.Server Trojan Cleaner
Freaker Trojan Cleaner
Amazon.Queen Trojan Removal

SillyDl.DOY Trojan

SillyDl.DOY virus description
Technical details:
Categories: Trojan

SillyDl.DOY indications of infection

This symptoms of SillyDl.DOY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
WinShell Trojan Information

SillyDl.BBN Trojan

SillyDl.BBN virus description
Technical details:
Categories: Trojan

SillyDl.BBN indications of infection

This symptoms of SillyDl.BBN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Inet.Traffic Tracking Cookie Cleaner
AdLinks Adware Information
Removing Zlob.Fam.TrustInBar Trojan

web.stats.org Tracking Cookie

web.stats.org virus description
Technical details:
Categories: Tracking Cookie

web.stats.org indications of infection

This symptoms of web.stats.org detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Tuloti Trojan

traderonline.com Tracking Cookie

traderonline.com virus description
Technical details:
Categories: Tracking Cookie

traderonline.com indications of infection

This symptoms of traderonline.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
swisstools.net Tracking Cookie Removal instruction
Knetdump Trojan Cleaner
Rewzaq Trojan Symptoms

Bancos.IGE Trojan

Bancos.IGE virus description
Technical details:
Categories: Trojan

Bancos.IGE indications of infection

This symptoms of Bancos.IGE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing BoPeep Trojan
Win32.StartPage.jx Trojan Removal instruction

VintuHana Trojan

VintuHana virus description
Technical details:
Categories: Trojan
VintuHana Aliases:
[Kaspersky]Trojan.VintuHana;
[Panda]Trojan Horse;
[Computer Associates]Vintuhana!Trojan

VintuHana indications of infection

This symptoms of VintuHana detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GMU Trojan Removal instruction

IcQeFlooder Trojan

IcQeFlooder virus description
Technical details:
Categories: Trojan,DoS
IcQeFlooder Aliases:
[Kaspersky]Flooder.ICQ.VB.a;
[Panda]Flooder Program;
[Computer Associates]Win32/Flooder.ICQ.VB.F!Trojan

IcQeFlooder indications of infection

This symptoms of IcQeFlooder detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVNO Trojan Removal instruction
QuickSearch Toolbar Information
Bancos.HTK Trojan Removal instruction
Remove Moshpunt Trojan

InReg Trojan

InReg virus description
Technical details:
Categories: Trojan
InReg Aliases:
[Panda]Trj/InReg

InReg indications of infection

This symptoms of InReg detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Lop.com.AYB Spyware
mOTFv3 DoS Cleaner
Shador Backdoor Removal instruction

Surfairy Adware

Surfairy virus description
Technical details:
Categories: Adware

Surfairy Registry Keys:
HKEY_CURRENT_USER\software\surfairy


Surfairy indications of infection

This symptoms of Surfairy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Dude Trojan Removal instruction
Vxidl.ABU Trojan Information
SillyDl.CAM Downloader Symptoms
Removing TrojanSpy.Win32.KeyLogger.al Trojan
Mosquito.Net.0b3 Trojan Removal instruction