Tsunami Trojan

Tsunami virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Tsunami Aliases:
[Kaspersky]Tsunami.2965.b;
[Panda]Tsunami.2966.B

Tsunami indications of infection

This symptoms of Tsunami detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Drunk.Avenger Trojan Removal instruction

PSW.Stealth Trojan

PSW.Stealth virus description
Technical details:
Categories: Trojan,Hacker Tool
PSW.Stealth Aliases:
[Panda]Trj/PSW.Stealth.d.I,Trj/Stealth.C,Trojan Horse.LC;
[Computer Associates]Win32.PSW.Stealth.D,Win32.PSW.Stealth.C,Win32/Stealth.Z!Trojan,Win32.PSW.Stealth.E,Win32/Stealth.e!PWS!Trojan

PSW.Stealth indications of infection

This symptoms of PSW.Stealth detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MGTU Trojan Cleaner
Remove Bang.Youre.Dead Trojan

TrojanDownloader.Win32.Small.nu Trojan

TrojanDownloader.Win32.Small.nu virus description
Technical details:
Categories: Trojan,Downloader
TrojanDownloader.Win32.Small.nu Aliases:
[Panda]Trj/Downloader.HZ

TrojanDownloader.Win32.Small.nu Files:
[%SYSTEM%]\vnmispoisn_downloader.exe
[%SYSTEM%]\vnmispoisn_downloader.exe


TrojanDownloader.Win32.Small.nu indications of infection

This symptoms of TrojanDownloader.Win32.Small.nu detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Dialer.RAS.bd.gen Adware Removal
Pc.Xplorer Trojan Information
PWS.Hooker.dll Trojan Cleaner
XQ Backdoor Symptoms
CWS.Time Trojan Removal

GTBot Trojan

GTBot virus description
Technical details:
Categories: Trojan,Worm,Backdoor,DoS
GTBot Aliases:
[Kaspersky]Backdoor.IRC.Bnc.b,Backdoor.IRC.Cloner,Backdoor.IRC.Prison,DoS.Win32.Soldier,Trojan.VBS.Lamping,Backdoor.IRC.Flood.a;
[McAfee]DDoS-Soldier;
[F-Prot]destructive program;
[Panda]Backdoor Program,DoS/Win32.Soldier,Univ.EP,Worm Generic.LC;
[Computer Associates]IRC.Flood,mIRC/IRCFlood.C!Trojan,mIRC/Shaz.A!Worm,Pirch/Sub7.Acnu!Trojan,VBS/BackdoorPing!Trojan,Win32/Pepsi!Flooder!Trojan

GTBot indications of infection

This symptoms of GTBot detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVCY Trojan Cleaner
Removing OutKast3 DoS
Remove Gosock Trojan

Swedish.Boys Trojan

Swedish.Boys virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Swedish.Boys Aliases:
[Kaspersky]BetaBoys.457,BetaBoys.538,BetaBoys.459;
[Eset]Swdsh_Bs.457 virus,BetaBoys.538 virus,Swdsh_Bs.459 virus;
[Panda]Headache.457,Swedish_WhyWin.1244;
[Computer Associates]Headache,Data Molester

Swedish.Boys indications of infection

This symptoms of Swedish.Boys detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.ATW Trojan Symptoms
Remove PWThief RAT
Remove Pigeon.ACZ Trojan
Remove INF.Pigeon Trojan
Remove Stealth.Password.Sender Trojan

Cybercide Trojan

Cybercide virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Cybercide Aliases:
[Kaspersky]Cybercide.1321,Virus.DOS.Cybercide.1307;
[Panda]Cibercide;
[Computer Associates]Cybercide.2299.b,Cybercide.846

Cybercide indications of infection

This symptoms of Cybercide detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Drzip Trojan Removal instruction
PWS.MSNFake.gen Trojan Removal instruction
QZap134 Trojan Removal instruction
Win32.Cazdoor Trojan Cleaner

CoolSavings Adware

CoolSavings virus description
Technical details:
Categories: Adware

CoolSavings Folders:
[%PROFILE_TEMP%]\coolcache

CoolSavings Files:
[%PROFILE_TEMP%]\CoolCache\Piggy.CGD
[%WINDOWS%]\downloaded program files\cpnmgr.dll
[%WINDOWS%]\TEMP\CoolCache\Piggy.CGD
[%PROFILE_TEMP%]\CoolCache\Piggy.CGD
[%WINDOWS%]\downloaded program files\cpnmgr.dll
[%WINDOWS%]\TEMP\CoolCache\Piggy.CGD

CoolSavings Registry Keys:
HKEY_CLASSES_ROOT\clsid\{549f957e-2f89-11d6-8cfe-00c04f52b225}
HKEY_CLASSES_ROOT\cpnmgr.cmv5
HKEY_CLASSES_ROOT\cpnmgr.cmv5.3
HKEY_CLASSES_ROOT\interface\{549f957d-2f89-11d6-8cfe-00c04f52b225}
HKEY_CLASSES_ROOT\interface\{549f957f-2f89-11d6-8cfe-00c04f52b225}
HKEY_CLASSES_ROOT\typelib\{549f9571-2f89-11d6-8cfe-00c04f52b225}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{549F957E-2F89-11D6-8CFE-00C04F52B225}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\c:\windows\downloaded program files\cpnmgr.dll
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{549f957e-2f89-11d6-8cfe-00c04f52b225}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]\downloaded program files\cpnmgr.dll

CoolSavings Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\c:/winnt/downloaded program files/cpnmgr.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]/downloaded program files/cpnmgr.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]/downloaded program files/cpnmgr.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls


CoolSavings indications of infection

This symptoms of CoolSavings detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Comasp.V472 RAT Removal instruction
Pigeon.AVCP Trojan Removal

Mif Trojan

Mif virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Mif Aliases:
[Panda]MIF.460.Drp

Mif indications of infection

This symptoms of Mif detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Timebomb Trojan Removal
Remove PlayTetris Trojan
TrojanDropper.Win32.Delf.bk Trojan Cleaner
Frase Trojan Cleaner
Abetels Adware Cleaner

SpyGuardPro Ransomware

SpyGuardPro virus description
Technical details:
Categories: Ransomware
SpyGuardPro Aliases:
[Kaspersky]Downloader.Win32.WinFixer.au;
[Other]TrojanDownloader:Win32/Renos

SpyGuardPro Folders:
[%PROGRAM_FILES%]\SpyGuardPro

SpyGuardPro Files:
[%APPDATA%]\SpyGuardPro\avtasks.dat
[%APPDATA%]\SpyGuardPro\Logs\av.log
[%APPDATA%]\SpyGuardPro\Logs\ga6Support.log
[%APPDATA%]\SpyGuardPro\Logs\update.log
[%COMMON_DESKTOPDIRECTORY%]\SpyGuardPro.lnk
[%COMMON_PROGRAMS%]\SpyGuardPro\Contact Customer Support.lnk
[%COMMON_PROGRAMS%]\SpyGuardPro\SpyGuardPro.lnk
[%COMMON_PROGRAMS%]\SpyGuardPro\Uninstall SpyGuardPro.lnk
[%PROGRAM_FILES_COMMON%]\SpyGuardPro\bm.exe
[%PROGRAM_FILES_COMMON%]\SpyGuardPro\ugcw.exe
[%APPDATA%]\SpyGuardPro\avtasks.dat
[%APPDATA%]\SpyGuardPro\Logs\av.log
[%APPDATA%]\SpyGuardPro\Logs\ga6Support.log
[%APPDATA%]\SpyGuardPro\Logs\update.log
[%COMMON_DESKTOPDIRECTORY%]\SpyGuardPro.lnk
[%COMMON_PROGRAMS%]\SpyGuardPro\Contact Customer Support.lnk
[%COMMON_PROGRAMS%]\SpyGuardPro\SpyGuardPro.lnk
[%COMMON_PROGRAMS%]\SpyGuardPro\Uninstall SpyGuardPro.lnk
[%PROGRAM_FILES_COMMON%]\SpyGuardPro\bm.exe
[%PROGRAM_FILES_COMMON%]\SpyGuardPro\ugcw.exe

SpyGuardPro Registry Keys:
HKEY_CURRENT_USER\software\spyguardpro
HKEY_LOCAL_MACHINE\software\spyguardpro

SpyGuardPro Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonce
HKEY_LOCAL_MACHINE\software\products
HKEY_LOCAL_MACHINE\software\products


SpyGuardPro indications of infection

This symptoms of SpyGuardPro detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
IGetNet Adware Symptoms
DTr.beta Backdoor Removal instruction
Removing Smtpkill DoS

Vxidl.BGG Trojan

Vxidl.BGG virus description
Technical details:
Categories: Trojan

Vxidl.BGG indications of infection

This symptoms of Vxidl.BGG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove TrojanDownloader.VBS.Codin Trojan
Neodurk Trojan Removal
Remove Psychward.03b RAT
AIM.Spammer Trojan Removal instruction
Startpage.Z!downloader Trojan Information

Ribbon Trojan

Ribbon virus description
Technical details:
Categories: Trojan
Ribbon Aliases:
[Kaspersky]Trojan.DOS.Ribbon,Trojan.Ribbon;
[McAfee]Ribbon;
[F-Prot]destructive program;
[Panda]Trj/Ribbon;
[Computer Associates]Ribbon,Unke-452!Trojan

Ribbon indications of infection

This symptoms of Ribbon detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Setial Trojan Removal instruction
SillyDl.CLZ Trojan Removal
Removing Bancos.GZC Trojan
Removing Pigeon.ABM1 Trojan
Removing BackAttack Backdoor

Deicide Trojan

Deicide virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Deicide Aliases:
[Kaspersky]Deicide.665,Deicide.1335;
[Panda]Deicide.666,Deicide.665,Deicide2.1335;
[Computer Associates]Deicide,Deicide 666.B,Deicide II

Deicide indications of infection

This symptoms of Deicide detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Centrport.net Tracking Cookie Cleaner
FakeGina Trojan Cleaner
Removing Pigeon.AIK Trojan

statistiche.it Tracking Cookie

statistiche.it virus description
Technical details:
Categories: Tracking Cookie

statistiche.it indications of infection

This symptoms of statistiche.it detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing ASP Trojan
Hello Trojan Removal

AntiLamer.Server.family Backdoor

AntiLamer.Server.family virus description
Technical details:
Categories: Backdoor
AntiLamer.Server.family Aliases:
[Computer Associates]Backdoor/AntiLamer Server family

AntiLamer.Server.family indications of infection

This symptoms of AntiLamer.Server.family detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
AOL.RTools Trojan Symptoms
Pigeon.AFC Trojan Symptoms
Zap Trojan Information
Zu RAT Information

SillyDl.CFT Trojan

SillyDl.CFT virus description
Technical details:
Categories: Trojan

SillyDl.CFT indications of infection

This symptoms of SillyDl.CFT detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Dark.IRC Backdoor Symptoms
aport.ru Tracking Cookie Removal instruction
Rbot.GHJ Worm Symptoms
ControlTotal.k[2] Backdoor Removal instruction

Ciadoor Trojan

Ciadoor virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Ciadoor Aliases:
[Kaspersky]Backdoor.Win32.Ciadoor.12.a,Backdoor.Win32.Ciadoor.13;
[Panda]Bck/Ciadoor.A,Bck/Ciadoor.C,Backdoor Program;
[Computer Associates]Win32.Ciadoor.121.B,Win32/Ciadoor.121.B!Backdoor!Ser,Win32/Ciadoor.122!Backdoor!Serve,Win32.Ciadoor.121.C,Win32/Ciadoor.12.A!Backdoor!Serv;
[Other]Win32/Ciadoor.M,Backdoor.Ciadoor

Ciadoor Files:
[%SYSTEM%]\wsock32.sys
[%SYSTEM%]\wsock32.sys

Ciadoor Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows nt\currentversion\windows
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonce
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonce
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonce
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonce
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonce
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonceex
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonceex
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonceex
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonceex
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonceex
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list


Ciadoor indications of infection

This symptoms of Ciadoor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
tunes Trojan Removal

Lidoor Trojan

Lidoor virus description
Technical details:
Categories: Trojan

Lidoor indications of infection

This symptoms of Lidoor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
IIS.WebCart Trojan Information
Pigeon.AQS Trojan Symptoms
Bez6n4r21Exe Trojan Symptoms

Small.aui Downloader

Small.aui virus description
Technical details:
Categories: Downloader

Small.aui Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Small.aui indications of infection

This symptoms of Small.aui detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
NetTrash Backdoor Removal instruction

SillyDl.DNK Trojan

SillyDl.DNK virus description
Technical details:
Categories: Trojan
SillyDl.DNK Aliases:
[Kaspersky]Trojan.Win32.VB.bhr

SillyDl.DNK indications of infection

This symptoms of SillyDl.DNK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Dorneg Trojan Removal
Removing Vxidl.ALB Trojan
Keylogger Trojan Removal instruction
Bancos.HDC Trojan Cleaner
Arb.bytefusion.pl DoS Symptoms

SillyDl.CYU Trojan

SillyDl.CYU virus description
Technical details:
Categories: Trojan

SillyDl.CYU indications of infection

This symptoms of SillyDl.CYU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Dowque.AFJ Trojan Information
freecount.net Tracking Cookie Removal
DownloadWare Adware Symptoms
Removing Bancos.ICU Trojan
Remove Pigeon.FAJ Trojan

HLL.ow.7424a Trojan

HLL.ow.7424a virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
HLL.ow.7424a Aliases:
[Kaspersky]HLLO.Wonder.7424.a,HLLO.Wonder.7424.b;
[Eset]Wonder.A virus;
[McAfee]HLL.ow.7424a,HLL.ow.7424b;
[F-Prot]HLLO.7424.A,HLLO.7424.C;
[Panda]Wonder 2;
[Computer Associates]HLLO.7424.A

HLL.ow.7424a indications of infection

This symptoms of HLL.ow.7424a detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vortexx.Project.Bomber DoS Symptoms
ScreenCutter Backdoor Cleaner
WinFixer Adware Symptoms
Pitfall.Armlock Backdoor Removal
Hell.Devil DoS Removal

Blood.Lust Trojan

Blood.Lust virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Blood.Lust Aliases:
[Eset]Bloodlst virus;
[Panda]Blood lost;
[Computer Associates]Blood Lust

Blood.Lust indications of infection

This symptoms of Blood.Lust detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Checkout Trojan Cleaner

SillyDl.CWZ Trojan

SillyDl.CWZ virus description
Technical details:
Categories: Trojan

SillyDl.CWZ indications of infection

This symptoms of SillyDl.CWZ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Small.ga Downloader Removal instruction
Bancos.BZN Trojan Removal instruction

Netdeny.A Trojan

Netdeny.A virus description
Technical details:
Categories: Trojan

Netdeny.A indications of infection

This symptoms of Netdeny.A detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanDownloader.Win32.Miled Trojan Removal
ICQ.Port.Scan Trojan Cleaner
TrojanDropper.Win32.Ranky Trojan Information
Tourniquet.0b2 Backdoor Removal instruction
Remove StartPage.bf Hijacker

TrojanDownloader Downloader

TrojanDownloader virus description
Technical details:
Categories: Downloader

TrojanDownloader Registry Keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{972BB342-14A7-4660-83C1-51DDBEE171DB}
HKEY_CURRENT_USER\software\psof1
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{972bb342-14a7-4660-83c1-51ddbee171db}


TrojanDownloader indications of infection

This symptoms of TrojanDownloader detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Hauntpc Trojan Cleaner
Keyboard.spectator Spyware Symptoms

PSW.Lmir.dx Trojan

PSW.Lmir.dx virus description
Technical details:
Categories: Trojan,Hacker Tool
PSW.Lmir.dx Aliases:
[Panda]Trojan Horse.LC

PSW.Lmir.dx indications of infection

This symptoms of PSW.Lmir.dx detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VB.ln Trojan Removal
Frethog.ACT Trojan Information

Small.cqy Trojan

Small.cqy virus description
Technical details:
Categories: Trojan

Small.cqy indications of infection

This symptoms of Small.cqy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Paradise.Agent Trojan Removal instruction
Removing KNotZsImZ DoS

Microspy Spyware

Microspy virus description
Technical details:
Categories: Spyware,Backdoor,RAT,Hacker Tool
Microspy Aliases:
[Kaspersky]Backdoor.MicroSpy.10;
[McAfee]BackDoor-MR;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Microspy;
[Computer Associates]Backdoor/MicroSpy.10

Microspy Files:
[%WINDOWS%]\win32.exe
[%WINDOWS%]\win32.exe

Microspy Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Microspy indications of infection

This symptoms of Microspy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Blade.Runner Trojan Removal instruction

VB.by Adware

VB.by virus description
Technical details:
Categories: Adware

VB.by indications of infection

This symptoms of VB.by detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Formshared Trojan Removal
Vxidl.AMT Trojan Information
File.Injector Trojan Information
NetAdv Toolbar Removal
SillyDl.CIV Trojan Removal