Phishbank.AYP Trojan

Phishbank.AYP virus description
Technical details:
Categories: Trojan
Phishbank.AYP Aliases:
[Other]HTML/Phishbank.AYP

Phishbank.AYP indications of infection

This symptoms of Phishbank.AYP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Hastings Trojan Removal
Win2K.Infis Trojan Cleaner
Bancos.GYJ Trojan Cleaner

Kedad Trojan

Kedad virus description
Technical details:
Categories: Trojan,Hacker Tool
Kedad Aliases:
[Panda]Trojan Horse;
[Computer Associates]Win32/Kedad.A!PWS!Trojan

Kedad indications of infection

This symptoms of Kedad detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Badpapots Downloader Cleaner
GlobalAccess Dialer Symptoms
Pigeon.AXV Trojan Removal
Cyn.03a Trojan Cleaner
AIMFatal Trojan Symptoms

SexoDial Adware

SexoDial virus description
Technical details:
Categories: Adware

SexoDial Registry Keys:
HKEY_CLASSES_ROOT\clsid\{8e65b894-c2e9-11d5-bcd3-00e018987519}


SexoDial indications of infection

This symptoms of SexoDial detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Moridin Trojan

Vxidl.AFY Trojan

Vxidl.AFY virus description
Technical details:
Categories: Trojan

Vxidl.AFY indications of infection

This symptoms of Vxidl.AFY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Sysbusex Trojan Symptoms
Subroot Backdoor Information

Pigeon.AZJ Trojan

Pigeon.AZJ virus description
Technical details:
Categories: Trojan

Pigeon.AZJ indications of infection

This symptoms of Pigeon.AZJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove InCommand.67b Backdoor
Remove Delf.zn Backdoor
Remove WebCracker Trojan

Tieing.up.the.schools.phones DoS

Tieing.up.the.schools.phones virus description
Technical details:
Categories: DoS

Tieing.up.the.schools.phones indications of infection

This symptoms of Tieing.up.the.schools.phones detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GLT Trojan Information
Skyfire.Spy Trojan Symptoms

PostData.Spy DoS

PostData.Spy virus description
Technical details:
Categories: DoS

PostData.Spy indications of infection

This symptoms of PostData.Spy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
StartPade Trojan Removal
Bancos.GVH Trojan Symptoms
Removing Oprobe Trojan
pro.advertising.com Tracking Cookie Symptoms
Remove Bancos.GBT Trojan

AZV Trojan

AZV virus description
Technical details:
Categories: Trojan
AZV Aliases:
[Kaspersky]Backdoor.Win32.Hackarmy.w,Backdoor.Loony.a;
[Eset]Win32/Hackarmy.AD trojan,Win32/Loony.A1 trojan;
[Computer Associates]Win32/AZV.10778.Worm,Win32.Rawbot.AT,Backdoor/AZV,Win32.Loonybot.C

AZV indications of infection

This symptoms of AZV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.ACY Trojan Cleaner
PSW.Lmir.br Trojan Symptoms
IRCFlood Trojan Symptoms
Removing Happy.Browser Trojan
Removing Pigeon.ANG Trojan

TheSource DoS

TheSource virus description
Technical details:
Categories: DoS

TheSource indications of infection

This symptoms of TheSource detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Coreflood.DLL.Troja Trojan
Bat.qz15 Trojan Cleaner
PWS.Hooker.dll Trojan Removal instruction
Remove Finfog Trojan
Bancos.GRP Trojan Removal instruction

NetVision Adware

NetVision virus description
Technical details:
Categories: Adware,Toolbar
NetVision Aliases:
[Kaspersky]Trojan.Win32.Diamin.t,Trojan.Win32.Dialer.bn;
[Panda]Adware/BlazeFind;
[Other]Dialer.Trafficadvance

NetVision indications of infection

This symptoms of NetVision detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
poshuk.com Tracking Cookie Cleaner

Nakter.Affe RAT

Nakter.Affe virus description
Technical details:
Categories: RAT
Nakter.Affe Aliases:
[Kaspersky]Backdoor.Nakter;
[McAfee]BackDoor-YF;
[F-Prot]security risk or a "backdoor" program

Nakter.Affe Files:
[%WINDOWS%]\sysw32.exe
[%WINDOWS%]\sysw32.exe


Nakter.Affe indications of infection

This symptoms of Nakter.Affe detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Agent.bc Trojan Information
ZeroVir Downloader Information
Removing UDPer DoS
Pigeon.AOQ Trojan Removal instruction

Litmus.Server Trojan

Litmus.Server virus description
Technical details:
Categories: Trojan
Litmus.Server Aliases:
[Kaspersky]Backdoor.Litmus.203,Backdoor.Lixy.a;
[Eset]Win32/Litmus.203.A trojan,Win32/Lixy.A trojan;
[Panda]Backdoor Program;
[Computer Associates]Backdoor/Litmus.203.Server,Win32.Litmus.203,Backdoor/Lixy,Win32.Lixy.B

Litmus.Server indications of infection

This symptoms of Litmus.Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Agobot.at Trojan
Backdoor.Delf Trojan Removal
Remove LSL Trojan

Masters.Paradise.Angel Trojan

Masters.Paradise.Angel virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Masters.Paradise.Angel Aliases:
[Kaspersky]Backdoor.MasterParadise.d;
[Eset]Win32/Master_Paradise.9_9d trojan;
[McAfee]BackDoor-AH;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bk/MasterParadise.d;
[Computer Associates]Backdoor/MasterParadise.D,Win32.MasterParadise.d

Masters.Paradise.Angel indications of infection

This symptoms of Masters.Paradise.Angel detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Carpe.Diem Trojan
INF.Pigeon Trojan Removal instruction
Removing Passenger Trojan

Hepster Trojan

Hepster virus description
Technical details:
Categories: Trojan

Hepster indications of infection

This symptoms of Hepster detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bat.Killdos Trojan Removal instruction

Lame.Toy Trojan

Lame.Toy virus description
Technical details:
Categories: Trojan
Lame.Toy Aliases:
[Kaspersky]Exploit.ICQ.DbKiller;
[McAfee]ICQ-Dbkill

Lame.Toy indications of infection

This symptoms of Lame.Toy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VNCKill Trojan Cleaner
Redirectmaster Hijacker Symptoms
Nowarn Trojan Information

411Ferret Adware

411Ferret virus description
Technical details:
Categories: Adware

411Ferret indications of infection

This symptoms of 411Ferret detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bat.Sb Trojan Removal instruction
Drowpete Trojan Removal

Vice Trojan

Vice virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Vice Aliases:
[Kaspersky]VICE.01.Sample,VICE.02.IceMelt;
[McAfee]VICE1;
[Panda]Vice_2,Vice.02.Ice;
[Computer Associates]Vice.2406.B,Vice.2502

Vice Files:
[%APPDATA%]\qublbraioim.dll
[%APPDATA%]\qublbraioim.dll

Vice Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\new windows\allow
HKEY_CURRENT_USER\software\microsoft\internet explorer\new windows\allow
HKEY_CURRENT_USER\software\microsoft\internet explorer\new windows\allow
HKEY_CURRENT_USER\software\microsoft\internet explorer\new windows\allow
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\products\c8d617f6f8933d11581e000540386890\webpublfiles


Vice indications of infection

This symptoms of Vice detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing LmBO Trojan

Sub.Mariner RAT

Sub.Mariner virus description
Technical details:
Categories: RAT

Sub.Mariner indications of infection

This symptoms of Sub.Mariner detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
RTB666.65a Trojan Information
Remove TrojanDownloader.Win32.Small Trojan

InstallVivid Trojan

InstallVivid virus description
Technical details:
Categories: Trojan
InstallVivid Aliases:
[Panda]Trojan Horse

InstallVivid indications of infection

This symptoms of InstallVivid detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
with.Netware.xs.TTS DoS Information
Win32.Augudor Trojan Removal
Gammae Tracking Cookie Cleaner

Cero Trojan

Cero virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Cero Aliases:
[Kaspersky]Backdoor.Cero,Backdoor.Win32.Cero;
[Eset]Win32/Cero trojan,Win32/Cero.Client trojan,Win32/Cero.Server trojan;
[McAfee]Generic;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Cero.1.0;
[Computer Associates]Backdoor/Cero,Backdoor/Cero1_0!Server

Cero indications of infection

This symptoms of Cero detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
P2E.ai Trojan Information
PHP.Liquid Trojan Information
PMT.kit Trojan Symptoms
IstBar.ay Downloader Symptoms

ClientMan.2in1 BHO

ClientMan.2in1 virus description
Technical details:
Categories: BHO

ClientMan.2in1 Files:
[%SYSTEM%]\msncjk.dll
[%SYSTEM%]\msncjk.dll


ClientMan.2in1 indications of infection

This symptoms of ClientMan.2in1 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bat.small Trojan Information

Vxidl.AZK Trojan

Vxidl.AZK virus description
Technical details:
Categories: Trojan

Vxidl.AZK indications of infection

This symptoms of Vxidl.AZK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Technical.Difficulties DoS Removal
Rip.Utils Trojan Removal instruction
Generic Trojan Trojan Removal instruction
PHP.Nawai Trojan Cleaner
Priosted Trojan Information

BAT.Hostblock Trojan

BAT.Hostblock virus description
Technical details:
Categories: Trojan

BAT.Hostblock indications of infection

This symptoms of BAT.Hostblock detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
LB5.Bomb DoS Removal instruction
Dialer.gen Adware Removal
Removing HLLO.Picked Trojan
Bancos.HMZ Trojan Cleaner

Rorcver Trojan

Rorcver virus description
Technical details:
Categories: Trojan
Rorcver Aliases:
[Other]Win32/Rorcver.C,Trojna.Adclicker

Rorcver indications of infection

This symptoms of Rorcver detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Andum Trojan Information

Delsystem Trojan

Delsystem virus description
Technical details:
Categories: Trojan,Hacker Tool
Delsystem Aliases:
[Eset]DelSystem.G trojan;
[Panda]Trj/DelSystem,Trj/DelSystem.A,Trojan Horse,Trj/DeltreeY.d;
[Computer Associates]DelSystem.I!Trojan,Delsystem.6544!Trojan,DelSystem.G!Trojan,DelSystem.H!Trojan,DelSystem.II!Trojan

Delsystem indications of infection

This symptoms of Delsystem detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bancos.ZZF Trojan
Moonpie.10b Backdoor Removal
Skeleton.Key Spyware Removal instruction
OneShare.com Tracking Cookie Removal

Remote.Control.Panel Trojan

Remote.Control.Panel virus description
Technical details:
Categories: Trojan

Remote.Control.Panel indications of infection

This symptoms of Remote.Control.Panel detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Jackal Trojan Information

Shuckot Downloader

Shuckot virus description
Technical details:
Categories: Downloader

Shuckot Files:
[%SYSTEM%]\netdde32.exe
[%WINDOWS%]\KB998017.log
[%WINDOWS%]\netdde32.exe
[%SYSTEM%]\netdde32.exe
[%WINDOWS%]\KB998017.log
[%WINDOWS%]\netdde32.exe


Shuckot indications of infection

This symptoms of Shuckot detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
IRC.Anon DoS Removal instruction
mIRC.Critical!Trojan Trojan Information
Remove SillyDl.DLK Trojan
Win32.Cazdoor Trojan Removal instruction
WWW.GlobeTechnology.com Tracking Cookie Removal instruction

Centim Trojan

Centim virus description
Technical details:
Categories: Trojan

Centim Files:
[%SYSTEM%]\gnucdna.dll
[%SYSTEM%]\gnucdna.dll


Centim indications of infection

This symptoms of Centim detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VBS.OUA Trojan Symptoms
VB.fk Trojan Removal
PSW.Lmir.ec Trojan Information
Bancos.HGK Trojan Removal instruction