Bancos.IFF Trojan

Bancos.IFF virus description
Technical details:
Categories: Trojan

Bancos.IFF indications of infection

This symptoms of Bancos.IFF detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
FTP Trojan Removal
ISTbar.CSearch Hijacker Removal
Mitglieder.Q Trojan Removal

Pigeon.AVUV Trojan

Pigeon.AVUV virus description
Technical details:
Categories: Trojan

Pigeon.AVUV indications of infection

This symptoms of Pigeon.AVUV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Huey RAT Removal instruction
Bancos.HKT Trojan Symptoms

Win32.Fakepay Trojan

Win32.Fakepay virus description
Technical details:
Categories: Trojan
Win32.Fakepay Aliases:
[Panda]Trojan Horse.LC

Win32.Fakepay indications of infection

This symptoms of Win32.Fakepay detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ads.SpecificPop Tracking Cookie Cleaner
Cheqtal Trojan Symptoms
Remove indiads.com Tracking Cookie

Elite.Keylogger Spyware

Elite.Keylogger virus description
Technical details:
Categories: Spyware

Elite.Keylogger Folders:
[%PROGRAMS%]\WideStep Elite Keylogger 3.0
[%PROGRAM_FILES%]\widestep software\elite keylogger

Elite.Keylogger Files:
[%WINDOWS%]\help\ek_manual.chm
[%PROGRAMS%]\widestep elite keylogger 2.6\uninstall.lnk
[%PROGRAMS%]\widestep elite keylogger 2.6\view logs.lnk
[%SYSTEM%]\atmadsvr.exe
[%SYSTEM%]\drivers\atinnt.sys
[%SYSTEM%]\drivers\atinx2k.sys
[%SYSTEM%]\drivers\raspex.sys
[%SYSTEM%]\mscache.sys
[%SYSTEM%]\sto32.dll
[%WINDOWS%]\help\ek_manual.chm
[%PROGRAMS%]\widestep elite keylogger 2.6\uninstall.lnk
[%PROGRAMS%]\widestep elite keylogger 2.6\view logs.lnk
[%SYSTEM%]\atmadsvr.exe
[%SYSTEM%]\drivers\atinnt.sys
[%SYSTEM%]\drivers\atinx2k.sys
[%SYSTEM%]\drivers\raspex.sys
[%SYSTEM%]\mscache.sys
[%SYSTEM%]\sto32.dll

Elite.Keylogger Registry Keys:
HKEY_CLASSES_ROOT\clsid\{0a252b94-2fcd-bbf8-8add-aa019f83938e}
HKEY_CLASSES_ROOT\clsid\{333bd105-16d3-4169-b3c3-5090a69d691f}
HKEY_CLASSES_ROOT\clsid\{60322fda-45da-bfb6-e0ca-ae4ff59497c0}
HKEY_LOCAL_MACHINE\software\widestep\elitekeylogger
HKEY_LOCAL_MACHINE\system\controlset001\services\tdiip
HKEY_LOCAL_MACHINE\system\controlset001\services\usbkbd
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\atinnt
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\atinx2k
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\raspex
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\tdiip
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\usbkbd

Elite.Keylogger Registry Values:
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses
HKEY_LOCAL_MACHINE\software\licenses


Elite.Keylogger indications of infection

This symptoms of Elite.Keylogger detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
EUniverse.variant Hijacker Cleaner
Ehg.sonyny.hitbox Tracking Cookie Removal
Pigeon.EQL Trojan Information
Galore Trojan Removal instruction
Active.Key.Logger Spyware Information

Wassup Trojan

Wassup virus description
Technical details:
Categories: Trojan

Wassup indications of infection

This symptoms of Wassup detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Diamin Trojan
HackPack Backdoor Cleaner
kSite Trojan Removal
TrojanClicker.Win32.Win32.VB.ab Trojan Cleaner

VB.vh Backdoor

VB.vh virus description
Technical details:
Categories: Backdoor

VB.vh Files:
[%SYSTEM%]\dll\csrss.exe
[%SYSTEM%]\dll\csrss.exe

VB.vh Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


VB.vh indications of infection

This symptoms of VB.vh detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing TrojanDropper.Win32.VB.bg Trojan
Banker.abg Spyware Removal
PWS.Pricol Trojan Symptoms
Agent.aac Trojan Removal
Pentpox Adware Removal

Dadobra.cy Downloader

Dadobra.cy virus description
Technical details:
Categories: Downloader

Dadobra.cy indications of infection

This symptoms of Dadobra.cy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PC.Activity.Monitor.Lite Spyware Removal
NCase.Alert Downloader Cleaner

Druid Trojan

Druid virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Druid Aliases:
[Kaspersky]Druid.x2,Druid.309;
[Panda]Univ

Druid indications of infection

This symptoms of Druid detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
WebCracker Trojan Removal
Radyum Trojan Removal instruction
Pigeon.AVSE Trojan Cleaner

IE.Defender Ransomware

IE.Defender virus description
Technical details:
Categories: Ransomware

IE.Defender Folders:
[%PROGRAM_FILES%]\IE Defender

IE.Defender Files:
[%DESKTOP%]\IE Defender 2.3.lnk
[%PROGRAMS%]\IE Defender 2.3.lnk
[%DESKTOP%]\IE Defender 2.3.lnk
[%PROGRAMS%]\IE Defender 2.3.lnk

IE.Defender Registry Keys:
HKEY_CURRENT_USER\software\iedefender
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\ie defender


IE.Defender indications of infection

This symptoms of IE.Defender detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SpyAway Ransomware Cleaner
Removing VB.Unknown.Server Trojan

Login Trojan

Login virus description
Technical details:
Categories: Trojan,Hacker Tool,Hostile Code
Login Aliases:
[Kaspersky]Trojan.GetLogin.100;
[Panda]GetIt.754;
[Computer Associates]Login!Trojan,Login.278

Login indications of infection

This symptoms of Login detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AAB Trojan Removal
PSW.Aim.VB Trojan Symptoms

Pigeon.EOO Trojan

Pigeon.EOO virus description
Technical details:
Categories: Trojan

Pigeon.EOO indications of infection

This symptoms of Pigeon.EOO detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Libnet Trojan
Snart Trojan Information
Remove MyCenter RAT
Delf.lk Trojan Removal instruction
Removing Sauron Trojan

Pigeon.AVRX Trojan

Pigeon.AVRX virus description
Technical details:
Categories: Trojan

Pigeon.AVRX indications of infection

This symptoms of Pigeon.AVRX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Web.Serve RAT Cleaner
Removing Pigeon.EUG Trojan
Smalldrp.AZK.[NORMAN] Trojan Removal instruction
Pigeon.AJB Trojan Symptoms
Remove IRC.Projax.worm Trojan

Bancos.HML Trojan

Bancos.HML virus description
Technical details:
Categories: Trojan

Bancos.HML indications of infection

This symptoms of Bancos.HML detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Sysbusex Trojan Cleaner
Cannabis Trojan Removal instruction

VBS.Over Trojan

VBS.Over virus description
Technical details:
Categories: Trojan
VBS.Over Aliases:
[Kaspersky]Trojan.VBS.Over;
[Panda]VBS/Over;
[Computer Associates]VBS.Over.A,VBS/F2NC!Trojan

VBS.Over indications of infection

This symptoms of VBS.Over detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Agent.db Trojan Removal instruction
Phishbank.AEQ Trojan Information
Removing Guardian.Monitor Spyware
Bancos.HZV Trojan Information

VertiClick Downloader

VertiClick virus description
Technical details:
Categories: Downloader

VertiClick indications of infection

This symptoms of VertiClick detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Stoplete Trojan Cleaner

Trojan.Downloader.Java.OpenStream Trojan

Trojan.Downloader.Java.OpenStream virus description
Technical details:
Categories: Trojan,Spyware

Trojan.Downloader.Java.OpenStream indications of infection

This symptoms of Trojan.Downloader.Java.OpenStream detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Surf.Spy Spyware

Lop.bd Adware

Lop.bd virus description
Technical details:
Categories: Adware

Lop.bd indications of infection

This symptoms of Lop.bd detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CableBoost Trojan Symptoms
Vxidl.AFR Trojan Removal
Windows.Spy Spyware Removal
Removing Winlogin Trojan
Removing Regback Trojan

Aureate.IM.com Tracking Cookie

Aureate.IM.com virus description
Technical details:
Categories: Tracking Cookie

Aureate.IM.com indications of infection

This symptoms of Aureate.IM.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.IDL Trojan Cleaner
Remove Anon Trojan
DirectAds.McAfee Tracking Cookie Cleaner
Sasser.B Worm Cleaner
180Search Assistant Spyware Information

SillyDl.CMW Trojan

SillyDl.CMW virus description
Technical details:
Categories: Trojan

SillyDl.CMW indications of infection

This symptoms of SillyDl.CMW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Diamond.Lucifer Trojan

Win.Tpvo Trojan

Win.Tpvo virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Win.Tpvo Aliases:
[Kaspersky]DS.3783;
[Panda]Compback.3783;
[Computer Associates]TPVO.3783

Win.Tpvo indications of infection

This symptoms of Win.Tpvo detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Baidu Adware Cleaner
Suriv.Xuxa Trojan Removal
Removing ActiveX Malware Malware
Bancos.GSD Trojan Removal instruction

Stealth.Bomber.Gold DoS

Stealth.Bomber.Gold virus description
Technical details:
Categories: DoS

Stealth.Bomber.Gold indications of infection

This symptoms of Stealth.Bomber.Gold detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Overdoze Trojan Symptoms
Baca Trojan Information

Pigeon.ESC Trojan

Pigeon.ESC virus description
Technical details:
Categories: Trojan

Pigeon.ESC indications of infection

This symptoms of Pigeon.ESC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
UpF.ker Backdoor Removal
Removing Crazy.Imp Trojan
StartSurfing Spyware Information

SillyDl.CWJ Trojan

SillyDl.CWJ virus description
Technical details:
Categories: Trojan
SillyDl.CWJ Aliases:
[Kaspersky]Trojan-Downloader.Win32.Delf.ep;
[McAfee]Downloader-ADR;
[Other]Win32/SillyDl.CWJ,Troj/Dloader-EP

SillyDl.CWJ indications of infection

This symptoms of SillyDl.CWJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AMI Trojan Removal instruction
W16.Tentacle Trojan Information