WW Trojan

WW virus description
Technical details:
Categories: Trojan,Hacker Tool
WW Aliases:
[Kaspersky]Vienna.217;
[Eset]Ww217.A virus;
[Panda]Polish.217,Polish.227.Drp;
[Computer Associates]WW 217

WW indications of infection

This symptoms of WW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Aze.Search Hijacker Removal
Siskin Trojan Cleaner
Remove Rammstein Trojan
7Search Tracking Cookie Removal
SubSeven.Defcon.ICQPager Backdoor Removal

Chat.ker DoS

Chat.ker virus description
Technical details:
Categories: DoS

Chat.ker indications of infection

This symptoms of Chat.ker detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing AOAnarchy Trojan
Remove OC.spl Trojan
Correo Trojan Information

Sufrap Trojan

Sufrap virus description
Technical details:
Categories: Trojan

Sufrap indications of infection

This symptoms of Sufrap detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win16.WinError Trojan Symptoms
Win32.DlMersting.AX.DLL.Tr Trojan Symptoms
Small.lg Downloader Removal instruction

Win32.Snatch Trojan

Win32.Snatch virus description
Technical details:
Categories: Trojan
Win32.Snatch Aliases:
[Eset]Win32/Snatch.140 trojan;
[Panda]Trojan Horse

Win32.Snatch indications of infection

This symptoms of Win32.Snatch detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Svug.50megs Tracking Cookie
My.Yodlee.Assistant BHO Information
Remove Calknil Trojan
Removing W95.Jacky Trojan

Gin Hacker Tool

Gin virus description
Technical details:
Categories: Hacker Tool,DoS

Gin indications of infection

This symptoms of Gin detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Troyen Trojan Cleaner
Vxidl.AZZ Trojan Symptoms
IstBar.kp Downloader Symptoms
Pigeon.EBS Trojan Symptoms

SillyDl.CIQ Trojan

SillyDl.CIQ virus description
Technical details:
Categories: Trojan

SillyDl.CIQ indications of infection

This symptoms of SillyDl.CIQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Bugmaf Trojan
SillyDl.DBP Trojan Symptoms
Alpha.Strike Trojan Removal instruction
Porn Adware Symptoms
PWS.Fake Trojan Information

WMI Backdoor

WMI virus description
Technical details:
Categories: Backdoor,Hacker Tool
WMI Aliases:
[Panda]Bck/Cyn

WMI indications of infection

This symptoms of WMI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Worfo Trojan Removal instruction
Remove VBS.Aspid.B:intended Trojan

SillyDl.CWS Trojan

SillyDl.CWS virus description
Technical details:
Categories: Trojan

SillyDl.CWS indications of infection

This symptoms of SillyDl.CWS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove One.Half Trojan
Backdoor.XLog.Server Trojan Cleaner

SysProtect Adware

SysProtect virus description
Technical details:
Categories: Adware,Ransomware

SysProtect Folders:
[%PROGRAM_FILES%]\SysProtect Free
[%PROGRAM_FILES%]\SysProtect
[%PROGRAM_FILES_COMMON%]\SysProtect
[%COMMON_PROGRAMS%]\SysProtect Unregistered Version

SysProtect Files:
[%PROFILE_TEMP%]\NI.USYP\setup.exe
[%PROFILE_TEMP%]\NI.USYP_0001_N76M1005\setup.exe
[%PROFILE_TEMP%]\SysProtectScannerSetup.exe
[%PROGRAM_FILES%]\ErrorSafe Free\FlFxr15.dll
[%PROGRAM_FILES%]\ERRORS~1\FlFxr15.dll
[%SYSTEM%]\df_kme.exe
[%DESKTOP%]\Install SysProtect .lnk
[%DESKTOP%]\SysProtect.lnk
[%PROFILE_TEMP%]\NI.USYP\setup.exe
[%PROFILE_TEMP%]\NI.USYP_0001_N76M1005\setup.exe
[%PROFILE_TEMP%]\SysProtectScannerSetup.exe
[%PROGRAM_FILES%]\ErrorSafe Free\FlFxr15.dll
[%PROGRAM_FILES%]\ERRORS~1\FlFxr15.dll
[%SYSTEM%]\df_kme.exe
[%DESKTOP%]\Install SysProtect .lnk
[%DESKTOP%]\SysProtect.lnk

SysProtect Registry Keys:
HKEY_CLASSES_ROOT\AppID\{4F5E5D72-C915-4f3b-908B-527D064B0FAA}
HKEY_CLASSES_ROOT\CheckProd.CheckProduct
HKEY_CLASSES_ROOT\CLSID\{1640DE0E-75E4-4a83-B5D1-2492BC7EBA8F}
HKEY_CLASSES_ROOT\CLSID\{9E87077C-380C-407d-8DAB-EEDAD95C0A5D}
HKEY_CLASSES_ROOT\CLSID\{CCAABCDD-7C16-4215-B12E-150BFB994CF0}
HKEY_CLASSES_ROOT\CLSID\{EF130E77-0A34-4365-BFB7-218FD3DDCD5F}
HKEY_CLASSES_ROOT\clsid\{f63e3b76-f82f-46eb-851c-8c0a221686bb}
HKEY_CLASSES_ROOT\flfxr15.flfixer15
HKEY_CLASSES_ROOT\Interface\{02946FD1-2D99-46E6-A790-3A089714EDD9}
HKEY_CLASSES_ROOT\interface\{7f4e63c9-f30c-4424-9baf-b6896f5f56c4}
HKEY_CLASSES_ROOT\interface\{f5ac8b35-5b15-4e8f-8046-43858973b495}
HKEY_CLASSES_ROOT\typelib\{7eacf70b-302f-4049-ac68-2d62eb43e473}\1.0
HKEY_CLASSES_ROOT\typelib\{7fa4ec26-6a28-4474-857d-bb05b001c84a}\1.0
HKEY_CLASSES_ROOT\typelib\{96d58666-8f00-4a9d-9389-c17aaa2407c9}\1.0
HKEY_CLASSES_ROOT\typelib\{e79d5e54-81c9-41ae-9d7b-03f1e5a7733d}\1.0
HKEY_CLASSES_ROOT\typelib\{f585cb1f-f17d-4007-a573-b663197ef500}\1.0
HKEY_LOCAL_MACHINE\Software\SysProtect
HKEY_CLASSES_ROOT\AppID\CheckProduct2_1.DLL
HKEY_CLASSES_ROOT\AppID\compclr.dll
HKEY_CLASSES_ROOT\AppID\FFWrapr.DLL
HKEY_CLASSES_ROOT\CheckProd.CheckProduct.1
HKEY_CLASSES_ROOT\ComCleanCore.AppCleaner
HKEY_CLASSES_ROOT\ComCleanCore.CCQuickScan
HKEY_CLASSES_ROOT\ComCleanCore.CCQuickScan.1
HKEY_CLASSES_ROOT\ComCleanCore.FileCleaner
HKEY_CLASSES_ROOT\ComCleanCore.FileCleaner.1
HKEY_CLASSES_ROOT\ComCleanCore.InetCleaner
HKEY_CLASSES_ROOT\ComCleanCore.InetCleaner.1
HKEY_CLASSES_ROOT\ComCleanCore.RegCleaner
HKEY_CLASSES_ROOT\ComCleanCore.RegCleaner.1
HKEY_CLASSES_ROOT\ComCleanCore.SystemCleaner
HKEY_CLASSES_ROOT\ComCleanCore.SystemCleaner.1
HKEY_CLASSES_ROOT\df_fixr.Fixer.1
HKEY_CLASSES_ROOT\TypeLib\{7EACF70B-302F-4049-AC68-2D62EB43E473}
HKEY_CURRENT_USER\Software\SysProtect
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SSCAN
HKEY_CLASSES_ROOT\appid\{4f5e5d72-c915-4f3b-908b-527d064b0faa}
HKEY_CLASSES_ROOT\checkprod.checkproduct
HKEY_CLASSES_ROOT\clsid\{1640de0e-75e4-4a83-b5d1-2492bc7eba8f}
HKEY_CLASSES_ROOT\clsid\{9e87077c-380c-407d-8dab-eedad95c0a5d}
HKEY_CLASSES_ROOT\clsid\{ccaabcdd-7c16-4215-b12e-150bfb994cf0}
HKEY_CLASSES_ROOT\clsid\{ef130e77-0a34-4365-bfb7-218fd3ddcd5f}
HKEY_CLASSES_ROOT\interface\{02946fd1-2d99-46e6-a790-3a089714edd9}
HKEY_CURRENT_USER\software\sysprotect free
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\usyp_is1
HKEY_LOCAL_MACHINE\software\sysprotect

SysProtect Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


SysProtect indications of infection

This symptoms of SysProtect detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AAL Trojan Cleaner
Remove New.is.for.the.Dogs Toolbar
Remove Icon.Changer Trojan
Pigeon.AAO Trojan Information
Remove Noknok.50!Setup Backdoor

AIM.Evil.Doer Trojan

AIM.Evil.Doer virus description
Technical details:
Categories: Trojan,Hacker Tool
AIM.Evil.Doer Aliases:
[Kaspersky]Trojan.PSW.AIM.EvilDoer;
[Eset]Win32/PSW.AIM.EvilDoer trojan;
[Panda]Trj/PSW.Gen,Trojan Horse;
[Computer Associates]Win32/AIM.EvilDoer!PWS!Trojan

AIM.Evil.Doer indications of infection

This symptoms of AIM.Evil.Doer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Dikstra Trojan Symptoms
Net.acct Trojan Removal
Remove Intended.Mayhem Trojan
Shuckush Trojan Cleaner

Pigeon.BAA Trojan

Pigeon.BAA virus description
Technical details:
Categories: Trojan

Pigeon.BAA indications of infection

This symptoms of Pigeon.BAA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Yahoo.Tools DoS Information
Remove ASXLoad Trojan
Lolita Trojan Cleaner
Extractor Trojan Symptoms
Removing Pigeon.FAY Trojan

IGMP.FdDos DoS

IGMP.FdDos virus description
Technical details:
Categories: DoS
IGMP.FdDos Aliases:
[Panda]Flooder/Soddf.A

IGMP.FdDos indications of infection

This symptoms of IGMP.FdDos detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.AEN Trojan
Pigeon.AVHZ Trojan Cleaner
Master Backdoor Symptoms

VirTool.Win32.BatCrypt Backdoor

VirTool.Win32.BatCrypt virus description
Technical details:
Categories: Backdoor,Hacker Tool
VirTool.Win32.BatCrypt Aliases:
[Panda]Backdoor Program,Virus Constructor

VirTool.Win32.BatCrypt indications of infection

This symptoms of VirTool.Win32.BatCrypt detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Rexec RAT
Bancos.HZI Trojan Cleaner
Adware.DirectIP Adware Removal instruction

Vxidl.ASG Trojan

Vxidl.ASG virus description
Technical details:
Categories: Trojan

Vxidl.ASG indications of infection

This symptoms of Vxidl.ASG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVPN Trojan Removal instruction
Remove Bancos.GXI Trojan
KCGame RAT Cleaner
Removing Pigeon.AKQ Trojan
Macedonia Trojan Removal instruction

UrsnifDown Downloader

UrsnifDown virus description
Technical details:
Categories: Downloader
UrsnifDown Aliases:
[Kaspersky]Trojan.Win32.Small.kn;
[McAfee]Downloader-AXM;
[Other]Win32/Ursnif!downloader

UrsnifDown indications of infection

This symptoms of UrsnifDown detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.AKN Trojan
Catcall Adware Removal instruction
Banker.CB Trojan Removal
DialSteal Trojan Information
Remove Frae Trojan

Lineag.AIP Trojan

Lineag.AIP virus description
Technical details:
Categories: Trojan

Lineag.AIP indications of infection

This symptoms of Lineag.AIP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HHB Trojan Information
Keylog.Sters Trojan Cleaner
Removing Alfons Trojan

Pigeon.AVHN Trojan

Pigeon.AVHN virus description
Technical details:
Categories: Trojan

Pigeon.AVHN indications of infection

This symptoms of Pigeon.AVHN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
HGZ.beta RAT Information
Win95.Spaces.Family RAT Symptoms
Remove Quest Trojan
Vxidl.AXG Trojan Removal instruction
Propo Trojan Removal instruction

Bancos.FYK Trojan

Bancos.FYK virus description
Technical details:
Categories: Trojan

Bancos.FYK indications of infection

This symptoms of Bancos.FYK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EZD Trojan Cleaner
Up.Yours.0b1 Hacker Tool Removal
RegFish Trojan Removal instruction
Easy.Keylogger Spyware Information
Bancos.HLH Trojan Symptoms

SillyDl.CEM Trojan

SillyDl.CEM virus description
Technical details:
Categories: Trojan

SillyDl.CEM indications of infection

This symptoms of SillyDl.CEM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SillyDl.CYR Trojan
Removing VB.BH.Server Trojan

Qoologic.at Downloader

Qoologic.at virus description
Technical details:
Categories: Downloader

Qoologic.at indications of infection

This symptoms of Qoologic.at detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.BBK Trojan
Pigeon.AVPY Trojan Information
Bisads.180solutions Tracking Cookie Removal

System32 Trojan

System32 virus description
Technical details:
Categories: Trojan
System32 Aliases:
[Panda]Trj/Wini;
[Computer Associates]System32.21446

System32 indications of infection

This symptoms of System32 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove AdDestroyer Adware
JScript.Seeker.B!Trojan Trojan Symptoms
Calculator Hostile Code Removal instruction
Remove Elkong.gen Trojan

ICQ.Mouse Trojan

ICQ.Mouse virus description
Technical details:
Categories: Trojan
ICQ.Mouse Aliases:
[Kaspersky]Trojan.Win32.ICQMouse;
[McAfee]ICQ-Mouse;
[F-Prot]Backdoor.Icq_Mouse;
[Panda]Trj/W32.ICQMouse;
[Computer Associates]Win32.ICQMouse,Win32/ICQMouse!Trojan

ICQ.Mouse indications of infection

This symptoms of ICQ.Mouse detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanClicker.Win32.VB.an Adware Cleaner
TrojanSpy.Win32.RegControl Spyware Removal
SillyDl.DAD Downloader Removal instruction

Bancos.IDD Trojan

Bancos.IDD virus description
Technical details:
Categories: Trojan

Bancos.IDD indications of infection

This symptoms of Bancos.IDD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove WelcomB Trojan
WIC Trojan Cleaner
Flower Trojan Removal instruction
Haxspy.aj Trojan Removal instruction

STOPzilla Hijacker

STOPzilla virus description
Technical details:
Categories: Hijacker

STOPzilla Files:
[%SYSTEM%]\StopzillaBH0.dll
[%SYSTEM%]\szrec.dll
[%SYSTEM%]\StopzillaBH0.dll
[%SYSTEM%]\szrec.dll

STOPzilla Registry Keys:
HKEY_CLASSES_ROOT\clsid\{ce7c3cf0-4b15-11d1-abed-709549c10000}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{ce7c3cf0-4b15-11d1-abed-709549c10000}


STOPzilla indications of infection

This symptoms of STOPzilla detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SystemDefender Ransomware Removal
Remove Pigeon.EWK Trojan
Removing WS.FTP.Server.Remote.Attack DoS

Tinurak Trojan

Tinurak virus description
Technical details:
Categories: Trojan
Tinurak Aliases:
[Panda]Trj/AOL.Tinurak;
[Computer Associates]Win32.Tinurak,Win32/AOL.Tinurak!Trojan

Tinurak indications of infection

This symptoms of Tinurak detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CIA.boot Trojan Information
Amokk.Joiner Trojan Cleaner
Log.Arp Trojan Removal instruction