WebMoney.WMPatch Trojan

WebMoney.WMPatch virus description
Technical details:
Categories: Trojan
WebMoney.WMPatch Aliases:
[Panda]Trojan Horse;
[Computer Associates]Win32/WebMoney.WMPatch.h!PWS!Tro

WebMoney.WMPatch indications of infection

This symptoms of WebMoney.WMPatch detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SillyDl.BZA Trojan
MailSpam.Noname Hacker Tool Removal instruction
Pigeon.EJH Trojan Removal instruction
Remove ICMP.Xenof DoS
Vxidl.BEN Trojan Removal instruction

Vxidl.ANK Trojan

Vxidl.ANK virus description
Technical details:
Categories: Trojan

Vxidl.ANK indications of infection

This symptoms of Vxidl.ANK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.FVH Trojan Removal instruction
Infinaeon Backdoor Information
Remove archive.org Tracking Cookie

Bancos.GDY Trojan

Bancos.GDY virus description
Technical details:
Categories: Trojan
Bancos.GDY Aliases:
[Kaspersky]Trojan-Spy.Win32.Banker.qr;
[Other]Win32/Bancos.GDY,Infostealer.Bancos

Bancos.GDY indications of infection

This symptoms of Bancos.GDY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CWS Homepage Hijacker Hijacker Cleaner
CWS.MTwirl32 Hijacker Symptoms
SillyDl.CHQ Trojan Removal instruction

HLLO.GreenDay Trojan

HLLO.GreenDay virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
HLLO.GreenDay Aliases:
[Kaspersky]Win32.HLLO.GreenDay;
[Panda]W32/Greenday;
[Computer Associates]Win32.HLLO.GreenDay

HLLO.GreenDay indications of infection

This symptoms of HLLO.GreenDay detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MSN.BigBot Trojan Removal instruction
Choprox Backdoor Information

Bdurl Backdoor

Bdurl virus description
Technical details:
Categories: Backdoor

Bdurl indications of infection

This symptoms of Bdurl detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ImIServer.IEPlugin Adware Removal instruction
Vxidl.BAF Trojan Cleaner
Timbuktu.Pro RAT Removal instruction

CyberSpy Trojan

CyberSpy virus description
Technical details:
Categories: Trojan,Backdoor,RAT
CyberSpy Aliases:
[Kaspersky]Backdoor.CyberSpy.13.a,Backdoor.CyberSpy.13.b,Backdoor.CyberSpy.85,packed: UPX;
[Eset]Win32/CyberSpy.1_3 trojan,Win32/CyberSpy.1_3.B trojan,Win32/CyberSpy trojan;
[McAfee]BackDoor-NT;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/CyberSpy.13,Bck/CyberSpy.13.B,Backdoor Program,Bck/CyberSpy;
[Computer Associates]Backdoor/CyberSpy_1.3_Server,Win32.Cyberspy.13,Win32/CyberSpy.13!Trojan,Backdoor/CyberSpy.8.5,Backdoor/CyberSpy.D,Backdoor/CyberSpy

CyberSpy Files:
[%WINDOWS%]\system\msgsvr16.exe.exe
[%WINDOWS%]\system\mswincfg32.exe
[%WINDOWS%]\system\~cab001.exe
[%WINDOWS%]\system\msgsvr16.exe.exe
[%WINDOWS%]\system\mswincfg32.exe
[%WINDOWS%]\system\~cab001.exe

CyberSpy Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices


CyberSpy indications of infection

This symptoms of CyberSpy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Agent.cl Trojan Symptoms
Net.Spider RAT Cleaner
Pigeon.AQZ Trojan Removal instruction
Remove netminers.dk Tracking Cookie

Compo.cav.dr Trojan

Compo.cav.dr virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Compo.cav.dr Aliases:
[Kaspersky]Win16.Header.Compo.145;
[McAfee]W32/Compo.cav.145.dr;
[F-Prot]ExeHeader.145;
[Panda]Wi.Header.Compo.145;
[Computer Associates]Win.Header.Compo.145

Compo.cav.dr indications of infection

This symptoms of Compo.cav.dr detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.EVC Trojan
Livup Backdoor Cleaner
Vxidl.AXS Trojan Information
Vxidl.ATA Trojan Cleaner