Bancos.FWI Trojan

Bancos.FWI virus description
Technical details:
Categories: Trojan

Bancos.FWI indications of infection

This symptoms of Bancos.FWI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ProfitZone Adware Removal instruction
PePatch.dk Spyware Cleaner
Removing SillyDl.CNM Trojan
Tiny.stupid.dloader Trojan Removal instruction
PWS.Msnfake Trojan Symptoms

SillyDl.BZJ Trojan

SillyDl.BZJ virus description
Technical details:
Categories: Trojan

SillyDl.BZJ indications of infection

This symptoms of SillyDl.BZJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HMX Trojan Removal
Tiso Trojan Cleaner
Kiss Trojan Symptoms
ICQ.Locked Trojan Symptoms
ValueAd Tracking Cookie Information

Bancos.GSG Trojan

Bancos.GSG virus description
Technical details:
Categories: Trojan

Bancos.GSG indications of infection

This symptoms of Bancos.GSG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
JS.Relink Trojan Removal
Dblheart Trojan Removal instruction
Bat.tg Trojan Cleaner
Removing Hackarmy.Server Trojan
Pigeon.ARI Trojan Removal

SillyDl.DDX Trojan

SillyDl.DDX virus description
Technical details:
Categories: Trojan

SillyDl.DDX indications of infection

This symptoms of SillyDl.DDX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
LiveShows.Online.Timer Adware Symptoms
Win32.VB.du Trojan Removal instruction
Winsock DoS Information
Virus.Killer Trojan Information
JS.Netdex Trojan Cleaner

Bancos.FTY Trojan

Bancos.FTY virus description
Technical details:
Categories: Trojan

Bancos.FTY indications of infection

This symptoms of Bancos.FTY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Win32.Memleak Trojan
Removing KWM Trojan
Perfect.Keylogger.Lite Spyware Cleaner
PrankMaster Trojan Removal
TPE Trojan Removal instruction

SillyDl.CNX Trojan

SillyDl.CNX virus description
Technical details:
Categories: Trojan

SillyDl.CNX indications of infection

This symptoms of SillyDl.CNX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
DSKlite Trojan Removal instruction
Removing Bancos.GDB Trojan
Stealth.Eye.New.Cam.Viewer RAT Information
TAMAutoRun Trojan Removal
VBS.Lospad Trojan Removal instruction

Bancos.GNA Trojan

Bancos.GNA virus description
Technical details:
Categories: Trojan,Hacker Tool
Bancos.GNA Aliases:
[Kaspersky]Trojan-Spy.Win32.Bancos.mi;
[McAfee]PWS-Banker.gen.ba;
[F-Prot]W32/Bancos.GBO;
[Other]Win32/Bancos.GNA,Infostealer.Bancos,W32/Bancos.GBG,Troj/Bancos-IV

Bancos.GNA indications of infection

This symptoms of Bancos.GNA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Tfn2Kpass DoS Cleaner
Msnfake Trojan Removal
Pigeon.AVGJ Trojan Symptoms
Punisher Trojan Symptoms
Removing Boys Trojan

Bridge Trojan

Bridge virus description
Technical details:
Categories: Trojan,Spyware,BHO,Downloader
Bridge Aliases:
[Kaspersky]TrojanSpy.Win32.Briss.a,TrojanSpy.Win32.Briss.b,TrojanSpy.Win32.Briss.g,TrojanSpy.Win32.Briss.h,TrojanSpy.Win32.Briss.i;
[Eset]Win32/Spy.Briss.A trojan,Win32/Spy.Briss.G trojan,Win32/Spy.Briss.H trojan,Win32/TrojanDownloader.Bridge.A trojan;
[Panda]Spyware/Bridge,Trojan Horse

Bridge Files:
[%SYSTEM%]\a.exe
[%SYSTEM%]\bridge.dll
[%SYSTEM%]\jao.dll
[%WINDOWS%]\downloaded program files\bridge.inf
[%WINDOWS%]\downloaded program files\jao.dll
[%WINDOWS%]\downloaded program files\conflict.1\bridge.dll
[%WINDOWS%]\system\bridge.dll
[%SYSTEM%]\a.exe
[%SYSTEM%]\bridge.dll
[%SYSTEM%]\jao.dll
[%WINDOWS%]\downloaded program files\bridge.inf
[%WINDOWS%]\downloaded program files\jao.dll
[%WINDOWS%]\downloaded program files\conflict.1\bridge.dll
[%WINDOWS%]\system\bridge.dll

Bridge Registry Keys:
HKEY_CLASSES_ROOT\bridge.brdg
HKEY_CLASSES_ROOT\bridge.brdg.1
HKEY_CLASSES_ROOT\CLSID\{80bb7465-a638-43b5-9827-8e8fe38dfcc1}
HKEY_CLASSES_ROOT\clsid\{9c691a33-7dda-4c2f-be4c-c176083f35cf}
HKEY_CLASSES_ROOT\interface\{4fdbdbad-fefe-4c4c-9cc1-1181052afb12}
HKEY_CLASSES_ROOT\interface\{b88a3af1-4f1b-4400-8ffb-3fcb108ce115}
HKEY_CLASSES_ROOT\jao.jao
HKEY_CLASSES_ROOT\jao.jao.1
HKEY_CLASSES_ROOT\typelib\{c094876d-1b0e-46fa-b6a6-7ffc0f970c27}
HKEY_CLASSES_ROOT\typelib\{ddaf2479-6f00-4599-998a-3ed75686c6d0}
HKEY_LOCAL_MACHINE\software\classes\clsid\{9c691a33-7dda-4c2f-be4c-c176083f35cf}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\bridge
HKEY_CLASSES_ROOT\clsid\{445b2bf1-445b2bf1-445b2bf1-445b2bf1-445b2bf1}
HKEY_CLASSES_ROOT\clsid\{50f2ff7f-50f2ff7f-50f2ff7f-50f2ff7f-50f2ff7f}
HKEY_CLASSES_ROOT\clsid\{80bb7465-a638-43b5-9827-8e8fe38dfcc1}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{9c691a33-7dda-4c2f-be4c-c176083f35cf}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\bridge

Bridge Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Bridge indications of infection

This symptoms of Bridge detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ValueAd Tracking Cookie Information
Wingate.Spoofing.On.IRC DoS Information
Remove Win32.LMR Trojan
PolygoneZeichen Trojan Symptoms
Playboy Trojan Symptoms

ProfitZone Adware

ProfitZone virus description
Technical details:
Categories: Adware,BHO

ProfitZone Folders:
[%PROFILE%]\desktop\profit zone 1.5
[%PROGRAM_FILES%]\profitzone

ProfitZone Files:
[%DESKTOP%]\profitzone.lnk
[%SYSTEM%]\pz.dll
[%DESKTOP%]\profitzone.lnk
[%SYSTEM%]\pz.dll


ProfitZone indications of infection

This symptoms of ProfitZone detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Shipper Backdoor Symptoms
Web.Specials Adware Cleaner
Remove SurfAccuracy Adware
Skiks Trojan Information
Dosingle Trojan Information

PHP.Pirus Trojan

PHP.Pirus virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
PHP.Pirus Aliases:
[Panda]Univ.A;
[Computer Associates]PHP.Pirus

PHP.Pirus indications of infection

This symptoms of PHP.Pirus detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Gotcha Trojan Information
SillyDl.BZG Trojan Information
Removing Bancos.GOR Trojan
ClientMan.bho2 BHO Symptoms
Hemlock Trojan Removal instruction

Sinred.Keylogger Spyware

Sinred.Keylogger virus description
Technical details:
Categories: Spyware

Sinred.Keylogger indications of infection

This symptoms of Sinred.Keylogger detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Tfn2Kpass DoS Removal
Bancos.HPZ Trojan Information
Removing Vxidl.AHB Trojan
Bancos.FVJ Trojan Cleaner
KBL.Webdownloader Downloader Removal

Orpdea Trojan

Orpdea virus description
Technical details:
Categories: Trojan
Orpdea Aliases:
[Kaspersky]Trojan-PSW.Win32.OnLineGames.irj,Trojan-PSW.Win32.OnLineGames.ish;
[McAfee]PWS-Mmorpg.gen;
[Other]Infostealer.Gampass

Orpdea Files:
[%SYSTEM%]\lzliuju32.dll
[%SYSTEM%]\xcgjorvycgjmq.dll
[%SYSTEM%]\lzliuju32.dll
[%SYSTEM%]\xcgjorvycgjmq.dll

Orpdea Registry Keys:
HKEY_CLASSES_ROOT\clsid\{36ff2e71-1f0d-4e07-9213-e6740c57322e}
HKEY_CLASSES_ROOT\clsid\{542a5d37-9c24-48ce-8cf5-b5ef3c962711}
HKEY_CLASSES_ROOT\clsid\{68e1c213-98fe-42c6-82a8-584ad1215f3b}

Orpdea Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shellexecutehooks


Orpdea indications of infection

This symptoms of Orpdea detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Vxidl.AJU Trojan
Vxidl.AWJ Trojan Removal instruction
Adware.WinAd Adware Removal
WVIOLENCE Trojan Symptoms
Win32.Memleak Trojan Cleaner

SillyDl.CPP Trojan

SillyDl.CPP virus description
Technical details:
Categories: Trojan

SillyDl.CPP indications of infection

This symptoms of SillyDl.CPP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VB.ny Backdoor Symptoms
Nfstrace Trojan Removal
Remove Stealth.Keyboard.Interceptor.Auto.Sender Spyware
Spector Trojan Removal instruction
Remove Efewe Trojan

SillyDl.CBK Trojan

SillyDl.CBK virus description
Technical details:
Categories: Trojan

SillyDl.CBK indications of infection

This symptoms of SillyDl.CBK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Lookup.Chgrgs BHO
ICQ.Techniques.and.Methods Trojan Cleaner
Removing Antitime RAT
DFch.1b2 Trojan Removal instruction
Removing CPUTief Trojan

AxNTFileSecurity Hostile Code

AxNTFileSecurity virus description
Technical details:
Categories: Hostile Code

AxNTFileSecurity indications of infection

This symptoms of AxNTFileSecurity detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Windows.Activity.Logging.Interface Spyware
IstBar.az Downloader Cleaner
Matcash.dll Trojan Removal
Removing SillyDl.BBZ Downloader
JanNet Spyware Removal instruction

SuxxProxy Trojan

SuxxProxy virus description
Technical details:
Categories: Trojan

SuxxProxy indications of infection

This symptoms of SuxxProxy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GBI Trojan Cleaner
Removing BO.BO Trojan
Removing LinkMaker Adware
Bancos.IEW Trojan Cleaner
Removing IRC.Chamel DoS

Bad.Guy Trojan

Bad.Guy virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Bad.Guy Aliases:
[Kaspersky]Badguy.265;
[Eset]Milan.Badguy virus;
[Panda]Bad Guy1;
[Computer Associates]Bad Guy

Bad.Guy indications of infection

This symptoms of Bad.Guy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.FBB Trojan Symptoms
Remove Backdoor.Konik Trojan
Vxidl.BBE Trojan Cleaner
TrojanSpy.Win32.Sincom.bk Trojan Information
BQ Trojan Removal instruction

Pigeon.ALV Trojan

Pigeon.ALV virus description
Technical details:
Categories: Trojan

Pigeon.ALV indications of infection

This symptoms of Pigeon.ALV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Golon Trojan Information
AFA Internet Enhancement Adware Information
Vxidl.AMR Trojan Cleaner
Windows.Key.Analyst Trojan Information
Removing W16.WinVir.dr Trojan