SillyDl.CDR Trojan

SillyDl.CDR virus description
Technical details:
Categories: Trojan,Downloader
SillyDl.CDR Aliases:
[Kaspersky]Trojan-Downloader.Win32.Delf.abc;
[McAfee]Generic Downloader.be;
[F-Prot]W32/Downloader.MSN;
[Other]Win32/SillyDl.CDR,Downloader.Bancos!gen,W32/DLoader.OHC,Troj/Delf-ABC

SillyDl.CDR indications of infection

This symptoms of SillyDl.CDR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AOK Trojan Removal instruction

SillyDl.DCZ Trojan

SillyDl.DCZ virus description
Technical details:
Categories: Trojan

SillyDl.DCZ indications of infection

This symptoms of SillyDl.DCZ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Huplu Trojan Information
AmberValletta Trojan Removal instruction

VB.fz Trojan

VB.fz virus description
Technical details:
Categories: Trojan,Backdoor
VB.fz Aliases:
[Kaspersky]Backdoor.Momaker;
[Eset]Win32/Momaker.A trojan,Win32/VB.FZ trojan;
[Panda]Backdoor Program,Bck/VB;
[Computer Associates]Backdoor/Momaker,Backdoor/VB.fz!EditServer,Win32.Nomaker,Win32/Nomaker!Trojan

VB.fz indications of infection

This symptoms of VB.fz detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Mich Trojan
Talpalk Trojan Removal instruction
Removing Pigeon.EWQ Trojan
Get.Admin Trojan Cleaner
Fucoudbg Trojan Removal instruction

Pigeon.ADI Trojan

Pigeon.ADI virus description
Technical details:
Categories: Trojan

Pigeon.ADI indications of infection

This symptoms of Pigeon.ADI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove BAT.Paisak Trojan
ClientMan.bho1 BHO Removal instruction
Removing Win32.Rbot.gen Backdoor

Cracks.am Adware

This summary is not available. Please click here to view the post.

QDel111 Trojan

QDel111 virus description
Technical details:
Categories: Trojan
QDel111 Aliases:
[Kaspersky]Trojan.Win32.NexZus;
[McAfee]QDel111,QDel152;
[F-Prot]destructive program;
[Panda]Trj/NexZus,Trj/W32.NexZus;
[Computer Associates]Win32.Nexzus,Win32/NexZus!Trojan,Win32/Nexzus.A

QDel111 indications of infection

This symptoms of QDel111 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
BookedSpace.BS3 BHO Symptoms

Vxidl.ALX Trojan

Vxidl.ALX virus description
Technical details:
Categories: Trojan

Vxidl.ALX indications of infection

This symptoms of Vxidl.ALX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PHP.Liquid Trojan Information
Find4u Hijacker Removal instruction
QB2C.Fly Trojan Information
Screen.Cutter RAT Information
Small.ab Trojan Removal instruction

Bancos.HGU Trojan

Bancos.HGU virus description
Technical details:
Categories: Trojan

Bancos.HGU indications of infection

This symptoms of Bancos.HGU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.DJL Trojan Removal
TrojanClicker.Win32.VB.ib Trojan Symptoms
Removing Zonar Trojan
Spurf DoS Removal
Pigeon.EYV Trojan Removal instruction

Chupa Backdoor

Chupa virus description
Technical details:
Categories: Backdoor

Chupa indications of infection

This symptoms of Chupa detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VB.ny Backdoor Cleaner
VB.Big Trojan Cleaner
Remove Tofger.HookDLL Trojan
Removing DialSteal Trojan

QZap309 Trojan

QZap309 virus description
Technical details:
Categories: Trojan
QZap309 Aliases:
[Kaspersky]Trojan.AOLam;
[Eset]AOLam.A trojan;
[McAfee]QZap309;
[F-Prot]destructive program;
[Panda]Trj/AOLam;
[Computer Associates]AOLam!Trojan

QZap309 indications of infection

This symptoms of QZap309 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Middle Trojan Removal
Pigeon.EMA Trojan Symptoms
MalwareMonitor Ransomware Removal

cpvfeed.com Tracking Cookie

cpvfeed.com virus description
Technical details:
Categories: Tracking Cookie

cpvfeed.com indications of infection

This symptoms of cpvfeed.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Alibaba Toolbar
Removing Small.ct Backdoor

FakeWin Trojan

FakeWin virus description
Technical details:
Categories: Trojan
FakeWin Aliases:
[Kaspersky]Trojan.Win32.Dialscript;
[McAfee]FakeWin;
[F-Prot]destructive program

FakeWin indications of infection

This symptoms of FakeWin detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Spytector Spyware Removal
RelevantKnowledge Spyware Symptoms
QQThief Trojan Cleaner
Removing Express.III Trojan

WinArpw DoS

WinArpw virus description
Technical details:
Categories: DoS

WinArpw indications of infection

This symptoms of WinArpw detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Spidoor Trojan Information
CSearch BHO Cleaner

SoHa Worm

SoHa virus description
Technical details:
Categories: Worm

SoHa indications of infection

This symptoms of SoHa detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Generic.Downloader Trojan

Bancos.HMD Trojan

Bancos.HMD virus description
Technical details:
Categories: Trojan

Bancos.HMD indications of infection

This symptoms of Bancos.HMD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EDM Trojan Symptoms
AntiVirGear Ransomware Information

Bancos.IAH Trojan

Bancos.IAH virus description
Technical details:
Categories: Trojan

Bancos.IAH indications of infection

This symptoms of Bancos.IAH detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing TrafficSector BHO
Removing Chist Trojan

Pigeon.AYF Trojan

Pigeon.AYF virus description
Technical details:
Categories: Trojan

Pigeon.AYF indications of infection

This symptoms of Pigeon.AYF detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Turiv Trojan Information
Pigeon.AWE Trojan Information
Dluca Trojan Information

Win95.CIH.remnants Trojan

Win95.CIH.remnants virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Win95.CIH.remnants Aliases:
[Kaspersky]Win95.CIH.1129;
[Panda]Univ.EH

Win95.CIH.remnants indications of infection

This symptoms of Win95.CIH.remnants detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Anarchy.Family Trojan
ANTIMAC Trojan Symptoms
Removing Valla Trojan

StopPop Adware

StopPop virus description
Technical details:
Categories: Adware

StopPop Files:
[%WINDOWS%]\hostprep.exe
[%WINDOWS%]\inf\payload.inf
[%WINDOWS%]\host.dll
[%WINDOWS%]\hostprep.exe
[%WINDOWS%]\inf\payload.inf
[%WINDOWS%]\host.dll

StopPop Registry Keys:
HKEY_CLASSES_ROOT\hostdll.hostdllobj.1
HKEY_LOCAL_MACHINE\software\dhost


StopPop indications of infection

This symptoms of StopPop detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ratboy.Love Trojan Information
Removing Trident Trojan
Removing XunLeiBHO Adware
Korsmox Trojan Information
SearchBoss Toolbar Removal instruction

Vxidl.AFB Trojan

Vxidl.AFB virus description
Technical details:
Categories: Trojan

Vxidl.AFB indications of infection

This symptoms of Vxidl.AFB detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Eminem21 Trojan
PacificPoker Tracking Cookie Removal instruction
Tofger.HookDLL Trojan Cleaner
Usekill Trojan Removal
Remove Bat.PWS.Myss Trojan

Syn.Spy RAT

Syn.Spy virus description
Technical details:
Categories: RAT

Syn.Spy indications of infection

This symptoms of Syn.Spy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Chaploit Trojan Removal
C513 Trojan Cleaner
Pigeon.EDG Trojan Removal
Morality Trojan Symptoms
Sima DoS Removal instruction

VBI Backdoor

VBI virus description
Technical details:
Categories: Backdoor

VBI indications of infection

This symptoms of VBI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Zlob.ve Downloader Cleaner
Win32.StartPage.bj Trojan Cleaner
Remove RBBS Trojan
WinPopup DoS Information
Pakes Trojan Removal instruction

Net.Send.Bomber DoS

Net.Send.Bomber virus description
Technical details:
Categories: DoS

Net.Send.Bomber indications of infection

This symptoms of Net.Send.Bomber detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Brocat Trojan Cleaner
Bancos.ICS Trojan Removal instruction
Pigeon.ACL Trojan Removal instruction
Racchel Trojan Removal instruction
CPUTief Trojan Cleaner