SillyDl.CFY Trojan

SillyDl.CFY virus description
Technical details:
Categories: Trojan

SillyDl.CFY indications of infection

This symptoms of SillyDl.CFY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CZP Trojan Symptoms
Adrem.Free.Remote.Console RAT Removal
SillyDl.CGI Trojan Removal
Pigeon.AVFK Trojan Removal
Removing PSW.Jammer Trojan

Pigeon.AVFK Trojan

Pigeon.AVFK virus description
Technical details:
Categories: Trojan

Pigeon.AVFK indications of infection

This symptoms of Pigeon.AVFK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SillyDl.CZP Trojan
TServe Spyware Information
Not.casc Trojan Cleaner
Removing VirTool.Win32.ShadowAdmin Trojan
Pigeon.AXH Trojan Cleaner

Mich Trojan

Mich virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Mich Aliases:
[Kaspersky]Mich_II.924;
[Panda]Michelangelo II

Mich indications of infection

This symptoms of Mich detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.DEQ Downloader Removal
Removing Launch RAT
Not.casc Trojan Cleaner
PSW.Jammer Trojan Removal
Removing BackWindows RAT

SillyDl.CGI Trojan

SillyDl.CGI virus description
Technical details:
Categories: Trojan

SillyDl.CGI indications of infection

This symptoms of SillyDl.CGI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Jeemp Backdoor Removal
Launch RAT Removal instruction
TServe Spyware Removal instruction
Removing Pigeon.AXH Trojan
Removing Ethernet.Packet.GreedyDog.Version Trojan

Sheep.Goat Backdoor

Sheep.Goat virus description
Technical details:
Categories: Backdoor,RAT
Sheep.Goat Aliases:
[Kaspersky]Backdoor.SheepGoat.10.b;
[McAfee]BackDoor-ON,BackDoor-PH;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/SheepGoat.A;
[Computer Associates]Backdoor/SheepGoat.10.b,Backdoor/SheepGoat.10.B!Server,Win32.SheepGoat.10.B

Sheep.Goat indications of infection

This symptoms of Sheep.Goat detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SillyDl.DEQ Downloader
Pigeon.ARI Trojan Removal instruction
Remove PSW.Jammer Trojan
Remove Pigeon.AXH Trojan
Not.casc Trojan Removal instruction

Adrem.Free.Remote.Console RAT

Adrem.Free.Remote.Console virus description
Technical details:
Categories: RAT

Adrem.Free.Remote.Console indications of infection

This symptoms of Adrem.Free.Remote.Console detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
float Trojan Cleaner
Remove Not.casc Trojan
Removing Pigeon.AXH Trojan
Removing PSW.Jammer Trojan
Launch RAT Removal

Vxidl.AJU Trojan

Vxidl.AJU virus description
Technical details:
Categories: Trojan

Vxidl.AJU indications of infection

This symptoms of Vxidl.AJU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Launch RAT
VirTool.Win32.ShadowAdmin Trojan Symptoms
Ethernet.Packet.GreedyDog.Version Trojan Symptoms
PSW.Jammer Trojan Removal
SillyDl.DEQ Downloader Symptoms

VirTool.Win32.ShadowAdmin Trojan

VirTool.Win32.ShadowAdmin virus description
Technical details:
Categories: Trojan,Hacker Tool
VirTool.Win32.ShadowAdmin Aliases:
[Panda]Trojan Horse

VirTool.Win32.ShadowAdmin indications of infection

This symptoms of VirTool.Win32.ShadowAdmin detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
BackWindows RAT Removal instruction
Removing Bancos.HMX Trojan
PSW.Jammer Trojan Symptoms
Pigeon.ARI Trojan Removal
Remove SillyDl.CZP Trojan

TServe Spyware

TServe virus description
Technical details:
Categories: Spyware,RAT,Downloader

TServe indications of infection

This symptoms of TServe detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HMX Trojan Removal instruction
Jeemp Backdoor Information
Ethernet.Packet.GreedyDog.Version Trojan Removal
BackWindows RAT Symptoms
Removing Launch RAT

Pigeon.AXH Trojan

Pigeon.AXH virus description
Technical details:
Categories: Trojan
Pigeon.AXH Aliases:
[Kaspersky]Backdoor.Win32.Hupigon.tzx

Pigeon.AXH Registry Keys:
HKEY_LOCAL_MACHINEsystemcurrentcontrolsetenumrootlegacy_welligent_transfer_service
HKEY_LOCAL_MACHINEsystemcurrentcontrolsetserviceswelligent transfer service


Pigeon.AXH indications of infection

This symptoms of Pigeon.AXH detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Ethernet.Packet.GreedyDog.Version Trojan
Remove Not.casc Trojan
float Trojan Information
SillyDl.CZP Trojan Information
BackWindows RAT Removal instruction

Skiks Trojan

Skiks virus description
Technical details:
Categories: Trojan

Skiks Files:
[%COMMON_DESKTOPDIRECTORY%]sp.exe
[%SYSTEM%]wmp.exe
[%COMMON_DESKTOPDIRECTORY%]sp.exe
[%SYSTEM%]wmp.exe

Skiks Registry Keys:
HKEY_CURRENT_USERsoftwaremicrosoftesevcbko

Skiks Registry Values:
HKEY_LOCAL_MACHINEsoftwaremicrosoftactive setupinstalled components{2d0cce2d-2eef-4432-0503-020002010803}


Skiks indications of infection

This symptoms of Skiks detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PSW.Jammer Trojan Information
Removing SillyDl.DEQ Downloader
Bancos.HMX Trojan Removal instruction
Jeemp Backdoor Removal instruction
BackWindows RAT Information

SillyDl.CZP Trojan

SillyDl.CZP virus description
Technical details:
Categories: Trojan

SillyDl.CZP Files:
[%PROGRAM_FILES_COMMON%]DriveCleaner Freedcsm.exe
[%PROGRAM_FILES_COMMON%]DriveCleaner Freedcsm.exe


SillyDl.CZP indications of infection

This symptoms of SillyDl.CZP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing float Trojan
Pigeon.ARI Trojan Removal
Not.casc Trojan Removal instruction
Bancos.HMX Trojan Information
Ethernet.Packet.GreedyDog.Version Trojan Symptoms

Not.casc Trojan

Not.casc virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Not.casc Aliases:
[Kaspersky]VCL.509;
[Panda]Univ;
[Computer Associates]VCL.Dome

Not.casc indications of infection

This symptoms of Not.casc detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HMX Trojan Removal
float Trojan Cleaner
PSW.Jammer Trojan Removal instruction
Remove Launch RAT
Ethernet.Packet.GreedyDog.Version Trojan Symptoms

Launch RAT

Launch virus description
Technical details:
Categories: RAT

Launch indications of infection

This symptoms of Launch detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.DEQ Downloader Removal
Ethernet.Packet.GreedyDog.Version Trojan Removal
Removing PSW.Jammer Trojan
Remove Pigeon.ARI Trojan
Jeemp Backdoor Cleaner

SillyDl.DEQ Downloader

SillyDl.DEQ virus description
Technical details:
Categories: Downloader
SillyDl.DEQ Aliases:
[Kaspersky]Trojan-Downloader.Win32.VB.bbq;
[Other]Win32/SillyDl.DEQ,Troj/Dloadr-BDG,Downloader

SillyDl.DEQ indications of infection

This symptoms of SillyDl.DEQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HMX Trojan Removal instruction
Ethernet.Packet.GreedyDog.Version Trojan Removal instruction
Pigeon.ARI Trojan Removal instruction
BackWindows RAT Information
Jeemp Backdoor Removal instruction

Jeemp Backdoor

Jeemp virus description
Technical details:
Categories: Backdoor

Jeemp indications of infection

This symptoms of Jeemp detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove BackWindows RAT
Remove Bancos.HMX Trojan
Remove float Trojan
Remove PSW.Jammer Trojan
Remove Ethernet.Packet.GreedyDog.Version Trojan

BackWindows RAT

BackWindows virus description
Technical details:
Categories: RAT

BackWindows indications of infection

This symptoms of BackWindows detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bancos.HMX Trojan
Remove float Trojan
Remove Ethernet.Packet.GreedyDog.Version Trojan
Remove Pigeon.ARI Trojan
Remove PSW.Jammer Trojan

Bancos.HMX Trojan

Bancos.HMX virus description
Technical details:
Categories: Trojan

Bancos.HMX indications of infection

This symptoms of Bancos.HMX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Ethernet.Packet.GreedyDog.Version Trojan
Remove Pigeon.ARI Trojan
Remove PSW.Jammer Trojan
Remove float Trojan

PSW.Jammer Trojan

PSW.Jammer virus description
Technical details:
Categories: Trojan,Hacker Tool
PSW.Jammer Aliases:
[Panda]Trojan Horse.LC;
[Computer Associates]Win32.PSW.Jammer,Win32/Jammer.D!PWS!Trojan

PSW.Jammer indications of infection

This symptoms of PSW.Jammer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Ethernet.Packet.GreedyDog.Version Trojan
Remove float Trojan
Remove Pigeon.ARI Trojan

Pigeon.ARI Trojan

Pigeon.ARI virus description
Technical details:
Categories: Trojan

Pigeon.ARI indications of infection

This symptoms of Pigeon.ARI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove float Trojan
Remove Ethernet.Packet.GreedyDog.Version Trojan

float Trojan

float virus descriptionTechnical details:
Categories: Trojan

float indications of infection

This symptoms of float detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus softwareand perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt!to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Ethernet.Packet.GreedyDog.Version Trojan

Ethernet.Packet.GreedyDog.Version Trojan

Ethernet.Packet.GreedyDog.Version virus descriptionTechnical details:
Categories: Trojan

Ethernet.Packet.GreedyDog.Version indications of infection

This symptoms of Ethernet.Packet.GreedyDog.Version detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus softwareand perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt!to check your your computer just NOW.