Anomaly Trojan

Anomaly virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Anomaly Aliases:
[Kaspersky]VCL.Vofca.277;
[Panda]Deimos Anomally;
[Computer Associates]Anomaly.277

Anomaly indications of infection

This symptoms of Anomaly detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Apdoor.cr Backdoor Symptoms
BAT.Ser Trojan Cleaner
Win32.PWS.Bamer Trojan Removal
Remove Light.Boot.dr!Dropper Trojan
Launch RAT Cleaner

Zlob.Fam.SoftCodec Trojan

Zlob.Fam.SoftCodec virus description
Technical details:
Categories: Trojan,Popups

Zlob.Fam.SoftCodec Folders:
[%PROGRAM_FILES%]\SoftCodec

Zlob.Fam.SoftCodec Files:
[%PROGRAM_FILES%]\SoftCodec\iesplugin.dll
[%PROGRAM_FILES%]\SoftCodec\iesuninst.exe
[%PROGRAM_FILES%]\SoftCodec\isaddon.dll
[%PROGRAM_FILES%]\SoftCodec\isamini.exe
[%PROGRAM_FILES%]\SoftCodec\isamonitor.exe
[%PROGRAM_FILES%]\SoftCodec\isauninst.exe
[%PROGRAM_FILES%]\SoftCodec\ot.ico
[%PROGRAM_FILES%]\SoftCodec\pmmon.exe
[%PROGRAM_FILES%]\SoftCodec\pmsngr.exe
[%PROGRAM_FILES%]\SoftCodec\pmuninst.exe
[%PROGRAM_FILES%]\SoftCodec\ts.ico
[%PROGRAM_FILES%]\SoftCodec\uninst.exe
[%PROGRAM_FILES%]\SoftCodec\iesplugin.dll
[%PROGRAM_FILES%]\SoftCodec\iesuninst.exe
[%PROGRAM_FILES%]\SoftCodec\isaddon.dll
[%PROGRAM_FILES%]\SoftCodec\isamini.exe
[%PROGRAM_FILES%]\SoftCodec\isamonitor.exe
[%PROGRAM_FILES%]\SoftCodec\isauninst.exe
[%PROGRAM_FILES%]\SoftCodec\ot.ico
[%PROGRAM_FILES%]\SoftCodec\pmmon.exe
[%PROGRAM_FILES%]\SoftCodec\pmsngr.exe
[%PROGRAM_FILES%]\SoftCodec\pmuninst.exe
[%PROGRAM_FILES%]\SoftCodec\ts.ico
[%PROGRAM_FILES%]\SoftCodec\uninst.exe

Zlob.Fam.SoftCodec Registry Keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SoftCodec


Zlob.Fam.SoftCodec indications of infection

This symptoms of Zlob.Fam.SoftCodec detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ValueAd Tracking Cookie Information
kSite Trojan Removal instruction
Backdoor.Phase Trojan Information
VB.eo Backdoor Symptoms
Bancos.FTP Trojan Removal instruction

Bancos.HGE Trojan

Bancos.HGE virus description
Technical details:
Categories: Trojan

Bancos.HGE indications of infection

This symptoms of Bancos.HGE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.DAK Trojan Removal
Remove Bancos.HPZ Trojan
User32 Trojan Symptoms
Bancos.HTU Trojan Information
Skiks Trojan Symptoms

Pigeon.AVPK Trojan

Pigeon.AVPK virus description
Technical details:
Categories: Trojan

Pigeon.AVPK indications of infection

This symptoms of Pigeon.AVPK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CDL Trojan Removal instruction
Removing Cellfree Trojan
Remove SillyDl.DAV Trojan
Remove VirTool.Win32.ShadowAdmin Trojan
Bancos.GCI Trojan Cleaner

Small.tf Trojan

Small.tf virus description
Technical details:
Categories: Trojan,Downloader

Small.tf Files:
[%PROFILE_TEMP%]\9568.exe
[%PROFILE_TEMP%]\dfc7pn.exe
[%PROFILE_TEMP%]\imv0ir.exe
[%PROFILE_TEMP%]\pjn.exe
[%WINDOWS%]\temp\mvv.exe
[%PROFILE_TEMP%]\9568.exe
[%PROFILE_TEMP%]\dfc7pn.exe
[%PROFILE_TEMP%]\imv0ir.exe
[%PROFILE_TEMP%]\pjn.exe
[%WINDOWS%]\temp\mvv.exe

Small.tf Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Small.tf indications of infection

This symptoms of Small.tf detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GZO Trojan Symptoms
Chaploit Trojan Information
Bancos.HTU Trojan Information
QB2C.Fly Trojan Removal
float Trojan Removal instruction

Lookup.Chgrgs BHO

Lookup.Chgrgs virus description
Technical details:
Categories: BHO,Hijacker

Lookup.Chgrgs Files:
[%SYSTEM%]\chgrgs.dll
[%WINDOWS%]\system\chgrgs.dll
[%SYSTEM%]\chgrgs.dll
[%WINDOWS%]\system\chgrgs.dll

Lookup.Chgrgs Registry Keys:
HKEY_CLASSES_ROOT\clsid\{35cc7369-c6eb-4a64-ab05-44cf0b5087a0}
HKEY_CLASSES_ROOT\clsid\{c82b55f0-60e0-478c-bc55-e4e22f11301d}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{35cc7369-c6eb-4a64-ab05-44cf0b5087a0}
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{c82b55f0-60e0-478c-bc55-e4e22f11301d}
HKEY_LOCAL_MACHINE\software\classes\clsid\{35cc7369-c6eb-4a64-ab05-44cf0b5087a0}
HKEY_LOCAL_MACHINE\software\classes\clsid\{c82b55f0-60e0-478c-bc55-e4e22f11301d}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{35cc7369-c6eb-4a64-ab05-44cf0b5087a0}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{c82b55f0-60e0-478c-bc55-e4e22f11301d}


Lookup.Chgrgs indications of infection

This symptoms of Lookup.Chgrgs detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SexoDial Adware Removal
Queen.Hitman.Virus Hostile Code Symptoms
Removing Augudor.Server Trojan
Jeemp Backdoor Removal
D86asm RAT Removal

Queen.Hitman.Virus Hostile Code

Queen.Hitman.Virus virus description
Technical details:
Categories: Hostile Code

Queen.Hitman.Virus indications of infection

This symptoms of Queen.Hitman.Virus detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SillyDl.DAK Trojan
Remove InCommand.67b Backdoor
Remove Adware.Virtumundo Adware
TServe Spyware Information
wp.pl Tracking Cookie Information

Telnet.Pro Backdoor

Telnet.Pro virus description
Technical details:
Categories: Backdoor,RAT
Telnet.Pro Aliases:
[Kaspersky]Backdoor.Tomek.a;
[McAfee]BackDoor-YE;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program

Telnet.Pro indications of infection

This symptoms of Telnet.Pro detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove BA Trojan
SillyDl.DAV Trojan Symptoms
Buddah.Cloner DoS Information
Pigeon.BBV Trojan Information
Girc Trojan Cleaner

Sendfake Hacker Tool

Sendfake virus description
Technical details:
Categories: Hacker Tool,DoS
Sendfake Aliases:
[Kaspersky]Flooder.MailSpam.SendFake;
[McAfee]Spam-Sendfake;
[F-Prot]security risk or a "backdoor" program;
[Panda]Flooder Program

Sendfake indications of infection

This symptoms of Sendfake detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
The.History.of.Divine.Intervention Hacker Tool Removal instruction
Augudor.Server Trojan Information
Mycooldoor Trojan Information
Removing BAT.Ser Trojan
Pigeon.AVKY Trojan Removal

NetKillx Backdoor

NetKillx virus description
Technical details:
Categories: Backdoor,RAT
NetKillx Aliases:
[Panda]Backdoor Program

NetKillx indications of infection

This symptoms of NetKillx detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
IRC.Chamel DoS Symptoms
Buddah.Cloner DoS Cleaner
Sweet.Heart Backdoor Cleaner
Bancos.HMX Trojan Information
Remove D86asm RAT

Pigeon.BBV Trojan

Pigeon.BBV virus description
Technical details:
Categories: Trojan

Pigeon.BBV indications of infection

This symptoms of Pigeon.BBV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Mimail Trojan Symptoms
popular.ru Tracking Cookie Information
Removing D86asm RAT
Girc Trojan Information
SillyDl.CZP Trojan Information

Backdoor.Phase Trojan

Backdoor.Phase virus description
Technical details:
Categories: Trojan,BHO,Backdoor
Backdoor.Phase Aliases:
[Kaspersky]Backdoor.Phase.10;
[Eset]Win32/Phase trojan;
[McAfee]BackDoor-DW;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Phase

Backdoor.Phase indications of infection

This symptoms of Backdoor.Phase detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Launch RAT Removal
Removing CPUTief Trojan
Remove KWM Trojan
SillyDl.DEQ Downloader Symptoms
Removing SillyDl.BBZ Downloader

GWGhost Trojan

GWGhost virus description
Technical details:
Categories: Trojan,Spyware,Backdoor,Hacker Tool
GWGhost Aliases:
[Kaspersky]Backdoor.GWGirl.272,Trojan.Win32.GwGhost.20,TrojanSpy.Win32.GWGhost.b,TrojanSpy.Win32.GWGhost.c;
[Eset]Win32/GWGirl trojan;
[McAfee]BackDoor-SP;
[Panda]Trojan Horse.LC,Trojan Horse,Trj/Spy.GWGhost.B;
[Computer Associates]Win32.GWGhost.I,Win32/GWGhost.272!Trojan,Win32.GWGhost.E,Win32/Gwghost.21!Trojan,Win32.GWGhost.F,Win32/GWGhost!Dropper,Win32.GWGhost.G,Win32/GWGhost.25.C!Trojan,Win32/Gwghost.D!PWS!Trojan,Win32.GWGhost.25,Win32/GWGhost.27.Trojan

GWGhost indications of infection

This symptoms of GWGhost detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
popular.ru Tracking Cookie Cleaner
HLLP.6248!Dropper Trojan Removal
Remove Jeemp Backdoor
Chaploit Trojan Removal
VB.eo Backdoor Cleaner

QB2C.Fly Trojan

QB2C.Fly virus description
Technical details:
Categories: Trojan
QB2C.Fly Aliases:
[Kaspersky]Trojan.TGF;
[Panda]Trj/TGF;
[Computer Associates]Troj-fly!Trojan

QB2C.Fly indications of infection

This symptoms of QB2C.Fly detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
The.History.of.Divine.Intervention Hacker Tool Removal instruction
Adware.Virtumundo Adware Symptoms
Removing PcShare RAT
Removing Last Trojan
Removing Pigeon.AVKY Trojan

Vxidl.AXX Trojan

Vxidl.AXX virus description
Technical details:
Categories: Trojan

Vxidl.AXX indications of infection

This symptoms of Vxidl.AXX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Not.casc Trojan
Remove Vxidl.AJU Trojan
Riphosk Trojan Information
Augudor.Server Trojan Removal instruction
Flipped Trojan Removal

Apdoor.cr Backdoor

Apdoor.cr virus description
Technical details:
Categories: Backdoor

Apdoor.cr indications of infection

This symptoms of Apdoor.cr detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SexoDial Adware
Bancos.HTU Trojan Removal instruction
Vxidl.AHB Trojan Removal instruction
Veritas Downloader Information
Removing float Trojan

Mycooldoor Trojan

Mycooldoor virus description
Technical details:
Categories: Trojan

Mycooldoor indications of infection

This symptoms of Mycooldoor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Stardler Trojan Removal instruction
IRC.Chamel DoS Information
HLLP.6248!Dropper Trojan Symptoms
SysInf Trojan Removal
Removing FTPAttack Trojan

Bancos.FTP Trojan

Bancos.FTP virus description
Technical details:
Categories: Trojan

Bancos.FTP indications of infection

This symptoms of Bancos.FTP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove KWM Trojan
SillyDl.CDL Trojan Removal instruction
Removing IRC.Chamel DoS
Removing Lemir.ci Trojan
Win.DelSys Trojan Information

BAT.Ser Trojan

BAT.Ser virus description
Technical details:
Categories: Trojan

BAT.Ser indications of infection

This symptoms of BAT.Ser detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bancos.HWN Trojan
kSite Trojan Cleaner
float Trojan Information
Removing VB.eo Backdoor
Cellfree Trojan Information

Girc Trojan

Girc virus description
Technical details:
Categories: Trojan,Backdoor,DoS
Girc Aliases:
[Kaspersky]Backdoor.BO2K.plugin.Girc.18,Backdoor.BO2K.plugin.Girc.181.a,Backdoor.BO2K.plugin.Girc.181.b,Backdoor.BO2K.plugin.Girc.cfg;
[Eset]Win32/BO2K.Plugin.Girc.18 trojan,Win32/BO2K.Plugin.Girc.181.B trojan,Win32/BO2K.Plugin.Girc.Cfg trojan;
[McAfee]Orifice,Orifice trojan,Orifice2K.plugin.utl;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Bo2K.plugin.Girc.181.B,Bck/BO2K.plugin.Girc.cfg,BO2K/Plugin.Girc.18,BO2K/Plugin/Girc.cfg,Bck/BO2K.Plugin.GIRC.181;
[Computer Associates]Backdoor/BO2K!plugin.Girc.18.a,Backdoor/BO2K!Plugin.Girc.181.b,Backdoor/BO2K!plugin.Girc.cfg,GiRC/Bo2k!Trojan

Girc indications of infection

This symptoms of Girc detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.BBG Trojan Removal
TServe Spyware Removal instruction
Removing Bancos.HWN Trojan
Pohlup Trojan Symptoms
SillyDl.DEQ Downloader Cleaner

Win32.Flooder.MailSpam.KagraTool DoS

Win32.Flooder.MailSpam.KagraTool virus description
Technical details:
Categories: DoS
Win32.Flooder.MailSpam.KagraTool Aliases:
[Kaspersky]Flooder.MailSpam.KagraTool;
[Panda]Flooder Program

Win32.Flooder.MailSpam.KagraTool indications of infection

This symptoms of Win32.Flooder.MailSpam.KagraTool detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Lemir.ci Trojan
Pigeon.AVKY Trojan Removal
Remove Pigeon.AVFK Trojan
Maddle Trojan Removal
Removing Khooby Trojan

FTPAttack Trojan

FTPAttack virus description
Technical details:
Categories: Trojan,DoS

FTPAttack indications of infection

This symptoms of FTPAttack detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Augudor.Server Trojan Cleaner
BA Trojan Cleaner
Pigeon.AXH Trojan Removal instruction
Remove Dblheart Trojan
Vxidl.AHB Trojan Information

Delf.dy Backdoor

Delf.dy virus description
Technical details:
Categories: Backdoor

Delf.dy indications of infection

This symptoms of Delf.dy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bancos.HHH Trojan
Vxidl.AHB Trojan Removal
Riot.Doom Trojan Symptoms
Removing Ethernet.Packet.GreedyDog.Version Trojan
kSite Trojan Cleaner

VB.eo Backdoor

VB.eo virus description
Technical details:
Categories: Backdoor

VB.eo indications of infection

This symptoms of VB.eo detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVFK Trojan Removal instruction
Removing Maddle Trojan
SillyDl.DAV Trojan Information
Win32.Mimail Trojan Information
Remove Lemir.ci Trojan

FortuneCity.com Tracking Cookie

FortuneCity.com virus description
Technical details:
Categories: Tracking Cookie

FortuneCity.com indications of infection

This symptoms of FortuneCity.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Riphosk Trojan
Adware.WinAd Adware Removal instruction
Removing Pigeon.AVFK Trojan
Bancos.HHH Trojan Removal instruction
Removing Zlob.DNS Changer Hijacker

SexoDial Adware

SexoDial virus description
Technical details:
Categories: Adware

SexoDial Registry Keys:
HKEY_CLASSES_ROOT\clsid\{8e65b894-c2e9-11d5-bcd3-00e018987519}


SexoDial indications of infection

This symptoms of SexoDial detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.DAV Trojan Cleaner
Remove Bancos.HMX Trojan
Remove TAMAutoRun Trojan
SillyDl.BBZ Downloader Removal instruction
Remove Riphosk Trojan

HLLP.6248!Dropper Trojan

HLLP.6248!Dropper virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS

HLLP.6248!Dropper indications of infection

This symptoms of HLLP.6248!Dropper detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanSpy.Win32.Sincom.bk Trojan Cleaner
Buddah.Cloner DoS Removal instruction
Remove Bancos.GCI Trojan
Removing Win32.PWS.Bamer Trojan
D86asm RAT Removal instruction

Win32.Mimail Trojan

Win32.Mimail virus description
Technical details:
Categories: Trojan,Worm
Win32.Mimail Aliases:
[Kaspersky]I-Worm.Plexus.a;
[Eset]Win32/TrojanDropper.Mudrop.H trojan;
[Panda]Trj/Multidropper.CG;
[Computer Associates]Win32.Plexus.A,Win32/Mimail.W!Dropper

Win32.Mimail indications of infection

This symptoms of Win32.Mimail detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Win32.VB.bs Trojan
Removing Agent.dt Spyware
Vxidl.AAJ Trojan Information
Remove SillyDl.CFY Trojan
Removing Khooby Trojan

Adware.Virtumundo Adware

Adware.Virtumundo virus description
Technical details:
Categories: Adware
Adware.Virtumundo Aliases:
[McAfee]Adware-Virtumundo;
[Other]Win32/Vundo.BP,Trojan.Win32.Agent.cs,Troajn.Vundo,Win32/Vundo.BW

Adware.Virtumundo indications of infection

This symptoms of Adware.Virtumundo detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
float Trojan Information
PcShare RAT Cleaner
Remove SysInf Trojan
Win.DelSys Trojan Symptoms
TAMAutoRun Trojan Information

SysInf Trojan

SysInf virus description
Technical details:
Categories: Trojan
SysInf Aliases:
[Panda]Intended.SysInf.515;
[Computer Associates]SysInf,Sysvir.515

SysInf indications of infection

This symptoms of SysInf detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing PePatch.dk Spyware
Removing Ethernet.Packet.GreedyDog.Version Trojan
Chaploit Trojan Removal
Win.DelSys Trojan Symptoms
Pigeon.ARI Trojan Cleaner

AFA Internet Enhancement Adware

AFA Internet Enhancement virus description
Technical details:
Categories: Adware,Popups

AFA Internet Enhancement Files:
[%SYSTEM%]\n.dll
[%SYSTEM%]\n.dll

AFA Internet Enhancement Registry Keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WAFAIE


AFA Internet Enhancement indications of infection

This symptoms of AFA Internet Enhancement detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AHB Trojan Cleaner
Win32.VB.bs Trojan Removal
Removing Sweet.Heart Backdoor
Win32.Killav.bn Trojan Symptoms
Buddah.Cloner DoS Information