AIM.Robber Trojan

AIM.Robber virus description
Technical details:
Categories: Trojan,Backdoor,Hacker Tool
AIM.Robber Aliases:
[Kaspersky]Backdoor.GoAway;
[Eset]Win32/GoAway.A trojan;
[McAfee]New AOL;
[Panda]Backdoor Program.LC;
[Computer Associates]Backdoor/GoAway

AIM.Robber indications of infection

This symptoms of AIM.Robber detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Cellfree Trojan Symptoms
Removing Master Backdoor
SillyDl.CJR Trojan Removal instruction
XCP.Sony.Rootkit.Patch Trojan Symptoms
Remove Punisher Trojan

Pigeon.AWC Trojan

Pigeon.AWC virus description
Technical details:
Categories: Trojan

Pigeon.AWC indications of infection

This symptoms of Pigeon.AWC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Delf.dy Backdoor Removal
Hornet Backdoor Removal instruction
Removing WordMacro.Barbaro Trojan
Lemir.ci Trojan Information
Dosingle Trojan Removal

Den.Zuk Trojan

Den.Zuk virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Den.Zuk Aliases:
[Kaspersky]DenZuk.a,DenZuk.e,Dropper.Macker,DenZuk.d;
[Panda]Den Zuk Drooper,Den Zuk 2 Boot,Maker.Boot.Drp,Den_Zuk.2.B.512;
[Computer Associates]Den_Zuk_Dropper!Dropper,Dropper.Boot.a,Den Zuk 2

Den.Zuk indications of infection

This symptoms of Den.Zuk detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PC.Eyes Spyware Removal
Sality Trojan Removal
Delf.fl Trojan Symptoms
Removing NPK.A!config Trojan
QB2C.Fly Trojan Removal

Deltaclick BHO

Deltaclick virus description
Technical details:
Categories: BHO

Deltaclick indications of infection

This symptoms of Deltaclick detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Dblheart Trojan
Java.ByteVerify.Tr Trojan Cleaner
Vxd.beep!Trojan Trojan Removal instruction
Removing TrojanDownloader.Win32.Tibser Adware
Removing float Trojan

Boojum Trojan

Boojum virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Boojum Aliases:
[Kaspersky]Ku.334.a,SVC.4644.a;
[Eset]Boojum virus;
[McAfee]SVC.mp;
[F-Prot]SVC.4644.A;
[Panda]Boojum,SVC 6.0;
[Computer Associates]Boojum

Boojum indications of infection

This symptoms of Boojum detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Employee.Watcher Spyware Cleaner
Lowtoow Downloader Removal
Remove Elite Trojan
Removing Ranky.aa Trojan
Remove Pigeon.ARI Trojan

Pigeon.APQ Trojan

Pigeon.APQ virus description
Technical details:
Categories: Trojan

Pigeon.APQ indications of infection

This symptoms of Pigeon.APQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GHY Trojan Information
Jeemp Backdoor Removal
Win32.VB.bs Trojan Removal instruction
D86asm RAT Symptoms
ExPup Trojan Removal

Random.Text DoS

Random.Text virus description
Technical details:
Categories: DoS

Random.Text indications of infection

This symptoms of Random.Text detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Spy.KeyLogger Trojan Information
Employee.Watcher Spyware Symptoms
SpyGator.pro Spyware Removal instruction
Remove Elite Trojan
Pohlup Trojan Removal instruction

SH.Mare Trojan

SH.Mare virus description
Technical details:
Categories: Trojan,Downloader
SH.Mare Aliases:
[Other]SH/Mare.D,SH/Mare.H,SH/Mare.J

SH.Mare indications of infection

This symptoms of SH.Mare detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyNuts Trojan Removal
Microsoft.Media.Server.Denial.of.Service.Attack DoS Information
Basic.ICQ.Pager Trojan Information
Racchel Trojan Symptoms
Last Trojan Symptoms

DFch.1b2 Trojan

DFch.1b2 virus description
Technical details:
Categories: Trojan,Backdoor,RAT
DFch.1b2 Aliases:
[Kaspersky]Backdoor.Grisch.01.a,Backdoor.Grisch.01.b;
[Eset]Win32/Grisch.01 trojan;
[McAfee]BackDoor-XY;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program,Backdoor Program.LC;
[Computer Associates]Backdoor/IoSys!Server,Win32.Grisch.01.B

DFch.1b2 indications of infection

This symptoms of DFch.1b2 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Banhosts Hijacker Symptoms
Remove stockgroup.com Tracking Cookie
Remove AdultId Adware
Win32.PWS.Bamer Trojan Removal
Removing NetKillx Backdoor

Delf.fl Trojan

Delf.fl virus description
Technical details:
Categories: Trojan,Adware

Delf.fl Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Delf.fl indications of infection

This symptoms of Delf.fl detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Microsoft.Media.Server.Denial.of.Service.Attack DoS
Spam.AnonMail Trojan Information
Removing Bancos.HCT Trojan
Oblit Trojan Symptoms
Remove Bancos.GIW Trojan

One.beta RAT

One.beta virus description
Technical details:
Categories: RAT

One.beta indications of infection

This symptoms of One.beta detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Slashes Trojan Cleaner
Remove Banhosts Hijacker
SillyDl.DNM Trojan Removal
Small.tf Trojan Removal instruction
Playboy Trojan Removal

SillyDl.CBH Downloader

SillyDl.CBH virus description
Technical details:
Categories: Downloader
SillyDl.CBH Aliases:
[Kaspersky]Trojan-Downloader.Win32.Delf.bcc;
[Other]Win32/SillyDl.CBH

SillyDl.CBH Files:
[%SYSTEM%]\update\Update.exe
[%SYSTEM%]\update\Update.exe

SillyDl.CBH Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


SillyDl.CBH indications of infection

This symptoms of SillyDl.CBH detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GIW Trojan Symptoms
Family.Key.Logger Spyware Symptoms
Registry Backdoor Removal
Removing Robobot Backdoor
BlueAngel Trojan Symptoms

Yaunch Trojan

Yaunch virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Yaunch Aliases:
[Kaspersky]Wench.2537;
[Eset]Yaunch.2537 virus;
[Panda]Yaunch.2824;
[Computer Associates]Yaunch*

Yaunch indications of infection

This symptoms of Yaunch detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
HLLP.6248!Dropper Trojan Information
Slashes Trojan Removal instruction
SexoDial Adware Symptoms
Sality Trojan Information
SillyDl.BZG Trojan Removal instruction

Elite Trojan

Elite virus description
Technical details:
Categories: Trojan

Elite indications of infection

This symptoms of Elite detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove streamen.com Tracking Cookie
Agent.dt Spyware Information
Remove Bancos.DVN Trojan
Removing Win32.VB.bs Trojan
Remove Astef (ReSpan) Worm

Proclaim.Telcom Adware

Proclaim.Telcom virus description
Technical details:
Categories: Adware

Proclaim.Telcom indications of infection

This symptoms of Proclaim.Telcom detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.DAV Trojan Information
Jodeitor RAT Information
Fatso.A Worm Symptoms
Pigeon.ESG Trojan Information
Remove ExitFuel.com Tracking Cookie

Vxidl.AGW Trojan

Vxidl.AGW virus description
Technical details:
Categories: Trojan

Vxidl.AGW indications of infection

This symptoms of Vxidl.AGW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SillyDl.CJR Trojan
Vxidl.AFO Trojan Symptoms
Pigeon.AXH Trojan Removal instruction
Removing ZKeylog Spyware
Removing Playboy Trojan

Scarab Trojan

Scarab virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Scarab Aliases:
[Kaspersky]Backdoor.Scarab.12,Backdoor.Scarab.21;
[McAfee]BackDoor-QA;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Scarab.12,Bck/Scarab.21

Scarab indications of infection

This symptoms of Scarab detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ethernet.Packet.GreedyDog.Version Trojan Information
Stardler Trojan Removal
Removing Twinouch Downloader
Delf.aeo Downloader Removal
SexoDial Adware Symptoms

Downloader.AUE.dll Trojan

Downloader.AUE.dll virus description
Technical details:
Categories: Trojan
Downloader.AUE.dll Aliases:
[McAfee]Downloader-AUE.dll;
[Other]Trojan.Downloader.Orderem.A,Win32/Ordnew.E,Win32/Dirut!DLL!Trojan,Troj/Dwnldr-BVX

Downloader.AUE.dll indications of infection

This symptoms of Downloader.AUE.dll detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
LinkMaker Adware Removal
Remove Vxidl.AYX Trojan
Systhread Trojan Information
Removing Vxidl.BEK Trojan
Jeemp Backdoor Cleaner

SillyDl.CUM Trojan

SillyDl.CUM virus description
Technical details:
Categories: Trojan

SillyDl.CUM indications of infection

This symptoms of SillyDl.CUM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CDL Trojan Cleaner
Removing Redisin!Trojan Trojan
Removing Win32.Septic Trojan
Pigeon.AVKZ Trojan Removal instruction
Remove Employee.Watcher Spyware

Del Trojan

Del virus description
Technical details:
Categories: Trojan,Hacker Tool
Del Aliases:
[McAfee]Del-507;
[Panda]Trojan Horse;
[Computer Associates]Win32/Del-403.A!Trojan;
[Other]Win32/Kimand.A

Del indications of infection

This symptoms of Del detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Flipped Trojan Cleaner
SearchSquire Adware Cleaner
Pigeon.AVFK Trojan Removal instruction
Dosingle Trojan Removal instruction
Removing Win32.Domb Trojan

Win32.Domb Trojan

Win32.Domb virus description
Technical details:
Categories: Trojan
Win32.Domb Aliases:
[Panda]Trojan Horse

Win32.Domb indications of infection

This symptoms of Win32.Domb detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Lookup.Chgrgs BHO Removal instruction
VB5.Jerkins Trojan Cleaner
SillyDl.CDL Trojan Information
Removing Win32.VB.cr Trojan
Remove SillyDl.CZP Trojan

JFHWLSQ Trojan

JFHWLSQ virus description
Technical details:
Categories: Trojan

JFHWLSQ indications of infection

This symptoms of JFHWLSQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
BO.BO Trojan Information
XP.Antivirus Ransomware Removal instruction
Lowtoow Downloader Cleaner
Vxidl.AAJ Trojan Symptoms
Trident Trojan Removal instruction

Scynaud Trojan

Scynaud virus description
Technical details:
Categories: Trojan
Scynaud Aliases:
[Kaspersky]Trojan-Downloader.Win32.Dirat.an;
[Other]LdPinch.STT

Scynaud indications of infection

This symptoms of Scynaud detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing CompuDaze DoS
Remove Win32.ReverseTrojan Trojan
Remove Bancos.IKV Trojan
DialXS Adware Removal instruction
Remove AdultId Adware

LipGame Adware

This summary is not available. Please click here to view the post.

RemoteSaucer Backdoor

RemoteSaucer virus description
Technical details:
Categories: Backdoor,RAT
RemoteSaucer Aliases:
[McAfee]RemoteSaucer;
[Panda]Backdoor Program;
[Computer Associates]Backdoor/RemoteSaucer.1.1

RemoteSaucer indications of infection

This symptoms of RemoteSaucer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
stockgroup.com Tracking Cookie Symptoms
Small.tf Trojan Removal instruction
TrojanDownloader.Win32.Tooncom Trojan Information
SillyDl.CJR Trojan Information
PolygoneZeichen Trojan Removal instruction

Vxidl.AMR Trojan

Vxidl.AMR virus description
Technical details:
Categories: Trojan

Vxidl.AMR indications of infection

This symptoms of Vxidl.AMR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.BBJ Trojan Information
Win32.StartPage.bj Trojan Removal instruction
Ranky.aa Trojan Information
Removing PolygoneZeichen Trojan
SysInf Trojan Removal

Upsilonprog Trojan

Upsilonprog virus description
Technical details:
Categories: Trojan

Upsilonprog indications of infection

This symptoms of Upsilonprog detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Hotdog.Server Trojan
Lomdoor Backdoor Cleaner
Win32.Sincom Trojan Removal
BA Trojan Symptoms
Remove Ranky.aa Trojan

Sin.Static.Ip RAT

Sin.Static.Ip virus description
Technical details:
Categories: RAT

Sin.Static.Ip indications of infection

This symptoms of Sin.Static.Ip detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing FTPAttack Trojan
Remove Tiso Trojan
Basic.ICQ.Pager Trojan Cleaner
Pigeon.EVN Trojan Removal instruction
Remove Employee.Watcher Spyware

TrojanDropper.Win32.Delf.ae Trojan

TrojanDropper.Win32.Delf.ae virus description
Technical details:
Categories: Trojan,Hacker Tool
TrojanDropper.Win32.Delf.ae Aliases:
[Panda]Trojan Horse

TrojanDropper.Win32.Delf.ae indications of infection

This symptoms of TrojanDropper.Win32.Delf.ae detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win.DelSys Trojan Symptoms
Bancos.HPQ Trojan Information
Remove Pigeon.ADH Trojan
TAMAutoRun Trojan Symptoms
Bancos.HKR Trojan Cleaner

Wingate.Spoofing.On.IRC DoS

Wingate.Spoofing.On.IRC virus description
Technical details:
Categories: DoS

Wingate.Spoofing.On.IRC indications of infection

This symptoms of Wingate.Spoofing.On.IRC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Wollf Trojan Cleaner
AudioDoor Trojan Removal
Winsock DoS Removal
Algo Trojan Information
Small.dv Trojan Cleaner

Win32.Mooder Trojan

Win32.Mooder virus description
Technical details:
Categories: Trojan
Win32.Mooder Aliases:
[Panda]Trj/W32.Mooder.A,Trj/Mooder.H

Win32.Mooder indications of infection

This symptoms of Win32.Mooder detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CFY Trojan Cleaner
Pigeon.AXH Trojan Cleaner
V4.login Trojan Removal instruction
Removing Cabronator.Kill.beta3 Backdoor
Wnsock Trojan Symptoms

Win32.Small.me Trojan

Win32.Small.me virus description
Technical details:
Categories: Trojan,Downloader
Win32.Small.me Aliases:
[Kaspersky]TrojanDownloader.Win32.Small.me;
[Eset]Win32/TrojanDownloader.Small.ME trojan;
[Panda]Adware/Replace

Win32.Small.me indications of infection

This symptoms of Win32.Small.me detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
BAT.MicroMac Trojan Symptoms
Removing Oblit Trojan
Canasson Trojan Removal instruction
PePatch.dk Spyware Removal
XXX.ToolBar Trojan Symptoms

Kitten.Free.Sex Adware

Kitten.Free.Sex virus description
Technical details:
Categories: Adware

Kitten.Free.Sex Registry Keys:
HKEY_LOCAL_MACHINE\software\sds software


Kitten.Free.Sex indications of infection

This symptoms of Kitten.Free.Sex detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
DSKlite Trojan Information
PePatch.dk Spyware Symptoms
Focalink.com Tracking Cookie Removal
Removing QQThief Trojan
Pigeon.AVSM Trojan Symptoms