SillyDl.DBH Trojan

SillyDl.DBH virus description
Technical details:
Categories: Trojan

SillyDl.DBH Files:
[%PROFILE_TEMP%]\snapsnet.exe
[%PROFILE_TEMP%]\snapsnet.exe


SillyDl.DBH indications of infection

This symptoms of SillyDl.DBH detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Kid.Terror Backdoor Information
SillyDl.DAV Trojan Removal instruction
Vxidl.AWJ Trojan Removal
Khooby Trojan Cleaner
Robobot Backdoor Information

Phatbot Backdoor

Phatbot virus description
Technical details:
Categories: Backdoor

Phatbot indications of infection

This symptoms of Phatbot detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GZO Trojan Removal
Remove Cellfree Trojan
Removing Backdoor.Konik Trojan
Antica Adware Removal
Remove Win32.Mooder Trojan

Odysseus.Macro.Virus.Construction.Kit Trojan

Odysseus.Macro.Virus.Construction.Kit virus description
Technical details:
Categories: Trojan,Hacker Tool
Odysseus.Macro.Virus.Construction.Kit Aliases:
[Kaspersky]Dropper.Macro.Odysseus;
[McAfee]WM/Odysseus.Kit;
[F-Prot]virus dropper;
[Panda]Drp.MOdysseus

Odysseus.Macro.Virus.Construction.Kit indications of infection

This symptoms of Odysseus.Macro.Virus.Construction.Kit detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.APV Trojan Information
Removing JFHWLSQ Trojan
Win32.VB.cr Trojan Removal instruction
DSKlite Trojan Removal
Launch RAT Cleaner

Vxidl.ADE Trojan

Vxidl.ADE virus description
Technical details:
Categories: Trojan

Vxidl.ADE indications of infection

This symptoms of Vxidl.ADE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Small.tf Trojan
Removing Pigeon.EQJ Trojan
Sendfake Hacker Tool Symptoms
Wingate.Spoofing.On.IRC DoS Symptoms
KBL.Webdownloader Downloader Information

Pigeon.EQJ Trojan

Pigeon.EQJ virus description
Technical details:
Categories: Trojan

Pigeon.EQJ indications of infection

This symptoms of Pigeon.EQJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Queen.Hitman.Virus Hostile Code Symptoms
Bancos.HTU Trojan Removal
W16.WinVir.dr Trojan Removal
Remove Small.dv Trojan
Removing Bancos.HPQ Trojan

Daemon Trojan

Daemon virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,Hacker Tool,DoS
Daemon Aliases:
[Kaspersky]Daemaen.2041.b,Daemaen.2048;
[Panda]Daemaen.2048,Talon.2041.MBR;
[Computer Associates]Daemaen.2048,Talon.2041

Daemon Files:
[%WINDOWS%]\System32\bounce.exe
[%WINDOWS%]\System32\bounce.exe


Daemon indications of infection

This symptoms of Daemon detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Kid.Terror Backdoor
AIM.Robber Trojan Removal instruction
Trident Trojan Information
Pigeon.AVPK Trojan Removal
Bancos.HGE Trojan Removal

Vxidl.BDU Trojan

Vxidl.BDU virus description
Technical details:
Categories: Trojan

Vxidl.BDU indications of infection

This symptoms of Vxidl.BDU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MH Trojan Symptoms
Tiso Trojan Cleaner
Removing Win32.Killav.bn Trojan
ClientMan.bho2 BHO Symptoms
Yaunch Trojan Information

Squatter Trojan

Squatter virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Squatter Aliases:
[Kaspersky]Squatter.9742,Squatter.7310,Squatter.8019;
[Panda]Univ.EK,Squatter.8019.B,Squatter.8019.A

Squatter indications of infection

This symptoms of Squatter detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Riot.Doom Trojan
Remove NetKillx Backdoor
Remove Pigeon.ADH Trojan
Chaploit Trojan Removal instruction
Delf.eg Trojan Cleaner

MySocket Backdoor

MySocket virus description
Technical details:
Categories: Backdoor,RAT
MySocket Aliases:
[Kaspersky]Backdoor.Mysock;
[McAfee]BackDoor-AJT;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program,Bck/Mysock;
[Computer Associates]Backdoor/Mysock.10!Server

MySocket Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


MySocket indications of infection

This symptoms of MySocket detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing V4.login Trojan
Bancos.DVN Trojan Cleaner
CDNHelper Adware Cleaner
Delf.dy Backdoor Removal
XunLeiBHO Adware Cleaner

Way.Deat.Queen.Island RAT

Way.Deat.Queen.Island virus description
Technical details:
Categories: RAT

Way.Deat.Queen.Island indications of infection

This symptoms of Way.Deat.Queen.Island detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GZO Trojan Removal instruction
Pigeon.AUT Trojan Cleaner
Removing AsbMay Backdoor
Removing SillyDl.CUM Trojan
Removing Sheep.Goat Backdoor

YouthSilence Trojan

YouthSilence virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
YouthSilence Aliases:
[Kaspersky]Silence.555.b;
[Panda]Univ;
[Computer Associates]Youth.512

YouthSilence indications of infection

This symptoms of YouthSilence detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Red.Hacker Trojan
The.Spy.Beta Trojan Removal instruction
Wnsock Trojan Cleaner
Removing FTPAttack Trojan
Removing Tetrinet.txt DoS

MailSpam.Squad Hacker Tool

MailSpam.Squad virus description
Technical details:
Categories: Hacker Tool,DoS
MailSpam.Squad Aliases:
[Panda]Flooder Program

MailSpam.Squad indications of infection

This symptoms of MailSpam.Squad detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing PePatch.dk Spyware
Pigeon.AVKY Trojan Symptoms
Win32.Septic Trojan Information
Stealth.Keyboard.Interceptor.Auto.Sender Spyware Information
Removing CWS.IEFeads Hijacker

Pigeon.ASW Trojan

Pigeon.ASW virus description
Technical details:
Categories: Trojan

Pigeon.ASW indications of infection

This symptoms of Pigeon.ASW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Cottered Trojan Information
Remove SexoDial Adware
Securing.Low.End.Cisco.Routers DoS Cleaner
CDNHelper Adware Removal
SillyDl.CSI Trojan Information

APlittle Trojan

APlittle virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
APlittle Aliases:
[Kaspersky]Australian.142;
[Eset]Ap.118.A virus,Ap.122.A virus,Ap.122.B virus,Ap.142.A virus,Ap.143 virus,Ap.147 virus,Ap.150 virus,Ap.153.A virus;
[Panda]Australian Tiny;
[Computer Associates]APlittle.118.A,Austr_Para.118,APlittle.122.A,Austr_Para.122,APlittle.122,APlittle.142,APlittle.143,APlittle.147,APlittle.150,APlittle.153.A

APlittle indications of infection

This symptoms of APlittle detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Ducalbill Trojan
NPK.A!config Trojan Removal
Removing Den.Zuk Trojan
Wotron.worm.kit Trojan Removal
QB2C.Fly Trojan Symptoms

Pigeon.AUT Trojan

Pigeon.AUT virus description
Technical details:
Categories: Trojan

Pigeon.AUT indications of infection

This symptoms of Pigeon.AUT detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bancos.GIW Trojan
Removing Bancos.GHY Trojan
Removing Virus.Killer Trojan
Bancos.GZO Trojan Cleaner
Lookup.Chgrgs BHO Symptoms

Flobo.Server Trojan

Flobo.Server virus description
Technical details:
Categories: Trojan,Backdoor
Flobo.Server Aliases:
[Eset]Win32/Flobo.B trojan;
[Computer Associates]Backdoor/Flobo.b.Server

Flobo.Server indications of infection

This symptoms of Flobo.Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Adware.WinAd Adware Information
Vxidl.AWJ Trojan Removal
The.History.of.Divine.Intervention Hacker Tool Information
Backdoor.TheMovie Trojan Symptoms
TAMAutoRun Trojan Removal instruction

FormatFDD Trojan

FormatFDD virus description
Technical details:
Categories: Trojan
FormatFDD Aliases:
[Panda]Trj/FormatHDD.b;
[Computer Associates]FormatFDD.577!Trojan,FormatHDD.B

FormatFDD indications of infection

This symptoms of FormatFDD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Adrem.Free.Remote.Console RAT Removal instruction
Pigeon.AVPK Trojan Removal instruction
Win32.Prosiak Trojan Removal
Icemenell Trojan Information
Vxidl.AFO Trojan Symptoms

Truva.Ati Backdoor

Truva.Ati virus description
Technical details:
Categories: Backdoor,RAT
Truva.Ati Aliases:
[Kaspersky]Backdoor.Komut;
[McAfee]BackDoor-KB;
[F-Prot]security risk or a "backdoor" program;
[Panda]Trj/Truva.v12.Clt,Trj/Truva.v12.Srv;
[Computer Associates]Backdoor/Komut_Client,Win32.Truva.12

Truva.Ati indications of infection

This symptoms of Truva.Ati detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
User32 Trojan Removal instruction
SillyDl.CSI Trojan Removal
QuakeGen3 RAT Symptoms
HeyItsMe Trojan Symptoms
SillyDl.DEQ Downloader Removal

W95.Sadon Trojan

W95.Sadon virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
W95.Sadon Aliases:
[Kaspersky]Win32.Sadon.900;
[McAfee]W95/Sadon;
[F-Prot]W32/SimpleSadov.900;
[Panda]Univ.B;
[Computer Associates]Win32.Simple

W95.Sadon indications of infection

This symptoms of W95.Sadon detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CFY Trojan Removal instruction
Remove Bancos.HPQ Trojan
Remove Not.casc Trojan
Coced Trojan Symptoms
TrojanSpy.Win32.Sincom.bk Trojan Cleaner

Judgement Trojan

Judgement virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Judgement Aliases:
[Kaspersky]Paty.304;
[Panda]Judgement_day.304;
[Computer Associates]Judgement.304

Judgement indications of infection

This symptoms of Judgement detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Backdoor.Phase Trojan Symptoms
Brave Sentry Ransomware Cleaner
streamen.com Tracking Cookie Removal instruction
Spector Trojan Symptoms
Removing BQ Trojan

Lop.bd Adware

Lop.bd virus description
Technical details:
Categories: Adware

Lop.bd indications of infection

This symptoms of Lop.bd detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Chaploit Trojan Removal instruction
Removing Windows.Key.Analyst Trojan
HeyItsMe Trojan Removal instruction
Remove VB5.Jerkins Trojan
DFch.1b2 Trojan Symptoms

WVIOLENCE Trojan

WVIOLENCE virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
WVIOLENCE Aliases:
[Kaspersky]Yosha.Y-Boot;
[Panda]Yosha.Y-Boot

WVIOLENCE Files:
[%WINDOWS%]\Downloaded Program Files\popcaploader.dll
[%WINDOWS%]\Downloaded Program Files\popcaploader.dll


WVIOLENCE indications of infection

This symptoms of WVIOLENCE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
unicast.com Tracking Cookie Symptoms
Riot.Doom Trojan Cleaner
Remove ScreenGrab RAT
Pigeon.AVTF Trojan Information
Bancos.GKP Trojan Cleaner

Win32.Indel DoS

Win32.Indel virus description
Technical details:
Categories: DoS
Win32.Indel Aliases:
[Panda]DDoS/Intdel.A

Win32.Indel indications of infection

This symptoms of Win32.Indel detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
XunLeiBHO Adware Removal instruction
Removing GWGhost Trojan
Remove SillyDl.CDL Trojan
APS Trojan Information
Delf.aeo Downloader Cleaner

Zhongsou Adware

Zhongsou virus description
Technical details:
Categories: Adware
Zhongsou Aliases:
[Other]W32/Zhongsou.A,ADW_ZHONGSOU.A

Zhongsou Registry Keys:
HKEY_CLASSES_ROOT\snhpr.csnhpr
HKEY_CLASSES_ROOT\snhpr.csnhpr.1
HKEY_CLASSES_ROOT\clsid\{2a0176fe-008b-4706-90f5-bba532a49731}
HKEY_CLASSES_ROOT\interface\{d1afed83-9133-4660-8c8f-daf1b4a3d5a8}
HKEY_CLASSES_ROOT\typelib\{e8d3778f-47d3-4f1f-9245-3d46856936e4}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{2a0176fe-008b-4706-90f5-bba532a49731}


Zhongsou indications of infection

This symptoms of Zhongsou detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.AVKZ Trojan
Win32.Septic Trojan Information
Adware.Virtumundo Adware Removal instruction
Den.Zuk Trojan Removal instruction
HLLP.6248!Dropper Trojan Symptoms

Pigeon.AXO Trojan

Pigeon.AXO virus description
Technical details:
Categories: Trojan

Pigeon.AXO indications of infection

This symptoms of Pigeon.AXO detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove NeverEnd Trojan
Vxidl.AYX Trojan Symptoms
Flipped Trojan Removal instruction
JS.Netdex Trojan Removal
NetKillx Backdoor Removal