Pigeon.ACI Trojan

Pigeon.ACI virus description
Technical details:
Categories: Trojan

Pigeon.ACI indications of infection

This symptoms of Pigeon.ACI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove RemoteSOB Backdoor
FavoriteMan BHO Removal instruction
Buddah.Cloner DoS Removal
ICQSpam Trojan Removal
Queen.Hitman.Virus Hostile Code Symptoms

Bancos.HAK Trojan

Bancos.HAK virus description
Technical details:
Categories: Trojan

Bancos.HAK indications of infection

This symptoms of Bancos.HAK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.ABK Trojan Removal
Remove PcShare RAT
SillyDl.CSI Trojan Cleaner
Delf.KR Trojan Removal instruction
Icemenell Trojan Symptoms

IIS.Snaki Trojan

IIS.Snaki virus description
Technical details:
Categories: Trojan,Hacker Tool
IIS.Snaki Aliases:
[Kaspersky]Exploit.IIS.Snaki.a;
[Panda]Trojan Horse

IIS.Snaki indications of infection

This symptoms of IIS.Snaki detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HPQ Trojan Information
Cottered Trojan Information
Removing Awoi Trojan
Delf.fl Trojan Removal instruction
Hornet Backdoor Symptoms

Efewe Trojan

Efewe virus description
Technical details:
Categories: Trojan
Efewe Aliases:
[Panda]Trojan Horse;
[Computer Associates]Win32.Efewe,Win32/Vanquish!Rootkit!Trojan

Efewe Files:
[%SYSTEM%]\rdriv.sys
[%SYSTEM%]\rdriv.sys


Efewe indications of infection

This symptoms of Efewe detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Bancos.HAP Trojan
Removing Sheep.Goat Backdoor
JFHWLSQ Trojan Symptoms
Removing SillyDl.DFR Trojan
IRC.Logger Spyware Symptoms

Win32.Banker.ckj Trojan

Win32.Banker.ckj virus description
Technical details:
Categories: Trojan,Spyware

Win32.Banker.ckj Files:
[%WINDOWS%]\msie.dll
[%WINDOWS%]\msie.dll

Win32.Banker.ckj Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{00807E17-4329-455C-8516-75FE21E0A681}
HKEY_CLASSES_ROOT\CLSID\{0D79914B-CAC2-4D20-A3D1-325667CDB73B}
HKEY_CLASSES_ROOT\CLSID\{615CE080-9F8C-4400-9889-FCB545849660}
HKEY_CLASSES_ROOT\CLSID\{6D7D1360-BB5F-4AB6-93AA-B5A550EF379C}
HKEY_CLASSES_ROOT\CLSID\{92A176E2-61E5-40B4-8C5A-E74B0B017CE2}
HKEY_CLASSES_ROOT\CLSID\{A4CCC128-44E1-434E-A2A1-8E60756B3819}
HKEY_CLASSES_ROOT\CLSID\{E2554CC3-031C-45A5-89D1-D3DD103B91E3}

Win32.Banker.ckj Registry Values:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad


Win32.Banker.ckj indications of infection

This symptoms of Win32.Banker.ckj detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.EQJ Trojan
SillyDl.DNM Trojan Cleaner
Rephyes Trojan Symptoms
Lomdoor Backdoor Information
Sality Trojan Symptoms

Bancos.HOW Trojan

Bancos.HOW virus description
Technical details:
Categories: Trojan

Bancos.HOW indications of infection

This symptoms of Bancos.HOW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Family.Key.Logger Spyware Information
JS.Wonka Hostile Code Information
Khooby Trojan Cleaner
Bina Trojan Symptoms
MH Trojan Cleaner

Bancos.HSG Trojan

Bancos.HSG virus description
Technical details:
Categories: Trojan

Bancos.HSG indications of infection

This symptoms of Bancos.HSG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Wnsock Trojan Removal instruction
Fatso.A Worm Removal instruction
EZCyberSearch Adware Removal
Removing DSKlite Trojan
Algo Trojan Symptoms

Win32.DTR.Plugin Trojan

Win32.DTR.Plugin virus description
Technical details:
Categories: Trojan,Backdoor
Win32.DTR.Plugin Aliases:
[Eset]Win32/DTR.15.Plugin trojan

Win32.DTR.Plugin indications of infection

This symptoms of Win32.DTR.Plugin detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Fucoudbg Trojan Cleaner
Removing Revealer.Free.Edition Spyware
Remove Backdoor.Phase Trojan
Pigeon.ETO Trojan Removal instruction
Phatbot Backdoor Cleaner

Vxidl.AUK Trojan

Vxidl.AUK virus description
Technical details:
Categories: Trojan

Vxidl.AUK indications of infection

This symptoms of Vxidl.AUK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
QRabid.BTW Trojan Cleaner
Red.Swoosh Worm Removal instruction
Removing Red.Hacker Trojan
Removing Wollf Trojan
Bancos.DVN Trojan Symptoms

TPE Trojan

TPE virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,Hacker Tool,DoS
TPE Aliases:
[Kaspersky]PolyEngine.DOS.TPE.13,TPE.Girafe.a,TPE.Girafe.c;
[McAfee]TPE.1.4;
[F-Prot]Girafe.2998#TPE;
[Panda]Trj/Tpe-gen.236,Cruncher.4000,Univ.AP.J;
[Computer Associates]TPE-GEN,Coffeshop.3,TPE encrypted

TPE indications of infection

This symptoms of TPE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win.DelSys Trojan Cleaner
Coced Trojan Information
Java.ByteVerify.Tr Trojan Removal
Pigeon.EVM Trojan Removal instruction
W95.Ilmx Trojan Information

RHS RAT

RHS virus description
Technical details:
Categories: RAT

RHS indications of infection

This symptoms of RHS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Otto Trojan
Tiny.stupid.dloader Trojan Removal instruction
Cuki Trojan Removal
DialXS Adware Removal
Bancos.GHY Trojan Removal instruction

MIRC.Korpie Trojan

MIRC.Korpie virus description
Technical details:
Categories: Trojan,DoS
MIRC.Korpie Aliases:
[Kaspersky]Trojan.IRC.Korpie;
[Panda]mIRC/Korpie

MIRC.Korpie indications of infection

This symptoms of MIRC.Korpie detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AGW Trojan Removal instruction
Phatbot Backdoor Removal instruction
TrojanSpy.Win32.Sincom.bk Trojan Cleaner
VirTool.Win32.ShadowAdmin Trojan Removal
Webroot Trojan Cleaner

Alpha RAT

Alpha virus description
Technical details:
Categories: RAT

Alpha indications of infection

This symptoms of Alpha detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PolygoneZeichen Trojan Removal
SillyDl.ABK Trojan Cleaner
Lazy Trojan Removal instruction
Lowtoow Downloader Information
Vxidl.AAJ Trojan Removal

Excel.BlackFriday Trojan

Excel.BlackFriday virus description
Technical details:
Categories: Trojan
Excel.BlackFriday Aliases:
[Kaspersky]Formula.Excel.BlackFriday;
[Eset]XF/Black.A virus;
[Panda]XF/Black.A;
[Computer Associates]Formula95Macro/Black.A,XF/Black.A

Excel.BlackFriday indications of infection

This symptoms of Excel.BlackFriday detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SillyDl.DNM Trojan
Bancos.GOR Trojan Symptoms
Remove Win32.KillFiles.bm Trojan
Backdoor.Phase Trojan Cleaner
ExitFuel.com Tracking Cookie Removal

Delf.KR Trojan

Delf.KR virus description
Technical details:
Categories: Trojan

Delf.KR indications of infection

This symptoms of Delf.KR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PSW.Belial Trojan Cleaner
Bancos.GOR Trojan Removal instruction
Hotdog.Server Trojan Removal instruction
Bancos.GKP Trojan Removal instruction
GWGhost Trojan Information

Gogfeed Trojan

Gogfeed virus description
Technical details:
Categories: Trojan

Gogfeed indications of infection

This symptoms of Gogfeed detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.FXV Trojan Cleaner
SillyNuts Trojan Removal
Vxidl.AGW Trojan Symptoms
Registry Backdoor Removal
Win32.CybWar DoS Cleaner

LiveShows.Online.Timer Adware

LiveShows.Online.Timer virus description
Technical details:
Categories: Adware
LiveShows.Online.Timer Aliases:
[Panda]Dialer.QD

LiveShows.Online.Timer indications of infection

This symptoms of LiveShows.Online.Timer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Win32.Killav.bn Trojan
KBL.Webdownloader Downloader Symptoms
Pigeon.AVTF Trojan Information
MailSpam.Squad Hacker Tool Removal
BAT.Ser Trojan Cleaner

Bat.PWS.Myss Trojan

Bat.PWS.Myss virus description
Technical details:
Categories: Trojan,Spyware,Hacker Tool
Bat.PWS.Myss Aliases:
[Kaspersky]TrojanSpy.Win32.Tofger.ini;
[Computer Associates]Win32.Myss,Bat/PWS.Myss.A.Trojan

Bat.PWS.Myss indications of infection

This symptoms of Bat.PWS.Myss detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVGJ Trojan Removal
Portfu Trojan Symptoms
Remove Enculator Backdoor
Removing Win.DelSys Trojan
Removing VB.mx Trojan

Vxidl.ACX Trojan

Vxidl.ACX virus description
Technical details:
Categories: Trojan

Vxidl.ACX indications of infection

This symptoms of Vxidl.ACX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Clix0r.exe Trojan
unicast.com Tracking Cookie Cleaner
Remove Riot.Doom Trojan
Backwork Trojan Symptoms
Remove Pohlup Trojan

RemoteSOB Backdoor

RemoteSOB virus description
Technical details:
Categories: Backdoor

RemoteSOB indications of infection

This symptoms of RemoteSOB detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove MH Trojan
Keyboard.Spectator.Lite Spyware Symptoms
Win32.Indel DoS Removal
Removing Master Backdoor
JS.Relink Trojan Cleaner

PSW.Qlog Trojan

PSW.Qlog virus description
Technical details:
Categories: Trojan,Hacker Tool
PSW.Qlog Aliases:
[Panda]Trojan Horse.LC

PSW.Qlog indications of infection

This symptoms of PSW.Qlog detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AEH Trojan Removal
BootDr3 Trojan Removal
HLLP.6248!Dropper Trojan Symptoms
Girc Trojan Cleaner
VB.ny Backdoor Removal