Pigeon.FCA Trojan

Pigeon.FCA virus description
Technical details:
Categories: Trojan
Pigeon.FCA Aliases:
[Kaspersky]Backdoor.Win32.Hupigon.aahh

Pigeon.FCA Files:
[%WINDOWS%]\RemoteAbc.exe
[%WINDOWS%]\RemoteAbc.exe

Pigeon.FCA Registry Keys:
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_remoteabcserver
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\remoteabcserver


Pigeon.FCA indications of infection

This symptoms of Pigeon.FCA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PC.Eyes Spyware Removal instruction
Stardler Trojan Symptoms
Remove Bancos.IFE Trojan
Vxidl.AUK Trojan Removal instruction
Remove CompuDaze DoS

carrielynnesworld.com Tracking Cookie

carrielynnesworld.com virus description
Technical details:
Categories: Tracking Cookie

carrielynnesworld.com indications of infection

This symptoms of carrielynnesworld.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Launch RAT
Adrem.Free.Remote.Console RAT Information
Boojum Trojan Removal
VB5.Jerkins Trojan Cleaner
Wnsock Trojan Removal

Implant Trojan

This summary is not available. Please click here to view the post.

Bancos.FVJ Trojan

Bancos.FVJ virus description
Technical details:
Categories: Trojan

Bancos.FVJ indications of infection

This symptoms of Bancos.FVJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SurfAccuracy Adware Information
ANTIMAC Trojan Symptoms
VB.eo Backdoor Information
SillyDl.DPA Trojan Cleaner
Scynaud Trojan Symptoms

PWS.Msnfake Trojan

PWS.Msnfake virus description
Technical details:
Categories: Trojan,Hacker Tool
PWS.Msnfake Aliases:
[Kaspersky]Trojan.PSW.MSN.Faker.a,Trojan.PSW.MSN.Faker.c,Trojan.PSW.MSN.Faker.b;
[Eset]Win32/PSW.Fakemsn.C trojan;
[McAfee]PWS-Msnfake,PWS-Msnfake trojan;
[F-Prot]security risk or a "backdoor" program;
[Panda]Trojan Horse;
[Computer Associates]Win32.PSW.Fakemsn,Win32/Fakemsn!PWS!Trojan,Win32/MSN!PWS!Trojan

PWS.Msnfake indications of infection

This symptoms of PWS.Msnfake detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Red.Swoosh Worm Removal instruction
Remove ValueAd Tracking Cookie
Spam.AnonMail Trojan Symptoms
The.History.of.Divine.Intervention Hacker Tool Symptoms
Squatter Trojan Information

Backdoor.War.20!Server Backdoor

Backdoor.War.20!Server virus description
Technical details:
Categories: Backdoor
Backdoor.War.20!Server Aliases:
[Kaspersky]Backdoor.Wardoor.20;
[McAfee]BackDoor-BO;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/War.20;
[Computer Associates]Win32.Wardoor.20

Backdoor.War.20!Server indications of infection

This symptoms of Backdoor.War.20!Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.DMW Trojan Information
D86asm RAT Removal
Removing BO.BO Trojan
ZKeylog Spyware Cleaner
SysInf Trojan Removal instruction

NetNucleus BHO

NetNucleus virus description
Technical details:
Categories: BHO,Toolbar

NetNucleus indications of infection

This symptoms of NetNucleus detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GDB Trojan Cleaner
Remove Riphosk Trojan
Remove Sality Trojan
DTr Trojan Symptoms
Removing Twinouch Downloader

Bancos.GGV Trojan

Bancos.GGV virus description
Technical details:
Categories: Trojan
Bancos.GGV Aliases:
[Kaspersky]trojan-Spy.Win32.Banker.bfx;
[Other]Win32/Bancos.GGV

Bancos.GGV indications of infection

This symptoms of Bancos.GGV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.BEK Trojan Cleaner
Den.Zuk Trojan Cleaner
Removing Vxidl.ACX Trojan
Remove Banker.COJ Trojan
Pigeon.ETO Trojan Symptoms

Averub Trojan

Averub virus description
Technical details:
Categories: Trojan

Averub indications of infection

This symptoms of Averub detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Cuki Trojan Removal
Removing Pigeon.ACI Trojan
D86asm RAT Information
Vxidl.AMJ Trojan Information
Remove Wotron.worm.kit Trojan

Brocat Trojan

Brocat virus description
Technical details:
Categories: Trojan

Brocat indications of infection

This symptoms of Brocat detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bancos.HPZ Trojan
Apdoor.cr Backdoor Symptoms
Removing PWS.Ghost Trojan
Removing Bancos.GDB Trojan
Bancos.HKR Trojan Removal instruction

Metal.Pro Backdoor

Metal.Pro virus description
Technical details:
Categories: Backdoor,RAT
Metal.Pro Aliases:
[Kaspersky]Backdoor.Metal.27;
[McAfee]BackDoor-HA;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Metal.27;
[Computer Associates]Backdoor/Metal.27!Server

Metal.Pro indications of infection

This symptoms of Metal.Pro detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Webserver.Lite RAT Information
Removing kSite Trojan
Remove Vxidl.AJU Trojan
Removing Tetrinet.txt DoS
Cabronator.Kill.beta3 Backdoor Symptoms

Msnfake Trojan

Msnfake virus description
Technical details:
Categories: Trojan

Msnfake indications of infection

This symptoms of Msnfake detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
User32 Trojan Cleaner
Remove SillyDl.CKO Trojan
Removing Robobot Backdoor
Elite Trojan Removal
Squatter Trojan Cleaner

SillyDI.AQR Trojan

SillyDI.AQR virus description
Technical details:
Categories: Trojan

SillyDI.AQR indications of infection

This symptoms of SillyDI.AQR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Odysseus.Macro.Virus.Construction.Kit Trojan Removal
Bancos.HMX Trojan Information
Windows.Key.Analyst Trojan Information
Bancos.GOR Trojan Cleaner
Win32.Sincom Trojan Symptoms

Frethog.AFC Trojan

Frethog.AFC virus description
Technical details:
Categories: Trojan

Frethog.AFC indications of infection

This symptoms of Frethog.AFC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Psycho.Derek Spyware
XXX.ToolBar Trojan Symptoms
DSKlite Trojan Removal instruction
VB.eo Backdoor Symptoms
Cellfree Trojan Symptoms

Sima DoS

Sima virus description
Technical details:
Categories: DoS
Sima Aliases:
[Panda]DoS Program;
[Computer Associates]Win32/Sima.DoS!Trojan

Sima indications of infection

This symptoms of Sima detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Sheep.Goat Backdoor Removal
PSW.Lmir.fo Trojan Cleaner
Otto Trojan Removal instruction
Stealth.Keyboard.Interceptor.Auto.Sender Spyware Removal
Win.DelSys Trojan Symptoms