Trinoo Trojan

Trinoo virus description
Technical details:
Categories: Trojan,DoS
Trinoo Aliases:
[Kaspersky]Trojan.Win32.Trinoo;
[McAfee]DDoS-Trinoo;
[F-Prot]W32/Backdoor.Trinoo;
[Panda]Trj/Trinoo;
[Computer Associates]Win32.Trin00 DDoS tool,Win95/Trinoo!Trojan

Trinoo indications of infection

This symptoms of Trinoo detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Banker.ckj Trojan Removal
Remove Pigeon.AVGJ Trojan
Redisin!Trojan Trojan Information
Bancos.GJW Trojan Cleaner
Ducalbill Trojan Symptoms

Tenbot Backdoor

Tenbot virus description
Technical details:
Categories: Backdoor

Tenbot indications of infection

This symptoms of Tenbot detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Vxidl.ADE Trojan
Bancos.GHY Trojan Removal instruction
WVIOLENCE Trojan Cleaner
Bancos.HMX Trojan Symptoms
NetNucleus BHO Information

Delf.im Backdoor

Delf.im virus description
Technical details:
Categories: Backdoor

Delf.im indications of infection

This symptoms of Delf.im detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Focalink.com Tracking Cookie Information
Flipped Trojan Removal
Pigeon.AVFK Trojan Removal instruction
Pigeon.AWHR Trojan Removal instruction
Lookup.Chgrgs BHO Removal

Downloader.ATM Downloader

Downloader.ATM virus description
Technical details:
Categories: Downloader
Downloader.ATM Aliases:
[McAfee]Downloader-ATM;
[Other]Troj/Clagge-Gen

Downloader.ATM indications of infection

This symptoms of Downloader.ATM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove MailSpam.EmailBomb Hacker Tool
TSQL.Viroom Trojan Information
RemoteIsProgramRunning RAT Removal
Boys Trojan Cleaner
Remove Director Adware

Win32.TrojanDropper.MultiBinder Trojan

Win32.TrojanDropper.MultiBinder virus description
Technical details:
Categories: Trojan
Win32.TrojanDropper.MultiBinder Aliases:
[Kaspersky]TrojanDropper.Win32.Multibinder.11;
[McAfee]W95/MTX.dr;
[F-Prot]destructive program;
[Panda]W32/Sabi.Ins;
[Computer Associates]Win32/MTX.A!Worm,Win95.Mtx

Win32.TrojanDropper.MultiBinder indications of infection

This symptoms of Win32.TrojanDropper.MultiBinder detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
JS.Netdex Trojan Cleaner
Orconilo Downloader Symptoms
TrojanDropper.Win32.Joiner Trojan Information
Oblit Trojan Symptoms
ScreenGrab RAT Symptoms

Pigeon.AHQ Trojan

Pigeon.AHQ virus description
Technical details:
Categories: Trojan

Pigeon.AHQ indications of infection

This symptoms of Pigeon.AHQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Scynaud Trojan
Pigeon.EYX Trojan Cleaner
Removing TFD DoS
CPUTief Trojan Removal instruction
Remove SillyDl.BCM Trojan

Pigeon.AHX Trojan

Pigeon.AHX virus description
Technical details:
Categories: Trojan

Pigeon.AHX indications of infection

This symptoms of Pigeon.AHX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.FBB Trojan Symptoms
TSQL.Viroom Trojan Symptoms
Removing FakeAlert.TrojanFactory Trojan
Astef (ReSpan) Worm Removal
kSite Trojan Removal instruction

VB.Troyen RAT

VB.Troyen virus description
Technical details:
Categories: RAT

VB.Troyen indications of infection

This symptoms of VB.Troyen detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
InCommand.67b Backdoor Cleaner
Squatter Trojan Removal instruction
Vxd.beep!Trojan Trojan Symptoms
PokaPoka Trojan Information
RHS RAT Symptoms

SillyDl.DOQ Downloader

SillyDl.DOQ virus description
Technical details:
Categories: Downloader
SillyDl.DOQ Aliases:
[Kaspersky]Backdoor.Win32.Small.cpj;
[Other]Win32/SillyDl.DOQ Removed

SillyDl.DOQ Files:
[%PROFILE_TEMP%]\wan2.exe
[%SYSTEM%]\msvcsl.dll
[%SYSTEM%]\ntd.exe
[%PROFILE_TEMP%]\wan2.exe
[%SYSTEM%]\msvcsl.dll
[%SYSTEM%]\ntd.exe


SillyDl.DOQ indications of infection

This symptoms of SillyDl.DOQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Lop.bd Adware Information
Boys Trojan Cleaner
VB.aoh Trojan Cleaner
Remove Pigeon.AVTF Trojan
Zlob.DNS Changer Hijacker Information

Bancos.IJR Trojan

Bancos.IJR virus description
Technical details:
Categories: Trojan

Bancos.IJR indications of infection

This symptoms of Bancos.IJR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.BBV Trojan Removal
WinPup32 Trojan Cleaner
Win32.LMR Trojan Removal instruction
Flobo.Server Trojan Removal instruction
FortuneCity.com Tracking Cookie Cleaner

Pigeon.AVNW Trojan

Pigeon.AVNW virus description
Technical details:
Categories: Trojan

Pigeon.AVNW indications of infection

This symptoms of Pigeon.AVNW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PSW.Belial Trojan Information
Khooby Trojan Removal
Removing Bancos.HTU Trojan
Augudor.Server Trojan Cleaner
Diedix Trojan Removal instruction

Bancos.GJW Trojan

Bancos.GJW virus description
Technical details:
Categories: Trojan

Bancos.GJW indications of infection

This symptoms of Bancos.GJW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
BootDr3 Trojan Information
Daemon Trojan Symptoms
NetKillx Backdoor Cleaner
Removing Backfind Trojan
Icemenell Trojan Cleaner

PSW.QQpass.aj Trojan

PSW.QQpass.aj virus description
Technical details:
Categories: Trojan,Hacker Tool
PSW.QQpass.aj Aliases:
[Panda]Trojan Horse.LC

PSW.QQpass.aj indications of infection

This symptoms of PSW.QQpass.aj detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ProfitZone Adware Removal
AFA Internet Enhancement Adware Removal
Pigeon.ASW Trojan Removal
Pigeon.AVTF Trojan Information
Tetrinet.txt DoS Cleaner

Xposure Backdoor

Xposure virus description
Technical details:
Categories: Backdoor,RAT
Xposure Aliases:
[Kaspersky]Backdoor.Xposure;
[McAfee]BackDoor-AOH;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Xposure;
[Computer Associates]Backdoor/Xposure,Backdoor/Xposure.A

Xposure indications of infection

This symptoms of Xposure detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.AVSM Trojan
Pigeon.EVM Trojan Information
Remove NeverEnd Trojan
Orpdea Trojan Cleaner
Removing PWS.Banker.gen.bu Trojan

TrojanDownloader.Win32.Micro Trojan

TrojanDownloader.Win32.Micro virus description
Technical details:
Categories: Trojan,Downloader
TrojanDownloader.Win32.Micro Aliases:
[Panda]Trojan Horse

TrojanDownloader.Win32.Micro indications of infection

This symptoms of TrojanDownloader.Win32.Micro detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove TPE Trojan
TrojanDownloader.Win32.Tooncom Trojan Symptoms
Pigeon.AVTF Trojan Symptoms
Basic.ICQ.Pager Trojan Removal
LinkMaker Adware Removal instruction

Orconilo Downloader

Orconilo virus description
Technical details:
Categories: Downloader
Orconilo Aliases:
[Kaspersky]Trojan-Downloader.Win32.Small.akj;
[Other]Win32/Orconilo.A

Orconilo indications of infection

This symptoms of Orconilo detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing IRC.Logger Spyware
Focalink.com Tracking Cookie Removal instruction
Remove stockgroup.com Tracking Cookie
Remove ExPup Trojan
PolygoneZeichen Trojan Cleaner

WAN.Remote Trojan

WAN.Remote virus description
Technical details:
Categories: Trojan,Backdoor,RAT
WAN.Remote Aliases:
[Kaspersky]Backdoor.Wanremote.30.a;
[Eset]Win32/WanRemote.30 trojan;
[McAfee]BackDoor-JS;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/WANRemote.3.0;
[Computer Associates]Backdoor/Wanremote.30,Backdoor/Wanremote.30.A

WAN.Remote indications of infection

This symptoms of WAN.Remote detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVSM Trojan Symptoms
Funcade Adware Information
Remove SillyDl.CZP Trojan
Removing Bancos.GHY Trojan
Icemenell Trojan Removal

Ehg.studentuniverse.hitbox Tracking Cookie

Ehg.studentuniverse.hitbox virus description
Technical details:
Categories: Tracking Cookie

Ehg.studentuniverse.hitbox indications of infection

This symptoms of Ehg.studentuniverse.hitbox detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HCT Trojan Removal instruction
Riphosk Trojan Information
The.History.of.Divine.Intervention Hacker Tool Removal
Removing PtakkS.resurrecion RAT
Antitime RAT Cleaner