Hail Trojan

Hail virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Hail Aliases:
[Kaspersky]HKill.670;
[Panda]HKill.670

Hail indications of infection

This symptoms of Hail detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Den.Zuk Trojan Removal instruction
Dosingle Trojan Removal
Deception Trojan Removal instruction
SillyDl.CIX Trojan Removal
Carioca Trojan Removal instruction

PC Spyware

PC virus description
Technical details:
Categories: Spyware,Hacker Tool

PC indications of infection

This symptoms of PC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.VB.cr Trojan Cleaner
Pigeon.AVQV Trojan Removal instruction
Removing statswhere.com Tracking Cookie
Small.ia Downloader Removal instruction
Removing The.Spy.Beta Trojan

MDSA.Sentinel Spyware

MDSA.Sentinel virus description
Technical details:
Categories: Spyware

MDSA.Sentinel Files:
[%DESKTOP%]\mdsa sentinel 2006
[%DESKTOP%]\MDSA Sentinel X.lnk
[%PROGRAMS%]\mdsa software
[%PROGRAM_FILES%]\MDSA Software\csrss.exe
[%PROGRAM_FILES%]\MDSA Software\help.htm
[%PROGRAM_FILES%]\MDSA Software\license.txt
[%PROGRAM_FILES%]\MDSA Software\smss.exe
[%PROGRAM_FILES%]\mdsa software\uninst\unins000.dat
[%PROGRAM_FILES%]\mdsa software\uninst\unins000.fak
[%DESKTOP%]\mdsa sentinel 2006
[%DESKTOP%]\MDSA Sentinel X.lnk
[%PROGRAMS%]\mdsa software
[%PROGRAM_FILES%]\MDSA Software\csrss.exe
[%PROGRAM_FILES%]\MDSA Software\help.htm
[%PROGRAM_FILES%]\MDSA Software\license.txt
[%PROGRAM_FILES%]\MDSA Software\smss.exe
[%PROGRAM_FILES%]\mdsa software\uninst\unins000.dat
[%PROGRAM_FILES%]\mdsa software\uninst\unins000.fak

MDSA.Sentinel Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


MDSA.Sentinel indications of infection

This symptoms of MDSA.Sentinel detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TServe Spyware Cleaner
Removing Cottered Trojan
Removing Welcome Trojan
Small.tf Trojan Symptoms
Remove Mycooldoor Trojan

SillyDl.CSW Trojan

SillyDl.CSW virus description
Technical details:
Categories: Trojan

SillyDl.CSW indications of infection

This symptoms of SillyDl.CSW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Maddle Trojan Symptoms
Bancos.HCT Trojan Removal instruction
Mxsender Trojan Removal instruction
Metal.Pro Backdoor Removal
PolygoneZeichen Trojan Removal

Bancos.HIB Trojan

Bancos.HIB virus description
Technical details:
Categories: Trojan

Bancos.HIB indications of infection

This symptoms of Bancos.HIB detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Tiso Trojan Removal
Remove Bancos.ZZO Trojan
Vxidl.ACX Trojan Cleaner
Red.Hacker Trojan Removal
Hemlock Trojan Cleaner

Jerry!Trojan Trojan

Jerry!Trojan virus description
Technical details:
Categories: Trojan

Jerry!Trojan indications of infection

This symptoms of Jerry!Trojan detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GCI Trojan Removal instruction
Robobot Backdoor Information
Winsock DoS Symptoms
Skull.Burrow.Connection.Bouncer Backdoor Removal
Remove MediaLoads.Enhanced BHO

Pigeon.EZM Trojan

Pigeon.EZM virus description
Technical details:
Categories: Trojan

Pigeon.EZM indications of infection

This symptoms of Pigeon.EZM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Backdoor.Zombam Trojan Cleaner
Daemon Trojan Removal instruction
Removing Korsmox Trojan
SillyDl.CJR Trojan Removal instruction
Web.Specials Adware Symptoms

Vbs.Evspy Backdoor

Vbs.Evspy virus description
Technical details:
Categories: Backdoor

Vbs.Evspy indications of infection

This symptoms of Vbs.Evspy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Proclaim.Telcom Adware
Cool.Remote.Control RAT Removal
Pigeon.EKS Trojan Cleaner
SillyNuts Trojan Cleaner
SH.Mare Trojan Removal

Bancos.GYN Trojan

Bancos.GYN virus description
Technical details:
Categories: Trojan

Bancos.GYN indications of infection

This symptoms of Bancos.GYN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Del Trojan Removal
Remove RHS RAT
Algo Trojan Removal instruction
NeverEnd Trojan Removal
Removing BA Trojan

Tomy Trojan

Tomy virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Tomy Aliases:
[Kaspersky]Patoruzu.1024;
[Panda]Tomy

Tomy indications of infection

This symptoms of Tomy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
W95.Ilmx Trojan Symptoms
Bad.Guy Trojan Removal instruction
Win32.StartPage.bj Trojan Removal instruction
SillyDl.DOQ Downloader Removal
TSQL.Viroom Trojan Cleaner

BlackBat Trojan

BlackBat virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
BlackBat Aliases:
[Kaspersky]Win95.BlackBat.2841.a;
[McAfee]W32/BlackBat;
[F-Prot]W32/BackBat.2840;
[Panda]Univ.B;
[Computer Associates]Win32/BlackCat.gen,Win95.BlackCat.gen

BlackBat indications of infection

This symptoms of BlackBat detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HCT Trojan Removal
Win32.Indel DoS Cleaner
Removing Last Trojan
XunLeiBHO Adware Symptoms
ICDirect.com Tracking Cookie Information

SillyDl.CTG Trojan

SillyDl.CTG virus description
Technical details:
Categories: Trojan

SillyDl.CTG indications of infection

This symptoms of SillyDl.CTG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SexoDial Adware
Dblheart Trojan Information
Removing SubSeven.deutsch Backdoor
Remove Light.Boot.dr!Dropper Trojan
Muswn Trojan Cleaner

Pigeon.EHD Trojan

Pigeon.EHD virus description
Technical details:
Categories: Trojan

Pigeon.EHD indications of infection

This symptoms of Pigeon.EHD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.ARI Trojan Information
Removing Bancos.HKR Trojan
SillyDl.CNM Trojan Removal
RHS RAT Removal
Removing Bancos.IFE Trojan

whitepages.com Tracking Cookie

whitepages.com virus description
Technical details:
Categories: Tracking Cookie

whitepages.com indications of infection

This symptoms of whitepages.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Stardler Trojan Removal instruction
Vxd.beep!Trojan Trojan Removal
Vxidl.AGW Trojan Symptoms
TAGOPT Trojan Removal instruction
Removing SillyDl.CFY Trojan

OC Trojan

OC virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
OC Aliases:
[Kaspersky]VCL.Divide.546,VCL-based.trojan,VCL.526,VCL.527;
[McAfee]OC/h,OC/t;
[F-Prot]VCL.546.A,VCL.610,VCL.527.A - Dropper;
[Panda]Univ;
[Computer Associates]VCL.Dome,VCL.610,VCL.O.470,VCL.527

OC Registry Keys:
HKEY_CLASSES_ROOT\interface\{8b8f6968-2f24-41e3-b653-e9613226f14d}
HKEY_LOCAL_MACHINE\software\classes\bho.incredifindbho
HKEY_LOCAL_MACHINE\software\classes\bho.incredifindbho.1
HKEY_LOCAL_MACHINE\software\classes\clsid\{5d60ff48-95be-4956-b4c6-6bb168a70310}
HKEY_LOCAL_MACHINE\software\classes\interface\{8b8f6968-2f24-41e3-b653-e9613226f14d}
HKEY_LOCAL_MACHINE\software\classes\typelib\{de289bfa-737b-4abb-a4ec-f8753551b875}
HKEY_LOCAL_MACHINE\software\incredifind
HKEY_LOCAL_MACHINE\software\updater
HKEY_LOCAL_MACHINE\software\updmgr


OC indications of infection

This symptoms of OC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Piaoyes DoS Cleaner
Sandradoor.Server Trojan Removal
Robobot Backdoor Cleaner
Matcash.dll Trojan Removal
Pigeon.EDG Trojan Information

Muswn Trojan

Muswn virus description
Technical details:
Categories: Trojan

Muswn indications of infection

This symptoms of Muswn detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
scripps.com Tracking Cookie Removal
Flobo.Server Trojan Removal
PrankMaster Trojan Removal
Twinouch Downloader Cleaner
Vxidl.AIZ Trojan Removal

Yahoo!.Remover DoS

Yahoo!.Remover virus description
Technical details:
Categories: DoS

Yahoo!.Remover indications of infection

This symptoms of Yahoo!.Remover detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
WinPopup DoS Removal instruction
Brave Sentry Ransomware Cleaner
Small.dv Trojan Removal instruction
Pigeon.EYX Trojan Removal instruction
Canasson Trojan Cleaner

Win32.DieWar Trojan

Win32.DieWar virus description
Technical details:
Categories: Trojan,DoS
Win32.DieWar Aliases:
[Kaspersky]DoS.Win32.DieWar;
[Eset]Win32/DDoS.DieWar trojan;
[Panda]Trj/DoS.DieWar

Win32.DieWar indications of infection

This symptoms of Win32.DieWar detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
unicast.com Tracking Cookie Cleaner
Poltergeist.A!Backdoor Trojan Removal
Bancos.BUM Trojan Cleaner
popular.ru Tracking Cookie Symptoms
Pigeon.ADH Trojan Information

ClientMan.2in1 BHO

ClientMan.2in1 virus description
Technical details:
Categories: BHO

ClientMan.2in1 Files:
[%SYSTEM%]\msncjk.dll
[%SYSTEM%]\msncjk.dll


ClientMan.2in1 indications of infection

This symptoms of ClientMan.2in1 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TServe Spyware Information
BackWindows RAT Removal instruction
Stealth.Keyboard.Interceptor.Auto.Sender Spyware Information
Dowque.ABW Trojan Removal
DoDoor Adware Removal

strefa.pl Tracking Cookie

strefa.pl virus description
Technical details:
Categories: Tracking Cookie

strefa.pl indications of infection

This symptoms of strefa.pl detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove JS.SAFHVM Trojan
Bancos.HGE Trojan Information
Removing Lazy Trojan
untd.com Tracking Cookie Cleaner
Datacrime Trojan Removal

Chopenoz Trojan

Chopenoz virus description
Technical details:
Categories: Trojan,Downloader
Chopenoz Aliases:
[Kaspersky]Trojan-Downlaoder.Win32.CWS.at,Trojan-Downloader.Win32.CWS.al,Trojan-Downloader.Win32.CWS.s;
[McAfee]Downloader-ARQ;
[Panda]Trj/Downloader.FY,Trj/Legmir.D,Trj/Downloader.ON,Trj/Downloader.DJ;
[Computer Associates]Win32.Chopenoz.F,Win32.Chopenoz.G,Win32/Chopenoz.66048!Trojan,Win32.Chopenoz.B;
[Other]Win32/Chopenoz!generic,Trojan.KillAV,Win32/Chopenoz.BH,Win32/Chopenoz.AW,Trojan.Bookmarker

Chopenoz Files:
[%SYSTEM%]\services\msxmidi.exe
[%SYSTEM%]\services\wmplayer.exe
[%WINDOWS%]\inetm\1.00.04.dll
[%WINDOWS%]\inetm\crontab.ini
[%WINDOWS%]\inetm\id.ini
[%WINDOWS%]\inetm\keywords.ini
[%WINDOWS%]\inetm\services.exe
[%WINDOWS%]\inetm\sl.ini
[%WINDOWS%]\inetm\titles.ini
[%WINDOWS%]\system\services\msxmidi.exe
[%WINDOWS%]\system\services\y.exe
[%WINDOWS%]\t\services.exe
[%SYSTEM%]\services\msxmidi.exe
[%SYSTEM%]\services\wmplayer.exe
[%WINDOWS%]\inetm\1.00.04.dll
[%WINDOWS%]\inetm\crontab.ini
[%WINDOWS%]\inetm\id.ini
[%WINDOWS%]\inetm\keywords.ini
[%WINDOWS%]\inetm\services.exe
[%WINDOWS%]\inetm\sl.ini
[%WINDOWS%]\inetm\titles.ini
[%WINDOWS%]\system\services\msxmidi.exe
[%WINDOWS%]\system\services\y.exe
[%WINDOWS%]\t\services.exe

Chopenoz Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows nt\currentversion\windows
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Chopenoz indications of infection

This symptoms of Chopenoz detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Welcome Trojan Removal instruction
WinPopup DoS Information
LipGame Adware Cleaner
Nookl Trojan Information
Phatbot Backdoor Removal

Downserin Downloader

Downserin virus description
Technical details:
Categories: Downloader

Downserin indications of infection

This symptoms of Downserin detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Realpan Trojan Removal
ExPup Trojan Removal
Bancos.IEZ Trojan Symptoms
Remove Bancos.FXV Trojan
Win32.PWS.Bamer Trojan Information

Moonpie.10b Backdoor

Moonpie.10b virus description
Technical details:
Categories: Backdoor,RAT
Moonpie.10b Aliases:
[Kaspersky]Backdoor.MoonPie.10,Backdoor.MoonPie.10.b;
[McAfee]BackDoor-KO;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/MoonPie.10,Bck/Moonpie.10b;
[Computer Associates]Backdoor/Moonpie!Server,Backdoor/WinSys,Win32.MoonPie.010,Win32.MoonPie.10

Moonpie.10b indications of infection

This symptoms of Moonpie.10b detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove MalwarePro Ransomware
RemoteIsProgramRunning RAT Cleaner
Removing Win32.PWS.Bamer Trojan
Remove Pigeon.AVQP Trojan
Remove Skid.Row Trojan

scripps.com Tracking Cookie

scripps.com virus description
Technical details:
Categories: Tracking Cookie

scripps.com indications of infection

This symptoms of scripps.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Nfstrace Trojan
SillyDl.BBZ Downloader Cleaner
TAMAutoRun Trojan Removal instruction
WinPopup DoS Information
Dblheart Trojan Symptoms

Gencontrol RAT

Gencontrol virus description
Technical details:
Categories: RAT

Gencontrol indications of infection

This symptoms of Gencontrol detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Veritas Downloader Removal instruction
Registry Backdoor Symptoms
Vxidl.AUK Trojan Information
Pigeon.AVPK Trojan Cleaner
BAT.SS Trojan Removal