Bagle Trojan

Bagle virus description
Technical details:
Categories: Trojan,Worm,Backdoor,Hoax

Bagle indications of infection

This symptoms of Bagle detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Win32.Prosiak Trojan
Icemenell Trojan Cleaner
SillyDl.DLA Downloader Cleaner
Remove Remote.MSN Backdoor
Basic.ICQ.Pager Trojan Cleaner

Gorsk Trojan

Gorsk virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Gorsk Aliases:
[Kaspersky]Mgn.2048.a,Mgn.2560.b;
[Eset]Magnitog.2048.A virus,Magnitog.2560.A virus;
[McAfee]Gorsk;
[F-Prot]Magnitogorsk.2048.A,Magnitogorsk.2560.A;
[Panda]Magnitogorsk.2560;
[Computer Associates]TPE encrypted

Gorsk indications of infection

This symptoms of Gorsk detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Last Trojan
KBL.Webdownloader Downloader Removal
SCKeyLog.20!Spy!Trojan Trojan Cleaner
Skid.Row Trojan Cleaner
Warftpd DoS Removal instruction

Win32.Webdialer.Dialer!Trojan Adware

Win32.Webdialer.Dialer!Trojan virus description
Technical details:
Categories: Adware,Downloader
Win32.Webdialer.Dialer!Trojan Aliases:
[Panda]Dialer.Gen

Win32.Webdialer.Dialer!Trojan indications of infection

This symptoms of Win32.Webdialer.Dialer!Trojan detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Buddah.Cloner DoS Removal instruction
Remove Bancos.HLY Trojan
Remove Orconilo Downloader
Win32.Memleak Trojan Symptoms
Web.Specials Adware Removal

New.Win32 Trojan

New.Win32 virus description
Technical details:
Categories: Trojan
New.Win32 Aliases:
[McAfee]New Win32

New.Win32 indications of infection

This symptoms of New.Win32 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
IRC.Logger Spyware Symptoms
Pigeon.ETO Trojan Information
Remove Win32.Killav.bn Trojan
Bancos.HWA Trojan Removal
Gotcha Trojan Symptoms

Autobat Trojan

Autobat virus description
Technical details:
Categories: Trojan
Autobat Aliases:
[Kaspersky]TrojanDropper.DOS.Autobat.b;
[Panda]Trojan Horse;
[Computer Associates]Autobat.A!Trojan,Autobat.B,Autobat.B!Trojan

Autobat indications of infection

This symptoms of Autobat detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.StartPage.bj Trojan Cleaner
Last Trojan Information
Removing Munich Trojan
Sweet.Heart Backdoor Removal
AxNTFileSecurity Hostile Code Symptoms

MoM Spyware

MoM virus description
Technical details:
Categories: Spyware

MoM Folders:
[%PROGRAMS%]\MoM
[%PROGRAM_FILES%]\mom

MoM Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app paths\mom.exe
HKEY_LOCAL_MACHINE\software\nmsetc

MoM Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\wow\boot


MoM indications of infection

This symptoms of MoM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing My.PanicButton Trojan
CSApp.dll BHO Removal
FTPAttack Trojan Removal
Vxidl.AFO Trojan Cleaner
Remove scripps.com Tracking Cookie

SillyDl.CAW Trojan

SillyDl.CAW virus description
Technical details:
Categories: Trojan

SillyDl.CAW indications of infection

This symptoms of SillyDl.CAW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Focalink.com Tracking Cookie Information
Remove Banbra.bi Trojan
Pigeon.AHX Trojan Removal instruction
Irapture Backdoor Symptoms
Remove Pigeon.ASW Trojan

Win32.Fox Trojan

Win32.Fox virus description
Technical details:
Categories: Trojan,Backdoor
Win32.Fox Aliases:
[Kaspersky]Backdoor.Fox

Win32.Fox indications of infection

This symptoms of Win32.Fox detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.DLA Downloader Removal
Bancos.HOW Trojan Removal instruction
Remove RemoteSaucer Backdoor
Proclaim.Telcom Adware Cleaner
Removing PePatch.dk Spyware

Pigeon.API Trojan

Pigeon.API virus description
Technical details:
Categories: Trojan

Pigeon.API indications of infection

This symptoms of Pigeon.API detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.AVNW Trojan
SillyDl.DFR Trojan Removal
DFch.1b2 Trojan Removal
Removing Pigeon.AVKY Trojan
Removing valueclick.net Tracking Cookie

Pigeon.AVDY Trojan

Pigeon.AVDY virus description
Technical details:
Categories: Trojan

Pigeon.AVDY indications of infection

This symptoms of Pigeon.AVDY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove MDSA.Sentinel Spyware
FirstLook Spyware Cleaner
Adware.WinAd Adware Symptoms
SillyDl.CHB Trojan Information
Bancos.ZZX Trojan Removal

Pigeon.AVEJ Trojan

Pigeon.AVEJ virus description
Technical details:
Categories: Trojan

Pigeon.AVEJ indications of infection

This symptoms of Pigeon.AVEJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Stealth.Keyboard.Interceptor.Auto.Sender Spyware
Pigeon.AHF Trojan Cleaner
Vxidl.AYX Trojan Cleaner
Removing Bancos.FXO Trojan
Boys Trojan Removal

ProHack.KeyLogger Spyware

ProHack.KeyLogger virus description
Technical details:
Categories: Spyware

ProHack.KeyLogger indications of infection

This symptoms of ProHack.KeyLogger detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ExPup Trojan Removal
Skull.Burrow.Connection.Bouncer Backdoor Cleaner
Red.Hacker Trojan Removal
Remove DFch.1b2 Trojan
SillyDl.DAV Trojan Removal

Sincom.af Spyware

Sincom.af virus description
Technical details:
Categories: Spyware

Sincom.af indications of infection

This symptoms of Sincom.af detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
EvilSocks Backdoor Information
Remove Bad.Guy Trojan
Pigeon.BBD Trojan Removal
D86asm RAT Cleaner
Bancos.HMX Trojan Removal instruction

Rkl.setup Spyware

Rkl.setup virus description
Technical details:
Categories: Spyware

Rkl.setup indications of infection

This symptoms of Rkl.setup detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Downserin Downloader
My.PanicButton Trojan Cleaner
Remove W95.Henky.Henze Trojan
Remove Vxidl.AYN Trojan
Maddle Trojan Information

Belnow Trojan

Belnow virus description
Technical details:
Categories: Trojan,Hacker Tool
Belnow Aliases:
[Kaspersky]Trojan.Win32.Belnow.d;
[Eset]Win32/Belnow.D trojan;
[McAfee]Belnow;
[Panda]Trojan Horse.LC

Belnow indications of infection

This symptoms of Belnow detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.AVGJ Trojan
KBind Trojan Removal instruction
topping.com.ua Tracking Cookie Information
Hotdog.Server Trojan Cleaner
Delf.eg Trojan Removal

Pigeon.AVFN Trojan

Pigeon.AVFN virus description
Technical details:
Categories: Trojan

Pigeon.AVFN indications of infection

This symptoms of Pigeon.AVFN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Truva.Ati Backdoor
Oblit Trojan Symptoms
NPK.A!config Trojan Removal
Removing Vxidl.AJU Trojan
Removing Chopenoz Trojan

Landmine DoS

Landmine virus description
Technical details:
Categories: DoS

Landmine indications of infection

This symptoms of Landmine detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AAN Trojan Cleaner
Removing Moonpie.10b Backdoor
Bancos.FZN Trojan Removal
SubSeven.deutsch Backdoor Symptoms
Efewe Trojan Removal

SillyDl.BZU Trojan

SillyDl.BZU virus description
Technical details:
Categories: Trojan

SillyDl.BZU indications of infection

This symptoms of SillyDl.BZU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.AUU Trojan
QQThief Trojan Removal instruction
Remove Bancos.GCI Trojan
Win32.AdURL Adware Removal instruction
Lazy Trojan Cleaner

SillyDl.DBW Trojan

SillyDl.DBW virus description
Technical details:
Categories: Trojan

SillyDl.DBW indications of infection

This symptoms of SillyDl.DBW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Parity Trojan Information
SillyDl.DPA Trojan Removal instruction
Backdoor.Konik Trojan Symptoms
Removing Adrem.Free.Remote.Console RAT
Bat.PDrome Trojan Symptoms

SillyDl.CLR Trojan

SillyDl.CLR virus description
Technical details:
Categories: Trojan

SillyDl.CLR indications of infection

This symptoms of SillyDl.CLR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EZM Trojan Symptoms
stockgroup.com Tracking Cookie Removal instruction
TrojanSpy.Win32.Sincom.bk Trojan Removal
wp.pl Tracking Cookie Information
NetNucleus BHO Removal

Pigeon.AVBL Trojan

Pigeon.AVBL virus description
Technical details:
Categories: Trojan

Pigeon.AVBL indications of infection

This symptoms of Pigeon.AVBL detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Backdoor.Zombam Trojan
Removing wp.pl Tracking Cookie
FTPAttack Trojan Removal instruction
Benuti.D!downloader Trojan Information
Removing Vxidl.AWJ Trojan

maxlab.ru Tracking Cookie

maxlab.ru virus description
Technical details:
Categories: Tracking Cookie

maxlab.ru indications of infection

This symptoms of maxlab.ru detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.DOQ Downloader Cleaner
Chaploit Trojan Removal
VB.eo Backdoor Symptoms
Removing Mycooldoor Trojan
PokaPoka Trojan Cleaner

Rbot.FRH Trojan

Rbot.FRH virus description
Technical details:
Categories: Trojan

Rbot.FRH indications of infection

This symptoms of Rbot.FRH detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.ADH Trojan Information
Lazy Trojan Information
JanNet Spyware Cleaner
Seek.Rep Trojan Removal
Removing Bancos.GZO Trojan

SillyDl.CMR Trojan

SillyDl.CMR virus description
Technical details:
Categories: Trojan

SillyDl.CMR indications of infection

This symptoms of SillyDl.CMR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Upsilonprog Trojan
Remove SillyDl.CTG Trojan
Lop.com.IMZ Spyware Removal instruction
Removing Dosingle Trojan
APlittle Trojan Removal instruction