Doubleheart Trojan

Doubleheart virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Doubleheart Aliases:
[Kaspersky]DHeart.649;
[Panda]DoubleHeart.649;
[Computer Associates]Doubleheart.649

Doubleheart indications of infection

This symptoms of Doubleheart detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Stealth.Keyboard.Interceptor.Auto.Sender Spyware Removal instruction
Remove Pigeon.AHX Trojan
Win32.VB.du Trojan Removal
Pigeon.AVDY Trojan Removal instruction
Remove SubSeven.deutsch Backdoor

Small.gv Trojan

Small.gv virus description
Technical details:
Categories: Trojan

Small.gv indications of infection

This symptoms of Small.gv detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.ASW Trojan
RemoteIsProgramRunning RAT Symptoms
Remove EZCyberSearch Adware
Small.tf Trojan Removal instruction
Win32.Mediar Trojan Information

VB.au Trojan

VB.au virus description
Technical details:
Categories: Trojan
VB.au Aliases:
[Panda]Trojan Horse.LC;
[Computer Associates]Win32/VB.au!Trojan

VB.au indications of infection

This symptoms of VB.au detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Hackarmy.Server Trojan Removal instruction
WordMacro.Barbaro Trojan Removal
Delf.aeo Downloader Symptoms
Red.Swoosh Worm Removal instruction
Remove Bancos.HVO Trojan

Wisconsin Trojan

Wisconsin virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Wisconsin Aliases:
[Kaspersky]DeathPas.825;
[Panda]Wisconsin;
[Computer Associates]Wisconsin

Wisconsin indications of infection

This symptoms of Wisconsin detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Securing.Low.End.Cisco.Routers DoS Symptoms
Donn.D!downloader Trojan Removal
Downloader.AUE.dll Trojan Information
HLLP.6248!Dropper Trojan Symptoms
Removing OpaKill Trojan

Floppy.Trsh Trojan

Floppy.Trsh virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Floppy.Trsh Aliases:
[Kaspersky]Mahon.1364.a;
[Panda]Univ

Floppy.Trsh indications of infection

This symptoms of Floppy.Trsh detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Spy.KeyLogger Trojan Removal instruction
SillyDl.CSW Trojan Information
Removing Bancos.DVN Trojan
Red.Hacker Trojan Information
Bancos.GHY Trojan Removal

Pigeon.ERE Trojan

Pigeon.ERE virus description
Technical details:
Categories: Trojan

Pigeon.ERE indications of infection

This symptoms of Pigeon.ERE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VB.mx Trojan Removal instruction
Webserver.Lite RAT Removal
Win32.NetDown Trojan Removal instruction
Removing Swizzor.bf Downloader
Pigeon.AWC Trojan Cleaner

Pigeon.AVRB Trojan

Pigeon.AVRB virus description
Technical details:
Categories: Trojan

Pigeon.AVRB indications of infection

This symptoms of Pigeon.AVRB detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Seek.Rep Trojan
Bancos.HTU Trojan Information
Removing Khooby Trojan
Deception Trojan Removal
Remove Nip Trojan

Live.Wir Backdoor

Live.Wir virus description
Technical details:
Categories: Backdoor
Live.Wir Aliases:
[Panda]Bck/LiveWire;
[Computer Associates]Win32/Live-Wir!Trojan

Live.Wir indications of infection

This symptoms of Live.Wir detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Lop.com.Active Spyware
RC5 Trojan Symptoms
PWS.Banker.gen.bu Trojan Information
BAT.MicroMac Trojan Cleaner
Cuki Trojan Removal instruction

Dead.Locked DoS

Dead.Locked virus description
Technical details:
Categories: DoS

Dead.Locked indications of infection

This symptoms of Dead.Locked detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Bancos.HHH Trojan
Golon Trojan Removal instruction
NtRootK Backdoor Cleaner
PokaPoka Trojan Removal instruction
QRabid.BTW Trojan Removal instruction

EUX Backdoor

EUX virus description
Technical details:
Categories: Backdoor

EUX indications of infection

This symptoms of EUX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Truva.Ati Backdoor Removal
SillyDl.ABK Trojan Information
SillyDl.DPA Trojan Removal instruction
Win.TheKill Trojan Information
Remove Kid.Terror Backdoor

Zap Trojan

Zap virus description
Technical details:
Categories: Trojan,Hacker Tool
Zap Aliases:
[Panda]Trojan Horse

Zap indications of infection

This symptoms of Zap detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AYX Trojan Cleaner
VB.ny Backdoor Cleaner
CompuDaze DoS Information
Delf.fl Trojan Removal instruction
Remove Jodeitor RAT

Kaitex Trojan

Kaitex virus description
Technical details:
Categories: Trojan,Backdoor
Kaitex Aliases:
[Eset]Win32/Katien.N trojan;
[Computer Associates]Backdoor/Kaitex

Kaitex Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Kaitex indications of infection

This symptoms of Kaitex detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
The.History.of.Divine.Intervention Hacker Tool Information
Win.Steal Trojan Removal instruction
Ehg.studentuniverse.hitbox Tracking Cookie Removal
Removing Portfu Trojan
ExPup Trojan Cleaner

Win95.Anxiety Trojan

Win95.Anxiety virus description
Technical details:
Categories: Trojan
Win95.Anxiety Aliases:
[Panda]Anxiety;
[Computer Associates]Win95.Anxiety.F,Win95/Anxiety.1397

Win95.Anxiety indications of infection

This symptoms of Win95.Anxiety detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EYX Trojan Cleaner
Bancos.HNO Trojan Cleaner
Upsilonprog Trojan Information
Bad.Guy Trojan Removal
Vxidl.AYX Trojan Removal instruction

Win32.PWS.Legendmir Trojan

Win32.PWS.Legendmir virus description
Technical details:
Categories: Trojan,Hacker Tool
Win32.PWS.Legendmir Aliases:
[Kaspersky]Trojan.PSW.Hukle.j;
[Panda]Trojan Horse.LC;
[Computer Associates]Win32/Lemir.C!PWS!Trojan

Win32.PWS.Legendmir indications of infection

This symptoms of Win32.PWS.Legendmir detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Hemlock Trojan Cleaner
Bancos.GKP Trojan Removal
Remove Welcome Trojan
Bancos.HCI Trojan Removal instruction
Removing Bancos.HOW Trojan

Messah Backdoor

Messah virus description
Technical details:
Categories: Backdoor

Messah indications of infection

This symptoms of Messah detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Wollf Trojan
Remove Keyboard.Spectator.Lite Spyware
SillyDl.CDL Trojan Information
Hornet Backdoor Removal instruction
Remove Den.Zuk Trojan

Win32.Spyman Trojan

Win32.Spyman virus description
Technical details:
Categories: Trojan,Backdoor
Win32.Spyman Aliases:
[Eset]Win32/Spyman.A trojan

Win32.Spyman indications of infection

This symptoms of Win32.Spyman detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Alpha RAT Symptoms
SillyDl.CAU Trojan Information
Dblheart Trojan Cleaner
Removing Ranky.aa Trojan
MySocket Backdoor Removal

CWS.Excel10 Hijacker

CWS.Excel10 virus description
Technical details:
Categories: Hijacker

CWS.Excel10 Files:
[%APPDATA%]\microsoft\office\excel10.dll
[%APPDATA%]\microsoft\office\excel10.dll


CWS.Excel10 indications of infection

This symptoms of CWS.Excel10 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
BAT.MicroMac Trojan Removal
Delf.eg Trojan Removal instruction
Vxidl.AUK Trojan Information
Bancos.IJR Trojan Symptoms
AIM.Robber Trojan Removal instruction

Qukart.gen Spyware

Qukart.gen virus description
Technical details:
Categories: Spyware

Qukart.gen indications of infection

This symptoms of Qukart.gen detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.IJR Trojan Removal instruction
TrojanRunner.RSP.b!Trojan Trojan Information
PSW.Lmir.fo Trojan Information
Remove Grog.Noncemale Trojan
WebDownloader.by Downloader Symptoms

Win32.Uhil Trojan

Win32.Uhil virus description
Technical details:
Categories: Trojan,Backdoor
Win32.Uhil Aliases:
[Kaspersky]Backdoor.Uhil.c

Win32.Uhil indications of infection

This symptoms of Win32.Uhil detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MIRC.Korpie Trojan Symptoms
Removing MDSA.Sentinel Spyware
Removing Focalink.com Tracking Cookie
Rephyes Trojan Removal instruction
Win32.PWS.Bamer Trojan Removal instruction

Win.TheKill Trojan

Win.TheKill virus description
Technical details:
Categories: Trojan,Backdoor

Win.TheKill indications of infection

This symptoms of Win.TheKill detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Bat.Guru Trojan
Remove WebDownloader.by Downloader
Frethog.AFC Trojan Cleaner
Removing TrojanSpy.Win32.Sincom.bk Trojan
Clear.Search Hijacker Removal instruction

Bigorna Backdoor

Bigorna virus description
Technical details:
Categories: Backdoor,RAT

Bigorna indications of infection

This symptoms of Bigorna detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Delf.eg Trojan Removal
Excel.BlackFriday Trojan Cleaner
Skid.Row Trojan Removal
Remove Scynaud Trojan
SillyDl.CZP Trojan Cleaner

SillyDl.DBY Trojan

SillyDl.DBY virus description
Technical details:
Categories: Trojan

SillyDl.DBY indications of infection

This symptoms of SillyDl.DBY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MagicLink.NetPCSpy Backdoor Symptoms
Bancos.GBI Trojan Information
Daemon Trojan Cleaner
Otto Trojan Information
Bridge Trojan Cleaner