Deletall Trojan

Deletall virus description
Technical details:
Categories: Trojan
Deletall Aliases:
[Panda]Trj/DelAll;
[Computer Associates]Deletall.5600!Trojan

Deletall indications of infection

This symptoms of Deletall detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Sin.Static.Ip RAT
Remove Kid.Terror Backdoor
XCP.Sony.Rootkit.Patch Trojan Cleaner
Removing Zlob.Fam.SoftCodec Trojan
JS.Netdex Trojan Symptoms

Win32.KillProc Trojan

Win32.KillProc virus description
Technical details:
Categories: Trojan,Hacker Tool
Win32.KillProc Aliases:
[Panda]Trojan Horse

Win32.KillProc indications of infection

This symptoms of Win32.KillProc detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Dead.Locked DoS
Removing BAT.Ser Trojan
TrojanDownloader.Win32.Tibser Adware Information
Moonpie.10b Backdoor Removal instruction
wholinked.com Tracking Cookie Symptoms

SillyDl.DGA Trojan

SillyDl.DGA virus description
Technical details:
Categories: Trojan

SillyDl.DGA indications of infection

This symptoms of SillyDl.DGA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove JS.TailTap Trojan
Removing Meldsimp Trojan
BAT.Passion Trojan Removal instruction
SillyDl.CFY Trojan Information
Slashes Trojan Removal instruction

CWS.Searchmeup Hijacker

CWS.Searchmeup virus description
Technical details:
Categories: Hijacker

CWS.Searchmeup Registry Keys:
HKEY_CLASSES_ROOT\clsid\{0e1230f8-ea50-42a9-983c-d22abc2eed3b}
HKEY_CLASSES_ROOT\Interface\{95B92D92-8B7D-4A19-A3F1-43113B4DBCAF}
HKEY_CLASSES_ROOT\toolband.toolbandobj.1
HKEY_CURRENT_USER\software\toolband
HKEY_CLASSES_ROOT\clsid\{441354c5-911b-409b-9a66-a11d6d4e1a22}
HKEY_CLASSES_ROOT\interface\{95b92d92-8b7d-4a19-a3f1-43113b4dbcaf}
HKEY_CLASSES_ROOT\toolband.toolbandhelper
HKEY_CLASSES_ROOT\toolband.toolbandhelper.1
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{441354c5-911b-409b-9a66-a11d6d4e1a22}

CWS.Searchmeup Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall


CWS.Searchmeup indications of infection

This symptoms of CWS.Searchmeup detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Hail Trojan
Bancos.DVN Trojan Removal
Webroot Trojan Removal
Help Adware Symptoms
Removing OC Trojan

SillyDl.CTE Trojan

SillyDl.CTE virus description
Technical details:
Categories: Trojan

SillyDl.CTE indications of infection

This symptoms of SillyDl.CTE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove MalwarePro Ransomware
Pigeon.AUT Trojan Removal instruction
SillyDl.CNM Trojan Removal
Removing SillyDl.CSW Trojan
Wollf Trojan Cleaner

Pigeon.ABL Trojan

Pigeon.ABL virus description
Technical details:
Categories: Trojan

Pigeon.ABL indications of infection

This symptoms of Pigeon.ABL detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VB.ny Backdoor Information
HeyItsMe Trojan Removal instruction
Vxidl.BDF Trojan Removal instruction
Zlob.Fam.MovieCommander Trojan Information
Bancos.HLY Trojan Removal instruction

Vxidl.AWW Trojan

Vxidl.AWW virus description
Technical details:
Categories: Trojan

Vxidl.AWW indications of infection

This symptoms of Vxidl.AWW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.FXO Trojan Information
Remove Win.DelSys Trojan
MH Trojan Symptoms
Vxidl.AUM Trojan Removal instruction
Deltaclick BHO Information

Deldos Trojan

Deldos virus description
Technical details:
Categories: Trojan

Deldos indications of infection

This symptoms of Deldos detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
FakeSub7!Spy!Trojan Trojan Removal instruction
Remove Virus.Killer Trojan
wholinked.com Tracking Cookie Cleaner
Pigeon.AUU Trojan Cleaner
Remove SillyDl.DJP Trojan

Chakau.Server Trojan

Chakau.Server virus description
Technical details:
Categories: Trojan,Backdoor
Chakau.Server Aliases:
[Eset]IRC.Mapsy.A trojan;
[Computer Associates]Backdoor/Chakau.02.Server,Win32.Chakau.02

Chakau.Server indications of infection

This symptoms of Chakau.Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Win32.VB.bb Trojan
Remove IGMP.Tejanos DoS
Pigeon.AVSM Trojan Information
Bancos.GZO Trojan Information
Remove Pigeon.EVC Trojan

Staog Trojan

Staog virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Staog Aliases:
[Panda]Linux/Staog;
[Computer Associates]Linux/Staog

Staog indications of infection

This symptoms of Staog detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Rkl.setup Spyware Symptoms
The.History.of.Divine.Intervention Hacker Tool Removal instruction
Remove Zlob.ve Downloader
Pigeon.AVGW Trojan Information
Trident Trojan Symptoms

Manzon Trojan

Manzon virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Manzon Aliases:
[Kaspersky]Manzon.1404,Manzon.1414;
[Panda]Manzon (1421.1470),Manzon.1414;
[Computer Associates]Manzon.1414

Manzon indications of infection

This symptoms of Manzon detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanDropper.Win32.ZomJoiner Trojan Cleaner
MailSpam.Squad Hacker Tool Removal instruction
PHP.Liquid Trojan Information
DialXS Adware Removal instruction
IstBar.az Downloader Removal

Pigeon.AVDG Trojan

Pigeon.AVDG virus description
Technical details:
Categories: Trojan

Pigeon.AVDG indications of infection

This symptoms of Pigeon.AVDG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Flooder.MailSpam.KagraTool DoS Removal
Vxidl.BBE Trojan Cleaner
SillyDl.CPP Trojan Removal instruction
MySocket Backdoor Removal
Vxidl.AXX Trojan Cleaner

Pigeon.AWIN Trojan

Pigeon.AWIN virus description
Technical details:
Categories: Trojan

Pigeon.AWIN indications of infection

This symptoms of Pigeon.AWIN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Implant Trojan
Vxidl.AAN Trojan Removal instruction
Pigeon.EWQ Trojan Information
Anti.Denial RAT Symptoms
Bancos.HHH Trojan Information

CmjSpy.25c RAT

CmjSpy.25c virus description
Technical details:
Categories: RAT

CmjSpy.25c indications of infection

This symptoms of CmjSpy.25c detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Kid.Terror Backdoor Removal
AZVPWS Trojan Information
Remove Trakia Trojan
Nedsym Trojan Symptoms
Remove Bancos.IJR Trojan

Stats.KLSoft Tracking Cookie

Stats.KLSoft virus description
Technical details:
Categories: Tracking Cookie

Stats.KLSoft indications of infection

This symptoms of Stats.KLSoft detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Agent.ef Backdoor Removal instruction
Removing Lop.bd Adware
Bancos.GCJ Trojan Removal instruction
Remove SillyDl.CGI Trojan
AsbMay Backdoor Removal

Vxidl.AEV Trojan

Vxidl.AEV virus description
Technical details:
Categories: Trojan

Vxidl.AEV indications of infection

This symptoms of Vxidl.AEV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AHS Trojan Removal
Removing RBBS Trojan
Remove Win32.Spy.Das Trojan
VXPkg Trojan Removal instruction
Landmine DoS Cleaner

SdBot.hn Trojan

SdBot.hn virus description
Technical details:
Categories: Trojan,Backdoor
SdBot.hn Aliases:
[Kaspersky]Backdoor.SdBot.hn;
[Eset]IRC/SdBot.ACA trojan;
[Computer Associates]Backdoor/SdBot.hn,Win32.Sdbot.37920

SdBot.hn indications of infection

This symptoms of SdBot.hn detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Otto Trojan
DAS.Boot Trojan Removal
Den.Zuk Trojan Cleaner
Nookl Trojan Cleaner
Pigeon.ALV Trojan Information

KBMonitor Spyware

KBMonitor virus description
Technical details:
Categories: Spyware

KBMonitor Files:
[%SYSTEM%]\krec32\k32_1.rec
[%SYSTEM%]\krec32\keys32.dll
[%SYSTEM%]\krec32\kindex.rec
[%SYSTEM%]\krec32\krec32.exe
[%SYSTEM%]\krec32\p1.rec
[%SYSTEM%]\krec32\k32_1.rec
[%SYSTEM%]\krec32\keys32.dll
[%SYSTEM%]\krec32\kindex.rec
[%SYSTEM%]\krec32\krec32.exe
[%SYSTEM%]\krec32\p1.rec

KBMonitor Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


KBMonitor indications of infection

This symptoms of KBMonitor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Vxidl.AUM Trojan
Gogfeed Trojan Removal instruction
Nip Trojan Removal instruction
Riot.Doom Trojan Information
Bailey Trojan Information

TeleAxxor.Server Backdoor

TeleAxxor.Server virus description
Technical details:
Categories: Backdoor,RAT
TeleAxxor.Server Aliases:
[Kaspersky]Backdoor.VB.ck;
[Panda]Backdoor Program;
[Computer Associates]Backdoor/VB.CK

TeleAxxor.Server indications of infection

This symptoms of TeleAxxor.Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.AWC Trojan
Remove Xposure Backdoor
PWS.Banker.gen.bu Trojan Removal instruction
WinPopup DoS Symptoms
Bancos.IBJ Trojan Symptoms

Bancos.CYZ Trojan

Bancos.CYZ virus description
Technical details:
Categories: Trojan

Bancos.CYZ indications of infection

This symptoms of Bancos.CYZ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AAN Trojan Removal
PHP.Liquid Trojan Removal instruction
kSite Trojan Cleaner
Backdoor.Phase Trojan Removal
Remove Pigeon.EAZ Trojan

Meldsimp Trojan

Meldsimp virus description
Technical details:
Categories: Trojan
Meldsimp Aliases:
[Kaspersky]Trojan-Proxy.Win32.Small.du,Trojan-Proxy.Win32.Small.gl,Trojan-Proxy.Win32.Small.gk,Trojan.Win32.Agent.asu;
[McAfee]BackDoor-CWM;
[F-Prot]W32/Backdoor.VBIS,W32/TrojanX.ACHF,W32/TrojanX.ABZS,W32/Trojan.VBAA;
[Other]Win32/Meldsimp,Win32/Meldsimp.J,Hacktool,Win32/Meldsimp.AC,Virus:Win32/Grum.G,W32/Smalltroj.BKOX,Mal/Generic-A,Trojan Horse,W32/agent.BZHW,Troj/ASU-Gen,Backdoor.Trojan

Meldsimp Files:
[%PROFILE_TEMP%]\winlogon.exe
[%SYSTEM%]\mpcsvc.exe
[%SYSTEM%]\ogysteo.exe
[%PROFILE_TEMP%]\winlogon.exe
[%SYSTEM%]\mpcsvc.exe
[%SYSTEM%]\ogysteo.exe

Meldsimp Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop
HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop
HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop
HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop
HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop
HKEY_CURRENT_USER\software\microsoft\internet explorer\desktop
HKEY_CURRENT_USER\software\microsoft\internet explorer\security
HKEY_CURRENT_USER\software\microsoft\internet explorer\security
HKEY_CURRENT_USER\software\microsoft\internet explorer\security
HKEY_CURRENT_USER\software\microsoft\internet explorer\security
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Meldsimp indications of infection

This symptoms of Meldsimp detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SexoDial Adware
Remove Ranky.aa Trojan
Lookup.Chgrgs BHO Removal
Removing Bancos.FXF Trojan
Pigeon.AXH Trojan Information

Win32.Beastdoor Trojan

Win32.Beastdoor virus description
Technical details:
Categories: Trojan,Backdoor
Win32.Beastdoor Aliases:
[Kaspersky]Backdoor.BeastDoor.200.d,Backdoor.BeastDoor.202.a,Backdoor.BeastDoor.191,Backdoor.BeastDoor.192.a;
[Eset]Win32/Beastdoor.330.A trojan,Win32/Beastdoor.18.A trojan;
[F-Prot]security risk or a "backdoor" program

Win32.Beastdoor indications of infection

This symptoms of Win32.Beastdoor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.ANU Trojan Removal
Remove EUX Backdoor
Pigeon.AVFU Trojan Cleaner
Remove wp.pl Tracking Cookie
Removing SearchBoss Toolbar

Kronical.Fire RAT

Kronical.Fire virus description
Technical details:
Categories: RAT,Hacker Tool

Kronical.Fire indications of infection

This symptoms of Kronical.Fire detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bugger Trojan Cleaner
Zhongsou Adware Removal instruction
Bancos.HLY Trojan Information
Pigeon.AXH Trojan Information
Remove Elite Trojan

Pigeon.AVGW Trojan

Pigeon.AVGW virus description
Technical details:
Categories: Trojan

Pigeon.AVGW indications of infection

This symptoms of Pigeon.AVGW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Small.gv Trojan Removal
Banbra.bi Trojan Symptoms
Wollf Trojan Cleaner
Win32.LMR Trojan Removal instruction
IRC.Chamel DoS Symptoms

Sweet Trojan

Sweet virus description
Technical details:
Categories: Trojan
Sweet Aliases:
[McAfee]Sweet;
[F-Prot]destructive program;
[Panda]Trj/W32.Sweet;
[Computer Associates]Win32/Sweet!Trojan

Sweet indications of infection

This symptoms of Sweet detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVGJ Trojan Symptoms
Remove SillyDl.BZG Trojan
PHP.Pirus Trojan Removal
Vxidl.BBE Trojan Symptoms
scripps.com Tracking Cookie Information

AidsInfo.Aimober Trojan

AidsInfo.Aimober virus description
Technical details:
Categories: Trojan
AidsInfo.Aimober Aliases:
[Panda]Trojan Horse

AidsInfo.Aimober indications of infection

This symptoms of AidsInfo.Aimober detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Yahoo.Nagil Trojan
Removing SillyDl.CGI Trojan
Removing Pigeon.AOL Trojan
PWS.Ghost Trojan Cleaner
Pigeon.APQ Trojan Cleaner

Bancos.INT Trojan

Bancos.INT virus description
Technical details:
Categories: Trojan
Bancos.INT Aliases:
[Kaspersky]Trojan-Downloader.Win32.Delf.dom;
[McAfee]PWS-Banker.dldr

Bancos.INT indications of infection

This symptoms of Bancos.INT detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing TrojanDropper.Win32.ZomJoiner Trojan
Vxidl.BEK Trojan Information
Buddah.Cloner DoS Symptoms
Removing MailSpam.EmailBomb Hacker Tool
Remove Sin.Static.Ip RAT

Pigeon.EAZ Trojan

Pigeon.EAZ virus description
Technical details:
Categories: Trojan

Pigeon.EAZ indications of infection

This symptoms of Pigeon.EAZ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Klez Trojan Removal instruction
Gencontrol RAT Removal
Bancos.HHH Trojan Removal instruction
Backdoor.War.20!Server Backdoor Removal instruction
SuxxProxy Trojan Symptoms

Pigeon.AOD Trojan

Pigeon.AOD virus description
Technical details:
Categories: Trojan

Pigeon.AOD indications of infection

This symptoms of Pigeon.AOD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.EZM Trojan
Averub Trojan Symptoms
PePatch.dk Spyware Cleaner
Small.dv Trojan Cleaner
Antitime RAT Removal instruction

MailSpam.BotMailer Hacker Tool

MailSpam.BotMailer virus description
Technical details:
Categories: Hacker Tool,DoS
MailSpam.BotMailer Aliases:
[Panda]Flooder Program

MailSpam.BotMailer indications of infection

This symptoms of MailSpam.BotMailer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Orpdea Trojan Removal
Remove Win32.Memleak Trojan
MH Trojan Removal
Playboy Trojan Cleaner
PSW.Qlog Trojan Cleaner

Offshoreclicks.com Tracking Cookie

This summary is not available. Please click here to view the post.

TCC Trojan

TCC virus description
Technical details:
Categories: Trojan,Backdoor,RAT
TCC Aliases:
[Kaspersky]Backdoor.VB.bf,Backdoor.VB.ae;
[Eset]Win32/VB.BF trojan;
[McAfee]SennaSpy2001,BackDoor-ABD;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program,Trojan Horse;
[Computer Associates]Backdoor/TCC.090!Server,Win32.TCC.090,Backdoor/TCC.091,Win32.TCC.091

TCC indications of infection

This symptoms of TCC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Datacrime Trojan
Removing Diskspoiler Trojan
Vxidl.ADE Trojan Information
Sandradoor.Server Trojan Removal
Hamer Trojan Symptoms

Anti.Denial RAT

Anti.Denial virus description
Technical details:
Categories: RAT

Anti.Denial indications of infection

This symptoms of Anti.Denial detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
FakeAlert.TrojanFactory Trojan Symptoms
Remove Diedix Trojan
Cellfree Trojan Information
Bancos.IHA Trojan Information
Removing Bugger Trojan

BSDi RAT

BSDi virus description
Technical details:
Categories: RAT

BSDi indications of infection

This symptoms of BSDi detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Scpact Trojan
SillyDl.CDL Trojan Information
Removing Win32.Mediar Trojan
NeverEnd Trojan Removal instruction
webpower.com Tracking Cookie Symptoms

Bailey Trojan

Bailey virus description
Technical details:
Categories: Trojan

Bailey indications of infection

This symptoms of Bailey detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
JS.Relink Trojan Information
Spastic Trojan Symptoms
untd.com Tracking Cookie Symptoms
Remove Kitten.Free.Sex Adware
Removing wp.pl Tracking Cookie

BNB Backdoor

BNB virus description
Technical details:
Categories: Backdoor,RAT,Hacker Tool
BNB Aliases:
[Kaspersky]Vienna.BNB.429,Vienna.BNB.429.b;
[Eset]Vienna.Bnb.A virus;
[Panda]Univ;
[Computer Associates]BNB

BNB indications of infection

This symptoms of BNB detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Hamer Trojan Removal
Removing Slashes Trojan
Hornet Backdoor Removal
Vxidl.BDU Trojan Removal
Reflect DoS Removal

PSW.Vingrad Trojan

PSW.Vingrad virus description
Technical details:
Categories: Trojan,Hacker Tool
PSW.Vingrad Aliases:
[Panda]Trj/PSW.Vingrad.B;
[Computer Associates]Win32.PSW.Vingrad.B,Win32/Vingrad.b!PWS!Trojan

PSW.Vingrad indications of infection

This symptoms of PSW.Vingrad detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
FakeAlert.TrojanFactory Trojan Symptoms
Doped Backdoor Cleaner
SillyDl.CSW Trojan Removal
Bancos.GOR Trojan Symptoms
PSW.QQpass.aj Trojan Removal instruction

Ratboy.Love Trojan

Ratboy.Love virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Ratboy.Love Aliases:
[Kaspersky]Virus.DOS.CivilWar.Ratboy.306.b;
[Panda]Ratboy.306.B;
[Computer Associates]Ratboy.Love

Ratboy.Love indications of infection

This symptoms of Ratboy.Love detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
FTPAttack Trojan Information
Cottered Trojan Information
Remove Agent.dt Spyware
Stardler Trojan Cleaner
SillyDl.DEQ Downloader Information

Bancos.IEO Trojan

Bancos.IEO virus description
Technical details:
Categories: Trojan

Bancos.IEO indications of infection

This symptoms of Bancos.IEO detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove untd.com Tracking Cookie
WordMacro.Barbaro Trojan Information
Pigeon.AVKZ Trojan Information
Remove SpyArsenal.ICQ.Logger Spyware
Ramase Trojan Removal

PSW.QQlog Trojan

PSW.QQlog virus description
Technical details:
Categories: Trojan,Hacker Tool
PSW.QQlog Aliases:
[Panda]Trojan Horse

PSW.QQlog indications of infection

This symptoms of PSW.QQlog detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Win32.Banker.ckj Trojan
LiveAntispy Ransomware Removal
Removing Win32.DieWar Trojan
Tfn2Kpass DoS Information
Keyboard.Spectator.Lite Spyware Removal

Win32.Invictus Trojan

Win32.Invictus virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Win32.Invictus Aliases:
[Kaspersky]Win32.InvictusDLL.b;
[Panda]W32/InvictusDLL.C

Win32.Invictus indications of infection

This symptoms of Win32.Invictus detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.AdURL Adware Removal
Web.Specials Adware Information
Removing Bancos.CBZ Trojan
Backdoor.Zombam Trojan Symptoms
Removing Nip Trojan

Mass.Instant.Messenger Adware

Mass.Instant.Messenger virus description
Technical details:
Categories: Adware

Mass.Instant.Messenger indications of infection

This symptoms of Mass.Instant.Messenger detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Khooby Trojan Symptoms
Datacrime Trojan Cleaner
Clear.Search Hijacker Information
Racchel Trojan Cleaner
Removing Bancos.ICL Trojan