Pigeon.AVNI Trojan

Pigeon.AVNI virus description
Technical details:
Categories: Trojan

Pigeon.AVNI indications of infection

This symptoms of Pigeon.AVNI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove WWW.HighTrafficAds.com Tracking Cookie
Remove Tm.Logger Spyware
Win32.VB.do Trojan Cleaner
Removing Kitten.Free.Sex Adware
Pigeon.ACL Trojan Symptoms

TrojanDownloader.Win32.IstBar.eo Downloader

TrojanDownloader.Win32.IstBar.eo virus description
Technical details:
Categories: Downloader
TrojanDownloader.Win32.IstBar.eo Aliases:
[Panda]Adware/SideFind

TrojanDownloader.Win32.IstBar.eo indications of infection

This symptoms of TrojanDownloader.Win32.IstBar.eo detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing FukMSFTP DoS
Nomad Trojan Information
Remove Help Adware
SillyDl.DLA Downloader Removal
Cabronator.Kill.beta3 Backdoor Removal

SMS.Max DoS

This summary is not available. Please click here to view the post.

Matiteman.Mail.Pass.Stealer Trojan

Matiteman.Mail.Pass.Stealer virus description
Technical details:
Categories: Trojan,Hacker Tool
Matiteman.Mail.Pass.Stealer Aliases:
[Kaspersky]Trojan.PSW.Mtmpas.b;
[Panda]Trj/Legmir.D

Matiteman.Mail.Pass.Stealer indications of infection

This symptoms of Matiteman.Mail.Pass.Stealer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.ADH Trojan Cleaner
AFA Internet Enhancement Adware Removal
Vxidl.AAN Trojan Removal instruction
Bancos.HAP Trojan Information
Banker.COJ Trojan Removal

Beauty Trojan

Beauty virus description
Technical details:
Categories: Trojan

Beauty indications of infection

This symptoms of Beauty detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Averub Trojan Removal instruction
Pop.com Tracking Cookie Removal
Removing Brocat Trojan
Removing Win32.StartPage.bj Trojan
Win32.Realpan Trojan Symptoms

Casalemedia Tracking Cookie

Casalemedia virus description
Technical details:
Categories: Tracking Cookie

Casalemedia indications of infection

This symptoms of Casalemedia detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Virtual.Bouncer Adware Removal instruction
Remove Pigeon.AVMC Trojan
Drunk.Mouse Trojan Symptoms
NtRootK Backdoor Removal instruction
SillyDl.CTE Trojan Removal instruction

Ayam Trojan

Ayam virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Ayam Aliases:
[Kaspersky]Backdoor.Ayam;
[Eset]Win32/Ayam.A trojan;
[Panda]Backdoor Program

Ayam indications of infection

This symptoms of Ayam detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TFN2K.An.Analysis DoS Cleaner
Dowque.ABO Trojan Symptoms
Playboy Trojan Information
Win32.DTR.Plugin Trojan Symptoms
Pigeon.EIV Trojan Removal instruction

Slinger Backdoor

Slinger virus description
Technical details:
Categories: Backdoor,RAT

Slinger indications of infection

This symptoms of Slinger detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
WebLookUp Adware Information
Gencontrol RAT Information
Door Trojan Symptoms
Remove Family.Key.Logger Spyware
Scarab Trojan Symptoms

Shooter3 Hacker Tool

Shooter3 virus description
Technical details:
Categories: Hacker Tool,DoS
Shooter3 Aliases:
[Kaspersky]Flooder.MailSpam.VB.d;
[F-Prot]security risk or a "backdoor" program;
[Panda]Flooder Program;
[Computer Associates]Win32/Mail.d!Flooder!Trojan

Shooter3 indications of infection

This symptoms of Shooter3 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Nfstrace Trojan Cleaner
Alpha RAT Removal instruction
Removing AsbMay Backdoor
Crypt Trojan Removal
Vxidl.AGS Trojan Cleaner

CWS.Quicken Hijacker

CWS.Quicken virus description
Technical details:
Categories: Hijacker

CWS.Quicken indications of infection

This symptoms of CWS.Quicken detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Spam.AnonMail Trojan Removal instruction
Removing The.Spy.Beta Trojan
Pigeon.AHQ Trojan Cleaner
Removing Bat.tg Trojan
Removing QDel65 Trojan

Dowque.ABO Trojan

Dowque.ABO virus description
Technical details:
Categories: Trojan

Dowque.ABO indications of infection

This symptoms of Dowque.ABO detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Daemon Trojan Cleaner
Reportserversocket Hostile Code Symptoms
Pigeon.BBG Trojan Cleaner
Removing Clear.Search Hijacker
Remove Random.Text DoS

Bat.Steel Trojan

Bat.Steel virus description
Technical details:
Categories: Trojan
Bat.Steel Aliases:
[Panda]BAT/Steel.C;
[Computer Associates]Bat/Steel.1071!Trojan

Bat.Steel indications of infection

This symptoms of Bat.Steel detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Backdoor.Avocado.ServerDLL Backdoor Cleaner
Zlob.ve Downloader Removal
Manzon Trojan Removal
Trakia Trojan Cleaner
SillyDl.CAW Trojan Symptoms

Begin2Search Adware

Begin2Search virus description
Technical details:
Categories: Adware

Begin2Search indications of infection

This symptoms of Begin2Search detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove RCCL.BridgeTrack Tracking Cookie
Hooker Trojan Cleaner
DarkNova Trojan Information
Anti.Denial RAT Removal instruction
Remove Vxidl.AGW Trojan

Pigeon.AVTU Trojan

Pigeon.AVTU virus description
Technical details:
Categories: Trojan

Pigeon.AVTU indications of infection

This symptoms of Pigeon.AVTU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing PegaJoiner Trojan
LiveAntispy Ransomware Removal instruction
ClientMan.2in1 BHO Information
Removing Mxsender Trojan
SillyDl.BZU Trojan Symptoms

Virtual.Bouncer Adware

Virtual.Bouncer virus description
Technical details:
Categories: Adware
Virtual.Bouncer Aliases:
[Panda]Adware/VirtualBouncer

Virtual.Bouncer Folders:
[%PROGRAMS%]\virtual bouncer
[%PROGRAM_FILES%]\vbouncer
[%STARTMENU%]\programs\virtual bouncer
[%APPDATA%]\vbouncer
[%PROFILE%]\start menu\programs\virtual bouncer

Virtual.Bouncer Files:
[%SYSTEM%]\24581281.EXE
[%SYSTEM%]\BO2802040113.dll
[%SYSTEM%]\book.dll
[%SYSTEM%]\config\systemprofile\Local Settings\Temp\antispy.exe
[%SYSTEM%]\VB1.exe
[%STARTUP%]\virtual bouncer.lnk
[%SYSTEM%]\vern32.dll
[%WINDOWS%]\downloaded program files\bundleouter2501031120.exe
[%WINDOWS%]\downloaded program files\conflict.1\bundleouter2501031120.exe
[%WINDOWS%]\downloaded program files\conflict.1\vbouncerouter1402030731.exe
[%WINDOWS%]\downloaded program files\vbouncerouter1402030731.exe
[%SYSTEM%]\24581281.EXE
[%SYSTEM%]\BO2802040113.dll
[%SYSTEM%]\book.dll
[%SYSTEM%]\config\systemprofile\Local Settings\Temp\antispy.exe
[%SYSTEM%]\VB1.exe
[%STARTUP%]\virtual bouncer.lnk
[%SYSTEM%]\vern32.dll
[%WINDOWS%]\downloaded program files\bundleouter2501031120.exe
[%WINDOWS%]\downloaded program files\conflict.1\bundleouter2501031120.exe
[%WINDOWS%]\downloaded program files\conflict.1\vbouncerouter1402030731.exe
[%WINDOWS%]\downloaded program files\vbouncerouter1402030731.exe

Virtual.Bouncer Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\virtual bouncer

Virtual.Bouncer Registry Values:
HKEY_CURRENT_USER\software\bundles
HKEY_CURRENT_USER\software\bundles
HKEY_CURRENT_USER\software\bundles
HKEY_CURRENT_USER\software\bundles
HKEY_LOCAL_MACHINE\software\wise solutions\wise installation system\repair\c:/windows/system32/innervbinstall.log
HKEY_CURRENT_USER\software\bundles
HKEY_CURRENT_USER\software\bundles
HKEY_CURRENT_USER\software\bundles
HKEY_CURRENT_USER\software\bundles
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\spyblocs v2.0
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\spyblocs v2.0
HKEY_LOCAL_MACHINE\software\wise solutions\wise installation system\repair\[%SYSTEM%]/innervbinstall.log


Virtual.Bouncer indications of infection

This symptoms of Virtual.Bouncer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Proclaim.Telcom Adware
Remove Gogfeed Trojan
Removing Vxidl.AFO Trojan
XunLeiBHO Adware Removal
Shoshkeles Tracking Cookie Cleaner

Bancos.ZZJ Trojan

Bancos.ZZJ virus description
Technical details:
Categories: Trojan

Bancos.ZZJ indications of infection

This symptoms of Bancos.ZZJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AEV Trojan Cleaner
Kid.Terror Backdoor Information
Removing Shipper Backdoor
Sweet.Heart Backdoor Removal
Pigeon.AGU Trojan Symptoms

Banload.np Trojan

Banload.np virus description
Technical details:
Categories: Trojan,Downloader

Banload.np indications of infection

This symptoms of Banload.np detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Safety Bar Trojan Removal
Remove IRC.Chamel DoS
Win32.KillFiles.bm Trojan Cleaner
Removing Win.DelSys Trojan
Removing Bancos.ZZR Trojan

SillyDl.DCV Trojan

SillyDl.DCV virus description
Technical details:
Categories: Trojan

SillyDl.DCV indications of infection

This symptoms of SillyDl.DCV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GKP Trojan Removal instruction
Removing Hotdog.Server Trojan
Stealth.Keyboard.Interceptor.Auto.Sender Spyware Removal
SCKeyLog.20!Spy!Trojan Trojan Removal instruction
Remove Small.dv Trojan

Bancos.GLV Trojan

Bancos.GLV virus description
Technical details:
Categories: Trojan

Bancos.GLV indications of infection

This symptoms of Bancos.GLV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Banker.ckj Trojan Removal instruction
Win.Steal Trojan Information
Remove XXX.ToolBar Trojan
Removing Floppy.Trsh Trojan
Remove BA Trojan

Hatchet.Remote RAT

Hatchet.Remote virus description
Technical details:
Categories: RAT

Hatchet.Remote indications of infection

This symptoms of Hatchet.Remote detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AWC Trojan Removal
Rbot.FRH Trojan Cleaner
Removing QRabid.BTW Trojan
BAT.ZipBat Trojan Information
Tfn2Kpass DoS Symptoms

Pigeon.EXS Trojan

Pigeon.EXS virus description
Technical details:
Categories: Trojan

Pigeon.EXS indications of infection

This symptoms of Pigeon.EXS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HLY Trojan Symptoms
Remove Drunk.Mouse Trojan
Scpact Trojan Symptoms
Phi.Firewall.Bypass Trojan Cleaner
SubSeven.1C.Server Backdoor Removal instruction

Win95.Markj Trojan

Win95.Markj virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Win95.Markj Aliases:
[Kaspersky]Win95.MarkJ.983;
[Panda]Padania Libera;
[Computer Associates]Win95.Markj.983

Win95.Markj indications of infection

This symptoms of Win95.Markj detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove WordMacro.Barbaro Trojan
Remove ProfitZone Adware
VB.ny Backdoor Removal instruction
Irapture Backdoor Cleaner
IMI Trojan Removal

Pigeon.AVOZ Trojan

Pigeon.AVOZ virus description
Technical details:
Categories: Trojan

Pigeon.AVOZ indications of infection

This symptoms of Pigeon.AVOZ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HAP Trojan Information
Bat.TechnoRat Trojan Cleaner
Removing Jerry!Trojan Trojan
Bancos.GNA Trojan Information
Timemark Trojan Cleaner