Hooker!Dropper Trojan

Hooker!Dropper virus description
Technical details:
Categories: Trojan,Hacker Tool

Hooker!Dropper indications of infection

This symptoms of Hooker!Dropper detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Lop.com.IMZ Spyware Information
SillyDl.DJL Trojan Removal instruction
Dowque.ABW Trojan Information
Trinoo Trojan Removal
Removing Zhongsou Adware

Bancos.GJS Trojan

Bancos.GJS virus description
Technical details:
Categories: Trojan

Bancos.GJS indications of infection

This symptoms of Bancos.GJS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.FWI Trojan Information
Remove Pigeon.AVGJ Trojan
Remove Bancos.ZZR Trojan
Remove Scarab Trojan
Pigeon.FCA Trojan Cleaner

PWS.SharaQQ Trojan

PWS.SharaQQ virus description
Technical details:
Categories: Trojan,Hacker Tool
PWS.SharaQQ Aliases:
[Kaspersky]Trojan.PSW.SharaQQ.40,Trojan.PSW.SharaQQ.45,Trojan.PSW.SharaQQ.30;
[McAfee]PWS-SharaQQ;
[F-Prot]security risk or a "backdoor" program;
[Panda]Trj/PSW.SharaQQ.40,Trj/SharaQQ.A,Trojan Horse;
[Computer Associates]Shara.PSW.QQ.40!Trojan,Win32.PSW.ShareQQ.45,Win32.PSW.ShareQQ.30,Win32/ShareQQ.30!PWS!Trojan

PWS.SharaQQ indications of infection

This symptoms of PWS.SharaQQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
KBL.Webdownloader Downloader Information
Remove CWS.IEFeads Hijacker
Removing Parity Trojan
Deletall Trojan Removal
Virus.Killer Trojan Cleaner

Bancos.GQM Trojan

Bancos.GQM virus description
Technical details:
Categories: Trojan

Bancos.GQM indications of infection

This symptoms of Bancos.GQM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Fucoudbg Trojan
Sesquipedalian DoS Symptoms
SillyDl.DAV Trojan Information
Doped Backdoor Removal
Bancos.ICS Trojan Symptoms

Backdoor.Mozilla Trojan

Backdoor.Mozilla virus description
Technical details:
Categories: Trojan,Backdoor
Backdoor.Mozilla Aliases:
[Kaspersky]Backdoor.Mozilla.30;
[Computer Associates]Win32.Mozilla.30

Backdoor.Mozilla indications of infection

This symptoms of Backdoor.Mozilla detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Phi.Firewall.Bypass Trojan Symptoms
Khooby Trojan Cleaner
IIS.Snaki Trojan Symptoms
Fucoudbg Trojan Information
Ampmess Trojan Information

Ampmess Trojan

Ampmess virus description
Technical details:
Categories: Trojan

Ampmess indications of infection

This symptoms of Ampmess detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CNX Trojan Symptoms
Remove Bancos.HLN Trojan
Removing Win32.Septic Trojan
Removing TrojanDropper.Win32.Joiner Trojan
Remove Webroot Trojan

SillyDl.BCS Trojan

SillyDl.BCS virus description
Technical details:
Categories: Trojan

SillyDl.BCS indications of infection

This symptoms of SillyDl.BCS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AWC Trojan Information
Cerf Backdoor Information
BookedSpace.Remanent BHO Information
Korsmox Trojan Information
Remove WinPopup DoS

JS.MS06 Trojan

JS.MS06 virus description
Technical details:
Categories: Trojan

JS.MS06 indications of infection

This symptoms of JS.MS06 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Staog Trojan Removal instruction
Removing Pigeon.ADH Trojan
Pigeon.AVBL Trojan Cleaner
IstBar.az Downloader Symptoms
PrankMaster Trojan Information

PornDialer.PluginAccess Trojan

PornDialer.PluginAccess virus description
Technical details:
Categories: Trojan,Adware
PornDialer.PluginAccess Aliases:
[Kaspersky]Porn-Dialer.Win32.PluginAccess;
[McAfee]Dialer-Generic;
[Other]Dialer.Target,W32/Dialer.YNX,PornDialer.IN

PornDialer.PluginAccess Registry Keys:
HKEY_CLASSES_ROOT\clsid\{9e1089bc-1ae8-4685-8d77-6721e5c318a8}
HKEY_CLASSES_ROOT\clsid\{ad7fafb0-16d6-40c3-af27-585d6e6453fd}
HKEY_CLASSES_ROOT\comload.loader
HKEY_CLASSES_ROOT\comload.loader.1
HKEY_CLASSES_ROOT\comload.loader2
HKEY_CLASSES_ROOT\comload.loader2.1
HKEY_CLASSES_ROOT\dctl
HKEY_CLASSES_ROOT\interface\{19e91d82-7ad7-419f-866a-58c122db1459}
HKEY_CLASSES_ROOT\interface\{f5f779a9-24e5-4bcd-9ae5-6313d4b5ac24}
HKEY_CLASSES_ROOT\typelib\{266f948a-3dee-4270-8f55-e79accd569fa}

PornDialer.PluginAccess Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\c:/windows/downloaded program files/comload.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\hardcore
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\hardcore
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\hardcore
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]/downloaded program files/comload.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\hardcore
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\hardcore
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\hardcore


PornDialer.PluginAccess indications of infection

This symptoms of PornDialer.PluginAccess detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Securing.Low.End.Cisco.Routers DoS Symptoms
Delf.aeo Downloader Removal
Remove Pigeon.ERE Trojan
TVGuide.com Tracking Cookie Removal
PrankMaster Trojan Symptoms

AOLaZy Trojan

AOLaZy virus description
Technical details:
Categories: Trojan

AOLaZy indications of infection

This symptoms of AOLaZy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
WVIOLENCE Trojan Removal instruction
Remove Cerf Backdoor
LastDoor Backdoor Removal instruction
Remove Kiss Trojan
Remove Korsmox Trojan

Valla Trojan

Valla virus description
Technical details:
Categories: Trojan

Valla indications of infection

This symptoms of Valla detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Drunk.Mouse Trojan Symptoms
Golden.Keylogger Spyware Removal instruction
SillyDl.DAV Trojan Information
Pigeon.EHD Trojan Removal
FukMSFTP DoS Symptoms

SillyDl.CNO Trojan

SillyDl.CNO virus description
Technical details:
Categories: Trojan

SillyDl.CNO indications of infection

This symptoms of SillyDl.CNO detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Wotron.worm.kit Trojan Removal instruction
Removing SillyDl.DHO Trojan
LiveShows.Online.Timer Adware Removal instruction
Remove Reflect DoS
Dblheart Trojan Removal

Z1.Adserver.com Tracking Cookie

Z1.Adserver.com virus description
Technical details:
Categories: Tracking Cookie

Z1.Adserver.com indications of infection

This symptoms of Z1.Adserver.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.FBB Trojan Removal instruction
Small.ia Downloader Symptoms
Bancos.CYZ Trojan Information
Beauty Trojan Removal
Skiks Trojan Cleaner

Morality Trojan

Morality virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Morality Aliases:
[Kaspersky]ExeHeader.Morality.424;
[Panda]ExeHeader.Morality

Morality indications of infection

This symptoms of Morality detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Deltaclick BHO
Tiul Backdoor Cleaner
Manzon Trojan Cleaner
SillyDl.DBW Trojan Removal
W95.Ilmx Trojan Symptoms

specificclick.net Tracking Cookie

specificclick.net virus description
Technical details:
Categories: Tracking Cookie

specificclick.net indications of infection

This symptoms of specificclick.net detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Wisconsin Trojan Removal instruction
Removing Canasson Trojan
Chaploit Trojan Symptoms
Pigeon.AVKY Trojan Removal
Bancos.HWN Trojan Information

Starlogger Spyware

Starlogger virus description
Technical details:
Categories: Spyware

Starlogger Folders:
[%PROGRAMS%]\starlogger
[%WINDOWS%]\sl

Starlogger Files:
[%WINDOWS%]\winsl.ini
[%WINDOWS%]\winsl.ini

Starlogger Registry Keys:
HKEY_LOCAL_MACHINE\software\dwc\winsladmin
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\starlogger_is1

Starlogger Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Starlogger indications of infection

This symptoms of Starlogger detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Win32.KillProc Trojan
Removing Pigeon.API Trojan
Win32.DeepThroat Trojan Cleaner
Bat.tg Trojan Information
Sponce Trojan Symptoms

W102.hitbox.Tracking.Cookie Tracking Cookie

This summary is not available. Please click here to view the post.

Intruder.by.VML RAT

Intruder.by.VML virus description
Technical details:
Categories: RAT

Intruder.by.VML indications of infection

This symptoms of Intruder.by.VML detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxd.beep!Trojan Trojan Symptoms
Remove LastDoor Backdoor
PePatch.dk Spyware Removal
Bat.Guru Trojan Information
Remove Bagle Trojan

Phishbank.AWZ Trojan

Phishbank.AWZ virus description
Technical details:
Categories: Trojan

Phishbank.AWZ indications of infection

This symptoms of Phishbank.AWZ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VBS.Daydream Trojan Symptoms
DFch.1b2 Trojan Information
Win32.StartPage.jl Trojan Removal instruction
Removing Cerf Backdoor
Anti.Denial RAT Symptoms

Miracle Trojan

Miracle virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Miracle Aliases:
[Kaspersky]Virus.DOS.Companion.102;
[Panda]Dikshev.98

Miracle indications of infection

This symptoms of Miracle detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing PC Spyware
Delf.aeo Downloader Symptoms
Win32.Prosiak Trojan Information
Pigeon.AUU Trojan Information
QuakeGen3 RAT Cleaner

Statman DoS

Statman virus description
Technical details:
Categories: DoS

Statman indications of infection

This symptoms of Statman detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Door Trojan Removal instruction
PSW.Ghostar Backdoor Information
SubSeven.1C.Server Backdoor Information
Remove Phatbot Backdoor
Remove Wobox Trojan

DelIosys Trojan

DelIosys virus description
Technical details:
Categories: Trojan,Hacker Tool
DelIosys Aliases:
[Panda]Trj/DelIosys

DelIosys indications of infection

This symptoms of DelIosys detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.AHF Trojan
DFch.1b2 Trojan Removal
Warftpd DoS Cleaner
Removing SillyDl.DCV Trojan
Remove TAMAutoRun Trojan

Regger Trojan

Regger virus description
Technical details:
Categories: Trojan
Regger Aliases:
[Panda]Trj/Krepper.F;
[Computer Associates]Win32.Regger.A,Win32/Regger!Trojan

Regger Files:
[%SYSTEM%]\201369.exe
[%SYSTEM%]\explorer32.exe
[%WINDOWS%]\system\107015.exe
[%SYSTEM%]\201369.exe
[%SYSTEM%]\explorer32.exe
[%WINDOWS%]\system\107015.exe

Regger Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Regger indications of infection

This symptoms of Regger detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SysInf Trojan
Scarab Trojan Removal
TeleAxxor.Server Backdoor Removal instruction
Removing Vxidl.ADE Trojan
Backformat Trojan Symptoms

Win32.StartPage.jl Trojan

This summary is not available. Please click here to view the post.

Win32.DeepThroat Trojan

Win32.DeepThroat virus description
Technical details:
Categories: Trojan,Backdoor
Win32.DeepThroat Aliases:
[Eset]Win32/DeepThroat.3_1.C trojan

Win32.DeepThroat indications of infection

This symptoms of Win32.DeepThroat detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove XP.Antivirus Ransomware
Dowque.AFC Trojan Symptoms
Pigeon.ESM Trojan Cleaner
Wotron.worm.kit Trojan Symptoms
Bancos.HOW Trojan Removal instruction

Pakes Trojan

Pakes virus description
Technical details:
Categories: Trojan

Pakes Files:
[%WINDOWS%]\Temp\auf0.exe
[%SYSTEM%]\kaqwyy.exe
[%SYSTEM%]\lmqfg.dll
[%WINDOWS%]\temp\itimkl.txt
[%WINDOWS%]\winoldap.exe
[%WINDOWS%]\Temp\auf0.exe
[%SYSTEM%]\kaqwyy.exe
[%SYSTEM%]\lmqfg.dll
[%WINDOWS%]\temp\itimkl.txt
[%WINDOWS%]\winoldap.exe

Pakes Registry Keys:
HKEY_CURRENT_USER\software\internettime
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\setup\{b53082b8-b49c-4ba6-81ff-7c41da1cd87c}

Pakes Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Pakes indications of infection

This symptoms of Pakes detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Swizzor.Generic Trojan
statswhere.com Tracking Cookie Symptoms
Remove BAT.ZipBat Trojan
Systhread Trojan Symptoms
Remove Win32.Spy.KeyLogger Trojan

W95.Mort Trojan

W95.Mort virus description
Technical details:
Categories: Trojan
W95.Mort Aliases:
[Kaspersky]Win95.MMort.1348;
[McAfee]W95/Mort;
[Panda]W95/Mmort.1348;
[Computer Associates]Win95/2M

W95.Mort indications of infection

This symptoms of W95.Mort detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ExitFuel.com Tracking Cookie Removal
SillyDl.DBW Trojan Removal
Removing MailSpam.BotMailer Hacker Tool
Deldos Trojan Symptoms
SillyDl.CAU Trojan Symptoms

Free.Community BHO

Free.Community virus description
Technical details:
Categories: BHO
Free.Community Aliases:
[Panda]Adware/SearchAid

Free.Community Folders:
[%PROGRAM_FILES%]\submit


Free.Community indications of infection

This symptoms of Free.Community detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.PWS.Legendmir Trojan Symptoms
JFHWLSQ Trojan Cleaner
Pigeon.AVBL Trojan Removal instruction
Cuki Trojan Removal
Remote.Revise.Beta RAT Cleaner

Win32.Savant Trojan

Win32.Savant virus description
Technical details:
Categories: Trojan,Hacker Tool
Win32.Savant Aliases:
[Panda]Trojan Horse.LC

Win32.Savant indications of infection

This symptoms of Win32.Savant detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.AUT Trojan
Flobo.Server Trojan Cleaner
Remove Bancos.ZZR Trojan
SillyDl.DBY Trojan Information
Remove SCKeyLog.20!Spy!Trojan Trojan

SillyDl.BZK Trojan

SillyDl.BZK virus description
Technical details:
Categories: Trojan

SillyDl.BZK indications of infection

This symptoms of SillyDl.BZK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Small.ia Downloader Removal
Wnsock Trojan Removal instruction
Bancos.HOX Trojan Symptoms
Remove Pigeon.AVDG Trojan
Removing Win32.Piaoyes DoS

Lemir.ek Trojan

Lemir.ek virus description
Technical details:
Categories: Trojan,Hacker Tool
Lemir.ek Aliases:
[Panda]Trj/Legmir.gen,Trojan Horse;
[Computer Associates]Win32/Lemir.ek!PWS!Trojan,Win32/Lemir.Variant!PWS!Trojan

Lemir.ek indications of infection

This symptoms of Lemir.ek detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SurfAccuracy Adware Removal
Remove Adware.Virtumundo Adware
HispaVista Tracking Cookie Information
Removing Backdoor.Konik Trojan
Remove Pigeon.ECG Trojan

VBS.Mbop.D!Worm Trojan

VBS.Mbop.D!Worm virus description
Technical details:
Categories: Trojan,Worm,Hacker Tool
VBS.Mbop.D!Worm Aliases:
[Panda]W97M/Bebop.src

VBS.Mbop.D!Worm indications of infection

This symptoms of VBS.Mbop.D!Worm detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.DAK Trojan Removal
Random.Text DoS Information
Pigeon.AVNI Trojan Removal instruction
VB.aoh Trojan Information
Sendfake Hacker Tool Removal instruction

Vxidl.AMD Trojan

This summary is not available. Please click here to view the post.

SillyDl.CKW Trojan

SillyDl.CKW virus description
Technical details:
Categories: Trojan

SillyDl.CKW indications of infection

This symptoms of SillyDl.CKW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Qukart.gen Spyware Cleaner
Removing Beauty Trojan
Removing Clear.Search Hijacker
Ayam Trojan Cleaner
Ramase Trojan Removal