Frethog.AFG Trojan

Frethog.AFG virus description
Technical details:
Categories: Trojan

Frethog.AFG indications of infection

This symptoms of Frethog.AFG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Orconilo Downloader
Last Trojan Information
ProHack.KeyLogger Spyware Information
Removing Matiteman.Mail.Pass.Stealer Trojan
Removing SillyDl.CKO Trojan

Pigeon.EIM Trojan

Pigeon.EIM virus description
Technical details:
Categories: Trojan

Pigeon.EIM indications of infection

This symptoms of Pigeon.EIM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EZM Trojan Removal
Remove Hemlock Trojan
Remove SillyDl.DBY Trojan
Tiny.stupid.dloader Trojan Information
SMS.Max DoS Information

Pigeon.AOI Trojan

Pigeon.AOI virus description
Technical details:
Categories: Trojan

Pigeon.AOI indications of infection

This symptoms of Pigeon.AOI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Anti.Denial RAT
Gotcha Trojan Removal
SillyDl.CBK Trojan Removal instruction
Vxidl.AYN Trojan Symptoms
Bancos.GKP Trojan Information

AUJ Trojan

AUJ virus description
Technical details:
Categories: Trojan

AUJ indications of infection

This symptoms of AUJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Sysinst Trojan
Systhread Trojan Cleaner
Removing Staog Trojan
Remove Win32.KillProc Trojan
Remove Hotdog.Server Trojan

Bancos.HNJ Trojan

Bancos.HNJ virus description
Technical details:
Categories: Trojan

Bancos.HNJ indications of infection

This symptoms of Bancos.HNJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrafficVenue.net Tracking Cookie Cleaner
Win32.KillProc Trojan Removal
Removing Gencontrol RAT
Win32.CybWar DoS Removal
Otto Trojan Information

Frenzy.10b RAT

Frenzy.10b virus description
Technical details:
Categories: RAT

Frenzy.10b indications of infection

This symptoms of Frenzy.10b detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AAN Trojan Information
Remove Nomad Trojan
Removing Bancos.HKR Trojan
Drunk.Mouse Trojan Removal
BAT.Gremlin Trojan Symptoms

ultraroi.com Tracking Cookie

ultraroi.com virus description
Technical details:
Categories: Tracking Cookie

ultraroi.com indications of infection

This symptoms of ultraroi.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
AsbMay Backdoor Cleaner
Dowque.ABW Trojan Cleaner
Unknown.Toolbar5 BHO Symptoms
Ulysses.Server Backdoor Cleaner
Orconilo Downloader Removal

Topping DoS

Topping virus description
Technical details:
Categories: DoS
Topping Aliases:
[Kaspersky]DoS.Win32.Delf.b;
[McAfee]IRC/Flood.db;
[Other]Win32/Topping!flooder,Win32/Delf.b.DoS!Trojan,Hacktool.DoS

Topping indications of infection

This symptoms of Topping detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.APV Trojan Removal
Stealth.Keyboard.Interceptor.Auto.Sender Spyware Information
PWS.Msnfake Trojan Information
Random.Text DoS Removal instruction
SillyDl.DOQ Downloader Cleaner

Pigeon.ESR Trojan

Pigeon.ESR virus description
Technical details:
Categories: Trojan

Pigeon.ESR indications of infection

This symptoms of Pigeon.ESR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CQP Trojan Information
Pigeon.EYX Trojan Removal
Receita Downloader Information
Remove Ramerl Trojan
Veritas Downloader Information

Dalian Trojan

Dalian virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Dalian Aliases:
[Eset]Dalian.1366 virus;
[McAfee]Dalian

Dalian indications of infection

This symptoms of Dalian detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
specificclick.net Tracking Cookie Removal instruction
Trinoo Trojan Cleaner
Dead.Locked DoS Symptoms
PCS Spyware Removal
Hungarian Trojan Symptoms

Hell Trojan

Hell virus description
Technical details:
Categories: Trojan

Hell indications of infection

This symptoms of Hell detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Benuti.D!downloader Trojan
BNB Backdoor Cleaner
SillyDl.CQP Trojan Information
Qupdate Adware Cleaner
Remove Backwork Trojan

Pigeon.EJX Trojan

Pigeon.EJX virus description
Technical details:
Categories: Trojan

Pigeon.EJX indications of infection

This symptoms of Pigeon.EJX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Small.dx Trojan Symptoms
Pigeon.ACI Trojan Cleaner
Nomad Trojan Information
New.Win32 Trojan Information
Vxidl.AQX Trojan Removal

Sysinst Trojan

Sysinst virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Sysinst Aliases:
[Eset]Win32/Sysinst trojan;
[Panda]Bck/SysInst;
[Computer Associates]Backdoor/Sysinst

Sysinst indications of infection

This symptoms of Sysinst detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Securing.Low.End.Cisco.Routers DoS Information
Funcade Adware Information
Remove Vxidl.AFO Trojan
SpywareSheriff.com::SpywareSheriff Adware Symptoms
Removing PePatch.dk Spyware

Efno Trojan

Efno virus description
Technical details:
Categories: Trojan

Efno indications of infection

This symptoms of Efno detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Invictus Trojan Cleaner
Removing Tetrinet.txt DoS
Remove Schoolbus Backdoor
Remove Safety Bar Trojan
eBoom.Search.Bar BHO Cleaner

Math.Test Trojan

Math.Test virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Math.Test Aliases:
[Kaspersky]PS-MPC.Yam.1136;
[Panda]Yam.1136;
[Computer Associates]Math Test

Math.Test indications of infection

This symptoms of Math.Test detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Backformat Trojan
strefa.pl Tracking Cookie Information
Pigeon.EFY Trojan Symptoms
kSite Trojan Cleaner
Hornet Backdoor Information

Hungarian Trojan

Hungarian virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Hungarian Aliases:
[Kaspersky]Zu.473.a,Nov7.482;
[Eset]probably unknown STEALTH.TSR.COM.EXE virus;
[Panda]Reaper,Hungarian Family,Zu1;
[Computer Associates]Hungarian.1072,Kiss,Hungarian 482

Hungarian indications of infection

This symptoms of Hungarian detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Bancos.GYN Trojan
Removing WAN.Remote Trojan
MDSA.Sentinel Spyware Cleaner
TFN2K.An.Analysis DoS Symptoms
scripps.com Tracking Cookie Information

Pigeon.AVO Trojan

Pigeon.AVO virus description
Technical details:
Categories: Trojan

Pigeon.AVO indications of infection

This symptoms of Pigeon.AVO detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SubSeven.Speech Trojan
Tiny.stupid.dloader Trojan Information
Bancos.DVN Trojan Information
Remove SillyDl.DLA Downloader
TPE Trojan Removal instruction

Mayock Trojan

Mayock virus description
Technical details:
Categories: Trojan

Mayock indications of infection

This symptoms of Mayock detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bat.PWS.Myss Trojan Removal instruction
JS.Netdex Trojan Information
Downserin Downloader Information
DIInfinity Trojan Removal
Removing Win.DelSys Trojan

Win32.SdBot.bfl Backdoor

Win32.SdBot.bfl virus description
Technical details:
Categories: Backdoor

Win32.SdBot.bfl Files:
[%SYSTEM%]\svcchosst.exe
[%SYSTEM%]\svcchosst.exe

Win32.SdBot.bfl Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices


Win32.SdBot.bfl indications of infection

This symptoms of Win32.SdBot.bfl detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Backdoor.Phase Trojan Removal
Torero Trojan Information
VBS.Mbop.D!Worm Trojan Information
Removing Bancos.HRY Trojan
Small.dx Trojan Removal

SillyDl.CFM Trojan

SillyDl.CFM virus description
Technical details:
Categories: Trojan

SillyDl.CFM indications of infection

This symptoms of SillyDl.CFM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing BAT.Gremlin Trojan
Remove TCC Trojan
Remove Nfstrace Trojan
Morality Trojan Removal
Vxidl.AUK Trojan Cleaner

Spmbot Trojan

Spmbot virus description
Technical details:
Categories: Trojan

Spmbot indications of infection

This symptoms of Spmbot detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Riot.Doom Trojan
PWS.Ghost Trojan Symptoms
Web.Serve RAT Information
YouthSilence Trojan Cleaner
Removing Bancos.HCI Trojan

Shadorium RAT

Shadorium virus description
Technical details:
Categories: RAT

Shadorium indications of infection

This symptoms of Shadorium detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Algo Trojan Cleaner
Wingate.Spoofing.On.IRC DoS Removal
ICQ.Locked Trojan Cleaner
Gentee Adware Removal instruction
Removing Anomaly Trojan

Webservect Trojan

Webservect virus description
Technical details:
Categories: Trojan,Backdoor
Webservect Aliases:
[Kaspersky]Backdoor.ControlTotal,Backdoor.ControlTotal.a;
[Eset]Win32/ControlTotal trojan;
[McAfee]ControlTotal.svr;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/ControlTotal;
[Computer Associates]Backdoor/ControlTotal,Win32.ControlTotal.A

Webservect indications of infection

This symptoms of Webservect detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SillyDl.CJR Trojan
Battry Trojan Cleaner
Perfect.Keylogger.Lite Spyware Symptoms
Remove DSKlite Trojan
CDOpen Trojan Removal

QDel47 Trojan

QDel47 virus description
Technical details:
Categories: Trojan
QDel47 Aliases:
[Kaspersky]Trojan.Optimizer;
[McAfee]QDel47;
[F-Prot]destructive program;
[Panda]Trj/Optimizer;
[Computer Associates]DriveOptimize!Trojan

QDel47 indications of infection

This symptoms of QDel47 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ZKeylog Spyware Information
Backfind Trojan Removal
Removing Bancos.IJR Trojan
Remove PC.Eyes Spyware
Win32.DieWar Trojan Cleaner

spinbox.net Tracking Cookie

spinbox.net virus description
Technical details:
Categories: Tracking Cookie

spinbox.net indications of infection

This symptoms of spinbox.net detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Phishbank.AWZ Trojan Cleaner
Reportserversocket Hostile Code Cleaner
Win32.StartPage.jl Trojan Symptoms
RemoteSOB Backdoor Removal instruction
Removing JanNet Spyware

RemoteNC.beta3 Backdoor

RemoteNC.beta3 virus description
Technical details:
Categories: Backdoor

RemoteNC.beta3 indications of infection

This symptoms of RemoteNC.beta3 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MadClient RAT Removal instruction
Remove Bancos.DVN Trojan
ProRat Trojan Symptoms
New.Win32 Trojan Cleaner
ICDirect.com Tracking Cookie Information

Arodan Backdoor

Arodan virus description
Technical details:
Categories: Backdoor,Hacker Tool
Arodan Aliases:
[Computer Associates]Backdoor/Arodan

Arodan indications of infection

This symptoms of Arodan detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ozzy Trojan Removal instruction
Pigeon.AWC Trojan Removal
Remove BlackBat Trojan
Remove DelIosys Trojan
Removing Vxidl.BEN Trojan

TrafficVenue.net Tracking Cookie

TrafficVenue.net virus description
Technical details:
Categories: Tracking Cookie

TrafficVenue.net indications of infection

This symptoms of TrafficVenue.net detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Webdialer.Dialer!Trojan Adware Symptoms
Autobat Trojan Information
Bancos.GMY Trojan Symptoms
BAT.Passion Trojan Cleaner
Remove Scpact Trojan

Krudnub Downloader

Krudnub virus description
Technical details:
Categories: Downloader
Krudnub Aliases:
[Kaspersky]Trojan-Downloader.Win32.Delf.biu;
[Other]Win32/SillyDl.DBS

Krudnub Files:
[%PROFILE%]\KB_2874.tpk
[%SYSTEM%]\KBRunOnce2.tm_
[%SYSTEM%]\KBRunOnce2.t__
[%DESKTOP%]\KB_2874.tpk
[%SYSTEM%]\KB_963491.exe
[%PROFILE%]\KB_2874.tpk
[%SYSTEM%]\KBRunOnce2.tm_
[%SYSTEM%]\KBRunOnce2.t__
[%DESKTOP%]\KB_2874.tpk
[%SYSTEM%]\KB_963491.exe

Krudnub Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Krudnub indications of infection

This symptoms of Krudnub detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove ANTIMAC Trojan
Pigeon.FBB Trojan Symptoms
Removing LastDoor Backdoor
Remove Redisin!Trojan Trojan
AsbMay Backdoor Information

SillyDI.AHE Downloader

SillyDI.AHE virus description
Technical details:
Categories: Downloader
SillyDI.AHE Aliases:
[Kaspersky]Trojan-Downloader.Win32.Agent.ala;
[Other]Win32/SillDI.AHE

SillyDI.AHE indications of infection

This symptoms of SillyDI.AHE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AHB Trojan Symptoms
SillyDl.CQP Trojan Removal
PSW.Belial Trojan Information
Cabronator.Kill.beta3 Backdoor Removal instruction
Ampmess Trojan Cleaner

Pigeon.AFM Trojan

Pigeon.AFM virus description
Technical details:
Categories: Trojan

Pigeon.AFM indications of infection

This symptoms of Pigeon.AFM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CNM Trojan Removal instruction
Removing FormatAll Trojan
Phishbank.AWZ Trojan Symptoms
SillyDl.CSI Trojan Symptoms
Playboy Trojan Symptoms