PCFlu Trojan

PCFlu virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
PCFlu Aliases:
[Kaspersky]Pcflu.2112;
[Eset]Pc-Fluii.2112 virus;
[Panda]Pcflu.2112;
[Computer Associates]PCFlu.2112

PCFlu indications of infection

This symptoms of PCFlu detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.ATL Trojan Removal instruction
SillyDl.CRU Trojan Cleaner
APStrojan Trojan Removal
Crawler Hijacker Information

Tyhos Trojan

Tyhos virus description
Technical details:
Categories: Trojan

Tyhos indications of infection

This symptoms of Tyhos detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Allsum.5bk Trojan Information
Sping Backdoor Cleaner
Remove W95.Murkry Trojan
PSW.CaveSpy Trojan Symptoms
Bancos.GBP Trojan Removal

BAT.Prob Trojan

BAT.Prob virus description
Technical details:
Categories: Trojan
BAT.Prob Aliases:
[F-Prot]BAT/ProbSpam.A;
[Other]BAT/Prob.A,BAT_WITHOUT.A

BAT.Prob indications of infection

This symptoms of BAT.Prob detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
IcmpCmd Trojan Removal

KillAV.bk Trojan

KillAV.bk virus description
Technical details:
Categories: Trojan,Hacker Tool
KillAV.bk Aliases:
[Panda]Trojan Horse;
[Computer Associates]Win32/KillAV.bk!Trojan

KillAV.bk indications of infection

This symptoms of KillAV.bk detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing FakeAlert.Adobepnl Trojan
Removing Webdir.b Adware
Removing Bancos.ASA Trojan
GhostKeyLogger Spyware Symptoms
startpage.ajj Adware Symptoms

Win32.Holbot Trojan

Win32.Holbot virus description
Technical details:
Categories: Trojan
Win32.Holbot Aliases:
[Kaspersky]Backdoor.Igloo.201;
[Panda]Bck/Igloo.C;
[Computer Associates]Win32/Igloo.2020!Trojan,Win32.Igloo.2020

Win32.Holbot indications of infection

This symptoms of Win32.Holbot detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove WhenUShop Adware
Removing Right2Life Trojan
Dismember Trojan Removal

QZap143 Trojan

QZap143 virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
QZap143 Aliases:
[Kaspersky]Trojan.DDI;
[McAfee]QZap143;
[F-Prot]destructive program;
[Panda]Trj/DDI;
[Computer Associates]DDI

QZap143 indications of infection

This symptoms of QZap143 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanRunner.EES Trojan Information
Remove SubSeven.Muie Backdoor
Zlob.Fam Trojan Removal instruction

JS.VU876678 Trojan

JS.VU876678 virus description
Technical details:
Categories: Trojan

JS.VU876678 indications of infection

This symptoms of JS.VU876678 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove realbeer.com Tracking Cookie
Generic.PWS Trojan Cleaner
Win32.TrojanDownloader.Rameh Trojan Information
Removing Idyll Trojan

Pigeon.AVAT Trojan

Pigeon.AVAT virus description
Technical details:
Categories: Trojan

Pigeon.AVAT indications of infection

This symptoms of Pigeon.AVAT detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Mojo Trojan Removal instruction
Delf.hw Backdoor Information

SillyDl.CEK Trojan

SillyDl.CEK virus description
Technical details:
Categories: Trojan

SillyDl.CEK indications of infection

This symptoms of SillyDl.CEK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrustCleaner Ransomware Cleaner
Win32.Apeldorn Trojan Cleaner
TopSurfer Toolbar Removal instruction
Removing Bankor Trojan
Alien.Spy RAT Symptoms

Win32.Ciadoor Trojan

Win32.Ciadoor virus description
Technical details:
Categories: Trojan,Backdoor,Hacker Tool
Win32.Ciadoor Aliases:
[Kaspersky]Backdoor.Apdoor.f;
[Eset]Win32/Ciadoor.121 trojan,Win32/Ciadoor.122.A trojan,Win32/Ciadoor.123 trojan,Win32/Apdoor.F trojan;
[Panda]Constructor/Ciadoor.A;
[Computer Associates]Win32/CoreFlood.Trojan,Win32.CoreFlood

Win32.Ciadoor indications of infection

This symptoms of Win32.Ciadoor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove HacDef Trojan
Typer704 Trojan Information
SillyDl.DBO Trojan Cleaner

Pigeon.EPJ Trojan

Pigeon.EPJ virus description
Technical details:
Categories: Trojan

Pigeon.EPJ indications of infection

This symptoms of Pigeon.EPJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AWG Trojan Removal instruction
TrojanDownloader.Win32.Small.nu Trojan Removal
Blurax Trojan Cleaner
Removing EZCyberSearch Adware

Hetrad Trojan

Hetrad virus description
Technical details:
Categories: Trojan

Hetrad indications of infection

This symptoms of Hetrad detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
DF.Dropper Trojan Symptoms
Removing Getaret Trojan
Removing KLF Trojan

IA.Keylogger Spyware

IA.Keylogger virus description
Technical details:
Categories: Spyware,Downloader

IA.Keylogger indications of infection

This symptoms of IA.Keylogger detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MediaGateway (180Solutions Windupdates) Adware Removal
BKW Trojan Symptoms

WinGuardian Spyware

WinGuardian virus description
Technical details:
Categories: Spyware

WinGuardian Files:
[%SYSTEM%]\sys.exe
[%WINDOWS%]\regedt.exe
[%WINDOWS%]\system\keyhook.dll
[%WINDOWS%]\system\sys.exe
[%WINDOWS%]\system\sys.htm
[%WINDOWS%]\system\sysctrl.exe
[%WINDOWS%]\system\unchap.drv
[%SYSTEM%]\sys.exe
[%WINDOWS%]\regedt.exe
[%WINDOWS%]\system\keyhook.dll
[%WINDOWS%]\system\sys.exe
[%WINDOWS%]\system\sys.htm
[%WINDOWS%]\system\sysctrl.exe
[%WINDOWS%]\system\unchap.drv

WinGuardian Registry Keys:
HKEY_LOCAL_MACHINE\software\cpne

WinGuardian Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run


WinGuardian indications of infection

This symptoms of WinGuardian detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
OsirisX.KeyLogger Spyware Removal
Backdoor.Igloo.Server.family Backdoor Information
TrojanSpy.Win32.Agent Trojan Symptoms
Remove Blurax Trojan

Rhifrem Trojan

Rhifrem virus description
Technical details:
Categories: Trojan
Rhifrem Aliases:
[Kaspersky]Trojan-Spy.Win32.Delf.tl;
[Other]Win32/Rhifrem.B,Trojan Horse,TROJ_DLOADER.QAH

Rhifrem indications of infection

This symptoms of Rhifrem detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove EVision.Megapro Spyware
Fax.Free.Pisello Trojan Symptoms
Pigeon.ABT Trojan Cleaner

Lineage.AAE Trojan

Lineage.AAE virus description
Technical details:
Categories: Trojan

Lineage.AAE indications of infection

This symptoms of Lineage.AAE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
KMiNT21.Common.Components Spyware Cleaner
Removing ZillaBar Toolbar
WurldMedia.BuyersPort Spyware Removal instruction
Remove Private.Eye Spyware

CWS.MSwsc10 Hijacker

CWS.MSwsc10 virus description
Technical details:
Categories: Hijacker

CWS.MSwsc10 indications of infection

This symptoms of CWS.MSwsc10 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
NetControl.build Backdoor Removal instruction
Fruitfly Trojan Removal
NdotNet BHO Removal