Yam Trojan

Yam virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Yam Aliases:
[Kaspersky]YAM.3596.a,YAM.3599.a;
[Panda]Yam.3596

Yam indications of infection

This symptoms of Yam detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
JS.Relink Trojan Information
Removing Advapio32.DLL BHO
PWS.Trial Trojan Removal instruction
MoSucker.ErEbuS RAT Cleaner

Pigeon.AVAF Trojan

Pigeon.AVAF virus description
Technical details:
Categories: Trojan

Pigeon.AVAF indications of infection

This symptoms of Pigeon.AVAF detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
BonziBuddy Adware Removal
Hadoop Trojan Information
SillyDl.CBV Trojan Information
Superlogy Adware Removal
Zlob.Fam.Online Image Add-on Trojan Symptoms

FTP.Generator Trojan

FTP.Generator virus description
Technical details:
Categories: Trojan,Hacker Tool
FTP.Generator Aliases:
[Kaspersky]Exploit.FTP.Digund;
[Panda]Trojan Horse.LC

FTP.Generator indications of infection

This symptoms of FTP.Generator detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Blurp Trojan

SillyDl.CXP Trojan

SillyDl.CXP virus description
Technical details:
Categories: Trojan

SillyDl.CXP indications of infection

This symptoms of SillyDl.CXP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Basic Trojan
Gaxaph Adware Cleaner
Remove AutoStartup Spyware
Removing SillyDl.AOE Downloader
Fate Adware Information

MIRC.Orifice Worm

MIRC.Orifice virus description
Technical details:
Categories: Worm,Backdoor,RAT,DoS
MIRC.Orifice Aliases:
[Kaspersky]Backdoor.IRC.Orifice;
[McAfee]mIRC/Orifice;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program,Worm Generic.LC;
[Computer Associates]Backdoor/Irc.Orifice!Server

MIRC.Orifice indications of infection

This symptoms of MIRC.Orifice detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Vxidl.BCZ Trojan
Spliff RAT Information
YBomber DoS Cleaner
Removing Fixer.AntiSpy Trojan
SUA.A Trojan Cleaner

Bancos.HGD Trojan

Bancos.HGD virus description
Technical details:
Categories: Trojan

Bancos.HGD indications of infection

This symptoms of Bancos.HGD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
WebInstall Adware Information
Removing Ishowbao BHO

Bancos.COD Trojan

Bancos.COD virus description
Technical details:
Categories: Trojan

Bancos.COD indications of infection

This symptoms of Bancos.COD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Sponce Trojan
Remove zedo.com Tracking Cookie

PWSteel Trojan

PWSteel virus description
Technical details:
Categories: Trojan,Hacker Tool
PWSteel Aliases:
[Panda]Trojan Horse;
[Computer Associates]PWSteel,PWSteel.40717!Trojan

PWSteel indications of infection

This symptoms of PWSteel detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Sysinst Trojan Removal instruction
Back.Construction Trojan Removal
Zlob.NS-X Trojan Symptoms
Degist Trojan Information
Pigeon.AVDK Trojan Removal

Pod DoS

Pod virus description
Technical details:
Categories: DoS

Pod indications of infection

This symptoms of Pod detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Mate.Watcher Spyware Removal instruction
Remove SpySender.server RAT
Remove Hanlo Trojan

Hupion Trojan

Hupion virus description
Technical details:
Categories: Trojan
Hupion Aliases:
[Kaspersky]Backdoor.Win32.Hupion.bho;
[Other]W32/Hupion.CO,BKDR_HUPIGON.AQZ

Hupion Files:
[%SYSTEM%]\PluginENLOG.DLL
[%WINDOWS%]\G_Server2.0.exe
[%WINDOWS%]\HRFKGI.DAT
[%SYSTEM%]\PluginENLOG.DLL
[%WINDOWS%]\G_Server2.0.exe
[%WINDOWS%]\HRFKGI.DAT


Hupion indications of infection

This symptoms of Hupion detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Prado Trojan Removal
Fearless.KeySpy Trojan Cleaner
TrojanDownloader.JS.gen Trojan Removal
SillyDl.CBP Trojan Removal instruction
Mr.AntiSpy Adware Cleaner

HundredPC Trojan

HundredPC virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
HundredPC Aliases:
[Kaspersky]Mnemonix.100%.681,Mnemonix.100%.684;
[Panda]Mnemon.100.Drp,Mnemonix.100%.684;
[Computer Associates]HundredPC.684

HundredPC indications of infection

This symptoms of HundredPC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Stoolbar BHO Symptoms
Ticoft Trojan Symptoms
Bancos.GQU Trojan Cleaner

Win32.Leasis.B!Trojan Trojan

Win32.Leasis.B!Trojan virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Win32.Leasis.B!Trojan Aliases:
[Kaspersky]TrojanSpy.Win32.Tofger.f;
[Panda]Trj/Small.H;
[Computer Associates]Win32.Leasis.B

Win32.Leasis.B!Trojan indications of infection

This symptoms of Win32.Leasis.B!Trojan detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.IJE Trojan Cleaner
Win32.WebDav Trojan Symptoms

Sylvia.Hong.Kong Trojan

Sylvia.Hong.Kong virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Sylvia.Hong.Kong Aliases:
[Kaspersky]Sylvia.Hong;
[Panda]Sylvia.Hong Kong;
[Computer Associates]Sylvia Hong Kong

Sylvia.Hong.Kong indications of infection

This symptoms of Sylvia.Hong.Kong detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TopBrowsing Adware Removal
Poltergeist.A!Backdoor Trojan Removal instruction
BookmarkExpress Adware Symptoms

RealMedia.com Tracking Cookie

RealMedia.com virus description
Technical details:
Categories: Tracking Cookie

RealMedia.com indications of infection

This symptoms of RealMedia.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VeryCD Toolbar Symptoms
Bancos.GOH Trojan Information
AxNTFileSecurity Hostile Code Removal
Unknown.Toolbar4 BHO Information
Claria.WebSecureAlert Adware Removal

Trash Trojan

Trash virus description
Technical details:
Categories: Trojan,DoS
Trash Aliases:
[Kaspersky]Trojan.Trash;
[Panda]Trj/Trash;
[Computer Associates]Trash

Trash indications of infection

This symptoms of Trash detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Adult.Material Adware
Remove All.in.One.Keylogger Spyware
VB.mx Trojan Cleaner

Bancos.HRG Trojan

Bancos.HRG virus description
Technical details:
Categories: Trojan

Bancos.HRG indications of infection

This symptoms of Bancos.HRG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bifrost Trojan Removal instruction
Tomato.beta Trojan Removal
Remove Vxidl.BDS Trojan

Jabberwocky Trojan

Jabberwocky virus description
Technical details:
Categories: Trojan
Jabberwocky Aliases:
[Kaspersky]Jabb.812;
[Eset]Jabberwc.812 virus;
[McAfee]Jabber;
[Panda]JW2.812;
[Computer Associates]Jabberwocky

Jabberwocky indications of infection

This symptoms of Jabberwocky detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.TrojanDownloader.Small.NAX Trojan Removal instruction
Remove Lorer Trojan
Remove BackDoor.ARD Trojan
SillyDl.CRX Trojan Symptoms
EasyWWW Trojan Removal

Forkey Trojan

Forkey virus description
Technical details:
Categories: Trojan,Spyware
Forkey Aliases:
[Panda]Trj/Keylog.M;
[Computer Associates]Win32.Forkey,Win32/KeyLogger.80384!DLL!Trojan

Forkey indications of infection

This symptoms of Forkey detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
DlWhomp Trojan Removal instruction
Afcore.as Backdoor Removal

Vxidl.BCS Trojan

Vxidl.BCS virus description
Technical details:
Categories: Trojan

Vxidl.BCS indications of infection

This symptoms of Vxidl.BCS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.AXO Trojan
Remove SillyDl.DFS Trojan
Remove RtKit Trojan
Remove Oxon Backdoor
HSFlop Trojan Symptoms

Istbar.dr Downloader

Istbar.dr virus description
Technical details:
Categories: Downloader

Istbar.dr Files:
[%PROFILE_TEMP%]\BundleInstall.exe
[%PROFILE_TEMP%]\BundleInstaller.exe
[%PROFILE_TEMP%]\BundleInstall.exe
[%PROFILE_TEMP%]\BundleInstaller.exe


Istbar.dr indications of infection

This symptoms of Istbar.dr detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Thorin Trojan Information
Exploit.IIS.WebDir Worm Removal
Sadhound Trojan Removal instruction
Pigeon.AHE Trojan Cleaner
Winhwak Trojan Removal

NewDial Adware

NewDial virus description
Technical details:
Categories: Adware

NewDial indications of infection

This symptoms of NewDial detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Flood Trojan Information

AirBot Trojan

AirBot virus description
Technical details:
Categories: Trojan,Backdoor
AirBot Aliases:
[Kaspersky]Backdoor.Small.d;
[Panda]Backdoor Program;
[Computer Associates]Backdoor/Small.d

AirBot indications of infection

This symptoms of AirBot detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AGX Trojan Information

OfferOptimizer Tracking Cookie

OfferOptimizer virus description
Technical details:
Categories: Tracking Cookie

OfferOptimizer indications of infection

This symptoms of OfferOptimizer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Briss Spyware Removal instruction
Cutie Trojan Information

Pigeon.AJC Trojan

Pigeon.AJC virus description
Technical details:
Categories: Trojan

Pigeon.AJC indications of infection

This symptoms of Pigeon.AJC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Rbot.EXI Trojan Cleaner

Connect4 Backdoor

Connect4 virus description
Technical details:
Categories: Backdoor,RAT
Connect4 Aliases:
[Kaspersky]Backdoor.Connect4.10;
[McAfee]BackDoor-ZP;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program;
[Computer Associates]Backdoor/Connect4.10

Connect4 indications of infection

This symptoms of Connect4 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.APQ Trojan
Alicia Trojan Removal instruction
Qoologic.at Downloader Removal instruction

ShadowNet.Remote.Spy RAT

ShadowNet.Remote.Spy virus description
Technical details:
Categories: RAT

ShadowNet.Remote.Spy indications of infection

This symptoms of ShadowNet.Remote.Spy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Wasteful DoS Information
Dengdoor Trojan Symptoms

HackerSpider Adware

HackerSpider virus description
Technical details:
Categories: Adware

HackerSpider indications of infection

This symptoms of HackerSpider detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
IRC.Mskey Trojan Symptoms
Win32.Cres Adware Information
Pigeon.EBY Trojan Information

Sexy.Hot Dialer

Sexy.Hot virus description
Technical details:
Categories: Dialer

Sexy.Hot Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run


Sexy.Hot indications of infection

This symptoms of Sexy.Hot detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
M2 Trojan Removal instruction

HappyToFind Adware

HappyToFind virus description
Technical details:
Categories: Adware

HappyToFind indications of infection

This symptoms of HappyToFind detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Generic.PWS Trojan Information
Removing Win32.Indel DoS
Shado RAT Cleaner
Allsum.5bk Trojan Information

Small.ge Trojan

Small.ge virus description
Technical details:
Categories: Trojan

Small.ge indications of infection

This symptoms of Small.ge detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
The.ICQ.Protocol Trojan Removal instruction
Xrenoder Adware Symptoms
iwAnywhere Backdoor Removal
Ditul Trojan Removal

IDonate BHO

IDonate virus description
Technical details:
Categories: BHO

IDonate Files:
[%WINDOWS%]\iDonate.dll
[%WINDOWS%]\iDonate.dll


IDonate indications of infection

This symptoms of IDonate detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove MEPacketFoundry DoS

Skubur Backdoor

Skubur virus description
Technical details:
Categories: Backdoor

Skubur indications of infection

This symptoms of Skubur detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Briss Spyware Removal
Pigeon.EPY Trojan Cleaner
Evilbot Backdoor Removal instruction
Removing Corkscrew RAT

TecWin Trojan

TecWin virus description
Technical details:
Categories: Trojan,Spyware
TecWin Aliases:
[Kaspersky]Trojan.Win32.Wintec;
[McAfee]TecWin;
[F-Prot]destructive program;
[Panda]Trj/Teclass;
[Computer Associates]Win32/WinTec!Trojan

TecWin indications of infection

This symptoms of TecWin detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PSW.VB.ad Trojan Cleaner
Removing CookieMonster Trojan
OptixPro Trojan Information
Expir Backdoor Cleaner
securityinfohere.com Hijacker Removal instruction

Kongrid Trojan

Kongrid virus description
Technical details:
Categories: Trojan
Kongrid Aliases:
[Kaspersky]Trojan.Win32.Agent.ado,Virus.Win32.Agent.l;
[McAfee]BackDoor-DIQ,W32/Generic.y;
[Other]Win32/Kongrid.A,Backdoor:Win32/Difeqs.gen,W32/Agent.AWLA,W32.SillyFDC,Worm:Win32/SillyFDC,WORM_SILLYFDC.BN

Kongrid Files:
[%SYSTEM%]\cologsver.exe
[%SYSTEM%]\cscripts.exe
[%SYSTEM%]\xbox.dll
[%SYSTEM%]\cologsver.exe
[%SYSTEM%]\cscripts.exe
[%SYSTEM%]\xbox.dll

Kongrid Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{72637363-7069-7374-652e-336d65747300}


Kongrid indications of infection

This symptoms of Kongrid detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.AQS Trojan
Bitch.Controller Trojan Cleaner
ZeroPopup Hijacker Removal instruction
TopSearch BHO Removal instruction