Slugspins Downloader

Slugspins virus description
Technical details:
Categories: Downloader
Slugspins Aliases:
[Kaspersky]Trojan-Downlaoder.Win32.Agent.bac

Slugspins Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{871A54C1-1EB3-48bd-A879-5DBA4EF16BE6}
HKEY_CLASSES_ROOT\clsid\{871a54c1-1eb3-48bd-a879-5dba4ef16be6}


Slugspins indications of infection

This symptoms of Slugspins detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Jinmoze Trojan Information
Palored Downloader Removal instruction
QZap119 Trojan Symptoms
Remove Gumbsumb Trojan
Small.gv Trojan Information

Small.al Downloader

Small.al virus description
Technical details:
Categories: Downloader

Small.al indications of infection

This symptoms of Small.al detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Fake.MSN Trojan
Pigeon.AWHZ Trojan Removal
Fujacks Trojan Symptoms

Centim Trojan

Centim virus description
Technical details:
Categories: Trojan

Centim Files:
[%SYSTEM%]\gnucdna.dll
[%SYSTEM%]\gnucdna.dll


Centim indications of infection

This symptoms of Centim detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Peeper Trojan Information
Adware.TVelocity Adware Symptoms
XferPro32 Downloader Removal instruction

Barrio Trojan

Barrio virus description
Technical details:
Categories: Trojan,Spyware,Hacker Tool
Barrio Aliases:
[Panda]Trojan Horse,Trojan Horse.LC;
[Computer Associates]Win32/Barrio.5_0!PWS!Trojan

Barrio Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Barrio indications of infection

This symptoms of Barrio detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
NeededWare Adware Cleaner
Giana.com Tracking Cookie Information
TrafficJam Adware Removal instruction
EgyRank Toolbar Removal

BDDT Trojan

BDDT virus description
Technical details:
Categories: Trojan,Backdoor,RAT,DoS
BDDT Aliases:
[Kaspersky]Backdoor.BDDT;
[Eset]Win32/BDDT.A trojan

BDDT Files:
[%WINDOWS%]\system\jojo.exe
[%WINDOWS%]\system\msrun.exe
[%WINDOWS%]\system\jojo.exe
[%WINDOWS%]\system\msrun.exe


BDDT indications of infection

This symptoms of BDDT detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
popular.ru Tracking Cookie Cleaner
WhenU.Search Toolbar Cleaner
SillyDl.BCX Trojan Symptoms

Agent.chq Trojan

Agent.chq virus description
Technical details:
Categories: Trojan

Agent.chq indications of infection

This symptoms of Agent.chq detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bancos.GMT Trojan

Bancos.FZA Trojan

Bancos.FZA virus description
Technical details:
Categories: Trojan

Bancos.FZA indications of infection

This symptoms of Bancos.FZA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Zero.Bug Trojan Removal instruction
Removing Apropo Downloader
GotoBar Hijacker Cleaner
StObj32 Trojan Information

Bancos.HXI Trojan

Bancos.HXI virus description
Technical details:
Categories: Trojan

Bancos.HXI indications of infection

This symptoms of Bancos.HXI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EFF Trojan Cleaner
Removing Blabag Trojan
Removing Pigeon.AVCE Trojan
Massaker Backdoor Removal instruction
Popohrand Adware Cleaner

Zlob.Fam.KeyToPorn Trojan

Zlob.Fam.KeyToPorn virus description
Technical details:
Categories: Trojan,Popups

Zlob.Fam.KeyToPorn indications of infection

This symptoms of Zlob.Fam.KeyToPorn detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.AVES Trojan
MSN.Corruption Backdoor Information
Agent.IWD Trojan Removal

Sunset Trojan

Sunset virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Sunset Aliases:
[Kaspersky]Trojan.Sunset;
[F-Prot]destructive program;
[Panda]Trj/Sunset

Sunset indications of infection

This symptoms of Sunset detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Vxidl.BCA Trojan
Gpcode Trojan Cleaner
Elik Trojan Cleaner

Sub7Config Backdoor

Sub7Config virus description
Technical details:
Categories: Backdoor,Hacker Tool
Sub7Config Aliases:
[Computer Associates]Backdoor/Sub7Config.2_1

Sub7Config indications of infection

This symptoms of Sub7Config detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Specrem Trojan Removal
Removing Volkoser Trojan
ePlugin Adware Removal
AutoSearch BHO Information

FDoS.Joker DoS

FDoS.Joker virus description
Technical details:
Categories: DoS
FDoS.Joker Aliases:
[Kaspersky]Flooder.LameJoker;
[McAfee]FDoS-Joker;
[F-Prot]security risk or a "backdoor" program;
[Panda]Flooder Program

FDoS.Joker indications of infection

This symptoms of FDoS.Joker detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanDownloader.Win32.Agent.anr Trojan Information

Bancos.HQN Trojan

Bancos.HQN virus description
Technical details:
Categories: Trojan

Bancos.HQN indications of infection

This symptoms of Bancos.HQN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SexoBFAX Adware Cleaner
Kronical.Fire RAT Removal
Removing Clisser Downloader

Zinpax Trojan

Zinpax virus description
Technical details:
Categories: Trojan

Zinpax indications of infection

This symptoms of Zinpax detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Anti.Leech.Plugin Adware Cleaner
Removing QQCell Trojan

Yez Trojan

Yez virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Yez Aliases:
[Kaspersky]PhVx.1155;
[Panda]YeZ.1155;
[Computer Associates]PS-MPC

Yez indications of infection

This symptoms of Yez detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Cerfobs Trojan Symptoms
QHost1 Trojan Symptoms
Pigeon.ADY Trojan Cleaner
Matefender Trojan Symptoms
Vxidl.ATZ Trojan Symptoms

RazeSpyware Trojan

RazeSpyware virus description
Technical details:
Categories: Trojan,Adware,Downloader,Ransomware

RazeSpyware Folders:
[%PROGRAM_FILES%]\RazeSpyware
[%PROGRAM_FILES%]\xsremover.com
[%PROGRAMS%]\razespyware
[%PROGRAM_FILES%]\razespyware

RazeSpyware Files:
[%SYSTEM%]\mswinb32.dll
[%SYSTEM%]\mswinb32.exe
[%SYSTEM%]\mswinup32.dll
[%SYSTEM%]\mswinxml.dll
[%SYSTEM%]\shell386.exe
[%SYSTEM%]\winapi32.dll
[%SYSTEM%]\winlfl32.dll
[%SYSTEM%]\{052D02B8-3386-4C0A-ACEA-59902248CC52}.exe
[%COMMON_APPDATA%]\Microsoft\Internet Explorer\Quick Launch\cmd.exe
[%DESKTOP%]\m00.exe
[%DESKTOP%]\razespyware.lnk
[%DESKTOP%]\razespywareinstaller.exe
[%SYSTEM%]\intxt.exe
[%WINDOWS%]\adw.htm
[%WINDOWS%]\silent.exe
[%SYSTEM%]\mswinb32.dll
[%SYSTEM%]\mswinb32.exe
[%SYSTEM%]\mswinup32.dll
[%SYSTEM%]\mswinxml.dll
[%SYSTEM%]\shell386.exe
[%SYSTEM%]\winapi32.dll
[%SYSTEM%]\winlfl32.dll
[%SYSTEM%]\{052D02B8-3386-4C0A-ACEA-59902248CC52}.exe
[%COMMON_APPDATA%]\Microsoft\Internet Explorer\Quick Launch\cmd.exe
[%DESKTOP%]\m00.exe
[%DESKTOP%]\razespyware.lnk
[%DESKTOP%]\razespywareinstaller.exe
[%SYSTEM%]\intxt.exe
[%WINDOWS%]\adw.htm
[%WINDOWS%]\silent.exe

RazeSpyware Registry Keys:
HKEY_CLASSES_ROOT\winapi32.mybho
HKEY_CURRENT_USER\Software\XXI
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_SECUREDISK
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\securedisk
HKEY_CLASSES_ROOT\clsid\{7a533235-a128-434b-9f8a-9300a544d191}
HKEY_CLASSES_ROOT\clsid\{a94fd42a-e405-4cd9-9486-3a341310ee2f}
HKEY_CLASSES_ROOT\clsid\{ff71228a-0d58-4e50-b592-36551f1acc01}
HKEY_CLASSES_ROOT\interface\{018080b0-d90d-46f8-86d1-4cf8ce6e8686}
HKEY_CLASSES_ROOT\interface\{9bd2b2bc-d289-4fce-b734-e4d6acbbab7d}
HKEY_CLASSES_ROOT\interface\{ade60563-5ad0-4832-a1e7-0e3a428c43c4}
HKEY_CLASSES_ROOT\typelib\{b7dfabbf-f985-4a67-8d72-ea0d9fc7c429}
HKEY_CLASSES_ROOT\winapi32.intelinks
HKEY_CLASSES_ROOT\winapi32.mybaner
HKEY_CURRENT_USER\software\razespyware
HKEY_CURRENT_USER\software\xxi\razespyware\updates
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{7a533235-a128-434b-9f8a-9300a544d191}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\razespyware

RazeSpyware Registry Values:
HKEY_CURRENT_USER\software\borland\locales
HKEY_CURRENT_USER\software\borland\locales
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\microsoft\windows\shellnoroam\muicache
HKEY_CURRENT_USER\software\microsoft\windows\shellnoroam\muicache
HKEY_CURRENT_USER\software\xxi\razespyware
HKEY_CURRENT_USER\software\xxi\razespyware\scripts\variables
HKEY_CURRENT_USER\software\xxi\razespyware\scripts\variables
HKEY_CURRENT_USER\software\xxi\razespyware\scripts\variables
HKEY_CURRENT_USER\software\xxi\razespyware\scripts\variables
HKEY_CURRENT_USER\software\xxi\razespyware\scripts\variables
HKEY_CURRENT_USER\software\xxi\razespyware\scripts\variables


RazeSpyware indications of infection

This symptoms of RazeSpyware detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove FakeMail Hacker Tool
MIRC.Slap DoS Removal instruction
Obfuscated Downloader Removal instruction

Virdem Trojan

Virdem virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Virdem Aliases:
[Kaspersky]VirDem.1336.a,VirDem.1336.c,VirDem.1336.e,VirDem.1542,VirDem.1336.f,VirDem.792;
[Eset]Burger.382.C virus,Burger.560.AL virus;
[Panda]Burger.560,Virdem.1366,Virdem.1542,VirDem.1616,Virdem 2,Virdem.792;
[Computer Associates]Virdem 824,Virdem,Virdem 1,Virdem 2

Virdem indications of infection

This symptoms of Virdem detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
DlAtaka Backdoor Removal
Remove Backformat Trojan
Remove Win32.Ketch Trojan

SillyDl.CCI Trojan

SillyDl.CCI virus description
Technical details:
Categories: Trojan

SillyDl.CCI indications of infection

This symptoms of SillyDl.CCI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove PSW.Lmir.fe Trojan
Remove RightFinder Hijacker

Y3K.Remote.Administration.Tool.deutsch Backdoor

Y3K.Remote.Administration.Tool.deutsch virus description
Technical details:
Categories: Backdoor,RAT
Y3K.Remote.Administration.Tool.deutsch Aliases:
[Kaspersky]Backdoor.Y3KRat.12;
[McAfee]BackDoor-GQ;
[Panda]Backdoor Program

Y3K.Remote.Administration.Tool.deutsch indications of infection

This symptoms of Y3K.Remote.Administration.Tool.deutsch detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Qoologic.ac Downloader Symptoms
KeyLog.JanNet Trojan Removal

SillyDL.4PW Trojan

SillyDL.4PW virus description
Technical details:
Categories: Trojan

SillyDL.4PW Files:
[%SYSTEM%]\start32.exe
[%WINDOWS%]\p2hhr.bat
[%WINDOWS%]\soso3.exe
[%SYSTEM%]\start32.exe
[%WINDOWS%]\p2hhr.bat
[%WINDOWS%]\soso3.exe


SillyDL.4PW indications of infection

This symptoms of SillyDL.4PW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Elotus Trojan

Pigeon.EFV Trojan

Pigeon.EFV virus description
Technical details:
Categories: Trojan

Pigeon.EFV indications of infection

This symptoms of Pigeon.EFV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanDownloader.Win32.VB.aa Trojan Symptoms

TrojanSpy.Win32.VB.bd Trojan

TrojanSpy.Win32.VB.bd virus description
Technical details:
Categories: Trojan,Spyware
TrojanSpy.Win32.VB.bd Aliases:
[Kaspersky]TrojanSpy.Win32.VB.bm;
[Panda]Trojan Horse

TrojanSpy.Win32.VB.bd indications of infection

This symptoms of TrojanSpy.Win32.VB.bd detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Demiz.Server Trojan Removal
Removing Stdecodw Trojan
AutoSearch BHO Removal
Enimen Trojan Removal
Remove Ness DoS

Small.Muldrop Adware

Small.Muldrop virus description
Technical details:
Categories: Adware
Small.Muldrop Aliases:
[Kaspersky]Trojan-Downloader.Win32.Small.dts;
[Other]Trojan.Downloader.Small.CT,Trojan-Downloader.Win32.Small.dts

Small.Muldrop indications of infection

This symptoms of Small.Muldrop detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Intended.Varicella Trojan

Pigeon.ABP Trojan

Pigeon.ABP virus description
Technical details:
Categories: Trojan

Pigeon.ABP indications of infection

This symptoms of Pigeon.ABP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Caiijing Trojan Removal instruction
Removing Bancos.IAT Trojan

Pigeon.AVVH Trojan

Pigeon.AVVH virus description
Technical details:
Categories: Trojan

Pigeon.AVVH indications of infection

This symptoms of Pigeon.AVVH detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVQV Trojan Cleaner
Dluca.gen Downloader Removal

Poppy Trojan

Poppy virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Poppy Aliases:
[Kaspersky]Poppy.513,Poppy.535;
[Panda]Poppy.513,Type_comtsr.532;
[Computer Associates]StrongPoppy.513,Target.535

Poppy indications of infection

This symptoms of Poppy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Panic Trojan Removal instruction
MasterDialer Adware Removal
Removing Adware.Downloader Adware
Becower Trojan Removal