Sh.Abuser Trojan

Sh.Abuser virus description
Technical details:
Categories: Trojan
Sh.Abuser Aliases:
[Kaspersky]Trojan.UNIX.Abuser;
[Panda]Unix/Trojan.Abuser;
[Computer Associates]Sh/Abuser!Trojan

Sh.Abuser indications of infection

This symptoms of Sh.Abuser detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VBS.Trist Trojan Cleaner
Removing CGI.Bin Tracking Cookie
Biling Trojan Information

did.it.com Tracking Cookie

did.it.com virus description
Technical details:
Categories: Tracking Cookie

did.it.com indications of infection

This symptoms of did.it.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Mezzia Trojan Removal instruction
Druid Trojan Removal
Nauj Adware Removal

R0xr4t Spyware

R0xr4t virus description
Technical details:
Categories: Spyware,Backdoor,RAT,Hacker Tool
R0xr4t Aliases:
[Kaspersky]Backdoor.Roxrat.10.a,Backdoor.Roxrat.11,Backdoor.Roxrat.12.a,Backdoor.Roxrat.12.b;
[McAfee]BackDoor-AIQ;
[F-Prot]security risk named W32/Roxrat.A,security risk or a "backdoor" program;
[Panda]Bck/Roxrat.10.A,Backdoor Program,Bck/Roxrat,Bck/Roxrat.12.b;
[Computer Associates]Backdoor/Roxrat.1.0.A!Server,Win32.Rox.10,Win32/Rox.10!Trojan,Backdoor/Roxrat.1_2,Backdoor/Roxrat.12.a!Server

R0xr4t indications of infection

This symptoms of R0xr4t detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HGG Trojan Symptoms
Esearchbar.dll BHO Removal
Daemon Trojan Information

Bancos.FUP Trojan

Bancos.FUP virus description
Technical details:
Categories: Trojan

Bancos.FUP indications of infection

This symptoms of Bancos.FUP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Small.ow Trojan Cleaner
Praize Toolbar Information

Mediket Downloader

Mediket virus description
Technical details:
Categories: Downloader
Mediket Aliases:
[Kaspersky]Trojan-Downloader.Win32.Mediket.bv,Trojan-Downloader.Win32.Mediket.t,Trojan-Downloader.Win32.Mediket.df;
[McAfee]Downloader-RE;
[F-Prot]W32/Downloader.AYEO;
[Other]Win32/Mediket.FL,Win32/SillyDl.GE,TrojanDownloader:Win32/Mediket.gen

Mediket Files:
[%PROFILE_TEMP%]\ICD2.tmp\eied.inf
[%WINDOWS%]\LastGood\Downloaded Program Files\start28.inf
[%PROFILE_TEMP%]\ICD2.tmp\eied.inf
[%WINDOWS%]\LastGood\Downloaded Program Files\start28.inf


Mediket indications of infection

This symptoms of Mediket detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Backdoor.Cafeini Trojan Symptoms

Dumador.df Backdoor

Dumador.df virus description
Technical details:
Categories: Backdoor

Dumador.df indications of infection

This symptoms of Dumador.df detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ramkeni Downloader Removal
Director Adware Symptoms
Removing AntiMIT Trojan
Vxidl.AGV Trojan Information
Winsdoor Trojan Removal

Pigeon.EMW Trojan

Pigeon.EMW virus description
Technical details:
Categories: Trojan

Pigeon.EMW indications of infection

This symptoms of Pigeon.EMW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Servsax Trojan Removal instruction
Guangwaigirl.52c Backdoor Cleaner
PSW.Ges Trojan Removal

lativio.com Tracking Cookie

lativio.com virus description
Technical details:
Categories: Tracking Cookie

lativio.com indications of infection

This symptoms of lativio.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Derowarb Trojan

JS.Haxdoor Trojan

JS.Haxdoor virus description
Technical details:
Categories: Trojan

JS.Haxdoor indications of infection

This symptoms of JS.Haxdoor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Be Trojan Removal
Pigeon.AVOQ Trojan Removal
Remove Agent.gp Trojan

Zlob.Fam.PowerCodec Trojan

Zlob.Fam.PowerCodec virus description
Technical details:
Categories: Trojan,Popups

Zlob.Fam.PowerCodec Folders:
[%PROGRAM_FILES%]\PowerCodec

Zlob.Fam.PowerCodec Files:
[%PROGRAM_FILES%]\PowerCodec\iesplugin.dll
[%PROGRAM_FILES%]\PowerCodec\iesuninst.exe
[%PROGRAM_FILES%]\PowerCodec\isaddon.dll
[%PROGRAM_FILES%]\PowerCodec\isamini.exe
[%PROGRAM_FILES%]\PowerCodec\isamonitor.exe
[%PROGRAM_FILES%]\PowerCodec\isauninst.exe
[%PROGRAM_FILES%]\PowerCodec\ot.ico
[%PROGRAM_FILES%]\PowerCodec\pmmon.exe
[%PROGRAM_FILES%]\PowerCodec\pmsngr.exe
[%PROGRAM_FILES%]\PowerCodec\pmuninst.exe
[%PROGRAM_FILES%]\PowerCodec\ts.ico
[%PROGRAM_FILES%]\PowerCodec\uninst.exe
[%PROGRAM_FILES%]\PowerCodec\iesplugin.dll
[%PROGRAM_FILES%]\PowerCodec\iesuninst.exe
[%PROGRAM_FILES%]\PowerCodec\isaddon.dll
[%PROGRAM_FILES%]\PowerCodec\isamini.exe
[%PROGRAM_FILES%]\PowerCodec\isamonitor.exe
[%PROGRAM_FILES%]\PowerCodec\isauninst.exe
[%PROGRAM_FILES%]\PowerCodec\ot.ico
[%PROGRAM_FILES%]\PowerCodec\pmmon.exe
[%PROGRAM_FILES%]\PowerCodec\pmsngr.exe
[%PROGRAM_FILES%]\PowerCodec\pmuninst.exe
[%PROGRAM_FILES%]\PowerCodec\ts.ico
[%PROGRAM_FILES%]\PowerCodec\uninst.exe

Zlob.Fam.PowerCodec Registry Keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PowerCodec


Zlob.Fam.PowerCodec indications of infection

This symptoms of Zlob.Fam.PowerCodec detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove BombSquad Hacker Tool
Removing DFch.1b2 Trojan
TrustyHound Spyware Symptoms

Katherdoor Trojan

Katherdoor virus description
Technical details:
Categories: Trojan,Backdoor
Katherdoor Aliases:
[Eset]Win32/Katherdoor.305.C trojan;
[Computer Associates]Backdoor/Katherdoor.400,Backdoor/Katherdoor.305.c

Katherdoor indications of infection

This symptoms of Katherdoor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Agent.ds Trojan Removal instruction
iyi.net Tracking Cookie Cleaner

QZap113 Trojan

QZap113 virus description
Technical details:
Categories: Trojan
QZap113 Aliases:
[McAfee]QZap113;
[F-Prot]destructive program;
[Panda]Trj/Hood;
[Computer Associates]Qfat13!Trojan,Qzap13

QZap113 indications of infection

This symptoms of QZap113 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.IKD Trojan Cleaner
Bancos.FVS Trojan Removal

Pigeon.AWIW Trojan

Pigeon.AWIW virus description
Technical details:
Categories: Trojan

Pigeon.AWIW indications of infection

This symptoms of Pigeon.AWIW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove OfferAgent Adware

Rsbot Trojan

Rsbot virus description
Technical details:
Categories: Trojan

Rsbot indications of infection

This symptoms of Rsbot detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing AlfaCleaner Trojan
Remote.Commander RAT Symptoms

Eudora Trojan

Eudora virus description
Technical details:
Categories: Trojan,Hacker Tool
Eudora Aliases:
[Kaspersky]Exploit.Win32.Vecnoit;
[Panda]Trojan Horse

Eudora indications of infection

This symptoms of Eudora detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Zlob.ProtectionBar Trojan Cleaner
Removing PSW.Crazer Trojan
Removing PWS.EyeOnIE Trojan

Mail.Fraud Hacker Tool

Mail.Fraud virus description
Technical details:
Categories: Hacker Tool,DoS

Mail.Fraud indications of infection

This symptoms of Mail.Fraud detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
bastaya.exe Malware Removal
Win.AOL.Cindi Trojan Removal instruction
Targa12 DoS Information
Removing Bancos.GHG Trojan
Bbmao Toolbar Symptoms

Toxic.Fireball RAT

Toxic.Fireball virus description
Technical details:
Categories: RAT

Toxic.Fireball indications of infection

This symptoms of Toxic.Fireball detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Msvbvm.dll BHO
Remove Delf.eg Trojan
Win32.SMS.Bomber.Troja DoS Removal instruction
TrustedAntivirus Ransomware Information
Removing IBar.cn Toolbar

Lineage.AAM Trojan

Lineage.AAM virus description
Technical details:
Categories: Trojan

Lineage.AAM indications of infection

This symptoms of Lineage.AAM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ScreenNameHackerV1 Trojan Cleaner
Klone Backdoor Information
NetworkEssentials.MediaLoads.Enhanced BHO Cleaner

VirAutoexec Trojan

VirAutoexec virus description
Technical details:
Categories: Trojan
VirAutoexec Aliases:
[Eset]BAT/282 virus;
[Panda]BAT/282;
[Computer Associates]VirAutoexec

VirAutoexec indications of infection

This symptoms of VirAutoexec detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanSpy.Win32.NetCaptor Trojan Cleaner
Small.gr Downloader Cleaner
Nutbus Trojan Cleaner
Remove BackDoor.BAC.gen Backdoor
Becower Trojan Information

Silent.Butterfly DoS

Silent.Butterfly virus description
Technical details:
Categories: DoS

Silent.Butterfly indications of infection

This symptoms of Silent.Butterfly detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
LookThru.Cool.Search.Bar BHO Cleaner
BadBoh BHO Removal instruction
Degist Trojan Removal instruction

Sadam Trojan

Sadam virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,Hacker Tool,DoS
Sadam Aliases:
[Panda]Trj/PSW.Sadam,Saddam Hussein;
[Computer Associates]Win32/Sadam,Sadam

Sadam indications of infection

This symptoms of Sadam detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Contextual Adware Cleaner
Sin Trojan Removal
Sced Trojan Cleaner

an Adware

an virus description
Technical details:
Categories: Adware
an Aliases:
[Kaspersky]Dialer.Win32.Agent.b;
[Other]Win32/Dialer.AN,Dialer.TrafficJam

an indications of infection

This symptoms of an detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pointex Backdoor
Mezzia Trojan Removal instruction
Malmsey.Beta Trojan Symptoms
Remove Pigeon.EGO Trojan