Pigeon.AVAD Trojan

Pigeon.AVAD virus description
Technical details:
Categories: Trojan

Pigeon.AVAD indications of infection

This symptoms of Pigeon.AVAD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Backdoor.SubZero!Server Backdoor Information
AdvertBar Adware Removal

Tripleframe Hostile Code

Tripleframe virus description
Technical details:
Categories: Hostile Code

Tripleframe indications of infection

This symptoms of Tripleframe detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Wasteful DoS Symptoms
Backdoor.Voodoo Trojan Removal
Remove Bancos.GCT Trojan
Remove XLink.Looker Trojan

SillyDl.DHM Trojan

SillyDl.DHM virus description
Technical details:
Categories: Trojan

SillyDl.DHM indications of infection

This symptoms of SillyDl.DHM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GMW Trojan Symptoms
Klepto Backdoor Cleaner
Remove Benuti.A!downloader Trojan

Win32.VB.eb Trojan

Win32.VB.eb virus description
Technical details:
Categories: Trojan
Win32.VB.eb Aliases:
[Panda]Trojan Horse.LC

Win32.VB.eb indications of infection

This symptoms of Win32.VB.eb detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
DansGuardian.Modified Hijacker Removal instruction

Data RAT

Data virus description
Technical details:
Categories: RAT

Data indications of infection

This symptoms of Data detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vissmod Trojan Information
Remove SpecialOffers Adware
Bancos.INW Trojan Removal

The.Communicator Toolbar

The.Communicator virus description
Technical details:
Categories: Toolbar

The.Communicator Folders:
[%PROGRAM_FILES%]\communicator toolbar

The.Communicator Files:
[%PROFILE_TEMP%]\temp.fr????
[%SYSTEM%]\lmdv.bin
[%PROFILE_TEMP%]\temp.fr????
[%SYSTEM%]\lmdv.bin

The.Communicator Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{6A6E50DC-BFA8-4B40-AB1B-159E03E829FD}
HKEY_CLASSES_ROOT\CLSID\{DFAA31C8-A356-4313-9D95-5EDAB46C5070}
HKEY_CLASSES_ROOT\interface\{43b32a8d-3c3d-4969-b44e-cdcf0d233881}
HKEY_CLASSES_ROOT\linkmaker.linkmakerfilter
HKEY_CLASSES_ROOT\linkmaker.linkmakerfilter.1
HKEY_CLASSES_ROOT\linkmaker.linktracker
HKEY_CLASSES_ROOT\linkmaker.linktracker.1
HKEY_CURRENT_USER\software\communicator toolbar
HKEY_LOCAL_MACHINE\software\lm
HKEY_CLASSES_ROOT\clsid\{4e7bd74f-2b8d-469e-8dbc-a42eb79cb428}
HKEY_CLASSES_ROOT\clsid\{4e7bd74f-2b8d-469e-8dbc-a42eb79cb429}
HKEY_CLASSES_ROOT\clsid\{4e7bd74f-2b8d-469e-8dbc-a42eb79cb42a}
HKEY_CLASSES_ROOT\clsid\{6a6e50dc-bfa8-4b40-ab1b-159e03e829fd}
HKEY_CLASSES_ROOT\clsid\{dfaa31c8-a356-4313-9d95-5edab46c5070}
HKEY_CLASSES_ROOT\communicator.communicator
HKEY_CLASSES_ROOT\communicator.communicatormenu button
HKEY_CLASSES_ROOT\communicator.communicatortoggle button
HKEY_LOCAL_MACHINE\software\tbc

The.Communicator Registry Values:
HKEY_CLASSES_ROOT\protocols\filter\text/html
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\the communicator
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\the communicator


The.Communicator indications of infection

This symptoms of The.Communicator detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
WinAntiSpywareDown Downloader Removal
Alcobot Backdoor Cleaner
SillyDl.CHD Trojan Removal
Ttad.exe Trojan Removal instruction
CJBKGLVNDropper Trojan Removal

SillyDl.BYD Trojan

SillyDl.BYD virus description
Technical details:
Categories: Trojan

SillyDl.BYD indications of infection

This symptoms of SillyDl.BYD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
WebHlpr Adware Symptoms
Removing Little.Pink.Prank Trojan

SillyDl.DJK Trojan

SillyDl.DJK virus description
Technical details:
Categories: Trojan

SillyDl.DJK indications of infection

This symptoms of SillyDl.DJK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanDropper.JS.Mimail Trojan Removal
Remove Pigeon.AVFU Trojan
Scratch.and.Win Adware Removal instruction
Wushopen Trojan Cleaner

Asterix Trojan

Asterix virus description
Technical details:
Categories: Trojan

Asterix indications of infection

This symptoms of Asterix detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Giana.com Tracking Cookie Cleaner

The.Bug RAT

The.Bug virus description
Technical details:
Categories: RAT

The.Bug indications of infection

This symptoms of The.Bug detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ziocom Adware Removal instruction

nandomedia.com Tracking Cookie

nandomedia.com virus description
Technical details:
Categories: Tracking Cookie

nandomedia.com indications of infection

This symptoms of nandomedia.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ezPorn Trojan Removal
Nauj Adware Symptoms

Labrus Backdoor

Labrus virus description
Technical details:
Categories: Backdoor

Labrus indications of infection

This symptoms of Labrus detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Thiepchuchmung RAT
Bancos.HWR Trojan Information
Pigeon.ALX Trojan Information
Bloon Trojan Symptoms

HLLP.Duke Trojan

HLLP.Duke virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS

HLLP.Duke indications of infection

This symptoms of HLLP.Duke detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
JS.Relink Trojan Information
Arcv.Ace9 Backdoor Information
Trojandownloader.win32.small.axo Trojan Removal instruction

Agent.oo Backdoor

Agent.oo virus description
Technical details:
Categories: Backdoor

Agent.oo Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer\run


Agent.oo indications of infection

This symptoms of Agent.oo detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.AZA Trojan
Bancos.HBT Trojan Symptoms

Pigeon.AWU Trojan

Pigeon.AWU virus description
Technical details:
Categories: Trojan

Pigeon.AWU indications of infection

This symptoms of Pigeon.AWU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AXW Trojan Information
Removing CSL.pre Trojan

Tack Trojan

Tack virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Tack Aliases:
[Computer Associates]Tack

Tack indications of infection

This symptoms of Tack detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove CometCursor Adware

Bancos.HLI Trojan

Bancos.HLI virus description
Technical details:
Categories: Trojan
Bancos.HLI Aliases:
[Kaspersky]Trojan-Downloader.Win32.Banload.cdr;
[McAfee]PWS-Banker.gen.g;
[Other]Win32/Bancos.HLI

Bancos.HLI indications of infection

This symptoms of Bancos.HLI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Flood Trojan Information
Keylogger.King.Home Spyware Cleaner
IRC.JBGRC Trojan Removal instruction

OverPro Adware

OverPro virus description
Technical details:
Categories: Adware
OverPro Aliases:
[Panda]Spyware/Overpro

OverPro Files:
[%WINDOWS%]\Downloaded Program Files\WildApp.inf
[%WINDOWS%]\Downloaded Program Files\WildApp.inf

OverPro Registry Values:
HKEY_CLASSES_ROOT\clsid\{ff65677a-8977-48ca-916a-dff81b037df3}
HKEY_CLASSES_ROOT\clsid\{ff65677a-8977-48ca-916a-dff81b037df3}\inprocserver32
HKEY_CLASSES_ROOT\clsid\{ff65677a-8977-48ca-916a-dff81b037df3}\miscstatus 0
HKEY_CLASSES_ROOT\clsid\{ff65677a-8977-48ca-916a-dff81b037df3}\miscstatus\1 131473
HKEY_CLASSES_ROOT\clsid\{ff65677a-8977-48ca-916a-dff81b037df3}\progid wildapp.wmservice.1
HKEY_CLASSES_ROOT\clsid\{ff65677a-8977-48ca-916a-dff81b037df3}\toolboxbitmap32
HKEY_CLASSES_ROOT\clsid\{ff65677a-8977-48ca-916a-dff81b037df3}\typelib
HKEY_CLASSES_ROOT\clsid\{ff65677a-8977-48ca-916a-dff81b037df3}\version 1.0
HKEY_CLASSES_ROOT\clsid\{ff65677a-8977-48ca-916a-dff81b037df3}\versionindependentprogid
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\wildarcade uninstallstring


OverPro indications of infection

This symptoms of OverPro detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanDownloader.JS.gen Trojan Removal instruction
Illusion Trojan Symptoms
Kidda Adware Symptoms
TrojanClicker.Win32.Delf Trojan Removal

Phishbank.AVG Trojan

Phishbank.AVG virus description
Technical details:
Categories: Trojan

Phishbank.AVG indications of infection

This symptoms of Phishbank.AVG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ro2cn Adware Cleaner

SillyDl.BBH Trojan

SillyDl.BBH virus description
Technical details:
Categories: Trojan

SillyDl.BBH indications of infection

This symptoms of SillyDl.BBH detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
AntiPopupBar Toolbar Information
WWW.HighTrafficAds.com Tracking Cookie Removal
Bancos.CZA Trojan Removal instruction
Removing Vxidl.ALC Trojan
Dyfuca.ch Downloader Cleaner

LoadFonts Trojan

LoadFonts virus description
Technical details:
Categories: Trojan,Hijacker
LoadFonts Aliases:
[Kaspersky]Trojan.VBS.Seeker.a;
[Panda]Trj/VBS.Seeker;
[Computer Associates]VBS.IEStart,VBS/Seeker.391!Worm

LoadFonts indications of infection

This symptoms of LoadFonts detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Desktop.Search Adware Information
Pigeon.AFU Trojan Removal
Removing Luzak Trojan
Pigeon.AVNL Trojan Removal

NetBuie Adware

NetBuie virus description
Technical details:
Categories: Adware,Backdoor

NetBuie indications of infection

This symptoms of NetBuie detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.DBW Trojan Removal instruction
Removing Japanese.Key.Logger Spyware
Keylogger.Common.Components Spyware Removal
Bancos.DDC Trojan Cleaner
Vxidl.BFG Trojan Removal instruction

MSNMSNR (Msn Messenger) Trojan

MSNMSNR (Msn Messenger) virus description
Technical details:
Categories: Trojan

MSNMSNR (Msn Messenger) indications of infection

This symptoms of MSNMSNR (Msn Messenger) detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing YesLoader Trojan
Muerte.Server Trojan Cleaner
Bat.BWG.Kit Trojan Removal instruction
Removing wp.pl Tracking Cookie
Remove FBI Trojan

Bancos.HHT Trojan

Bancos.HHT virus description
Technical details:
Categories: Trojan

Bancos.HHT indications of infection

This symptoms of Bancos.HHT detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Activity.Monitor Spyware Cleaner

Voodoo Trojan

Voodoo virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,Hacker Tool,DoS
Voodoo Aliases:
[Kaspersky]Voodoo.3081,Win32.Magic.7045.a;
[McAfee]W32/Voodoo;
[F-Prot]W32/Voodoo_people.7045.A;
[Panda]Voodoo11.3083.A,W32/Voodoo.7045;
[Computer Associates]Voodoo.3083,Win32.Magic.7045.A

Voodoo indications of infection

This symptoms of Voodoo detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HRY Trojan Information