Zimenok.Zender Trojan

Zimenok.Zender virus description
Technical details:
Categories: Trojan,Backdoor,Hacker Tool
Zimenok.Zender Aliases:
[Panda]Trj/PSW.Kesk;
[Computer Associates]Backdoor/Zimenok.Zender,Win32.PSW.Zimenok.03

Zimenok.Zender indications of infection

This symptoms of Zimenok.Zender detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CokeGift.joke Trojan Removal instruction
DownloadCoach Adware Removal
Vxidl.ATU Trojan Information
Pigeon.AXI Trojan Removal instruction
Removing StreamZap.com Tracking Cookie

Shetr Trojan

Shetr virus description
Technical details:
Categories: Trojan
Shetr Aliases:
[Panda]Trj/Shetr;
[Computer Associates]Win32.Shetr,Win32/Shetr!Trojan

Shetr indications of infection

This symptoms of Shetr detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing RemoteSOB Backdoor
Lineage.AJG Trojan Information
Typer704 Trojan Information

Pigeon.AZU Trojan

Pigeon.AZU virus description
Technical details:
Categories: Trojan

Pigeon.AZU indications of infection

This symptoms of Pigeon.AZU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
GlobalAccess Dialer Information
Removing Orig RAT
Nuclear.Scan.beta Trojan Removal instruction
Remove Boiling RAT

Startup.Nameshifter.Zwq Trojan

Startup.Nameshifter.Zwq virus description
Technical details:
Categories: Trojan,Adware,Downloader

Startup.Nameshifter.Zwq indications of infection

This symptoms of Startup.Nameshifter.Zwq detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SpyLocked Ransomware

Pigeon.EML Trojan

Pigeon.EML virus description
Technical details:
Categories: Trojan

Pigeon.EML indications of infection

This symptoms of Pigeon.EML detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MSN.Win32.VB Trojan Removal
IROffer.2b9 Backdoor Cleaner

DLUrsnif Downloader

DLUrsnif virus description
Technical details:
Categories: Downloader
DLUrsnif Aliases:
[Kaspersky]Trojan-PSW.Win32.Small.bs,Trojan-Downloader.Win32.Small.ddy;
[McAfee]Downloader-AXM;
[Other]Win32/DLUrsnif.D,Win32/DLUrsnif.E,Win32/DLUrsnif.G,Win32/DLUrsnif.F,Win32/DlUrsnif.H

DLUrsnif indications of infection

This symptoms of DLUrsnif detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Agent.BGC Trojan
Your.Searcher.com Hijacker Removal

Win32.CmjSpy Trojan

Win32.CmjSpy virus description
Technical details:
Categories: Trojan,Backdoor
Win32.CmjSpy Aliases:
[Kaspersky]Backdoor.PPCore.01;
[Eset]Win32/CmjSpy.40 trojan,Win32/CmjSpy.XP trojan;
[Panda]Bck/PPCore;
[Computer Associates]Backdoor/Win32.PP.A,Win32.Coreflood.1

Win32.CmjSpy indications of infection

This symptoms of Win32.CmjSpy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Tiuq Trojan Cleaner
Pest Trap Ransomware Symptoms
Removing Borlan Trojan
Nuclear.Prank Trojan Symptoms

Bancos.GHL Trojan

Bancos.GHL virus description
Technical details:
Categories: Trojan

Bancos.GHL indications of infection

This symptoms of Bancos.GHL detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bancos.IHB Trojan
Remove Bancos.GDR Trojan

Vxidl.AKB Trojan

Vxidl.AKB virus description
Technical details:
Categories: Trojan

Vxidl.AKB indications of infection

This symptoms of Vxidl.AKB detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
LogMeIn RAT Information

Bancos.GTS Trojan

Bancos.GTS virus description
Technical details:
Categories: Trojan

Bancos.GTS indications of infection

This symptoms of Bancos.GTS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing PSW.QQpass Trojan

hypercount.com Tracking Cookie

hypercount.com virus description
Technical details:
Categories: Tracking Cookie

hypercount.com indications of infection

This symptoms of hypercount.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Look2Me Hijacker Information

realtrackerbe.com Tracking Cookie

realtrackerbe.com virus description
Technical details:
Categories: Tracking Cookie

realtrackerbe.com indications of infection

This symptoms of realtrackerbe.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Local.Remote.Attack.in.Super.Mail.Transfer.Package.Server DoS Cleaner
Vxidl.AHB Trojan Removal
Hooker!Dropper Trojan Removal instruction

Patdup Trojan

Patdup virus description
Technical details:
Categories: Trojan
Patdup Aliases:
[Kaspersky]Trojan-PSW.Win32.WOW.pu;
[Other]Win32/Patdup.F,Win32/Patdup.D,Infostealer.Wowcraft

Patdup indications of infection

This symptoms of Patdup detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Small.chg Downloader Removal
Bangsoft Trojan Cleaner
Heckler Trojan Symptoms
Removing Vxidl.BBY Trojan
Remove FearlessKeySpy Trojan

SubSeven.v21 RAT

SubSeven.v21 virus description
Technical details:
Categories: RAT,Hacker Tool
SubSeven.v21 Aliases:
[Kaspersky]Constructor.BAT.Virugen,packed: Com2Exe;
[McAfee]Kit-Virugen;
[F-Prot]virus construction tool;
[Panda]Virus Constructor

SubSeven.v21 indications of infection

This symptoms of SubSeven.v21 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing HostControl Trojan

Spot.Bot Trojan

Spot.Bot virus description
Technical details:
Categories: Trojan,Backdoor
Spot.Bot Aliases:
[Kaspersky]Backdoor.G_Spot.15,Backdoor.G_Spot.20;
[McAfee]BackDoor-AAG;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program,Trj/W32.G-Spot.15;
[Computer Associates]Backdoor/G_Spot.15!Server,Win32.Spotbot.15,Backdoor/G_Spot.20

Spot.Bot Files:
[%WINDOWS%]\system\gspotbot.exe
[%WINDOWS%]\system\gspotbot.exe

Spot.Bot Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Spot.Bot indications of infection

This symptoms of Spot.Bot detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CoreServer Backdoor Cleaner
Secdrop Trojan Removal instruction

LoveaDot Trojan

LoveaDot virus description
Technical details:
Categories: Trojan

LoveaDot indications of infection

This symptoms of LoveaDot detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.NAH Trojan Symptoms
pal.remover Ransomware Symptoms

Opaserv Trojan

Opaserv virus description
Technical details:
Categories: Trojan
Opaserv Aliases:
[Panda]W32/Opaserv.Gen,W32/Opaserv.O;
[Computer Associates]Win32.Opaserv.M,Win32/OpaServ.17408.B!Worm,Win32.Opaserv.L,Win32.Opaserv.R,Win32/OpaServ.17408!Worm

Opaserv indications of infection

This symptoms of Opaserv detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Benioku Trojan
Vxidl.BBU Trojan Removal

W95.Heretic Trojan

W95.Heretic virus description
Technical details:
Categories: Trojan
W95.Heretic Aliases:
[Kaspersky]Win32.Heretic.1986;
[McAfee]W95/Heretic;
[Panda]W95/Heretic;
[Computer Associates]Win32.Heretic.1986,Win95/Heretic.1986

W95.Heretic indications of infection

This symptoms of W95.Heretic detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
IGMP.Lanxue DoS Cleaner
SillyDl.BCW Trojan Removal instruction
Backdoor.LegendMir Trojan Removal instruction
Thiepchuchmung RAT Removal

ARCV.Jo Trojan

ARCV.Jo virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
ARCV.Jo Aliases:
[Kaspersky]ARCV.Joanna.912;
[Eset]Psmpc.Joanna.912 virus;
[Panda]Arcv.Joanna.912

ARCV.Jo indications of infection

This symptoms of ARCV.Jo detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Hidden.Port Trojan
Rbot.GHJ Worm Cleaner
OPC.Back.Orifice Trojan Cleaner
BackSocket Backdoor Removal

Serving.Sys Tracking Cookie

Serving.Sys virus description
Technical details:
Categories: Tracking Cookie

Serving.Sys indications of infection

This symptoms of Serving.Sys detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
DialXS Adware Information
Frethog.AFC Trojan Removal
Removing Formula95Macro.Craze.A:intended Trojan
RedShell Backdoor Information
Windows.Key.Analyst Trojan Cleaner

Fwb.Dloader.Beta Trojan

Fwb.Dloader.Beta virus description
Technical details:
Categories: Trojan,Downloader
Fwb.Dloader.Beta Aliases:
[Kaspersky]TrojanDownloader.Win32.VB.w;
[Panda]Trojan Horse.LC

Fwb.Dloader.Beta Files:
[%WINDOWS%]\system\fwload.dll
[%WINDOWS%]\system\fwload.dll


Fwb.Dloader.Beta indications of infection

This symptoms of Fwb.Dloader.Beta detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Lufoure Trojan Removal instruction
Removing Malum.KQW Trojan
Offer.Companion Adware Removal instruction
NIGGER Trojan Cleaner
Cx2 Backdoor Removal

Generic.Del Trojan

Generic.Del virus description
Technical details:
Categories: Trojan,Downloader
Generic.Del Aliases:
[McAfee]Generic Del.c;
[Other]Win32/SillyDl.CIB

Generic.Del indications of infection

This symptoms of Generic.Del detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Reg.IRC.Flood.RmtCfg Trojan
Remove Bancos.GWW Trojan
Auto.Hack Adware Removal instruction
Remove SillyDl.CGR Downloader
Winmgts Trojan Removal instruction

Pigeon.AVRV Trojan

Pigeon.AVRV virus description
Technical details:
Categories: Trojan

Pigeon.AVRV indications of infection

This symptoms of Pigeon.AVRV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EZV Trojan Cleaner
Vxidl.ASJ Trojan Information
Removing Dratawl Trojan
Pigeon.BAU Trojan Cleaner
Vxidl.ARP Trojan Symptoms

P2E Trojan

P2E virus description
Technical details:
Categories: Trojan

P2E indications of infection

This symptoms of P2E detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ZKeylog Spyware Symptoms
Webtool.Web.Cleaner Adware Information
WurldMedia.MSCStat Hijacker Removal instruction
Pigeon.AVPI Trojan Information
SearchV Hijacker Cleaner

The.Killer Trojan

The.Killer virus description
Technical details:
Categories: Trojan,Backdoor
The.Killer Aliases:
[Kaspersky]Backdoor.KillTroj;
[McAfee]BackDoor-LU;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/KillTroj

The.Killer indications of infection

This symptoms of The.Killer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Diffusion Trojan Symptoms
Ooops Trojan Removal
Stealth.Eye Backdoor Cleaner
Bancos.INK Trojan Cleaner