Pigeon.AVUW Trojan

Pigeon.AVUW virus description
Technical details:
Categories: Trojan

Pigeon.AVUW indications of infection

This symptoms of Pigeon.AVUW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing IRC.Logger Spyware
Wotch Tracking Cookie Removal
HLLA.Archiver Trojan Removal
Removing Corruption Trojan

Remote.Attack.in.Small.HTTP.Server.ver.Vulnerability DoS

Remote.Attack.in.Small.HTTP.Server.ver.Vulnerability virus description
Technical details:
Categories: DoS

Remote.Attack.in.Small.HTTP.Server.ver.Vulnerability indications of infection

This symptoms of Remote.Attack.in.Small.HTTP.Server.ver.Vulnerability detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Flying Trojan Information
Removing Ping.Server RAT

Safetyuptodate Trojan

Safetyuptodate virus description
Technical details:
Categories: Trojan,Hijacker
Safetyuptodate Aliases:
[Other]Troj/Zlob-OY

Safetyuptodate Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{686a161d-5bd1-4999-8832-6393f41e564c}
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{686a161d-5bd1-4999-8832-6393f41e564c}
HKEY_CLASSES_ROOT\clsid\{686a161d-5bd1-4999-8832-6393f41e564c}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{686a161d-5bd1-4999-8832-6393f41e564c}

Safetyuptodate Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer\run


Safetyuptodate indications of infection

This symptoms of Safetyuptodate detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Webber Trojan Cleaner
Remove StartPage.xd Hijacker

Bancos.GSC Trojan

Bancos.GSC virus description
Technical details:
Categories: Trojan

Bancos.GSC indications of infection

This symptoms of Bancos.GSC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Agobot.ai Trojan

Pigeon.AMJ Trojan

Pigeon.AMJ virus description
Technical details:
Categories: Trojan

Pigeon.AMJ indications of infection

This symptoms of Pigeon.AMJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Banload.fc Trojan Cleaner

JS.WebAttacker Trojan

JS.WebAttacker virus description
Technical details:
Categories: Trojan,Hostile Code
JS.WebAttacker Aliases:
[Other]JS/WebAttacker.E,JS/WebAttacker.F

JS.WebAttacker indications of infection

This symptoms of JS.WebAttacker detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove luckybugscrapbooking.com Tracking Cookie
SillyDL.CBI Trojan Symptoms
MailSpam.Shadow Hacker Tool Cleaner
Mersting Trojan Symptoms

SillyDl.CPL Trojan

SillyDl.CPL virus description
Technical details:
Categories: Trojan

SillyDl.CPL indications of infection

This symptoms of SillyDl.CPL detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EJO Trojan Symptoms
Bancos.FWA Trojan Information
TrojanDownloader.Win32.Small.na Trojan Cleaner
Removing DFG Backdoor
VB.bz Adware Removal instruction

SillyDl.CTU Trojan

SillyDl.CTU virus description
Technical details:
Categories: Trojan

SillyDl.CTU Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


SillyDl.CTU indications of infection

This symptoms of SillyDl.CTU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Timebomb Trojan Information
Ebates.MoneyMaker Adware Removal
Grog.Delirious Trojan Cleaner
Vxidl Trojan Removal instruction

Super.Spider Trojan

Super.Spider virus description
Technical details:
Categories: Trojan,Hijacker
Super.Spider Aliases:
[Kaspersky]Trojan.Win32.Krepper.g;
[Panda]Trojan Horse

Super.Spider Registry Keys:
HKEY_CURRENT_USER\software\microsoft\internet explorer\vd
HKEY_CLASSES_ROOT\clsid\{93ed38ae-aebf-4c58-8758-501d6d56ffb5}
HKEY_CURRENT_USER\software\microsoft\internet explorer\cassandra
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{93ed38ae-aebf-4c58-8758-501d6d56ffb5}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\hd

Super.Spider Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Super.Spider indications of infection

This symptoms of Super.Spider detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.ATF Trojan Removal
Remove thesafetyfiles.com Hijacker
Khe.Sanh.Pro RAT Removal instruction
VirusRanger Ransomware Symptoms

Vxidl.ALP Trojan

Vxidl.ALP virus description
Technical details:
Categories: Trojan

Vxidl.ALP indications of infection

This symptoms of Vxidl.ALP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Rocks Trojan Cleaner
Removing BFGhost Trojan

MSN.Cookie Trojan

MSN.Cookie virus description
Technical details:
Categories: Trojan

MSN.Cookie indications of infection

This symptoms of MSN.Cookie detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
XLoader Adware Removal
Removing WhenUSave Adware
Removing Java.ByteVerify Trojan

MofDemo Trojan

MofDemo virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
MofDemo Aliases:
[Kaspersky]PolyEngineSGen.MOF.3;
[Panda]GenDrp.MOF.3

MofDemo indications of infection

This symptoms of MofDemo detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SpyBlast Adware Removal instruction

SillyDl.CBG Trojan

SillyDl.CBG virus description
Technical details:
Categories: Trojan

SillyDl.CBG indications of infection

This symptoms of SillyDl.CBG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Sterculius Trojan Symptoms
Remove HispaVista Tracking Cookie
Remove RBackdoor Trojan
Removing Backdoor.Psychward Backdoor

AOLPS Trojan

AOLPS virus description
Technical details:
Categories: Trojan,Spyware
AOLPS Aliases:
[Panda]Trj/Spy,Trj/AOLPS/FT,Trj/AOLPS/GF,Trj/AOLPS.IN,Trj/AOLPS.JZ,Trj/AOLPS.JX,Trj/AOLPS.K,Trj/AOLPS.KK,Trj/AOLPS.KQ,Trj/AOLPS/OA,Trojan Horse.LC,Trj/AOL.Docum,Trj/AOLPS/GD,Trj/AOLPS.FX,Trj/AOLPS.24320,Trj/AOLPS.FG,Trj/AOLPS/GC,Trj/ASP.24796,Trj/AOLPS.UA;
[Computer Associates]AOLPS.QG!Trojan,Aolps.HX!Trojan,Win.APSTrojan.gen,Aolps.GF!Trojan,Win.APStrojan,AOLPS.IN!Trojan,Win32.APStrojan,AOLPS.JZ!Trojan,Win32/AOLPS.JX!Trojan,Aolps.K!Trojan,AOLPS.KK!Trojan,AOLPS.KQ!Trojan,Aolps.OA!Trojan,Win.APStrojan.oa,AOLPS.QV!Trojan,AOLPS.ME!Trojan,Aolps.GD!Trojan,AOLPS.AA!Trojan,Aolps.NC!Trojan,Win.APStrojan.gen,AOLPS.FG!Trojan,APStrojan.gen,Aolps.GC!Trojan,AOLPS.UA!Trojan

AOLPS indications of infection

This symptoms of AOLPS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Kaiserdown Downloader Cleaner
SillyDl.DAB Downloader Removal instruction
Xploiter Trojan Removal

Mental.dr Trojan

Mental.dr virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Mental.dr Aliases:
[Kaspersky]Win32.Mental.10000;
[McAfee]W32/Mental.dr;
[F-Prot]W32/Mental.10000;
[Panda]Univ.B;
[Computer Associates]Win32.Mental.10004

Mental.dr indications of infection

This symptoms of Mental.dr detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ThemexpTransport Trojan Cleaner
Small.cyh Downloader Removal
Removing homepopular.org Tracking Cookie
Remove SpyLab.WebSpy Spyware

Win.Rizal Trojan

Win.Rizal virus description
Technical details:
Categories: Trojan
Win.Rizal Aliases:
[Panda]Univ.AP.G;
[Computer Associates]Win/Rizal!Trojan

Win.Rizal indications of infection

This symptoms of Win.Rizal detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Fad Trojan Information
Remove TrojanRunner Trojan
Removing Intelliquest Tracking Cookie
Zonar Trojan Cleaner
DLUrsnif Downloader Information

Igloo Trojan

Igloo virus description
Technical details:
Categories: Trojan,Spyware,Worm,Backdoor,RAT,DoS
Igloo Aliases:
[Kaspersky]Backdoor.Igloo.15.b,Backdoor.Igloo.18,Backdoor.Igloo.15.a,Backdoor.Igloo.181,Backdoor.Igloo.15.c,Backdoor.Igloo.20,Backdoor.Igloo.201,Backdoor.Igloo.2020,Backdoor.Igloo.00;
[Eset]Win32/Igloo.20 trojan,Win32/Igloo.181 trojan;
[McAfee]New BackDoor1,W32/Gool.worm;
[F-Prot]security risk or a "backdoor" program,W32/Gool.15.A;
[Panda]Backdoor Program,W32/Kazoa.C,Backdoor Program.LC,Bck/Igloo.B,Bck/Igloo.C,Bck/Igloo;
[Computer Associates]Backdoor/Igloo_Server_family,Backdoor/Igloo!Client,Backdoor/Igloo!Editor,Backdoor/Igloo!Server,Win32.Igloo.15,Backdoor/Gool!P2P,Backdoor/Igloo.20!Server,Win32.Igloo.2020,Win32/Igloo.2020!Trojan,Win32.Igloo.00,Win32.Igloo.181,Win32/Igloo.181.Trojan

Igloo Folders:
[%WINDOWS%]\sys32

Igloo Files:
[%WINDOWS%]\system\explorer.vbs
[%WINDOWS%]\system\realwaytohack.exe
[%WINDOWS%]\system\explorer.vbs
[%WINDOWS%]\system\realwaytohack.exe


Igloo indications of infection

This symptoms of Igloo detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SmallFun Trojan Removal
BrowserPal BHO Removal instruction
Nanpy.A Worm Cleaner
Remove Pigeon.EBP Trojan

Macro.Word97.Carrier Trojan

Macro.Word97.Carrier virus description
Technical details:
Categories: Trojan
Macro.Word97.Carrier Aliases:
[Kaspersky]Virus.MSWord.Carrier;
[Panda]W97M/Carrier.O1;
[Computer Associates]W97M/Carrier.C,Word97Macro/Carrier.A

Macro.Word97.Carrier indications of infection

This symptoms of Macro.Word97.Carrier detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Agent.dg Spyware Symptoms
Ulysses Trojan Removal instruction
Removing Vxidl.AMV Trojan
Removing Vxidl.ADA Trojan

Backdoor.BeastDoor Trojan

Backdoor.BeastDoor virus description
Technical details:
Categories: Trojan,Backdoor
Backdoor.BeastDoor Aliases:
[Kaspersky]Backdoor.BeastDoor.191;
[Eset]Win32/Beastdoor.191 trojan;
[Computer Associates]Backdoor/Ulysses.191.Server,Win32.Ulysses.191

Backdoor.BeastDoor indications of infection

This symptoms of Backdoor.BeastDoor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CCG Trojan Cleaner

TrojanDownloader.Win32.Aicore Trojan

TrojanDownloader.Win32.Aicore virus description
Technical details:
Categories: Trojan,Downloader
TrojanDownloader.Win32.Aicore Aliases:
[Kaspersky]TrojanDownloader.Win32.Aicore.a;
[Panda]Trojan Horse;
[Computer Associates]Win32/AICore!Downloader.5120!Tro

TrojanDownloader.Win32.Aicore indications of infection

This symptoms of TrojanDownloader.Win32.Aicore detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing TB Trojan
FilterProgram Ransomware Information

Dlena.an Trojan

Dlena.an virus description
Technical details:
Categories: Trojan

Dlena.an Files:
[%SYSTEM%]\rpcc.dll
[%SYSTEM%]\rpcc.dll

Dlena.an Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\rpcc


Dlena.an indications of infection

This symptoms of Dlena.an detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Compain Trojan Removal
PSW.Fakemsn Trojan Cleaner
Desktop.Spy Spyware Cleaner

Chkbox Trojan

Chkbox virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Chkbox Aliases:
[Panda]Checkbox.936.Drp;
[Computer Associates]Chkbox.936

Chkbox indications of infection

This symptoms of Chkbox detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVHJ Trojan Information
Mainpean.Stardialer Adware Symptoms

Pigeon.EYF Trojan

Pigeon.EYF virus description
Technical details:
Categories: Trojan

Pigeon.EYF indications of infection

This symptoms of Pigeon.EYF detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SillyDl.BBT Trojan
Mmviewer Adware Removal