ICQ.IP.Thief Trojan

ICQ.IP.Thief virus description
Technical details:
Categories: Trojan

ICQ.IP.Thief indications of infection

This symptoms of ICQ.IP.Thief detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Almanahe Trojan Symptoms
Removing Prime Trojan
Removing Pigeon.EVX Trojan
Conferox Trojan Information

First.Blood DoS

First.Blood virus description
Technical details:
Categories: DoS

First.Blood indications of infection

This symptoms of First.Blood detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AVS Trojan Information
Bancos.FYL Trojan Information

Backdoor.Amitis.1!Server Backdoor

Backdoor.Amitis.1!Server virus description
Technical details:
Categories: Backdoor
Backdoor.Amitis.1!Server Aliases:
[Kaspersky]Backdoor.Amitis.11,Backdoor.Amitis.11.a,Backdoor.Win32.Amitis.11.a;
[Eset]Win32/Amitis.11 trojan;
[McAfee]BackDoor-AKZ;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Amitis.11;
[Computer Associates]Win32.Amitis.11

Backdoor.Amitis.1!Server indications of infection

This symptoms of Backdoor.Amitis.1!Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Zosu Trojan
Remove DlEssgol Trojan
Remove Pigeon.EGZ Trojan

wtkr.com Tracking Cookie

wtkr.com virus description
Technical details:
Categories: Tracking Cookie

wtkr.com indications of infection

This symptoms of wtkr.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing MIRC Hacker Tool
Hodrak Downloader Symptoms
Removing Bancos.GDH Trojan
VBS.BackdoorPing Trojan Removal instruction

Total.Control RAT

Total.Control virus description
Technical details:
Categories: RAT

Total.Control indications of infection

This symptoms of Total.Control detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Am Trojan
Coced.ASPask!PWS!Troja Trojan Removal
BackDoor.CVM.dll Trojan Removal instruction
Backdoor.Kronical.Server Trojan Removal instruction

MaximumPCADs.net Tracking Cookie

MaximumPCADs.net virus description
Technical details:
Categories: Tracking Cookie

MaximumPCADs.net indications of infection

This symptoms of MaximumPCADs.net detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Small.Arcv Trojan
Topwink Trojan Removal

Pigeon.AVUY Trojan

Pigeon.AVUY virus description
Technical details:
Categories: Trojan

Pigeon.AVUY indications of infection

This symptoms of Pigeon.AVUY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Seekmo Adware Cleaner
Keylog.NKeys Trojan Symptoms
Deaf Trojan Symptoms
Langly Trojan Information
SillyDl.CFU Trojan Information

bannerx.com Tracking Cookie

bannerx.com virus description
Technical details:
Categories: Tracking Cookie

bannerx.com indications of infection

This symptoms of bannerx.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Avispa Trojan Cleaner

Downloader.AZX Trojan

Downloader.AZX virus description
Technical details:
Categories: Trojan,Downloader
Downloader.AZX Aliases:
[McAfee]Downloader-AZX;
[Other]Win32/SillyDl.CCS

Downloader.AZX indications of infection

This symptoms of Downloader.AZX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
NetMetro Trojan Information

Dowque.AAE Trojan

Dowque.AAE virus description
Technical details:
Categories: Trojan

Dowque.AAE indications of infection

This symptoms of Dowque.AAE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win95.Payk Trojan Symptoms
Win32.Wkk Trojan Information
IllWill.info Spyware Removal

Super.Killer Ransomware

Super.Killer virus description
Technical details:
Categories: Ransomware

Super.Killer Folders:
[%COMMON_PROGRAMS%]\SuperSpywareKiller
[%PROGRAM_FILES%]\SuperSpywareKiller

Super.Killer Files:
[%DESKTOP%]\SuperSpywareKiller.lnk
[%DESKTOP%]\SuperSpywareKiller.lnk

Super.Killer Registry Keys:
HKEY_CURRENT_USER\software\spywarekiller
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\superspywarekiller_is1

Super.Killer Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Super.Killer indications of infection

This symptoms of Super.Killer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ferthiz Trojan Symptoms
Pigeon.DZO Trojan Cleaner
QZap124 Trojan Symptoms
srpa.de Tracking Cookie Information
Bat.Bingo Trojan Removal

SillyDl.COR Downloader

SillyDl.COR virus description
Technical details:
Categories: Downloader
SillyDl.COR Aliases:
[Kaspersky]Trojan-Downloader.Win32.Small.bve;
[Other]Win32/SillyDl.COR

SillyDl.COR indications of infection

This symptoms of SillyDl.COR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Generic.Dialer Adware
Glupak Trojan Symptoms
Liveperson Tracking Cookie Symptoms
Remove oncf Trojan
Twinouch Downloader Removal instruction

Sundevil Trojan

Sundevil virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Sundevil Aliases:
[Kaspersky]Sundevil.691;
[Panda]Sundevil.Drp;
[Computer Associates]Sundevil

Sundevil indications of infection

This symptoms of Sundevil detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Frethog.AER Trojan Removal
APM.GreenStripes Trojan Symptoms
ISpyNow Trojan Information
Voonda Toolbar Removal

Insix Trojan

Insix virus description
Technical details:
Categories: Trojan,RAT,Hacker Tool
Insix Aliases:
[Kaspersky]packed: Com2Exe,Trojan.PSW.Insix;
[Panda]Trojan Horse;
[Computer Associates]Insix!PWS!Trojan

Insix indications of infection

This symptoms of Insix detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Win32.Holbot Trojan
Bancos.GHR Trojan Removal instruction
Removing Pigeon.ELF Trojan
Zasil Trojan Symptoms
SillyDl.DHT Trojan Cleaner

Generic.dc Trojan

Generic.dc virus description
Technical details:
Categories: Trojan

Generic.dc indications of infection

This symptoms of Generic.dc detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
FTPServ.U!Trojan Trojan Symptoms
MSInfoSys Hijacker Symptoms
Bancos.HZJ Trojan Removal instruction

Pigeon.ELS Trojan

Pigeon.ELS virus description
Technical details:
Categories: Trojan

Pigeon.ELS indications of infection

This symptoms of Pigeon.ELS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Vanquish Trojan
Httpd.Flood DoS Information

Pigeon.AWIX Trojan

Pigeon.AWIX virus description
Technical details:
Categories: Trojan

Pigeon.AWIX indications of infection

This symptoms of Pigeon.AWIX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Backdoor.Avocado.ServerDLL Backdoor
Bancos.IAJ Trojan Removal instruction
Removing VBS.KillOS Trojan
Yewbmoat Trojan Information

Uriel DoS

Uriel virus description
Technical details:
Categories: DoS
Uriel Aliases:
[Computer Associates]Uriel.1_00

Uriel indications of infection

This symptoms of Uriel detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
HDBreaker Trojan Removal instruction
Macro.Word97.Claud Trojan Information

Bancos.HFH Trojan

Bancos.HFH virus description
Technical details:
Categories: Trojan

Bancos.HFH indications of infection

This symptoms of Bancos.HFH detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Win32.MF4 Trojan

TrojanDownloader.LowZones.bx Downloader

TrojanDownloader.LowZones.bx virus description
Technical details:
Categories: Downloader

TrojanDownloader.LowZones.bx indications of infection

This symptoms of TrojanDownloader.LowZones.bx detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Webext Adware Information

Bancos.GFF Trojan

Bancos.GFF virus description
Technical details:
Categories: Trojan

Bancos.GFF indications of infection

This symptoms of Bancos.GFF detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Sojfuse Trojan Cleaner
Remove BFGhost Trojan
Removing logdy.com Tracking Cookie
Lineage.AAV Trojan Symptoms
ROCI Backdoor Removal

Traveling.Jack Trojan

Traveling.Jack virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Traveling.Jack Aliases:
[Kaspersky]Signed.980.a;
[Panda]Chaser;
[Computer Associates]Travelling Jack

Traveling.Jack indications of infection

This symptoms of Traveling.Jack detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Dismember Trojan Removal
Removing Perl.Hadic Trojan
Bancos.GUY Trojan Symptoms
FCHelp Adware Information
Win32.Delf Trojan Removal instruction

BootDr135 Trojan

BootDr135 virus description
Technical details:
Categories: Trojan
BootDr135 Aliases:
[Kaspersky]Stoned.Scrlock.a,Stoned.Sex.b,Stoned.Zapped;
[McAfee]BootDr135;
[Panda]Sex Revolution Fam,Stoned.NOP,Zapper

BootDr135 indications of infection

This symptoms of BootDr135 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GVE Trojan Information
webmd.com Tracking Cookie Information
skymasters.biz Adware Removal

FameLeads Tracking Cookie

FameLeads virus description
Technical details:
Categories: Tracking Cookie

FameLeads indications of infection

This symptoms of FameLeads detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CWS.TheRealSearch Hijacker Information
Pigeon.AKE Trojan Information

Banload.kh Trojan

Banload.kh virus description
Technical details:
Categories: Trojan,Downloader

Banload.kh indications of infection

This symptoms of Banload.kh detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CSR Trojan Information
Pigeon.AED Trojan Information
Pigeon.END Trojan Removal
LMD Trojan Information

Lydra Trojan

Lydra virus description
Technical details:
Categories: Trojan

Lydra indications of infection

This symptoms of Lydra detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
UberSpiffy.com Tracking Cookie Cleaner
Removing Vxidl.AYG Trojan
WinxDefender Ransomware Symptoms
Zdl Trojan Removal
Ugogo88 Downloader Removal instruction

DIEssgol Trojan

DIEssgol virus description
Technical details:
Categories: Trojan
DIEssgol Aliases:
[Kaspersky]Trojan-Dropper.Win32.Agent.asq;
[McAfee]PWS-Goldun.dldr;
[Other]Win32/DIEssgol.B,Trojan.Goldun

DIEssgol Files:
[%SYSTEM%]\msvoid.dll
[%SYSTEM%]\msvoid.dll

DIEssgol Registry Keys:
HKEY_CLASSES_ROOT\clsid\{78934132-3451-67a2-8919-678931572311}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{78934132-3451-67a2-8919-678931572311}


DIEssgol indications of infection

This symptoms of DIEssgol detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Adware.BrowserAid BHO Removal instruction
Exal Trojan Cleaner