Mini.Gift RAT

Mini.Gift virus description
Technical details:
Categories: RAT
Mini.Gift Aliases:
[Kaspersky]Backdoor.MiniGift.01,packed: PECompact;
[McAfee]BackDoor-XE;
[F-Prot]security risk or a "backdoor" program

Mini.Gift indications of infection

This symptoms of Mini.Gift detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pedmat Trojan Cleaner
DlSlime Trojan Symptoms
Vxidl.AJY Trojan Removal
Remove Win32.FormMail DoS

Pigeon.FAM Trojan

Pigeon.FAM virus description
Technical details:
Categories: Trojan

Pigeon.FAM indications of infection

This symptoms of Pigeon.FAM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Supreme.Master.KeyLogger Spyware Information
Removing PSW.Ghostar Backdoor
Monator Trojan Removal instruction

Bancos.FTU Trojan

Bancos.FTU virus description
Technical details:
Categories: Trojan

Bancos.FTU indications of infection

This symptoms of Bancos.FTU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanDownloader.Win32.Esepor Trojan Removal
VB.dj Downloader Removal instruction
Keylogger.Express Spyware Cleaner
BrowserAid.Startium BHO Symptoms
Win32.Way.Client Trojan Removal instruction

Carachat.beta Trojan

Carachat.beta virus description
Technical details:
Categories: Trojan

Carachat.beta indications of infection

This symptoms of Carachat.beta detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SillyDl.DLL Trojan
WWW.PCH.com.MyAccount Tracking Cookie Symptoms
Laceh Trojan Cleaner
Remove Frethog.ADS Trojan
TrojanDownloader.Win32.VB.cn Downloader Cleaner

Hobbit Backdoor

Hobbit virus description
Technical details:
Categories: Backdoor,RAT
Hobbit Aliases:
[Kaspersky]Backdoor.Hobbit.01,Backdoor.Hobbit.b,ExeHeader.Hobbit.416;
[McAfee]BackDoor-AGI,BackDoor-AGI.svr,Univ/j;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program,Bck/Hobbit,Hobbit;
[Computer Associates]Backdoor/Hobbit.0.1,Win32.Hobb.01,Win32/Hobb.01!Trojan

Hobbit indications of infection

This symptoms of Hobbit detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.ADF Trojan

Bancos.GPV Trojan

Bancos.GPV virus description
Technical details:
Categories: Trojan

Bancos.GPV indications of infection

This symptoms of Bancos.GPV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Propo Trojan

Pigeon.AVNX Trojan

Pigeon.AVNX virus description
Technical details:
Categories: Trojan

Pigeon.AVNX indications of infection

This symptoms of Pigeon.AVNX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Vxidl.BCM Trojan
IRC.Flood.bc Worm Removal
WinAntiDown Downloader Information
BackDoor.BAC.gen Backdoor Symptoms
Removing Downloader.ARR Downloader

uralweb.ru Tracking Cookie

uralweb.ru virus description
Technical details:
Categories: Tracking Cookie

uralweb.ru indications of infection

This symptoms of uralweb.ru detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Advanced.KEYLOGGER Spyware
Agent.mx Trojan Removal instruction
PC.Activity.Monitor.Lite Spyware Information
HLLO.Picked Trojan Removal instruction

GhostKeyLog.dll Spyware

GhostKeyLog.dll virus description
Technical details:
Categories: Spyware
GhostKeyLog.dll Aliases:
[Kaspersky]Trojan.Spy.GhostKeyLogger,TrojanSpy.Win32.GhostKeyLogger.a;
[McAfee]GhostKeyLog.dll;
[F-Prot]destructive program;
[Computer Associates]Win32/GhostKeyLogger.a!Spy!Troja

GhostKeyLog.dll Folders:
[%PROGRAM_FILES%]\sync manager

GhostKeyLog.dll Files:
[%PROGRAM_FILES%]\Sync Manager\agent\syncagent.dll
[%PROGRAM_FILES%]\Sync Manager\agent\syncagent.exe
[%PROGRAM_FILES%]\sync manager demo\agent\syncagent.dll
[%PROGRAM_FILES%]\sync manager demo\agent\syncagent.exe
[%PROGRAM_FILES%]\sync manager demo\faq.html
[%PROGRAM_FILES%]\sync manager demo\manual.html
[%PROGRAM_FILES%]\sync manager demo\syncconfig.exe
[%PROGRAM_FILES%]\Sync Manager\agent\syncagent.dll
[%PROGRAM_FILES%]\Sync Manager\agent\syncagent.exe
[%PROGRAM_FILES%]\sync manager demo\agent\syncagent.dll
[%PROGRAM_FILES%]\sync manager demo\agent\syncagent.exe
[%PROGRAM_FILES%]\sync manager demo\faq.html
[%PROGRAM_FILES%]\sync manager demo\manual.html
[%PROGRAM_FILES%]\sync manager demo\syncconfig.exe


GhostKeyLog.dll indications of infection

This symptoms of GhostKeyLog.dll detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ticmion Trojan Symptoms
Remove SillyDl.COZ Trojan
ExactSearchBar BHO Removal instruction
Removing Spowaint Trojan
Casus Trojan Removal

Agobot.cr Backdoor

Agobot.cr virus description
Technical details:
Categories: Backdoor

Agobot.cr indications of infection

This symptoms of Agobot.cr detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.FVV Trojan Symptoms
Win32.NetDown Trojan Cleaner

Pardillo Backdoor

Pardillo virus description
Technical details:
Categories: Backdoor,RAT
Pardillo Aliases:
[Panda]Backdoor Program,Bck/Pardillo;
[Computer Associates]Backdoor/Pardillo

Pardillo indications of infection

This symptoms of Pardillo detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ivwbox.de Tracking Cookie Removal
Bancos.HOJ Trojan Removal instruction
Anti Trojan Cleaner

Karwnlam Trojan

Karwnlam virus description
Technical details:
Categories: Trojan
Karwnlam Aliases:
[Kaspersky]Trojan-Dropper.Win32.Agent.btd;
[Other]Win32/Karwnlam.A

Karwnlam indications of infection

This symptoms of Karwnlam detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing StatWin Spyware
Remove PWS.AIMScreen Trojan
VB.vu Trojan Symptoms

Freaker Trojan

Freaker virus description
Technical details:
Categories: Trojan
Freaker Aliases:
[Kaspersky]Trojan.Freaker;
[McAfee]Freaker;
[F-Prot]could be a boot sector virus dropper;
[Panda]Trj/Freaker;
[Computer Associates]Corosion!Trojan,Freaker

Freaker indications of infection

This symptoms of Freaker detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Eixes Trojan Cleaner
Pigeon.AVM Trojan Removal
Cyclone DoS Cleaner

Bancos.HZV Trojan

Bancos.HZV virus description
Technical details:
Categories: Trojan

Bancos.HZV indications of infection

This symptoms of Bancos.HZV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Asassin.Patch RAT
Removing Agent.bh Trojan
Backdoor.Softwar Trojan Information
Remove TrojanSpy.Win32.Sincom.bf Trojan
Bancos.EOY Trojan Removal

Swedish.Boys Trojan

Swedish.Boys virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Swedish.Boys Aliases:
[Kaspersky]BetaBoys.457,BetaBoys.538,BetaBoys.459;
[Eset]Swdsh_Bs.457 virus,BetaBoys.538 virus,Swdsh_Bs.459 virus;
[Panda]Headache.457,Swedish_WhyWin.1244;
[Computer Associates]Headache,Data Molester

Swedish.Boys indications of infection

This symptoms of Swedish.Boys detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
GAMSofts.TelSrv.attack DoS Removal
Cmjdown Trojan Removal instruction
Removing Pigeon.ETW Trojan
Removing SillyDl.CQU Trojan
Remove Bancos.GGW Trojan

Bancos.HHE Trojan

Bancos.HHE virus description
Technical details:
Categories: Trojan

Bancos.HHE indications of infection

This symptoms of Bancos.HHE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.ANF Trojan Removal
TrojanDownloader.Win32.Wintrim Trojan Removal
Vxidl.BDJ Trojan Cleaner

Backdoor.AcidShiver Trojan

Backdoor.AcidShiver virus description
Technical details:
Categories: Trojan,Backdoor
Backdoor.AcidShiver Aliases:
[Kaspersky]Backdoor.AcidShiver.516;
[Eset]Win32/AcidShiver.516 trojan;
[McAfee]BackDoor-AC;
[F-Prot]security risk or a "backdoor" program

Backdoor.AcidShiver indications of infection

This symptoms of Backdoor.AcidShiver detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
RemExp RAT Cleaner
Remove Win32.UltimateRAT.Plugin Trojan
AntiSpyZone Adware Cleaner

CA Trojan

CA virus description
Technical details:
Categories: Trojan

CA indications of infection

This symptoms of CA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.FZL Trojan Information

Pigeon.EDQ Trojan

Pigeon.EDQ virus description
Technical details:
Categories: Trojan

Pigeon.EDQ indications of infection

This symptoms of Pigeon.EDQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing freenet.de Tracking Cookie
Desktop.Doodle Adware Information

Sechole Trojan

Sechole virus description
Technical details:
Categories: Trojan,Hacker Tool
Sechole Aliases:
[Panda]Trojan Horse;
[Computer Associates]Win32.Sechole.exploit

Sechole indications of infection

This symptoms of Sechole detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Bancos.IGY Trojan
Removing F**ker DoS
Remove Free.Scratch.and.Win Trojan
Jomep Spyware Removal instruction

WM.Atom Trojan

WM.Atom virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
WM.Atom Aliases:
[Kaspersky]Macro.Word.Atom;
[Eset]WM/Atom.C virus,WM/Atom.E virus;
[Panda]WM/Atom.A,WM/Atom.E;
[Computer Associates]WordMacro/Atom.C

WM.Atom indications of infection

This symptoms of WM.Atom detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PayPal Hoax Removal instruction
Remove startpage.vo Hijacker
Remove PWS.AIMZip Trojan

Ehg.Hitbox Tracking Cookie

Ehg.Hitbox virus description
Technical details:
Categories: Tracking Cookie

Ehg.Hitbox indications of infection

This symptoms of Ehg.Hitbox detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Kompanion Trojan Removal
Wicked.Bot Backdoor Removal
Removing Exit.Win.Predator Trojan

TrojanDownloader.Win32.Esepor Trojan

TrojanDownloader.Win32.Esepor virus description
Technical details:
Categories: Trojan,Adware,Downloader
TrojanDownloader.Win32.Esepor Aliases:
[Kaspersky]TrojanDownloader.Win32.Esepor.a;
[Panda]Adware/Xplugin,Trojan Horse

TrojanDownloader.Win32.Esepor Files:
[%SYSTEM%]\tksrv98.exe
[%SYSTEM%]\tmksrvu.exe
[%SYSTEM%]\tksrv98.exe
[%SYSTEM%]\tmksrvu.exe


TrojanDownloader.Win32.Esepor indications of infection

This symptoms of TrojanDownloader.Win32.Esepor detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Mendrem Trojan
Backdoor.Psychward Backdoor Removal instruction

Pigeon.AVAP Trojan

Pigeon.AVAP virus description
Technical details:
Categories: Trojan

Pigeon.AVAP indications of infection

This symptoms of Pigeon.AVAP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bionet.CGI.Logger Backdoor Symptoms
Divint Hacker Tool Information
BAT.Mxsender Trojan Information
Remove Pigeon.AZC Trojan
ZyncosMark Adware Symptoms

Wuzhil Trojan

Wuzhil virus description
Technical details:
Categories: Trojan

Wuzhil Files:
[%SYSTEM%]\downasp.exe
[%SYSTEM%]\downdata1.xl
[%SYSTEM%]\downasp.exe
[%SYSTEM%]\downdata1.xl


Wuzhil indications of infection

This symptoms of Wuzhil detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.ABR Trojan Removal
Bancos.GTW Trojan Removal instruction
Remove LoadFonts Trojan
Teflon.Oil.Patch Trojan Removal instruction

StartPa.FQ Trojan

StartPa.FQ virus description
Technical details:
Categories: Trojan,BHO

StartPa.FQ indications of infection

This symptoms of StartPa.FQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Kenny Backdoor Cleaner
VBS.Shaz Trojan Removal
Removing Win32.Agent.bt Trojan
Spy.Win32.Banker.mt Trojan Cleaner

Disk.Killer Trojan

Disk.Killer virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Disk.Killer Aliases:
[Kaspersky]DiskFiller.g;
[Panda]Disk Killer Boot

Disk.Killer indications of infection

This symptoms of Disk.Killer detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
NetSource101 Hijacker Cleaner

Eingersperrt Trojan

Eingersperrt virus description
Technical details:
Categories: Trojan

Eingersperrt indications of infection

This symptoms of Eingersperrt detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Stratio.BN Worm Removal
fastclick.net Tracking Cookie Symptoms

FunTarget Trojan

FunTarget virus description
Technical details:
Categories: Trojan

FunTarget indications of infection

This symptoms of FunTarget detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HEJ Trojan Information
VBS.Generator Worm Removal
IRC.Bnc Trojan Removal instruction
Krepper Trojan Information
WebSearch BHO Removal instruction

Bancos.ZZP Trojan

Bancos.ZZP virus description
Technical details:
Categories: Trojan

Bancos.ZZP indications of infection

This symptoms of Bancos.ZZP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ofpo Trojan Symptoms

TrojanDownloader.Win32.QQSendMess Trojan

TrojanDownloader.Win32.QQSendMess virus description
Technical details:
Categories: Trojan,Downloader,Hacker Tool
TrojanDownloader.Win32.QQSendMess Aliases:
[Kaspersky]TrojanNotifier.Win32.QQSendMess.b;
[Panda]Trojan Horse;
[Computer Associates]Win32/QQPass!PWS!Trojan

TrojanDownloader.Win32.QQSendMess indications of infection

This symptoms of TrojanDownloader.Win32.QQSendMess detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Bancos.HAP Trojan

PC.Weasel Spyware

PC.Weasel virus description
Technical details:
Categories: Spyware

PC.Weasel Folders:
[%PROGRAM_FILES%]\pc weasel

PC.Weasel Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\pc weasel


PC.Weasel indications of infection

This symptoms of PC.Weasel detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Hamesup3 Backdoor Information
InetSpy Backdoor Removal
Removing Pigeon.AVBY Trojan
Remote.Hack.Remote.Administration.Tool Backdoor Cleaner

Win32.TrojanDropper.Kbind Trojan

Win32.TrojanDropper.Kbind virus description
Technical details:
Categories: Trojan
Win32.TrojanDropper.Kbind Aliases:
[Kaspersky]TrojanDropper.Win32.Kbind;
[Panda]Trojan Horse

Win32.TrojanDropper.Kbind indications of infection

This symptoms of Win32.TrojanDropper.Kbind detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove ICOO Loader Adware
Latinus.Server.family Trojan Cleaner
Removing WordMacro.Mercado.B:Br Trojan

VB.ps Trojan

VB.ps virus description
Technical details:
Categories: Trojan,Backdoor
VB.ps Aliases:
[Panda]Trojan Horse

VB.ps indications of infection

This symptoms of VB.ps detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TitanShield.Antispyware Trojan Removal instruction
Ath0 DoS Information
Nazgul Trojan Removal
Int26 Trojan Information
BJCG Spyware Cleaner