MSTU Trojan

MSTU virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
MSTU Aliases:
[Kaspersky]MSTU.513,MSTU.533;
[Eset]Mstu.532 virus;
[McAfee]Univ/g;
[Panda]MSTU.532,MSTU.554;
[Computer Associates]MSTU

MSTU indications of infection

This symptoms of MSTU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Filehider Trojan Removal

DameWare.Mini.Remote.Control RAT

DameWare.Mini.Remote.Control virus description
Technical details:
Categories: RAT

DameWare.Mini.Remote.Control Folders:
[%PROGRAM_FILES%]\dameware development

DameWare.Mini.Remote.Control Files:
[%DESKTOP%]\dwmrcw.exe
[%PROGRAMS%]\dameware mini remote control\dameware mini remote control help.lnk
[%PROGRAMS%]\dameware mini remote control\dameware mini remote control.lnk
[%PROGRAMS%]\dameware mini remote control\install dmrc service.lnk
[%PROGRAMS%]\dameware mini remote control\remove dmrc service.lnk
[%PROGRAMS%]\dameware mini remote control\service install & remove wizard.lnk
[%DESKTOP%]\dwmrcw.exe
[%PROGRAMS%]\dameware mini remote control\dameware mini remote control help.lnk
[%PROGRAMS%]\dameware mini remote control\dameware mini remote control.lnk
[%PROGRAMS%]\dameware mini remote control\install dmrc service.lnk
[%PROGRAMS%]\dameware mini remote control\remove dmrc service.lnk
[%PROGRAMS%]\dameware mini remote control\service install & remove wizard.lnk

DameWare.Mini.Remote.Control Registry Keys:
HKEY_CURRENT_USER\software\dameware development
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\menuorder\start menu2\programs\dameware mini remote control
HKEY_LOCAL_MACHINE\software\dameware development\dwrcs

DameWare.Mini.Remote.Control Registry Values:
HKEY_CURRENT_USER\software\microsoft\installer\features\0fe858bbc088f154fad5c167b51f7167
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\folders
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\installer\folders
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{bb858ef0-880c-451f-af5d-1c765bf11776}
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\dwmrcs
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\dwmrcs
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\dwmrcs
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\dwmrcs
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\dwmrcs
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\dwmrcs


DameWare.Mini.Remote.Control indications of infection

This symptoms of DameWare.Mini.Remote.Control detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove yachtworld.com Tracking Cookie
AOLPS.Amath Trojan Removal
Active.Strip.Setup Adware Removal

PSW.ICQ.Fixerror Trojan

PSW.ICQ.Fixerror virus description
Technical details:
Categories: Trojan,Hacker Tool
PSW.ICQ.Fixerror Aliases:
[Panda]Trojan Horse;
[Computer Associates]Win32/PSW.ICQ.Fixerror!Trojan

PSW.ICQ.Fixerror indications of infection

This symptoms of PSW.ICQ.Fixerror detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Warez Trojan Removal instruction
Removing JScript.HTADropper!Trojan Trojan
KwBot Worm Removal
QZap107 Trojan Information

CWS.ServicesExe Downloader

CWS.ServicesExe virus description
Technical details:
Categories: Downloader

CWS.ServicesExe Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\keywords
HKEY_CURRENT_USER\software\microsoft\internet explorer\keywords
HKEY_CURRENT_USER\software\microsoft\internet explorer\keywords
HKEY_CURRENT_USER\software\microsoft\internet explorer\keywords


CWS.ServicesExe indications of infection

This symptoms of CWS.ServicesExe detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Dowque.AAP Trojan Symptoms
Remove Turkojan Trojan
FrontPage.PWS32 DoS Information
Bancos.GBB Trojan Removal instruction

Pigeon.AYN Trojan

Pigeon.AYN virus description
Technical details:
Categories: Trojan

Pigeon.AYN indications of infection

This symptoms of Pigeon.AYN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Gpix Trojan
Remove Octrlate Downloader
Remove Rewzaq Trojan

Shoded Trojan

Shoded virus description
Technical details:
Categories: Trojan

Shoded indications of infection

This symptoms of Shoded detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Small.B Trojan Symptoms
Hotlist Trojan Symptoms
Removing Pigeon.AWHM Trojan
Wnuke Trojan Removal instruction
Vxidl.AWV Trojan Symptoms

Pigeon.EEZ Trojan

Pigeon.EEZ virus description
Technical details:
Categories: Trojan

Pigeon.EEZ indications of infection

This symptoms of Pigeon.EEZ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.FRN Trojan Removal
Victor Trojan Removal
Acidsena Trojan Removal instruction
Whacky Backdoor Symptoms
IRC.Inviter Trojan Information

PlanetRemote RAT

PlanetRemote virus description
Technical details:
Categories: RAT

PlanetRemote Folders:
[%COMMON_PROGRAMS%]\PlanetDNS
[%PROFILE_TEMP%]\{F6F1B5DF-EC1C-4444-A4B7-240BFD3C5A5C}\{A3E24F85-0EAE-4376-AE14-A0CBBDF80A7D}
[%PROGRAM_FILES%]\InstallShield Installation Information\{A3E24F85-0EAE-4376-AE14-A0CBBDF80A7D}
[%PROGRAM_FILES%]\NewAce Corporation

PlanetRemote Files:
[%COMMON_DESKTOPDIRECTORY%]\PlanetRemote Viewer.lnk
[%COMMON_DESKTOPDIRECTORY%]\PlanetRemote.lnk
[%SYSTEM%]\pdnscpl.cpl
[%SYSTEM%]\PDNSCPL.HLP
[%SYSTEM%]\pdnsreg.exe
[%SYSTEM%]\pdnsreg.hlp
[%COMMON_DESKTOPDIRECTORY%]\PlanetRemote Viewer.lnk
[%COMMON_DESKTOPDIRECTORY%]\PlanetRemote.lnk
[%SYSTEM%]\pdnscpl.cpl
[%SYSTEM%]\PDNSCPL.HLP
[%SYSTEM%]\pdnsreg.exe
[%SYSTEM%]\pdnsreg.hlp

PlanetRemote Registry Keys:
HKEY_CLASSES_ROOT\pdnsreg
HKEY_CLASSES_ROOT\rns
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app paths\pdshell.exe
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\{a3e24f85-0eae-4376-ae14-a0cbbdf80a7d}
HKEY_LOCAL_MACHINE\software\newace corporation\planetremote
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_planetremote
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\planetremote

PlanetRemote Registry Values:
HKEY_CURRENT_USER\software\newace corporation\planetremote\mshvnc
HKEY_CURRENT_USER\software\newace corporation\planetremote\mshvnc
HKEY_CURRENT_USER\software\newace corporation\planetremote\mshvnc
HKEY_CURRENT_USER\software\newace corporation\planetremote\mshvnc
HKEY_CURRENT_USER\software\newace corporation\planetremote\mshvnc
HKEY_CURRENT_USER\software\newace corporation\planetremote\mshvnc
HKEY_CURRENT_USER\software\newace corporation\planetremote\mshvnc
HKEY_CURRENT_USER\software\newace corporation\planetremote\mshvnc
HKEY_CURRENT_USER\software\newace corporation\planetremote\mshvnc
HKEY_CURRENT_USER\software\newace corporation\planetremote\mshvnc
HKEY_CURRENT_USER\software\newace corporation\planetremote\mshvnc
HKEY_CURRENT_USER\software\newace corporation\planetremote\mshvnc
HKEY_CURRENT_USER\software\newace corporation\planetremote\mshvnc
HKEY_CURRENT_USER\software\newace corporation\planetremote\mshvnc
HKEY_CURRENT_USER\software\newace corporation\planetremote\mshvnc
HKEY_CURRENT_USER\software\newace corporation\planetremote\mshvnc
HKEY_CURRENT_USER\software\newace corporation\planetremote\mshvnc
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls


PlanetRemote indications of infection

This symptoms of PlanetRemote detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CKD Trojan Removal instruction
PrizeSurfer Trojan Information

Lager Trojan

Lager virus description
Technical details:
Categories: Trojan
Lager Aliases:
[Kaspersky]Trojan.Proxy.Win32.Lager.ch,Trojan-Prox.Win32.Lager.dt;
[Other]W32/Crypt.gen4,TROJ_LAGER.AR

Lager Files:
[%PROFILE_TEMP%]\WER54.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER55.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER56.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER57.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER58.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER59.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5A.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5B.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5C.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5D.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5E.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5F.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER60.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER61.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER62.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER63.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER64.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER65.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER66.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER67.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER68.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER69.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER6A.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER54.tmp
[%PROFILE_TEMP%]\WER55.tmp
[%PROFILE_TEMP%]\WER56.tmp
[%PROFILE_TEMP%]\WER57.tmp
[%PROFILE_TEMP%]\WER58.tmp
[%PROFILE_TEMP%]\WER59.tmp
[%PROFILE_TEMP%]\WER5A.tmp
[%PROFILE_TEMP%]\WER5B.tmp
[%PROFILE_TEMP%]\WER5C.tmp
[%PROFILE_TEMP%]\WER5D.tmp
[%PROFILE_TEMP%]\WER5E.tmp
[%PROFILE_TEMP%]\WER5F.tmp
[%PROFILE_TEMP%]\WER60.tmp
[%PROFILE_TEMP%]\WER61.tmp
[%PROFILE_TEMP%]\WER62.tmp
[%PROFILE_TEMP%]\WER63.tmp
[%PROFILE_TEMP%]\WER64.tmp
[%PROFILE_TEMP%]\WER65.tmp
[%PROFILE_TEMP%]\WER66.tmp
[%PROFILE_TEMP%]\WER67.tmp
[%PROFILE_TEMP%]\WER68.tmp
[%PROFILE_TEMP%]\WER69.tmp
[%PROFILE_TEMP%]\WER6A.tmp
[%PROFILE_TEMP%]\WER54.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER55.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER56.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER57.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER58.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER59.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5A.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5B.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5C.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5D.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5E.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER5F.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER60.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER61.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER62.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER63.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER64.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER65.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER66.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER67.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER68.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER69.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER6A.tmp.dir00\appcompat.txt
[%PROFILE_TEMP%]\WER54.tmp
[%PROFILE_TEMP%]\WER55.tmp
[%PROFILE_TEMP%]\WER56.tmp
[%PROFILE_TEMP%]\WER57.tmp
[%PROFILE_TEMP%]\WER58.tmp
[%PROFILE_TEMP%]\WER59.tmp
[%PROFILE_TEMP%]\WER5A.tmp
[%PROFILE_TEMP%]\WER5B.tmp
[%PROFILE_TEMP%]\WER5C.tmp
[%PROFILE_TEMP%]\WER5D.tmp
[%PROFILE_TEMP%]\WER5E.tmp
[%PROFILE_TEMP%]\WER5F.tmp
[%PROFILE_TEMP%]\WER60.tmp
[%PROFILE_TEMP%]\WER61.tmp
[%PROFILE_TEMP%]\WER62.tmp
[%PROFILE_TEMP%]\WER63.tmp
[%PROFILE_TEMP%]\WER64.tmp
[%PROFILE_TEMP%]\WER65.tmp
[%PROFILE_TEMP%]\WER66.tmp
[%PROFILE_TEMP%]\WER67.tmp
[%PROFILE_TEMP%]\WER68.tmp
[%PROFILE_TEMP%]\WER69.tmp
[%PROFILE_TEMP%]\WER6A.tmp


Lager indications of infection

This symptoms of Lager detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bancos!generic Trojan
Removing Sin.Cyn Backdoor

Bancos.IKJ Trojan

Bancos.IKJ virus description
Technical details:
Categories: Trojan

Bancos.IKJ indications of infection

This symptoms of Bancos.IKJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HCC Trojan Removal instruction

Propeler Backdoor

Propeler virus description
Technical details:
Categories: Backdoor,RAT
Propeler Aliases:
[Kaspersky]Backdoor.VB.ma;
[Eset]Win32/VB.MA trojan;
[Panda]Backdoor Program

Propeler indications of infection

This symptoms of Propeler detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Benuti.F!downloader Trojan Symptoms
Removing Win32.Flooder.SMS.VB DoS
bannerexchange.com Tracking Cookie Information
QdrPack Trojan Removal instruction
Win32.Songon Trojan Cleaner

SillyDl.DAS Trojan

SillyDl.DAS virus description
Technical details:
Categories: Trojan

SillyDl.DAS indications of infection

This symptoms of SillyDl.DAS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Revcuss Trojan Removal instruction
Removing Bancos.HDS Trojan
Remove Ptsnop Trojan

RemoteShut RAT

RemoteShut virus description
Technical details:
Categories: RAT

RemoteShut indications of infection

This symptoms of RemoteShut detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove W2K.Ketam Trojan
Removing SillyDl.BYZ Trojan
Removing Vice Trojan
Underground Toolbar Symptoms
addfreestats.com Tracking Cookie Removal instruction

Orchid Trojan

Orchid virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS

Orchid indications of infection

This symptoms of Orchid detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ultimate Defender Ransomware Symptoms
Removing ICQ.Message.Protocol Trojan
StartPage.zy Hijacker Removal instruction

eStart Hijacker

eStart virus description
Technical details:
Categories: Hijacker

eStart indications of infection

This symptoms of eStart detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove newzealand Adware
Removing Mir Trojan
Remove SillyDl.CZG Trojan
MultiDropper Trojan Removal

Bancos.GOP Trojan

Bancos.GOP virus description
Technical details:
Categories: Trojan

Bancos.GOP indications of infection

This symptoms of Bancos.GOP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Agent.BGC Trojan
Ksv Trojan Cleaner

Win32.PSW.Bancos Trojan

Win32.PSW.Bancos virus description
Technical details:
Categories: Trojan
Win32.PSW.Bancos Aliases:
[Kaspersky]Trojan.Win32.VB.gw

Win32.PSW.Bancos indications of infection

This symptoms of Win32.PSW.Bancos detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Vxidl.ASZ Trojan
Rbot.END Trojan Information
Vulcano.dr Trojan Information
Pigeon.AWL Trojan Removal

Pigeon.ANF Trojan

Pigeon.ANF virus description
Technical details:
Categories: Trojan

Pigeon.ANF indications of infection

This symptoms of Pigeon.ANF detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Kingos Backdoor Removal instruction
Remove CE Trojan
Removing PeerEnabler Worm
Removing MssMgr Adware
Sodawoo Trojan Removal instruction

Kill.Inst98 Trojan

Kill.Inst98 virus description
Technical details:
Categories: Trojan,Hacker Tool
Kill.Inst98 Aliases:
[Panda]Trj/Kill_Inst98;
[Computer Associates]Kill_Inst98!Trojan,KillInst98

Kill.Inst98 indications of infection

This symptoms of Kill.Inst98 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SilentThreat.java Trojan Cleaner

Win32.SysCenter Trojan

Win32.SysCenter virus description
Technical details:
Categories: Trojan,Downloader
Win32.SysCenter Aliases:
[Kaspersky]TrojanDownloader.Win32.Crypter;
[Panda]Trj/SysCenter.A

Win32.SysCenter indications of infection

This symptoms of Win32.SysCenter detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AQB Trojan Cleaner
Cvme Trojan Information
Agobot.bv Backdoor Removal
Remote.Anything Backdoor Cleaner
Bancos.ZZH Trojan Symptoms

Serrcou Trojan

Serrcou virus description
Technical details:
Categories: Trojan

Serrcou indications of infection

This symptoms of Serrcou detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.ANZ Trojan Information
Pigeon.AVUX Trojan Cleaner

Tambu.UDP.Scrambler Trojan

Tambu.UDP.Scrambler virus description
Technical details:
Categories: Trojan,Hacker Tool
Tambu.UDP.Scrambler Aliases:
[Kaspersky]Flooder.UDP.Delf.a,HackTool.Win32.Tambu;
[McAfee]HTool/tam;
[Panda]Hacktool/Dummy

Tambu.UDP.Scrambler indications of infection

This symptoms of Tambu.UDP.Scrambler detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
AntilamLite Trojan Symptoms
QQPetSkin Trojan Removal instruction

MSN.Tools Backdoor

MSN.Tools virus description
Technical details:
Categories: Backdoor
MSN.Tools Aliases:
[Kaspersky]Backdoor.VB.eo;
[Panda]Backdoor Program.LC,Bck/VB;
[Computer Associates]Backdoor/MSNToolz!Server,Backdoor/VB.eo,Win32.Diper

MSN.Tools indications of infection

This symptoms of MSN.Tools detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.BBO Trojan Symptoms
Tiniloz Trojan Removal

clickshift.com Tracking Cookie

clickshift.com virus description
Technical details:
Categories: Tracking Cookie

clickshift.com indications of infection

This symptoms of clickshift.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Staff.Copp Spyware Removal instruction
Bancos.GAK Trojan Removal
Golon Trojan Removal instruction
Bancos.AEG Trojan Cleaner
TPS108 Adware Removal instruction

Aureate.com Tracking Cookie

Aureate.com virus description
Technical details:
Categories: Tracking Cookie

Aureate.com indications of infection

This symptoms of Aureate.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Shabo Backdoor Symptoms

OcyKeySpy Spyware

OcyKeySpy virus description
Technical details:
Categories: Spyware

OcyKeySpy indications of infection

This symptoms of OcyKeySpy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanDownloader.Win32.Swizzor.bo Downloader Removal instruction
CGI.Bin Tracking Cookie Removal instruction
Pigeon.ECF Trojan Removal instruction
Removing WinAble Adware