SillyDl.CMV Trojan

SillyDl.CMV virus description
Technical details:
Categories: Trojan

SillyDl.CMV indications of infection

This symptoms of SillyDl.CMV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Fluxay.9!Setup Backdoor Removal
Generator Trojan Symptoms
Tetrinet.txt DoS Information
Pigeon.AUZ Trojan Removal instruction
Removing Subseven Trojan

Bancos.ICD Trojan

Bancos.ICD virus description
Technical details:
Categories: Trojan

Bancos.ICD indications of infection

This symptoms of Bancos.ICD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Avclose Trojan Symptoms

Bupots Trojan

Bupots virus description
Technical details:
Categories: Trojan

Bupots indications of infection

This symptoms of Bupots detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HXN Trojan Removal
Pigeon.AVW Trojan Information
Musliv Trojan Removal
Removing WhlpHeapOvrflw.A!exploit Trojan
Dowque.AFH Trojan Information

Vxidl.BCJ Trojan

Vxidl.BCJ virus description
Technical details:
Categories: Trojan

Vxidl.BCJ indications of infection

This symptoms of Vxidl.BCJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bredolab Trojan Removal instruction
zcodec.Alureon Trojan Cleaner
JS.Destroyer98 Trojan Cleaner
Removing VBS.Sorry Worm
Removing WM.Box Trojan

Pigeon.AVNL Trojan

Pigeon.AVNL virus description
Technical details:
Categories: Trojan

Pigeon.AVNL indications of infection

This symptoms of Pigeon.AVNL detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PSW.ICQ.Fixerror Trojan Cleaner

ZFriends.Takeover RAT

ZFriends.Takeover virus description
Technical details:
Categories: RAT

ZFriends.Takeover indications of infection

This symptoms of ZFriends.Takeover detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove AOL Trojan
Remove SpywareLocker Ransomware
WM.Rats Trojan Symptoms
VBS.Qhost Trojan Symptoms

Pigeon.EAX Trojan

Pigeon.EAX virus description
Technical details:
Categories: Trojan

Pigeon.EAX indications of infection

This symptoms of Pigeon.EAX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing PWS.Banker.gen Trojan
Remove SillyDl.DLL Trojan
Assassin.Asm Trojan Removal instruction
Bancos.GLY Trojan Information
Rbot.FrameWork Worm Information

Bancos.HNC Trojan

Bancos.HNC virus description
Technical details:
Categories: Trojan

Bancos.HNC indications of infection

This symptoms of Bancos.HNC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
QZap210 Trojan Removal instruction
Pigeon Trojan Cleaner
Remove mediatracker.co.nz Tracking Cookie
Bancos.GSN Trojan Symptoms
PSW.VB.aq Trojan Removal instruction

Disturb DoS

Disturb virus description
Technical details:
Categories: DoS

Disturb indications of infection

This symptoms of Disturb detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Setrix Trojan Symptoms

Blackharaz.Setup Trojan

Blackharaz.Setup virus description
Technical details:
Categories: Trojan,Backdoor

Blackharaz.Setup indications of infection

This symptoms of Blackharaz.Setup detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AQO Trojan Information
Remove Frethog.ACH Trojan
Win32.WebDL Trojan Removal instruction
SearchUrl (SearchSpy) Adware Cleaner

Pigeon.AVKJ Trojan

Pigeon.AVKJ virus description
Technical details:
Categories: Trojan

Pigeon.AVKJ indications of infection

This symptoms of Pigeon.AVKJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Nowar Trojan
Win32.PSW.DummyLock Trojan Removal instruction
Bancos.GTJ Trojan Removal

DonaldDick Trojan

DonaldDick virus description
Technical details:
Categories: Trojan,Backdoor
DonaldDick Aliases:
[Kaspersky]Backdoor.Win32.DonaldDick.152;
[Eset]Win32/DonaldDick.1_52 trojan,Win32/DonaldDick.1_52.02 trojan,Win32/DonaldDick.1_52.B trojan;
[McAfee]BackDoor-AQ;
[F-Prot]W32/Backdoor.DonaldD.Server.v1;
[Panda]Bck/Donald_Dick.152;
[Computer Associates]Backdoor/DonaldDick.152.VxD,Backdoor/DonaldDick.A!Server,Win32.Donald.152,Win32.Donald.ldr,Backdoor/DonaldDick.1.5.2.B

DonaldDick indications of infection

This symptoms of DonaldDick detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Checkesp Trojan

enhance.com Tracking Cookie

enhance.com virus description
Technical details:
Categories: Tracking Cookie

enhance.com indications of infection

This symptoms of enhance.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Adrenaline Trojan
Pigeon.AVDN Trojan Symptoms
tankersite.com Tracking Cookie Information

Malum.KHC Trojan

Malum.KHC virus description
Technical details:
Categories: Trojan

Malum.KHC indications of infection

This symptoms of Malum.KHC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing ICQ.House Trojan
Win32.MSN.Acid Trojan Information
PornDialer Trojan Symptoms
Removing Vxidl.BDO Trojan

SillyDl.BYR Trojan

SillyDl.BYR virus description
Technical details:
Categories: Trojan

SillyDl.BYR indications of infection

This symptoms of SillyDl.BYR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Rbot.Oz Worm
SillyDl.CBV Trojan Information

Professional.Spy.KeyLogger Spyware

Professional.Spy.KeyLogger virus description
Technical details:
Categories: Spyware

Professional.Spy.KeyLogger indications of infection

This symptoms of Professional.Spy.KeyLogger detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
NetSpy.Beta Trojan Removal instruction
Remove Bancos.HOZ Trojan
gureport.co.uk Tracking Cookie Information
PSW.Lmir.ec Trojan Cleaner
Removing Netster.Smart.Browse BHO

Intnter Trojan

Intnter virus description
Technical details:
Categories: Trojan,Spyware,Hacker Tool
Intnter Aliases:
[Panda]Trojan Horse;
[Computer Associates]Win32/Intnter!PWS!Trojan

Intnter indications of infection

This symptoms of Intnter detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Security Toolbar
Aphex's.Polymorphic.Web Downloader Cleaner
Bachdoor.Coldfuson Backdoor Removal

Pigeon.AVEK Trojan

Pigeon.AVEK virus description
Technical details:
Categories: Trojan

Pigeon.AVEK indications of infection

This symptoms of Pigeon.AVEK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CCQ Trojan Symptoms

Bancos.GHN Trojan

Bancos.GHN virus description
Technical details:
Categories: Trojan

Bancos.GHN indications of infection

This symptoms of Bancos.GHN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Striker Trojan Removal

Ultors.Port Trojan

Ultors.Port virus description
Technical details:
Categories: Trojan,Backdoor
Ultors.Port Aliases:
[Kaspersky]Backdoor.Ultor.a,Backdoor.Ultor.b;
[Eset]Win32/Ultor.A trojan,Win32/Ultor.B trojan;
[McAfee]BackDoor-KJ;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Ultor.b,Bck/Utlors;
[Computer Associates]Backdoor/Ultor,Backdoor/Ultor.b,Win32.Ultor

Ultors.Port indications of infection

This symptoms of Ultors.Port detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ToolbarCC BHO Cleaner
Adinf Trojan Removal instruction

QDel166 Trojan

QDel166 virus description
Technical details:
Categories: Trojan
QDel166 Aliases:
[Panda]Trj/W32.Sith;
[Computer Associates]Win32.QDel166,Win32/Sith!Trojan

QDel166 indications of infection

This symptoms of QDel166 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Win95.Bistro Trojan
Remove Delf.gs Backdoor
Petala Trojan Removal instruction
Adware Toolbar Toolbar Removal

Shockdown Downloader

Shockdown virus description
Technical details:
Categories: Downloader
Shockdown Aliases:
[Kaspersky]Trojan-Downlaoder.Win32.Dadobra.af;
[McAfee]Downloader-ABU

Shockdown Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Shockdown indications of infection

This symptoms of Shockdown detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Twinouch Downloader Symptoms
Remove KillAV Trojan
Stratio.BN Worm Removal instruction
Win32.TrojanDownloader.VB.AA3 Downloader Cleaner
EarSpy Spyware Cleaner

TrojanSpy.Win32.Iehack Trojan

TrojanSpy.Win32.Iehack virus description
Technical details:
Categories: Trojan,Spyware
TrojanSpy.Win32.Iehack Aliases:
[Panda]Trojan Horse

TrojanSpy.Win32.Iehack indications of infection

This symptoms of TrojanSpy.Win32.Iehack detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
FakeDel.joke Trojan Cleaner
Remove Cholera@MM Trojan
Remove Import Backdoor

Jadire Trojan

Jadire virus description
Technical details:
Categories: Trojan

Jadire Files:
[%WINDOWS%]\winview.dat
[%WINDOWS%]\winview.exe
[%WINDOWS%]\winview.dat
[%WINDOWS%]\winview.exe

Jadire Registry Keys:
HKEY_CURRENT_USER\software\vb and vba program settings\jadie virus

Jadire Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Jadire indications of infection

This symptoms of Jadire detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TAGutil Trojan Removal instruction
Small.fn Trojan Symptoms

XXXSoft Trojan

XXXSoft virus description
Technical details:
Categories: Trojan

XXXSoft Folders:
[%PROGRAMS%]\XXXSoft
[%PROGRAM_FILES%]\XXXSoft

XXXSoft Registry Keys:
HKEY_CLASSES_ROOT\xxxsoft
HKEY_CURRENT_USER\software\xxxsoft
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\xxxsoft


XXXSoft indications of infection

This symptoms of XXXSoft detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Winnuke Trojan
Vxidl.AMH Trojan Removal
Removing Tiny.DI.Grower Trojan
SillyDl.DMU Trojan Removal instruction

ProtectionBar Trojan

ProtectionBar virus description
Technical details:
Categories: Trojan,Toolbar
ProtectionBar Aliases:
[Kaspersky]AdWare.Win32.ProtectionBar.c,Adware.Win32.ProtectionBar.c,Trojan-Downloader.Win32.Zlob.adl,AdWare.Win32.ProtectionBar.a,AdWare.Win32.ProtectionBar.g,Hoax.Win32.Renos.fo,Hoax.Win32.Renos.fs,AdWare.Win32.ProtectionBar.x,Trojan-Downloader.Win32.Zlob.biu,Trojan-Downloader.Win32.Zlob.acg;
[McAfee]Puper,Puper.dll.gen;
[Other]Win32/Boarim.H,Win32/Boarim.I,Win32.ProtectionBar.J,Hoax.Win32.Renos.ea,Zlob.Media-Codec,Win32/Boarim.M,Win32/Boarim.K,Adware.Win32.ProtectionBar.c,Win32/Boarim.N,Win32/Boarim.O,Trojan.Secup,Win32/Boarim.P,Win32/Borium.T,Win32/Boarim.U,Trojan.Zlob,Win32/Boarim.V,Win32/Boarim.Y,Win32/Boarim.AD,Win32.Boarim.AA,Win32/Boarim.Z,Win32/Boarim.AG,Win32/Boarim.AH

ProtectionBar Files:
[%PROGRAM_FILES%]\Media-Codec\iesuninst.exe
[%PROGRAM_FILES%]\Video ActiveX Access\iesbpl.dll
[%PROGRAM_FILES%]\Media-Codec\iesuninst.exe
[%PROGRAM_FILES%]\Video ActiveX Access\iesbpl.dll

ProtectionBar Registry Keys:
HKEY_CLASSES_ROOT\clsid\{052b12f7-86fa-4921-8482-26c42316b522}

ProtectionBar Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar


ProtectionBar indications of infection

This symptoms of ProtectionBar detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing FCB Trojan

virus description
Technical details:

indications of infection

This symptoms of detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Gliss Trojan

Gliss virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Gliss Aliases:
[Panda]Gliss;
[Computer Associates]Gliss

Gliss indications of infection

This symptoms of Gliss detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
slotchbar Hijacker Cleaner
IRC.Download DoS Symptoms

Pigeon.ENC Trojan

Pigeon.ENC virus description
Technical details:
Categories: Trojan

Pigeon.ENC indications of infection

This symptoms of Pigeon.ENC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Soul Trojan Removal instruction
Berbew.R Trojan Removal instruction
Bancos.AMD Trojan Symptoms
Remove BugsBunny Trojan
Search.Exe Adware Symptoms