Pigeon.AOR Trojan

Pigeon.AOR virus description
Technical details:
Categories: Trojan

Pigeon.AOR indications of infection

This symptoms of Pigeon.AOR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AQT Trojan Removal

Sacri Backdoor

Sacri virus description
Technical details:
Categories: Backdoor

Sacri indications of infection

This symptoms of Sacri detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Arusiek Trojan Removal instruction
Puddy Trojan Symptoms

Pigeon.AVRA Trojan

Pigeon.AVRA virus description
Technical details:
Categories: Trojan

Pigeon.AVRA indications of infection

This symptoms of Pigeon.AVRA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
BDPlugin BHO Removal instruction
KillSpy Ransomware Cleaner
Remove Banhosts Hijacker
Pigeon.AVFP Trojan Removal

Bakanix Trojan

Bakanix virus description
Technical details:
Categories: Trojan,Spyware
Bakanix Aliases:
[Panda]Trj/Xidama.A;
[Computer Associates]Win32.Bakanix,Win32/Bancos!PWS!HookDLL!Trojan

Bakanix indications of infection

This symptoms of Bakanix detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ScreenView RAT Information

Agonda.2XD Trojan

Agonda.2XD virus description
Technical details:
Categories: Trojan
Agonda.2XD Aliases:
[Kaspersky]Trojan-Clicker.Win32.BHO.i;
[Other]Hijacker.BHO.i,W32/DLoader.AIYY

Agonda.2XD Files:
[%SYSTEM%]\inetreser.dll
[%WINDOWS%]\system\20312.exe
[%SYSTEM%]\inetreser.dll
[%WINDOWS%]\system\20312.exe

Agonda.2XD Registry Keys:
HKEY_CLASSES_ROOT\clsid\{50297a03-863a-47c6-98f8-9fe6c44fdd63}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{50297a03-863a-47c6-98f8-9fe6c44fdd63}


Agonda.2XD indications of infection

This symptoms of Agonda.2XD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SillyDl.CFN Trojan
Removing StartPage.bf Hijacker
Remove TrojanDownloader.Win32.Revop Trojan
IRC.Client DoS Removal
SillyDl.BYV Trojan Cleaner

Nuke.HUC Trojan

Nuke.HUC virus description
Technical details:
Categories: Trojan,Hacker Tool
Nuke.HUC Aliases:
[McAfee]Nuke-HUC;
[F-Prot]security risk or a "backdoor" program;
[Panda]Trj/Hunuker;
[Computer Associates]Win32/Hunuker!Trojan

Nuke.HUC indications of infection

This symptoms of Nuke.HUC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Dyfuca.cw Downloader Cleaner
freenet.de Tracking Cookie Symptoms
Remove IEDLL.ToonComics Adware
SiteHistory BHO Removal instruction

TrojanDownloader.Win32.Miled Trojan

TrojanDownloader.Win32.Miled virus description
Technical details:
Categories: Trojan,Downloader
TrojanDownloader.Win32.Miled Aliases:
[Panda]Trj/Downloader.LE

TrojanDownloader.Win32.Miled indications of infection

This symptoms of TrojanDownloader.Win32.Miled detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Vxidl.AWH Trojan
Phishbank.AOY Trojan Information

Syn DoS

Syn virus description
Technical details:
Categories: DoS

Syn indications of infection

This symptoms of Syn detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
EarSpy Spyware Symptoms
Remove QDown Downloader
Removing Vxidl.ATE Trojan
TopLeftBlack Trojan Removal
Win32.VisualServer Trojan Cleaner

Pigeon.AVML Trojan

Pigeon.AVML virus description
Technical details:
Categories: Trojan

Pigeon.AVML indications of infection

This symptoms of Pigeon.AVML detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Moiling Trojan Removal
Remove WAN.Remote Trojan
Remove IRC.Flood.ak Worm
SillyDl.CON Downloader Cleaner

Snap.UltraSearch Toolbar

Snap.UltraSearch virus description
Technical details:
Categories: Toolbar

Snap.UltraSearch indications of infection

This symptoms of Snap.UltraSearch detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AYM Trojan Removal
Remove logger.co.kr Tracking Cookie

Anarchy.Family Trojan

Anarchy.Family virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Anarchy.Family Aliases:
[Kaspersky]G2-based;
[Panda]G2.gen,G2-Based.585,Univ;
[Computer Associates]PS-MPC

Anarchy.Family Files:
[%WINDOWS%]\inf\Belt.inf
[%WINDOWS%]\inf\Belt.inf


Anarchy.Family indications of infection

This symptoms of Anarchy.Family detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.IEC Trojan Removal
Remove Notiex Trojan
Myss Trojan Removal
Remove VB.fu Trojan
Bobninja Trojan Symptoms

ICQ.Rev Trojan

ICQ.Rev virus description
Technical details:
Categories: Trojan,Worm,RAT
ICQ.Rev Aliases:
[Kaspersky]Trojan.Win32.ICKiller.Rev,Worm.P2P.Tanked.11;
[McAfee]ICQ-Rev;
[F-Prot]destructive program;
[Panda]Trj/ICKiller.Rev,W32/Kwbot.J.worm;
[Computer Associates]QJamer!Trojan,Win32.ICQRev,Win32.Tank.A,Win32/Tank!Worm

ICQ.Rev indications of infection

This symptoms of ICQ.Rev detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
DoDoor Adware Cleaner

Pigeon.AYP Trojan

Pigeon.AYP virus description
Technical details:
Categories: Trojan

Pigeon.AYP indications of infection

This symptoms of Pigeon.AYP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Zango.TV.Times Adware Removal instruction

Akosh Trojan

Akosh virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Akosh Aliases:
[Kaspersky]Backdoor.Akosch.4;
[Eset]Win32/Akosch.4 trojan;
[McAfee]BackDoor-XU;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program,Backdoor Program.LC

Akosh indications of infection

This symptoms of Akosh detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
XICMP DoS Information
Ishowbao BHO Symptoms
Bancos.GQO Trojan Removal instruction
Fluxay46 Backdoor Symptoms
Agent.bc Trojan Information

Win32.HLLP.DeTroie Trojan

Win32.HLLP.DeTroie virus description
Technical details:
Categories: Trojan
Win32.HLLP.DeTroie Aliases:
[Kaspersky]Virus.Win32.HLLP.DeTroie;
[McAfee]W32/Cheval;
[F-Prot]W32/HLLP.DeTroie.dropper;
[Panda]Trj/Socket25.Drp;
[Computer Associates]Win32.DeTroie.C

Win32.HLLP.DeTroie indications of infection

This symptoms of Win32.HLLP.DeTroie detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Backdoor.AZV.Variant Trojan Cleaner
Remove W95.Putita Trojan

W95.Iced Trojan

W95.Iced virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
W95.Iced Aliases:
[Kaspersky]Win95.Iced.1617,Win95.Iced.1344,Win95.Iced.2112;
[McAfee]W95/Iced;
[F-Prot]W32/Iced.1617;
[Panda]W95/Iced.1344,W95/Iced.2112,W95/Iced.1617.Drp;
[Computer Associates]Win95.IcedEarth.1617,Win95/IceEarth-1617,Win32.Iced.1344,Win32/Aztec.1344,Win32.Iced.1412,Win95/Paradise.2112

W95.Iced indications of infection

This symptoms of W95.Iced detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
BPath.com Tracking Cookie Symptoms
Removing Vxidl.ABS Trojan
Removing Stration.4gf! Trojan
EMA.Info.Grabber Spyware Symptoms
Bancos.GQE Trojan Cleaner

Backdoor.Freddy Backdoor

Backdoor.Freddy virus description
Technical details:
Categories: Backdoor
Backdoor.Freddy Aliases:
[Kaspersky]Backdoor.Freddy.02.b;
[McAfee]BackDoor-JX;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/FrediK.b2

Backdoor.Freddy indications of infection

This symptoms of Backdoor.Freddy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Startpage.GZ1 Trojan Removal instruction
Microphone.Recorder Backdoor Removal instruction
WinSpy Trojan Information
Forkey Trojan Removal
Removing Maxserving Tracking Cookie

Arturik Trojan

Arturik virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Arturik Aliases:
[Kaspersky]Backdoor.Fatroj.10.a;
[Eset]Win32/Fatroj.10.Client trojan,Win32/Fatroj.10.Server trojan;
[Panda]Backdoor Program,Bck/Fatroj.10;
[Computer Associates]Backdoor/Fatroj.1_0.Server,Win32.Fatroj.10

Arturik indications of infection

This symptoms of Arturik detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ads.adsag Tracking Cookie Cleaner
Malicious Trojan Removal instruction
Small.iz Trojan Symptoms

Malum.KQY Trojan

Malum.KQY virus description
Technical details:
Categories: Trojan

Malum.KQY indications of infection

This symptoms of Malum.KQY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
H91746 Trojan Symptoms
Remove Vxidl.BFG Trojan
Buy.com Tracking Cookie Symptoms

voloper.net Tracking Cookie

voloper.net virus description
Technical details:
Categories: Tracking Cookie

voloper.net indications of infection

This symptoms of voloper.net detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove VB.dj Downloader
Pigeon.AVKM Trojan Symptoms
Pigeon.AVCG Trojan Removal instruction
Voyager Trojan Removal instruction
Sbsoft Trojan Cleaner

Pigeon.EFT Trojan

Pigeon.EFT virus description
Technical details:
Categories: Trojan

Pigeon.EFT indications of infection

This symptoms of Pigeon.EFT detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Deloder RAT

SillyDl.DGQ Trojan

SillyDl.DGQ virus description
Technical details:
Categories: Trojan

SillyDl.DGQ indications of infection

This symptoms of SillyDl.DGQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.EOE Trojan
Win32.Rebooter Trojan Removal instruction
Sucker.Matrix RAT Removal instruction
CProc Downloader Symptoms