Pigeon.AOM Trojan

Pigeon.AOM virus description
Technical details:
Categories: Trojan

Pigeon.AOM indications of infection

This symptoms of Pigeon.AOM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
counter.cnw.cz Tracking Cookie Removal
Web.Ex Trojan Symptoms
Bancos.IED Trojan Symptoms
Agent.qs Backdoor Information
VBS.Bound Trojan Symptoms

SillyDl.DGJ Trojan

SillyDl.DGJ virus description
Technical details:
Categories: Trojan

SillyDl.DGJ indications of infection

This symptoms of SillyDl.DGJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
FormatC!Trojan Trojan Removal instruction

Vundo.dll Trojan

Vundo.dll virus description
Technical details:
Categories: Trojan
Vundo.dll Aliases:
[McAfee]Vundo.dll;
[Other]Win32/Vundo

Vundo.dll indications of infection

This symptoms of Vundo.dll detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing WinBoot Trojan
Removing Vxidl.ABD Trojan
Bossat Backdoor Information
Bancos.HNY Trojan Removal instruction
Removing Bambo Trojan

FR.Lite RAT

FR.Lite virus description
Technical details:
Categories: RAT

FR.Lite indications of infection

This symptoms of FR.Lite detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SCKeyLog.20!Trojan Trojan Symptoms
SillyDl.BZQ Trojan Information
Removing Win32.TudaSuda Trojan
LDL Trojan Information

Pigeon.AVCS Trojan

Pigeon.AVCS virus description
Technical details:
Categories: Trojan

Pigeon.AVCS indications of infection

This symptoms of Pigeon.AVCS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MoneyTree.DyFuCA Trojan Removal instruction
Removing ARCV.Jo Trojan
Setrix Trojan Removal instruction

GhostLog Spyware

GhostLog virus description
Technical details:
Categories: Spyware

GhostLog indications of infection

This symptoms of GhostLog detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Gpix Trojan Information
enilef Downloader Symptoms

Delf.gs Backdoor

Delf.gs virus description
Technical details:
Categories: Backdoor

Delf.gs indications of infection

This symptoms of Delf.gs detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Boot.Payback Trojan Cleaner
SpecialOffers Adware Removal
Flip.It Trojan Information
Removing Limewire Adware

SillyDl.AVS Trojan

SillyDl.AVS virus description
Technical details:
Categories: Trojan

SillyDl.AVS indications of infection

This symptoms of SillyDl.AVS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Exploider Adware Cleaner
Phishbank.AYP Trojan Removal instruction
Aprsvr Trojan Symptoms
Remove JScript.StartMe Trojan

Nimador Backdoor

Nimador virus description
Technical details:
Categories: Backdoor
Nimador Aliases:
[Panda]Backdoor Program

Nimador indications of infection

This symptoms of Nimador detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Applets Trojan Information
Bancos.HWY Trojan Cleaner
Bancos.GSJ Trojan Information
Pigeon.AVBK Trojan Symptoms

Drone Trojan

Drone virus description
Technical details:
Categories: Trojan
Drone Aliases:
[Panda]Trj/W32.Drone,Trj/Drone.B;
[Computer Associates]Win32/Drone.B!Trojan,Win32/Drone.C!Trojan

Drone indications of infection

This symptoms of Drone detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AZM Trojan Removal
Removing Mmwan Adware
Remove MoSucker.plugin Trojan
Zlob.Fam.TrustInBar Trojan Information
Stration!generic Trojan Information

Bat.Sys Trojan

Bat.Sys virus description
Technical details:
Categories: Trojan
Bat.Sys Aliases:
[Kaspersky]BAT.Sys.c;
[Eset]Bat.Sysvir virus;
[Panda]BAT/Sys.602;
[Computer Associates]Bat/Sys.602!Trojan

Bat.Sys indications of infection

This symptoms of Bat.Sys detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VBS.Lospad Trojan Cleaner

Netscreen RAT

Netscreen virus description
Technical details:
Categories: RAT

Netscreen Registry Values:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run


Netscreen indications of infection

This symptoms of Netscreen detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EOC Trojan Removal
Remove VirusProtectPro Ransomware
PWS.Kcom.gen Trojan Cleaner
vml.com Tracking Cookie Removal
Lythium Trojan Removal instruction

Locators BHO

Locators virus description
Technical details:
Categories: BHO,Toolbar

Locators Files:
[%SYSTEM%]\locators.dll
[%SYSTEM%]\uninst-locators.exe
[%WINDOWS%]\lctappend.txt
[%WINDOWS%]\lctkeys.txt
[%WINDOWS%]\lupdtr.exe
[%WINDOWS%]\system\locators.dll
[%SYSTEM%]\locators.dll
[%SYSTEM%]\uninst-locators.exe
[%WINDOWS%]\lctappend.txt
[%WINDOWS%]\lctkeys.txt
[%WINDOWS%]\lupdtr.exe
[%WINDOWS%]\system\locators.dll

Locators Registry Keys:
HKEY_CLASSES_ROOT\clsid\{e720b458-b65a-438c-9ff3-b1df65d7db3f}
HKEY_LOCAL_MACHINE\software\classes\clsid\{e720b458-b65a-438c-9ff3-b1df65d7db3f}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\extensions\{a26abcf0-1c8f-46e7-a67c-0489dc21b9cc}
HKEY_CLASSES_ROOT\clsid\{4e7bd74f-2b8d-469e-92b0-a921f8d5e22e}
HKEY_CLASSES_ROOT\clsid\{4e7bd74f-2b8d-469e-92b0-a921f8d5e22f}
HKEY_CLASSES_ROOT\clsid\{4e7bd74f-2b8d-469e-92b0-a921f8d5e230}
HKEY_CLASSES_ROOT\clsid\{e720b458-b65a-438c-9ff3-b1df65d7db3e}
HKEY_CLASSES_ROOT\interface\{ab88fc82-fcdc-4062-bcc4-887f0d73ec1d}
HKEY_CLASSES_ROOT\locators.locatorbar
HKEY_CLASSES_ROOT\locators.locatorbar.1
HKEY_CLASSES_ROOT\locators.locatorlinks
HKEY_CLASSES_ROOT\locators.locatorlinks.1
HKEY_CLASSES_ROOT\locatorstoolbar.locatorstoolbar
HKEY_CLASSES_ROOT\locatorstoolbar.locatorstoolbarmenu button
HKEY_CLASSES_ROOT\locatorstoolbar.locatorstoolbartoggle button
HKEY_CLASSES_ROOT\typelib\{b4f8e732-4793-4f90-b40a-829331861d54}
HKEY_CURRENT_USER\software\locatorstoolbar toolbar
HKEY_CURRENT_USER\software\microsoft\internet explorer\locators toolbar
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser\{4e7bd74f-2b8d-469e-92b0-a921f8d5e22e}
HKEY_LOCAL_MACHINE\software\classes\clsid\{e720b458-b65a-438c-9ff3-b1df65d7db3e}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{4e7bd74f-2b8d-469e-92b0-a921f8d5e22e}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar\{4e7bd74f-2b8d-469e-92b0-a921f8d5e22e}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar\{e720b458-b65a-438c-9ff3-b1df65d7db3e}
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar\{e720b458-b65a-438c-9ff3-b1df65d7db3f}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{4e7bd74f-2b8d-469e-92b0-a921f8d5e22e}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\locators toolbar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\locatorstoolbar

Locators Registry Values:
HKEY_CURRENT_USER\software\microsoft\search assistant
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\search assistant
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar


Locators indications of infection

This symptoms of Locators detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Small.Bve Downloader Cleaner
Removing OmegaSearch Hijacker
Brute.Force Backdoor Symptoms

SpyLab.WebSpy Spyware

SpyLab.WebSpy virus description
Technical details:
Categories: Spyware

SpyLab.WebSpy Folders:
[%PROGRAM_FILES%]\spylab

SpyLab.WebSpy Files:
[%COMMON_PROGRAMS%]\Spylab WebSpy\Spylab WebSpy.lnk
[%COMMON_PROGRAMS%]\Spylab WebSpy\Uninstall Spylab WebSpy.lnk
[%COMMON_PROGRAMS%]\Spylab WebSpy\WebSpy Help.lnk
[%COMMON_PROGRAMS%]\Spylab WebSpy\WebSpy On The Web.lnk
[%DESKTOP%]\Spylab WebSpy.lnk
[%SYSTEM%]\WebSpy.lnk
[%COMMON_PROGRAMS%]\Spylab WebSpy\Spylab WebSpy.lnk
[%COMMON_PROGRAMS%]\Spylab WebSpy\Uninstall Spylab WebSpy.lnk
[%COMMON_PROGRAMS%]\Spylab WebSpy\WebSpy Help.lnk
[%COMMON_PROGRAMS%]\Spylab WebSpy\WebSpy On The Web.lnk
[%DESKTOP%]\Spylab WebSpy.lnk
[%SYSTEM%]\WebSpy.lnk

SpyLab.WebSpy Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


SpyLab.WebSpy indications of infection

This symptoms of SpyLab.WebSpy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ubersor Backdoor Information
Remove Bancos.GRA Trojan
Remove StartPage.aba Hijacker
Removing W16.Redteam Trojan

Proxy.Thrap Trojan

Proxy.Thrap virus description
Technical details:
Categories: Trojan
Proxy.Thrap Aliases:
[McAfee]Proxy-Thrap;
[Other]Win32/Thrap.B

Proxy.Thrap indications of infection

This symptoms of Proxy.Thrap detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MalwarePro Ransomware Removal
Dailytoolbar Adware Symptoms
Removing Bancos.GGT Trojan

Bancos.HCW Trojan

Bancos.HCW virus description
Technical details:
Categories: Trojan

Bancos.HCW indications of infection

This symptoms of Bancos.HCW detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GGD Trojan Cleaner
Vxidl.AME Trojan Symptoms
Spam.Mailbot Trojan Information
Stimp Trojan Information
Removing PeopleOnPage.Apropos BHO

Surfs BHO

Surfs virus description
Technical details:
Categories: BHO

Surfs indications of infection

This symptoms of Surfs detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.EEP Trojan
Removing Orig RAT
Tolbuhin Trojan Symptoms
Pigeon.generic Trojan Cleaner
HideExec Trojan Removal

Xexeaw Trojan

Xexeaw virus description
Technical details:
Categories: Trojan
Xexeaw Aliases:
[Panda]Trj/Xexe;
[Computer Associates]Xexeaw,Xexeaw!Trojan

Xexeaw indications of infection

This symptoms of Xexeaw detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Delf.cn Adware Information
Pigeon.ECF Trojan Symptoms
FDoS.ICQToolz DoS Removal instruction
Remove Cruncher Trojan
Removing Reverse Trojan

Pigeon.EQS Trojan

Pigeon.EQS virus description
Technical details:
Categories: Trojan

Pigeon.EQS indications of infection

This symptoms of Pigeon.EQS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Split.Second Trojan
Doomsday Trojan Removal
Mosucker Trojan Symptoms

regaccount.com Tracking Cookie

regaccount.com virus description
Technical details:
Categories: Tracking Cookie

regaccount.com indications of infection

This symptoms of regaccount.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing TMouse Trojan
Remove TrojanClicker.Win32.VB.bg Trojan
Remove Winbudget Adware
Fupgrade Trojan Symptoms
Pigeon.BBS Trojan Cleaner