Macro Trojan

Macro virus description
Technical details:
Categories: Trojan

Macro indications of infection

This symptoms of Macro detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Visi?n.de.Control Backdoor Information
Sadbiz Trojan Information

SdBot.ca Backdoor

SdBot.ca virus description
Technical details:
Categories: Backdoor

SdBot.ca indications of infection

This symptoms of SdBot.ca detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
HueyIns RAT Removal
TrojanDropper.Win32.Sekan Trojan Removal
DLP Backdoor Information
API.PM.Bomber Trojan Cleaner

Pigeon.ERI Trojan

Pigeon.ERI virus description
Technical details:
Categories: Trojan

Pigeon.ERI indications of infection

This symptoms of Pigeon.ERI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
GamesSpy.com Tracking Cookie Removal

ILL.Eagle RAT

ILL.Eagle virus description
Technical details:
Categories: RAT

ILL.Eagle indications of infection

This symptoms of ILL.Eagle detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.DelAll Trojan Cleaner

Agent.dd Adware

Agent.dd virus description
Technical details:
Categories: Adware

Agent.dd indications of infection

This symptoms of Agent.dd detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
AIM.Watch Trojan Removal
Removing MasterU RAT
Remove StartMake.com Toolbar
Bancos.CHV Trojan Cleaner
Win32.Spyboter Trojan Cleaner

AIM.Watch Trojan

AIM.Watch virus description
Technical details:
Categories: Trojan,Backdoor
AIM.Watch Aliases:
[Kaspersky]Backdoor.AIMFrame;
[Eset]Win32/AIMFrame.A trojan;
[McAfee]AIM-Watch;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program,Bck/Generic;
[Computer Associates]Win32.AimWatch.20,Win32/AimFrame.IP_Stealer.Trojan,Win32/Aimframe.Trojan

AIM.Watch indications of infection

This symptoms of AIM.Watch detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Sleeper Trojan Cleaner
Removing Pigeon.DZX Trojan

Pigeon.AVRC Trojan

Pigeon.AVRC virus description
Technical details:
Categories: Trojan

Pigeon.AVRC indications of infection

This symptoms of Pigeon.AVRC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Priosted Trojan Removal instruction
Delf.mt Backdoor Symptoms
Remove Manarbes Adware
Remove WurldMedia.MShop Hijacker

Bancos.GPQ Trojan

Bancos.GPQ virus description
Technical details:
Categories: Trojan

Bancos.GPQ indications of infection

This symptoms of Bancos.GPQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Win32.VB.tg Trojan
Removing DlRage Trojan
Landmine DoS Symptoms
Remove addcontrol.net Tracking Cookie

DlHeart Trojan

DlHeart virus description
Technical details:
Categories: Trojan

DlHeart indications of infection

This symptoms of DlHeart detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.ARE Trojan Information
Win32.Arps Trojan Symptoms
WinSATAN Trojan Cleaner

Goldun Trojan

Goldun virus description
Technical details:
Categories: Trojan,Spyware
Goldun Aliases:
[Kaspersky]Trojan-Spy.Win32.Goldun.mx,Trohan-Spyware.Goldun.Im,Trojan-Spy.Win32.Goldun.pf;
[McAfee]PWS-Goldun.dll;
[F-Prot]W32/Goldun.NR,W32/Trojan-Dlr-SysWrt-based!Maximus;
[Panda]Trj/Banker.IKQ;
[Other]Trojan.Goldun,TSPY_GOLDUN.GL,Trojan.Goldun.M,Goldun.Fam,trojan-backdoor-goldun,Mal/Packer

Goldun Files:
[%SYSTEM%]\wmdconf32.dll
[%SYSTEM%]\wmdconf32.dll

Goldun Registry Keys:
HKEY_CLASSES_ROOT\clsid\{92617934-9abc-def0-0fed-fad48c654321}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{92617934-9abc-def0-0fed-fad48c654321}

Goldun Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Goldun indications of infection

This symptoms of Goldun detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Rbot.AZC Worm
Removing Farmmext Adware

Mywife.C Worm

Mywife.C virus description
Technical details:
Categories: Worm

Mywife.C indications of infection

This symptoms of Mywife.C detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MalwarePro Ransomware Removal instruction
Removing ABetterInternet.Ceres Adware
LiveProtection Ransomware Information

CashFiesta Adware

CashFiesta virus description
Technical details:
Categories: Adware

CashFiesta indications of infection

This symptoms of CashFiesta detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Seventh.son Trojan
StatBlaster Adware Cleaner
Generic Trojan Trojan Cleaner
SillyDl.CAF Downloader Removal instruction

Delf.aeo Downloader

Delf.aeo virus description
Technical details:
Categories: Downloader,Trojan

Delf.aeo indications of infection

This symptoms of Delf.aeo detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GGC Trojan Removal
VB.bt Backdoor Removal instruction
TrojanDownloader.Win32.Small.ah Trojan Removal instruction

SillyDl.CSI Trojan

SillyDl.CSI virus description
Technical details:
Categories: Trojan

SillyDl.CSI indications of infection

This symptoms of SillyDl.CSI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Bat.Virusm Trojan
sportsline.com Tracking Cookie Removal instruction
Pigeon.EUR Trojan Removal

Spy.CQMA Trojan

Spy.CQMA virus description
Technical details:
Categories: Trojan,Spyware,Hacker Tool
Spy.CQMA Aliases:
[Kaspersky]TrojanSpy.Win32.CQMA.15;
[F-Prot]->exefile is a destructive program;
[Panda]Trojan Horse;
[Computer Associates]Win32/Cqma.15!Trojan

Spy.CQMA indications of infection

This symptoms of Spy.CQMA detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EJU Trojan Symptoms
DelfBanload.Variant!Trojan Trojan Information
Backdoor.GirlFriend.3!Server Backdoor Cleaner
Remove Keyboard.Logger Spyware
CryptDrive Ransomware Removal instruction

Kewrih Trojan

Kewrih virus description
Technical details:
Categories: Trojan

Kewrih indications of infection

This symptoms of Kewrih detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove WWW2.SkooBiDoo Tracking Cookie
Remove Bancos.GZJ Trojan
Remove The.mstream.distributed.denial.of.service.attack.tool DoS
Screen.Cutter RAT Information

Vxidl.ABH Trojan

Vxidl.ABH virus description
Technical details:
Categories: Trojan

Vxidl.ABH indications of infection

This symptoms of Vxidl.ABH detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Agent.ax Trojan Removal
SMS.Bomb DoS Symptoms
TrafficSector BHO Cleaner
Projectx Trojan Information
Tivedo Trojan Removal

DLP Backdoor

DLP virus description
Technical details:
Categories: Backdoor

DLP Files:
[%WINDOWS%]\system\syslp.exe
[%WINDOWS%]\windows\syslog.exe
[%WINDOWS%]\system\syslp.exe
[%WINDOWS%]\windows\syslog.exe


DLP indications of infection

This symptoms of DLP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AEQ Trojan Cleaner
XP.Logger Spyware Removal
Removing Basic.CD.Tray.Opener Trojan
IGMP.Lanxue DoS Symptoms

SillyDl.CJK Trojan

SillyDl.CJK virus description
Technical details:
Categories: Trojan

SillyDl.CJK indications of infection

This symptoms of SillyDl.CJK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
DirtyGuy Trojan Symptoms

Wildek Trojan

Wildek virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Wildek Aliases:
[Kaspersky]Backdoor.Wildek.01,Backdoor.Wildek.02.b,Backdoor.Wildek.03,Backdoor.Wildek.02.a;
[Eset]Win32/Wildek.03 trojan;
[McAfee]BackDoor-WC;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program,Bck/Wildek.02B,Bck/Wildek.03,Backdoor Program.LC,Bck/Wildek.02;
[Computer Associates]Backdoor/Wildek.03,Win32.Wildek.03,Backdoor/Wildek.02,Win32.Wildek.02

Wildek indications of infection

This symptoms of Wildek detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Ullysse RAT Cleaner

Bat.Lifeshit Trojan

Bat.Lifeshit virus description
Technical details:
Categories: Trojan
Bat.Lifeshit Aliases:
[Eset]BAT/Life.1066 virus;
[Panda]BAT/Life.1066;
[Computer Associates]Bat/Lifeshit

Bat.Lifeshit indications of infection

This symptoms of Bat.Lifeshit detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PWS.Fib Trojan Cleaner
Win32.VB.cd Trojan Removal
DotCom Adware Removal

Pigeon.EUD Trojan

Pigeon.EUD virus description
Technical details:
Categories: Trojan

Pigeon.EUD indications of infection

This symptoms of Pigeon.EUD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SuperBoot DoS
Remove Pigeon.EIF Trojan
Remove InLook.01c Backdoor

TrojanProxy.Win32.Mitglieder Worm

TrojanProxy.Win32.Mitglieder virus description
Technical details:
Categories: Worm,Hacker Tool
TrojanProxy.Win32.Mitglieder Aliases:
[Kaspersky]TrojanProxy.Win32.Mitglieder.gen;
[Panda]W32/Mitglieder.J.worm;
[Computer Associates]Win32.Mitglieder.AD,Win32/SMProxy.P!Trojan

TrojanProxy.Win32.Mitglieder indications of infection

This symptoms of TrojanProxy.Win32.Mitglieder detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
DelComm Trojan Information
Remove hbv.de Tracking Cookie

Ineta.Dll Trojan

Ineta.Dll virus description
Technical details:
Categories: Trojan,Backdoor
Ineta.Dll Aliases:
[Eset]Win32/Ineta trojan;
[Computer Associates]Backdoor/Ineta.Dll,Win32.Ineta

Ineta.Dll indications of infection

This symptoms of Ineta.Dll detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EHF Trojan Cleaner
Removing Frethog.ADV Trojan

Bancos.GBU Trojan

Bancos.GBU virus description
Technical details:
Categories: Trojan

Bancos.GBU indications of infection

This symptoms of Bancos.GBU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MegaToolbar BHO Information
Remove R0xr4t.0b2 RAT

Semtex Trojan

Semtex virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Semtex Aliases:
[Kaspersky]Semtex.1000.a,Semtex.619;
[Panda]Semtex;
[Computer Associates]Semtex

Semtex indications of infection

This symptoms of Semtex detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.ABR Trojan Cleaner
Pigeon.AVHZ Trojan Information
Win32.bh Adware Removal
Bancos.GQR Trojan Cleaner
Donise Trojan Cleaner

TrojanDownloader.Win32.Agent.eb Trojan

TrojanDownloader.Win32.Agent.eb virus description
Technical details:
Categories: Trojan
TrojanDownloader.Win32.Agent.eb Aliases:
[Kaspersky]Trojan-Downloader.Win32.Agent.eb

TrojanDownloader.Win32.Agent.eb indications of infection

This symptoms of TrojanDownloader.Win32.Agent.eb detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ZeroPopupBar Adware Symptoms
Nina Trojan Removal instruction