Mantice Spyware

Mantice virus description
Technical details:
Categories: Spyware,Backdoor,RAT
Mantice Aliases:
[Kaspersky]Backdoor.Mantice.10;
[McAfee]BackDoor-ADN;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/Mantice.10;
[Computer Associates]Backdoor/Mantice.10,Win32.Mantice.10

Mantice indications of infection

This symptoms of Mantice detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.BAA Trojan
Removing Scoati Trojan
SillyDl.DHR Trojan Removal instruction

Bingle Trojan

Bingle virus description
Technical details:
Categories: Trojan,Backdoor
Bingle Aliases:
[Eset]Win32/Bingle.10 trojan;
[Panda]Backdoor Program,Trojan Horse;
[Computer Associates]Backdoor/Bingle.10!Server

Bingle indications of infection

This symptoms of Bingle detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AZM Trojan Cleaner
Ratpack Backdoor Removal
Astef (ReSpan) Worm Information

SillyDl.CBG Trojan

SillyDl.CBG virus description
Technical details:
Categories: Trojan

SillyDl.CBG indications of infection

This symptoms of SillyDl.CBG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
BlueeScreenBooter2 DoS Symptoms

Small.bug Downloader

Small.bug virus description
Technical details:
Categories: Downloader

Small.bug Files:
[%SYSTEM%]\a1\rarndrll2.exe
[%SYSTEM%]\c3\dnslook11.exe
[%SYSTEM%]\f1\dnslook11.exe
[%SYSTEM%]\frd1\dnslook11.exe
[%SYSTEM%]\rev1\logidndr1.exe
[%WINDOWS%]\MTE3NDI6ODoxNg.exe
[%SYSTEM%]\a1\rarndrll2.exe
[%SYSTEM%]\c3\dnslook11.exe
[%SYSTEM%]\f1\dnslook11.exe
[%SYSTEM%]\frd1\dnslook11.exe
[%SYSTEM%]\rev1\logidndr1.exe
[%WINDOWS%]\MTE3NDI6ODoxNg.exe

Small.bug Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies
HKEY_LOCAL_MACHINE\SOFTWARE\Policies
HKEY_LOCAL_MACHINE\SOFTWARE\Policies
HKEY_LOCAL_MACHINE\SOFTWARE\Policies
HKEY_LOCAL_MACHINE\SOFTWARE\Policies
HKEY_LOCAL_MACHINE\SOFTWARE\Policies
HKEY_LOCAL_MACHINE\SOFTWARE\Policies
HKEY_LOCAL_MACHINE\SOFTWARE\Policies
HKEY_LOCAL_MACHINE\SOFTWARE\Policies
HKEY_LOCAL_MACHINE\SOFTWARE\Policies
HKEY_LOCAL_MACHINE\SOFTWARE\Policies
HKEY_LOCAL_MACHINE\SOFTWARE\Policies
HKEY_LOCAL_MACHINE\SOFTWARE\Policies
HKEY_LOCAL_MACHINE\software\policies
HKEY_LOCAL_MACHINE\SOFTWARE\Policies
HKEY_LOCAL_MACHINE\software\policies


Small.bug indications of infection

This symptoms of Small.bug detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Megago.com Tracking Cookie Removal

Wopla.ag Trojan

Wopla.ag virus description
Technical details:
Categories: Trojan

Wopla.ag indications of infection

This symptoms of Wopla.ag detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove BitchX Hacker Tool

Windir.SXS Trojan

Windir.SXS virus description
Technical details:
Categories: Trojan

Windir.SXS indications of infection

This symptoms of Windir.SXS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Try2Find Adware Information
Removing JS.Bagle Trojan
JS.MHTMLRedir Trojan Removal

IRC.Sdbot Trojan

IRC.Sdbot virus description
Technical details:
Categories: Trojan,Worm,Backdoor,RAT,DoS
IRC.Sdbot Aliases:
[Kaspersky]Backdoor.SdBot.05.c,Backdoor.IRCBot.gen,Backdoor.Win32.SdBot.gen;
[Eset]IRC/SdBot.JY trojan,IRC/SdBot.LN trojan,IRC/SdBot.XC trojan;
[McAfee]IRC-Sdbot;
[F-Prot]security risk or a "backdoor" program;
[Computer Associates]Win32.Sdbot.ER

IRC.Sdbot indications of infection

This symptoms of IRC.Sdbot detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove NetKey Backdoor
TrojanClicker.Win32.XMedia Trojan Removal
OcyKeySpy Spyware Information

Free.Community BHO

Free.Community virus description
Technical details:
Categories: BHO
Free.Community Aliases:
[Panda]Adware/SearchAid

Free.Community Folders:
[%PROGRAM_FILES%]\submit


Free.Community indications of infection

This symptoms of Free.Community detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Averub Trojan Cleaner
Removing Pigeon.DZU Trojan
TrojanDownloader.VBS.Codin Trojan Removal
Remove Ofrel Adware
Vxidl.AKQ Trojan Removal instruction

Tuloti Trojan

Tuloti virus description
Technical details:
Categories: Trojan

Tuloti indications of infection

This symptoms of Tuloti detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing WordMacro.Stupid.A:trojan Trojan
Removing Systrim Trojan
AdvertBar Adware Removal
Small.in Downloader Cleaner

Insuff Trojan

Insuff virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Insuff Aliases:
[Kaspersky]Companion.Insuff.514,MtE.Insuff.a;
[McAfee]Insufficient.cmp;
[F-Prot]Insuff.514.B - Dropper;
[Panda]Comp.Insuff.514,Insuff.2712#MtE,Insuff.6558#MtE,Insuff.6574#MtE;
[Computer Associates]Insuff.514,MtE DAME

Insuff indications of infection

This symptoms of Insuff detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AAQ Trojan Information
SillyRC Trojan Removal instruction

NLM.Burglar Trojan

NLM.Burglar virus description
Technical details:
Categories: Trojan,Hacker Tool
NLM.Burglar Aliases:
[Kaspersky]Trojan.Novell.Burglar;
[Eset]Novell/Burglar.A trojan;
[Panda]Trj/Novell.Burglar;
[Computer Associates]NLM/Burglar!Trojan

NLM.Burglar indications of infection

This symptoms of NLM.Burglar detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HSN Trojan Information
ro2cn Adware Information

NucScan.Sabine Trojan

NucScan.Sabine virus description
Technical details:
Categories: Trojan
NucScan.Sabine Aliases:
[Panda]Trojan Horse;
[Computer Associates]Win32/NucScan.Sabine.A!Trojan

NucScan.Sabine indications of infection

This symptoms of NucScan.Sabine detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Ditul Trojan
Remove Ultimate Fixer Ransomware

SatanzCrew Backdoor

SatanzCrew virus description
Technical details:
Categories: Backdoor,Hacker Tool
SatanzCrew Aliases:
[Kaspersky]Backdoor.SatanCrew;
[McAfee]MultiPager-B;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program

SatanzCrew indications of infection

This symptoms of SatanzCrew detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Marked Trojan Removal instruction

Talpalk Trojan

Talpalk virus description
Technical details:
Categories: Trojan
Talpalk Aliases:
[Kaspersky]Trojan-PSW.Win32.Agent.dm,Trojan-PSW.Win32.Agent.me1;
[McAfee]Generic PWS.y;
[Other]Win32/Talpalk,Win32/Talpalk.B,Infostealer,Trojan.Flush.G

Talpalk Files:
[%WINDOWS%]\jengel.exe
[%WINDOWS%]\menb.dll
[%WINDOWS%]\rundll23.exe
[%WINDOWS%]\jengel.exe
[%WINDOWS%]\menb.dll
[%WINDOWS%]\rundll23.exe


Talpalk indications of infection

This symptoms of Talpalk detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVPN Trojan Information
Random.Text DoS Cleaner
Ugly Trojan Symptoms
Brain.Wiper Trojan Removal

PopupWithCast Adware

PopupWithCast virus description
Technical details:
Categories: Adware
PopupWithCast Aliases:
[Other]MediaMotor.Popupwithcast

PopupWithCast Folders:
[%PROGRAM_FILES%]\popupwithcast

PopupWithCast Files:
[%WINDOWS%]\popupwithcast.exe
[%WINDOWS%]\popupwithcast.exe

PopupWithCast Registry Values:
HKEY_CURRENT_USER\software\winrar sfx
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\software\winrar sfx
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


PopupWithCast indications of infection

This symptoms of PopupWithCast detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove IRC.SdBot.ATH Trojan
Backdoor.Eclypse!Server Backdoor Information
Neo.City Trojan Symptoms
Pigeon.AVUJ Trojan Information
Alexa BHO Cleaner

Agent.hm Trojan

Agent.hm virus description
Technical details:
Categories: Trojan

Agent.hm indications of infection

This symptoms of Agent.hm detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing AXW Backdoor
TKitSpy Spyware Information
Pigeon.AVEA Trojan Information
QDel167 Trojan Symptoms
Removing Mumb Trojan

Floodz Trojan

Floodz virus description
Technical details:
Categories: Trojan,Backdoor,DoS
Floodz Aliases:
[Eset]Win32/IRC.Floodz.A trojan,Win32/IRC.Floodz.B trojan;
[Computer Associates]Win32/Floodz.A.Trojan,Win32/Floodz.B.Trojan

Floodz indications of infection

This symptoms of Floodz detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CJA Downloader Removal instruction
Library Trojan Removal instruction

VB.yq Backdoor

VB.yq virus description
Technical details:
Categories: Backdoor

VB.yq indications of infection

This symptoms of VB.yq detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Win32.NetControl Trojan
WinReg.NotePadInMenu Trojan Information

JS.Ridnu Trojan

JS.Ridnu virus description
Technical details:
Categories: Trojan

JS.Ridnu indications of infection

This symptoms of JS.Ridnu detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.AVRN Trojan
Xrenoder Adware Information
easy.ad.info Tracking Cookie Cleaner
Bancos.FWW Trojan Cleaner
Prospero Trojan Symptoms

SpammerDLL Trojan

SpammerDLL virus description
Technical details:
Categories: Trojan
SpammerDLL Aliases:
[Kaspersky]Trojan.Win32.Agent.pk;
[Other]Spam-DComServ

SpammerDLL indications of infection

This symptoms of SpammerDLL detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pice Backdoor
Removing RSCdoor Trojan
Backdoor.BeastDoor Trojan Removal instruction

Win32.Dialer.NAQ Adware

Win32.Dialer.NAQ virus description
Technical details:
Categories: Adware
Win32.Dialer.NAQ Aliases:
[Kaspersky]Trojan.Win32.Dialer.az;
[Panda]Dialer.Gen

Win32.Dialer.NAQ indications of infection

This symptoms of Win32.Dialer.NAQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Stone Trojan Information
Remove GDE Trojan
Agobot.ah Trojan Removal instruction
JS.DialogArg!exploit Trojan Removal

RBot.GRU Spyware

RBot.GRU virus description
Technical details:
Categories: Spyware,Worm

RBot.GRU Files:
[%SYSTEM%]\winbo32.exe
[%SYSTEM%]\winbo32.exe

RBot.GRU Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices


RBot.GRU indications of infection

This symptoms of RBot.GRU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CWS.NewVariant1 Hijacker Removal instruction
TrojanDownloader.Win32.Vivia Trojan Removal
VBS.VBSWG Worm Symptoms
BillyPie.dam Trojan Cleaner

AdultLinks Hijacker

AdultLinks virus description
Technical details:
Categories: Hijacker

AdultLinks Folders:
[%FAVORITES%]\adult links
[%FAVORITES%]\adultsearch
[%FAVORITES%]\links\adult links
[%FAVORITES%]\links\adultsearch

AdultLinks Files:
[%WINDOWS%]\downloaded program files\allch.dll
[%WINDOWS%]\downloaded program files\nullctrl class
[%WINDOWS%]\downloaded program files\qcbar.dll
[%WINDOWS%]\start menu\adult links daily.url
[%WINDOWS%]\downloaded program files\allch.dll
[%WINDOWS%]\downloaded program files\nullctrl class
[%WINDOWS%]\downloaded program files\qcbar.dll
[%WINDOWS%]\start menu\adult links daily.url

AdultLinks Registry Keys:
HKEY_CLASSES_ROOT\interface\{d1320cbb-403d-483d-ae9a-688960a96977}
HKEY_CLASSES_ROOT\qabar
HKEY_LOCAL_MACHINE\software\classes\clsid\{dd1bca06-f674-424d-a08e-42da97c4d5dd}
HKEY_CLASSES_ROOT\allch.ieobj
HKEY_CLASSES_ROOT\allch.ieobj.1
HKEY_CLASSES_ROOT\clsid\{242ca913-1637-4f74-9729-ea349af3ecac}
HKEY_CLASSES_ROOT\clsid\{5c015aa7-3392-4044-90cc-8e95019cfff1}
HKEY_CLASSES_ROOT\clsid\{60381d4b-8129-449a-a5f2-5417ad0571cc}
HKEY_CLASSES_ROOT\clsid\{c02ee3a0-1881-419f-a5ed-737223463292}
HKEY_CLASSES_ROOT\clsid\{ed7d1356-f7c2-4a27-a87c-c0dfeb3a628f}
HKEY_CLASSES_ROOT\interface\{242ca913-1637-4f74-9729-ea349af3ecac}
HKEY_CLASSES_ROOT\interface\{ed7d1356-f7c2-4a27-a87c-c0dfeb3a628f}
HKEY_CLASSES_ROOT\qabar.1
HKEY_CLASSES_ROOT\qabar.adultsearch
HKEY_CLASSES_ROOT\qabar.adultsearch.1
HKEY_CLASSES_ROOT\qcbar
HKEY_CLASSES_ROOT\qcbar.1
HKEY_CLASSES_ROOT\typelib\{5c015aa7-3392-4044-90cc-8e95019cfff1}
HKEY_CLASSES_ROOT\typelib\{60381d4b-8129-449a-a5f2-5417ad0571cc}
HKEY_CLASSES_ROOT\typelib\{765e6b09-6832-4738-bdbe-25f226ba2ab0}
HKEY_CLASSES_ROOT\typelib\{c02ee3a0-1881-419f-a5ed-737223463292}
HKEY_CURRENT_USER\software\linkzz
HKEY_CURRENT_USER\software\qcbar
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{765e6b09-6832-4738-bdbe-25f226ba2ab0}


AdultLinks indications of infection

This symptoms of AdultLinks detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Small.bau Downloader Symptoms
Spool Trojan Cleaner
Password.Reminder Trojan Removal

IRC.Floodz DoS

IRC.Floodz virus description
Technical details:
Categories: DoS

IRC.Floodz indications of infection

This symptoms of IRC.Floodz detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
UqsuBar Trojan Cleaner