Swapuid Trojan

Swapuid virus description
Technical details:
Categories: Trojan

Swapuid indications of infection

This symptoms of Swapuid detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PSW.Bancos Trojan Removal
fccbrawley.com Tracking Cookie Symptoms
Removing Zlob.Fam.VideoCompressionCodec Trojan

MessageLabs Tracking Cookie

MessageLabs virus description
Technical details:
Categories: Tracking Cookie

MessageLabs indications of infection

This symptoms of MessageLabs detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Crulket Trojan Cleaner
Hogle Trojan Removal instruction
Removing Agent.gp Trojan
Remove JS.Mijail Trojan
Remove Win32.Kaiten Trojan

PSW.Lmir.bj Trojan

PSW.Lmir.bj virus description
Technical details:
Categories: Trojan,Hacker Tool
PSW.Lmir.bj Aliases:
[Panda]Trojan Horse.LC

PSW.Lmir.bj indications of infection

This symptoms of PSW.Lmir.bj detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PWS.Fib Trojan Removal
Smo Trojan Information
Remove Delfile Trojan

Japanese.Christmas Trojan

Japanese.Christmas virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Japanese.Christmas Aliases:
[Kaspersky]Christmas.600,Cookie.653;
[Eset]Jap_Xmas.600.B virus;
[Panda]Japanese Cookie;
[Computer Associates]Jap Xmas.Merry,Jap Xmas.Cookie

Japanese.Christmas indications of infection

This symptoms of Japanese.Christmas detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Aunps Adware Symptoms
TeleAxxor.Server Backdoor Information

Holica Downloader

Holica virus description
Technical details:
Categories: Downloader
Holica Aliases:
[Kaspersky]Trojan-Downloader.Win32.Holica,Trojan-Downloader.Win32.Holica.c,Trojan-Downloader.Win32.Dyfuca.aw;
[McAfee]Adware-Holistyc;
[Other]Win32/Holica,Win32/Holica.D,Win32/Holica.B

Holica Files:
[%SYSTEM%]\preload2.ocx
[%SYSTEM%]\preload2.ocx


Holica indications of infection

This symptoms of Holica detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
IRC.Djaa Backdoor Removal instruction
Agent.AFE Trojan Removal
HLLT.8288a Trojan Removal
Removing Pigeon.AVO Trojan
Remove ClickSpring (PurityScan) Adware

Win32.Small.fr Trojan

Win32.Small.fr virus description
Technical details:
Categories: Trojan,Hacker Tool
Win32.Small.fr Aliases:
[Panda]Virus Constructor

Win32.Small.fr indications of infection

This symptoms of Win32.Small.fr detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Nineth Trojan Removal
Fearless.Lite Trojan Removal

SillyDl.COM Trojan

SillyDl.COM virus description
Technical details:
Categories: Trojan

SillyDl.COM indications of infection

This symptoms of SillyDl.COM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.VB.cr Trojan Information
Remove AP.gh Trojan