Macro Trojan

Macro virus description
Technical details:
Categories: Trojan

Macro indications of infection

This symptoms of Macro detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Visi?n.de.Control Backdoor Information
Sadbiz Trojan Information

SdBot.ca Backdoor

SdBot.ca virus description
Technical details:
Categories: Backdoor

SdBot.ca indications of infection

This symptoms of SdBot.ca detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
HueyIns RAT Removal
TrojanDropper.Win32.Sekan Trojan Removal
DLP Backdoor Information
API.PM.Bomber Trojan Cleaner

Pigeon.ERI Trojan

Pigeon.ERI virus description
Technical details:
Categories: Trojan

Pigeon.ERI indications of infection

This symptoms of Pigeon.ERI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
GamesSpy.com Tracking Cookie Removal

ILL.Eagle RAT

ILL.Eagle virus description
Technical details:
Categories: RAT

ILL.Eagle indications of infection

This symptoms of ILL.Eagle detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.DelAll Trojan Cleaner

Agent.dd Adware

Agent.dd virus description
Technical details:
Categories: Adware

Agent.dd indications of infection

This symptoms of Agent.dd detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
AIM.Watch Trojan Removal
Removing MasterU RAT
Remove StartMake.com Toolbar
Bancos.CHV Trojan Cleaner
Win32.Spyboter Trojan Cleaner

AIM.Watch Trojan

AIM.Watch virus description
Technical details:
Categories: Trojan,Backdoor
AIM.Watch Aliases:
[Kaspersky]Backdoor.AIMFrame;
[Eset]Win32/AIMFrame.A trojan;
[McAfee]AIM-Watch;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program,Bck/Generic;
[Computer Associates]Win32.AimWatch.20,Win32/AimFrame.IP_Stealer.Trojan,Win32/Aimframe.Trojan

AIM.Watch indications of infection

This symptoms of AIM.Watch detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Sleeper Trojan Cleaner
Removing Pigeon.DZX Trojan

Pigeon.AVRC Trojan

Pigeon.AVRC virus description
Technical details:
Categories: Trojan

Pigeon.AVRC indications of infection

This symptoms of Pigeon.AVRC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Priosted Trojan Removal instruction
Delf.mt Backdoor Symptoms
Remove Manarbes Adware
Remove WurldMedia.MShop Hijacker