Timid Trojan

Timid virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Timid Aliases:
[Kaspersky]Timid.305.b,Timid.526,Timid.526.b,Timid.290.a,Timid.297.a,Timid.306.a,Timid.513,Timid.557;
[Eset]Timid.305.A virus;
[Panda]Univ;
[Computer Associates]Timid 305,Timid

Timid indications of infection

This symptoms of Timid detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Quebus Backdoor Removal instruction
Chisyne Trojan Removal instruction
Lacius Trojan Removal instruction
Blackdoor Backdoor Information

Ehg.viacom.hitbox Tracking Cookie

Ehg.viacom.hitbox virus description
Technical details:
Categories: Tracking Cookie

Ehg.viacom.hitbox indications of infection

This symptoms of Ehg.viacom.hitbox detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bat.IRCFlood.Sheh32!Trojan Trojan Removal
Lobster Downloader Cleaner
Bancos.HGS Trojan Removal
Inud Trojan Removal

Bancos.HYJ Trojan

Bancos.HYJ virus description
Technical details:
Categories: Trojan

Bancos.HYJ indications of infection

This symptoms of Bancos.HYJ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
whitepages.com Tracking Cookie Information
Pigeon.EEW Trojan Symptoms
Remove ESyndicate Adware
cyberwing.co.jp Tracking Cookie Cleaner

Australian.AIH Trojan

Australian.AIH virus description
Technical details:
Categories: Trojan

Australian.AIH indications of infection

This symptoms of Australian.AIH detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
DialSteal Trojan Removal instruction
H2K Trojan Cleaner

JS.Mafext Trojan

JS.Mafext virus description
Technical details:
Categories: Trojan

JS.Mafext indications of infection

This symptoms of JS.Mafext detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SHeat.com Tracking Cookie Information
Pigeon.EMP Trojan Information

UpdateLoader Adware

UpdateLoader virus description
Technical details:
Categories: Adware,Downloader

UpdateLoader Files:
[%WINDOWS%]\downloaded program files\download_ul.dll
[%WINDOWS%]\system\randomiser.exe
[%WINDOWS%]\downloaded program files\download_ul.dll
[%WINDOWS%]\system\randomiser.exe

UpdateLoader Registry Keys:
HKEY_CLASSES_ROOT\clsid\{f7adcfe3-aa28-f99e-e665-b13ac332d249}
HKEY_CLASSES_ROOT\download_ul.downloadul
HKEY_CLASSES_ROOT\download_ul.downloadul.1
HKEY_CLASSES_ROOT\interface\{0c1c2c3c-4c5c-6c7c-8c9c-ccbcccdcecfc}
HKEY_CLASSES_ROOT\typelib\{01b8453a-d3bc-479a-8c7a-0e86f3f4ff18}
HKEY_CLASSES_ROOT\typelib\{0b1b2b3b-4b5b-6b7b-8b9b-bbbbcbdbebfb}
HKEY_LOCAL_MACHINE\software\microsoft\code store database\distribution units\{ae6cefa8-1223-4337-8d94-977268ff9aa0}
HKEY_LOCAL_MACHINE\software\microsoft\ms updates
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\moduleusage\[%WINDOWS%]\downloaded program files\download_ul.dll
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\ms updates

UpdateLoader Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\shareddlls


UpdateLoader indications of infection

This symptoms of UpdateLoader detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Evasive.KeyLog Trojan Symptoms
Afseg Trojan Information
Borlander Downloader Removal instruction
Yahoo.Attack DoS Symptoms
Fadieck Trojan Symptoms

SillyDl.DKM Trojan

SillyDl.DKM virus description
Technical details:
Categories: Trojan

SillyDl.DKM indications of infection

This symptoms of SillyDl.DKM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
HuntBar.BTLink Hijacker Cleaner
Cx2 Backdoor Cleaner

SillyDl.DBX Trojan

SillyDl.DBX virus description
Technical details:
Categories: Trojan

SillyDl.DBX indications of infection

This symptoms of SillyDl.DBX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Banker.aq Spyware Information

AVJM Trojan

AVJM virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
AVJM Aliases:
[Kaspersky]I13.Paraguay.2867;
[McAfee]Paraguay;
[F-Prot]AJVM.2867.A;
[Panda]Ajvm.2867;
[Computer Associates]Paraguay.2867

AVJM indications of infection

This symptoms of AVJM detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ServU.based Backdoor Information
CVI Backdoor Removal

Bancos.FXR Trojan

Bancos.FXR virus description
Technical details:
Categories: Trojan

Bancos.FXR indications of infection

This symptoms of Bancos.FXR detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Pigeon.AWII Trojan
PowerStrip Adware Cleaner
Delf.md Downloader Removal
Crupor Trojan Information
Pigeon.EQP Trojan Removal instruction

SillyDl.CBE Trojan

SillyDl.CBE virus description
Technical details:
Categories: Trojan

SillyDl.CBE indications of infection

This symptoms of SillyDl.CBE detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ChineseHack Trojan Information

Other Downloader

Other virus description
Technical details:
Categories: Downloader,Hacker Tool
Other Aliases:
[Kaspersky]HackTool.Win32.IpcScan.160;
[Panda]Application/Serv-U-Based.A,HackTool/IPCScan.B

Other Files:
[%DESKTOP%]\free screensavers.lnk
[%DESKTOP%]\old port casino.lnk
[%WINDOWS%]\zahov.exe
[%DESKTOP%]\free screensavers.lnk
[%DESKTOP%]\old port casino.lnk
[%WINDOWS%]\zahov.exe

Other Registry Keys:
HKEY_CLASSES_ROOT\favorite.favoriteman
HKEY_CLASSES_ROOT\favorite.favoriteman.1
HKEY_CLASSES_ROOT\bho42602.clsdockwindow
HKEY_CLASSES_ROOT\bho426022
HKEY_CLASSES_ROOT\clsid\{4cf5275b-cdbc-11d3-a8af-0090279a5978}
HKEY_CLASSES_ROOT\interface\{072d14ef-99b6-49dd-9be5-76142727b7ac}
HKEY_CURRENT_USER\software\inetcash
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\inetbar v1.1 r2_is1

Other Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Other indications of infection

This symptoms of Other detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Plimus Trojan Removal
End.of Trojan Symptoms

Keystate Trojan

Keystate virus description
Technical details:
Categories: Trojan,Spyware
Keystate Aliases:
[Panda]Trj/Spy;
[Computer Associates]Win32/Keystate!Trojan

Keystate indications of infection

This symptoms of Keystate detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.DGQ Trojan Information
Remove SillyDl.CHF Trojan

Back.Orifice.pre Trojan

Back.Orifice.pre virus description
Technical details:
Categories: Trojan,Backdoor,RAT
Back.Orifice.pre Aliases:
[Kaspersky]Backdoor.BO2K.13.c,Backdoor.BO2K.13.c.plugin;
[Eset]Win32/BO2K.13.Auth trojan,Win32/BO2K.13.C trojan,Win32/BO2K.13.plugin trojan;
[Computer Associates]Backdoor/BO2K.13.C.Plugin,Backdoor/BO2K.13.C.Server

Back.Orifice.pre indications of infection

This symptoms of Back.Orifice.pre detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Agent.jt Downloader

TrojanDownloader.Win32.Small.gu Downloader

TrojanDownloader.Win32.Small.gu virus description
Technical details:
Categories: Downloader

TrojanDownloader.Win32.Small.gu indications of infection

This symptoms of TrojanDownloader.Win32.Small.gu detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.LastDoor Trojan Removal
nfrmag.com Tracking Cookie Cleaner
roiservice.com Tracking Cookie Removal instruction

Rush.Hour.ow Trojan

Rush.Hour.ow virus description
Technical details:
Categories: Trojan
Rush.Hour.ow Aliases:
[Kaspersky]Rushhour.b;
[Eset]RushHour.C virus;
[McAfee]Rush Hour.ow;
[Panda]RushHour.3128;
[Computer Associates]Rush_Hour.A,Rush_Hour.D

Rush.Hour.ow indications of infection

This symptoms of Rush.Hour.ow detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AYK Trojan Removal
Application.HideWindow Trojan Removal instruction
Remove Showbar BHO
SillyDl.CJP Trojan Removal instruction
Wintrim.ah Downloader Removal

H2K Trojan

H2K virus description
Technical details:
Categories: Trojan

H2K indications of infection

This symptoms of H2K detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove agent.jn Backdoor

Pigeon.AVUL Trojan

Pigeon.AVUL virus description
Technical details:
Categories: Trojan

Pigeon.AVUL indications of infection

This symptoms of Pigeon.AVUL detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Pigeon.DZD Trojan
Remove Farmot Trojan
IRCBot.VR Worm Symptoms
Benuti.G!downloader Trojan Removal instruction

SillyDl.DNQ Trojan

SillyDl.DNQ virus description
Technical details:
Categories: Trojan

SillyDl.DNQ indications of infection

This symptoms of SillyDl.DNQ detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Funcade Adware Removal
Austr.Para.153B Trojan Cleaner
Malum.KHC Trojan Information
Removing Proof.Virus.Compiler Backdoor

Necropol Trojan

Necropol virus description
Technical details:
Categories: Trojan
Necropol Aliases:
[Kaspersky]Necropolis;
[Eset]Necropol.B virus,Necropol.E virus;
[McAfee]OC/f;
[F-Prot]Necropolis.1963.B,Necropolis.1963.damaged?,Necropolis.1963.unknown?;
[Computer Associates]Necropolis A.b

Necropol indications of infection

This symptoms of Necropol detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HWO Trojan Information
Ace.Spy Spyware Removal
Removing Generador.Victima.Smtp Trojan
Psychward.03b RAT Cleaner

CWS.MSOffice Hijacker

CWS.MSOffice virus description
Technical details:
Categories: Hijacker

CWS.MSOffice Files:
[%WINDOWS%]\fonts\msoffice.hta
[%WINDOWS%]\fonts\msoffice.hta


CWS.MSOffice indications of infection

This symptoms of CWS.MSOffice detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SupaSleep Adware Cleaner
Removing DOSRDP RAT
Remove Hege116x Trojan
Remove VFSI Trojan

Tydpec Trojan

Tydpec virus description
Technical details:
Categories: Trojan

Tydpec Files:
[%PROFILE%]\Recent\beautiful girl.wma .gif.lnk
[%PROFILE%]\Recent\beautiful girl.wma .gif.lnk


Tydpec indications of infection

This symptoms of Tydpec detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CBlade Worm Information
AOL Trojan Removal
Removing WinNT.HackerDefender.Rootkit.Tro Trojan

Win32.Flooder.Chiller.virus DoS

Win32.Flooder.Chiller.virus virus description
Technical details:
Categories: DoS
Win32.Flooder.Chiller.virus Aliases:
[Kaspersky]Flooder.Win32.Chiller;
[Panda]Flooder Program

Win32.Flooder.Chiller.virus indications of infection

This symptoms of Win32.Flooder.Chiller.virus detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
IstBar.az Downloader Removal
Win32.Daqa Trojan Information
Flip Trojan Information
Removing W95.Zperm Trojan

Link4Ads.com Tracking Cookie

Link4Ads.com virus description
Technical details:
Categories: Tracking Cookie

Link4Ads.com indications of infection

This symptoms of Link4Ads.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Vxidl.AEC Trojan
iconinstaller Trojan Information
Netsnooper.Gold Backdoor Removal instruction
Removing ZapSpot Adware

Lookster Toolbar

Lookster virus description
Technical details:
Categories: Toolbar

Lookster Folders:
[%PROGRAM_FILES%]\Lookster Toolbar

Lookster Registry Keys:
HKEY_CLASSES_ROOT\clsid\{6ae02e1c-8859-4f57-9097-5a55a56a4caf}
HKEY_CLASSES_ROOT\clsid\{7401e786-66e2-4086-9859-13f005862992}
HKEY_CLASSES_ROOT\toolband.xbtp02016
HKEY_CLASSES_ROOT\toolband.xbtp02016.1
HKEY_CLASSES_ROOT\typelib\{ac0114eb-f42f-4d77-aa0c-c0e33ee42ff6}
HKEY_CLASSES_ROOT\xbtb02016.ietoolbar
HKEY_CLASSES_ROOT\xbtb02016.ietoolbar.1
HKEY_CLASSES_ROOT\xbtb02016.xbtb02016
HKEY_CLASSES_ROOT\xbtb02016.xbtb02016.1
HKEY_CURRENT_USER\software\xbtb02016
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{7401e786-66e2-4086-9859-13f005862992}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\xbtb02016.xbtb02016toolbar

Lookster Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar


Lookster indications of infection

This symptoms of Lookster detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Vxidl.BBT Trojan
Exploit.Mht Trojan Removal
BO2K.setup Trojan Information
KeyLog.Impossible Trojan Symptoms
NaviSearch Adware Symptoms

Henged Trojan

Henged virus description
Technical details:
Categories: Trojan
Henged Aliases:
[Panda]Trj/W32.Henged;
[Computer Associates]Win32/Henged!Trojan

Henged indications of infection

This symptoms of Henged detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AWKL Trojan Removal
DTr Trojan Cleaner
Bancos.IFG Trojan Removal instruction
Removing SdBot.bdc Worm