InCommand.Server.family Trojan

InCommand.Server.family virus description
Technical details:
Categories: Trojan,Backdoor
InCommand.Server.family Aliases:
[Eset]Win32/InCommander.1_7.B trojan;
[Computer Associates]Backdoor/InCommand Server family,Win32.InCommand.17.C

InCommand.Server.family indications of infection

This symptoms of InCommand.Server.family detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Win32.Domb Trojan Symptoms
Cuki Trojan Information
SillyDl.BZG Trojan Removal instruction
Bancos.HGE Trojan Symptoms
Dblheart Trojan Symptoms

Agent.bq Trojan

Agent.bq virus description
Technical details:
Categories: Trojan

Agent.bq indications of infection

This symptoms of Agent.bq detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Cabronator.Kill.beta3 Backdoor
Pigeon.ACI Trojan Removal
AdultId Adware Symptoms
SillyDl.CUM Trojan Symptoms
Awoi Trojan Symptoms

Plimo Trojan

Plimo virus description
Technical details:
Categories: Trojan
Plimo Aliases:
[Panda]Trojan Horse.LC;
[Computer Associates]Plimo,Plimo!Trojan

Plimo indications of infection

This symptoms of Plimo detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Mich Trojan Removal
Remove W95.Ilmx Trojan
Bancos.HGE Trojan Removal
V4.login Trojan Removal instruction
Cuki Trojan Removal instruction

DirtyGuy Trojan

DirtyGuy virus description
Technical details:
Categories: Trojan,Hacker Tool
DirtyGuy Aliases:
[Panda]Trj/Dirtyguy;
[Computer Associates]DirtyGuy,DirtyGuy!Trojan

DirtyGuy indications of infection

This symptoms of DirtyGuy detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Golon Trojan Information
Pigeon.EVC Trojan Removal instruction
Remove LiveShows.Online.Timer Adware
Removing Win16.AddUser Trojan
Removing Anomaly Trojan

W95.Henky.Henze Trojan

W95.Henky.Henze virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
W95.Henky.Henze Aliases:
[Kaspersky]Win32.Henky;
[McAfee]W95/Henky.Henze;
[F-Prot]W32/Henky.1180;
[Panda]Univ.B;
[Computer Associates]Win95.Henky:intended

W95.Henky.Henze indications of infection

This symptoms of W95.Henky.Henze detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Lowtoow Downloader Cleaner
PokaPoka Trojan Information
Pigeon.AVGJ Trojan Information
Removing Diskspoiler Trojan
SillyDl.CSW Trojan Symptoms

SubSeven.Speech Trojan

SubSeven.Speech virus description
Technical details:
Categories: Trojan,Backdoor,RAT
SubSeven.Speech Aliases:
[Kaspersky]Backdoor.SubSeven.Speech;
[Eset]Win32/SubSeven.Speech trojan;
[McAfee]BackDoor-Sub7;
[F-Prot]security risk or a "backdoor" program;
[Panda]Backdoor Program

SubSeven.Speech indications of infection

This symptoms of SubSeven.Speech detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CFY Trojan Cleaner
Pigeon.AVNW Trojan Removal
Agent.dt Spyware Removal
Removing Nookl Trojan
Sandradoor.Server Trojan Cleaner

My.PanicButton Trojan

My.PanicButton virus description
Technical details:
Categories: Trojan

My.PanicButton indications of infection

This symptoms of My.PanicButton detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ProfitZone Adware Removal
Hemlock Trojan Removal
SillyDl.DHF Trojan Removal instruction
Win32.ReverseTrojan Trojan Removal
Remove AZVPWS Trojan

Pigeon.AOL Trojan

Pigeon.AOL virus description
Technical details:
Categories: Trojan

Pigeon.AOL indications of infection

This symptoms of Pigeon.AOL detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Small.ia Downloader Symptoms
Pentium RAT Cleaner
Removing IRC.Chamel DoS
Win32.StartPage.bj Trojan Removal
VirTool.Win32.ShadowAdmin Trojan Cleaner

Bancos.HCI Trojan

Bancos.HCI virus description
Technical details:
Categories: Trojan

Bancos.HCI indications of infection

This symptoms of Bancos.HCI detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CJR Trojan Information
Remove ClientMan.2in1 BHO
shopping.search.jp Tracking Cookie Cleaner
Remove SillyDl.DNM Trojan
Removing Sin.Static.Ip RAT

Shoshkeles Tracking Cookie

Shoshkeles virus description
Technical details:
Categories: Tracking Cookie

Shoshkeles indications of infection

This symptoms of Shoshkeles detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove SH.Mare Trojan
SCKeyLog.20!Spy!Trojan Trojan Removal instruction
Removing Bat.Guru Trojan
Remove Vxidl.AFO Trojan
Remove Bancos.GYN Trojan

Bugger Trojan

Bugger virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Bugger Aliases:
[Kaspersky]ExeHeader.Pure.De'buger.427;
[Panda]Tom&Jerry;
[Computer Associates]Bugger.427

Bugger indications of infection

This symptoms of Bugger detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
VB.eo Backdoor Removal
Readdev DoS Removal instruction
Basic.ICQ.Pager Trojan Removal instruction
VBS.Daydream Trojan Cleaner
Remove Bancos.GDB Trojan

Pigeon.AVMC Trojan

Pigeon.AVMC virus description
Technical details:
Categories: Trojan

Pigeon.AVMC indications of infection

This symptoms of Pigeon.AVMC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ICQ.Locked Trojan Symptoms
Pigeon.BBV Trojan Information
The.History.of.Divine.Intervention Hacker Tool Removal
Vxidl.AGW Trojan Cleaner
Remove Cool.Remote.Control RAT

Pigeon.EPY Trojan

Pigeon.EPY virus description
Technical details:
Categories: Trojan

Pigeon.EPY indications of infection

This symptoms of Pigeon.EPY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing PtakkS.resurrecion RAT
Fintlers Trojan Removal instruction
Adrem.Free.Remote.Console RAT Information
Zhongsou Adware Removal instruction
Win32.GreyBird Trojan Removal

Raw.TCP.Server.Connection RAT

Raw.TCP.Server.Connection virus description
Technical details:
Categories: RAT

Raw.TCP.Server.Connection indications of infection

This symptoms of Raw.TCP.Server.Connection detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Banhosts Hijacker Symptoms
SearchSquire Adware Removal instruction
Benuti.D!downloader Trojan Removal
IstBar.az Downloader Removal
Remove Adware.WinAd Adware

Parity Trojan

Parity virus description
Technical details:
Categories: Trojan,Backdoor,Downloader,DoS
Parity Aliases:
[Kaspersky]Parity.441;
[Panda]Parity;
[Computer Associates]Parity

Parity indications of infection

This symptoms of Parity detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Wobox Trojan Cleaner
Vxidl.AFD Trojan Removal
Adrem.Free.Remote.Console RAT Removal
Lop.com.IMZ Spyware Symptoms
Upsilonprog Trojan Removal instruction

Pigeon.EVC Trojan

Pigeon.EVC virus description
Technical details:
Categories: Trojan

Pigeon.EVC indications of infection

This symptoms of Pigeon.EVC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Anomaly Trojan Removal
Adware.Virtumundo Adware Cleaner
PWS.Msnfake Trojan Information
Removing PWS.Ghost Trojan
Bancos.GMY Trojan Information

RBBS Trojan

RBBS virus description
Technical details:
Categories: Trojan
RBBS Aliases:
[Kaspersky]Trojan.Rbbs;
[McAfee]RBBS;
[F-Prot]destructive program;
[Panda]Trj/Rbbs,Tr_RBBS.310;
[Computer Associates]SvgaTrojan!Trojan,Rbbs

RBBS indications of infection

This symptoms of RBBS detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GOR Trojan Information
Vxidl.BGN Trojan Information
SillyDl.DJP Trojan Removal
FortuneCity.com Tracking Cookie Symptoms
Dowque.AFC Trojan Information

XY7.Project Trojan

XY7.Project virus description
Technical details:
Categories: Trojan
XY7.Project Aliases:
[Kaspersky]Trojan.Win32.GLB.001;
[McAfee]XYProj;
[F-Prot]destructive program;
[Panda]Trj/W32.GLB.001,Trojan Horse.LC;
[Computer Associates]Win32/GLB.001!Trojan

XY7.Project indications of infection

This symptoms of XY7.Project detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Scpact Trojan Information
Revealer.Free.Edition Spyware Cleaner
Remove Progenic.Fake.Surfer RAT
Removing IRC.Chamel DoS
FortuneCity.com Tracking Cookie Removal instruction

Vxidl.AAN Trojan

Vxidl.AAN virus description
Technical details:
Categories: Trojan

Vxidl.AAN indications of infection

This symptoms of Vxidl.AAN detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
AdultId Adware Removal instruction
Removing ProfitZone Adware
SillyDl.CTG Trojan Symptoms
Removing NPK.A!config Trojan
Pigeon.ESG Trojan Removal instruction

NtRootK Backdoor

NtRootK virus description
Technical details:
Categories: Backdoor

NtRootK indications of infection

This symptoms of NtRootK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Win32.Mediar Trojan
Coced Trojan Information
Yaunch Trojan Removal instruction
Bancos.HGE Trojan Removal instruction
Removing Poltergeist.A!Backdoor Trojan

Pigeon.EDT Trojan

Pigeon.EDT virus description
Technical details:
Categories: Trojan

Pigeon.EDT indications of infection

This symptoms of Pigeon.EDT detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
PSW.Jammer Trojan Cleaner
Bancos.HHH Trojan Removal
XXX.ToolBar Trojan Removal
Matcash.dll Trojan Cleaner
NIGGER Trojan Removal instruction

TrojanDropper.Win32.Delf.af Trojan

TrojanDropper.Win32.Delf.af virus description
Technical details:
Categories: Trojan
TrojanDropper.Win32.Delf.af Aliases:
[Panda]Trojan Horse

TrojanDropper.Win32.Delf.af indications of infection

This symptoms of TrojanDropper.Win32.Delf.af detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ProfitZone Adware Removal instruction
MailSpam.Squad Hacker Tool Information
Bancos.HAK Trojan Cleaner
Bancos.BUM Trojan Removal instruction
whitepages.com Tracking Cookie Removal

Kidda Adware

Kidda virus description
Technical details:
Categories: Adware

Kidda Folders:
[%PROGRAM_FILES%]\kidda toolbar

Kidda Registry Keys:
HKEY_CLASSES_ROOT\interface\{0d5cc8ae-0bb0-49c3-ba33-ba4508ea43cc}
HKEY_CLASSES_ROOT\interface\{eabbb49a-4d7b-415b-8250-15c3b854e9ff}
HKEY_CLASSES_ROOT\clsid\{5124376d-c964-4817-b40e-cbd36195116e}
HKEY_CLASSES_ROOT\toolband.xbtb06353
HKEY_CLASSES_ROOT\toolband.xbtb06353.1
HKEY_CLASSES_ROOT\typelib\{0d42a57a-ec98-45de-b0c7-e36976360377}
HKEY_CLASSES_ROOT\xbtb06353.ietoolbar
HKEY_CLASSES_ROOT\xbtb06353.ietoolbar.1
HKEY_CLASSES_ROOT\xbtb06353.xbtb06353
HKEY_CLASSES_ROOT\xbtb06353.xbtb06353.1
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\ext\stats\{5124376d-c964-4817-b40e-cbd36195116e}
HKEY_CURRENT_USER\software\xbtb06353
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\extensions\{5124376d-c964-4817-b40e-cbd36195116e}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\xbtb06353.xbtb06353toolbar

Kidda Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\extensions\cmdmapping
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar


Kidda indications of infection

This symptoms of Kidda detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CGZ Trojan Symptoms
Removing Delf.KR Trojan
CWS.IEFeads Hijacker Symptoms
Remove AZVPWS Trojan
Downloader.AUE.dll Trojan Removal instruction