Bat.Bat Trojan

Bat.Bat virus description
Technical details:
Categories: Trojan
Bat.Bat Aliases:
[Eset]Bat.506.B virus,Bat.506.A virus;
[Panda]BAT/506,BAT/527;
[Computer Associates]Bat/Bat.506,Batvir.506

Bat.Bat indications of infection

This symptoms of Bat.Bat detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
NCase Adware Cleaner

Mooder Trojan

Mooder virus description
Technical details:
Categories: Trojan

Mooder indications of infection

This symptoms of Mooder detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
CrazyWin Adware Information
Remove ProtectingTool Ransomware
Downloader.BCF Trojan Removal instruction
Edge.Tech Adware Cleaner

SillyDl.CYK Trojan

SillyDl.CYK virus description
Technical details:
Categories: Trojan

SillyDl.CYK indications of infection

This symptoms of SillyDl.CYK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.ABC Trojan Removal instruction
Remove WorldAntiSpy Adware
Remove TriRat RAT

Art22 Backdoor

Art22 virus description
Technical details:
Categories: Backdoor,Downloader,Hacker Tool,DoS
Art22 Aliases:
[Kaspersky]VirTool.DOS.Redarc;
[Panda]Virus Constructor

Art22 indications of infection

This symptoms of Art22 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Dynamic.Desktop.Media Trojan Symptoms
Removing Setial Trojan

Bat.Confusion Trojan

Bat.Confusion virus description
Technical details:
Categories: Trojan
Bat.Confusion Aliases:
[Kaspersky]Trojan.BAT.Confusion;
[Panda]Trojan Horse;
[Computer Associates]Bat/Confusion!Trojan

Bat.Confusion indications of infection

This symptoms of Bat.Confusion detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Perfume Trojan Symptoms
Removing DDY Trojan
Remove UrlHen Trojan
Calknil Trojan Symptoms

Blocco Trojan

Blocco virus description
Technical details:
Categories: Trojan
Blocco Aliases:
[Eset]Win32/Blocco.A trojan;
[Panda]Trj/W32.Blocco;
[Computer Associates]Win32.Blocco,Win32/Blocco!Trojan

Blocco indications of infection

This symptoms of Blocco detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Agobot.ad Trojan Cleaner
Remove Win32.AZV Trojan
Havar Trojan Removal instruction
Spliff RAT Removal instruction

War Trojan

War virus description
Technical details:
Categories: Trojan,Spyware,Backdoor,RAT,Hacker Tool
War Aliases:
[Kaspersky]Backdoor.Wardoor.10,Backdoor.Warin,Backdoor.Wardoor.20;
[Eset]Win32/War.10 trojan,Win32/Warin trojan,Win32/War.20 trojan;
[McAfee]BackDoor-BO,SennaSpy2001;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/War.1.0,Trj/Backdoor.Warin,Trj/Warin,Bck/War.20;
[Computer Associates]Backdoor/Wardoor.10,Backdoor/Warin!Server

War indications of infection

This symptoms of War detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Trojan Guarder Gold Adware

Desktop.Personal Spyware

Desktop.Personal virus description
Technical details:
Categories: Spyware

Desktop.Personal Folders:
[%PROGRAM_FILES%]\ODSP

Desktop.Personal Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\odsp 6.0.2
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_odsp_host
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\odsp host

Desktop.Personal Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Desktop.Personal indications of infection

This symptoms of Desktop.Personal detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Zlob.Fam.PrivateVideo Trojan Information
Remove StartPage.zb Hijacker
Removing Whazit BHO
PCSentinel.Red.Handed Spyware Removal

Delf.ig Trojan

Delf.ig virus description
Technical details:
Categories: Trojan

Delf.ig indications of infection

This symptoms of Delf.ig detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ScreenView RAT Cleaner
Nssys32 Trojan Information

Win32.KillFiles.di Trojan

Win32.KillFiles.di virus description
Technical details:
Categories: Trojan,Hacker Tool
Win32.KillFiles.di Aliases:
[Panda]Trojan Horse

Win32.KillFiles.di indications of infection

This symptoms of Win32.KillFiles.di detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Cazdoor Backdoor Removal
Removing WordMacro.Volcano Trojan
Pigeon.ELJ Trojan Symptoms
Key.Logger Spyware Information
CoolWeb Adware Removal instruction

BackDoor.AHV Trojan

BackDoor.AHV virus description
Technical details:
Categories: Trojan,RAT,Hacker Tool
BackDoor.AHV Aliases:
[Kaspersky]Trojan.PSW.JustJoke.12.b;
[McAfee]BackDoor-AHV;
[F-Prot]security risk or a "backdoor" program;
[Panda]Trojan Horse,Trojan Horse.LC

BackDoor.AHV indications of infection

This symptoms of BackDoor.AHV detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Automatic.Screen.Observer Spyware Cleaner
Remove MoSucker.ErEbuS RAT

AmigaAnywhere Backdoor

AmigaAnywhere virus description
Technical details:
Categories: Backdoor,RAT

AmigaAnywhere indications of infection

This symptoms of AmigaAnywhere detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
ARCV.Joanna Trojan Information
ISTbar.XXXToolbar Hijacker Removal

Xena RAT

Xena virus description
Technical details:
Categories: RAT

Xena indications of infection

This symptoms of Xena detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.EOE Trojan Information
Removing Small.fk Trojan
GenDropper.APE Trojan Removal instruction
BAT.ZekeZip Trojan Cleaner

SdBot.bn Backdoor

SdBot.bn virus description
Technical details:
Categories: Backdoor

SdBot.bn indications of infection

This symptoms of SdBot.bn detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Whazit BHO Removal instruction

Backdoor.DeepThroat.Server Trojan

Backdoor.DeepThroat.Server virus description
Technical details:
Categories: Trojan,Backdoor
Backdoor.DeepThroat.Server Aliases:
[Kaspersky]Backdoor.DeepThroat.b;
[McAfee]BackDoor-J;
[F-Prot]destructive program;
[Panda]Trj/DeepThroat.B

Backdoor.DeepThroat.Server indications of infection

This symptoms of Backdoor.DeepThroat.Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
TrojanDownloader.Win32.VB.ah Trojan Removal
Remove Optix.Pager.Firewall.Bypass RAT
Removing Win32.Qoologic Trojan

ATC Trojan

ATC virus description
Technical details:
Categories: Trojan,Downloader

ATC Files:
[%SYSTEM%]\lnwin.exe
[%SYSTEM%]\lnwin.exe

ATC Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run


ATC indications of infection

This symptoms of ATC detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
WinLink Adware Removal instruction
Removing Bancos.GIG Trojan
FakeAlert.TrojanFactory Trojan Removal instruction

Pigeon.ALX Trojan

Pigeon.ALX virus description
Technical details:
Categories: Trojan

Pigeon.ALX indications of infection

This symptoms of Pigeon.ALX detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.HSI Trojan Cleaner
BackDoor.BAC.gen Backdoor Cleaner

Error! Trojan

Error! virus description
Technical details:
Categories: Trojan

Error! indications of infection

This symptoms of Error! detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MetaDirect Adware Information
Bancos.GGN Trojan Cleaner

Sulfnbk.Attachment Trojan

Sulfnbk.Attachment virus description
Technical details:
Categories: Trojan

Sulfnbk.Attachment indications of infection

This symptoms of Sulfnbk.Attachment detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing BDirect Trojan
Removing TrojanDownloader.Win32.Netcomp Trojan
Pigeon.AUT Trojan Information

TrojanDownloader.Win32.Dyfuca.aa Downloader

TrojanDownloader.Win32.Dyfuca.aa virus description
Technical details:
Categories: Downloader
TrojanDownloader.Win32.Dyfuca.aa Aliases:
[Panda]Spyware/Dyfuca

TrojanDownloader.Win32.Dyfuca.aa indications of infection

This symptoms of TrojanDownloader.Win32.Dyfuca.aa detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Logho Trojan
WhenU.UControl Adware Information
Removing CWS.IEFeats Trojan
Frethog.ADO Trojan Information

SillyDL.DCU Trojan

SillyDL.DCU virus description
Technical details:
Categories: Trojan

SillyDL.DCU indications of infection

This symptoms of SillyDL.DCU detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SecondThought Trojan Cleaner
PersonalMoneyTree Adware Information
Proxy.Daemonize Trojan Removal
Omnox Downloader Removal instruction

gostats.com Tracking Cookie

gostats.com virus description
Technical details:
Categories: Tracking Cookie

gostats.com indications of infection

This symptoms of gostats.com detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove Backdoor.Avocado.ServerDLL Backdoor
Net.Send.Bomber DoS Removal instruction
Scanner.Blast RAT Symptoms
UltraBar Toolbar Information

Bloopfit Trojan

Bloopfit virus description
Technical details:
Categories: Trojan

Bloopfit indications of infection

This symptoms of Bloopfit detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove IRC.Flood.bc Worm
CAU.Zine Trojan Symptoms
Anthena Trojan Removal
Win32.Webdialer.Dialer!Trojan Adware Removal
Removing Meplex Adware

Redirectmaster Hijacker

Redirectmaster virus description
Technical details:
Categories: Hijacker

Redirectmaster indications of infection

This symptoms of Redirectmaster detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Slow Trojan Cleaner
Remove startpage.vo Hijacker

Win32.DCom Trojan

Win32.DCom virus description
Technical details:
Categories: Trojan,Hacker Tool
Win32.DCom Aliases:
[Kaspersky]Net-Worm.Win32.Raleka.aa;
[McAfee]Exploit-DcomRpc;
[Panda]Trj/ExplDCOM.L,Hacktool Program,Bck/Hacdef.gen;
[Other]Win32/DcomRpc!exploit,Backdoor.IRC.RPCBot.C

Win32.DCom indications of infection

This symptoms of Win32.DCom detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Lospad Trojan Symptoms

BAT.Lame Trojan

BAT.Lame virus description
Technical details:
Categories: Trojan
BAT.Lame Aliases:
[Kaspersky]BAT.Lame.874;
[Eset]BAT/Lame.874 virus;
[Panda]BAT/Lame.874;
[Computer Associates]BAT.Lame.790,Bat/Lame

BAT.Lame indications of infection

This symptoms of BAT.Lame detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Webmisc Adware Information
Content.Monitoring.Tool.Service Adware Cleaner

Guangwaigirl.53b Backdoor

Guangwaigirl.53b virus description
Technical details:
Categories: Backdoor,RAT
Guangwaigirl.53b Aliases:
[Kaspersky]Backdoor.GWGirl.153.b;
[McAfee]BackDoor-SP;
[F-Prot]security risk or a "backdoor" program;
[Panda]Bck/GWGirl,Bck/GWGirl.153.B;
[Computer Associates]Backdoor/GWGirl.153.B!Setup,Win32.Gdufs.153.A

Guangwaigirl.53b indications of infection

This symptoms of Guangwaigirl.53b detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing aol.fr Tracking Cookie
Bancos.GYN Trojan Removal
Removing ProcKill Trojan
Remove ExploreZip.pack Worm