version Trojan

version virus description
Technical details:
Categories: Trojan

version indications of infection

This symptoms of version detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Shirley Trojan Removal instruction

PWS.BM.cfg Trojan

PWS.BM.cfg virus description
Technical details:
Categories: Trojan,Hacker Tool
PWS.BM.cfg Aliases:
[Kaspersky]Trojan.PSW.Coced.236,Trojan.PSW.Coced.236.a,Trojan.PSW.Coced.236.b,Trojan.PSW.Coced.236.d;
[McAfee]PWS-BM.cfg,PWS-BM.gen;
[F-Prot]destructive program,security risk or a "backdoor" program;
[Panda]Trj/Coced.236,Trj/PSW.Coced.236.b,Trj/PSW.Coced.236.D;
[Computer Associates]Win32/Coced.236.1!PWS!Trojan,Win32/Coced.236.B1!PWS!Trojan,Win95/Coce2225!Dropper

PWS.BM.cfg indications of infection

This symptoms of PWS.BM.cfg detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Agent.bg Trojan Removal instruction

MyWay BHO

MyWay virus description
Technical details:
Categories: BHO,Toolbar

MyWay indications of infection

This symptoms of MyWay detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.AIA Trojan Information
Removing Zdziubus.beta RAT

Phishbank.ASG Trojan

Phishbank.ASG virus description
Technical details:
Categories: Trojan

Phishbank.ASG indications of infection

This symptoms of Phishbank.ASG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.FKQ Trojan Cleaner
Octa Spyware Removal

Pigeon.AVIG Trojan

Pigeon.AVIG virus description
Technical details:
Categories: Trojan

Pigeon.AVIG indications of infection

This symptoms of Pigeon.AVIG detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove IcmpCmd Trojan

Bat.Shadow Trojan

Bat.Shadow virus description
Technical details:
Categories: Trojan
Bat.Shadow Aliases:
[Eset]BAT/Shadow.1232 virus;
[Panda]BAT/Shadow;
[Computer Associates]Bat/Shadow

Bat.Shadow indications of infection

This symptoms of Bat.Shadow detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyFDC Worm Cleaner
Vxidl.ABX Trojan Removal instruction
Agent.BSO Trojan Removal

Progent Trojan

Progent virus description
Technical details:
Categories: Trojan,Spyware,Backdoor
Progent Aliases:
[Kaspersky]TrojanSpy.Win32.ProAgent.11;
[Panda]Trojan Horse;
[Computer Associates]Backdoor/Progent.11!DLL

Progent indications of infection

This symptoms of Progent detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bancos.GGS Trojan Removal instruction
Encryption.and.Checkcode.of.the.ICQ.Protocol.V3.and Trojan Removal instruction

Troj.Rightu Downloader

Troj.Rightu virus description
Technical details:
Categories: Downloader

Troj.Rightu indications of infection

This symptoms of Troj.Rightu detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Webbulion Adware
AdShooter.SearchForIt Adware Cleaner
Remove Dowque.AAC Trojan
Removing Pigeon.AVNP Trojan
Remove ELF.Chfn!Rootkit!Trojan Trojan

WinCOM.LPD DoS

WinCOM.LPD virus description
Technical details:
Categories: DoS

WinCOM.LPD indications of infection

This symptoms of WinCOM.LPD detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Sunset Trojan Removal
Pigeon.ERN Trojan Symptoms
Win32.Simcss!Trojan Adware Removal instruction
Removing TeleChargement Tracking Cookie
Removing Dnps Tracking Cookie

Email.Spy.Pro Spyware

Email.Spy.Pro virus description
Technical details:
Categories: Spyware

Email.Spy.Pro Folders:
[%COMMON_PROGRAMS%]\Email Spy Pro
[%PROGRAM_FILES%]\Email Spy Pro

Email.Spy.Pro Files:
[%SYSTEM%]\esphelp.chm
[%SYSTEM%]\esphelp.chm

Email.Spy.Pro Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\advem
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_aemdrv
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\aemdrv

Email.Spy.Pro Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Email.Spy.Pro indications of infection

This symptoms of Email.Spy.Pro detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Bat.qu Trojan Symptoms

BlackDream Trojan

BlackDream virus description
Technical details:
Categories: Trojan,Backdoor
BlackDream Aliases:
[Kaspersky]Backdoor.VB.ja;
[Eset]Win32/VB.JA trojan;
[Panda]Backdoor Program;
[Computer Associates]Backdoor/VB.JA

BlackDream indications of infection

This symptoms of BlackDream detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Remove TrojanDropper.Boot.InstallDisk Trojan
Snid.X2 Backdoor Symptoms
Removing Back.Orifice.Java Trojan
Removing Bombing Trojan
Drawa Trojan Cleaner

Bancos.HPK Trojan

Bancos.HPK virus description
Technical details:
Categories: Trojan

Bancos.HPK indications of infection

This symptoms of Bancos.HPK detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AUZY Trojan Symptoms
SdBot.gw Trojan Information
Vxidl.AGM Trojan Cleaner

Vallenza Trojan

Vallenza virus description
Technical details:
Categories: Trojan

Vallenza Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


Vallenza indications of infection

This symptoms of Vallenza detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Koko Trojan
VB.ez Downloader Cleaner
AV&Firewall.Killer Trojan Information
Remove Hammer Hacker Tool
Removing Vxidl.AXP Trojan

SillyDL.COP Trojan

SillyDL.COP virus description
Technical details:
Categories: Trojan

SillyDL.COP indications of infection

This symptoms of SillyDL.COP detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.ASD Trojan Removal
Eastside DoS Symptoms

SaSyncMgr Hijacker

SaSyncMgr virus description
Technical details:
Categories: Hijacker

SaSyncMgr indications of infection

This symptoms of SaSyncMgr detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
MP.Bus RAT Removal instruction
Sysrater Trojan Cleaner

Win32.Killav Trojan

Win32.Killav virus description
Technical details:
Categories: Trojan,Hacker Tool
Win32.Killav Aliases:
[Kaspersky]Trojan.Win32.Killav.ci;
[Eset]Win32/KillAV.CN trojan,Win32/KillAV.CG trojan;
[Panda]Trojan Horse

Win32.Killav indications of infection

This symptoms of Win32.Killav detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing Elephant2 Trojan

Serv.FTP.Server Trojan

Serv.FTP.Server virus description
Technical details:
Categories: Trojan,Backdoor,Hacker Tool
Serv.FTP.Server Aliases:
[Kaspersky]Backdoor.ServU-based;
[McAfee]ServU-Daemon;
[F-Prot]destructive program;
[Panda]Application/Serv-U-Based.A;
[Computer Associates]Win32/Irc-hack.B!Trojan

Serv.FTP.Server indications of infection

This symptoms of Serv.FTP.Server detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVRP Trojan Cleaner
BO2K.IDEA.Encryption Trojan Symptoms
PSW.Hukle Trojan Cleaner
Removing Unknown.Toolbar4 BHO

mIRC.Flood.Ms16!Trojan DoS

mIRC.Flood.Ms16!Trojan virus description
Technical details:
Categories: DoS

mIRC.Flood.Ms16!Trojan indications of infection

This symptoms of mIRC.Flood.Ms16!Trojan detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing SillyDl.CWY Trojan
Biffit Hacker Tool Information
Vxidl.AIC Trojan Removal
Removing internetsecurityzone.com Tracking Cookie
Removing Bancos.HBM Trojan

Bancos.HAY Trojan

Bancos.HAY virus description
Technical details:
Categories: Trojan

Bancos.HAY indications of infection

This symptoms of Bancos.HAY detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Removing IRC.Bircd Backdoor
Caterpillar Trojan Information
Trojan.Downloader.Win32.Small.yj Downloader Removal instruction
Gun Trojan Information

SillyDl.DFH Trojan

SillyDl.DFH virus description
Technical details:
Categories: Trojan

SillyDl.DFH indications of infection

This symptoms of SillyDl.DFH detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Vxidl.AUI Trojan Removal instruction
Hackdef.INI Trojan Information
Sambe Trojan Symptoms
SillyDl.DHH Trojan Cleaner
Remove CGI.Bin Tracking Cookie

Samaevsh Trojan

Samaevsh virus description
Technical details:
Categories: Trojan

Samaevsh indications of infection

This symptoms of Samaevsh detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
SillyDl.CHF Trojan Cleaner
Remove Pigeon.AVHS Trojan
Bancos.HCY Trojan Removal

Win32.TrojanDropper.Kbind Trojan

Win32.TrojanDropper.Kbind virus description
Technical details:
Categories: Trojan
Win32.TrojanDropper.Kbind Aliases:
[Kaspersky]TrojanDropper.Win32.Kbind;
[Panda]Trojan Horse

Win32.TrojanDropper.Kbind indications of infection

This symptoms of Win32.TrojanDropper.Kbind detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
romancart.com Tracking Cookie Cleaner
Bancos.IJR Trojan Symptoms

DontRun Trojan

DontRun virus description
Technical details:
Categories: Trojan
DontRun Aliases:
[Kaspersky]Trojan.DontRun.a;
[F-Prot]destructive program;
[Panda]Trj/dontrun.a,Trj/Dontrun;
[Computer Associates]DontRun!Trojan,Dontrun.B!Trojan

DontRun indications of infection

This symptoms of DontRun detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Small.fn Trojan Information
Win32.Rpc Trojan Information
VBS.Edibara Trojan Cleaner

Progetto1 RAT

Progetto1 virus description
Technical details:
Categories: RAT

Progetto1 indications of infection

This symptoms of Progetto1 detection are the files, registry, and network communication referenced in the technical details section.
Method of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial.Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.
Buy Exterminate-It antivirus software and perform a full scan of the computer.
You can also Download Free Trial Version of ExterminateIt! to check your your computer just NOW.

Also Be Aware of the Following Threats:
Pigeon.AVBC Trojan Symptoms
He4Hook Trojan Information
Webber.O!downloader Trojan Removal instruction