Trojan
A Trojan (or Trojan Horse) is a program which carries out an unauthorized function while hidden inside an authorized program. It is designed to do something other than what it claims to, and frequently is ...

Trojan horse
Trojan horse A program that masquerades as another common program in an attempt to receive information. An example of a Trojan horse is a program that behaves like a system logon to retrieve user names and ...

Dloadr-ZP Trojan Virus
Dloadr-ZP Trojan Virus Hackers Use Putin Death Hoax to Spread Virus. The spam emails have the subject line "ATTENTION!!! President of Russia has died" and a link to more information on the subject. A ...

Trojan horse Agent BOY Computer Virus
Trojan horse Agent BOY Computer Virus Like all baddies in the movies, he has many aliases... Cutwail.B, Cutwail.C, Cutwail.M, Troj / Pushdo-B, Trojan.Win32.Agent.auh, Spy-Agent.bv.gen,
Trojan.Pandex, TR / Ntech.B and Troj / Agent-FZG, Trojan.Kobcka.A, W32 / ...

Where does Trojans and Viruses hide?
Where does Trojans and Viruses hide? There are many other places on a Windows system that Trojans can add scripts and shortcuts to startup Trojan processes: HKEY_LOCAL_MACHINE
Software
...

Removal of Trojan horse Downloader.Small.AJY virus
Removal of Trojan horse Downloader.Small.AJY virus This rogue program was found in my USER startup folder. C: \ Documents and Settings \ USER \ Start Menu \ Programs \ Startup \ info.exe
info.exe reported file ...

Removal of Trojan
Randon Virus I was slack and this virus hit our web server pool. All our 3 web servers were infected. Luckily, I noticed a day after the trojan was installed and my anti-virus prevented the ...

The Tiger and the Trojan Horse
The Tiger and the Trojan Horse Enter the half-world of the communist underground, with its elaborate tradecraft and secret rendezvous in a vivid tale of ruthlessness matched against ruthlessness, seen from both sides. This reprint of ...

Trojan horse Proxy Computer Virus
Trojan horse Proxy Computer Virus O4 - HKLM .. Run: [Grid Client Configurator] "C: Program Files Grid Client peerconf.exe" -d test
O4 - HKLM .. Run: [Grid Client ...

Trojan horse Small Computer Virus
Trojan horse Small Computer Virus During the infected PC, when I double click on my drives, it will automatically open out a new Window. When I right click on the drive, it appeared in some ...

Trojan.Moo Computer Virus
Trojan.Moo Computer Virus Trojan.Moo was apparently created with the automated tool released by several hackers. The tool, known as the JPEG of Death creation kit, is constantly being updated by its creators and will likely ...

Trojan horse Backdoor Computer Virus FVX
Trojan horse Backdoor Computer Virus FVX
The virus drops the following files into the flash drive (thumb drive or usb drive) autorun.inf RECYCLERdesktop.ini UcHelp.exe The easiest way to remove the virus is to format ...

Removal of Trojan BackDoor-AQF.DLL
Backdoor AQF Alises: Backdoor.EggDrop (AVP), BackDoor.EggDrop (Dr.Web), Backdoor.EggDrop (Symantec) There are three components of the backdoor, a configuration executable, a service executable and a backdoor dll. The configuration executable is command-line tool. It is used to configure ...

szchost.exe
szchost.exe Part of Trojan.Mercurycas.A Trojan.Mercurycas.A is a Trojan horse that allows an infected computer to be used as an email relay.

Lzio Updater
Lizo Updater Lizo is a downloader trojan.  This detection is for a downloading trojan that attempts to download and install another remote file on the victim machine. The nature of the remote file may obviously change, ...

winupdate.exe
winupdate.exe Process File: winupdate or winupdate.exe
Process Name: Winupdate
Description: Added to the system as a result of the RADO VIRUS! which is a Backdoor Trojan Horse.It gives its creator unauthorized remote access to your computer. When the ...

Naiva Computer Virus
Naiva Computer Virus An infected e-mail is going around with the main theme being, Bird flu outbreak in North America or What is avian influenza. Don’t open it, has the Naiva Computer Virus in it. ...

msreg.exe
msreg.exe Backdoor.Zinx - Backdoor.Zinx is a backdoor Trojan Horse that allows a hacker to use your compter as proxy and steals information. By default the Trojan opens ports 14728 and 24759. The Trojan is launched using ...

SpamThru Computer Virus
SpamThru Computer Virus SpamTrhu a piece of malware designed to send spam from an infected computer. SpamTrhu which uses peer-to-peer technology to send commands to hijacked computers, has been fitted with its own anti-virus scanner, ...

netda.exe
netda.exe identifies as: BKDR_CCT.A. Sophos calles it Dumaris(sp?) Description of trojan:
Upon execution, it drops copies of itself as: * %System%\netda.exe
* %System%\netdc.exe
* %Startup%\netdb.exe
* %Windows%\prntsrv.dll This Trojan steals critical information by monitoring windows accessed by the user. It ...

Win32.Mersting
Win32.Mersting Also known as StartPage-CR, Win32.DlMersting.A, Win32.Mersting, Win32.Mersting.B, win32.Mersting.gen, Win32/StartPage.CR1.Trojan Win32.Mersting is a trojan that is used to change a user's default Internet Explorer homepage and/or default search page. It can also download other components and add pornography ...

Cager Computer Virus
Cager Computer Virus A new Trojan computer program named Cager.a is making the rounds. The 'Cager.a' Trojan monitors access to porn websites and then displays a quote from the Qu’ran chastising the web user ...

Port Probe TCP Port : 1999
Port Probe TCP Port : 1999 cisco identification port / SubSeven (Windows Trojan) / Backdoor (Windows Trojan) Port Number Decimal = 1999/TCP

QQPass Computer Virus
QQPass Computer Virus QQPass is a Trojan that steals passwords and user information that runs on the Windows platform. This Trojan horse is a Visual Basic (VB) application that requires the presence of the Microsoft ...

Berbew Computer Virus
Berbew Computer Virus The Berbew family of Trojans retrieves passwords stored on an infected system and sends them to a remote Web server. It also acts as a Web proxy, which allows attackers to use ...

Windll32.exe
Windll32.exe This file might be related to spyware. We advice you to scan your computer and eliminate possible threats. The windll32.exe is related to worm W32.HLLW.Respan, pwsteal.trojan, TrojanProxy.Win32.Mitglieder.bi [Kaspersky], Backdoor.Traitor, Traitor-21. When Trojan.Mitglieder.L is executed, it performs ...

WINSHOST.EXE
WINSHOST.EXE WINSHOST.EXE is part of Bagle Trojan for the Windows platform. The Trojan copies itself into the Windows system folder as winshost.exe. In order to run automatically when Windows starts up creates the following registry ...

conime.exe
conime.exe conime.exe is a process which is registered as the BFGhost 1.0 Remote administration backdoor tool. This backdoor application can allow attackers to access your computer, stealing passwords and personal data. Bfghost process is likely spyware and ...

CTFMONA Computer Virus
CTFMONA Computer Virus Command, ctfmona.exe. Status, X. Description, Identified as a variant of the W32 / Smalltroj.CJDX malware, Generic PWS.y Trojan. Ctfmona.exe is also classified as Trojan / Backdoor Virus. The filename CTFMONA.EXE was first ...

mstaskss.exe
mstaskss.exe Troj/Lamedon-D is a downloader Trojan which tries to download files from a remote location to the Windows folder and run them.  The Trojan typically tries to download the following files to the Windows folder: secure.html ...

Hackarmy Computer Virus
Hackarmy Computer Virus Also known as: Backdoor.Hackarmy.a-i, BackDoor-AZV, Troj/Hackarmy-A, W32/Rawbot.worm Mass postings (about Nick Berg, Osama bin Laden or Schwarzenegger) to thousands of different newsgroups were done to 'seed' the Trojan as far as possible. Once the ...

sncntr.exe
sncntr.exe Also known as Downloader-DC trojan, Troj/Dluca-I, sncntr.downloader Troj/Dluca-I is a downloader Trojan which downloads executables from remote servers and installs/runs them. This purpose of this trojan is simply to download a file from the Internet and ...

IMAD.EXE
IMAD.EXE Suspected virus, trojan, or worm file

Viruses: On-line Scanners
Free On-line Anti-Virus Scanning Please Follow the Guide step by step to cure your infected PC and to Protect against your Computer from external Trojan Horse, Malware and viruses from e-mails & downloads. Step 1. ...

Hacker Defender - Hackdef
Hacker Defender - Hackdef Win32 / Hackdef is a family of backdoor Trojans that is distributed in various ways to computers running certain versions of Microsoft Windows. This Trojan is a user-mode rootkit. It creates, ...

Win32.Wintrim
Win32.Wintrim Win32.Wintrim is a family of trojans that download other files. They are considered trojans mainly because of their ability to terminate certain firewall software.   The Wintrim trojans install themselves by creating a subdirectory in the ...

Removal of W32.Bugbear.b@MM
The worm uses the Incorrect MIME Header Can Cause IE to Execute E-mail Attachment vulnerability to cause unpatched systems to auto-execute the worm when reading or previewing an infected message.

In addition, the worm contains routines ...

Scob Computer Virus
Scob Computer Virus Also known as JS.Scob.Trojan, Download.Ject, and JS.Toofeer Summary: JS.Scob.Trojan/JS/Exploit-DialogArg.b Trojan JS.Scob.Trojan or Download.Ject is a simple Trojan that executes a JavaScript file from a remote server. The Trojan’s dropper sets it as ...

Syslaunch.exe
Syslaunch.exe W32 ADClicker G.Trojan Spyware Removal procedure: Terminate the Syslaunch.exe process. Delete c:\Program Files\Syslaunch.exe Restart computer

Avsynmgr32.exe
Avsynmgr32.exe Trojan.Framar virus. But this could also be a good process from Mcafee.  Good ideal to run the AV scan immediately.  

TCP Port Scan
Port Scans The act of systematically scanning a computer's ports. Since a port is a place where information goes into and out of a computer, port scanning identifies open doors to a computer. Port scanning has ...

MS.EXE
MS.EXE MaxSpeed - Adware??? Trojan???

Brador Pocket PC Virus
Brador Pocket PC Virus Also known as WinCE.Brador.A; Backdoor.Brador.A It is specifically designed to attack (Windows Mobile) Pocket PC users via Microsoft's CE operating system.  Brador is a full-scale malicious program. It has a complete set of ...

scvhost.exe
scvhost.exe scvhost - scvhost.exe - Process Information Process File: scvhost or scvhost.exe Process Name: Scvhost Description: Added to the system as a result of the W32/Agobot-S virus that is an IRC backdoor Trojan and network worm. W32/Agobot-S copies itself ...

Port Probe TCP Port : 901
Port Probe TCP Port : 901 Samba Web Administration Tool / Realsecure / SMPNAMERES/ NetDevil trojan Port Number Decimal = 901/TCP

Port Probe TCP Port : 6670
Port Probe TCP Port : 6670 Vocaltec Global Online Directory / Deep Throat 2 (Windows Trojan) Port Number Decimal = 6670/TCP

Free Browser Exploit Disabler
Free IE Browser Exploit Disabler Browser hijackers use a variety of methods to trick the user into installing them, but a growing part of them uses vulnerabilities in Internet Explorer instead to install completely silent. ...

Port Probe TCP Port : 5401
Port Probe TCP Port : 5401 Excerpt Search Secure / Blade Runner (Windows Trojan) Port Number Decimal = 5401/TCP

Blended Threat
Blended Threat Blended threats combine the characteristics of viruses, worms, Trojan Horses, and malicious code with server and Internet vulnerabilities to initiate, transmit, and spread an attack. By using multiple methods and techniques, blended threats ...

WIN.exe
WIN.exe W32/Agobot-KN is an IRC backdoor Trojan and network worm which establishes an IRC channel to a remote server in order to grant an intruder access to the compromised computer.  This worm will move itself into ...

Port Probe TCP Port : 65000
Port Probe TCP Port : 65000 distributed attack tool / Devil (Windows Trojan) Port Number Decimal = 65000/TCP

Port Probe TCP Port : 5000
Port Probe TCP Port : 5000 UPnP / filmaker.com / Socket de Troie (Windows Trojan) Port Number Decimal = 5000/TCP

Port Probe TCP Port : 5400
Port Probe TCP Port : 5400 Excerpt Search / Blade Runner (Windows Trojan) Port Number Decimal = 5400/TCP

virus
virus A program that attempts to spread from computer to computer and either cause damage (by erasing or corrupting data) or annoy users (by printing messages or altering what is displayed on the screen). A cracker program ...

kazza.exe
kazza.exe Process File: kazza or kazza.exe
Process Name: Kazza.exe
Description: Indication of a possible infection of OPTIXPRO.12.C. Backdoor.OptixPro.12.c is a variant of the Backdoor.OptixPro.12 Trojan Horse and allows unauthorized remote access to an infected computer on port 3410.